Commit | Line | Data |
---|---|---|
0a8165d7 | 1 | /* |
eb47b800 JK |
2 | * fs/f2fs/data.c |
3 | * | |
4 | * Copyright (c) 2012 Samsung Electronics Co., Ltd. | |
5 | * http://www.samsung.com/ | |
6 | * | |
7 | * This program is free software; you can redistribute it and/or modify | |
8 | * it under the terms of the GNU General Public License version 2 as | |
9 | * published by the Free Software Foundation. | |
10 | */ | |
11 | #include <linux/fs.h> | |
12 | #include <linux/f2fs_fs.h> | |
13 | #include <linux/buffer_head.h> | |
14 | #include <linux/mpage.h> | |
15 | #include <linux/writeback.h> | |
16 | #include <linux/backing-dev.h> | |
8f46dcae | 17 | #include <linux/pagevec.h> |
eb47b800 JK |
18 | #include <linux/blkdev.h> |
19 | #include <linux/bio.h> | |
690e4a3e | 20 | #include <linux/prefetch.h> |
e2e40f2c | 21 | #include <linux/uio.h> |
f1e88660 | 22 | #include <linux/cleancache.h> |
174cd4b1 | 23 | #include <linux/sched/signal.h> |
eb47b800 JK |
24 | |
25 | #include "f2fs.h" | |
26 | #include "node.h" | |
27 | #include "segment.h" | |
db9f7c1a | 28 | #include "trace.h" |
848753aa | 29 | #include <trace/events/f2fs.h> |
45560fee | 30 | #include <trace/events/android_fs.h> |
eb47b800 | 31 | |
c6e638ae EB |
32 | #define NUM_PREALLOC_POST_READ_CTXS 128 |
33 | ||
34 | static struct kmem_cache *bio_post_read_ctx_cache; | |
35 | static mempool_t *bio_post_read_ctx_pool; | |
36 | ||
36951b38 CY |
37 | static bool __is_cp_guaranteed(struct page *page) |
38 | { | |
39 | struct address_space *mapping = page->mapping; | |
40 | struct inode *inode; | |
41 | struct f2fs_sb_info *sbi; | |
42 | ||
43 | if (!mapping) | |
44 | return false; | |
45 | ||
46 | inode = mapping->host; | |
47 | sbi = F2FS_I_SB(inode); | |
48 | ||
49 | if (inode->i_ino == F2FS_META_INO(sbi) || | |
50 | inode->i_ino == F2FS_NODE_INO(sbi) || | |
51 | S_ISDIR(inode->i_mode) || | |
52 | is_cold_data(page)) | |
53 | return true; | |
54 | return false; | |
55 | } | |
56 | ||
c6e638ae EB |
57 | /* postprocessing steps for read bios */ |
58 | enum bio_post_read_step { | |
59 | STEP_INITIAL = 0, | |
60 | STEP_DECRYPT, | |
61 | }; | |
62 | ||
63 | struct bio_post_read_ctx { | |
64 | struct bio *bio; | |
65 | struct work_struct work; | |
66 | unsigned int cur_step; | |
67 | unsigned int enabled_steps; | |
68 | }; | |
69 | ||
49e3bbe3 BK |
70 | /* device unit number for iv sector */ |
71 | #define PG_DUN(i,p) \ | |
72 | ((((i)->i_ino & 0xffffffff) << 32) | ((p)->index & 0xffffffff)) | |
73 | ||
51cc6215 BK |
74 | static inline bool f2fs_may_encrypt_bio(struct inode *inode, |
75 | struct f2fs_io_info *fio) | |
76 | { | |
49e3bbe3 | 77 | #ifdef CONFIG_CRYPTO_DISKCIPHER |
51cc6215 BK |
78 | if (fio && (fio->type != DATA || fio->encrypted_page)) |
79 | return false; | |
80 | ||
81 | return (f2fs_encrypted_file(inode) && | |
82 | fscrypt_disk_encrypted(inode)); | |
49e3bbe3 BK |
83 | #else |
84 | return false; | |
85 | #endif | |
51cc6215 BK |
86 | } |
87 | ||
88 | static inline bool f2fs_bio_disk_encrypted(unsigned int bi_opf) | |
89 | { | |
90 | if (bi_opf & REQ_CRYPT) | |
91 | return true; | |
92 | else | |
93 | return false; | |
94 | } | |
95 | ||
49e3bbe3 | 96 | static bool f2fs_mergeable_bio(struct bio *bio, u64 dun, void *ci, bool bio_encrypted) |
51cc6215 | 97 | { |
49e3bbe3 | 98 | #ifdef CONFIG_CRYPTO_DISKCIPHER |
51cc6215 BK |
99 | if (!bio) |
100 | return true; | |
101 | ||
102 | /* if both of them are not encrypted, no further check is needed */ | |
103 | if (!f2fs_bio_disk_encrypted(bio->bi_opf) && !bio_encrypted) | |
104 | return true; | |
105 | ||
49e3bbe3 BK |
106 | #ifdef CONFIG_CRYPTO_DISKCIPHER_DUN |
107 | if (bio->bi_aux_private == ci) | |
108 | return bio_end_dun(bio) == dun; | |
109 | else | |
110 | return false; | |
111 | #else | |
51cc6215 | 112 | return bio->bi_aux_private == ci; |
49e3bbe3 BK |
113 | #endif |
114 | #else | |
115 | return true; | |
116 | #endif | |
51cc6215 BK |
117 | } |
118 | ||
c6e638ae | 119 | static void __read_end_io(struct bio *bio) |
93dfe2ac | 120 | { |
c6e638ae EB |
121 | struct page *page; |
122 | struct bio_vec *bv; | |
f568849e | 123 | int i; |
93dfe2ac | 124 | |
c6e638ae EB |
125 | bio_for_each_segment_all(bv, bio, i) { |
126 | page = bv->bv_page; | |
127 | ||
128 | /* PG_error was set if any post_read step failed */ | |
129 | if (bio->bi_status || PageError(page)) { | |
130 | ClearPageUptodate(page); | |
131 | SetPageError(page); | |
132 | } else { | |
133 | SetPageUptodate(page); | |
134 | } | |
135 | unlock_page(page); | |
136 | } | |
137 | if (bio->bi_private) | |
138 | mempool_free(bio->bi_private, bio_post_read_ctx_pool); | |
139 | bio_put(bio); | |
140 | } | |
141 | ||
142 | static void bio_post_read_processing(struct bio_post_read_ctx *ctx); | |
143 | ||
144 | static void decrypt_work(struct work_struct *work) | |
145 | { | |
146 | struct bio_post_read_ctx *ctx = | |
147 | container_of(work, struct bio_post_read_ctx, work); | |
148 | ||
149 | fscrypt_decrypt_bio(ctx->bio); | |
150 | ||
151 | bio_post_read_processing(ctx); | |
152 | } | |
153 | ||
154 | static void bio_post_read_processing(struct bio_post_read_ctx *ctx) | |
155 | { | |
156 | switch (++ctx->cur_step) { | |
157 | case STEP_DECRYPT: | |
158 | if (ctx->enabled_steps & (1 << STEP_DECRYPT)) { | |
159 | INIT_WORK(&ctx->work, decrypt_work); | |
160 | fscrypt_enqueue_decrypt_work(&ctx->work); | |
161 | return; | |
162 | } | |
163 | ctx->cur_step++; | |
164 | /* fall-through */ | |
165 | default: | |
166 | __read_end_io(ctx->bio); | |
167 | } | |
168 | } | |
169 | ||
170 | static bool f2fs_bio_post_read_required(struct bio *bio) | |
171 | { | |
172 | return bio->bi_private && !bio->bi_status; | |
173 | } | |
174 | ||
175 | static void f2fs_read_end_io(struct bio *bio) | |
176 | { | |
8b038c70 | 177 | #ifdef CONFIG_F2FS_FAULT_INJECTION |
55523519 CY |
178 | if (time_to_inject(F2FS_P_SB(bio->bi_io_vec->bv_page), FAULT_IO)) { |
179 | f2fs_show_injection_info(FAULT_IO); | |
4e4cbee9 | 180 | bio->bi_status = BLK_STS_IOERR; |
55523519 | 181 | } |
8b038c70 CY |
182 | #endif |
183 | ||
51cc6215 BK |
184 | if(f2fs_bio_disk_encrypted(bio->bi_opf)) |
185 | goto end_io; | |
186 | ||
c6e638ae EB |
187 | if (f2fs_bio_post_read_required(bio)) { |
188 | struct bio_post_read_ctx *ctx = bio->bi_private; | |
f1e88660 | 189 | |
c6e638ae EB |
190 | ctx->cur_step = STEP_INITIAL; |
191 | bio_post_read_processing(ctx); | |
192 | return; | |
f1e88660 | 193 | } |
c6e638ae | 194 | |
51cc6215 | 195 | end_io: |
c6e638ae | 196 | __read_end_io(bio); |
f1e88660 JK |
197 | } |
198 | ||
4246a0b6 | 199 | static void f2fs_write_end_io(struct bio *bio) |
93dfe2ac | 200 | { |
1b1f559f | 201 | struct f2fs_sb_info *sbi = bio->bi_private; |
f568849e LT |
202 | struct bio_vec *bvec; |
203 | int i; | |
93dfe2ac | 204 | |
f568849e | 205 | bio_for_each_segment_all(bvec, bio, i) { |
93dfe2ac | 206 | struct page *page = bvec->bv_page; |
36951b38 | 207 | enum count_type type = WB_DATA_TYPE(page); |
93dfe2ac | 208 | |
0a595eba JK |
209 | if (IS_DUMMY_WRITTEN_PAGE(page)) { |
210 | set_page_private(page, (unsigned long)NULL); | |
211 | ClearPagePrivate(page); | |
212 | unlock_page(page); | |
213 | mempool_free(page, sbi->write_io_dummy); | |
214 | ||
4e4cbee9 | 215 | if (unlikely(bio->bi_status)) |
0a595eba JK |
216 | f2fs_stop_checkpoint(sbi, true); |
217 | continue; | |
218 | } | |
219 | ||
0b81d077 | 220 | fscrypt_pullback_bio_page(&page, true); |
4375a336 | 221 | |
4e4cbee9 | 222 | if (unlikely(bio->bi_status)) { |
5114a97a | 223 | mapping_set_error(page->mapping, -EIO); |
ce767d9a JK |
224 | if (type == F2FS_WB_CP_DATA) |
225 | f2fs_stop_checkpoint(sbi, true); | |
93dfe2ac | 226 | } |
ce767d9a JK |
227 | |
228 | f2fs_bug_on(sbi, page->mapping == NODE_MAPPING(sbi) && | |
229 | page->index != nid_of_node(page)); | |
230 | ||
36951b38 CY |
231 | dec_page_count(sbi, type); |
232 | clear_cold_data(page); | |
93dfe2ac | 233 | end_page_writeback(page); |
f568849e | 234 | } |
36951b38 | 235 | if (!get_pages(sbi, F2FS_WB_CP_DATA) && |
f5730184 | 236 | wq_has_sleeper(&sbi->cp_wait)) |
93dfe2ac JK |
237 | wake_up(&sbi->cp_wait); |
238 | ||
239 | bio_put(bio); | |
240 | } | |
241 | ||
3c62be17 JK |
242 | /* |
243 | * Return true, if pre_bio's bdev is same as its target device. | |
244 | */ | |
245 | struct block_device *f2fs_target_device(struct f2fs_sb_info *sbi, | |
246 | block_t blk_addr, struct bio *bio) | |
247 | { | |
248 | struct block_device *bdev = sbi->sb->s_bdev; | |
249 | int i; | |
250 | ||
251 | for (i = 0; i < sbi->s_ndevs; i++) { | |
252 | if (FDEV(i).start_blk <= blk_addr && | |
253 | FDEV(i).end_blk >= blk_addr) { | |
254 | blk_addr -= FDEV(i).start_blk; | |
255 | bdev = FDEV(i).bdev; | |
256 | break; | |
257 | } | |
258 | } | |
259 | if (bio) { | |
74d46992 | 260 | bio_set_dev(bio, bdev); |
3c62be17 JK |
261 | bio->bi_iter.bi_sector = SECTOR_FROM_BLOCK(blk_addr); |
262 | } | |
263 | return bdev; | |
264 | } | |
265 | ||
266 | int f2fs_target_device_index(struct f2fs_sb_info *sbi, block_t blkaddr) | |
267 | { | |
268 | int i; | |
269 | ||
270 | for (i = 0; i < sbi->s_ndevs; i++) | |
271 | if (FDEV(i).start_blk <= blkaddr && FDEV(i).end_blk >= blkaddr) | |
272 | return i; | |
273 | return 0; | |
274 | } | |
275 | ||
276 | static bool __same_bdev(struct f2fs_sb_info *sbi, | |
277 | block_t blk_addr, struct bio *bio) | |
278 | { | |
74d46992 CH |
279 | struct block_device *b = f2fs_target_device(sbi, blk_addr, NULL); |
280 | return bio->bi_disk == b->bd_disk && bio->bi_partno == b->bd_partno; | |
3c62be17 JK |
281 | } |
282 | ||
940a6d34 GZ |
283 | /* |
284 | * Low-level block read/write IO operations. | |
285 | */ | |
286 | static struct bio *__bio_alloc(struct f2fs_sb_info *sbi, block_t blk_addr, | |
ce767d9a | 287 | struct writeback_control *wbc, |
a2a9032a JK |
288 | int npages, bool is_read, |
289 | enum page_type type, enum temp_type temp) | |
940a6d34 GZ |
290 | { |
291 | struct bio *bio; | |
292 | ||
7fb3f3b2 | 293 | bio = f2fs_bio_alloc(sbi, npages, true); |
940a6d34 | 294 | |
3c62be17 | 295 | f2fs_target_device(sbi, blk_addr, bio); |
a2a9032a JK |
296 | if (is_read) { |
297 | bio->bi_end_io = f2fs_read_end_io; | |
298 | bio->bi_private = NULL; | |
299 | } else { | |
300 | bio->bi_end_io = f2fs_write_end_io; | |
301 | bio->bi_private = sbi; | |
302 | bio->bi_write_hint = io_type_to_rw_hint(sbi, type, temp); | |
303 | } | |
ce767d9a JK |
304 | if (wbc) |
305 | wbc_init_bio(wbc, bio); | |
940a6d34 GZ |
306 | |
307 | return bio; | |
308 | } | |
309 | ||
4fc29c1a LT |
310 | static inline void __submit_bio(struct f2fs_sb_info *sbi, |
311 | struct bio *bio, enum page_type type) | |
f5730184 | 312 | { |
4fc29c1a | 313 | if (!is_read_io(bio_op(bio))) { |
0a595eba JK |
314 | unsigned int start; |
315 | ||
0a595eba JK |
316 | if (type != DATA && type != NODE) |
317 | goto submit_io; | |
318 | ||
a2a9032a JK |
319 | if (f2fs_sb_has_blkzoned(sbi->sb) && current->plug) |
320 | blk_finish_plug(current->plug); | |
321 | ||
0a595eba JK |
322 | start = bio->bi_iter.bi_size >> F2FS_BLKSIZE_BITS; |
323 | start %= F2FS_IO_SIZE(sbi); | |
324 | ||
325 | if (start == 0) | |
326 | goto submit_io; | |
327 | ||
328 | /* fill dummy pages */ | |
329 | for (; start < F2FS_IO_SIZE(sbi); start++) { | |
330 | struct page *page = | |
331 | mempool_alloc(sbi->write_io_dummy, | |
332 | GFP_NOIO | __GFP_ZERO | __GFP_NOFAIL); | |
333 | f2fs_bug_on(sbi, !page); | |
334 | ||
335 | SetPagePrivate(page); | |
336 | set_page_private(page, (unsigned long)DUMMY_WRITTEN_PAGE); | |
337 | lock_page(page); | |
338 | if (bio_add_page(bio, page, PAGE_SIZE, 0) < PAGE_SIZE) | |
339 | f2fs_bug_on(sbi, 1); | |
340 | } | |
341 | /* | |
342 | * In the NODE case, we lose next block address chain. So, we | |
343 | * need to do checkpoint in f2fs_sync_file. | |
344 | */ | |
345 | if (type == NODE) | |
346 | set_sbi_flag(sbi, SBI_NEED_CP); | |
19a5f5e2 | 347 | } |
0a595eba | 348 | submit_io: |
554b5125 JK |
349 | if (is_read_io(bio_op(bio))) |
350 | trace_f2fs_submit_read_bio(sbi->sb, type, bio); | |
351 | else | |
352 | trace_f2fs_submit_write_bio(sbi->sb, type, bio); | |
4e49ea4a | 353 | submit_bio(bio); |
f5730184 JK |
354 | } |
355 | ||
458e6197 | 356 | static void __submit_merged_bio(struct f2fs_bio_info *io) |
93dfe2ac | 357 | { |
458e6197 | 358 | struct f2fs_io_info *fio = &io->fio; |
93dfe2ac JK |
359 | |
360 | if (!io->bio) | |
361 | return; | |
362 | ||
51cc6215 BK |
363 | if (f2fs_bio_disk_encrypted(io->bio->bi_opf)) |
364 | bio_set_op_attrs(io->bio, fio->op, fio->op_flags | REQ_CRYPT); | |
365 | else | |
366 | bio_set_op_attrs(io->bio, fio->op, fio->op_flags); | |
554b5125 | 367 | |
04d328de | 368 | if (is_read_io(fio->op)) |
554b5125 | 369 | trace_f2fs_prepare_read_bio(io->sbi->sb, fio->type, io->bio); |
6a8f8ca5 | 370 | else |
554b5125 | 371 | trace_f2fs_prepare_write_bio(io->sbi->sb, fio->type, io->bio); |
04d328de | 372 | |
4fc29c1a | 373 | __submit_bio(io->sbi, io->bio, fio->type); |
93dfe2ac JK |
374 | io->bio = NULL; |
375 | } | |
376 | ||
942fd319 JK |
377 | static bool __has_merged_page(struct f2fs_bio_info *io, |
378 | struct inode *inode, nid_t ino, pgoff_t idx) | |
0fd785eb | 379 | { |
0fd785eb CY |
380 | struct bio_vec *bvec; |
381 | struct page *target; | |
382 | int i; | |
383 | ||
0c3a5797 | 384 | if (!io->bio) |
0fd785eb | 385 | return false; |
0c3a5797 | 386 | |
942fd319 | 387 | if (!inode && !ino) |
0c3a5797 | 388 | return true; |
0fd785eb CY |
389 | |
390 | bio_for_each_segment_all(bvec, io->bio, i) { | |
391 | ||
0b81d077 | 392 | if (bvec->bv_page->mapping) |
0fd785eb | 393 | target = bvec->bv_page; |
0b81d077 JK |
394 | else |
395 | target = fscrypt_control_page(bvec->bv_page); | |
0fd785eb | 396 | |
942fd319 JK |
397 | if (idx != target->index) |
398 | continue; | |
399 | ||
0c3a5797 CY |
400 | if (inode && inode == target->mapping->host) |
401 | return true; | |
0c3a5797 | 402 | if (ino && ino == ino_of_node(target)) |
0fd785eb | 403 | return true; |
0fd785eb CY |
404 | } |
405 | ||
0fd785eb CY |
406 | return false; |
407 | } | |
408 | ||
0c3a5797 | 409 | static bool has_merged_page(struct f2fs_sb_info *sbi, struct inode *inode, |
942fd319 | 410 | nid_t ino, pgoff_t idx, enum page_type type) |
0c3a5797 CY |
411 | { |
412 | enum page_type btype = PAGE_TYPE_OF_BIO(type); | |
a912b54d JK |
413 | enum temp_type temp; |
414 | struct f2fs_bio_info *io; | |
415 | bool ret = false; | |
0c3a5797 | 416 | |
a912b54d JK |
417 | for (temp = HOT; temp < NR_TEMP_TYPE; temp++) { |
418 | io = sbi->write_io[btype] + temp; | |
419 | ||
420 | down_read(&io->io_rwsem); | |
421 | ret = __has_merged_page(io, inode, ino, idx); | |
422 | up_read(&io->io_rwsem); | |
0c3a5797 | 423 | |
a912b54d JK |
424 | /* TODO: use HOT temp only for meta pages now. */ |
425 | if (ret || btype == META) | |
426 | break; | |
427 | } | |
0c3a5797 CY |
428 | return ret; |
429 | } | |
430 | ||
b9109b0e | 431 | static void __f2fs_submit_merged_write(struct f2fs_sb_info *sbi, |
a912b54d | 432 | enum page_type type, enum temp_type temp) |
93dfe2ac JK |
433 | { |
434 | enum page_type btype = PAGE_TYPE_OF_BIO(type); | |
a912b54d | 435 | struct f2fs_bio_info *io = sbi->write_io[btype] + temp; |
93dfe2ac | 436 | |
df0f8dc0 | 437 | down_write(&io->io_rwsem); |
458e6197 JK |
438 | |
439 | /* change META to META_FLUSH in the checkpoint procedure */ | |
440 | if (type >= META_FLUSH) { | |
441 | io->fio.type = META_FLUSH; | |
04d328de | 442 | io->fio.op = REQ_OP_WRITE; |
3adc5fcb | 443 | io->fio.op_flags = REQ_META | REQ_PRIO | REQ_SYNC; |
70fd7614 | 444 | if (!test_opt(sbi, NOBARRIER)) |
7f54f51f | 445 | io->fio.op_flags |= REQ_PREFLUSH | REQ_FUA; |
458e6197 JK |
446 | } |
447 | __submit_merged_bio(io); | |
df0f8dc0 | 448 | up_write(&io->io_rwsem); |
93dfe2ac JK |
449 | } |
450 | ||
a912b54d JK |
451 | static void __submit_merged_write_cond(struct f2fs_sb_info *sbi, |
452 | struct inode *inode, nid_t ino, pgoff_t idx, | |
453 | enum page_type type, bool force) | |
0c3a5797 | 454 | { |
a912b54d JK |
455 | enum temp_type temp; |
456 | ||
457 | if (!force && !has_merged_page(sbi, inode, ino, idx, type)) | |
458 | return; | |
459 | ||
460 | for (temp = HOT; temp < NR_TEMP_TYPE; temp++) { | |
461 | ||
462 | __f2fs_submit_merged_write(sbi, type, temp); | |
463 | ||
464 | /* TODO: use HOT temp only for meta pages now. */ | |
465 | if (type >= META) | |
466 | break; | |
467 | } | |
0c3a5797 CY |
468 | } |
469 | ||
b9109b0e | 470 | void f2fs_submit_merged_write(struct f2fs_sb_info *sbi, enum page_type type) |
0c3a5797 | 471 | { |
a912b54d | 472 | __submit_merged_write_cond(sbi, NULL, 0, 0, type, true); |
0c3a5797 CY |
473 | } |
474 | ||
b9109b0e | 475 | void f2fs_submit_merged_write_cond(struct f2fs_sb_info *sbi, |
942fd319 | 476 | struct inode *inode, nid_t ino, pgoff_t idx, |
b9109b0e | 477 | enum page_type type) |
0c3a5797 | 478 | { |
a912b54d | 479 | __submit_merged_write_cond(sbi, inode, ino, idx, type, false); |
0c3a5797 CY |
480 | } |
481 | ||
b9109b0e | 482 | void f2fs_flush_merged_writes(struct f2fs_sb_info *sbi) |
406657dd | 483 | { |
b9109b0e JK |
484 | f2fs_submit_merged_write(sbi, DATA); |
485 | f2fs_submit_merged_write(sbi, NODE); | |
486 | f2fs_submit_merged_write(sbi, META); | |
406657dd CY |
487 | } |
488 | ||
93dfe2ac JK |
489 | /* |
490 | * Fill the locked page with data located in the block address. | |
771a9a71 | 491 | * A caller needs to unlock the page on failure. |
93dfe2ac | 492 | */ |
05ca3632 | 493 | int f2fs_submit_page_bio(struct f2fs_io_info *fio) |
93dfe2ac | 494 | { |
93dfe2ac | 495 | struct bio *bio; |
0b81d077 JK |
496 | struct page *page = fio->encrypted_page ? |
497 | fio->encrypted_page : fio->page; | |
51cc6215 | 498 | struct inode *inode = fio->page->mapping->host; |
93dfe2ac | 499 | |
ad19d1e7 CY |
500 | if (!f2fs_is_valid_blkaddr(fio->sbi, fio->new_blkaddr, |
501 | __is_meta_io(fio) ? META_GENERIC : DATA_GENERIC)) | |
502 | return -EFAULT; | |
503 | ||
2ace38e0 | 504 | trace_f2fs_submit_page_bio(page, fio); |
05ca3632 | 505 | f2fs_trace_ios(fio, 0); |
93dfe2ac JK |
506 | |
507 | /* Allocate a new bio */ | |
ce767d9a | 508 | bio = __bio_alloc(fio->sbi, fio->new_blkaddr, fio->io_wbc, |
a2a9032a | 509 | 1, is_read_io(fio->op), fio->type, fio->temp); |
93dfe2ac | 510 | |
09cbfeaf | 511 | if (bio_add_page(bio, page, PAGE_SIZE, 0) < PAGE_SIZE) { |
93dfe2ac | 512 | bio_put(bio); |
93dfe2ac JK |
513 | return -EFAULT; |
514 | } | |
c2f22fd2 | 515 | fio->op_flags |= fio->encrypted_page ? REQ_NOENCRYPT : 0; |
04d328de | 516 | bio_set_op_attrs(bio, fio->op, fio->op_flags); |
93dfe2ac | 517 | |
51cc6215 | 518 | if (f2fs_may_encrypt_bio(inode, fio)) |
49e3bbe3 | 519 | fscrypt_set_bio(inode, bio, PG_DUN(inode, fio->page)); |
51cc6215 | 520 | |
d1b3e72d JK |
521 | if (!is_read_io(fio->op)) |
522 | inc_page_count(fio->sbi, WB_DATA_TYPE(fio->page)); | |
2cc5dcf7 CY |
523 | |
524 | __submit_bio(fio->sbi, bio, fio->type); | |
93dfe2ac JK |
525 | return 0; |
526 | } | |
527 | ||
b9109b0e | 528 | int f2fs_submit_page_write(struct f2fs_io_info *fio) |
93dfe2ac | 529 | { |
05ca3632 | 530 | struct f2fs_sb_info *sbi = fio->sbi; |
458e6197 | 531 | enum page_type btype = PAGE_TYPE_OF_BIO(fio->type); |
a912b54d | 532 | struct f2fs_bio_info *io = sbi->write_io[btype] + fio->temp; |
4375a336 | 533 | struct page *bio_page; |
0a595eba | 534 | int err = 0; |
51cc6215 BK |
535 | struct inode *inode; |
536 | bool bio_encrypted; | |
49e3bbe3 | 537 | u64 dun; |
93dfe2ac | 538 | |
b9109b0e | 539 | f2fs_bug_on(sbi, is_read_io(fio->op)); |
93dfe2ac | 540 | |
fb830fc5 CY |
541 | down_write(&io->io_rwsem); |
542 | next: | |
543 | if (fio->in_list) { | |
544 | spin_lock(&io->io_lock); | |
545 | if (list_empty(&io->io_list)) { | |
546 | spin_unlock(&io->io_lock); | |
547 | goto out_fail; | |
548 | } | |
549 | fio = list_first_entry(&io->io_list, | |
550 | struct f2fs_io_info, list); | |
551 | list_del(&fio->list); | |
552 | spin_unlock(&io->io_lock); | |
553 | } | |
93dfe2ac | 554 | |
eea71570 | 555 | if (__is_valid_data_blkaddr(fio->old_blkaddr)) |
a2a9032a JK |
556 | verify_block_addr(fio, fio->old_blkaddr); |
557 | verify_block_addr(fio, fio->new_blkaddr); | |
93dfe2ac | 558 | |
36951b38 | 559 | bio_page = fio->encrypted_page ? fio->encrypted_page : fio->page; |
51cc6215 | 560 | inode = fio->page->mapping->host; |
49e3bbe3 | 561 | dun = PG_DUN(inode, fio->page); |
51cc6215 | 562 | bio_encrypted = f2fs_may_encrypt_bio(inode, fio); |
c2f22fd2 | 563 | fio->op_flags |= fio->encrypted_page ? REQ_NOENCRYPT : 0; |
36951b38 | 564 | |
7fb3f3b2 JK |
565 | /* set submitted = true as a return value */ |
566 | fio->submitted = true; | |
d68f735b | 567 | |
b9109b0e | 568 | inc_page_count(sbi, WB_DATA_TYPE(bio_page)); |
93dfe2ac | 569 | |
7a9d7548 | 570 | if (io->bio && (io->last_block_in_bio != fio->new_blkaddr - 1 || |
3c62be17 JK |
571 | (io->fio.op != fio->op || io->fio.op_flags != fio->op_flags) || |
572 | !__same_bdev(sbi, fio->new_blkaddr, io->bio))) | |
458e6197 | 573 | __submit_merged_bio(io); |
51cc6215 | 574 | |
49e3bbe3 | 575 | if (!f2fs_mergeable_bio(io->bio, dun, fscrypt_get_diskcipher(inode), bio_encrypted)) |
51cc6215 BK |
576 | __submit_merged_bio(io); |
577 | ||
93dfe2ac JK |
578 | alloc_new: |
579 | if (io->bio == NULL) { | |
0a595eba JK |
580 | if ((fio->type == DATA || fio->type == NODE) && |
581 | fio->new_blkaddr & F2FS_IO_SIZE_MASK(sbi)) { | |
582 | err = -EAGAIN; | |
b9109b0e | 583 | dec_page_count(sbi, WB_DATA_TYPE(bio_page)); |
0a595eba JK |
584 | goto out_fail; |
585 | } | |
ce767d9a | 586 | io->bio = __bio_alloc(sbi, fio->new_blkaddr, fio->io_wbc, |
a2a9032a JK |
587 | BIO_MAX_PAGES, false, |
588 | fio->type, fio->temp); | |
51cc6215 | 589 | if (bio_encrypted) |
49e3bbe3 | 590 | fscrypt_set_bio(inode, io->bio, dun); |
51cc6215 | 591 | |
458e6197 | 592 | io->fio = *fio; |
93dfe2ac JK |
593 | } |
594 | ||
a912b54d | 595 | if (bio_add_page(io->bio, bio_page, PAGE_SIZE, 0) < PAGE_SIZE) { |
458e6197 | 596 | __submit_merged_bio(io); |
93dfe2ac JK |
597 | goto alloc_new; |
598 | } | |
599 | ||
ce767d9a JK |
600 | if (fio->io_wbc) |
601 | wbc_account_io(fio->io_wbc, bio_page, PAGE_SIZE); | |
602 | ||
7a9d7548 | 603 | io->last_block_in_bio = fio->new_blkaddr; |
05ca3632 | 604 | f2fs_trace_ios(fio, 0); |
fb830fc5 CY |
605 | |
606 | trace_f2fs_submit_page_write(fio->page, fio); | |
607 | ||
608 | if (fio->in_list) | |
609 | goto next; | |
0a595eba | 610 | out_fail: |
df0f8dc0 | 611 | up_write(&io->io_rwsem); |
0a595eba | 612 | return err; |
93dfe2ac JK |
613 | } |
614 | ||
13ba41e3 JK |
615 | static struct bio *f2fs_grab_read_bio(struct inode *inode, block_t blkaddr, |
616 | unsigned nr_pages) | |
617 | { | |
618 | struct f2fs_sb_info *sbi = F2FS_I_SB(inode); | |
13ba41e3 | 619 | struct bio *bio; |
c6e638ae EB |
620 | struct bio_post_read_ctx *ctx; |
621 | unsigned int post_read_steps = 0; | |
13ba41e3 | 622 | |
38fce19d CY |
623 | if (!f2fs_is_valid_blkaddr(sbi, blkaddr, DATA_GENERIC)) |
624 | return ERR_PTR(-EFAULT); | |
625 | ||
7fb3f3b2 | 626 | bio = f2fs_bio_alloc(sbi, min_t(int, nr_pages, BIO_MAX_PAGES), false); |
c6e638ae | 627 | if (!bio) |
13ba41e3 | 628 | return ERR_PTR(-ENOMEM); |
13ba41e3 JK |
629 | f2fs_target_device(sbi, blkaddr, bio); |
630 | bio->bi_end_io = f2fs_read_end_io; | |
13ba41e3 JK |
631 | bio_set_op_attrs(bio, REQ_OP_READ, 0); |
632 | ||
51cc6215 | 633 | if (f2fs_encrypted_file(inode) && !fscrypt_disk_encrypted(inode)) |
c6e638ae EB |
634 | post_read_steps |= 1 << STEP_DECRYPT; |
635 | if (post_read_steps) { | |
636 | ctx = mempool_alloc(bio_post_read_ctx_pool, GFP_NOFS); | |
637 | if (!ctx) { | |
638 | bio_put(bio); | |
639 | return ERR_PTR(-ENOMEM); | |
640 | } | |
641 | ctx->bio = bio; | |
642 | ctx->enabled_steps = post_read_steps; | |
643 | bio->bi_private = ctx; | |
c2f22fd2 MH |
644 | bio_set_op_attrs(bio, REQ_OP_READ, |
645 | (f2fs_encrypted_inode(inode) ? | |
646 | REQ_NOENCRYPT : | |
647 | 0)); | |
c6e638ae | 648 | |
c6e638ae EB |
649 | } |
650 | ||
13ba41e3 JK |
651 | return bio; |
652 | } | |
653 | ||
654 | /* This can handle encryption stuffs */ | |
655 | static int f2fs_submit_page_read(struct inode *inode, struct page *page, | |
656 | block_t blkaddr) | |
657 | { | |
658 | struct bio *bio = f2fs_grab_read_bio(inode, blkaddr, 1); | |
659 | ||
660 | if (IS_ERR(bio)) | |
661 | return PTR_ERR(bio); | |
662 | ||
f9ef288b JK |
663 | /* wait for GCed page writeback via META_MAPPING */ |
664 | f2fs_wait_on_block_writeback(inode, blkaddr); | |
665 | ||
13ba41e3 JK |
666 | if (bio_add_page(bio, page, PAGE_SIZE, 0) < PAGE_SIZE) { |
667 | bio_put(bio); | |
668 | return -EFAULT; | |
669 | } | |
51cc6215 BK |
670 | |
671 | if (f2fs_may_encrypt_bio(inode, NULL)) | |
49e3bbe3 | 672 | fscrypt_set_bio(inode, bio, PG_DUN(inode, page)); |
51cc6215 | 673 | |
13ba41e3 JK |
674 | __submit_bio(F2FS_I_SB(inode), bio, DATA); |
675 | return 0; | |
676 | } | |
677 | ||
46008c6d CY |
678 | static void __set_data_blkaddr(struct dnode_of_data *dn) |
679 | { | |
680 | struct f2fs_node *rn = F2FS_NODE(dn->node_page); | |
681 | __le32 *addr_array; | |
7a2af766 CY |
682 | int base = 0; |
683 | ||
684 | if (IS_INODE(dn->node_page) && f2fs_has_extra_attr(dn->inode)) | |
685 | base = get_extra_isize(dn->inode); | |
46008c6d CY |
686 | |
687 | /* Get physical address of data block */ | |
688 | addr_array = blkaddr_in_node(rn); | |
7a2af766 | 689 | addr_array[base + dn->ofs_in_node] = cpu_to_le32(dn->data_blkaddr); |
46008c6d CY |
690 | } |
691 | ||
0a8165d7 | 692 | /* |
eb47b800 JK |
693 | * Lock ordering for the change of data block address: |
694 | * ->data_page | |
695 | * ->node_page | |
696 | * update block addresses in the node page | |
697 | */ | |
216a620a | 698 | void set_data_blkaddr(struct dnode_of_data *dn) |
eb47b800 | 699 | { |
46008c6d CY |
700 | f2fs_wait_on_page_writeback(dn->node_page, NODE, true); |
701 | __set_data_blkaddr(dn); | |
702 | if (set_page_dirty(dn->node_page)) | |
12719ae1 | 703 | dn->node_changed = true; |
eb47b800 JK |
704 | } |
705 | ||
f28b3434 CY |
706 | void f2fs_update_data_blkaddr(struct dnode_of_data *dn, block_t blkaddr) |
707 | { | |
708 | dn->data_blkaddr = blkaddr; | |
709 | set_data_blkaddr(dn); | |
710 | f2fs_update_extent_cache(dn); | |
711 | } | |
712 | ||
46008c6d CY |
713 | /* dn->ofs_in_node will be returned with up-to-date last block pointer */ |
714 | int reserve_new_blocks(struct dnode_of_data *dn, blkcnt_t count) | |
eb47b800 | 715 | { |
4081363f | 716 | struct f2fs_sb_info *sbi = F2FS_I_SB(dn->inode); |
0abd675e | 717 | int err; |
eb47b800 | 718 | |
46008c6d CY |
719 | if (!count) |
720 | return 0; | |
721 | ||
91942321 | 722 | if (unlikely(is_inode_flag_set(dn->inode, FI_NO_ALLOC))) |
eb47b800 | 723 | return -EPERM; |
0abd675e CY |
724 | if (unlikely((err = inc_valid_block_count(sbi, dn->inode, &count)))) |
725 | return err; | |
eb47b800 | 726 | |
46008c6d CY |
727 | trace_f2fs_reserve_new_blocks(dn->inode, dn->nid, |
728 | dn->ofs_in_node, count); | |
729 | ||
730 | f2fs_wait_on_page_writeback(dn->node_page, NODE, true); | |
731 | ||
732 | for (; count > 0; dn->ofs_in_node++) { | |
7a2af766 CY |
733 | block_t blkaddr = datablock_addr(dn->inode, |
734 | dn->node_page, dn->ofs_in_node); | |
46008c6d CY |
735 | if (blkaddr == NULL_ADDR) { |
736 | dn->data_blkaddr = NEW_ADDR; | |
737 | __set_data_blkaddr(dn); | |
738 | count--; | |
739 | } | |
740 | } | |
741 | ||
742 | if (set_page_dirty(dn->node_page)) | |
743 | dn->node_changed = true; | |
eb47b800 JK |
744 | return 0; |
745 | } | |
746 | ||
46008c6d CY |
747 | /* Should keep dn->ofs_in_node unchanged */ |
748 | int reserve_new_block(struct dnode_of_data *dn) | |
749 | { | |
750 | unsigned int ofs_in_node = dn->ofs_in_node; | |
751 | int ret; | |
752 | ||
753 | ret = reserve_new_blocks(dn, 1); | |
754 | dn->ofs_in_node = ofs_in_node; | |
755 | return ret; | |
756 | } | |
757 | ||
b600965c HL |
758 | int f2fs_reserve_block(struct dnode_of_data *dn, pgoff_t index) |
759 | { | |
760 | bool need_put = dn->inode_page ? false : true; | |
761 | int err; | |
762 | ||
763 | err = get_dnode_of_data(dn, index, ALLOC_NODE); | |
764 | if (err) | |
765 | return err; | |
a8865372 | 766 | |
b600965c HL |
767 | if (dn->data_blkaddr == NULL_ADDR) |
768 | err = reserve_new_block(dn); | |
a8865372 | 769 | if (err || need_put) |
b600965c HL |
770 | f2fs_put_dnode(dn); |
771 | return err; | |
772 | } | |
773 | ||
759af1c9 | 774 | int f2fs_get_block(struct dnode_of_data *dn, pgoff_t index) |
eb47b800 | 775 | { |
e15882b6 | 776 | struct extent_info ei = {0,0,0}; |
759af1c9 | 777 | struct inode *inode = dn->inode; |
028a41e8 | 778 | |
759af1c9 FL |
779 | if (f2fs_lookup_extent_cache(inode, index, &ei)) { |
780 | dn->data_blkaddr = ei.blk + index - ei.fofs; | |
781 | return 0; | |
429511cd | 782 | } |
028a41e8 | 783 | |
759af1c9 | 784 | return f2fs_reserve_block(dn, index); |
eb47b800 JK |
785 | } |
786 | ||
a56c7c6f | 787 | struct page *get_read_data_page(struct inode *inode, pgoff_t index, |
04d328de | 788 | int op_flags, bool for_write) |
eb47b800 | 789 | { |
eb47b800 JK |
790 | struct address_space *mapping = inode->i_mapping; |
791 | struct dnode_of_data dn; | |
792 | struct page *page; | |
e15882b6 | 793 | struct extent_info ei = {0,0,0}; |
eb47b800 | 794 | int err; |
4375a336 | 795 | |
a56c7c6f | 796 | page = f2fs_grab_cache_page(mapping, index, for_write); |
650495de JK |
797 | if (!page) |
798 | return ERR_PTR(-ENOMEM); | |
799 | ||
cb3bc9ee CY |
800 | if (f2fs_lookup_extent_cache(inode, index, &ei)) { |
801 | dn.data_blkaddr = ei.blk + index - ei.fofs; | |
802 | goto got_it; | |
803 | } | |
804 | ||
eb47b800 | 805 | set_new_dnode(&dn, inode, NULL, NULL, 0); |
266e97a8 | 806 | err = get_dnode_of_data(&dn, index, LOOKUP_NODE); |
86531d6b JK |
807 | if (err) |
808 | goto put_err; | |
eb47b800 JK |
809 | f2fs_put_dnode(&dn); |
810 | ||
6bacf52f | 811 | if (unlikely(dn.data_blkaddr == NULL_ADDR)) { |
86531d6b JK |
812 | err = -ENOENT; |
813 | goto put_err; | |
650495de | 814 | } |
cb3bc9ee | 815 | got_it: |
43f3eae1 JK |
816 | if (PageUptodate(page)) { |
817 | unlock_page(page); | |
eb47b800 | 818 | return page; |
43f3eae1 | 819 | } |
eb47b800 | 820 | |
d59ff4df JK |
821 | /* |
822 | * A new dentry page is allocated but not able to be written, since its | |
823 | * new inode page couldn't be allocated due to -ENOSPC. | |
824 | * In such the case, its blkaddr can be remained as NEW_ADDR. | |
825 | * see, f2fs_add_link -> get_new_data_page -> init_inode_metadata. | |
826 | */ | |
827 | if (dn.data_blkaddr == NEW_ADDR) { | |
09cbfeaf | 828 | zero_user_segment(page, 0, PAGE_SIZE); |
237c0790 JK |
829 | if (!PageUptodate(page)) |
830 | SetPageUptodate(page); | |
43f3eae1 | 831 | unlock_page(page); |
d59ff4df JK |
832 | return page; |
833 | } | |
eb47b800 | 834 | |
13ba41e3 | 835 | err = f2fs_submit_page_read(inode, page, dn.data_blkaddr); |
393ff91f | 836 | if (err) |
86531d6b | 837 | goto put_err; |
43f3eae1 | 838 | return page; |
86531d6b JK |
839 | |
840 | put_err: | |
841 | f2fs_put_page(page, 1); | |
842 | return ERR_PTR(err); | |
43f3eae1 JK |
843 | } |
844 | ||
845 | struct page *find_data_page(struct inode *inode, pgoff_t index) | |
846 | { | |
847 | struct address_space *mapping = inode->i_mapping; | |
848 | struct page *page; | |
849 | ||
850 | page = find_get_page(mapping, index); | |
851 | if (page && PageUptodate(page)) | |
852 | return page; | |
853 | f2fs_put_page(page, 0); | |
854 | ||
70fd7614 | 855 | page = get_read_data_page(inode, index, 0, false); |
43f3eae1 JK |
856 | if (IS_ERR(page)) |
857 | return page; | |
858 | ||
859 | if (PageUptodate(page)) | |
860 | return page; | |
861 | ||
862 | wait_on_page_locked(page); | |
863 | if (unlikely(!PageUptodate(page))) { | |
864 | f2fs_put_page(page, 0); | |
865 | return ERR_PTR(-EIO); | |
866 | } | |
867 | return page; | |
868 | } | |
869 | ||
870 | /* | |
871 | * If it tries to access a hole, return an error. | |
872 | * Because, the callers, functions in dir.c and GC, should be able to know | |
873 | * whether this page exists or not. | |
874 | */ | |
a56c7c6f JK |
875 | struct page *get_lock_data_page(struct inode *inode, pgoff_t index, |
876 | bool for_write) | |
43f3eae1 JK |
877 | { |
878 | struct address_space *mapping = inode->i_mapping; | |
879 | struct page *page; | |
880 | repeat: | |
70fd7614 | 881 | page = get_read_data_page(inode, index, 0, for_write); |
43f3eae1 JK |
882 | if (IS_ERR(page)) |
883 | return page; | |
393ff91f | 884 | |
43f3eae1 | 885 | /* wait for read completion */ |
393ff91f | 886 | lock_page(page); |
6bacf52f | 887 | if (unlikely(page->mapping != mapping)) { |
afcb7ca0 JK |
888 | f2fs_put_page(page, 1); |
889 | goto repeat; | |
eb47b800 | 890 | } |
1563ac75 CY |
891 | if (unlikely(!PageUptodate(page))) { |
892 | f2fs_put_page(page, 1); | |
893 | return ERR_PTR(-EIO); | |
894 | } | |
eb47b800 JK |
895 | return page; |
896 | } | |
897 | ||
0a8165d7 | 898 | /* |
eb47b800 JK |
899 | * Caller ensures that this data page is never allocated. |
900 | * A new zero-filled data page is allocated in the page cache. | |
39936837 | 901 | * |
4f4124d0 CY |
902 | * Also, caller should grab and release a rwsem by calling f2fs_lock_op() and |
903 | * f2fs_unlock_op(). | |
470f00e9 CY |
904 | * Note that, ipage is set only by make_empty_dir, and if any error occur, |
905 | * ipage should be released by this function. | |
eb47b800 | 906 | */ |
64aa7ed9 | 907 | struct page *get_new_data_page(struct inode *inode, |
a8865372 | 908 | struct page *ipage, pgoff_t index, bool new_i_size) |
eb47b800 | 909 | { |
eb47b800 JK |
910 | struct address_space *mapping = inode->i_mapping; |
911 | struct page *page; | |
912 | struct dnode_of_data dn; | |
913 | int err; | |
7612118a | 914 | |
a56c7c6f | 915 | page = f2fs_grab_cache_page(mapping, index, true); |
470f00e9 CY |
916 | if (!page) { |
917 | /* | |
918 | * before exiting, we should make sure ipage will be released | |
919 | * if any error occur. | |
920 | */ | |
921 | f2fs_put_page(ipage, 1); | |
01f28610 | 922 | return ERR_PTR(-ENOMEM); |
470f00e9 | 923 | } |
eb47b800 | 924 | |
a8865372 | 925 | set_new_dnode(&dn, inode, ipage, NULL, 0); |
b600965c | 926 | err = f2fs_reserve_block(&dn, index); |
01f28610 JK |
927 | if (err) { |
928 | f2fs_put_page(page, 1); | |
eb47b800 | 929 | return ERR_PTR(err); |
a8865372 | 930 | } |
01f28610 JK |
931 | if (!ipage) |
932 | f2fs_put_dnode(&dn); | |
eb47b800 JK |
933 | |
934 | if (PageUptodate(page)) | |
01f28610 | 935 | goto got_it; |
eb47b800 JK |
936 | |
937 | if (dn.data_blkaddr == NEW_ADDR) { | |
09cbfeaf | 938 | zero_user_segment(page, 0, PAGE_SIZE); |
237c0790 JK |
939 | if (!PageUptodate(page)) |
940 | SetPageUptodate(page); | |
eb47b800 | 941 | } else { |
4375a336 | 942 | f2fs_put_page(page, 1); |
a8865372 | 943 | |
7612118a JK |
944 | /* if ipage exists, blkaddr should be NEW_ADDR */ |
945 | f2fs_bug_on(F2FS_I_SB(inode), ipage); | |
946 | page = get_lock_data_page(inode, index, true); | |
4375a336 | 947 | if (IS_ERR(page)) |
7612118a | 948 | return page; |
eb47b800 | 949 | } |
01f28610 | 950 | got_it: |
9edcdabf | 951 | if (new_i_size && i_size_read(inode) < |
ee6d182f | 952 | ((loff_t)(index + 1) << PAGE_SHIFT)) |
fc9581c8 | 953 | f2fs_i_size_write(inode, ((loff_t)(index + 1) << PAGE_SHIFT)); |
eb47b800 JK |
954 | return page; |
955 | } | |
956 | ||
ce767d9a | 957 | static int __allocate_data_block(struct dnode_of_data *dn, int seg_type) |
bfad7c2d | 958 | { |
4081363f | 959 | struct f2fs_sb_info *sbi = F2FS_I_SB(dn->inode); |
bfad7c2d | 960 | struct f2fs_summary sum; |
bfad7c2d | 961 | struct node_info ni; |
976e4c50 | 962 | pgoff_t fofs; |
46008c6d | 963 | blkcnt_t count = 1; |
0abd675e | 964 | int err; |
bfad7c2d | 965 | |
91942321 | 966 | if (unlikely(is_inode_flag_set(dn->inode, FI_NO_ALLOC))) |
bfad7c2d | 967 | return -EPERM; |
df6136ef | 968 | |
7a2af766 CY |
969 | dn->data_blkaddr = datablock_addr(dn->inode, |
970 | dn->node_page, dn->ofs_in_node); | |
df6136ef CY |
971 | if (dn->data_blkaddr == NEW_ADDR) |
972 | goto alloc; | |
973 | ||
0abd675e CY |
974 | if (unlikely((err = inc_valid_block_count(sbi, dn->inode, &count)))) |
975 | return err; | |
bfad7c2d | 976 | |
df6136ef | 977 | alloc: |
bfad7c2d JK |
978 | get_node_info(sbi, dn->nid, &ni); |
979 | set_summary(&sum, dn->nid, dn->ofs_in_node, ni.version); | |
980 | ||
df6136ef | 981 | allocate_data_block(sbi, NULL, dn->data_blkaddr, &dn->data_blkaddr, |
ce767d9a | 982 | &sum, seg_type, NULL, false); |
216a620a | 983 | set_data_blkaddr(dn); |
bfad7c2d | 984 | |
976e4c50 | 985 | /* update i_size */ |
81ca7350 | 986 | fofs = start_bidx_of_node(ofs_of_node(dn->node_page), dn->inode) + |
976e4c50 | 987 | dn->ofs_in_node; |
09cbfeaf | 988 | if (i_size_read(dn->inode) < ((loff_t)(fofs + 1) << PAGE_SHIFT)) |
fc9581c8 | 989 | f2fs_i_size_write(dn->inode, |
09cbfeaf | 990 | ((loff_t)(fofs + 1) << PAGE_SHIFT)); |
bfad7c2d JK |
991 | return 0; |
992 | } | |
993 | ||
a7de6086 | 994 | int f2fs_preallocate_blocks(struct kiocb *iocb, struct iov_iter *from) |
59b802e5 | 995 | { |
b439b103 | 996 | struct inode *inode = file_inode(iocb->ki_filp); |
5b8db7fa | 997 | struct f2fs_map_blocks map; |
ce767d9a | 998 | int flag; |
a7de6086 | 999 | int err = 0; |
ce767d9a | 1000 | bool direct_io = iocb->ki_flags & IOCB_DIRECT; |
59b802e5 | 1001 | |
7fb3f3b2 | 1002 | /* convert inline data for Direct I/O*/ |
ce767d9a | 1003 | if (direct_io) { |
7fb3f3b2 JK |
1004 | err = f2fs_convert_inline_inode(inode); |
1005 | if (err) | |
1006 | return err; | |
1007 | } | |
1008 | ||
dc91de78 JK |
1009 | if (is_inode_flag_set(inode, FI_NO_PREALLOC)) |
1010 | return 0; | |
1011 | ||
0080c507 | 1012 | map.m_lblk = F2FS_BLK_ALIGN(iocb->ki_pos); |
dfd02e4d CY |
1013 | map.m_len = F2FS_BYTES_TO_BLK(iocb->ki_pos + iov_iter_count(from)); |
1014 | if (map.m_len > map.m_lblk) | |
1015 | map.m_len -= map.m_lblk; | |
1016 | else | |
1017 | map.m_len = 0; | |
1018 | ||
da85985c | 1019 | map.m_next_pgofs = NULL; |
ce767d9a JK |
1020 | map.m_next_extent = NULL; |
1021 | map.m_seg_type = NO_CHECK_TYPE; | |
2a340760 | 1022 | |
ce767d9a JK |
1023 | if (direct_io) { |
1024 | map.m_seg_type = rw_hint_to_seg_type(iocb->ki_hint); | |
a2a9032a | 1025 | flag = f2fs_force_buffered_io(inode, WRITE) ? |
ce767d9a JK |
1026 | F2FS_GET_BLOCK_PRE_AIO : |
1027 | F2FS_GET_BLOCK_PRE_DIO; | |
1028 | goto map_blocks; | |
1029 | } | |
f2470371 | 1030 | if (iocb->ki_pos + iov_iter_count(from) > MAX_INLINE_DATA(inode)) { |
a7de6086 JK |
1031 | err = f2fs_convert_inline_inode(inode); |
1032 | if (err) | |
1033 | return err; | |
b439b103 | 1034 | } |
ce767d9a JK |
1035 | if (f2fs_has_inline_data(inode)) |
1036 | return err; | |
1037 | ||
1038 | flag = F2FS_GET_BLOCK_PRE_AIO; | |
1039 | ||
1040 | map_blocks: | |
1041 | err = f2fs_map_blocks(inode, &map, 1, flag); | |
1042 | if (map.m_len > 0 && err == -ENOSPC) { | |
1043 | if (!direct_io) | |
1044 | set_inode_flag(inode, FI_NO_PREALLOC); | |
1045 | err = 0; | |
1046 | } | |
a7de6086 | 1047 | return err; |
59b802e5 JK |
1048 | } |
1049 | ||
59c9081b YH |
1050 | static inline void __do_map_lock(struct f2fs_sb_info *sbi, int flag, bool lock) |
1051 | { | |
1052 | if (flag == F2FS_GET_BLOCK_PRE_AIO) { | |
1053 | if (lock) | |
1054 | down_read(&sbi->node_change); | |
1055 | else | |
1056 | up_read(&sbi->node_change); | |
1057 | } else { | |
1058 | if (lock) | |
1059 | f2fs_lock_op(sbi); | |
1060 | else | |
1061 | f2fs_unlock_op(sbi); | |
1062 | } | |
1063 | } | |
1064 | ||
0a8165d7 | 1065 | /* |
003a3e1d JK |
1066 | * f2fs_map_blocks() now supported readahead/bmap/rw direct_IO with |
1067 | * f2fs_map_blocks structure. | |
4f4124d0 CY |
1068 | * If original data blocks are allocated, then give them to blockdev. |
1069 | * Otherwise, | |
1070 | * a. preallocate requested block addresses | |
1071 | * b. do not use extent cache for better performance | |
1072 | * c. give the block addresses to blockdev | |
eb47b800 | 1073 | */ |
d323d005 | 1074 | int f2fs_map_blocks(struct inode *inode, struct f2fs_map_blocks *map, |
e2b4e2bc | 1075 | int create, int flag) |
eb47b800 | 1076 | { |
003a3e1d | 1077 | unsigned int maxblocks = map->m_len; |
eb47b800 | 1078 | struct dnode_of_data dn; |
f9811703 | 1079 | struct f2fs_sb_info *sbi = F2FS_I_SB(inode); |
ac6f1999 | 1080 | int mode = create ? ALLOC_NODE : LOOKUP_NODE; |
46008c6d | 1081 | pgoff_t pgofs, end_offset, end; |
bfad7c2d | 1082 | int err = 0, ofs = 1; |
46008c6d CY |
1083 | unsigned int ofs_in_node, last_ofs_in_node; |
1084 | blkcnt_t prealloc; | |
e15882b6 | 1085 | struct extent_info ei = {0,0,0}; |
7df3a431 | 1086 | block_t blkaddr; |
ce767d9a | 1087 | unsigned int start_pgofs; |
eb47b800 | 1088 | |
dfd02e4d CY |
1089 | if (!maxblocks) |
1090 | return 0; | |
1091 | ||
003a3e1d JK |
1092 | map->m_len = 0; |
1093 | map->m_flags = 0; | |
1094 | ||
1095 | /* it only supports block size == page size */ | |
1096 | pgofs = (pgoff_t)map->m_lblk; | |
46008c6d | 1097 | end = pgofs + maxblocks; |
eb47b800 | 1098 | |
24b84912 | 1099 | if (!create && f2fs_lookup_extent_cache(inode, pgofs, &ei)) { |
003a3e1d JK |
1100 | map->m_pblk = ei.blk + pgofs - ei.fofs; |
1101 | map->m_len = min((pgoff_t)maxblocks, ei.fofs + ei.len - pgofs); | |
1102 | map->m_flags = F2FS_MAP_MAPPED; | |
ce767d9a JK |
1103 | if (map->m_next_extent) |
1104 | *map->m_next_extent = pgofs + map->m_len; | |
bfad7c2d | 1105 | goto out; |
a2e7d1bf | 1106 | } |
bfad7c2d | 1107 | |
4fe71e88 | 1108 | next_dnode: |
59b802e5 | 1109 | if (create) |
59c9081b | 1110 | __do_map_lock(sbi, flag, true); |
eb47b800 JK |
1111 | |
1112 | /* When reading holes, we need its node page */ | |
1113 | set_new_dnode(&dn, inode, NULL, NULL, 0); | |
bfad7c2d | 1114 | err = get_dnode_of_data(&dn, pgofs, mode); |
1ec79083 | 1115 | if (err) { |
43473f96 CY |
1116 | if (flag == F2FS_GET_BLOCK_BMAP) |
1117 | map->m_pblk = 0; | |
da85985c | 1118 | if (err == -ENOENT) { |
bfad7c2d | 1119 | err = 0; |
da85985c CY |
1120 | if (map->m_next_pgofs) |
1121 | *map->m_next_pgofs = | |
1122 | get_next_page_offset(&dn, pgofs); | |
ce767d9a JK |
1123 | if (map->m_next_extent) |
1124 | *map->m_next_extent = | |
1125 | get_next_page_offset(&dn, pgofs); | |
da85985c | 1126 | } |
bfad7c2d | 1127 | goto unlock_out; |
848753aa | 1128 | } |
973163fc | 1129 | |
ce767d9a | 1130 | start_pgofs = pgofs; |
46008c6d | 1131 | prealloc = 0; |
230436b3 | 1132 | last_ofs_in_node = ofs_in_node = dn.ofs_in_node; |
81ca7350 | 1133 | end_offset = ADDRS_PER_PAGE(dn.node_page, inode); |
4fe71e88 CY |
1134 | |
1135 | next_block: | |
7a2af766 | 1136 | blkaddr = datablock_addr(dn.inode, dn.node_page, dn.ofs_in_node); |
4fe71e88 | 1137 | |
ad19d1e7 CY |
1138 | if (__is_valid_data_blkaddr(blkaddr) && |
1139 | !f2fs_is_valid_blkaddr(sbi, blkaddr, DATA_GENERIC)) { | |
1140 | err = -EFAULT; | |
1141 | goto sync_out; | |
1142 | } | |
1143 | ||
eea71570 | 1144 | if (!is_valid_data_blkaddr(sbi, blkaddr)) { |
973163fc | 1145 | if (create) { |
f9811703 CY |
1146 | if (unlikely(f2fs_cp_error(sbi))) { |
1147 | err = -EIO; | |
4fe71e88 | 1148 | goto sync_out; |
f9811703 | 1149 | } |
24b84912 | 1150 | if (flag == F2FS_GET_BLOCK_PRE_AIO) { |
46008c6d CY |
1151 | if (blkaddr == NULL_ADDR) { |
1152 | prealloc++; | |
1153 | last_ofs_in_node = dn.ofs_in_node; | |
1154 | } | |
24b84912 | 1155 | } else { |
ce767d9a JK |
1156 | err = __allocate_data_block(&dn, |
1157 | map->m_seg_type); | |
6f2d8ed6 | 1158 | if (!err) |
91942321 | 1159 | set_inode_flag(inode, FI_APPEND_WRITE); |
24b84912 | 1160 | } |
973163fc | 1161 | if (err) |
4fe71e88 | 1162 | goto sync_out; |
3f2be043 | 1163 | map->m_flags |= F2FS_MAP_NEW; |
4fe71e88 | 1164 | blkaddr = dn.data_blkaddr; |
973163fc | 1165 | } else { |
43473f96 CY |
1166 | if (flag == F2FS_GET_BLOCK_BMAP) { |
1167 | map->m_pblk = 0; | |
1168 | goto sync_out; | |
1169 | } | |
ce767d9a JK |
1170 | if (flag == F2FS_GET_BLOCK_PRECACHE) |
1171 | goto sync_out; | |
da85985c CY |
1172 | if (flag == F2FS_GET_BLOCK_FIEMAP && |
1173 | blkaddr == NULL_ADDR) { | |
1174 | if (map->m_next_pgofs) | |
1175 | *map->m_next_pgofs = pgofs + 1; | |
ce767d9a | 1176 | goto sync_out; |
da85985c | 1177 | } |
ce767d9a JK |
1178 | if (flag != F2FS_GET_BLOCK_FIEMAP) { |
1179 | /* for defragment case */ | |
1180 | if (map->m_next_pgofs) | |
1181 | *map->m_next_pgofs = pgofs + 1; | |
4fe71e88 | 1182 | goto sync_out; |
ce767d9a | 1183 | } |
e2b4e2bc | 1184 | } |
e2b4e2bc | 1185 | } |
eb47b800 | 1186 | |
46008c6d CY |
1187 | if (flag == F2FS_GET_BLOCK_PRE_AIO) |
1188 | goto skip; | |
1189 | ||
4fe71e88 CY |
1190 | if (map->m_len == 0) { |
1191 | /* preallocated unwritten block should be mapped for fiemap. */ | |
1192 | if (blkaddr == NEW_ADDR) | |
1193 | map->m_flags |= F2FS_MAP_UNWRITTEN; | |
1194 | map->m_flags |= F2FS_MAP_MAPPED; | |
1195 | ||
1196 | map->m_pblk = blkaddr; | |
1197 | map->m_len = 1; | |
1198 | } else if ((map->m_pblk != NEW_ADDR && | |
1199 | blkaddr == (map->m_pblk + ofs)) || | |
b439b103 | 1200 | (map->m_pblk == NEW_ADDR && blkaddr == NEW_ADDR) || |
46008c6d | 1201 | flag == F2FS_GET_BLOCK_PRE_DIO) { |
4fe71e88 CY |
1202 | ofs++; |
1203 | map->m_len++; | |
1204 | } else { | |
1205 | goto sync_out; | |
1206 | } | |
bfad7c2d | 1207 | |
46008c6d | 1208 | skip: |
bfad7c2d JK |
1209 | dn.ofs_in_node++; |
1210 | pgofs++; | |
1211 | ||
46008c6d CY |
1212 | /* preallocate blocks in batch for one dnode page */ |
1213 | if (flag == F2FS_GET_BLOCK_PRE_AIO && | |
1214 | (pgofs == end || dn.ofs_in_node == end_offset)) { | |
7df3a431 | 1215 | |
46008c6d CY |
1216 | dn.ofs_in_node = ofs_in_node; |
1217 | err = reserve_new_blocks(&dn, prealloc); | |
1218 | if (err) | |
1219 | goto sync_out; | |
bfad7c2d | 1220 | |
46008c6d CY |
1221 | map->m_len += dn.ofs_in_node - ofs_in_node; |
1222 | if (prealloc && dn.ofs_in_node != last_ofs_in_node + 1) { | |
1223 | err = -ENOSPC; | |
1224 | goto sync_out; | |
3104af35 | 1225 | } |
46008c6d CY |
1226 | dn.ofs_in_node = end_offset; |
1227 | } | |
1228 | ||
1229 | if (pgofs >= end) | |
1230 | goto sync_out; | |
1231 | else if (dn.ofs_in_node < end_offset) | |
1232 | goto next_block; | |
1233 | ||
ce767d9a JK |
1234 | if (flag == F2FS_GET_BLOCK_PRECACHE) { |
1235 | if (map->m_flags & F2FS_MAP_MAPPED) { | |
1236 | unsigned int ofs = start_pgofs - map->m_lblk; | |
1237 | ||
1238 | f2fs_update_extent_cache_range(&dn, | |
1239 | start_pgofs, map->m_pblk + ofs, | |
1240 | map->m_len - ofs); | |
1241 | } | |
1242 | } | |
1243 | ||
46008c6d CY |
1244 | f2fs_put_dnode(&dn); |
1245 | ||
1246 | if (create) { | |
59c9081b | 1247 | __do_map_lock(sbi, flag, false); |
6f2d8ed6 | 1248 | f2fs_balance_fs(sbi, dn.node_changed); |
eb47b800 | 1249 | } |
46008c6d | 1250 | goto next_dnode; |
7df3a431 | 1251 | |
bfad7c2d | 1252 | sync_out: |
ce767d9a JK |
1253 | if (flag == F2FS_GET_BLOCK_PRECACHE) { |
1254 | if (map->m_flags & F2FS_MAP_MAPPED) { | |
1255 | unsigned int ofs = start_pgofs - map->m_lblk; | |
1256 | ||
1257 | f2fs_update_extent_cache_range(&dn, | |
1258 | start_pgofs, map->m_pblk + ofs, | |
1259 | map->m_len - ofs); | |
1260 | } | |
1261 | if (map->m_next_extent) | |
1262 | *map->m_next_extent = pgofs + 1; | |
1263 | } | |
eb47b800 | 1264 | f2fs_put_dnode(&dn); |
bfad7c2d | 1265 | unlock_out: |
2a340760 | 1266 | if (create) { |
59c9081b | 1267 | __do_map_lock(sbi, flag, false); |
6f2d8ed6 | 1268 | f2fs_balance_fs(sbi, dn.node_changed); |
2a340760 | 1269 | } |
bfad7c2d | 1270 | out: |
003a3e1d | 1271 | trace_f2fs_map_blocks(inode, map, err); |
bfad7c2d | 1272 | return err; |
eb47b800 JK |
1273 | } |
1274 | ||
a2a9032a JK |
1275 | bool f2fs_overwrite_io(struct inode *inode, loff_t pos, size_t len) |
1276 | { | |
1277 | struct f2fs_map_blocks map; | |
1278 | block_t last_lblk; | |
1279 | int err; | |
1280 | ||
1281 | if (pos + len > i_size_read(inode)) | |
1282 | return false; | |
1283 | ||
1284 | map.m_lblk = F2FS_BYTES_TO_BLK(pos); | |
1285 | map.m_next_pgofs = NULL; | |
1286 | map.m_next_extent = NULL; | |
1287 | map.m_seg_type = NO_CHECK_TYPE; | |
1288 | last_lblk = F2FS_BLK_ALIGN(pos + len); | |
1289 | ||
1290 | while (map.m_lblk < last_lblk) { | |
1291 | map.m_len = last_lblk - map.m_lblk; | |
1292 | err = f2fs_map_blocks(inode, &map, 0, F2FS_GET_BLOCK_DEFAULT); | |
1293 | if (err || map.m_len == 0) | |
1294 | return false; | |
1295 | map.m_lblk += map.m_len; | |
1296 | } | |
1297 | return true; | |
1298 | } | |
1299 | ||
003a3e1d | 1300 | static int __get_data_block(struct inode *inode, sector_t iblock, |
da85985c | 1301 | struct buffer_head *bh, int create, int flag, |
ce767d9a | 1302 | pgoff_t *next_pgofs, int seg_type) |
003a3e1d JK |
1303 | { |
1304 | struct f2fs_map_blocks map; | |
a7de6086 | 1305 | int err; |
003a3e1d JK |
1306 | |
1307 | map.m_lblk = iblock; | |
1308 | map.m_len = bh->b_size >> inode->i_blkbits; | |
da85985c | 1309 | map.m_next_pgofs = next_pgofs; |
ce767d9a JK |
1310 | map.m_next_extent = NULL; |
1311 | map.m_seg_type = seg_type; | |
003a3e1d | 1312 | |
a7de6086 JK |
1313 | err = f2fs_map_blocks(inode, &map, create, flag); |
1314 | if (!err) { | |
003a3e1d JK |
1315 | map_bh(bh, inode->i_sb, map.m_pblk); |
1316 | bh->b_state = (bh->b_state & ~F2FS_MAP_FLAGS) | map.m_flags; | |
b86e3307 | 1317 | bh->b_size = (u64)map.m_len << inode->i_blkbits; |
003a3e1d | 1318 | } |
a7de6086 | 1319 | return err; |
003a3e1d JK |
1320 | } |
1321 | ||
ccfb3000 | 1322 | static int get_data_block(struct inode *inode, sector_t iblock, |
da85985c CY |
1323 | struct buffer_head *bh_result, int create, int flag, |
1324 | pgoff_t *next_pgofs) | |
e2b4e2bc | 1325 | { |
da85985c | 1326 | return __get_data_block(inode, iblock, bh_result, create, |
ce767d9a JK |
1327 | flag, next_pgofs, |
1328 | NO_CHECK_TYPE); | |
e2b4e2bc CY |
1329 | } |
1330 | ||
1331 | static int get_data_block_dio(struct inode *inode, sector_t iblock, | |
ccfb3000 JK |
1332 | struct buffer_head *bh_result, int create) |
1333 | { | |
e2b4e2bc | 1334 | return __get_data_block(inode, iblock, bh_result, create, |
ce767d9a JK |
1335 | F2FS_GET_BLOCK_DEFAULT, NULL, |
1336 | rw_hint_to_seg_type( | |
1337 | inode->i_write_hint)); | |
ccfb3000 JK |
1338 | } |
1339 | ||
e2b4e2bc | 1340 | static int get_data_block_bmap(struct inode *inode, sector_t iblock, |
ccfb3000 JK |
1341 | struct buffer_head *bh_result, int create) |
1342 | { | |
179448bf | 1343 | /* Block number less than F2FS MAX BLOCKS */ |
e0afc4d6 | 1344 | if (unlikely(iblock >= F2FS_I_SB(inode)->max_file_blocks)) |
179448bf YH |
1345 | return -EFBIG; |
1346 | ||
e2b4e2bc | 1347 | return __get_data_block(inode, iblock, bh_result, create, |
ce767d9a JK |
1348 | F2FS_GET_BLOCK_BMAP, NULL, |
1349 | NO_CHECK_TYPE); | |
ccfb3000 JK |
1350 | } |
1351 | ||
7f63eb77 JK |
1352 | static inline sector_t logical_to_blk(struct inode *inode, loff_t offset) |
1353 | { | |
1354 | return (offset >> inode->i_blkbits); | |
1355 | } | |
1356 | ||
1357 | static inline loff_t blk_to_logical(struct inode *inode, sector_t blk) | |
1358 | { | |
1359 | return (blk << inode->i_blkbits); | |
1360 | } | |
1361 | ||
ce767d9a JK |
1362 | static int f2fs_xattr_fiemap(struct inode *inode, |
1363 | struct fiemap_extent_info *fieinfo) | |
1364 | { | |
1365 | struct f2fs_sb_info *sbi = F2FS_I_SB(inode); | |
1366 | struct page *page; | |
1367 | struct node_info ni; | |
1368 | __u64 phys = 0, len; | |
1369 | __u32 flags; | |
1370 | nid_t xnid = F2FS_I(inode)->i_xattr_nid; | |
1371 | int err = 0; | |
1372 | ||
1373 | if (f2fs_has_inline_xattr(inode)) { | |
1374 | int offset; | |
1375 | ||
1376 | page = f2fs_grab_cache_page(NODE_MAPPING(sbi), | |
1377 | inode->i_ino, false); | |
1378 | if (!page) | |
1379 | return -ENOMEM; | |
1380 | ||
1381 | get_node_info(sbi, inode->i_ino, &ni); | |
1382 | ||
1383 | phys = (__u64)blk_to_logical(inode, ni.blk_addr); | |
1384 | offset = offsetof(struct f2fs_inode, i_addr) + | |
1385 | sizeof(__le32) * (DEF_ADDRS_PER_INODE - | |
1386 | get_inline_xattr_addrs(inode)); | |
1387 | ||
1388 | phys += offset; | |
1389 | len = inline_xattr_size(inode); | |
1390 | ||
1391 | f2fs_put_page(page, 1); | |
1392 | ||
1393 | flags = FIEMAP_EXTENT_DATA_INLINE | FIEMAP_EXTENT_NOT_ALIGNED; | |
1394 | ||
1395 | if (!xnid) | |
1396 | flags |= FIEMAP_EXTENT_LAST; | |
1397 | ||
1398 | err = fiemap_fill_next_extent(fieinfo, 0, phys, len, flags); | |
1399 | if (err || err == 1) | |
1400 | return err; | |
1401 | } | |
1402 | ||
1403 | if (xnid) { | |
1404 | page = f2fs_grab_cache_page(NODE_MAPPING(sbi), xnid, false); | |
1405 | if (!page) | |
1406 | return -ENOMEM; | |
1407 | ||
1408 | get_node_info(sbi, xnid, &ni); | |
1409 | ||
1410 | phys = (__u64)blk_to_logical(inode, ni.blk_addr); | |
1411 | len = inode->i_sb->s_blocksize; | |
1412 | ||
1413 | f2fs_put_page(page, 1); | |
1414 | ||
1415 | flags = FIEMAP_EXTENT_LAST; | |
1416 | } | |
1417 | ||
1418 | if (phys) | |
1419 | err = fiemap_fill_next_extent(fieinfo, 0, phys, len, flags); | |
1420 | ||
1421 | return (err < 0 ? err : 0); | |
1422 | } | |
1423 | ||
9ab70134 JK |
1424 | int f2fs_fiemap(struct inode *inode, struct fiemap_extent_info *fieinfo, |
1425 | u64 start, u64 len) | |
1426 | { | |
7f63eb77 JK |
1427 | struct buffer_head map_bh; |
1428 | sector_t start_blk, last_blk; | |
da85985c | 1429 | pgoff_t next_pgofs; |
7f63eb77 JK |
1430 | u64 logical = 0, phys = 0, size = 0; |
1431 | u32 flags = 0; | |
7f63eb77 JK |
1432 | int ret = 0; |
1433 | ||
ce767d9a JK |
1434 | if (fieinfo->fi_flags & FIEMAP_FLAG_CACHE) { |
1435 | ret = f2fs_precache_extents(inode); | |
1436 | if (ret) | |
1437 | return ret; | |
1438 | } | |
1439 | ||
1440 | ret = fiemap_check_flags(fieinfo, FIEMAP_FLAG_SYNC | FIEMAP_FLAG_XATTR); | |
7f63eb77 JK |
1441 | if (ret) |
1442 | return ret; | |
1443 | ||
ce767d9a JK |
1444 | inode_lock(inode); |
1445 | ||
1446 | if (fieinfo->fi_flags & FIEMAP_FLAG_XATTR) { | |
1447 | ret = f2fs_xattr_fiemap(inode, fieinfo); | |
1448 | goto out; | |
1449 | } | |
1450 | ||
67f8cf3c JK |
1451 | if (f2fs_has_inline_data(inode)) { |
1452 | ret = f2fs_inline_data_fiemap(inode, fieinfo, start, len); | |
1453 | if (ret != -EAGAIN) | |
ce767d9a | 1454 | goto out; |
67f8cf3c JK |
1455 | } |
1456 | ||
7f63eb77 JK |
1457 | if (logical_to_blk(inode, len) == 0) |
1458 | len = blk_to_logical(inode, 1); | |
1459 | ||
1460 | start_blk = logical_to_blk(inode, start); | |
1461 | last_blk = logical_to_blk(inode, start + len - 1); | |
9a950d52 | 1462 | |
7f63eb77 JK |
1463 | next: |
1464 | memset(&map_bh, 0, sizeof(struct buffer_head)); | |
1465 | map_bh.b_size = len; | |
1466 | ||
e2b4e2bc | 1467 | ret = get_data_block(inode, start_blk, &map_bh, 0, |
da85985c | 1468 | F2FS_GET_BLOCK_FIEMAP, &next_pgofs); |
7f63eb77 JK |
1469 | if (ret) |
1470 | goto out; | |
1471 | ||
1472 | /* HOLE */ | |
1473 | if (!buffer_mapped(&map_bh)) { | |
da85985c | 1474 | start_blk = next_pgofs; |
58736fa6 CY |
1475 | |
1476 | if (blk_to_logical(inode, start_blk) < blk_to_logical(inode, | |
1477 | F2FS_I_SB(inode)->max_file_blocks)) | |
9a950d52 | 1478 | goto prep_next; |
58736fa6 | 1479 | |
9a950d52 FL |
1480 | flags |= FIEMAP_EXTENT_LAST; |
1481 | } | |
7f63eb77 | 1482 | |
da5af127 CY |
1483 | if (size) { |
1484 | if (f2fs_encrypted_inode(inode)) | |
1485 | flags |= FIEMAP_EXTENT_DATA_ENCRYPTED; | |
1486 | ||
9a950d52 FL |
1487 | ret = fiemap_fill_next_extent(fieinfo, logical, |
1488 | phys, size, flags); | |
da5af127 | 1489 | } |
7f63eb77 | 1490 | |
9a950d52 FL |
1491 | if (start_blk > last_blk || ret) |
1492 | goto out; | |
7f63eb77 | 1493 | |
9a950d52 FL |
1494 | logical = blk_to_logical(inode, start_blk); |
1495 | phys = blk_to_logical(inode, map_bh.b_blocknr); | |
1496 | size = map_bh.b_size; | |
1497 | flags = 0; | |
1498 | if (buffer_unwritten(&map_bh)) | |
1499 | flags = FIEMAP_EXTENT_UNWRITTEN; | |
7f63eb77 | 1500 | |
9a950d52 | 1501 | start_blk += logical_to_blk(inode, size); |
7f63eb77 | 1502 | |
9a950d52 | 1503 | prep_next: |
7f63eb77 JK |
1504 | cond_resched(); |
1505 | if (fatal_signal_pending(current)) | |
1506 | ret = -EINTR; | |
1507 | else | |
1508 | goto next; | |
1509 | out: | |
1510 | if (ret == 1) | |
1511 | ret = 0; | |
1512 | ||
5955102c | 1513 | inode_unlock(inode); |
7f63eb77 | 1514 | return ret; |
9ab70134 JK |
1515 | } |
1516 | ||
f1e88660 JK |
1517 | /* |
1518 | * This function was originally taken from fs/mpage.c, and customized for f2fs. | |
1519 | * Major change was from block_size == page_size in f2fs by default. | |
1520 | */ | |
1521 | static int f2fs_mpage_readpages(struct address_space *mapping, | |
1522 | struct list_head *pages, struct page *page, | |
1523 | unsigned nr_pages) | |
1524 | { | |
1525 | struct bio *bio = NULL; | |
f1e88660 JK |
1526 | sector_t last_block_in_bio = 0; |
1527 | struct inode *inode = mapping->host; | |
1528 | const unsigned blkbits = inode->i_blkbits; | |
1529 | const unsigned blocksize = 1 << blkbits; | |
1530 | sector_t block_in_file; | |
1531 | sector_t last_block; | |
1532 | sector_t last_block_in_file; | |
1533 | sector_t block_nr; | |
f1e88660 | 1534 | struct f2fs_map_blocks map; |
51cc6215 | 1535 | bool bio_encrypted; |
49e3bbe3 | 1536 | u64 dun; |
f1e88660 JK |
1537 | |
1538 | map.m_pblk = 0; | |
1539 | map.m_lblk = 0; | |
1540 | map.m_len = 0; | |
1541 | map.m_flags = 0; | |
da85985c | 1542 | map.m_next_pgofs = NULL; |
ce767d9a JK |
1543 | map.m_next_extent = NULL; |
1544 | map.m_seg_type = NO_CHECK_TYPE; | |
f1e88660 | 1545 | |
ce767d9a | 1546 | for (; nr_pages; nr_pages--) { |
f1e88660 | 1547 | if (pages) { |
939afa94 | 1548 | page = list_last_entry(pages, struct page, lru); |
a83d50bc KM |
1549 | |
1550 | prefetchw(&page->flags); | |
f1e88660 JK |
1551 | list_del(&page->lru); |
1552 | if (add_to_page_cache_lru(page, mapping, | |
8a5c743e MH |
1553 | page->index, |
1554 | readahead_gfp_mask(mapping))) | |
f1e88660 JK |
1555 | goto next_page; |
1556 | } | |
1557 | ||
1558 | block_in_file = (sector_t)page->index; | |
1559 | last_block = block_in_file + nr_pages; | |
1560 | last_block_in_file = (i_size_read(inode) + blocksize - 1) >> | |
1561 | blkbits; | |
1562 | if (last_block > last_block_in_file) | |
1563 | last_block = last_block_in_file; | |
1564 | ||
1565 | /* | |
1566 | * Map blocks using the previous result first. | |
1567 | */ | |
1568 | if ((map.m_flags & F2FS_MAP_MAPPED) && | |
1569 | block_in_file > map.m_lblk && | |
1570 | block_in_file < (map.m_lblk + map.m_len)) | |
1571 | goto got_it; | |
1572 | ||
1573 | /* | |
1574 | * Then do more f2fs_map_blocks() calls until we are | |
1575 | * done with this page. | |
1576 | */ | |
1577 | map.m_flags = 0; | |
1578 | ||
1579 | if (block_in_file < last_block) { | |
1580 | map.m_lblk = block_in_file; | |
1581 | map.m_len = last_block - block_in_file; | |
1582 | ||
46c9e141 | 1583 | if (f2fs_map_blocks(inode, &map, 0, |
f2220c7f | 1584 | F2FS_GET_BLOCK_DEFAULT)) |
f1e88660 JK |
1585 | goto set_error_page; |
1586 | } | |
1587 | got_it: | |
1588 | if ((map.m_flags & F2FS_MAP_MAPPED)) { | |
1589 | block_nr = map.m_pblk + block_in_file - map.m_lblk; | |
1590 | SetPageMappedToDisk(page); | |
1591 | ||
1592 | if (!PageUptodate(page) && !cleancache_get_page(page)) { | |
1593 | SetPageUptodate(page); | |
1594 | goto confused; | |
1595 | } | |
ad19d1e7 CY |
1596 | |
1597 | if (!f2fs_is_valid_blkaddr(F2FS_I_SB(inode), block_nr, | |
1598 | DATA_GENERIC)) | |
1599 | goto set_error_page; | |
f1e88660 | 1600 | } else { |
09cbfeaf | 1601 | zero_user_segment(page, 0, PAGE_SIZE); |
237c0790 JK |
1602 | if (!PageUptodate(page)) |
1603 | SetPageUptodate(page); | |
f1e88660 JK |
1604 | unlock_page(page); |
1605 | goto next_page; | |
1606 | } | |
1607 | ||
1608 | /* | |
1609 | * This page will go to BIO. Do we need to send this | |
1610 | * BIO off first? | |
1611 | */ | |
3c62be17 JK |
1612 | if (bio && (last_block_in_bio != block_nr - 1 || |
1613 | !__same_bdev(F2FS_I_SB(inode), block_nr, bio))) { | |
f1e88660 | 1614 | submit_and_realloc: |
4fc29c1a | 1615 | __submit_bio(F2FS_I_SB(inode), bio, DATA); |
f1e88660 JK |
1616 | bio = NULL; |
1617 | } | |
51cc6215 | 1618 | |
49e3bbe3 | 1619 | dun = PG_DUN(inode, page); |
51cc6215 | 1620 | bio_encrypted = f2fs_may_encrypt_bio(inode, NULL); |
49e3bbe3 | 1621 | if (!f2fs_mergeable_bio(bio, dun, fscrypt_get_diskcipher(inode), bio_encrypted)) { |
51cc6215 BK |
1622 | __submit_bio(F2FS_I_SB(inode), bio, DATA); |
1623 | bio = NULL; | |
1624 | } | |
1625 | ||
f1e88660 | 1626 | if (bio == NULL) { |
13ba41e3 | 1627 | bio = f2fs_grab_read_bio(inode, block_nr, nr_pages); |
1d353eb7 JK |
1628 | if (IS_ERR(bio)) { |
1629 | bio = NULL; | |
f1e88660 | 1630 | goto set_error_page; |
4375a336 | 1631 | } |
51cc6215 | 1632 | if (f2fs_may_encrypt_bio(inode, NULL)) |
49e3bbe3 | 1633 | fscrypt_set_bio(inode, bio, dun); |
f1e88660 JK |
1634 | } |
1635 | ||
f9ef288b JK |
1636 | /* |
1637 | * If the page is under writeback, we need to wait for | |
1638 | * its completion to see the correct decrypted data. | |
1639 | */ | |
1640 | f2fs_wait_on_block_writeback(inode, block_nr); | |
1641 | ||
f1e88660 JK |
1642 | if (bio_add_page(bio, page, blocksize, 0) < blocksize) |
1643 | goto submit_and_realloc; | |
1644 | ||
1645 | last_block_in_bio = block_nr; | |
1646 | goto next_page; | |
1647 | set_error_page: | |
1648 | SetPageError(page); | |
09cbfeaf | 1649 | zero_user_segment(page, 0, PAGE_SIZE); |
f1e88660 JK |
1650 | unlock_page(page); |
1651 | goto next_page; | |
1652 | confused: | |
1653 | if (bio) { | |
4fc29c1a | 1654 | __submit_bio(F2FS_I_SB(inode), bio, DATA); |
f1e88660 JK |
1655 | bio = NULL; |
1656 | } | |
1657 | unlock_page(page); | |
1658 | next_page: | |
1659 | if (pages) | |
09cbfeaf | 1660 | put_page(page); |
f1e88660 JK |
1661 | } |
1662 | BUG_ON(pages && !list_empty(pages)); | |
1663 | if (bio) | |
4fc29c1a | 1664 | __submit_bio(F2FS_I_SB(inode), bio, DATA); |
f1e88660 JK |
1665 | return 0; |
1666 | } | |
1667 | ||
eb47b800 JK |
1668 | static int f2fs_read_data_page(struct file *file, struct page *page) |
1669 | { | |
9ffe0fb5 | 1670 | struct inode *inode = page->mapping->host; |
b3d208f9 | 1671 | int ret = -EAGAIN; |
9ffe0fb5 | 1672 | |
c20e89cd CY |
1673 | trace_f2fs_readpage(page, DATA); |
1674 | ||
e1c42045 | 1675 | /* If the file has inline data, try to read it directly */ |
9ffe0fb5 HL |
1676 | if (f2fs_has_inline_data(inode)) |
1677 | ret = f2fs_read_inline_data(inode, page); | |
b3d208f9 | 1678 | if (ret == -EAGAIN) |
f1e88660 | 1679 | ret = f2fs_mpage_readpages(page->mapping, NULL, page, 1); |
9ffe0fb5 | 1680 | return ret; |
eb47b800 JK |
1681 | } |
1682 | ||
1683 | static int f2fs_read_data_pages(struct file *file, | |
1684 | struct address_space *mapping, | |
1685 | struct list_head *pages, unsigned nr_pages) | |
1686 | { | |
7fb3f3b2 | 1687 | struct inode *inode = mapping->host; |
939afa94 | 1688 | struct page *page = list_last_entry(pages, struct page, lru); |
b8c29400 CY |
1689 | |
1690 | trace_f2fs_readpages(inode, page, nr_pages); | |
9ffe0fb5 HL |
1691 | |
1692 | /* If the file has inline data, skip readpages */ | |
1693 | if (f2fs_has_inline_data(inode)) | |
1694 | return 0; | |
1695 | ||
f1e88660 | 1696 | return f2fs_mpage_readpages(mapping, pages, NULL, nr_pages); |
eb47b800 JK |
1697 | } |
1698 | ||
7eab0c0d HP |
1699 | static int encrypt_one_page(struct f2fs_io_info *fio) |
1700 | { | |
1701 | struct inode *inode = fio->page->mapping->host; | |
1702 | gfp_t gfp_flags = GFP_NOFS; | |
1703 | ||
1958593e | 1704 | if (!f2fs_encrypted_file(inode)) |
7eab0c0d HP |
1705 | return 0; |
1706 | ||
c6e638ae | 1707 | /* wait for GCed page writeback via META_MAPPING */ |
f9ef288b | 1708 | f2fs_wait_on_block_writeback(inode, fio->old_blkaddr); |
7eab0c0d HP |
1709 | |
1710 | retry_encrypt: | |
51cc6215 BK |
1711 | if (fscrypt_disk_encrypted(inode)) |
1712 | return 0; | |
1713 | ||
7eab0c0d HP |
1714 | fio->encrypted_page = fscrypt_encrypt_page(inode, fio->page, |
1715 | PAGE_SIZE, 0, fio->page->index, gfp_flags); | |
1716 | if (!IS_ERR(fio->encrypted_page)) | |
1717 | return 0; | |
1718 | ||
1719 | /* flush pending IOs and wait for a while in the ENOMEM case */ | |
1720 | if (PTR_ERR(fio->encrypted_page) == -ENOMEM) { | |
b9109b0e | 1721 | f2fs_flush_merged_writes(fio->sbi); |
7eab0c0d HP |
1722 | congestion_wait(BLK_RW_ASYNC, HZ/50); |
1723 | gfp_flags |= __GFP_NOFAIL; | |
1724 | goto retry_encrypt; | |
1725 | } | |
1726 | return PTR_ERR(fio->encrypted_page); | |
1727 | } | |
1728 | ||
ce767d9a JK |
1729 | static inline bool check_inplace_update_policy(struct inode *inode, |
1730 | struct f2fs_io_info *fio) | |
1731 | { | |
1732 | struct f2fs_sb_info *sbi = F2FS_I_SB(inode); | |
1733 | unsigned int policy = SM_I(sbi)->ipu_policy; | |
1734 | ||
1735 | if (policy & (0x1 << F2FS_IPU_FORCE)) | |
1736 | return true; | |
1737 | if (policy & (0x1 << F2FS_IPU_SSR) && need_SSR(sbi)) | |
1738 | return true; | |
1739 | if (policy & (0x1 << F2FS_IPU_UTIL) && | |
1740 | utilization(sbi) > SM_I(sbi)->min_ipu_util) | |
1741 | return true; | |
1742 | if (policy & (0x1 << F2FS_IPU_SSR_UTIL) && need_SSR(sbi) && | |
1743 | utilization(sbi) > SM_I(sbi)->min_ipu_util) | |
1744 | return true; | |
1745 | ||
1746 | /* | |
1747 | * IPU for rewrite async pages | |
1748 | */ | |
1749 | if (policy & (0x1 << F2FS_IPU_ASYNC) && | |
1750 | fio && fio->op == REQ_OP_WRITE && | |
1751 | !(fio->op_flags & REQ_SYNC) && | |
1752 | !f2fs_encrypted_inode(inode)) | |
1753 | return true; | |
1754 | ||
1755 | /* this is only set during fdatasync */ | |
1756 | if (policy & (0x1 << F2FS_IPU_FSYNC) && | |
1757 | is_inode_flag_set(inode, FI_NEED_IPU)) | |
1758 | return true; | |
1759 | ||
1760 | return false; | |
1761 | } | |
1762 | ||
1763 | bool should_update_inplace(struct inode *inode, struct f2fs_io_info *fio) | |
1764 | { | |
1765 | if (f2fs_is_pinned_file(inode)) | |
1766 | return true; | |
1767 | ||
1768 | /* if this is cold file, we should overwrite to avoid fragmentation */ | |
1769 | if (file_is_cold(inode)) | |
1770 | return true; | |
1771 | ||
1772 | return check_inplace_update_policy(inode, fio); | |
1773 | } | |
1774 | ||
1775 | bool should_update_outplace(struct inode *inode, struct f2fs_io_info *fio) | |
1776 | { | |
1777 | struct f2fs_sb_info *sbi = F2FS_I_SB(inode); | |
1778 | ||
1779 | if (test_opt(sbi, LFS)) | |
1780 | return true; | |
1781 | if (S_ISDIR(inode->i_mode)) | |
1782 | return true; | |
1783 | if (f2fs_is_atomic_file(inode)) | |
1784 | return true; | |
1785 | if (fio) { | |
1786 | if (is_cold_data(fio->page)) | |
1787 | return true; | |
1788 | if (IS_ATOMIC_WRITTEN_PAGE(fio->page)) | |
1789 | return true; | |
1790 | } | |
1791 | return false; | |
1792 | } | |
1793 | ||
7eab0c0d HP |
1794 | static inline bool need_inplace_update(struct f2fs_io_info *fio) |
1795 | { | |
1796 | struct inode *inode = fio->page->mapping->host; | |
1797 | ||
ce767d9a | 1798 | if (should_update_outplace(inode, fio)) |
7eab0c0d HP |
1799 | return false; |
1800 | ||
ce767d9a | 1801 | return should_update_inplace(inode, fio); |
7eab0c0d HP |
1802 | } |
1803 | ||
05ca3632 | 1804 | int do_write_data_page(struct f2fs_io_info *fio) |
eb47b800 | 1805 | { |
05ca3632 | 1806 | struct page *page = fio->page; |
eb47b800 | 1807 | struct inode *inode = page->mapping->host; |
eb47b800 | 1808 | struct dnode_of_data dn; |
e959c8f5 HP |
1809 | struct extent_info ei = {0,0,0}; |
1810 | bool ipu_force = false; | |
eb47b800 JK |
1811 | int err = 0; |
1812 | ||
1813 | set_new_dnode(&dn, inode, NULL, NULL, 0); | |
e959c8f5 HP |
1814 | if (need_inplace_update(fio) && |
1815 | f2fs_lookup_extent_cache(inode, page->index, &ei)) { | |
1816 | fio->old_blkaddr = ei.blk + page->index - ei.fofs; | |
a817737e | 1817 | |
ad19d1e7 CY |
1818 | if (!f2fs_is_valid_blkaddr(fio->sbi, fio->old_blkaddr, |
1819 | DATA_GENERIC)) | |
1820 | return -EFAULT; | |
1821 | ||
1822 | ipu_force = true; | |
1823 | fio->need_lock = LOCK_DONE; | |
1824 | goto got_it; | |
e959c8f5 | 1825 | } |
279d6df2 | 1826 | |
d29460e5 JK |
1827 | /* Deadlock due to between page->lock and f2fs_lock_op */ |
1828 | if (fio->need_lock == LOCK_REQ && !f2fs_trylock_op(fio->sbi)) | |
1829 | return -EAGAIN; | |
279d6df2 | 1830 | |
266e97a8 | 1831 | err = get_dnode_of_data(&dn, page->index, LOOKUP_NODE); |
eb47b800 | 1832 | if (err) |
279d6df2 | 1833 | goto out; |
eb47b800 | 1834 | |
28bc106b | 1835 | fio->old_blkaddr = dn.data_blkaddr; |
eb47b800 JK |
1836 | |
1837 | /* This page is already truncated */ | |
7a9d7548 | 1838 | if (fio->old_blkaddr == NULL_ADDR) { |
2bca1e23 | 1839 | ClearPageUptodate(page); |
eb47b800 | 1840 | goto out_writepage; |
2bca1e23 | 1841 | } |
e959c8f5 | 1842 | got_it: |
ad19d1e7 CY |
1843 | if (__is_valid_data_blkaddr(fio->old_blkaddr) && |
1844 | !f2fs_is_valid_blkaddr(fio->sbi, fio->old_blkaddr, | |
1845 | DATA_GENERIC)) { | |
1846 | err = -EFAULT; | |
1847 | goto out_writepage; | |
1848 | } | |
eb47b800 JK |
1849 | /* |
1850 | * If current allocation needs SSR, | |
1851 | * it had better in-place writes for updated data. | |
1852 | */ | |
eea71570 | 1853 | if (ipu_force || (is_valid_data_blkaddr(fio->sbi, fio->old_blkaddr) && |
9e6c4a85 | 1854 | need_inplace_update(fio))) { |
cc15620b JK |
1855 | err = encrypt_one_page(fio); |
1856 | if (err) | |
1857 | goto out_writepage; | |
1858 | ||
1859 | set_page_writeback(page); | |
f8385a15 | 1860 | ClearPageError(page); |
279d6df2 | 1861 | f2fs_put_dnode(&dn); |
cc15620b | 1862 | if (fio->need_lock == LOCK_REQ) |
279d6df2 | 1863 | f2fs_unlock_op(fio->sbi); |
d1b3e72d | 1864 | err = rewrite_data_page(fio); |
7eab0c0d | 1865 | trace_f2fs_do_write_data_page(fio->page, IPU); |
91942321 | 1866 | set_inode_flag(inode, FI_UPDATE_WRITE); |
279d6df2 | 1867 | return err; |
eb47b800 | 1868 | } |
279d6df2 | 1869 | |
cc15620b JK |
1870 | if (fio->need_lock == LOCK_RETRY) { |
1871 | if (!f2fs_trylock_op(fio->sbi)) { | |
1872 | err = -EAGAIN; | |
1873 | goto out_writepage; | |
1874 | } | |
1875 | fio->need_lock = LOCK_REQ; | |
1876 | } | |
1877 | ||
1878 | err = encrypt_one_page(fio); | |
1879 | if (err) | |
1880 | goto out_writepage; | |
1881 | ||
1882 | set_page_writeback(page); | |
f8385a15 | 1883 | ClearPageError(page); |
cc15620b | 1884 | |
279d6df2 HP |
1885 | /* LFS mode write path */ |
1886 | write_data_page(&dn, fio); | |
1887 | trace_f2fs_do_write_data_page(page, OPU); | |
1888 | set_inode_flag(inode, FI_APPEND_WRITE); | |
1889 | if (page->index == 0) | |
1890 | set_inode_flag(inode, FI_FIRST_BLOCK_WRITTEN); | |
eb47b800 JK |
1891 | out_writepage: |
1892 | f2fs_put_dnode(&dn); | |
279d6df2 | 1893 | out: |
cc15620b | 1894 | if (fio->need_lock == LOCK_REQ) |
279d6df2 | 1895 | f2fs_unlock_op(fio->sbi); |
eb47b800 JK |
1896 | return err; |
1897 | } | |
1898 | ||
d68f735b | 1899 | static int __write_data_page(struct page *page, bool *submitted, |
b0af6d49 CY |
1900 | struct writeback_control *wbc, |
1901 | enum iostat_type io_type) | |
eb47b800 JK |
1902 | { |
1903 | struct inode *inode = page->mapping->host; | |
4081363f | 1904 | struct f2fs_sb_info *sbi = F2FS_I_SB(inode); |
eb47b800 JK |
1905 | loff_t i_size = i_size_read(inode); |
1906 | const pgoff_t end_index = ((unsigned long long) i_size) | |
09cbfeaf | 1907 | >> PAGE_SHIFT; |
26de9b11 | 1908 | loff_t psize = (page->index + 1) << PAGE_SHIFT; |
9ffe0fb5 | 1909 | unsigned offset = 0; |
39936837 | 1910 | bool need_balance_fs = false; |
eb47b800 | 1911 | int err = 0; |
458e6197 | 1912 | struct f2fs_io_info fio = { |
05ca3632 | 1913 | .sbi = sbi, |
7fb3f3b2 | 1914 | .ino = inode->i_ino, |
458e6197 | 1915 | .type = DATA, |
04d328de | 1916 | .op = REQ_OP_WRITE, |
7637241e | 1917 | .op_flags = wbc_to_write_flags(wbc), |
e959c8f5 | 1918 | .old_blkaddr = NULL_ADDR, |
05ca3632 | 1919 | .page = page, |
4375a336 | 1920 | .encrypted_page = NULL, |
d68f735b | 1921 | .submitted = false, |
cc15620b | 1922 | .need_lock = LOCK_RETRY, |
b0af6d49 | 1923 | .io_type = io_type, |
ce767d9a | 1924 | .io_wbc = wbc, |
458e6197 | 1925 | }; |
eb47b800 | 1926 | |
ecda0de3 CY |
1927 | trace_f2fs_writepage(page, DATA); |
1928 | ||
ce767d9a JK |
1929 | /* we should bypass data pages to proceed the kworkder jobs */ |
1930 | if (unlikely(f2fs_cp_error(sbi))) { | |
1931 | mapping_set_error(page->mapping, -EIO); | |
1932 | goto out; | |
1933 | } | |
1934 | ||
0771fcc7 CY |
1935 | if (unlikely(is_sbi_flag_set(sbi, SBI_POR_DOING))) |
1936 | goto redirty_out; | |
1937 | ||
eb47b800 | 1938 | if (page->index < end_index) |
39936837 | 1939 | goto write; |
eb47b800 JK |
1940 | |
1941 | /* | |
1942 | * If the offset is out-of-range of file size, | |
1943 | * this page does not have to be written to disk. | |
1944 | */ | |
09cbfeaf | 1945 | offset = i_size & (PAGE_SIZE - 1); |
76f60268 | 1946 | if ((page->index >= end_index + 1) || !offset) |
39936837 | 1947 | goto out; |
eb47b800 | 1948 | |
09cbfeaf | 1949 | zero_user_segment(page, offset, PAGE_SIZE); |
39936837 | 1950 | write: |
1e84371f JK |
1951 | if (f2fs_is_drop_cache(inode)) |
1952 | goto out; | |
e6e5f561 JK |
1953 | /* we should not write 0'th page having journal header */ |
1954 | if (f2fs_is_volatile_file(inode) && (!page->index || | |
1955 | (!wbc->for_reclaim && | |
1956 | available_free_memory(sbi, BASE_CHECK)))) | |
1e84371f | 1957 | goto redirty_out; |
eb47b800 | 1958 | |
39936837 | 1959 | /* Dentry blocks are controlled by checkpoint */ |
eb47b800 | 1960 | if (S_ISDIR(inode->i_mode)) { |
cc15620b | 1961 | fio.need_lock = LOCK_DONE; |
05ca3632 | 1962 | err = do_write_data_page(&fio); |
8618b881 JK |
1963 | goto done; |
1964 | } | |
9ffe0fb5 | 1965 | |
8618b881 | 1966 | if (!wbc->for_reclaim) |
39936837 | 1967 | need_balance_fs = true; |
7f3037a5 | 1968 | else if (has_not_enough_free_secs(sbi, 0, 0)) |
39936837 | 1969 | goto redirty_out; |
ef095d19 JK |
1970 | else |
1971 | set_inode_flag(inode, FI_HOT_DATA); | |
eb47b800 | 1972 | |
b3d208f9 | 1973 | err = -EAGAIN; |
dd7b2333 | 1974 | if (f2fs_has_inline_data(inode)) { |
b3d208f9 | 1975 | err = f2fs_write_inline_data(inode, page); |
dd7b2333 YH |
1976 | if (!err) |
1977 | goto out; | |
1978 | } | |
279d6df2 | 1979 | |
cc15620b | 1980 | if (err == -EAGAIN) { |
05ca3632 | 1981 | err = do_write_data_page(&fio); |
cc15620b JK |
1982 | if (err == -EAGAIN) { |
1983 | fio.need_lock = LOCK_REQ; | |
1984 | err = do_write_data_page(&fio); | |
1985 | } | |
1986 | } | |
7fb3f3b2 | 1987 | |
ce767d9a JK |
1988 | if (err) { |
1989 | file_set_keep_isize(inode); | |
1990 | } else { | |
1991 | down_write(&F2FS_I(inode)->i_sem); | |
1992 | if (F2FS_I(inode)->last_disk_size < psize) | |
1993 | F2FS_I(inode)->last_disk_size = psize; | |
1994 | up_write(&F2FS_I(inode)->i_sem); | |
1995 | } | |
279d6df2 | 1996 | |
8618b881 JK |
1997 | done: |
1998 | if (err && err != -ENOENT) | |
1999 | goto redirty_out; | |
eb47b800 | 2000 | |
39936837 | 2001 | out: |
a7ffdbe2 | 2002 | inode_dec_dirty_pages(inode); |
2bca1e23 JK |
2003 | if (err) |
2004 | ClearPageUptodate(page); | |
0c3a5797 CY |
2005 | |
2006 | if (wbc->for_reclaim) { | |
b9109b0e | 2007 | f2fs_submit_merged_write_cond(sbi, inode, 0, page->index, DATA); |
ef095d19 | 2008 | clear_inode_flag(inode, FI_HOT_DATA); |
0c3a5797 | 2009 | remove_dirty_inode(inode); |
d68f735b | 2010 | submitted = NULL; |
0c3a5797 CY |
2011 | } |
2012 | ||
eb47b800 | 2013 | unlock_page(page); |
a7881893 JK |
2014 | if (!S_ISDIR(inode->i_mode)) |
2015 | f2fs_balance_fs(sbi, need_balance_fs); | |
0c3a5797 | 2016 | |
d68f735b | 2017 | if (unlikely(f2fs_cp_error(sbi))) { |
b9109b0e | 2018 | f2fs_submit_merged_write(sbi, DATA); |
d68f735b JK |
2019 | submitted = NULL; |
2020 | } | |
2021 | ||
2022 | if (submitted) | |
2023 | *submitted = fio.submitted; | |
0c3a5797 | 2024 | |
eb47b800 JK |
2025 | return 0; |
2026 | ||
eb47b800 | 2027 | redirty_out: |
76f60268 | 2028 | redirty_page_for_writepage(wbc, page); |
2ae46065 JK |
2029 | /* |
2030 | * pageout() in MM traslates EAGAIN, so calls handle_write_error() | |
2031 | * -> mapping_set_error() -> set_bit(AS_EIO, ...). | |
2032 | * file_write_and_wait_range() will see EIO error, which is critical | |
2033 | * to return value of fsync() followed by atomic_write failure to user. | |
2034 | */ | |
2035 | if (!err || wbc->for_reclaim) | |
0002b61b | 2036 | return AOP_WRITEPAGE_ACTIVATE; |
b230e6ca JK |
2037 | unlock_page(page); |
2038 | return err; | |
fa9150a8 NJ |
2039 | } |
2040 | ||
f566bae8 JK |
2041 | static int f2fs_write_data_page(struct page *page, |
2042 | struct writeback_control *wbc) | |
2043 | { | |
b0af6d49 | 2044 | return __write_data_page(page, NULL, wbc, FS_DATA_IO); |
f566bae8 JK |
2045 | } |
2046 | ||
8f46dcae CY |
2047 | /* |
2048 | * This function was copied from write_cche_pages from mm/page-writeback.c. | |
2049 | * The major change is making write step of cold data page separately from | |
2050 | * warm/hot data page. | |
2051 | */ | |
2052 | static int f2fs_write_cache_pages(struct address_space *mapping, | |
b0af6d49 CY |
2053 | struct writeback_control *wbc, |
2054 | enum iostat_type io_type) | |
8f46dcae CY |
2055 | { |
2056 | int ret = 0; | |
2057 | int done = 0; | |
2058 | struct pagevec pvec; | |
2059 | int nr_pages; | |
2060 | pgoff_t uninitialized_var(writeback_index); | |
2061 | pgoff_t index; | |
2062 | pgoff_t end; /* Inclusive */ | |
2063 | pgoff_t done_index; | |
942fd319 | 2064 | pgoff_t last_idx = ULONG_MAX; |
8f46dcae CY |
2065 | int cycled; |
2066 | int range_whole = 0; | |
2067 | int tag; | |
8f46dcae CY |
2068 | |
2069 | pagevec_init(&pvec, 0); | |
46ae957f | 2070 | |
ef095d19 JK |
2071 | if (get_dirty_pages(mapping->host) <= |
2072 | SM_I(F2FS_M_SB(mapping))->min_hot_blocks) | |
2073 | set_inode_flag(mapping->host, FI_HOT_DATA); | |
2074 | else | |
2075 | clear_inode_flag(mapping->host, FI_HOT_DATA); | |
2076 | ||
8f46dcae CY |
2077 | if (wbc->range_cyclic) { |
2078 | writeback_index = mapping->writeback_index; /* prev offset */ | |
2079 | index = writeback_index; | |
2080 | if (index == 0) | |
2081 | cycled = 1; | |
2082 | else | |
2083 | cycled = 0; | |
2084 | end = -1; | |
2085 | } else { | |
09cbfeaf KS |
2086 | index = wbc->range_start >> PAGE_SHIFT; |
2087 | end = wbc->range_end >> PAGE_SHIFT; | |
8f46dcae CY |
2088 | if (wbc->range_start == 0 && wbc->range_end == LLONG_MAX) |
2089 | range_whole = 1; | |
2090 | cycled = 1; /* ignore range_cyclic tests */ | |
2091 | } | |
2092 | if (wbc->sync_mode == WB_SYNC_ALL || wbc->tagged_writepages) | |
2093 | tag = PAGECACHE_TAG_TOWRITE; | |
2094 | else | |
2095 | tag = PAGECACHE_TAG_DIRTY; | |
2096 | retry: | |
2097 | if (wbc->sync_mode == WB_SYNC_ALL || wbc->tagged_writepages) | |
2098 | tag_pages_for_writeback(mapping, index, end); | |
2099 | done_index = index; | |
2100 | while (!done && (index <= end)) { | |
2101 | int i; | |
2102 | ||
2103 | nr_pages = pagevec_lookup_tag(&pvec, mapping, &index, tag, | |
2104 | min(end - index, (pgoff_t)PAGEVEC_SIZE - 1) + 1); | |
2105 | if (nr_pages == 0) | |
2106 | break; | |
2107 | ||
2108 | for (i = 0; i < nr_pages; i++) { | |
2109 | struct page *page = pvec.pages[i]; | |
d68f735b | 2110 | bool submitted = false; |
8f46dcae CY |
2111 | |
2112 | if (page->index > end) { | |
2113 | done = 1; | |
2114 | break; | |
2115 | } | |
2116 | ||
2117 | done_index = page->index; | |
d29460e5 | 2118 | retry_write: |
8f46dcae CY |
2119 | lock_page(page); |
2120 | ||
2121 | if (unlikely(page->mapping != mapping)) { | |
2122 | continue_unlock: | |
2123 | unlock_page(page); | |
2124 | continue; | |
2125 | } | |
2126 | ||
2127 | if (!PageDirty(page)) { | |
2128 | /* someone wrote it for us */ | |
2129 | goto continue_unlock; | |
2130 | } | |
2131 | ||
8f46dcae CY |
2132 | if (PageWriteback(page)) { |
2133 | if (wbc->sync_mode != WB_SYNC_NONE) | |
fec1d657 JK |
2134 | f2fs_wait_on_page_writeback(page, |
2135 | DATA, true); | |
8f46dcae CY |
2136 | else |
2137 | goto continue_unlock; | |
2138 | } | |
2139 | ||
2140 | BUG_ON(PageWriteback(page)); | |
2141 | if (!clear_page_dirty_for_io(page)) | |
2142 | goto continue_unlock; | |
2143 | ||
b0af6d49 | 2144 | ret = __write_data_page(page, &submitted, wbc, io_type); |
8f46dcae | 2145 | if (unlikely(ret)) { |
0002b61b CY |
2146 | /* |
2147 | * keep nr_to_write, since vfs uses this to | |
2148 | * get # of written pages. | |
2149 | */ | |
2150 | if (ret == AOP_WRITEPAGE_ACTIVATE) { | |
2151 | unlock_page(page); | |
2152 | ret = 0; | |
2153 | continue; | |
d29460e5 JK |
2154 | } else if (ret == -EAGAIN) { |
2155 | ret = 0; | |
2156 | if (wbc->sync_mode == WB_SYNC_ALL) { | |
2157 | cond_resched(); | |
2158 | congestion_wait(BLK_RW_ASYNC, | |
2159 | HZ/50); | |
2160 | goto retry_write; | |
2161 | } | |
2162 | continue; | |
0002b61b | 2163 | } |
b230e6ca JK |
2164 | done_index = page->index + 1; |
2165 | done = 1; | |
2166 | break; | |
d68f735b | 2167 | } else if (submitted) { |
942fd319 | 2168 | last_idx = page->index; |
8f46dcae CY |
2169 | } |
2170 | ||
687de7f1 JK |
2171 | /* give a priority to WB_SYNC threads */ |
2172 | if ((atomic_read(&F2FS_M_SB(mapping)->wb_sync_req) || | |
2173 | --wbc->nr_to_write <= 0) && | |
2174 | wbc->sync_mode == WB_SYNC_NONE) { | |
8f46dcae CY |
2175 | done = 1; |
2176 | break; | |
2177 | } | |
2178 | } | |
2179 | pagevec_release(&pvec); | |
2180 | cond_resched(); | |
2181 | } | |
2182 | ||
8f46dcae CY |
2183 | if (!cycled && !done) { |
2184 | cycled = 1; | |
2185 | index = 0; | |
2186 | end = writeback_index - 1; | |
2187 | goto retry; | |
2188 | } | |
2189 | if (wbc->range_cyclic || (range_whole && wbc->nr_to_write > 0)) | |
2190 | mapping->writeback_index = done_index; | |
2191 | ||
942fd319 | 2192 | if (last_idx != ULONG_MAX) |
b9109b0e JK |
2193 | f2fs_submit_merged_write_cond(F2FS_M_SB(mapping), mapping->host, |
2194 | 0, last_idx, DATA); | |
6ca56ca4 | 2195 | |
8f46dcae CY |
2196 | return ret; |
2197 | } | |
2198 | ||
b0af6d49 CY |
2199 | int __f2fs_write_data_pages(struct address_space *mapping, |
2200 | struct writeback_control *wbc, | |
2201 | enum iostat_type io_type) | |
eb47b800 JK |
2202 | { |
2203 | struct inode *inode = mapping->host; | |
4081363f | 2204 | struct f2fs_sb_info *sbi = F2FS_I_SB(inode); |
9dfa1baf | 2205 | struct blk_plug plug; |
eb47b800 | 2206 | int ret; |
eb47b800 | 2207 | |
cfb185a1 | 2208 | /* deal with chardevs and other special file */ |
2209 | if (!mapping->a_ops->writepage) | |
2210 | return 0; | |
2211 | ||
6a290544 CY |
2212 | /* skip writing if there is no dirty page in this inode */ |
2213 | if (!get_dirty_pages(inode) && wbc->sync_mode == WB_SYNC_NONE) | |
2214 | return 0; | |
2215 | ||
0771fcc7 CY |
2216 | /* during POR, we don't need to trigger writepage at all. */ |
2217 | if (unlikely(is_sbi_flag_set(sbi, SBI_POR_DOING))) | |
2218 | goto skip_write; | |
2219 | ||
a1257023 JK |
2220 | if (S_ISDIR(inode->i_mode) && wbc->sync_mode == WB_SYNC_NONE && |
2221 | get_dirty_pages(inode) < nr_pages_to_skip(sbi, DATA) && | |
2222 | available_free_memory(sbi, DIRTY_DENTS)) | |
2223 | goto skip_write; | |
2224 | ||
d323d005 | 2225 | /* skip writing during file defragment */ |
91942321 | 2226 | if (is_inode_flag_set(inode, FI_DO_DEFRAG)) |
d323d005 CY |
2227 | goto skip_write; |
2228 | ||
d31c7c3f YH |
2229 | trace_f2fs_writepages(mapping->host, wbc, DATA); |
2230 | ||
687de7f1 JK |
2231 | /* to avoid spliting IOs due to mixed WB_SYNC_ALL and WB_SYNC_NONE */ |
2232 | if (wbc->sync_mode == WB_SYNC_ALL) | |
2233 | atomic_inc(&sbi->wb_sync_req); | |
2234 | else if (atomic_read(&sbi->wb_sync_req)) | |
2235 | goto skip_write; | |
2236 | ||
9dfa1baf | 2237 | blk_start_plug(&plug); |
b0af6d49 | 2238 | ret = f2fs_write_cache_pages(mapping, wbc, io_type); |
9dfa1baf | 2239 | blk_finish_plug(&plug); |
687de7f1 JK |
2240 | |
2241 | if (wbc->sync_mode == WB_SYNC_ALL) | |
2242 | atomic_dec(&sbi->wb_sync_req); | |
28ea6162 JK |
2243 | /* |
2244 | * if some pages were truncated, we cannot guarantee its mapping->host | |
2245 | * to detect pending bios. | |
2246 | */ | |
458e6197 | 2247 | |
c227f912 | 2248 | remove_dirty_inode(inode); |
eb47b800 | 2249 | return ret; |
d3baf95d JK |
2250 | |
2251 | skip_write: | |
a7ffdbe2 | 2252 | wbc->pages_skipped += get_dirty_pages(inode); |
d31c7c3f | 2253 | trace_f2fs_writepages(mapping->host, wbc, DATA); |
d3baf95d | 2254 | return 0; |
eb47b800 JK |
2255 | } |
2256 | ||
b0af6d49 CY |
2257 | static int f2fs_write_data_pages(struct address_space *mapping, |
2258 | struct writeback_control *wbc) | |
2259 | { | |
2260 | struct inode *inode = mapping->host; | |
2261 | ||
2262 | return __f2fs_write_data_pages(mapping, wbc, | |
2263 | F2FS_I(inode)->cp_task == current ? | |
2264 | FS_CP_DATA_IO : FS_DATA_IO); | |
2265 | } | |
2266 | ||
3aab8f82 CY |
2267 | static void f2fs_write_failed(struct address_space *mapping, loff_t to) |
2268 | { | |
2269 | struct inode *inode = mapping->host; | |
819d9153 | 2270 | loff_t i_size = i_size_read(inode); |
3aab8f82 | 2271 | |
819d9153 | 2272 | if (to > i_size) { |
5a3a2d83 | 2273 | down_write(&F2FS_I(inode)->i_mmap_sem); |
819d9153 JK |
2274 | truncate_pagecache(inode, i_size); |
2275 | truncate_blocks(inode, i_size, true); | |
5a3a2d83 | 2276 | up_write(&F2FS_I(inode)->i_mmap_sem); |
3aab8f82 CY |
2277 | } |
2278 | } | |
2279 | ||
2aadac08 JK |
2280 | static int prepare_write_begin(struct f2fs_sb_info *sbi, |
2281 | struct page *page, loff_t pos, unsigned len, | |
2282 | block_t *blk_addr, bool *node_changed) | |
2283 | { | |
2284 | struct inode *inode = page->mapping->host; | |
2285 | pgoff_t index = page->index; | |
2286 | struct dnode_of_data dn; | |
2287 | struct page *ipage; | |
b4d07a3e | 2288 | bool locked = false; |
e15882b6 | 2289 | struct extent_info ei = {0,0,0}; |
2aadac08 | 2290 | int err = 0; |
58282978 | 2291 | int flag; |
2aadac08 | 2292 | |
24b84912 JK |
2293 | /* |
2294 | * we already allocated all the blocks, so we don't need to get | |
2295 | * the block addresses when there is no need to fill the page. | |
2296 | */ | |
dc91de78 JK |
2297 | if (!f2fs_has_inline_data(inode) && len == PAGE_SIZE && |
2298 | !is_inode_flag_set(inode, FI_NO_PREALLOC)) | |
24b84912 JK |
2299 | return 0; |
2300 | ||
58282978 SY |
2301 | /* f2fs_lock_op avoids race between write CP and convert_inline_page */ |
2302 | if (f2fs_has_inline_data(inode) && pos + len > MAX_INLINE_DATA(inode)) | |
2303 | flag = F2FS_GET_BLOCK_DEFAULT; | |
2304 | else | |
2305 | flag = F2FS_GET_BLOCK_PRE_AIO; | |
2306 | ||
b4d07a3e | 2307 | if (f2fs_has_inline_data(inode) || |
09cbfeaf | 2308 | (pos & PAGE_MASK) >= i_size_read(inode)) { |
58282978 | 2309 | __do_map_lock(sbi, flag, true); |
b4d07a3e JK |
2310 | locked = true; |
2311 | } | |
2312 | restart: | |
2aadac08 JK |
2313 | /* check inline_data */ |
2314 | ipage = get_node_page(sbi, inode->i_ino); | |
2315 | if (IS_ERR(ipage)) { | |
2316 | err = PTR_ERR(ipage); | |
2317 | goto unlock_out; | |
2318 | } | |
2319 | ||
2320 | set_new_dnode(&dn, inode, ipage, ipage, 0); | |
2321 | ||
2322 | if (f2fs_has_inline_data(inode)) { | |
f2470371 | 2323 | if (pos + len <= MAX_INLINE_DATA(inode)) { |
2aadac08 | 2324 | read_inline_data(page, ipage); |
91942321 | 2325 | set_inode_flag(inode, FI_DATA_EXIST); |
ab47036d CY |
2326 | if (inode->i_nlink) |
2327 | set_inline_node(ipage); | |
2aadac08 JK |
2328 | } else { |
2329 | err = f2fs_convert_inline_page(&dn, page); | |
2330 | if (err) | |
b4d07a3e JK |
2331 | goto out; |
2332 | if (dn.data_blkaddr == NULL_ADDR) | |
2333 | err = f2fs_get_block(&dn, index); | |
2334 | } | |
2335 | } else if (locked) { | |
2336 | err = f2fs_get_block(&dn, index); | |
2337 | } else { | |
2338 | if (f2fs_lookup_extent_cache(inode, index, &ei)) { | |
2339 | dn.data_blkaddr = ei.blk + index - ei.fofs; | |
2340 | } else { | |
b4d07a3e JK |
2341 | /* hole case */ |
2342 | err = get_dnode_of_data(&dn, index, LOOKUP_NODE); | |
4da7bf5a | 2343 | if (err || dn.data_blkaddr == NULL_ADDR) { |
b4d07a3e | 2344 | f2fs_put_dnode(&dn); |
59c9081b YH |
2345 | __do_map_lock(sbi, F2FS_GET_BLOCK_PRE_AIO, |
2346 | true); | |
58282978 | 2347 | WARN_ON(flag != F2FS_GET_BLOCK_PRE_AIO); |
b4d07a3e JK |
2348 | locked = true; |
2349 | goto restart; | |
2350 | } | |
2aadac08 JK |
2351 | } |
2352 | } | |
b4d07a3e | 2353 | |
2aadac08 JK |
2354 | /* convert_inline_page can make node_changed */ |
2355 | *blk_addr = dn.data_blkaddr; | |
2356 | *node_changed = dn.node_changed; | |
b4d07a3e | 2357 | out: |
2aadac08 JK |
2358 | f2fs_put_dnode(&dn); |
2359 | unlock_out: | |
b4d07a3e | 2360 | if (locked) |
58282978 | 2361 | __do_map_lock(sbi, flag, false); |
2aadac08 JK |
2362 | return err; |
2363 | } | |
2364 | ||
eb47b800 JK |
2365 | static int f2fs_write_begin(struct file *file, struct address_space *mapping, |
2366 | loff_t pos, unsigned len, unsigned flags, | |
2367 | struct page **pagep, void **fsdata) | |
2368 | { | |
2369 | struct inode *inode = mapping->host; | |
4081363f | 2370 | struct f2fs_sb_info *sbi = F2FS_I_SB(inode); |
86531d6b | 2371 | struct page *page = NULL; |
09cbfeaf | 2372 | pgoff_t index = ((unsigned long long) pos) >> PAGE_SHIFT; |
ce767d9a | 2373 | bool need_balance = false, drop_atomic = false; |
2aadac08 | 2374 | block_t blkaddr = NULL_ADDR; |
eb47b800 JK |
2375 | int err = 0; |
2376 | ||
a59d8732 MS |
2377 | if (trace_android_fs_datawrite_start_enabled()) { |
2378 | char *path, pathbuf[MAX_TRACE_PATHBUF_LEN]; | |
2379 | ||
2380 | path = android_fstrace_get_pathname(pathbuf, | |
2381 | MAX_TRACE_PATHBUF_LEN, | |
2382 | inode); | |
2383 | trace_android_fs_datawrite_start(inode, pos, len, | |
2384 | current->pid, path, | |
2385 | current->comm); | |
2386 | } | |
62aed044 CY |
2387 | trace_f2fs_write_begin(inode, pos, len, flags); |
2388 | ||
7fb3f3b2 JK |
2389 | if (f2fs_is_atomic_file(inode) && |
2390 | !available_free_memory(sbi, INMEM_PAGES)) { | |
2391 | err = -ENOMEM; | |
ce767d9a | 2392 | drop_atomic = true; |
7fb3f3b2 JK |
2393 | goto fail; |
2394 | } | |
2395 | ||
5f727395 JK |
2396 | /* |
2397 | * We should check this at this moment to avoid deadlock on inode page | |
2398 | * and #0 page. The locking rule for inline_data conversion should be: | |
2399 | * lock_page(page #0) -> lock_page(inode_page) | |
2400 | */ | |
2401 | if (index != 0) { | |
2402 | err = f2fs_convert_inline_inode(inode); | |
2403 | if (err) | |
2404 | goto fail; | |
2405 | } | |
afcb7ca0 | 2406 | repeat: |
86d54795 JK |
2407 | /* |
2408 | * Do not use grab_cache_page_write_begin() to avoid deadlock due to | |
2409 | * wait_for_stable_page. Will wait that below with our IO control. | |
2410 | */ | |
7fb3f3b2 | 2411 | page = f2fs_pagecache_get_page(mapping, index, |
86d54795 | 2412 | FGP_LOCK | FGP_WRITE | FGP_CREAT, GFP_NOFS); |
3aab8f82 CY |
2413 | if (!page) { |
2414 | err = -ENOMEM; | |
2415 | goto fail; | |
2416 | } | |
d5f66990 | 2417 | |
eb47b800 JK |
2418 | *pagep = page; |
2419 | ||
2aadac08 JK |
2420 | err = prepare_write_begin(sbi, page, pos, len, |
2421 | &blkaddr, &need_balance); | |
9ba69cf9 | 2422 | if (err) |
2aadac08 | 2423 | goto fail; |
9ba69cf9 | 2424 | |
7f3037a5 | 2425 | if (need_balance && has_not_enough_free_secs(sbi, 0, 0)) { |
2a340760 | 2426 | unlock_page(page); |
2c4db1a6 | 2427 | f2fs_balance_fs(sbi, true); |
2a340760 JK |
2428 | lock_page(page); |
2429 | if (page->mapping != mapping) { | |
2430 | /* The page got truncated from under us */ | |
2431 | f2fs_put_page(page, 1); | |
2432 | goto repeat; | |
2433 | } | |
2434 | } | |
2435 | ||
fec1d657 | 2436 | f2fs_wait_on_page_writeback(page, DATA, false); |
b3d208f9 | 2437 | |
649d7df2 JK |
2438 | if (len == PAGE_SIZE || PageUptodate(page)) |
2439 | return 0; | |
eb47b800 | 2440 | |
746e2403 YH |
2441 | if (!(pos & (PAGE_SIZE - 1)) && (pos + len) >= i_size_read(inode)) { |
2442 | zero_user_segment(page, len, PAGE_SIZE); | |
2443 | return 0; | |
2444 | } | |
2445 | ||
2aadac08 | 2446 | if (blkaddr == NEW_ADDR) { |
09cbfeaf | 2447 | zero_user_segment(page, 0, PAGE_SIZE); |
649d7df2 | 2448 | SetPageUptodate(page); |
eb47b800 | 2449 | } else { |
13ba41e3 JK |
2450 | err = f2fs_submit_page_read(inode, page, blkaddr); |
2451 | if (err) | |
78682f79 | 2452 | goto fail; |
d54c795b | 2453 | |
393ff91f | 2454 | lock_page(page); |
6bacf52f | 2455 | if (unlikely(page->mapping != mapping)) { |
afcb7ca0 JK |
2456 | f2fs_put_page(page, 1); |
2457 | goto repeat; | |
eb47b800 | 2458 | } |
1563ac75 CY |
2459 | if (unlikely(!PageUptodate(page))) { |
2460 | err = -EIO; | |
2461 | goto fail; | |
4375a336 | 2462 | } |
eb47b800 | 2463 | } |
eb47b800 | 2464 | return 0; |
9ba69cf9 | 2465 | |
3aab8f82 | 2466 | fail: |
86531d6b | 2467 | f2fs_put_page(page, 1); |
3aab8f82 | 2468 | f2fs_write_failed(mapping, pos + len); |
ce767d9a | 2469 | if (drop_atomic) |
7fb3f3b2 | 2470 | drop_inmem_pages_all(sbi); |
3aab8f82 | 2471 | return err; |
eb47b800 JK |
2472 | } |
2473 | ||
a1dd3c13 JK |
2474 | static int f2fs_write_end(struct file *file, |
2475 | struct address_space *mapping, | |
2476 | loff_t pos, unsigned len, unsigned copied, | |
2477 | struct page *page, void *fsdata) | |
2478 | { | |
2479 | struct inode *inode = page->mapping->host; | |
2480 | ||
45560fee | 2481 | trace_android_fs_datawrite_end(inode, pos, len); |
dfb2bf38 CY |
2482 | trace_f2fs_write_end(inode, pos, len, copied); |
2483 | ||
649d7df2 JK |
2484 | /* |
2485 | * This should be come from len == PAGE_SIZE, and we expect copied | |
2486 | * should be PAGE_SIZE. Otherwise, we treat it with zero copied and | |
2487 | * let generic_perform_write() try to copy data again through copied=0. | |
2488 | */ | |
2489 | if (!PageUptodate(page)) { | |
746e2403 | 2490 | if (unlikely(copied != len)) |
649d7df2 JK |
2491 | copied = 0; |
2492 | else | |
2493 | SetPageUptodate(page); | |
2494 | } | |
2495 | if (!copied) | |
2496 | goto unlock_out; | |
2497 | ||
34ba94ba | 2498 | set_page_dirty(page); |
a1dd3c13 | 2499 | |
fc9581c8 JK |
2500 | if (pos + copied > i_size_read(inode)) |
2501 | f2fs_i_size_write(inode, pos + copied); | |
649d7df2 | 2502 | unlock_out: |
3024c9a1 | 2503 | f2fs_put_page(page, 1); |
d0239e1b | 2504 | f2fs_update_time(F2FS_I_SB(inode), REQ_TIME); |
a1dd3c13 JK |
2505 | return copied; |
2506 | } | |
2507 | ||
6f673763 OS |
2508 | static int check_direct_IO(struct inode *inode, struct iov_iter *iter, |
2509 | loff_t offset) | |
944fcfc1 JK |
2510 | { |
2511 | unsigned blocksize_mask = inode->i_sb->s_blocksize - 1; | |
944fcfc1 | 2512 | |
944fcfc1 JK |
2513 | if (offset & blocksize_mask) |
2514 | return -EINVAL; | |
2515 | ||
5b46f25d AV |
2516 | if (iov_iter_alignment(iter) & blocksize_mask) |
2517 | return -EINVAL; | |
2518 | ||
944fcfc1 JK |
2519 | return 0; |
2520 | } | |
2521 | ||
c8b8e32d | 2522 | static ssize_t f2fs_direct_IO(struct kiocb *iocb, struct iov_iter *iter) |
eb47b800 | 2523 | { |
b439b103 | 2524 | struct address_space *mapping = iocb->ki_filp->f_mapping; |
3aab8f82 | 2525 | struct inode *inode = mapping->host; |
a2a9032a | 2526 | struct f2fs_sb_info *sbi = F2FS_I_SB(inode); |
3aab8f82 | 2527 | size_t count = iov_iter_count(iter); |
c8b8e32d | 2528 | loff_t offset = iocb->ki_pos; |
82e0a5aa | 2529 | int rw = iov_iter_rw(iter); |
3aab8f82 | 2530 | int err; |
a2a9032a JK |
2531 | enum rw_hint hint = iocb->ki_hint; |
2532 | int whint_mode = F2FS_OPTION(sbi).whint_mode; | |
944fcfc1 | 2533 | |
b439b103 | 2534 | err = check_direct_IO(inode, iter, offset); |
b9d777b8 JK |
2535 | if (err) |
2536 | return err; | |
9ffe0fb5 | 2537 | |
a2a9032a | 2538 | if (f2fs_force_buffered_io(inode, rw)) |
36abef4e | 2539 | return 0; |
fcc85a4d | 2540 | |
5302fb00 | 2541 | trace_f2fs_direct_IO_enter(inode, offset, count, rw); |
70407fad | 2542 | |
45560fee | 2543 | if (trace_android_fs_dataread_start_enabled() && |
a59d8732 MS |
2544 | (rw == READ)) { |
2545 | char *path, pathbuf[MAX_TRACE_PATHBUF_LEN]; | |
2546 | ||
2547 | path = android_fstrace_get_pathname(pathbuf, | |
2548 | MAX_TRACE_PATHBUF_LEN, | |
2549 | inode); | |
45560fee | 2550 | trace_android_fs_dataread_start(inode, offset, |
a59d8732 | 2551 | count, current->pid, path, |
45560fee | 2552 | current->comm); |
a59d8732 | 2553 | } |
45560fee | 2554 | if (trace_android_fs_datawrite_start_enabled() && |
a59d8732 MS |
2555 | (rw == WRITE)) { |
2556 | char *path, pathbuf[MAX_TRACE_PATHBUF_LEN]; | |
2557 | ||
2558 | path = android_fstrace_get_pathname(pathbuf, | |
2559 | MAX_TRACE_PATHBUF_LEN, | |
2560 | inode); | |
45560fee | 2561 | trace_android_fs_datawrite_start(inode, offset, count, |
a59d8732 MS |
2562 | current->pid, path, |
2563 | current->comm); | |
2564 | } | |
a2a9032a JK |
2565 | if (rw == WRITE && whint_mode == WHINT_MODE_OFF) |
2566 | iocb->ki_hint = WRITE_LIFE_NOT_SET; | |
2567 | ||
2568 | if (!down_read_trylock(&F2FS_I(inode)->dio_rwsem[rw])) { | |
2569 | if (iocb->ki_flags & IOCB_NOWAIT) { | |
2570 | iocb->ki_hint = hint; | |
2571 | err = -EAGAIN; | |
2572 | goto out; | |
2573 | } | |
2574 | down_read(&F2FS_I(inode)->dio_rwsem[rw]); | |
2575 | } | |
45560fee | 2576 | |
c8b8e32d | 2577 | err = blockdev_direct_IO(iocb, inode, iter, get_data_block_dio); |
82e0a5aa CY |
2578 | up_read(&F2FS_I(inode)->dio_rwsem[rw]); |
2579 | ||
2580 | if (rw == WRITE) { | |
a2a9032a JK |
2581 | if (whint_mode == WHINT_MODE_OFF) |
2582 | iocb->ki_hint = hint; | |
b0af6d49 CY |
2583 | if (err > 0) { |
2584 | f2fs_update_iostat(F2FS_I_SB(inode), APP_DIRECT_IO, | |
2585 | err); | |
91942321 | 2586 | set_inode_flag(inode, FI_UPDATE_WRITE); |
b0af6d49 | 2587 | } else if (err < 0) { |
6bfc4919 | 2588 | f2fs_write_failed(mapping, offset + count); |
b0af6d49 | 2589 | } |
6bfc4919 | 2590 | } |
a2a9032a | 2591 | out: |
45560fee MS |
2592 | if (trace_android_fs_dataread_start_enabled() && |
2593 | (rw == READ)) | |
2594 | trace_android_fs_dataread_end(inode, offset, count); | |
2595 | if (trace_android_fs_datawrite_start_enabled() && | |
2596 | (rw == WRITE)) | |
2597 | trace_android_fs_datawrite_end(inode, offset, count); | |
2598 | ||
5302fb00 | 2599 | trace_f2fs_direct_IO_exit(inode, offset, count, rw, err); |
70407fad | 2600 | |
3aab8f82 | 2601 | return err; |
eb47b800 JK |
2602 | } |
2603 | ||
487261f3 CY |
2604 | void f2fs_invalidate_page(struct page *page, unsigned int offset, |
2605 | unsigned int length) | |
eb47b800 JK |
2606 | { |
2607 | struct inode *inode = page->mapping->host; | |
487261f3 | 2608 | struct f2fs_sb_info *sbi = F2FS_I_SB(inode); |
a7ffdbe2 | 2609 | |
487261f3 | 2610 | if (inode->i_ino >= F2FS_ROOT_INO(sbi) && |
09cbfeaf | 2611 | (offset % PAGE_SIZE || length != PAGE_SIZE)) |
a7ffdbe2 JK |
2612 | return; |
2613 | ||
487261f3 | 2614 | if (PageDirty(page)) { |
933439c8 | 2615 | if (inode->i_ino == F2FS_META_INO(sbi)) { |
487261f3 | 2616 | dec_page_count(sbi, F2FS_DIRTY_META); |
933439c8 | 2617 | } else if (inode->i_ino == F2FS_NODE_INO(sbi)) { |
487261f3 | 2618 | dec_page_count(sbi, F2FS_DIRTY_NODES); |
933439c8 | 2619 | } else { |
487261f3 | 2620 | inode_dec_dirty_pages(inode); |
933439c8 CY |
2621 | remove_dirty_inode(inode); |
2622 | } | |
487261f3 | 2623 | } |
decd36b6 CY |
2624 | |
2625 | /* This is atomic written page, keep Private */ | |
2626 | if (IS_ATOMIC_WRITTEN_PAGE(page)) | |
8c242db9 | 2627 | return drop_inmem_page(inode, page); |
decd36b6 | 2628 | |
23dc974e | 2629 | set_page_private(page, 0); |
eb47b800 JK |
2630 | ClearPagePrivate(page); |
2631 | } | |
2632 | ||
487261f3 | 2633 | int f2fs_release_page(struct page *page, gfp_t wait) |
eb47b800 | 2634 | { |
f68daeeb JK |
2635 | /* If this is dirty page, keep PagePrivate */ |
2636 | if (PageDirty(page)) | |
2637 | return 0; | |
2638 | ||
decd36b6 CY |
2639 | /* This is atomic written page, keep Private */ |
2640 | if (IS_ATOMIC_WRITTEN_PAGE(page)) | |
2641 | return 0; | |
2642 | ||
23dc974e | 2643 | set_page_private(page, 0); |
eb47b800 | 2644 | ClearPagePrivate(page); |
c3850aa1 | 2645 | return 1; |
eb47b800 JK |
2646 | } |
2647 | ||
2648 | static int f2fs_set_data_page_dirty(struct page *page) | |
2649 | { | |
2650 | struct address_space *mapping = page->mapping; | |
2651 | struct inode *inode = mapping->host; | |
2652 | ||
26c6b887 JK |
2653 | trace_f2fs_set_page_dirty(page, DATA); |
2654 | ||
237c0790 JK |
2655 | if (!PageUptodate(page)) |
2656 | SetPageUptodate(page); | |
34ba94ba | 2657 | |
5fe45743 | 2658 | if (f2fs_is_atomic_file(inode) && !f2fs_is_commit_atomic_write(inode)) { |
decd36b6 CY |
2659 | if (!IS_ATOMIC_WRITTEN_PAGE(page)) { |
2660 | register_inmem_page(inode, page); | |
2661 | return 1; | |
2662 | } | |
2663 | /* | |
2664 | * Previously, this page has been registered, we just | |
2665 | * return here. | |
2666 | */ | |
2667 | return 0; | |
34ba94ba JK |
2668 | } |
2669 | ||
eb47b800 | 2670 | if (!PageDirty(page)) { |
3eb22bff | 2671 | __set_page_dirty_nobuffers(page); |
a7ffdbe2 | 2672 | update_dirty_page(inode, page); |
eb47b800 JK |
2673 | return 1; |
2674 | } | |
2675 | return 0; | |
2676 | } | |
2677 | ||
c01e54b7 JK |
2678 | static sector_t f2fs_bmap(struct address_space *mapping, sector_t block) |
2679 | { | |
454ae7e5 CY |
2680 | struct inode *inode = mapping->host; |
2681 | ||
1d373a0e JK |
2682 | if (f2fs_has_inline_data(inode)) |
2683 | return 0; | |
2684 | ||
2685 | /* make sure allocating whole blocks */ | |
2686 | if (mapping_tagged(mapping, PAGECACHE_TAG_DIRTY)) | |
2687 | filemap_write_and_wait(mapping); | |
2688 | ||
e2b4e2bc | 2689 | return generic_block_bmap(mapping, block, get_data_block_bmap); |
429511cd CY |
2690 | } |
2691 | ||
5b7a487c WG |
2692 | #ifdef CONFIG_MIGRATION |
2693 | #include <linux/migrate.h> | |
2694 | ||
2695 | int f2fs_migrate_page(struct address_space *mapping, | |
2696 | struct page *newpage, struct page *page, enum migrate_mode mode) | |
2697 | { | |
2698 | int rc, extra_count; | |
2699 | struct f2fs_inode_info *fi = F2FS_I(mapping->host); | |
2700 | bool atomic_written = IS_ATOMIC_WRITTEN_PAGE(page); | |
2701 | ||
2702 | BUG_ON(PageWriteback(page)); | |
2703 | ||
2704 | /* migrating an atomic written page is safe with the inmem_lock hold */ | |
ff1048e7 JK |
2705 | if (atomic_written) { |
2706 | if (mode != MIGRATE_SYNC) | |
2707 | return -EBUSY; | |
2708 | if (!mutex_trylock(&fi->inmem_lock)) | |
2709 | return -EAGAIN; | |
2710 | } | |
5b7a487c WG |
2711 | |
2712 | /* | |
2713 | * A reference is expected if PagePrivate set when move mapping, | |
2714 | * however F2FS breaks this for maintaining dirty page counts when | |
2715 | * truncating pages. So here adjusting the 'extra_count' make it work. | |
2716 | */ | |
2717 | extra_count = (atomic_written ? 1 : 0) - page_has_private(page); | |
2718 | rc = migrate_page_move_mapping(mapping, newpage, | |
2719 | page, NULL, mode, extra_count); | |
2720 | if (rc != MIGRATEPAGE_SUCCESS) { | |
2721 | if (atomic_written) | |
2722 | mutex_unlock(&fi->inmem_lock); | |
2723 | return rc; | |
2724 | } | |
2725 | ||
2726 | if (atomic_written) { | |
2727 | struct inmem_pages *cur; | |
2728 | list_for_each_entry(cur, &fi->inmem_pages, list) | |
2729 | if (cur->page == page) { | |
2730 | cur->page = newpage; | |
2731 | break; | |
2732 | } | |
2733 | mutex_unlock(&fi->inmem_lock); | |
2734 | put_page(page); | |
2735 | get_page(newpage); | |
2736 | } | |
2737 | ||
2738 | if (PagePrivate(page)) | |
2739 | SetPagePrivate(newpage); | |
2740 | set_page_private(newpage, page_private(page)); | |
2741 | ||
2916ecc0 JG |
2742 | if (mode != MIGRATE_SYNC_NO_COPY) |
2743 | migrate_page_copy(newpage, page); | |
2744 | else | |
2745 | migrate_page_states(newpage, page); | |
5b7a487c WG |
2746 | |
2747 | return MIGRATEPAGE_SUCCESS; | |
2748 | } | |
2749 | #endif | |
2750 | ||
eb47b800 JK |
2751 | const struct address_space_operations f2fs_dblock_aops = { |
2752 | .readpage = f2fs_read_data_page, | |
2753 | .readpages = f2fs_read_data_pages, | |
2754 | .writepage = f2fs_write_data_page, | |
2755 | .writepages = f2fs_write_data_pages, | |
2756 | .write_begin = f2fs_write_begin, | |
a1dd3c13 | 2757 | .write_end = f2fs_write_end, |
eb47b800 | 2758 | .set_page_dirty = f2fs_set_data_page_dirty, |
487261f3 CY |
2759 | .invalidatepage = f2fs_invalidate_page, |
2760 | .releasepage = f2fs_release_page, | |
eb47b800 | 2761 | .direct_IO = f2fs_direct_IO, |
c01e54b7 | 2762 | .bmap = f2fs_bmap, |
5b7a487c WG |
2763 | #ifdef CONFIG_MIGRATION |
2764 | .migratepage = f2fs_migrate_page, | |
2765 | #endif | |
eb47b800 | 2766 | }; |
c6e638ae EB |
2767 | |
2768 | int __init f2fs_init_post_read_processing(void) | |
2769 | { | |
2770 | bio_post_read_ctx_cache = KMEM_CACHE(bio_post_read_ctx, 0); | |
2771 | if (!bio_post_read_ctx_cache) | |
2772 | goto fail; | |
2773 | bio_post_read_ctx_pool = | |
2774 | mempool_create_slab_pool(NUM_PREALLOC_POST_READ_CTXS, | |
2775 | bio_post_read_ctx_cache); | |
2776 | if (!bio_post_read_ctx_pool) | |
2777 | goto fail_free_cache; | |
2778 | return 0; | |
2779 | ||
2780 | fail_free_cache: | |
2781 | kmem_cache_destroy(bio_post_read_ctx_cache); | |
2782 | fail: | |
2783 | return -ENOMEM; | |
2784 | } | |
2785 | ||
2786 | void __exit f2fs_destroy_post_read_processing(void) | |
2787 | { | |
2788 | mempool_destroy(bio_post_read_ctx_pool); | |
2789 | kmem_cache_destroy(bio_post_read_ctx_cache); | |
2790 | } |