Revert "vfs: Delete the associated dentry when deleting a file"
[linux-2.6-block.git] / fs / ext4 / page-io.c
CommitLineData
b2441318 1// SPDX-License-Identifier: GPL-2.0
bd2d0210
TT
2/*
3 * linux/fs/ext4/page-io.c
4 *
5 * This contains the new page_io functions for ext4
6 *
7 * Written by Theodore Ts'o, 2010.
8 */
9
bd2d0210
TT
10#include <linux/fs.h>
11#include <linux/time.h>
bd2d0210
TT
12#include <linux/highuid.h>
13#include <linux/pagemap.h>
14#include <linux/quotaops.h>
15#include <linux/string.h>
16#include <linux/buffer_head.h>
17#include <linux/writeback.h>
18#include <linux/pagevec.h>
19#include <linux/mpage.h>
20#include <linux/namei.h>
21#include <linux/uio.h>
22#include <linux/bio.h>
23#include <linux/workqueue.h>
24#include <linux/kernel.h>
25#include <linux/slab.h>
1ae48a63 26#include <linux/mm.h>
4034247a 27#include <linux/sched/mm.h>
bd2d0210
TT
28
29#include "ext4_jbd2.h"
30#include "xattr.h"
31#include "acl.h"
bd2d0210 32
0058f965 33static struct kmem_cache *io_end_cachep;
c8cc8816 34static struct kmem_cache *io_end_vec_cachep;
bd2d0210 35
5dabfc78 36int __init ext4_init_pageio(void)
bd2d0210 37{
bd2d0210 38 io_end_cachep = KMEM_CACHE(ext4_io_end, SLAB_RECLAIM_ACCOUNT);
0058f965 39 if (io_end_cachep == NULL)
bd2d0210 40 return -ENOMEM;
c8cc8816
RH
41
42 io_end_vec_cachep = KMEM_CACHE(ext4_io_end_vec, 0);
43 if (io_end_vec_cachep == NULL) {
44 kmem_cache_destroy(io_end_cachep);
45 return -ENOMEM;
46 }
bd2d0210
TT
47 return 0;
48}
49
5dabfc78 50void ext4_exit_pageio(void)
bd2d0210
TT
51{
52 kmem_cache_destroy(io_end_cachep);
c8cc8816
RH
53 kmem_cache_destroy(io_end_vec_cachep);
54}
55
56struct ext4_io_end_vec *ext4_alloc_io_end_vec(ext4_io_end_t *io_end)
57{
58 struct ext4_io_end_vec *io_end_vec;
59
60 io_end_vec = kmem_cache_zalloc(io_end_vec_cachep, GFP_NOFS);
61 if (!io_end_vec)
62 return ERR_PTR(-ENOMEM);
63 INIT_LIST_HEAD(&io_end_vec->list);
64 list_add_tail(&io_end_vec->list, &io_end->list_vec);
65 return io_end_vec;
66}
67
68static void ext4_free_io_end_vec(ext4_io_end_t *io_end)
69{
70 struct ext4_io_end_vec *io_end_vec, *tmp;
71
72 if (list_empty(&io_end->list_vec))
73 return;
74 list_for_each_entry_safe(io_end_vec, tmp, &io_end->list_vec, list) {
75 list_del(&io_end_vec->list);
76 kmem_cache_free(io_end_vec_cachep, io_end_vec);
77 }
78}
79
80struct ext4_io_end_vec *ext4_last_io_end_vec(ext4_io_end_t *io_end)
81{
82 BUG_ON(list_empty(&io_end->list_vec));
83 return list_last_entry(&io_end->list_vec, struct ext4_io_end_vec, list);
bd2d0210
TT
84}
85
b0857d30
JK
86/*
87 * Print an buffer I/O error compatible with the fs/buffer.c. This
88 * provides compatibility with dmesg scrapers that look for a specific
89 * buffer I/O error message. We really need a unified error reporting
90 * structure to userspace ala Digital Unix's uerf system, but it's
91 * probably not going to happen in my lifetime, due to LKML politics...
92 */
93static void buffer_io_error(struct buffer_head *bh)
94{
a1c6f057
DM
95 printk_ratelimited(KERN_ERR "Buffer I/O error on device %pg, logical block %llu\n",
96 bh->b_bdev,
b0857d30
JK
97 (unsigned long long)bh->b_blocknr);
98}
99
100static void ext4_finish_bio(struct bio *bio)
101{
bb64c08b 102 struct folio_iter fi;
b0857d30 103
bb64c08b
MW
104 bio_for_each_folio_all(fi, bio) {
105 struct folio *folio = fi.folio;
106 struct folio *io_folio = NULL;
b0857d30 107 struct buffer_head *bh, *head;
bb64c08b
MW
108 size_t bio_start = fi.offset;
109 size_t bio_end = bio_start + fi.length;
b0857d30
JK
110 unsigned under_io = 0;
111 unsigned long flags;
112
bb64c08b
MW
113 if (fscrypt_is_bounce_folio(folio)) {
114 io_folio = folio;
115 folio = fscrypt_pagecache_folio(folio);
2058f83a 116 }
2058f83a 117
4e4cbee9 118 if (bio->bi_status) {
bb64c08b 119 int err = blk_status_to_errno(bio->bi_status);
bb64c08b 120 mapping_set_error(folio->mapping, err);
b0857d30 121 }
bb64c08b 122 bh = head = folio_buffers(folio);
b0857d30 123 /*
bb64c08b 124 * We check all buffers in the folio under b_uptodate_lock
b0857d30
JK
125 * to avoid races with other end io clearing async_write flags
126 */
f1e67e35 127 spin_lock_irqsave(&head->b_uptodate_lock, flags);
b0857d30
JK
128 do {
129 if (bh_offset(bh) < bio_start ||
130 bh_offset(bh) + bh->b_size > bio_end) {
131 if (buffer_async_write(bh))
132 under_io++;
133 continue;
134 }
135 clear_buffer_async_write(bh);
a2b0b205
YB
136 if (bio->bi_status) {
137 set_buffer_write_io_error(bh);
b0857d30 138 buffer_io_error(bh);
a2b0b205 139 }
b0857d30 140 } while ((bh = bh->b_this_page) != head);
f1e67e35 141 spin_unlock_irqrestore(&head->b_uptodate_lock, flags);
2058f83a 142 if (!under_io) {
bb64c08b
MW
143 fscrypt_free_bounce_page(&io_folio->page);
144 folio_end_writeback(folio);
2058f83a 145 }
b0857d30
JK
146 }
147}
148
97a851ed 149static void ext4_release_io_end(ext4_io_end_t *io_end)
bd2d0210 150{
b0857d30
JK
151 struct bio *bio, *next_bio;
152
97a851ed
JK
153 BUG_ON(!list_empty(&io_end->list));
154 BUG_ON(io_end->flag & EXT4_IO_END_UNWRITTEN);
6b523df4 155 WARN_ON(io_end->handle);
97a851ed 156
b0857d30
JK
157 for (bio = io_end->bio; bio; bio = next_bio) {
158 next_bio = bio->bi_private;
159 ext4_finish_bio(bio);
160 bio_put(bio);
161 }
c8cc8816 162 ext4_free_io_end_vec(io_end);
97a851ed
JK
163 kmem_cache_free(io_end_cachep, io_end);
164}
165
a115f749
JK
166/*
167 * Check a range of space and convert unwritten extents to written. Note that
168 * we are protected from truncate touching same part of extent tree by the
169 * fact that truncate code waits for all DIO to finish (thus exclusion from
170 * direct IO is achieved) and also waits for PageWriteback bits. Thus we
171 * cannot get to ext4_ext_truncate() before all IOs overlapping that range are
172 * completed (happens from ext4_free_ioend()).
173 */
821ff38d 174static int ext4_end_io_end(ext4_io_end_t *io_end)
bd2d0210 175{
821ff38d 176 struct inode *inode = io_end->inode;
821ff38d 177 handle_t *handle = io_end->handle;
bd2d0210
TT
178 int ret = 0;
179
821ff38d 180 ext4_debug("ext4_end_io_nolock: io_end 0x%p from inode %lu,list->next 0x%p,"
bd2d0210 181 "list->prev 0x%p\n",
821ff38d 182 io_end, inode->i_ino, io_end->list.next, io_end->list.prev);
bd2d0210 183
821ff38d 184 io_end->handle = NULL; /* Following call will use up the handle */
a00713ea 185 ret = ext4_convert_unwritten_io_end_vec(handle, io_end);
eb8ab444 186 if (ret < 0 && !ext4_forced_shutdown(inode->i_sb)) {
b82e384c
TT
187 ext4_msg(inode->i_sb, KERN_EMERG,
188 "failed to convert unwritten extents to written "
189 "extents -- potential data loss! "
c8cc8816 190 "(inode %lu, error %d)", inode->i_ino, ret);
bd2d0210 191 }
821ff38d
RH
192 ext4_clear_io_unwritten_flag(io_end);
193 ext4_release_io_end(io_end);
bd2d0210
TT
194 return ret;
195}
196
2e8fa54e 197static void dump_completed_IO(struct inode *inode, struct list_head *head)
28a535f9
DM
198{
199#ifdef EXT4FS_DEBUG
200 struct list_head *cur, *before, *after;
821ff38d 201 ext4_io_end_t *io_end, *io_end0, *io_end1;
28a535f9 202
2e8fa54e 203 if (list_empty(head))
28a535f9 204 return;
28a535f9 205
2e8fa54e 206 ext4_debug("Dump inode %lu completed io list\n", inode->i_ino);
821ff38d
RH
207 list_for_each_entry(io_end, head, list) {
208 cur = &io_end->list;
28a535f9 209 before = cur->prev;
821ff38d 210 io_end0 = container_of(before, ext4_io_end_t, list);
28a535f9 211 after = cur->next;
821ff38d 212 io_end1 = container_of(after, ext4_io_end_t, list);
28a535f9
DM
213
214 ext4_debug("io 0x%p from inode %lu,prev 0x%p,next 0x%p\n",
821ff38d 215 io_end, inode->i_ino, io_end0, io_end1);
28a535f9
DM
216 }
217#endif
218}
219
220/* Add the io_end to per-inode completed end_io list. */
97a851ed 221static void ext4_add_complete_io(ext4_io_end_t *io_end)
bd2d0210 222{
28a535f9 223 struct ext4_inode_info *ei = EXT4_I(io_end->inode);
78371a45 224 struct ext4_sb_info *sbi = EXT4_SB(io_end->inode->i_sb);
28a535f9
DM
225 struct workqueue_struct *wq;
226 unsigned long flags;
227
7b7a8665
CH
228 /* Only reserved conversions from writeback should enter here */
229 WARN_ON(!(io_end->flag & EXT4_IO_END_UNWRITTEN));
78371a45 230 WARN_ON(!io_end->handle && sbi->s_journal);
d73d5046 231 spin_lock_irqsave(&ei->i_completed_io_lock, flags);
78371a45 232 wq = sbi->rsv_conversion_wq;
7b7a8665
CH
233 if (list_empty(&ei->i_rsv_conversion_list))
234 queue_work(wq, &ei->i_rsv_conversion_work);
235 list_add_tail(&io_end->list, &ei->i_rsv_conversion_list);
28a535f9
DM
236 spin_unlock_irqrestore(&ei->i_completed_io_lock, flags);
237}
d73d5046 238
2e8fa54e
JK
239static int ext4_do_flush_completed_IO(struct inode *inode,
240 struct list_head *head)
28a535f9 241{
821ff38d 242 ext4_io_end_t *io_end;
002bd7fa 243 struct list_head unwritten;
28a535f9
DM
244 unsigned long flags;
245 struct ext4_inode_info *ei = EXT4_I(inode);
246 int err, ret = 0;
247
28a535f9 248 spin_lock_irqsave(&ei->i_completed_io_lock, flags);
2e8fa54e
JK
249 dump_completed_IO(inode, head);
250 list_replace_init(head, &unwritten);
28a535f9
DM
251 spin_unlock_irqrestore(&ei->i_completed_io_lock, flags);
252
253 while (!list_empty(&unwritten)) {
821ff38d
RH
254 io_end = list_entry(unwritten.next, ext4_io_end_t, list);
255 BUG_ON(!(io_end->flag & EXT4_IO_END_UNWRITTEN));
256 list_del_init(&io_end->list);
28a535f9 257
821ff38d 258 err = ext4_end_io_end(io_end);
28a535f9
DM
259 if (unlikely(!ret && err))
260 ret = err;
28a535f9
DM
261 }
262 return ret;
263}
264
265/*
2e8fa54e 266 * work on completed IO, to convert unwritten extents to extents
28a535f9 267 */
2e8fa54e
JK
268void ext4_end_io_rsv_work(struct work_struct *work)
269{
270 struct ext4_inode_info *ei = container_of(work, struct ext4_inode_info,
271 i_rsv_conversion_work);
272 ext4_do_flush_completed_IO(&ei->vfs_inode, &ei->i_rsv_conversion_list);
273}
274
bd2d0210
TT
275ext4_io_end_t *ext4_init_io_end(struct inode *inode, gfp_t flags)
276{
821ff38d
RH
277 ext4_io_end_t *io_end = kmem_cache_zalloc(io_end_cachep, flags);
278
279 if (io_end) {
280 io_end->inode = inode;
281 INIT_LIST_HEAD(&io_end->list);
c8cc8816 282 INIT_LIST_HEAD(&io_end->list_vec);
31d21d21 283 refcount_set(&io_end->count, 1);
bd2d0210 284 }
821ff38d 285 return io_end;
bd2d0210
TT
286}
287
97a851ed
JK
288void ext4_put_io_end_defer(ext4_io_end_t *io_end)
289{
31d21d21 290 if (refcount_dec_and_test(&io_end->count)) {
c8cc8816
RH
291 if (!(io_end->flag & EXT4_IO_END_UNWRITTEN) ||
292 list_empty(&io_end->list_vec)) {
97a851ed
JK
293 ext4_release_io_end(io_end);
294 return;
295 }
296 ext4_add_complete_io(io_end);
297 }
298}
299
300int ext4_put_io_end(ext4_io_end_t *io_end)
301{
302 int err = 0;
303
31d21d21 304 if (refcount_dec_and_test(&io_end->count)) {
97a851ed 305 if (io_end->flag & EXT4_IO_END_UNWRITTEN) {
a00713ea
RH
306 err = ext4_convert_unwritten_io_end_vec(io_end->handle,
307 io_end);
6b523df4 308 io_end->handle = NULL;
97a851ed
JK
309 ext4_clear_io_unwritten_flag(io_end);
310 }
311 ext4_release_io_end(io_end);
312 }
313 return err;
314}
315
316ext4_io_end_t *ext4_get_io_end(ext4_io_end_t *io_end)
317{
31d21d21 318 refcount_inc(&io_end->count);
97a851ed
JK
319 return io_end;
320}
321
822dbba3 322/* BIO completion function for page writeback */
4246a0b6 323static void ext4_end_bio(struct bio *bio)
bd2d0210
TT
324{
325 ext4_io_end_t *io_end = bio->bi_private;
4f024f37 326 sector_t bi_sector = bio->bi_iter.bi_sector;
bd2d0210 327
734294e4
CH
328 if (WARN_ONCE(!io_end, "io_end is NULL: %pg: sector %Lu len %u err %d\n",
329 bio->bi_bdev,
72d622b4
TT
330 (long long) bio->bi_iter.bi_sector,
331 (unsigned) bio_sectors(bio),
4e4cbee9 332 bio->bi_status)) {
72d622b4
TT
333 ext4_finish_bio(bio);
334 bio_put(bio);
335 return;
336 }
bd2d0210 337 bio->bi_end_io = NULL;
0058f965 338
4e4cbee9 339 if (bio->bi_status) {
b0857d30
JK
340 struct inode *inode = io_end->inode;
341
9503c67c 342 ext4_warning(inode->i_sb, "I/O error %d writing to inode %lu "
c8cc8816 343 "starting block %llu)",
4e4cbee9 344 bio->bi_status, inode->i_ino,
f7ad6d2e 345 (unsigned long long)
d50bdd5a 346 bi_sector >> (inode->i_blkbits - 9));
4e4cbee9
CH
347 mapping_set_error(inode->i_mapping,
348 blk_status_to_errno(bio->bi_status));
f7ad6d2e 349 }
822dbba3
JK
350
351 if (io_end->flag & EXT4_IO_END_UNWRITTEN) {
352 /*
353 * Link bio into list hanging from io_end. We have to do it
354 * atomically as bio completions can be racing against each
355 * other.
356 */
357 bio->bi_private = xchg(&io_end->bio, bio);
358 ext4_put_io_end_defer(io_end);
359 } else {
360 /*
361 * Drop io_end reference early. Inode can get freed once
362 * we finish the bio.
363 */
364 ext4_put_io_end_defer(io_end);
365 ext4_finish_bio(bio);
366 bio_put(bio);
367 }
bd2d0210
TT
368}
369
370void ext4_io_submit(struct ext4_io_submit *io)
371{
372 struct bio *bio = io->io_bio;
373
374 if (bio) {
4c4dad11
CH
375 if (io->io_wbc->sync_mode == WB_SYNC_ALL)
376 io->io_bio->bi_opf |= REQ_SYNC;
4e49ea4a 377 submit_bio(io->io_bio);
bd2d0210 378 }
7dc57615 379 io->io_bio = NULL;
97a851ed
JK
380}
381
382void ext4_io_submit_init(struct ext4_io_submit *io,
383 struct writeback_control *wbc)
384{
5a33911f 385 io->io_wbc = wbc;
97a851ed 386 io->io_bio = NULL;
7dc57615 387 io->io_end = NULL;
bd2d0210
TT
388}
389
5500221e
GX
390static void io_submit_init_bio(struct ext4_io_submit *io,
391 struct buffer_head *bh)
bd2d0210 392{
bd2d0210
TT
393 struct bio *bio;
394
5500221e
GX
395 /*
396 * bio_alloc will _always_ be able to allocate a bio if
397 * __GFP_DIRECT_RECLAIM is set, see comments for bio_alloc_bioset().
398 */
4c4dad11 399 bio = bio_alloc(bh->b_bdev, BIO_MAX_VECS, REQ_OP_WRITE, GFP_NOIO);
4f74d15f 400 fscrypt_set_bio_crypt_ctx_bh(bio, bh, GFP_NOIO);
4f024f37 401 bio->bi_iter.bi_sector = bh->b_blocknr * (bh->b_size >> 9);
bd2d0210 402 bio->bi_end_io = ext4_end_bio;
97a851ed 403 bio->bi_private = ext4_get_io_end(io->io_end);
bd2d0210 404 io->io_bio = bio;
bd2d0210 405 io->io_next_block = bh->b_blocknr;
fd42df30 406 wbc_init_bio(io->io_wbc, bio);
bd2d0210
TT
407}
408
5500221e
GX
409static void io_submit_add_bh(struct ext4_io_submit *io,
410 struct inode *inode,
cd57b771
MW
411 struct folio *folio,
412 struct folio *io_folio,
5500221e 413 struct buffer_head *bh)
bd2d0210 414{
4f74d15f
EB
415 if (io->io_bio && (bh->b_blocknr != io->io_next_block ||
416 !fscrypt_mergeable_bio_bh(io->io_bio, bh))) {
bd2d0210
TT
417submit_and_retry:
418 ext4_io_submit(io);
419 }
c75e707f 420 if (io->io_bio == NULL)
5500221e 421 io_submit_init_bio(io, bh);
cd57b771 422 if (!bio_add_folio(io->io_bio, io_folio, bh->b_size, bh_offset(bh)))
97a851ed 423 goto submit_and_retry;
cd57b771 424 wbc_account_cgroup_owner(io->io_wbc, &folio->page, bh->b_size);
bd2d0210 425 io->io_next_block++;
bd2d0210
TT
426}
427
e8d6062c
MW
428int ext4_bio_write_folio(struct ext4_io_submit *io, struct folio *folio,
429 size_t len)
bd2d0210 430{
cd57b771
MW
431 struct folio *io_folio = folio;
432 struct inode *inode = folio->mapping->host;
18017479 433 unsigned block_start;
bd2d0210
TT
434 struct buffer_head *bh, *head;
435 int ret = 0;
937d7b84 436 int nr_to_submit = 0;
be993933 437 struct writeback_control *wbc = io->io_wbc;
dff4ac75 438 bool keep_towrite = false;
bd2d0210 439
cd57b771
MW
440 BUG_ON(!folio_test_locked(folio));
441 BUG_ON(folio_test_writeback(folio));
bd2d0210 442
eeece469 443 /*
17bf23a9 444 * Comments copied from block_write_full_folio:
eeece469 445 *
cd57b771 446 * The folio straddles i_size. It must be zeroed out on each and every
eeece469
JK
447 * writepage invocation because it may be mmapped. "A file is mapped
448 * in multiples of the page size. For a file that is not a multiple of
449 * the page size, the remaining memory is zeroed when mapped, and
450 * writes to that region are not written out to the file."
451 */
cd57b771
MW
452 if (len < folio_size(folio))
453 folio_zero_segment(folio, len, folio_size(folio));
0058f965
JK
454 /*
455 * In the first loop we prepare and mark buffers to submit. We have to
cd57b771
MW
456 * mark all buffers in the folio before submitting so that
457 * folio_end_writeback() cannot be called from ext4_end_bio() when IO
0058f965
JK
458 * on the first buffer finishes and we are still working on submitting
459 * the second buffer.
460 */
cd57b771 461 bh = head = folio_buffers(folio);
0058f965
JK
462 do {
463 block_start = bh_offset(bh);
bd2d0210
TT
464 if (block_start >= len) {
465 clear_buffer_dirty(bh);
466 set_buffer_uptodate(bh);
467 continue;
468 }
8a850c3f
JK
469 if (!buffer_dirty(bh) || buffer_delay(bh) ||
470 !buffer_mapped(bh) || buffer_unwritten(bh)) {
471 /* A hole? We can safely clear the dirty bit */
472 if (!buffer_mapped(bh))
473 clear_buffer_dirty(bh);
04e568a3 474 /*
dff4ac75 475 * Keeping dirty some buffer we cannot write? Make sure
cd57b771
MW
476 * to redirty the folio and keep TOWRITE tag so that
477 * racing WB_SYNC_ALL writeback does not skip the folio.
dff4ac75 478 * This happens e.g. when doing writeout for
265e72ef
JK
479 * transaction commit or when journalled data is not
480 * yet committed.
04e568a3 481 */
265e72ef
JK
482 if (buffer_dirty(bh) ||
483 (buffer_jbd(bh) && buffer_jbddirty(bh))) {
cd57b771
MW
484 if (!folio_test_dirty(folio))
485 folio_redirty_for_writepage(wbc, folio);
dff4ac75
JK
486 keep_towrite = true;
487 }
8a850c3f
JK
488 continue;
489 }
16e08b14 490 if (buffer_new(bh))
0058f965 491 clear_buffer_new(bh);
0058f965 492 set_buffer_async_write(bh);
04e568a3 493 clear_buffer_dirty(bh);
937d7b84 494 nr_to_submit++;
0058f965
JK
495 } while ((bh = bh->b_this_page) != head);
496
cd57b771 497 /* Nothing to submit? Just unlock the folio... */
dff4ac75 498 if (!nr_to_submit)
f1496362 499 return 0;
dff4ac75 500
cd57b771 501 bh = head = folio_buffers(folio);
2058f83a 502
6e4b73bc
EB
503 /*
504 * If any blocks are being written to an encrypted file, encrypt them
505 * into a bounce page. For simplicity, just encrypt until the last
506 * block which might be needed. This may cause some unneeded blocks
507 * (e.g. holes) to be unnecessarily encrypted, but this is rare and
508 * can't happen in the common case of blocksize == PAGE_SIZE.
509 */
8ae56b4e 510 if (fscrypt_inode_uses_fs_layer_crypto(inode)) {
c9af28fd 511 gfp_t gfp_flags = GFP_NOFS;
6e4b73bc 512 unsigned int enc_bytes = round_up(len, i_blocksize(inode));
cd57b771 513 struct page *bounce_page;
c9af28fd 514
547c556f
EB
515 /*
516 * Since bounce page allocation uses a mempool, we can only use
517 * a waiting mask (i.e. request guaranteed allocation) on the
518 * first page of the bio. Otherwise it can deadlock.
519 */
520 if (io->io_bio)
521 gfp_flags = GFP_NOWAIT | __GFP_NOWARN;
c9af28fd 522 retry_encrypt:
e8d6062c
MW
523 bounce_page = fscrypt_encrypt_pagecache_blocks(&folio->page,
524 enc_bytes, 0, gfp_flags);
d2d0727b
EB
525 if (IS_ERR(bounce_page)) {
526 ret = PTR_ERR(bounce_page);
547c556f
EB
527 if (ret == -ENOMEM &&
528 (io->io_bio || wbc->sync_mode == WB_SYNC_ALL)) {
4034247a 529 gfp_t new_gfp_flags = GFP_NOFS;
547c556f 530 if (io->io_bio)
c9af28fd 531 ext4_io_submit(io);
547c556f 532 else
4034247a
N
533 new_gfp_flags |= __GFP_NOFAIL;
534 memalloc_retry_wait(gfp_flags);
535 gfp_flags = new_gfp_flags;
c9af28fd
TT
536 goto retry_encrypt;
537 }
5500221e
GX
538
539 printk_ratelimited(KERN_ERR "%s: ret = %d\n", __func__, ret);
cd57b771 540 folio_redirty_for_writepage(wbc, folio);
5500221e 541 do {
04e568a3
JK
542 if (buffer_async_write(bh)) {
543 clear_buffer_async_write(bh);
544 set_buffer_dirty(bh);
545 }
5500221e
GX
546 bh = bh->b_this_page;
547 } while (bh != head);
f1496362
JK
548
549 return ret;
2058f83a 550 }
cd57b771 551 io_folio = page_folio(bounce_page);
2058f83a
MH
552 }
553
cd57b771 554 __folio_start_writeback(folio, keep_towrite);
dff4ac75 555
2058f83a 556 /* Now submit buffers to write */
0058f965
JK
557 do {
558 if (!buffer_async_write(bh))
559 continue;
cd57b771 560 io_submit_add_bh(io, inode, folio, io_folio, bh);
0058f965 561 } while ((bh = bh->b_this_page) != head);
f1496362
JK
562
563 return 0;
bd2d0210 564}