Commit | Line | Data |
---|---|---|
bd2d0210 TT |
1 | /* |
2 | * linux/fs/ext4/page-io.c | |
3 | * | |
4 | * This contains the new page_io functions for ext4 | |
5 | * | |
6 | * Written by Theodore Ts'o, 2010. | |
7 | */ | |
8 | ||
bd2d0210 TT |
9 | #include <linux/fs.h> |
10 | #include <linux/time.h> | |
bd2d0210 TT |
11 | #include <linux/highuid.h> |
12 | #include <linux/pagemap.h> | |
13 | #include <linux/quotaops.h> | |
14 | #include <linux/string.h> | |
15 | #include <linux/buffer_head.h> | |
16 | #include <linux/writeback.h> | |
17 | #include <linux/pagevec.h> | |
18 | #include <linux/mpage.h> | |
19 | #include <linux/namei.h> | |
20 | #include <linux/uio.h> | |
21 | #include <linux/bio.h> | |
22 | #include <linux/workqueue.h> | |
23 | #include <linux/kernel.h> | |
24 | #include <linux/slab.h> | |
1ae48a63 | 25 | #include <linux/mm.h> |
c9af28fd | 26 | #include <linux/backing-dev.h> |
bd2d0210 TT |
27 | |
28 | #include "ext4_jbd2.h" | |
29 | #include "xattr.h" | |
30 | #include "acl.h" | |
bd2d0210 | 31 | |
0058f965 | 32 | static struct kmem_cache *io_end_cachep; |
bd2d0210 | 33 | |
5dabfc78 | 34 | int __init ext4_init_pageio(void) |
bd2d0210 | 35 | { |
bd2d0210 | 36 | io_end_cachep = KMEM_CACHE(ext4_io_end, SLAB_RECLAIM_ACCOUNT); |
0058f965 | 37 | if (io_end_cachep == NULL) |
bd2d0210 | 38 | return -ENOMEM; |
bd2d0210 TT |
39 | return 0; |
40 | } | |
41 | ||
5dabfc78 | 42 | void ext4_exit_pageio(void) |
bd2d0210 TT |
43 | { |
44 | kmem_cache_destroy(io_end_cachep); | |
bd2d0210 TT |
45 | } |
46 | ||
b0857d30 JK |
47 | /* |
48 | * Print an buffer I/O error compatible with the fs/buffer.c. This | |
49 | * provides compatibility with dmesg scrapers that look for a specific | |
50 | * buffer I/O error message. We really need a unified error reporting | |
51 | * structure to userspace ala Digital Unix's uerf system, but it's | |
52 | * probably not going to happen in my lifetime, due to LKML politics... | |
53 | */ | |
54 | static void buffer_io_error(struct buffer_head *bh) | |
55 | { | |
a1c6f057 DM |
56 | printk_ratelimited(KERN_ERR "Buffer I/O error on device %pg, logical block %llu\n", |
57 | bh->b_bdev, | |
b0857d30 JK |
58 | (unsigned long long)bh->b_blocknr); |
59 | } | |
60 | ||
61 | static void ext4_finish_bio(struct bio *bio) | |
62 | { | |
63 | int i; | |
2c30c71b | 64 | struct bio_vec *bvec; |
b0857d30 | 65 | |
2c30c71b | 66 | bio_for_each_segment_all(bvec, bio, i) { |
b0857d30 | 67 | struct page *page = bvec->bv_page; |
2058f83a MH |
68 | #ifdef CONFIG_EXT4_FS_ENCRYPTION |
69 | struct page *data_page = NULL; | |
2058f83a | 70 | #endif |
b0857d30 JK |
71 | struct buffer_head *bh, *head; |
72 | unsigned bio_start = bvec->bv_offset; | |
73 | unsigned bio_end = bio_start + bvec->bv_len; | |
74 | unsigned under_io = 0; | |
75 | unsigned long flags; | |
76 | ||
77 | if (!page) | |
78 | continue; | |
79 | ||
2058f83a MH |
80 | #ifdef CONFIG_EXT4_FS_ENCRYPTION |
81 | if (!page->mapping) { | |
82 | /* The bounce data pages are unmapped. */ | |
83 | data_page = page; | |
a7550b30 | 84 | fscrypt_pullback_bio_page(&page, false); |
2058f83a MH |
85 | } |
86 | #endif | |
87 | ||
4246a0b6 | 88 | if (bio->bi_error) { |
b0857d30 | 89 | SetPageError(page); |
5114a97a | 90 | mapping_set_error(page->mapping, -EIO); |
b0857d30 JK |
91 | } |
92 | bh = head = page_buffers(page); | |
93 | /* | |
94 | * We check all buffers in the page under BH_Uptodate_Lock | |
95 | * to avoid races with other end io clearing async_write flags | |
96 | */ | |
97 | local_irq_save(flags); | |
98 | bit_spin_lock(BH_Uptodate_Lock, &head->b_state); | |
99 | do { | |
100 | if (bh_offset(bh) < bio_start || | |
101 | bh_offset(bh) + bh->b_size > bio_end) { | |
102 | if (buffer_async_write(bh)) | |
103 | under_io++; | |
104 | continue; | |
105 | } | |
106 | clear_buffer_async_write(bh); | |
4246a0b6 | 107 | if (bio->bi_error) |
b0857d30 JK |
108 | buffer_io_error(bh); |
109 | } while ((bh = bh->b_this_page) != head); | |
110 | bit_spin_unlock(BH_Uptodate_Lock, &head->b_state); | |
111 | local_irq_restore(flags); | |
2058f83a MH |
112 | if (!under_io) { |
113 | #ifdef CONFIG_EXT4_FS_ENCRYPTION | |
a7550b30 JK |
114 | if (data_page) |
115 | fscrypt_restore_control_page(data_page); | |
2058f83a | 116 | #endif |
b0857d30 | 117 | end_page_writeback(page); |
2058f83a | 118 | } |
b0857d30 JK |
119 | } |
120 | } | |
121 | ||
97a851ed | 122 | static void ext4_release_io_end(ext4_io_end_t *io_end) |
bd2d0210 | 123 | { |
b0857d30 JK |
124 | struct bio *bio, *next_bio; |
125 | ||
97a851ed JK |
126 | BUG_ON(!list_empty(&io_end->list)); |
127 | BUG_ON(io_end->flag & EXT4_IO_END_UNWRITTEN); | |
6b523df4 | 128 | WARN_ON(io_end->handle); |
97a851ed | 129 | |
b0857d30 JK |
130 | for (bio = io_end->bio; bio; bio = next_bio) { |
131 | next_bio = bio->bi_private; | |
132 | ext4_finish_bio(bio); | |
133 | bio_put(bio); | |
134 | } | |
97a851ed JK |
135 | kmem_cache_free(io_end_cachep, io_end); |
136 | } | |
137 | ||
a115f749 JK |
138 | /* |
139 | * Check a range of space and convert unwritten extents to written. Note that | |
140 | * we are protected from truncate touching same part of extent tree by the | |
141 | * fact that truncate code waits for all DIO to finish (thus exclusion from | |
142 | * direct IO is achieved) and also waits for PageWriteback bits. Thus we | |
143 | * cannot get to ext4_ext_truncate() before all IOs overlapping that range are | |
144 | * completed (happens from ext4_free_ioend()). | |
145 | */ | |
28a535f9 | 146 | static int ext4_end_io(ext4_io_end_t *io) |
bd2d0210 TT |
147 | { |
148 | struct inode *inode = io->inode; | |
149 | loff_t offset = io->offset; | |
150 | ssize_t size = io->size; | |
6b523df4 | 151 | handle_t *handle = io->handle; |
bd2d0210 TT |
152 | int ret = 0; |
153 | ||
154 | ext4_debug("ext4_end_io_nolock: io 0x%p from inode %lu,list->next 0x%p," | |
155 | "list->prev 0x%p\n", | |
156 | io, inode->i_ino, io->list.next, io->list.prev); | |
157 | ||
6b523df4 JK |
158 | io->handle = NULL; /* Following call will use up the handle */ |
159 | ret = ext4_convert_unwritten_extents(handle, inode, offset, size); | |
0db1ff22 | 160 | if (ret < 0 && !ext4_forced_shutdown(EXT4_SB(inode->i_sb))) { |
b82e384c TT |
161 | ext4_msg(inode->i_sb, KERN_EMERG, |
162 | "failed to convert unwritten extents to written " | |
163 | "extents -- potential data loss! " | |
164 | "(inode %lu, offset %llu, size %zd, error %d)", | |
165 | inode->i_ino, offset, size, ret); | |
bd2d0210 | 166 | } |
97a851ed JK |
167 | ext4_clear_io_unwritten_flag(io); |
168 | ext4_release_io_end(io); | |
bd2d0210 TT |
169 | return ret; |
170 | } | |
171 | ||
2e8fa54e | 172 | static void dump_completed_IO(struct inode *inode, struct list_head *head) |
28a535f9 DM |
173 | { |
174 | #ifdef EXT4FS_DEBUG | |
175 | struct list_head *cur, *before, *after; | |
176 | ext4_io_end_t *io, *io0, *io1; | |
28a535f9 | 177 | |
2e8fa54e | 178 | if (list_empty(head)) |
28a535f9 | 179 | return; |
28a535f9 | 180 | |
2e8fa54e JK |
181 | ext4_debug("Dump inode %lu completed io list\n", inode->i_ino); |
182 | list_for_each_entry(io, head, list) { | |
28a535f9 DM |
183 | cur = &io->list; |
184 | before = cur->prev; | |
185 | io0 = container_of(before, ext4_io_end_t, list); | |
186 | after = cur->next; | |
187 | io1 = container_of(after, ext4_io_end_t, list); | |
188 | ||
189 | ext4_debug("io 0x%p from inode %lu,prev 0x%p,next 0x%p\n", | |
190 | io, inode->i_ino, io0, io1); | |
191 | } | |
192 | #endif | |
193 | } | |
194 | ||
195 | /* Add the io_end to per-inode completed end_io list. */ | |
97a851ed | 196 | static void ext4_add_complete_io(ext4_io_end_t *io_end) |
bd2d0210 | 197 | { |
28a535f9 | 198 | struct ext4_inode_info *ei = EXT4_I(io_end->inode); |
78371a45 | 199 | struct ext4_sb_info *sbi = EXT4_SB(io_end->inode->i_sb); |
28a535f9 DM |
200 | struct workqueue_struct *wq; |
201 | unsigned long flags; | |
202 | ||
7b7a8665 CH |
203 | /* Only reserved conversions from writeback should enter here */ |
204 | WARN_ON(!(io_end->flag & EXT4_IO_END_UNWRITTEN)); | |
78371a45 | 205 | WARN_ON(!io_end->handle && sbi->s_journal); |
d73d5046 | 206 | spin_lock_irqsave(&ei->i_completed_io_lock, flags); |
78371a45 | 207 | wq = sbi->rsv_conversion_wq; |
7b7a8665 CH |
208 | if (list_empty(&ei->i_rsv_conversion_list)) |
209 | queue_work(wq, &ei->i_rsv_conversion_work); | |
210 | list_add_tail(&io_end->list, &ei->i_rsv_conversion_list); | |
28a535f9 DM |
211 | spin_unlock_irqrestore(&ei->i_completed_io_lock, flags); |
212 | } | |
d73d5046 | 213 | |
2e8fa54e JK |
214 | static int ext4_do_flush_completed_IO(struct inode *inode, |
215 | struct list_head *head) | |
28a535f9 DM |
216 | { |
217 | ext4_io_end_t *io; | |
002bd7fa | 218 | struct list_head unwritten; |
28a535f9 DM |
219 | unsigned long flags; |
220 | struct ext4_inode_info *ei = EXT4_I(inode); | |
221 | int err, ret = 0; | |
222 | ||
28a535f9 | 223 | spin_lock_irqsave(&ei->i_completed_io_lock, flags); |
2e8fa54e JK |
224 | dump_completed_IO(inode, head); |
225 | list_replace_init(head, &unwritten); | |
28a535f9 DM |
226 | spin_unlock_irqrestore(&ei->i_completed_io_lock, flags); |
227 | ||
228 | while (!list_empty(&unwritten)) { | |
229 | io = list_entry(unwritten.next, ext4_io_end_t, list); | |
230 | BUG_ON(!(io->flag & EXT4_IO_END_UNWRITTEN)); | |
231 | list_del_init(&io->list); | |
232 | ||
233 | err = ext4_end_io(io); | |
234 | if (unlikely(!ret && err)) | |
235 | ret = err; | |
28a535f9 DM |
236 | } |
237 | return ret; | |
238 | } | |
239 | ||
240 | /* | |
2e8fa54e | 241 | * work on completed IO, to convert unwritten extents to extents |
28a535f9 | 242 | */ |
2e8fa54e JK |
243 | void ext4_end_io_rsv_work(struct work_struct *work) |
244 | { | |
245 | struct ext4_inode_info *ei = container_of(work, struct ext4_inode_info, | |
246 | i_rsv_conversion_work); | |
247 | ext4_do_flush_completed_IO(&ei->vfs_inode, &ei->i_rsv_conversion_list); | |
248 | } | |
249 | ||
bd2d0210 TT |
250 | ext4_io_end_t *ext4_init_io_end(struct inode *inode, gfp_t flags) |
251 | { | |
b17b35ec | 252 | ext4_io_end_t *io = kmem_cache_zalloc(io_end_cachep, flags); |
bd2d0210 | 253 | if (io) { |
f7ad6d2e | 254 | io->inode = inode; |
bd2d0210 | 255 | INIT_LIST_HEAD(&io->list); |
97a851ed | 256 | atomic_set(&io->count, 1); |
bd2d0210 TT |
257 | } |
258 | return io; | |
259 | } | |
260 | ||
97a851ed JK |
261 | void ext4_put_io_end_defer(ext4_io_end_t *io_end) |
262 | { | |
263 | if (atomic_dec_and_test(&io_end->count)) { | |
264 | if (!(io_end->flag & EXT4_IO_END_UNWRITTEN) || !io_end->size) { | |
265 | ext4_release_io_end(io_end); | |
266 | return; | |
267 | } | |
268 | ext4_add_complete_io(io_end); | |
269 | } | |
270 | } | |
271 | ||
272 | int ext4_put_io_end(ext4_io_end_t *io_end) | |
273 | { | |
274 | int err = 0; | |
275 | ||
276 | if (atomic_dec_and_test(&io_end->count)) { | |
277 | if (io_end->flag & EXT4_IO_END_UNWRITTEN) { | |
6b523df4 JK |
278 | err = ext4_convert_unwritten_extents(io_end->handle, |
279 | io_end->inode, io_end->offset, | |
280 | io_end->size); | |
281 | io_end->handle = NULL; | |
97a851ed JK |
282 | ext4_clear_io_unwritten_flag(io_end); |
283 | } | |
284 | ext4_release_io_end(io_end); | |
285 | } | |
286 | return err; | |
287 | } | |
288 | ||
289 | ext4_io_end_t *ext4_get_io_end(ext4_io_end_t *io_end) | |
290 | { | |
291 | atomic_inc(&io_end->count); | |
292 | return io_end; | |
293 | } | |
294 | ||
822dbba3 | 295 | /* BIO completion function for page writeback */ |
4246a0b6 | 296 | static void ext4_end_bio(struct bio *bio) |
bd2d0210 TT |
297 | { |
298 | ext4_io_end_t *io_end = bio->bi_private; | |
4f024f37 | 299 | sector_t bi_sector = bio->bi_iter.bi_sector; |
72d622b4 | 300 | char b[BDEVNAME_SIZE]; |
bd2d0210 | 301 | |
72d622b4 TT |
302 | if (WARN_ONCE(!io_end, "io_end is NULL: %s: sector %Lu len %u err %d\n", |
303 | bdevname(bio->bi_bdev, b), | |
304 | (long long) bio->bi_iter.bi_sector, | |
305 | (unsigned) bio_sectors(bio), | |
306 | bio->bi_error)) { | |
307 | ext4_finish_bio(bio); | |
308 | bio_put(bio); | |
309 | return; | |
310 | } | |
bd2d0210 | 311 | bio->bi_end_io = NULL; |
0058f965 | 312 | |
4246a0b6 | 313 | if (bio->bi_error) { |
b0857d30 JK |
314 | struct inode *inode = io_end->inode; |
315 | ||
9503c67c | 316 | ext4_warning(inode->i_sb, "I/O error %d writing to inode %lu " |
f7ad6d2e | 317 | "(offset %llu size %ld starting block %llu)", |
4246a0b6 | 318 | bio->bi_error, inode->i_ino, |
f7ad6d2e TT |
319 | (unsigned long long) io_end->offset, |
320 | (long) io_end->size, | |
321 | (unsigned long long) | |
d50bdd5a | 322 | bi_sector >> (inode->i_blkbits - 9)); |
4246a0b6 | 323 | mapping_set_error(inode->i_mapping, bio->bi_error); |
f7ad6d2e | 324 | } |
822dbba3 JK |
325 | |
326 | if (io_end->flag & EXT4_IO_END_UNWRITTEN) { | |
327 | /* | |
328 | * Link bio into list hanging from io_end. We have to do it | |
329 | * atomically as bio completions can be racing against each | |
330 | * other. | |
331 | */ | |
332 | bio->bi_private = xchg(&io_end->bio, bio); | |
333 | ext4_put_io_end_defer(io_end); | |
334 | } else { | |
335 | /* | |
336 | * Drop io_end reference early. Inode can get freed once | |
337 | * we finish the bio. | |
338 | */ | |
339 | ext4_put_io_end_defer(io_end); | |
340 | ext4_finish_bio(bio); | |
341 | bio_put(bio); | |
342 | } | |
bd2d0210 TT |
343 | } |
344 | ||
345 | void ext4_io_submit(struct ext4_io_submit *io) | |
346 | { | |
347 | struct bio *bio = io->io_bio; | |
348 | ||
349 | if (bio) { | |
95fe6c1a | 350 | int io_op_flags = io->io_wbc->sync_mode == WB_SYNC_ALL ? |
70fd7614 | 351 | REQ_SYNC : 0; |
95fe6c1a | 352 | bio_set_op_attrs(io->io_bio, REQ_OP_WRITE, io_op_flags); |
4e49ea4a | 353 | submit_bio(io->io_bio); |
bd2d0210 | 354 | } |
7dc57615 | 355 | io->io_bio = NULL; |
97a851ed JK |
356 | } |
357 | ||
358 | void ext4_io_submit_init(struct ext4_io_submit *io, | |
359 | struct writeback_control *wbc) | |
360 | { | |
5a33911f | 361 | io->io_wbc = wbc; |
97a851ed | 362 | io->io_bio = NULL; |
7dc57615 | 363 | io->io_end = NULL; |
bd2d0210 TT |
364 | } |
365 | ||
97a851ed JK |
366 | static int io_submit_init_bio(struct ext4_io_submit *io, |
367 | struct buffer_head *bh) | |
bd2d0210 | 368 | { |
bd2d0210 TT |
369 | struct bio *bio; |
370 | ||
b54ffb73 | 371 | bio = bio_alloc(GFP_NOIO, BIO_MAX_PAGES); |
a1d8d9a7 TT |
372 | if (!bio) |
373 | return -ENOMEM; | |
001e4a87 | 374 | wbc_init_bio(io->io_wbc, bio); |
4f024f37 | 375 | bio->bi_iter.bi_sector = bh->b_blocknr * (bh->b_size >> 9); |
bd2d0210 | 376 | bio->bi_bdev = bh->b_bdev; |
bd2d0210 | 377 | bio->bi_end_io = ext4_end_bio; |
97a851ed | 378 | bio->bi_private = ext4_get_io_end(io->io_end); |
bd2d0210 | 379 | io->io_bio = bio; |
bd2d0210 TT |
380 | io->io_next_block = bh->b_blocknr; |
381 | return 0; | |
382 | } | |
383 | ||
384 | static int io_submit_add_bh(struct ext4_io_submit *io, | |
bd2d0210 | 385 | struct inode *inode, |
2058f83a | 386 | struct page *page, |
bd2d0210 TT |
387 | struct buffer_head *bh) |
388 | { | |
bd2d0210 TT |
389 | int ret; |
390 | ||
bd2d0210 TT |
391 | if (io->io_bio && bh->b_blocknr != io->io_next_block) { |
392 | submit_and_retry: | |
393 | ext4_io_submit(io); | |
394 | } | |
395 | if (io->io_bio == NULL) { | |
97a851ed | 396 | ret = io_submit_init_bio(io, bh); |
bd2d0210 TT |
397 | if (ret) |
398 | return ret; | |
399 | } | |
2058f83a | 400 | ret = bio_add_page(io->io_bio, page, bh->b_size, bh_offset(bh)); |
97a851ed JK |
401 | if (ret != bh->b_size) |
402 | goto submit_and_retry; | |
001e4a87 | 403 | wbc_account_io(io->io_wbc, page, bh->b_size); |
bd2d0210 | 404 | io->io_next_block++; |
bd2d0210 TT |
405 | return 0; |
406 | } | |
407 | ||
408 | int ext4_bio_write_page(struct ext4_io_submit *io, | |
409 | struct page *page, | |
410 | int len, | |
1c8349a1 NJ |
411 | struct writeback_control *wbc, |
412 | bool keep_towrite) | |
bd2d0210 | 413 | { |
2058f83a | 414 | struct page *data_page = NULL; |
bd2d0210 | 415 | struct inode *inode = page->mapping->host; |
18017479 | 416 | unsigned block_start; |
bd2d0210 TT |
417 | struct buffer_head *bh, *head; |
418 | int ret = 0; | |
0058f965 | 419 | int nr_submitted = 0; |
937d7b84 | 420 | int nr_to_submit = 0; |
bd2d0210 | 421 | |
d50bdd5a | 422 | BUG_ON(!PageLocked(page)); |
bd2d0210 | 423 | BUG_ON(PageWriteback(page)); |
bd2d0210 | 424 | |
1c8349a1 NJ |
425 | if (keep_towrite) |
426 | set_page_writeback_keepwrite(page); | |
427 | else | |
428 | set_page_writeback(page); | |
a54aa761 | 429 | ClearPageError(page); |
bd2d0210 | 430 | |
eeece469 | 431 | /* |
f8409abd | 432 | * Comments copied from block_write_full_page: |
eeece469 JK |
433 | * |
434 | * The page straddles i_size. It must be zeroed out on each and every | |
435 | * writepage invocation because it may be mmapped. "A file is mapped | |
436 | * in multiples of the page size. For a file that is not a multiple of | |
437 | * the page size, the remaining memory is zeroed when mapped, and | |
438 | * writes to that region are not written out to the file." | |
439 | */ | |
09cbfeaf KS |
440 | if (len < PAGE_SIZE) |
441 | zero_user_segment(page, len, PAGE_SIZE); | |
0058f965 JK |
442 | /* |
443 | * In the first loop we prepare and mark buffers to submit. We have to | |
444 | * mark all buffers in the page before submitting so that | |
445 | * end_page_writeback() cannot be called from ext4_bio_end_io() when IO | |
446 | * on the first buffer finishes and we are still working on submitting | |
447 | * the second buffer. | |
448 | */ | |
449 | bh = head = page_buffers(page); | |
450 | do { | |
451 | block_start = bh_offset(bh); | |
bd2d0210 TT |
452 | if (block_start >= len) { |
453 | clear_buffer_dirty(bh); | |
454 | set_buffer_uptodate(bh); | |
455 | continue; | |
456 | } | |
8a850c3f JK |
457 | if (!buffer_dirty(bh) || buffer_delay(bh) || |
458 | !buffer_mapped(bh) || buffer_unwritten(bh)) { | |
459 | /* A hole? We can safely clear the dirty bit */ | |
460 | if (!buffer_mapped(bh)) | |
461 | clear_buffer_dirty(bh); | |
462 | if (io->io_bio) | |
463 | ext4_io_submit(io); | |
464 | continue; | |
465 | } | |
0058f965 JK |
466 | if (buffer_new(bh)) { |
467 | clear_buffer_new(bh); | |
e64855c6 | 468 | clean_bdev_bh_alias(bh); |
0058f965 JK |
469 | } |
470 | set_buffer_async_write(bh); | |
937d7b84 | 471 | nr_to_submit++; |
0058f965 JK |
472 | } while ((bh = bh->b_this_page) != head); |
473 | ||
0058f965 | 474 | bh = head = page_buffers(page); |
2058f83a | 475 | |
937d7b84 TT |
476 | if (ext4_encrypted_inode(inode) && S_ISREG(inode->i_mode) && |
477 | nr_to_submit) { | |
c9af28fd TT |
478 | gfp_t gfp_flags = GFP_NOFS; |
479 | ||
480 | retry_encrypt: | |
9c4bb8a3 DG |
481 | data_page = fscrypt_encrypt_page(inode, page, PAGE_SIZE, 0, |
482 | page->index, gfp_flags); | |
2058f83a MH |
483 | if (IS_ERR(data_page)) { |
484 | ret = PTR_ERR(data_page); | |
4762cc3f | 485 | if (ret == -ENOMEM && wbc->sync_mode == WB_SYNC_ALL) { |
c9af28fd TT |
486 | if (io->io_bio) { |
487 | ext4_io_submit(io); | |
488 | congestion_wait(BLK_RW_ASYNC, HZ/50); | |
489 | } | |
490 | gfp_flags |= __GFP_NOFAIL; | |
491 | goto retry_encrypt; | |
492 | } | |
2058f83a MH |
493 | data_page = NULL; |
494 | goto out; | |
495 | } | |
496 | } | |
497 | ||
498 | /* Now submit buffers to write */ | |
0058f965 JK |
499 | do { |
500 | if (!buffer_async_write(bh)) | |
501 | continue; | |
2058f83a MH |
502 | ret = io_submit_add_bh(io, inode, |
503 | data_page ? data_page : page, bh); | |
bd2d0210 TT |
504 | if (ret) { |
505 | /* | |
506 | * We only get here on ENOMEM. Not much else | |
507 | * we can do but mark the page as dirty, and | |
508 | * better luck next time. | |
509 | */ | |
bd2d0210 TT |
510 | break; |
511 | } | |
0058f965 | 512 | nr_submitted++; |
1ae48a63 | 513 | clear_buffer_dirty(bh); |
0058f965 JK |
514 | } while ((bh = bh->b_this_page) != head); |
515 | ||
516 | /* Error stopped previous loop? Clean up buffers... */ | |
517 | if (ret) { | |
2058f83a MH |
518 | out: |
519 | if (data_page) | |
a7550b30 | 520 | fscrypt_restore_control_page(data_page); |
2058f83a MH |
521 | printk_ratelimited(KERN_ERR "%s: ret = %d\n", __func__, ret); |
522 | redirty_page_for_writepage(wbc, page); | |
0058f965 JK |
523 | do { |
524 | clear_buffer_async_write(bh); | |
525 | bh = bh->b_this_page; | |
526 | } while (bh != head); | |
bd2d0210 TT |
527 | } |
528 | unlock_page(page); | |
0058f965 JK |
529 | /* Nothing submitted - we have to end page writeback */ |
530 | if (!nr_submitted) | |
531 | end_page_writeback(page); | |
bd2d0210 TT |
532 | return ret; |
533 | } |