Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
[linux-2.6-block.git] / fs / jbd2 / journal.c
CommitLineData
f5166768 1// SPDX-License-Identifier: GPL-2.0+
470decc6 2/*
f7f4bccb 3 * linux/fs/jbd2/journal.c
470decc6
DK
4 *
5 * Written by Stephen C. Tweedie <sct@redhat.com>, 1998
6 *
7 * Copyright 1998 Red Hat corp --- All Rights Reserved
8 *
470decc6
DK
9 * Generic filesystem journal-writing code; part of the ext2fs
10 * journaling system.
11 *
12 * This file manages journals: areas of disk reserved for logging
13 * transactional updates. This includes the kernel journaling thread
14 * which is responsible for scheduling updates to the log.
15 *
16 * We do not actually manage the physical storage of the journal in this
17 * file: that is left to a per-journal policy function, which allows us
18 * to store the journal within a filesystem-specified area for ext2
19 * journaling (ext2 can use a reserved inode for storing the log).
20 */
21
22#include <linux/module.h>
23#include <linux/time.h>
24#include <linux/fs.h>
f7f4bccb 25#include <linux/jbd2.h>
470decc6
DK
26#include <linux/errno.h>
27#include <linux/slab.h>
470decc6
DK
28#include <linux/init.h>
29#include <linux/mm.h>
7dfb7103 30#include <linux/freezer.h>
470decc6
DK
31#include <linux/pagemap.h>
32#include <linux/kthread.h>
33#include <linux/poison.h>
34#include <linux/proc_fs.h>
8e85fb3f 35#include <linux/seq_file.h>
c225aa57 36#include <linux/math64.h>
879c5e6b 37#include <linux/hash.h>
d2eecb03
TT
38#include <linux/log2.h>
39#include <linux/vmalloc.h>
47def826 40#include <linux/backing-dev.h>
39e3ac25 41#include <linux/bitops.h>
670be5a7 42#include <linux/ratelimit.h>
eb52da3f 43#include <linux/sched/mm.h>
879c5e6b
TT
44
45#define CREATE_TRACE_POINTS
46#include <trace/events/jbd2.h>
470decc6 47
7c0f6ba6 48#include <linux/uaccess.h>
470decc6
DK
49#include <asm/page.h>
50
b6e96d00
TT
51#ifdef CONFIG_JBD2_DEBUG
52ushort jbd2_journal_enable_debug __read_mostly;
53EXPORT_SYMBOL(jbd2_journal_enable_debug);
54
55module_param_named(jbd2_debug, jbd2_journal_enable_debug, ushort, 0644);
56MODULE_PARM_DESC(jbd2_debug, "Debugging level for jbd2");
57#endif
58
f7f4bccb
MC
59EXPORT_SYMBOL(jbd2_journal_extend);
60EXPORT_SYMBOL(jbd2_journal_stop);
61EXPORT_SYMBOL(jbd2_journal_lock_updates);
62EXPORT_SYMBOL(jbd2_journal_unlock_updates);
63EXPORT_SYMBOL(jbd2_journal_get_write_access);
64EXPORT_SYMBOL(jbd2_journal_get_create_access);
65EXPORT_SYMBOL(jbd2_journal_get_undo_access);
e06c8227 66EXPORT_SYMBOL(jbd2_journal_set_triggers);
f7f4bccb 67EXPORT_SYMBOL(jbd2_journal_dirty_metadata);
f7f4bccb 68EXPORT_SYMBOL(jbd2_journal_forget);
470decc6
DK
69#if 0
70EXPORT_SYMBOL(journal_sync_buffer);
71#endif
f7f4bccb
MC
72EXPORT_SYMBOL(jbd2_journal_flush);
73EXPORT_SYMBOL(jbd2_journal_revoke);
74
75EXPORT_SYMBOL(jbd2_journal_init_dev);
76EXPORT_SYMBOL(jbd2_journal_init_inode);
f7f4bccb
MC
77EXPORT_SYMBOL(jbd2_journal_check_used_features);
78EXPORT_SYMBOL(jbd2_journal_check_available_features);
79EXPORT_SYMBOL(jbd2_journal_set_features);
f7f4bccb
MC
80EXPORT_SYMBOL(jbd2_journal_load);
81EXPORT_SYMBOL(jbd2_journal_destroy);
f7f4bccb
MC
82EXPORT_SYMBOL(jbd2_journal_abort);
83EXPORT_SYMBOL(jbd2_journal_errno);
84EXPORT_SYMBOL(jbd2_journal_ack_err);
85EXPORT_SYMBOL(jbd2_journal_clear_err);
86EXPORT_SYMBOL(jbd2_log_wait_commit);
3b799d15 87EXPORT_SYMBOL(jbd2_log_start_commit);
f7f4bccb
MC
88EXPORT_SYMBOL(jbd2_journal_start_commit);
89EXPORT_SYMBOL(jbd2_journal_force_commit_nested);
90EXPORT_SYMBOL(jbd2_journal_wipe);
91EXPORT_SYMBOL(jbd2_journal_blocks_per_page);
92EXPORT_SYMBOL(jbd2_journal_invalidatepage);
93EXPORT_SYMBOL(jbd2_journal_try_to_free_buffers);
94EXPORT_SYMBOL(jbd2_journal_force_commit);
41617e1a
JK
95EXPORT_SYMBOL(jbd2_journal_inode_add_write);
96EXPORT_SYMBOL(jbd2_journal_inode_add_wait);
c851ed54
JK
97EXPORT_SYMBOL(jbd2_journal_init_jbd_inode);
98EXPORT_SYMBOL(jbd2_journal_release_jbd_inode);
99EXPORT_SYMBOL(jbd2_journal_begin_ordered_truncate);
8aefcd55 100EXPORT_SYMBOL(jbd2_inode_cache);
470decc6 101
470decc6 102static void __journal_abort_soft (journal_t *journal, int errno);
d2eecb03 103static int jbd2_journal_create_slab(size_t slab_size);
470decc6 104
169f1a2a
PG
105#ifdef CONFIG_JBD2_DEBUG
106void __jbd2_debug(int level, const char *file, const char *func,
107 unsigned int line, const char *fmt, ...)
108{
109 struct va_format vaf;
110 va_list args;
111
112 if (level > jbd2_journal_enable_debug)
113 return;
114 va_start(args, fmt);
115 vaf.fmt = fmt;
116 vaf.va = &args;
9196f571 117 printk(KERN_DEBUG "%s: (%s, %u): %pV", file, func, line, &vaf);
169f1a2a
PG
118 va_end(args);
119}
120EXPORT_SYMBOL(__jbd2_debug);
121#endif
122
25ed6e8a 123/* Checksumming functions */
7747e6d0 124static int jbd2_verify_csum_type(journal_t *j, journal_superblock_t *sb)
25ed6e8a 125{
8595798c 126 if (!jbd2_journal_has_csum_v2or3_feature(j))
25ed6e8a
DW
127 return 1;
128
129 return sb->s_checksum_type == JBD2_CRC32C_CHKSUM;
130}
131
18a6ea1e 132static __be32 jbd2_superblock_csum(journal_t *j, journal_superblock_t *sb)
4fd5ea43 133{
18a6ea1e
DW
134 __u32 csum;
135 __be32 old_csum;
4fd5ea43
DW
136
137 old_csum = sb->s_checksum;
138 sb->s_checksum = 0;
139 csum = jbd2_chksum(j, ~0, (char *)sb, sizeof(journal_superblock_t));
140 sb->s_checksum = old_csum;
141
142 return cpu_to_be32(csum);
143}
144
7747e6d0 145static int jbd2_superblock_csum_verify(journal_t *j, journal_superblock_t *sb)
4fd5ea43 146{
db9ee220 147 if (!jbd2_journal_has_csum_v2or3(j))
4fd5ea43
DW
148 return 1;
149
150 return sb->s_checksum == jbd2_superblock_csum(j, sb);
151}
152
7747e6d0 153static void jbd2_superblock_csum_set(journal_t *j, journal_superblock_t *sb)
4fd5ea43 154{
db9ee220 155 if (!jbd2_journal_has_csum_v2or3(j))
4fd5ea43
DW
156 return;
157
158 sb->s_checksum = jbd2_superblock_csum(j, sb);
159}
160
470decc6
DK
161/*
162 * Helper function used to manage commit timeouts
163 */
164
e3c95788 165static void commit_timeout(struct timer_list *t)
470decc6 166{
e3c95788 167 journal_t *journal = from_timer(journal, t, j_commit_timer);
470decc6 168
e3c95788 169 wake_up_process(journal->j_task);
470decc6
DK
170}
171
172/*
f7f4bccb 173 * kjournald2: The main thread function used to manage a logging device
470decc6
DK
174 * journal.
175 *
176 * This kernel thread is responsible for two things:
177 *
178 * 1) COMMIT: Every so often we need to commit the current state of the
179 * filesystem to disk. The journal thread is responsible for writing
180 * all of the metadata buffers to disk.
181 *
182 * 2) CHECKPOINT: We cannot reuse a used section of the log file until all
183 * of the data in that part of the log has been rewritten elsewhere on
184 * the disk. Flushing these old buffers to reclaim space in the log is
185 * known as checkpointing, and this thread is responsible for that job.
186 */
187
f7f4bccb 188static int kjournald2(void *arg)
470decc6
DK
189{
190 journal_t *journal = arg;
191 transaction_t *transaction;
192
193 /*
194 * Set up an interval timer which can be used to trigger a commit wakeup
195 * after the commit interval expires
196 */
e3c95788 197 timer_setup(&journal->j_commit_timer, commit_timeout, 0);
470decc6 198
35c80422
NC
199 set_freezable();
200
470decc6
DK
201 /* Record that the journal thread is running */
202 journal->j_task = current;
203 wake_up(&journal->j_wait_done_commit);
204
eb52da3f
MH
205 /*
206 * Make sure that no allocations from this kernel thread will ever
207 * recurse to the fs layer because we are responsible for the
208 * transaction commit and any fs involvement might get stuck waiting for
209 * the trasn. commit.
210 */
211 memalloc_nofs_save();
212
470decc6
DK
213 /*
214 * And now, wait forever for commit wakeup events.
215 */
a931da6a 216 write_lock(&journal->j_state_lock);
470decc6
DK
217
218loop:
f7f4bccb 219 if (journal->j_flags & JBD2_UNMOUNT)
470decc6
DK
220 goto end_loop;
221
222 jbd_debug(1, "commit_sequence=%d, commit_request=%d\n",
223 journal->j_commit_sequence, journal->j_commit_request);
224
225 if (journal->j_commit_sequence != journal->j_commit_request) {
226 jbd_debug(1, "OK, requests differ\n");
a931da6a 227 write_unlock(&journal->j_state_lock);
470decc6 228 del_timer_sync(&journal->j_commit_timer);
f7f4bccb 229 jbd2_journal_commit_transaction(journal);
a931da6a 230 write_lock(&journal->j_state_lock);
470decc6
DK
231 goto loop;
232 }
233
234 wake_up(&journal->j_wait_done_commit);
235 if (freezing(current)) {
236 /*
237 * The simpler the better. Flushing journal isn't a
238 * good idea, because that depends on threads that may
239 * be already stopped.
240 */
f7f4bccb 241 jbd_debug(1, "Now suspending kjournald2\n");
a931da6a 242 write_unlock(&journal->j_state_lock);
a0acae0e 243 try_to_freeze();
a931da6a 244 write_lock(&journal->j_state_lock);
470decc6
DK
245 } else {
246 /*
247 * We assume on resume that commits are already there,
248 * so we don't sleep
249 */
250 DEFINE_WAIT(wait);
251 int should_sleep = 1;
252
253 prepare_to_wait(&journal->j_wait_commit, &wait,
254 TASK_INTERRUPTIBLE);
255 if (journal->j_commit_sequence != journal->j_commit_request)
256 should_sleep = 0;
257 transaction = journal->j_running_transaction;
258 if (transaction && time_after_eq(jiffies,
259 transaction->t_expires))
260 should_sleep = 0;
f7f4bccb 261 if (journal->j_flags & JBD2_UNMOUNT)
470decc6
DK
262 should_sleep = 0;
263 if (should_sleep) {
a931da6a 264 write_unlock(&journal->j_state_lock);
470decc6 265 schedule();
a931da6a 266 write_lock(&journal->j_state_lock);
470decc6
DK
267 }
268 finish_wait(&journal->j_wait_commit, &wait);
269 }
270
f7f4bccb 271 jbd_debug(1, "kjournald2 wakes\n");
470decc6
DK
272
273 /*
274 * Were we woken up by a commit wakeup event?
275 */
276 transaction = journal->j_running_transaction;
277 if (transaction && time_after_eq(jiffies, transaction->t_expires)) {
278 journal->j_commit_request = transaction->t_tid;
279 jbd_debug(1, "woke because of timeout\n");
280 }
281 goto loop;
282
283end_loop:
470decc6
DK
284 del_timer_sync(&journal->j_commit_timer);
285 journal->j_task = NULL;
286 wake_up(&journal->j_wait_done_commit);
287 jbd_debug(1, "Journal thread exiting.\n");
dbfcef6b 288 write_unlock(&journal->j_state_lock);
470decc6
DK
289 return 0;
290}
291
97f06784 292static int jbd2_journal_start_thread(journal_t *journal)
470decc6 293{
97f06784
PE
294 struct task_struct *t;
295
90576c0b
TT
296 t = kthread_run(kjournald2, journal, "jbd2/%s",
297 journal->j_devname);
97f06784
PE
298 if (IS_ERR(t))
299 return PTR_ERR(t);
300
1076d17a 301 wait_event(journal->j_wait_done_commit, journal->j_task != NULL);
97f06784 302 return 0;
470decc6
DK
303}
304
305static void journal_kill_thread(journal_t *journal)
306{
a931da6a 307 write_lock(&journal->j_state_lock);
f7f4bccb 308 journal->j_flags |= JBD2_UNMOUNT;
470decc6
DK
309
310 while (journal->j_task) {
a931da6a 311 write_unlock(&journal->j_state_lock);
3469a32a 312 wake_up(&journal->j_wait_commit);
1076d17a 313 wait_event(journal->j_wait_done_commit, journal->j_task == NULL);
a931da6a 314 write_lock(&journal->j_state_lock);
470decc6 315 }
a931da6a 316 write_unlock(&journal->j_state_lock);
470decc6
DK
317}
318
319/*
f7f4bccb 320 * jbd2_journal_write_metadata_buffer: write a metadata buffer to the journal.
470decc6
DK
321 *
322 * Writes a metadata buffer to a given disk block. The actual IO is not
323 * performed but a new buffer_head is constructed which labels the data
324 * to be written with the correct destination disk block.
325 *
326 * Any magic-number escaping which needs to be done will cause a
327 * copy-out here. If the buffer happens to start with the
f7f4bccb 328 * JBD2_MAGIC_NUMBER, then we can't write it to the log directly: the
470decc6
DK
329 * magic number is only written to the log for descripter blocks. In
330 * this case, we copy the data and replace the first word with 0, and we
331 * return a result code which indicates that this buffer needs to be
332 * marked as an escaped buffer in the corresponding log descriptor
333 * block. The missing word can then be restored when the block is read
334 * during recovery.
335 *
336 * If the source buffer has already been modified by a new transaction
337 * since we took the last commit snapshot, we use the frozen copy of
f5113eff
JK
338 * that data for IO. If we end up using the existing buffer_head's data
339 * for the write, then we have to make sure nobody modifies it while the
340 * IO is in progress. do_get_write_access() handles this.
470decc6 341 *
f5113eff
JK
342 * The function returns a pointer to the buffer_head to be used for IO.
343 *
470decc6
DK
344 *
345 * Return value:
346 * <0: Error
347 * >=0: Finished OK
348 *
349 * On success:
350 * Bit 0 set == escape performed on the data
351 * Bit 1 set == buffer copy-out performed (kfree the data after IO)
352 */
353
f7f4bccb 354int jbd2_journal_write_metadata_buffer(transaction_t *transaction,
470decc6 355 struct journal_head *jh_in,
f5113eff
JK
356 struct buffer_head **bh_out,
357 sector_t blocknr)
470decc6
DK
358{
359 int need_copy_out = 0;
360 int done_copy_out = 0;
361 int do_escape = 0;
362 char *mapped_data;
363 struct buffer_head *new_bh;
470decc6
DK
364 struct page *new_page;
365 unsigned int new_offset;
366 struct buffer_head *bh_in = jh2bh(jh_in);
96577c43 367 journal_t *journal = transaction->t_journal;
470decc6
DK
368
369 /*
370 * The buffer really shouldn't be locked: only the current committing
371 * transaction is allowed to write it, so nobody else is allowed
372 * to do any IO.
373 *
374 * akpm: except if we're journalling data, and write() output is
375 * also part of a shared mapping, and another thread has
376 * decided to launch a writepage() against this buffer.
377 */
378 J_ASSERT_BH(bh_in, buffer_jbddirty(bh_in));
379
6ccaf3e2 380 new_bh = alloc_buffer_head(GFP_NOFS|__GFP_NOFAIL);
47def826 381
96577c43 382 /* keep subsequent assertions sane */
96577c43 383 atomic_set(&new_bh->b_count, 1);
470decc6 384
f5113eff
JK
385 jbd_lock_bh_state(bh_in);
386repeat:
470decc6
DK
387 /*
388 * If a new transaction has already done a buffer copy-out, then
389 * we use that version of the data for the commit.
390 */
470decc6
DK
391 if (jh_in->b_frozen_data) {
392 done_copy_out = 1;
393 new_page = virt_to_page(jh_in->b_frozen_data);
394 new_offset = offset_in_page(jh_in->b_frozen_data);
395 } else {
396 new_page = jh2bh(jh_in)->b_page;
397 new_offset = offset_in_page(jh2bh(jh_in)->b_data);
398 }
399
303a8f2a 400 mapped_data = kmap_atomic(new_page);
e06c8227 401 /*
13ceef09
JK
402 * Fire data frozen trigger if data already wasn't frozen. Do this
403 * before checking for escaping, as the trigger may modify the magic
404 * offset. If a copy-out happens afterwards, it will have the correct
405 * data in the buffer.
e06c8227 406 */
13ceef09
JK
407 if (!done_copy_out)
408 jbd2_buffer_frozen_trigger(jh_in, mapped_data + new_offset,
409 jh_in->b_triggers);
e06c8227 410
470decc6
DK
411 /*
412 * Check for escaping
413 */
414 if (*((__be32 *)(mapped_data + new_offset)) ==
f7f4bccb 415 cpu_to_be32(JBD2_MAGIC_NUMBER)) {
470decc6
DK
416 need_copy_out = 1;
417 do_escape = 1;
418 }
303a8f2a 419 kunmap_atomic(mapped_data);
470decc6
DK
420
421 /*
422 * Do we need to do a data copy?
423 */
424 if (need_copy_out && !done_copy_out) {
425 char *tmp;
426
427 jbd_unlock_bh_state(bh_in);
af1e76d6 428 tmp = jbd2_alloc(bh_in->b_size, GFP_NOFS);
e6ec116b 429 if (!tmp) {
f5113eff 430 brelse(new_bh);
e6ec116b
TT
431 return -ENOMEM;
432 }
470decc6
DK
433 jbd_lock_bh_state(bh_in);
434 if (jh_in->b_frozen_data) {
af1e76d6 435 jbd2_free(tmp, bh_in->b_size);
470decc6
DK
436 goto repeat;
437 }
438
439 jh_in->b_frozen_data = tmp;
303a8f2a 440 mapped_data = kmap_atomic(new_page);
f5113eff 441 memcpy(tmp, mapped_data + new_offset, bh_in->b_size);
303a8f2a 442 kunmap_atomic(mapped_data);
470decc6
DK
443
444 new_page = virt_to_page(tmp);
445 new_offset = offset_in_page(tmp);
446 done_copy_out = 1;
e06c8227
JB
447
448 /*
449 * This isn't strictly necessary, as we're using frozen
450 * data for the escaping, but it keeps consistency with
451 * b_frozen_data usage.
452 */
453 jh_in->b_frozen_triggers = jh_in->b_triggers;
470decc6
DK
454 }
455
456 /*
457 * Did we need to do an escaping? Now we've done all the
458 * copying, we can finally do so.
459 */
460 if (do_escape) {
303a8f2a 461 mapped_data = kmap_atomic(new_page);
470decc6 462 *((unsigned int *)(mapped_data + new_offset)) = 0;
303a8f2a 463 kunmap_atomic(mapped_data);
470decc6
DK
464 }
465
470decc6 466 set_bh_page(new_bh, new_page, new_offset);
f5113eff
JK
467 new_bh->b_size = bh_in->b_size;
468 new_bh->b_bdev = journal->j_dev;
470decc6 469 new_bh->b_blocknr = blocknr;
b34090e5 470 new_bh->b_private = bh_in;
470decc6
DK
471 set_buffer_mapped(new_bh);
472 set_buffer_dirty(new_bh);
473
f5113eff 474 *bh_out = new_bh;
470decc6
DK
475
476 /*
477 * The to-be-written buffer needs to get moved to the io queue,
478 * and the original buffer whose contents we are shadowing or
479 * copying is moved to the transaction's shadow queue.
480 */
481 JBUFFER_TRACE(jh_in, "file as BJ_Shadow");
96577c43 482 spin_lock(&journal->j_list_lock);
483 __jbd2_journal_file_buffer(jh_in, transaction, BJ_Shadow);
484 spin_unlock(&journal->j_list_lock);
b34090e5 485 set_buffer_shadow(bh_in);
96577c43 486 jbd_unlock_bh_state(bh_in);
487
470decc6
DK
488 return do_escape | (done_copy_out << 1);
489}
490
491/*
492 * Allocation code for the journal file. Manage the space left in the
493 * journal, so that we can begin checkpointing when appropriate.
494 */
495
470decc6 496/*
e4471831
TT
497 * Called with j_state_lock locked for writing.
498 * Returns true if a transaction commit was started.
470decc6 499 */
f7f4bccb 500int __jbd2_log_start_commit(journal_t *journal, tid_t target)
470decc6 501{
e7b04ac0
ES
502 /* Return if the txn has already requested to be committed */
503 if (journal->j_commit_request == target)
504 return 0;
505
470decc6 506 /*
deeeaf13
TT
507 * The only transaction we can possibly wait upon is the
508 * currently running transaction (if it exists). Otherwise,
509 * the target tid must be an old one.
470decc6 510 */
deeeaf13
TT
511 if (journal->j_running_transaction &&
512 journal->j_running_transaction->t_tid == target) {
470decc6 513 /*
bcf3d0bc 514 * We want a new commit: OK, mark the request and wakeup the
470decc6
DK
515 * commit thread. We do _not_ do the commit ourselves.
516 */
517
518 journal->j_commit_request = target;
f2a44523 519 jbd_debug(1, "JBD2: requesting commit %d/%d\n",
470decc6
DK
520 journal->j_commit_request,
521 journal->j_commit_sequence);
9fff24aa 522 journal->j_running_transaction->t_requested = jiffies;
470decc6
DK
523 wake_up(&journal->j_wait_commit);
524 return 1;
deeeaf13
TT
525 } else if (!tid_geq(journal->j_commit_request, target))
526 /* This should never happen, but if it does, preserve
527 the evidence before kjournald goes into a loop and
528 increments j_commit_sequence beyond all recognition. */
f2a44523 529 WARN_ONCE(1, "JBD2: bad log_start_commit: %u %u %u %u\n",
1be2add6
TT
530 journal->j_commit_request,
531 journal->j_commit_sequence,
532 target, journal->j_running_transaction ?
533 journal->j_running_transaction->t_tid : 0);
470decc6
DK
534 return 0;
535}
536
f7f4bccb 537int jbd2_log_start_commit(journal_t *journal, tid_t tid)
470decc6
DK
538{
539 int ret;
540
a931da6a 541 write_lock(&journal->j_state_lock);
f7f4bccb 542 ret = __jbd2_log_start_commit(journal, tid);
a931da6a 543 write_unlock(&journal->j_state_lock);
470decc6
DK
544 return ret;
545}
546
547/*
9ff86446
DM
548 * Force and wait any uncommitted transactions. We can only force the running
549 * transaction if we don't have an active handle, otherwise, we will deadlock.
550 * Returns: <0 in case of error,
551 * 0 if nothing to commit,
552 * 1 if transaction was successfully committed.
470decc6 553 */
9ff86446 554static int __jbd2_journal_force_commit(journal_t *journal)
470decc6
DK
555{
556 transaction_t *transaction = NULL;
557 tid_t tid;
9ff86446 558 int need_to_start = 0, ret = 0;
470decc6 559
a931da6a 560 read_lock(&journal->j_state_lock);
470decc6
DK
561 if (journal->j_running_transaction && !current->journal_info) {
562 transaction = journal->j_running_transaction;
e4471831
TT
563 if (!tid_geq(journal->j_commit_request, transaction->t_tid))
564 need_to_start = 1;
470decc6
DK
565 } else if (journal->j_committing_transaction)
566 transaction = journal->j_committing_transaction;
567
568 if (!transaction) {
9ff86446 569 /* Nothing to commit */
a931da6a 570 read_unlock(&journal->j_state_lock);
9ff86446 571 return 0;
470decc6 572 }
470decc6 573 tid = transaction->t_tid;
a931da6a 574 read_unlock(&journal->j_state_lock);
e4471831
TT
575 if (need_to_start)
576 jbd2_log_start_commit(journal, tid);
9ff86446
DM
577 ret = jbd2_log_wait_commit(journal, tid);
578 if (!ret)
579 ret = 1;
580
581 return ret;
582}
583
584/**
585 * Force and wait upon a commit if the calling process is not within
586 * transaction. This is used for forcing out undo-protected data which contains
587 * bitmaps, when the fs is running out of space.
588 *
589 * @journal: journal to force
590 * Returns true if progress was made.
591 */
592int jbd2_journal_force_commit_nested(journal_t *journal)
593{
594 int ret;
595
596 ret = __jbd2_journal_force_commit(journal);
597 return ret > 0;
598}
599
600/**
601 * int journal_force_commit() - force any uncommitted transactions
602 * @journal: journal to force
603 *
604 * Caller want unconditional commit. We can only force the running transaction
605 * if we don't have an active handle, otherwise, we will deadlock.
606 */
607int jbd2_journal_force_commit(journal_t *journal)
608{
609 int ret;
610
611 J_ASSERT(!current->journal_info);
612 ret = __jbd2_journal_force_commit(journal);
613 if (ret > 0)
614 ret = 0;
615 return ret;
470decc6
DK
616}
617
618/*
619 * Start a commit of the current running transaction (if any). Returns true
c88ccea3
JK
620 * if a transaction is going to be committed (or is currently already
621 * committing), and fills its tid in at *ptid
470decc6 622 */
f7f4bccb 623int jbd2_journal_start_commit(journal_t *journal, tid_t *ptid)
470decc6
DK
624{
625 int ret = 0;
626
a931da6a 627 write_lock(&journal->j_state_lock);
470decc6
DK
628 if (journal->j_running_transaction) {
629 tid_t tid = journal->j_running_transaction->t_tid;
630
c88ccea3
JK
631 __jbd2_log_start_commit(journal, tid);
632 /* There's a running transaction and we've just made sure
633 * it's commit has been scheduled. */
634 if (ptid)
470decc6 635 *ptid = tid;
c88ccea3
JK
636 ret = 1;
637 } else if (journal->j_committing_transaction) {
470decc6 638 /*
12810ad7
AB
639 * If commit has been started, then we have to wait for
640 * completion of that transaction.
470decc6 641 */
c88ccea3
JK
642 if (ptid)
643 *ptid = journal->j_committing_transaction->t_tid;
470decc6
DK
644 ret = 1;
645 }
a931da6a 646 write_unlock(&journal->j_state_lock);
470decc6
DK
647 return ret;
648}
649
bbd2be36
JK
650/*
651 * Return 1 if a given transaction has not yet sent barrier request
652 * connected with a transaction commit. If 0 is returned, transaction
653 * may or may not have sent the barrier. Used to avoid sending barrier
654 * twice in common cases.
655 */
656int jbd2_trans_will_send_data_barrier(journal_t *journal, tid_t tid)
657{
658 int ret = 0;
659 transaction_t *commit_trans;
660
661 if (!(journal->j_flags & JBD2_BARRIER))
662 return 0;
663 read_lock(&journal->j_state_lock);
664 /* Transaction already committed? */
665 if (tid_geq(journal->j_commit_sequence, tid))
666 goto out;
667 commit_trans = journal->j_committing_transaction;
668 if (!commit_trans || commit_trans->t_tid != tid) {
669 ret = 1;
670 goto out;
671 }
672 /*
673 * Transaction is being committed and we already proceeded to
674 * submitting a flush to fs partition?
675 */
676 if (journal->j_fs_dev != journal->j_dev) {
677 if (!commit_trans->t_need_data_flush ||
678 commit_trans->t_state >= T_COMMIT_DFLUSH)
679 goto out;
680 } else {
681 if (commit_trans->t_state >= T_COMMIT_JFLUSH)
682 goto out;
683 }
684 ret = 1;
685out:
686 read_unlock(&journal->j_state_lock);
687 return ret;
688}
689EXPORT_SYMBOL(jbd2_trans_will_send_data_barrier);
690
470decc6
DK
691/*
692 * Wait for a specified commit to complete.
693 * The caller may not hold the journal lock.
694 */
f7f4bccb 695int jbd2_log_wait_commit(journal_t *journal, tid_t tid)
470decc6
DK
696{
697 int err = 0;
698
a931da6a 699 read_lock(&journal->j_state_lock);
c52c47e4
JK
700#ifdef CONFIG_PROVE_LOCKING
701 /*
702 * Some callers make sure transaction is already committing and in that
703 * case we cannot block on open handles anymore. So don't warn in that
704 * case.
705 */
706 if (tid_gt(tid, journal->j_commit_sequence) &&
707 (!journal->j_committing_transaction ||
708 journal->j_committing_transaction->t_tid != tid)) {
709 read_unlock(&journal->j_state_lock);
710 jbd2_might_wait_for_commit(journal);
711 read_lock(&journal->j_state_lock);
712 }
713#endif
e23291b9 714#ifdef CONFIG_JBD2_DEBUG
470decc6 715 if (!tid_geq(journal->j_commit_request, tid)) {
75685071 716 printk(KERN_ERR
470decc6 717 "%s: error: j_commit_request=%d, tid=%d\n",
329d291f 718 __func__, journal->j_commit_request, tid);
470decc6 719 }
470decc6 720#endif
470decc6 721 while (tid_gt(tid, journal->j_commit_sequence)) {
f2a44523 722 jbd_debug(1, "JBD2: want %d, j_commit_sequence=%d\n",
470decc6 723 tid, journal->j_commit_sequence);
a931da6a 724 read_unlock(&journal->j_state_lock);
3469a32a 725 wake_up(&journal->j_wait_commit);
470decc6
DK
726 wait_event(journal->j_wait_done_commit,
727 !tid_gt(tid, journal->j_commit_sequence));
a931da6a 728 read_lock(&journal->j_state_lock);
470decc6 729 }
a931da6a 730 read_unlock(&journal->j_state_lock);
470decc6 731
75685071 732 if (unlikely(is_journal_aborted(journal)))
470decc6 733 err = -EIO;
470decc6
DK
734 return err;
735}
736
b8a6176c
JK
737/* Return 1 when transaction with given tid has already committed. */
738int jbd2_transaction_committed(journal_t *journal, tid_t tid)
739{
740 int ret = 1;
741
742 read_lock(&journal->j_state_lock);
743 if (journal->j_running_transaction &&
744 journal->j_running_transaction->t_tid == tid)
745 ret = 0;
746 if (journal->j_committing_transaction &&
747 journal->j_committing_transaction->t_tid == tid)
748 ret = 0;
749 read_unlock(&journal->j_state_lock);
750 return ret;
751}
752EXPORT_SYMBOL(jbd2_transaction_committed);
753
d76a3a77
TT
754/*
755 * When this function returns the transaction corresponding to tid
756 * will be completed. If the transaction has currently running, start
757 * committing that transaction before waiting for it to complete. If
758 * the transaction id is stale, it is by definition already completed,
759 * so just return SUCCESS.
760 */
761int jbd2_complete_transaction(journal_t *journal, tid_t tid)
762{
763 int need_to_wait = 1;
764
765 read_lock(&journal->j_state_lock);
766 if (journal->j_running_transaction &&
767 journal->j_running_transaction->t_tid == tid) {
768 if (journal->j_commit_request != tid) {
769 /* transaction not yet started, so request it */
770 read_unlock(&journal->j_state_lock);
771 jbd2_log_start_commit(journal, tid);
772 goto wait_commit;
773 }
774 } else if (!(journal->j_committing_transaction &&
775 journal->j_committing_transaction->t_tid == tid))
776 need_to_wait = 0;
777 read_unlock(&journal->j_state_lock);
778 if (!need_to_wait)
779 return 0;
780wait_commit:
781 return jbd2_log_wait_commit(journal, tid);
782}
783EXPORT_SYMBOL(jbd2_complete_transaction);
784
470decc6
DK
785/*
786 * Log buffer allocation routines:
787 */
788
18eba7aa 789int jbd2_journal_next_log_block(journal_t *journal, unsigned long long *retp)
470decc6
DK
790{
791 unsigned long blocknr;
792
a931da6a 793 write_lock(&journal->j_state_lock);
470decc6
DK
794 J_ASSERT(journal->j_free > 1);
795
796 blocknr = journal->j_head;
797 journal->j_head++;
798 journal->j_free--;
799 if (journal->j_head == journal->j_last)
800 journal->j_head = journal->j_first;
a931da6a 801 write_unlock(&journal->j_state_lock);
f7f4bccb 802 return jbd2_journal_bmap(journal, blocknr, retp);
470decc6
DK
803}
804
805/*
806 * Conversion of logical to physical block numbers for the journal
807 *
808 * On external journals the journal blocks are identity-mapped, so
809 * this is a no-op. If needed, we can use j_blk_offset - everything is
810 * ready.
811 */
f7f4bccb 812int jbd2_journal_bmap(journal_t *journal, unsigned long blocknr,
18eba7aa 813 unsigned long long *retp)
470decc6
DK
814{
815 int err = 0;
18eba7aa 816 unsigned long long ret;
470decc6
DK
817
818 if (journal->j_inode) {
819 ret = bmap(journal->j_inode, blocknr);
820 if (ret)
821 *retp = ret;
822 else {
470decc6
DK
823 printk(KERN_ALERT "%s: journal block not found "
824 "at offset %lu on %s\n",
05496769 825 __func__, blocknr, journal->j_devname);
470decc6
DK
826 err = -EIO;
827 __journal_abort_soft(journal, err);
828 }
829 } else {
830 *retp = blocknr; /* +journal->j_blk_offset */
831 }
832 return err;
833}
834
835/*
836 * We play buffer_head aliasing tricks to write data/metadata blocks to
837 * the journal without copying their contents, but for journal
838 * descriptor blocks we do need to generate bona fide buffers.
839 *
f7f4bccb 840 * After the caller of jbd2_journal_get_descriptor_buffer() has finished modifying
470decc6
DK
841 * the buffer's contents they really should run flush_dcache_page(bh->b_page).
842 * But we don't bother doing that, so there will be coherency problems with
843 * mmaps of blockdevs which hold live JBD-controlled filesystems.
844 */
32ab6715
JK
845struct buffer_head *
846jbd2_journal_get_descriptor_buffer(transaction_t *transaction, int type)
470decc6 847{
32ab6715 848 journal_t *journal = transaction->t_journal;
470decc6 849 struct buffer_head *bh;
18eba7aa 850 unsigned long long blocknr;
32ab6715 851 journal_header_t *header;
470decc6
DK
852 int err;
853
f7f4bccb 854 err = jbd2_journal_next_log_block(journal, &blocknr);
470decc6
DK
855
856 if (err)
857 return NULL;
858
859 bh = __getblk(journal->j_dev, blocknr, journal->j_blocksize);
4b905671
JK
860 if (!bh)
861 return NULL;
470decc6
DK
862 lock_buffer(bh);
863 memset(bh->b_data, 0, journal->j_blocksize);
32ab6715
JK
864 header = (journal_header_t *)bh->b_data;
865 header->h_magic = cpu_to_be32(JBD2_MAGIC_NUMBER);
866 header->h_blocktype = cpu_to_be32(type);
867 header->h_sequence = cpu_to_be32(transaction->t_tid);
470decc6
DK
868 set_buffer_uptodate(bh);
869 unlock_buffer(bh);
870 BUFFER_TRACE(bh, "return this buffer");
e5a120ae 871 return bh;
470decc6
DK
872}
873
1101cd4d
JK
874void jbd2_descriptor_block_csum_set(journal_t *j, struct buffer_head *bh)
875{
876 struct jbd2_journal_block_tail *tail;
877 __u32 csum;
878
879 if (!jbd2_journal_has_csum_v2or3(j))
880 return;
881
882 tail = (struct jbd2_journal_block_tail *)(bh->b_data + j->j_blocksize -
883 sizeof(struct jbd2_journal_block_tail));
884 tail->t_checksum = 0;
885 csum = jbd2_chksum(j, j->j_csum_seed, bh->b_data, j->j_blocksize);
886 tail->t_checksum = cpu_to_be32(csum);
887}
888
79feb521
JK
889/*
890 * Return tid of the oldest transaction in the journal and block in the journal
891 * where the transaction starts.
892 *
893 * If the journal is now empty, return which will be the next transaction ID
894 * we will write and where will that transaction start.
895 *
896 * The return value is 0 if journal tail cannot be pushed any further, 1 if
897 * it can.
898 */
899int jbd2_journal_get_log_tail(journal_t *journal, tid_t *tid,
900 unsigned long *block)
901{
902 transaction_t *transaction;
903 int ret;
904
905 read_lock(&journal->j_state_lock);
906 spin_lock(&journal->j_list_lock);
907 transaction = journal->j_checkpoint_transactions;
908 if (transaction) {
909 *tid = transaction->t_tid;
910 *block = transaction->t_log_start;
911 } else if ((transaction = journal->j_committing_transaction) != NULL) {
912 *tid = transaction->t_tid;
913 *block = transaction->t_log_start;
914 } else if ((transaction = journal->j_running_transaction) != NULL) {
915 *tid = transaction->t_tid;
916 *block = journal->j_head;
917 } else {
918 *tid = journal->j_transaction_sequence;
919 *block = journal->j_head;
920 }
921 ret = tid_gt(*tid, journal->j_tail_sequence);
922 spin_unlock(&journal->j_list_lock);
923 read_unlock(&journal->j_state_lock);
924
925 return ret;
926}
927
928/*
929 * Update information in journal structure and in on disk journal superblock
930 * about log tail. This function does not check whether information passed in
931 * really pushes log tail further. It's responsibility of the caller to make
932 * sure provided log tail information is valid (e.g. by holding
933 * j_checkpoint_mutex all the time between computing log tail and calling this
934 * function as is the case with jbd2_cleanup_journal_tail()).
935 *
936 * Requires j_checkpoint_mutex
937 */
6f6a6fda 938int __jbd2_update_log_tail(journal_t *journal, tid_t tid, unsigned long block)
79feb521
JK
939{
940 unsigned long freed;
6f6a6fda 941 int ret;
79feb521
JK
942
943 BUG_ON(!mutex_is_locked(&journal->j_checkpoint_mutex));
944
945 /*
946 * We cannot afford for write to remain in drive's caches since as
947 * soon as we update j_tail, next transaction can start reusing journal
948 * space and if we lose sb update during power failure we'd replay
949 * old transaction with possibly newly overwritten data.
950 */
17f423b5
JK
951 ret = jbd2_journal_update_sb_log_tail(journal, tid, block,
952 REQ_SYNC | REQ_FUA);
6f6a6fda
JQ
953 if (ret)
954 goto out;
955
79feb521
JK
956 write_lock(&journal->j_state_lock);
957 freed = block - journal->j_tail;
958 if (block < journal->j_tail)
959 freed += journal->j_last - journal->j_first;
960
961 trace_jbd2_update_log_tail(journal, tid, block, freed);
962 jbd_debug(1,
963 "Cleaning journal tail from %d to %d (offset %lu), "
964 "freeing %lu\n",
965 journal->j_tail_sequence, tid, block, freed);
966
967 journal->j_free += freed;
968 journal->j_tail_sequence = tid;
969 journal->j_tail = block;
970 write_unlock(&journal->j_state_lock);
6f6a6fda
JQ
971
972out:
973 return ret;
79feb521
JK
974}
975
3339578f 976/*
85e0c4e8 977 * This is a variation of __jbd2_update_log_tail which checks for validity of
3339578f
JK
978 * provided log tail and locks j_checkpoint_mutex. So it is safe against races
979 * with other threads updating log tail.
980 */
981void jbd2_update_log_tail(journal_t *journal, tid_t tid, unsigned long block)
982{
6fa7aa50 983 mutex_lock_io(&journal->j_checkpoint_mutex);
3339578f
JK
984 if (tid_gt(tid, journal->j_tail_sequence))
985 __jbd2_update_log_tail(journal, tid, block);
986 mutex_unlock(&journal->j_checkpoint_mutex);
987}
988
8e85fb3f
JL
989struct jbd2_stats_proc_session {
990 journal_t *journal;
991 struct transaction_stats_s *stats;
992 int start;
993 int max;
994};
995
8e85fb3f
JL
996static void *jbd2_seq_info_start(struct seq_file *seq, loff_t *pos)
997{
998 return *pos ? NULL : SEQ_START_TOKEN;
999}
1000
1001static void *jbd2_seq_info_next(struct seq_file *seq, void *v, loff_t *pos)
1002{
1003 return NULL;
1004}
1005
1006static int jbd2_seq_info_show(struct seq_file *seq, void *v)
1007{
1008 struct jbd2_stats_proc_session *s = seq->private;
1009
1010 if (v != SEQ_START_TOKEN)
1011 return 0;
9fff24aa
TT
1012 seq_printf(seq, "%lu transactions (%lu requested), "
1013 "each up to %u blocks\n",
1014 s->stats->ts_tid, s->stats->ts_requested,
1015 s->journal->j_max_transaction_buffers);
8e85fb3f
JL
1016 if (s->stats->ts_tid == 0)
1017 return 0;
1018 seq_printf(seq, "average: \n %ums waiting for transaction\n",
bf699327 1019 jiffies_to_msecs(s->stats->run.rs_wait / s->stats->ts_tid));
9fff24aa
TT
1020 seq_printf(seq, " %ums request delay\n",
1021 (s->stats->ts_requested == 0) ? 0 :
1022 jiffies_to_msecs(s->stats->run.rs_request_delay /
1023 s->stats->ts_requested));
8e85fb3f 1024 seq_printf(seq, " %ums running transaction\n",
bf699327 1025 jiffies_to_msecs(s->stats->run.rs_running / s->stats->ts_tid));
8e85fb3f 1026 seq_printf(seq, " %ums transaction was being locked\n",
bf699327 1027 jiffies_to_msecs(s->stats->run.rs_locked / s->stats->ts_tid));
8e85fb3f 1028 seq_printf(seq, " %ums flushing data (in ordered mode)\n",
bf699327 1029 jiffies_to_msecs(s->stats->run.rs_flushing / s->stats->ts_tid));
8e85fb3f 1030 seq_printf(seq, " %ums logging transaction\n",
bf699327 1031 jiffies_to_msecs(s->stats->run.rs_logging / s->stats->ts_tid));
c225aa57
SHT
1032 seq_printf(seq, " %lluus average transaction commit time\n",
1033 div_u64(s->journal->j_average_commit_time, 1000));
8e85fb3f 1034 seq_printf(seq, " %lu handles per transaction\n",
bf699327 1035 s->stats->run.rs_handle_count / s->stats->ts_tid);
8e85fb3f 1036 seq_printf(seq, " %lu blocks per transaction\n",
bf699327 1037 s->stats->run.rs_blocks / s->stats->ts_tid);
8e85fb3f 1038 seq_printf(seq, " %lu logged blocks per transaction\n",
bf699327 1039 s->stats->run.rs_blocks_logged / s->stats->ts_tid);
8e85fb3f
JL
1040 return 0;
1041}
1042
1043static void jbd2_seq_info_stop(struct seq_file *seq, void *v)
1044{
1045}
1046
88e9d34c 1047static const struct seq_operations jbd2_seq_info_ops = {
8e85fb3f
JL
1048 .start = jbd2_seq_info_start,
1049 .next = jbd2_seq_info_next,
1050 .stop = jbd2_seq_info_stop,
1051 .show = jbd2_seq_info_show,
1052};
1053
1054static int jbd2_seq_info_open(struct inode *inode, struct file *file)
1055{
d9dda78b 1056 journal_t *journal = PDE_DATA(inode);
8e85fb3f
JL
1057 struct jbd2_stats_proc_session *s;
1058 int rc, size;
1059
1060 s = kmalloc(sizeof(*s), GFP_KERNEL);
1061 if (s == NULL)
1062 return -ENOMEM;
1063 size = sizeof(struct transaction_stats_s);
1064 s->stats = kmalloc(size, GFP_KERNEL);
1065 if (s->stats == NULL) {
1066 kfree(s);
1067 return -ENOMEM;
1068 }
1069 spin_lock(&journal->j_history_lock);
1070 memcpy(s->stats, &journal->j_stats, size);
1071 s->journal = journal;
1072 spin_unlock(&journal->j_history_lock);
1073
1074 rc = seq_open(file, &jbd2_seq_info_ops);
1075 if (rc == 0) {
1076 struct seq_file *m = file->private_data;
1077 m->private = s;
1078 } else {
1079 kfree(s->stats);
1080 kfree(s);
1081 }
1082 return rc;
1083
1084}
1085
1086static int jbd2_seq_info_release(struct inode *inode, struct file *file)
1087{
1088 struct seq_file *seq = file->private_data;
1089 struct jbd2_stats_proc_session *s = seq->private;
1090 kfree(s->stats);
1091 kfree(s);
1092 return seq_release(inode, file);
1093}
1094
828c0950 1095static const struct file_operations jbd2_seq_info_fops = {
8e85fb3f
JL
1096 .owner = THIS_MODULE,
1097 .open = jbd2_seq_info_open,
1098 .read = seq_read,
1099 .llseek = seq_lseek,
1100 .release = jbd2_seq_info_release,
1101};
1102
1103static struct proc_dir_entry *proc_jbd2_stats;
1104
1105static void jbd2_stats_proc_init(journal_t *journal)
1106{
05496769 1107 journal->j_proc_entry = proc_mkdir(journal->j_devname, proc_jbd2_stats);
8e85fb3f 1108 if (journal->j_proc_entry) {
79da3664
DL
1109 proc_create_data("info", S_IRUGO, journal->j_proc_entry,
1110 &jbd2_seq_info_fops, journal);
8e85fb3f
JL
1111 }
1112}
1113
1114static void jbd2_stats_proc_exit(journal_t *journal)
1115{
8e85fb3f 1116 remove_proc_entry("info", journal->j_proc_entry);
05496769 1117 remove_proc_entry(journal->j_devname, proc_jbd2_stats);
8e85fb3f
JL
1118}
1119
470decc6
DK
1120/*
1121 * Management for journal control blocks: functions to create and
1122 * destroy journal_t structures, and to initialise and read existing
1123 * journal blocks from disk. */
1124
1125/* First: create and setup a journal_t object in memory. We initialise
1126 * very few fields yet: that has to wait until we have created the
1127 * journal structures from from scratch, or loaded them from disk. */
1128
f0c9fd54
GT
1129static journal_t *journal_init_common(struct block_device *bdev,
1130 struct block_device *fs_dev,
1131 unsigned long long start, int len, int blocksize)
470decc6 1132{
ab714aff 1133 static struct lock_class_key jbd2_trans_commit_key;
470decc6
DK
1134 journal_t *journal;
1135 int err;
f0c9fd54
GT
1136 struct buffer_head *bh;
1137 int n;
470decc6 1138
3ebfdf88 1139 journal = kzalloc(sizeof(*journal), GFP_KERNEL);
470decc6 1140 if (!journal)
b7271b0a 1141 return NULL;
470decc6
DK
1142
1143 init_waitqueue_head(&journal->j_wait_transaction_locked);
470decc6 1144 init_waitqueue_head(&journal->j_wait_done_commit);
470decc6
DK
1145 init_waitqueue_head(&journal->j_wait_commit);
1146 init_waitqueue_head(&journal->j_wait_updates);
8f7d89f3 1147 init_waitqueue_head(&journal->j_wait_reserved);
470decc6
DK
1148 mutex_init(&journal->j_barrier);
1149 mutex_init(&journal->j_checkpoint_mutex);
1150 spin_lock_init(&journal->j_revoke_lock);
1151 spin_lock_init(&journal->j_list_lock);
a931da6a 1152 rwlock_init(&journal->j_state_lock);
470decc6 1153
cd02ff0b 1154 journal->j_commit_interval = (HZ * JBD2_DEFAULT_MAX_COMMIT_AGE);
30773840
TT
1155 journal->j_min_batch_time = 0;
1156 journal->j_max_batch_time = 15000; /* 15ms */
8f7d89f3 1157 atomic_set(&journal->j_reserved_credits, 0);
470decc6
DK
1158
1159 /* The journal is marked for error until we succeed with recovery! */
f7f4bccb 1160 journal->j_flags = JBD2_ABORT;
470decc6
DK
1161
1162 /* Set up a default-sized revoke table for the new mount. */
f7f4bccb 1163 err = jbd2_journal_init_revoke(journal, JOURNAL_REVOKE_DEFAULT_HASH);
cd9cb405
EB
1164 if (err)
1165 goto err_cleanup;
8e85fb3f 1166
bf699327 1167 spin_lock_init(&journal->j_history_lock);
8e85fb3f 1168
ab714aff
JK
1169 lockdep_init_map(&journal->j_trans_commit_map, "jbd2_handle",
1170 &jbd2_trans_commit_key, 0);
1171
f0c9fd54
GT
1172 /* journal descriptor can store up to n blocks -bzzz */
1173 journal->j_blocksize = blocksize;
1174 journal->j_dev = bdev;
1175 journal->j_fs_dev = fs_dev;
1176 journal->j_blk_offset = start;
1177 journal->j_maxlen = len;
1178 n = journal->j_blocksize / sizeof(journal_block_tag_t);
1179 journal->j_wbufsize = n;
1180 journal->j_wbuf = kmalloc_array(n, sizeof(struct buffer_head *),
1181 GFP_KERNEL);
cd9cb405
EB
1182 if (!journal->j_wbuf)
1183 goto err_cleanup;
f0c9fd54
GT
1184
1185 bh = getblk_unmovable(journal->j_dev, start, journal->j_blocksize);
1186 if (!bh) {
1187 pr_err("%s: Cannot get buffer for journal superblock\n",
1188 __func__);
cd9cb405 1189 goto err_cleanup;
f0c9fd54
GT
1190 }
1191 journal->j_sb_buffer = bh;
1192 journal->j_superblock = (journal_superblock_t *)bh->b_data;
1193
470decc6 1194 return journal;
cd9cb405
EB
1195
1196err_cleanup:
1197 kfree(journal->j_wbuf);
1198 jbd2_journal_destroy_revoke(journal);
1199 kfree(journal);
1200 return NULL;
470decc6
DK
1201}
1202
f7f4bccb 1203/* jbd2_journal_init_dev and jbd2_journal_init_inode:
470decc6
DK
1204 *
1205 * Create a journal structure assigned some fixed set of disk blocks to
1206 * the journal. We don't actually touch those disk blocks yet, but we
1207 * need to set up all of the mapping information to tell the journaling
1208 * system where the journal blocks are.
1209 *
1210 */
1211
1212/**
5648ba5b 1213 * journal_t * jbd2_journal_init_dev() - creates and initialises a journal structure
470decc6
DK
1214 * @bdev: Block device on which to create the journal
1215 * @fs_dev: Device which hold journalled filesystem for this journal.
1216 * @start: Block nr Start of journal.
1217 * @len: Length of the journal in blocks.
1218 * @blocksize: blocksize of journalling device
5648ba5b
RD
1219 *
1220 * Returns: a newly created journal_t *
470decc6 1221 *
f7f4bccb 1222 * jbd2_journal_init_dev creates a journal which maps a fixed contiguous
470decc6
DK
1223 * range of blocks on an arbitrary block device.
1224 *
1225 */
f0c9fd54 1226journal_t *jbd2_journal_init_dev(struct block_device *bdev,
470decc6 1227 struct block_device *fs_dev,
18eba7aa 1228 unsigned long long start, int len, int blocksize)
470decc6 1229{
f0c9fd54 1230 journal_t *journal;
470decc6 1231
f0c9fd54 1232 journal = journal_init_common(bdev, fs_dev, start, len, blocksize);
470decc6
DK
1233 if (!journal)
1234 return NULL;
1235
0587aa3d 1236 bdevname(journal->j_dev, journal->j_devname);
81ae394b 1237 strreplace(journal->j_devname, '/', '!');
4b905671 1238 jbd2_stats_proc_init(journal);
4b905671 1239
470decc6
DK
1240 return journal;
1241}
1242
1243/**
f7f4bccb 1244 * journal_t * jbd2_journal_init_inode () - creates a journal which maps to a inode.
470decc6
DK
1245 * @inode: An inode to create the journal in
1246 *
f7f4bccb 1247 * jbd2_journal_init_inode creates a journal which maps an on-disk inode as
470decc6
DK
1248 * the journal. The inode must exist already, must support bmap() and
1249 * must have all data blocks preallocated.
1250 */
f0c9fd54 1251journal_t *jbd2_journal_init_inode(struct inode *inode)
470decc6 1252{
f0c9fd54 1253 journal_t *journal;
05496769 1254 char *p;
18eba7aa 1255 unsigned long long blocknr;
470decc6 1256
f0c9fd54
GT
1257 blocknr = bmap(inode, 0);
1258 if (!blocknr) {
1259 pr_err("%s: Cannot locate journal superblock\n",
1260 __func__);
1261 return NULL;
1262 }
1263
1264 jbd_debug(1, "JBD2: inode %s/%ld, size %lld, bits %d, blksize %ld\n",
1265 inode->i_sb->s_id, inode->i_ino, (long long) inode->i_size,
1266 inode->i_sb->s_blocksize_bits, inode->i_sb->s_blocksize);
1267
1268 journal = journal_init_common(inode->i_sb->s_bdev, inode->i_sb->s_bdev,
1269 blocknr, inode->i_size >> inode->i_sb->s_blocksize_bits,
1270 inode->i_sb->s_blocksize);
470decc6
DK
1271 if (!journal)
1272 return NULL;
1273
470decc6 1274 journal->j_inode = inode;
05496769 1275 bdevname(journal->j_dev, journal->j_devname);
81ae394b 1276 p = strreplace(journal->j_devname, '/', '!');
90576c0b 1277 sprintf(p, "-%lu", journal->j_inode->i_ino);
8e85fb3f 1278 jbd2_stats_proc_init(journal);
470decc6 1279
470decc6
DK
1280 return journal;
1281}
1282
1283/*
1284 * If the journal init or create aborts, we need to mark the journal
1285 * superblock as being NULL to prevent the journal destroy from writing
1286 * back a bogus superblock.
1287 */
1288static void journal_fail_superblock (journal_t *journal)
1289{
1290 struct buffer_head *bh = journal->j_sb_buffer;
1291 brelse(bh);
1292 journal->j_sb_buffer = NULL;
1293}
1294
1295/*
1296 * Given a journal_t structure, initialise the various fields for
1297 * startup of a new journaling session. We use this both when creating
1298 * a journal, and after recovering an old journal to reset it for
1299 * subsequent use.
1300 */
1301
1302static int journal_reset(journal_t *journal)
1303{
1304 journal_superblock_t *sb = journal->j_superblock;
18eba7aa 1305 unsigned long long first, last;
470decc6
DK
1306
1307 first = be32_to_cpu(sb->s_first);
1308 last = be32_to_cpu(sb->s_maxlen);
f6f50e28 1309 if (first + JBD2_MIN_JOURNAL_BLOCKS > last + 1) {
f2a44523 1310 printk(KERN_ERR "JBD2: Journal too short (blocks %llu-%llu).\n",
f6f50e28
JK
1311 first, last);
1312 journal_fail_superblock(journal);
1313 return -EINVAL;
1314 }
470decc6
DK
1315
1316 journal->j_first = first;
1317 journal->j_last = last;
1318
1319 journal->j_head = first;
1320 journal->j_tail = first;
1321 journal->j_free = last - first;
1322
1323 journal->j_tail_sequence = journal->j_transaction_sequence;
1324 journal->j_commit_sequence = journal->j_transaction_sequence - 1;
1325 journal->j_commit_request = journal->j_commit_sequence;
1326
1327 journal->j_max_transaction_buffers = journal->j_maxlen / 4;
1328
470decc6
DK
1329 /*
1330 * As a special case, if the on-disk copy is already marked as needing
24bcc89c
JK
1331 * no recovery (s_start == 0), then we can safely defer the superblock
1332 * update until the next commit by setting JBD2_FLUSHED. This avoids
470decc6
DK
1333 * attempting a write to a potential-readonly device.
1334 */
24bcc89c 1335 if (sb->s_start == 0) {
f2a44523 1336 jbd_debug(1, "JBD2: Skipping superblock update on recovered sb "
470decc6
DK
1337 "(start %ld, seq %d, errno %d)\n",
1338 journal->j_tail, journal->j_tail_sequence,
1339 journal->j_errno);
24bcc89c
JK
1340 journal->j_flags |= JBD2_FLUSHED;
1341 } else {
a78bb11d 1342 /* Lock here to make assertions happy... */
6fa7aa50 1343 mutex_lock_io(&journal->j_checkpoint_mutex);
79feb521 1344 /*
70fd7614 1345 * Update log tail information. We use REQ_FUA since new
79feb521
JK
1346 * transaction will start reusing journal space and so we
1347 * must make sure information about current log tail is on
1348 * disk before that.
1349 */
1350 jbd2_journal_update_sb_log_tail(journal,
1351 journal->j_tail_sequence,
1352 journal->j_tail,
17f423b5 1353 REQ_SYNC | REQ_FUA);
a78bb11d 1354 mutex_unlock(&journal->j_checkpoint_mutex);
470decc6 1355 }
24bcc89c
JK
1356 return jbd2_journal_start_thread(journal);
1357}
470decc6 1358
2a222ca9 1359static int jbd2_write_superblock(journal_t *journal, int write_flags)
24bcc89c
JK
1360{
1361 struct buffer_head *bh = journal->j_sb_buffer;
fe52d17c 1362 journal_superblock_t *sb = journal->j_superblock;
79feb521 1363 int ret;
470decc6 1364
2a222ca9 1365 trace_jbd2_write_superblock(journal, write_flags);
79feb521 1366 if (!(journal->j_flags & JBD2_BARRIER))
28a8f0d3 1367 write_flags &= ~(REQ_FUA | REQ_PREFLUSH);
79feb521 1368 lock_buffer(bh);
914258bf
TT
1369 if (buffer_write_io_error(bh)) {
1370 /*
1371 * Oh, dear. A previous attempt to write the journal
1372 * superblock failed. This could happen because the
1373 * USB device was yanked out. Or it could happen to
1374 * be a transient write error and maybe the block will
1375 * be remapped. Nothing we can do but to retry the
1376 * write and hope for the best.
1377 */
1378 printk(KERN_ERR "JBD2: previous I/O error detected "
1379 "for journal superblock update for %s.\n",
1380 journal->j_devname);
1381 clear_buffer_write_io_error(bh);
1382 set_buffer_uptodate(bh);
1383 }
fe52d17c 1384 jbd2_superblock_csum_set(journal, sb);
79feb521
JK
1385 get_bh(bh);
1386 bh->b_end_io = end_buffer_write_sync;
2a222ca9 1387 ret = submit_bh(REQ_OP_WRITE, write_flags, bh);
79feb521 1388 wait_on_buffer(bh);
24bcc89c 1389 if (buffer_write_io_error(bh)) {
24bcc89c
JK
1390 clear_buffer_write_io_error(bh);
1391 set_buffer_uptodate(bh);
79feb521
JK
1392 ret = -EIO;
1393 }
1394 if (ret) {
1395 printk(KERN_ERR "JBD2: Error %d detected when updating "
1396 "journal superblock for %s.\n", ret,
1397 journal->j_devname);
6f6a6fda 1398 jbd2_journal_abort(journal, ret);
24bcc89c 1399 }
6f6a6fda
JQ
1400
1401 return ret;
24bcc89c
JK
1402}
1403
1404/**
1405 * jbd2_journal_update_sb_log_tail() - Update log tail in journal sb on disk.
1406 * @journal: The journal to update.
79feb521
JK
1407 * @tail_tid: TID of the new transaction at the tail of the log
1408 * @tail_block: The first block of the transaction at the tail of the log
1409 * @write_op: With which operation should we write the journal sb
24bcc89c
JK
1410 *
1411 * Update a journal's superblock information about log tail and write it to
1412 * disk, waiting for the IO to complete.
1413 */
6f6a6fda 1414int jbd2_journal_update_sb_log_tail(journal_t *journal, tid_t tail_tid,
79feb521 1415 unsigned long tail_block, int write_op)
24bcc89c
JK
1416{
1417 journal_superblock_t *sb = journal->j_superblock;
6f6a6fda 1418 int ret;
24bcc89c 1419
85e0c4e8
TT
1420 if (is_journal_aborted(journal))
1421 return -EIO;
1422
a78bb11d 1423 BUG_ON(!mutex_is_locked(&journal->j_checkpoint_mutex));
79feb521
JK
1424 jbd_debug(1, "JBD2: updating superblock (start %lu, seq %u)\n",
1425 tail_block, tail_tid);
470decc6 1426
79feb521
JK
1427 sb->s_sequence = cpu_to_be32(tail_tid);
1428 sb->s_start = cpu_to_be32(tail_block);
470decc6 1429
6f6a6fda
JQ
1430 ret = jbd2_write_superblock(journal, write_op);
1431 if (ret)
1432 goto out;
470decc6 1433
24bcc89c
JK
1434 /* Log is no longer empty */
1435 write_lock(&journal->j_state_lock);
1436 WARN_ON(!sb->s_sequence);
1437 journal->j_flags &= ~JBD2_FLUSHED;
1438 write_unlock(&journal->j_state_lock);
6f6a6fda
JQ
1439
1440out:
1441 return ret;
24bcc89c 1442}
2201c590 1443
24bcc89c
JK
1444/**
1445 * jbd2_mark_journal_empty() - Mark on disk journal as empty.
1446 * @journal: The journal to update.
c0a2ad9b 1447 * @write_op: With which operation should we write the journal sb
24bcc89c
JK
1448 *
1449 * Update a journal's dynamic superblock fields to show that journal is empty.
1450 * Write updated superblock to disk waiting for IO to complete.
1451 */
c0a2ad9b 1452static void jbd2_mark_journal_empty(journal_t *journal, int write_op)
24bcc89c
JK
1453{
1454 journal_superblock_t *sb = journal->j_superblock;
914258bf 1455
a78bb11d 1456 BUG_ON(!mutex_is_locked(&journal->j_checkpoint_mutex));
a931da6a 1457 read_lock(&journal->j_state_lock);
eeecef0a
ES
1458 /* Is it already empty? */
1459 if (sb->s_start == 0) {
1460 read_unlock(&journal->j_state_lock);
1461 return;
1462 }
24bcc89c
JK
1463 jbd_debug(1, "JBD2: Marking journal as empty (seq %d)\n",
1464 journal->j_tail_sequence);
470decc6
DK
1465
1466 sb->s_sequence = cpu_to_be32(journal->j_tail_sequence);
24bcc89c 1467 sb->s_start = cpu_to_be32(0);
a931da6a 1468 read_unlock(&journal->j_state_lock);
470decc6 1469
c0a2ad9b 1470 jbd2_write_superblock(journal, write_op);
470decc6 1471
24bcc89c 1472 /* Log is no longer empty */
a931da6a 1473 write_lock(&journal->j_state_lock);
24bcc89c 1474 journal->j_flags |= JBD2_FLUSHED;
a931da6a 1475 write_unlock(&journal->j_state_lock);
470decc6
DK
1476}
1477
24bcc89c
JK
1478
1479/**
1480 * jbd2_journal_update_sb_errno() - Update error in the journal.
1481 * @journal: The journal to update.
1482 *
1483 * Update a journal's errno. Write updated superblock to disk waiting for IO
1484 * to complete.
1485 */
d796c52e 1486void jbd2_journal_update_sb_errno(journal_t *journal)
24bcc89c
JK
1487{
1488 journal_superblock_t *sb = journal->j_superblock;
fb7c0244 1489 int errcode;
24bcc89c
JK
1490
1491 read_lock(&journal->j_state_lock);
fb7c0244 1492 errcode = journal->j_errno;
24bcc89c 1493 read_unlock(&journal->j_state_lock);
fb7c0244
TT
1494 if (errcode == -ESHUTDOWN)
1495 errcode = 0;
1496 jbd_debug(1, "JBD2: updating superblock error (errno %d)\n", errcode);
1497 sb->s_errno = cpu_to_be32(errcode);
24bcc89c 1498
17f423b5 1499 jbd2_write_superblock(journal, REQ_SYNC | REQ_FUA);
24bcc89c 1500}
d796c52e 1501EXPORT_SYMBOL(jbd2_journal_update_sb_errno);
24bcc89c 1502
470decc6
DK
1503/*
1504 * Read the superblock for a given journal, performing initial
1505 * validation of the format.
1506 */
470decc6
DK
1507static int journal_get_superblock(journal_t *journal)
1508{
1509 struct buffer_head *bh;
1510 journal_superblock_t *sb;
1511 int err = -EIO;
1512
1513 bh = journal->j_sb_buffer;
1514
1515 J_ASSERT(bh != NULL);
1516 if (!buffer_uptodate(bh)) {
dfec8a14 1517 ll_rw_block(REQ_OP_READ, 0, 1, &bh);
470decc6
DK
1518 wait_on_buffer(bh);
1519 if (!buffer_uptodate(bh)) {
f2a44523
EG
1520 printk(KERN_ERR
1521 "JBD2: IO error reading journal superblock\n");
470decc6
DK
1522 goto out;
1523 }
1524 }
1525
25ed6e8a
DW
1526 if (buffer_verified(bh))
1527 return 0;
1528
470decc6
DK
1529 sb = journal->j_superblock;
1530
1531 err = -EINVAL;
1532
f7f4bccb 1533 if (sb->s_header.h_magic != cpu_to_be32(JBD2_MAGIC_NUMBER) ||
470decc6 1534 sb->s_blocksize != cpu_to_be32(journal->j_blocksize)) {
f2a44523 1535 printk(KERN_WARNING "JBD2: no valid journal superblock found\n");
470decc6
DK
1536 goto out;
1537 }
1538
1539 switch(be32_to_cpu(sb->s_header.h_blocktype)) {
f7f4bccb 1540 case JBD2_SUPERBLOCK_V1:
470decc6
DK
1541 journal->j_format_version = 1;
1542 break;
f7f4bccb 1543 case JBD2_SUPERBLOCK_V2:
470decc6
DK
1544 journal->j_format_version = 2;
1545 break;
1546 default:
f2a44523 1547 printk(KERN_WARNING "JBD2: unrecognised superblock format ID\n");
470decc6
DK
1548 goto out;
1549 }
1550
1551 if (be32_to_cpu(sb->s_maxlen) < journal->j_maxlen)
1552 journal->j_maxlen = be32_to_cpu(sb->s_maxlen);
1553 else if (be32_to_cpu(sb->s_maxlen) > journal->j_maxlen) {
f2a44523 1554 printk(KERN_WARNING "JBD2: journal file too short\n");
470decc6
DK
1555 goto out;
1556 }
1557
8762202d
EG
1558 if (be32_to_cpu(sb->s_first) == 0 ||
1559 be32_to_cpu(sb->s_first) >= journal->j_maxlen) {
1560 printk(KERN_WARNING
1561 "JBD2: Invalid start block of journal: %u\n",
1562 be32_to_cpu(sb->s_first));
1563 goto out;
1564 }
1565
56316a0d
DW
1566 if (jbd2_has_feature_csum2(journal) &&
1567 jbd2_has_feature_csum3(journal)) {
db9ee220
DW
1568 /* Can't have checksum v2 and v3 at the same time! */
1569 printk(KERN_ERR "JBD2: Can't enable checksumming v2 and v3 "
1570 "at the same time!\n");
1571 goto out;
1572 }
1573
8595798c 1574 if (jbd2_journal_has_csum_v2or3_feature(journal) &&
56316a0d 1575 jbd2_has_feature_checksum(journal)) {
feb8c6d3
DW
1576 /* Can't have checksum v1 and v2 on at the same time! */
1577 printk(KERN_ERR "JBD2: Can't enable checksumming v1 and v2/3 "
1578 "at the same time!\n");
1579 goto out;
1580 }
1581
25ed6e8a 1582 if (!jbd2_verify_csum_type(journal, sb)) {
a67c848a 1583 printk(KERN_ERR "JBD2: Unknown checksum type\n");
25ed6e8a
DW
1584 goto out;
1585 }
1586
01b5adce 1587 /* Load the checksum driver */
8595798c 1588 if (jbd2_journal_has_csum_v2or3_feature(journal)) {
01b5adce
DW
1589 journal->j_chksum_driver = crypto_alloc_shash("crc32c", 0, 0);
1590 if (IS_ERR(journal->j_chksum_driver)) {
a67c848a 1591 printk(KERN_ERR "JBD2: Cannot load crc32c driver.\n");
01b5adce
DW
1592 err = PTR_ERR(journal->j_chksum_driver);
1593 journal->j_chksum_driver = NULL;
1594 goto out;
1595 }
1596 }
1597
4fd5ea43
DW
1598 /* Check superblock checksum */
1599 if (!jbd2_superblock_csum_verify(journal, sb)) {
a67c848a 1600 printk(KERN_ERR "JBD2: journal checksum error\n");
6a797d27 1601 err = -EFSBADCRC;
4fd5ea43
DW
1602 goto out;
1603 }
1604
1605 /* Precompute checksum seed for all metadata */
db9ee220 1606 if (jbd2_journal_has_csum_v2or3(journal))
4fd5ea43
DW
1607 journal->j_csum_seed = jbd2_chksum(journal, ~0, sb->s_uuid,
1608 sizeof(sb->s_uuid));
1609
25ed6e8a
DW
1610 set_buffer_verified(bh);
1611
470decc6
DK
1612 return 0;
1613
1614out:
1615 journal_fail_superblock(journal);
1616 return err;
1617}
1618
1619/*
1620 * Load the on-disk journal superblock and read the key fields into the
1621 * journal_t.
1622 */
1623
1624static int load_superblock(journal_t *journal)
1625{
1626 int err;
1627 journal_superblock_t *sb;
1628
1629 err = journal_get_superblock(journal);
1630 if (err)
1631 return err;
1632
1633 sb = journal->j_superblock;
1634
1635 journal->j_tail_sequence = be32_to_cpu(sb->s_sequence);
1636 journal->j_tail = be32_to_cpu(sb->s_start);
1637 journal->j_first = be32_to_cpu(sb->s_first);
1638 journal->j_last = be32_to_cpu(sb->s_maxlen);
1639 journal->j_errno = be32_to_cpu(sb->s_errno);
1640
1641 return 0;
1642}
1643
1644
1645/**
f7f4bccb 1646 * int jbd2_journal_load() - Read journal from disk.
470decc6
DK
1647 * @journal: Journal to act on.
1648 *
1649 * Given a journal_t structure which tells us which disk blocks contain
1650 * a journal, read the journal from disk to initialise the in-memory
1651 * structures.
1652 */
f7f4bccb 1653int jbd2_journal_load(journal_t *journal)
470decc6
DK
1654{
1655 int err;
1656 journal_superblock_t *sb;
1657
1658 err = load_superblock(journal);
1659 if (err)
1660 return err;
1661
1662 sb = journal->j_superblock;
1663 /* If this is a V2 superblock, then we have to check the
1664 * features flags on it. */
1665
1666 if (journal->j_format_version >= 2) {
1667 if ((sb->s_feature_ro_compat &
f7f4bccb 1668 ~cpu_to_be32(JBD2_KNOWN_ROCOMPAT_FEATURES)) ||
470decc6 1669 (sb->s_feature_incompat &
f7f4bccb 1670 ~cpu_to_be32(JBD2_KNOWN_INCOMPAT_FEATURES))) {
f2a44523
EG
1671 printk(KERN_WARNING
1672 "JBD2: Unrecognised features on journal\n");
470decc6
DK
1673 return -EINVAL;
1674 }
1675 }
1676
d2eecb03
TT
1677 /*
1678 * Create a slab for this blocksize
1679 */
1680 err = jbd2_journal_create_slab(be32_to_cpu(sb->s_blocksize));
1681 if (err)
1682 return err;
1683
470decc6
DK
1684 /* Let the recovery code check whether it needs to recover any
1685 * data from the journal. */
f7f4bccb 1686 if (jbd2_journal_recover(journal))
470decc6
DK
1687 goto recovery_error;
1688
e6a47428
TT
1689 if (journal->j_failed_commit) {
1690 printk(KERN_ERR "JBD2: journal transaction %u on %s "
1691 "is corrupt.\n", journal->j_failed_commit,
1692 journal->j_devname);
6a797d27 1693 return -EFSCORRUPTED;
e6a47428
TT
1694 }
1695
470decc6
DK
1696 /* OK, we've finished with the dynamic journal bits:
1697 * reinitialise the dynamic contents of the superblock in memory
1698 * and reset them on disk. */
1699 if (journal_reset(journal))
1700 goto recovery_error;
1701
f7f4bccb
MC
1702 journal->j_flags &= ~JBD2_ABORT;
1703 journal->j_flags |= JBD2_LOADED;
470decc6
DK
1704 return 0;
1705
1706recovery_error:
f2a44523 1707 printk(KERN_WARNING "JBD2: recovery failed\n");
470decc6
DK
1708 return -EIO;
1709}
1710
1711/**
f7f4bccb 1712 * void jbd2_journal_destroy() - Release a journal_t structure.
470decc6
DK
1713 * @journal: Journal to act on.
1714 *
1715 * Release a journal_t structure once it is no longer in use by the
1716 * journaled object.
44519faf 1717 * Return <0 if we couldn't clean up the journal.
470decc6 1718 */
44519faf 1719int jbd2_journal_destroy(journal_t *journal)
470decc6 1720{
44519faf
HK
1721 int err = 0;
1722
470decc6
DK
1723 /* Wait for the commit thread to wake up and die. */
1724 journal_kill_thread(journal);
1725
1726 /* Force a final log commit */
1727 if (journal->j_running_transaction)
f7f4bccb 1728 jbd2_journal_commit_transaction(journal);
470decc6
DK
1729
1730 /* Force any old transactions to disk */
1731
1732 /* Totally anal locking here... */
1733 spin_lock(&journal->j_list_lock);
1734 while (journal->j_checkpoint_transactions != NULL) {
1735 spin_unlock(&journal->j_list_lock);
6fa7aa50 1736 mutex_lock_io(&journal->j_checkpoint_mutex);
841df7df 1737 err = jbd2_log_do_checkpoint(journal);
1a0d3786 1738 mutex_unlock(&journal->j_checkpoint_mutex);
841df7df
JK
1739 /*
1740 * If checkpointing failed, just free the buffers to avoid
1741 * looping forever
1742 */
1743 if (err) {
1744 jbd2_journal_destroy_checkpoint(journal);
1745 spin_lock(&journal->j_list_lock);
1746 break;
1747 }
470decc6
DK
1748 spin_lock(&journal->j_list_lock);
1749 }
1750
1751 J_ASSERT(journal->j_running_transaction == NULL);
1752 J_ASSERT(journal->j_committing_transaction == NULL);
1753 J_ASSERT(journal->j_checkpoint_transactions == NULL);
1754 spin_unlock(&journal->j_list_lock);
1755
470decc6 1756 if (journal->j_sb_buffer) {
44519faf 1757 if (!is_journal_aborted(journal)) {
6fa7aa50 1758 mutex_lock_io(&journal->j_checkpoint_mutex);
c0a2ad9b
OH
1759
1760 write_lock(&journal->j_state_lock);
1761 journal->j_tail_sequence =
1762 ++journal->j_transaction_sequence;
1763 write_unlock(&journal->j_state_lock);
1764
70fd7614 1765 jbd2_mark_journal_empty(journal,
17f423b5 1766 REQ_SYNC | REQ_PREFLUSH | REQ_FUA);
a78bb11d
JK
1767 mutex_unlock(&journal->j_checkpoint_mutex);
1768 } else
44519faf 1769 err = -EIO;
470decc6
DK
1770 brelse(journal->j_sb_buffer);
1771 }
1772
8e85fb3f
JL
1773 if (journal->j_proc_entry)
1774 jbd2_stats_proc_exit(journal);
d9f39d1e 1775 iput(journal->j_inode);
470decc6 1776 if (journal->j_revoke)
f7f4bccb 1777 jbd2_journal_destroy_revoke(journal);
01b5adce
DW
1778 if (journal->j_chksum_driver)
1779 crypto_free_shash(journal->j_chksum_driver);
470decc6
DK
1780 kfree(journal->j_wbuf);
1781 kfree(journal);
44519faf
HK
1782
1783 return err;
470decc6
DK
1784}
1785
1786
1787/**
f7f4bccb 1788 *int jbd2_journal_check_used_features () - Check if features specified are used.
470decc6
DK
1789 * @journal: Journal to check.
1790 * @compat: bitmask of compatible features
1791 * @ro: bitmask of features that force read-only mount
1792 * @incompat: bitmask of incompatible features
1793 *
1794 * Check whether the journal uses all of a given set of
1795 * features. Return true (non-zero) if it does.
1796 **/
1797
f7f4bccb 1798int jbd2_journal_check_used_features (journal_t *journal, unsigned long compat,
470decc6
DK
1799 unsigned long ro, unsigned long incompat)
1800{
1801 journal_superblock_t *sb;
1802
1803 if (!compat && !ro && !incompat)
1804 return 1;
1113e1b5
PL
1805 /* Load journal superblock if it is not loaded yet. */
1806 if (journal->j_format_version == 0 &&
1807 journal_get_superblock(journal) != 0)
1808 return 0;
470decc6
DK
1809 if (journal->j_format_version == 1)
1810 return 0;
1811
1812 sb = journal->j_superblock;
1813
1814 if (((be32_to_cpu(sb->s_feature_compat) & compat) == compat) &&
1815 ((be32_to_cpu(sb->s_feature_ro_compat) & ro) == ro) &&
1816 ((be32_to_cpu(sb->s_feature_incompat) & incompat) == incompat))
1817 return 1;
1818
1819 return 0;
1820}
1821
1822/**
f7f4bccb 1823 * int jbd2_journal_check_available_features() - Check feature set in journalling layer
470decc6
DK
1824 * @journal: Journal to check.
1825 * @compat: bitmask of compatible features
1826 * @ro: bitmask of features that force read-only mount
1827 * @incompat: bitmask of incompatible features
1828 *
1829 * Check whether the journaling code supports the use of
1830 * all of a given set of features on this journal. Return true
1831 * (non-zero) if it can. */
1832
f7f4bccb 1833int jbd2_journal_check_available_features (journal_t *journal, unsigned long compat,
470decc6
DK
1834 unsigned long ro, unsigned long incompat)
1835{
470decc6
DK
1836 if (!compat && !ro && !incompat)
1837 return 1;
1838
470decc6
DK
1839 /* We can support any known requested features iff the
1840 * superblock is in version 2. Otherwise we fail to support any
1841 * extended sb features. */
1842
1843 if (journal->j_format_version != 2)
1844 return 0;
1845
f7f4bccb
MC
1846 if ((compat & JBD2_KNOWN_COMPAT_FEATURES) == compat &&
1847 (ro & JBD2_KNOWN_ROCOMPAT_FEATURES) == ro &&
1848 (incompat & JBD2_KNOWN_INCOMPAT_FEATURES) == incompat)
470decc6
DK
1849 return 1;
1850
1851 return 0;
1852}
1853
1854/**
f7f4bccb 1855 * int jbd2_journal_set_features () - Mark a given journal feature in the superblock
470decc6
DK
1856 * @journal: Journal to act on.
1857 * @compat: bitmask of compatible features
1858 * @ro: bitmask of features that force read-only mount
1859 * @incompat: bitmask of incompatible features
1860 *
1861 * Mark a given journal feature as present on the
1862 * superblock. Returns true if the requested features could be set.
1863 *
1864 */
1865
f7f4bccb 1866int jbd2_journal_set_features (journal_t *journal, unsigned long compat,
470decc6
DK
1867 unsigned long ro, unsigned long incompat)
1868{
25ed6e8a
DW
1869#define INCOMPAT_FEATURE_ON(f) \
1870 ((incompat & (f)) && !(sb->s_feature_incompat & cpu_to_be32(f)))
1871#define COMPAT_FEATURE_ON(f) \
1872 ((compat & (f)) && !(sb->s_feature_compat & cpu_to_be32(f)))
470decc6
DK
1873 journal_superblock_t *sb;
1874
f7f4bccb 1875 if (jbd2_journal_check_used_features(journal, compat, ro, incompat))
470decc6
DK
1876 return 1;
1877
f7f4bccb 1878 if (!jbd2_journal_check_available_features(journal, compat, ro, incompat))
470decc6
DK
1879 return 0;
1880
db9ee220
DW
1881 /* If enabling v2 checksums, turn on v3 instead */
1882 if (incompat & JBD2_FEATURE_INCOMPAT_CSUM_V2) {
1883 incompat &= ~JBD2_FEATURE_INCOMPAT_CSUM_V2;
1884 incompat |= JBD2_FEATURE_INCOMPAT_CSUM_V3;
1885 }
1886
1887 /* Asking for checksumming v3 and v1? Only give them v3. */
1888 if (incompat & JBD2_FEATURE_INCOMPAT_CSUM_V3 &&
25ed6e8a
DW
1889 compat & JBD2_FEATURE_COMPAT_CHECKSUM)
1890 compat &= ~JBD2_FEATURE_COMPAT_CHECKSUM;
1891
470decc6
DK
1892 jbd_debug(1, "Setting new features 0x%lx/0x%lx/0x%lx\n",
1893 compat, ro, incompat);
1894
1895 sb = journal->j_superblock;
1896
db9ee220
DW
1897 /* If enabling v3 checksums, update superblock */
1898 if (INCOMPAT_FEATURE_ON(JBD2_FEATURE_INCOMPAT_CSUM_V3)) {
25ed6e8a
DW
1899 sb->s_checksum_type = JBD2_CRC32C_CHKSUM;
1900 sb->s_feature_compat &=
1901 ~cpu_to_be32(JBD2_FEATURE_COMPAT_CHECKSUM);
01b5adce
DW
1902
1903 /* Load the checksum driver */
1904 if (journal->j_chksum_driver == NULL) {
1905 journal->j_chksum_driver = crypto_alloc_shash("crc32c",
1906 0, 0);
1907 if (IS_ERR(journal->j_chksum_driver)) {
a67c848a 1908 printk(KERN_ERR "JBD2: Cannot load crc32c "
01b5adce
DW
1909 "driver.\n");
1910 journal->j_chksum_driver = NULL;
1911 return 0;
1912 }
4fd5ea43 1913
32f38691 1914 /* Precompute checksum seed for all metadata */
4fd5ea43
DW
1915 journal->j_csum_seed = jbd2_chksum(journal, ~0,
1916 sb->s_uuid,
1917 sizeof(sb->s_uuid));
32f38691 1918 }
25ed6e8a
DW
1919 }
1920
1921 /* If enabling v1 checksums, downgrade superblock */
1922 if (COMPAT_FEATURE_ON(JBD2_FEATURE_COMPAT_CHECKSUM))
1923 sb->s_feature_incompat &=
db9ee220
DW
1924 ~cpu_to_be32(JBD2_FEATURE_INCOMPAT_CSUM_V2 |
1925 JBD2_FEATURE_INCOMPAT_CSUM_V3);
25ed6e8a 1926
470decc6
DK
1927 sb->s_feature_compat |= cpu_to_be32(compat);
1928 sb->s_feature_ro_compat |= cpu_to_be32(ro);
1929 sb->s_feature_incompat |= cpu_to_be32(incompat);
1930
1931 return 1;
25ed6e8a
DW
1932#undef COMPAT_FEATURE_ON
1933#undef INCOMPAT_FEATURE_ON
470decc6
DK
1934}
1935
818d276c
GS
1936/*
1937 * jbd2_journal_clear_features () - Clear a given journal feature in the
1938 * superblock
1939 * @journal: Journal to act on.
1940 * @compat: bitmask of compatible features
1941 * @ro: bitmask of features that force read-only mount
1942 * @incompat: bitmask of incompatible features
1943 *
1944 * Clear a given journal feature as present on the
1945 * superblock.
1946 */
1947void jbd2_journal_clear_features(journal_t *journal, unsigned long compat,
1948 unsigned long ro, unsigned long incompat)
1949{
1950 journal_superblock_t *sb;
1951
1952 jbd_debug(1, "Clear features 0x%lx/0x%lx/0x%lx\n",
1953 compat, ro, incompat);
1954
1955 sb = journal->j_superblock;
1956
1957 sb->s_feature_compat &= ~cpu_to_be32(compat);
1958 sb->s_feature_ro_compat &= ~cpu_to_be32(ro);
1959 sb->s_feature_incompat &= ~cpu_to_be32(incompat);
1960}
1961EXPORT_SYMBOL(jbd2_journal_clear_features);
470decc6 1962
470decc6 1963/**
f7f4bccb 1964 * int jbd2_journal_flush () - Flush journal
470decc6
DK
1965 * @journal: Journal to act on.
1966 *
1967 * Flush all data for a given journal to disk and empty the journal.
1968 * Filesystems can use this when remounting readonly to ensure that
1969 * recovery does not need to happen on remount.
1970 */
1971
f7f4bccb 1972int jbd2_journal_flush(journal_t *journal)
470decc6
DK
1973{
1974 int err = 0;
1975 transaction_t *transaction = NULL;
470decc6 1976
a931da6a 1977 write_lock(&journal->j_state_lock);
470decc6
DK
1978
1979 /* Force everything buffered to the log... */
1980 if (journal->j_running_transaction) {
1981 transaction = journal->j_running_transaction;
f7f4bccb 1982 __jbd2_log_start_commit(journal, transaction->t_tid);
470decc6
DK
1983 } else if (journal->j_committing_transaction)
1984 transaction = journal->j_committing_transaction;
1985
1986 /* Wait for the log commit to complete... */
1987 if (transaction) {
1988 tid_t tid = transaction->t_tid;
1989
a931da6a 1990 write_unlock(&journal->j_state_lock);
f7f4bccb 1991 jbd2_log_wait_commit(journal, tid);
470decc6 1992 } else {
a931da6a 1993 write_unlock(&journal->j_state_lock);
470decc6
DK
1994 }
1995
1996 /* ...and flush everything in the log out to disk. */
1997 spin_lock(&journal->j_list_lock);
1998 while (!err && journal->j_checkpoint_transactions != NULL) {
1999 spin_unlock(&journal->j_list_lock);
6fa7aa50 2000 mutex_lock_io(&journal->j_checkpoint_mutex);
f7f4bccb 2001 err = jbd2_log_do_checkpoint(journal);
44519faf 2002 mutex_unlock(&journal->j_checkpoint_mutex);
470decc6
DK
2003 spin_lock(&journal->j_list_lock);
2004 }
2005 spin_unlock(&journal->j_list_lock);
44519faf
HK
2006
2007 if (is_journal_aborted(journal))
2008 return -EIO;
2009
6fa7aa50 2010 mutex_lock_io(&journal->j_checkpoint_mutex);
6f6a6fda
JQ
2011 if (!err) {
2012 err = jbd2_cleanup_journal_tail(journal);
2013 if (err < 0) {
2014 mutex_unlock(&journal->j_checkpoint_mutex);
2015 goto out;
2016 }
2017 err = 0;
2018 }
470decc6
DK
2019
2020 /* Finally, mark the journal as really needing no recovery.
2021 * This sets s_start==0 in the underlying superblock, which is
2022 * the magic code for a fully-recovered superblock. Any future
2023 * commits of data to the journal will restore the current
2024 * s_start value. */
17f423b5 2025 jbd2_mark_journal_empty(journal, REQ_SYNC | REQ_FUA);
a78bb11d 2026 mutex_unlock(&journal->j_checkpoint_mutex);
a931da6a 2027 write_lock(&journal->j_state_lock);
470decc6
DK
2028 J_ASSERT(!journal->j_running_transaction);
2029 J_ASSERT(!journal->j_committing_transaction);
2030 J_ASSERT(!journal->j_checkpoint_transactions);
2031 J_ASSERT(journal->j_head == journal->j_tail);
2032 J_ASSERT(journal->j_tail_sequence == journal->j_transaction_sequence);
a931da6a 2033 write_unlock(&journal->j_state_lock);
6f6a6fda
JQ
2034out:
2035 return err;
470decc6
DK
2036}
2037
2038/**
f7f4bccb 2039 * int jbd2_journal_wipe() - Wipe journal contents
470decc6
DK
2040 * @journal: Journal to act on.
2041 * @write: flag (see below)
2042 *
2043 * Wipe out all of the contents of a journal, safely. This will produce
2044 * a warning if the journal contains any valid recovery information.
f7f4bccb 2045 * Must be called between journal_init_*() and jbd2_journal_load().
470decc6
DK
2046 *
2047 * If 'write' is non-zero, then we wipe out the journal on disk; otherwise
2048 * we merely suppress recovery.
2049 */
2050
f7f4bccb 2051int jbd2_journal_wipe(journal_t *journal, int write)
470decc6 2052{
470decc6
DK
2053 int err = 0;
2054
f7f4bccb 2055 J_ASSERT (!(journal->j_flags & JBD2_LOADED));
470decc6
DK
2056
2057 err = load_superblock(journal);
2058 if (err)
2059 return err;
2060
470decc6
DK
2061 if (!journal->j_tail)
2062 goto no_recovery;
2063
f2a44523 2064 printk(KERN_WARNING "JBD2: %s recovery information on journal\n",
470decc6
DK
2065 write ? "Clearing" : "Ignoring");
2066
f7f4bccb 2067 err = jbd2_journal_skip_recovery(journal);
a78bb11d
JK
2068 if (write) {
2069 /* Lock to make assertions happy... */
2070 mutex_lock(&journal->j_checkpoint_mutex);
17f423b5 2071 jbd2_mark_journal_empty(journal, REQ_SYNC | REQ_FUA);
a78bb11d
JK
2072 mutex_unlock(&journal->j_checkpoint_mutex);
2073 }
470decc6
DK
2074
2075 no_recovery:
2076 return err;
2077}
2078
470decc6
DK
2079/*
2080 * Journal abort has very specific semantics, which we describe
2081 * for journal abort.
2082 *
bfcd3555 2083 * Two internal functions, which provide abort to the jbd layer
470decc6
DK
2084 * itself are here.
2085 */
2086
2087/*
2088 * Quick version for internal journal use (doesn't lock the journal).
2089 * Aborts hard --- we mark the abort as occurred, but do _nothing_ else,
2090 * and don't attempt to make any other journal updates.
2091 */
f7f4bccb 2092void __jbd2_journal_abort_hard(journal_t *journal)
470decc6
DK
2093{
2094 transaction_t *transaction;
470decc6 2095
f7f4bccb 2096 if (journal->j_flags & JBD2_ABORT)
470decc6
DK
2097 return;
2098
2099 printk(KERN_ERR "Aborting journal on device %s.\n",
05496769 2100 journal->j_devname);
470decc6 2101
a931da6a 2102 write_lock(&journal->j_state_lock);
f7f4bccb 2103 journal->j_flags |= JBD2_ABORT;
470decc6
DK
2104 transaction = journal->j_running_transaction;
2105 if (transaction)
f7f4bccb 2106 __jbd2_log_start_commit(journal, transaction->t_tid);
a931da6a 2107 write_unlock(&journal->j_state_lock);
470decc6
DK
2108}
2109
2110/* Soft abort: record the abort error status in the journal superblock,
2111 * but don't do any other IO. */
2112static void __journal_abort_soft (journal_t *journal, int errno)
2113{
fb7c0244 2114 int old_errno;
470decc6 2115
fb7c0244
TT
2116 write_lock(&journal->j_state_lock);
2117 old_errno = journal->j_errno;
2118 if (!journal->j_errno || errno == -ESHUTDOWN)
470decc6
DK
2119 journal->j_errno = errno;
2120
fb7c0244
TT
2121 if (journal->j_flags & JBD2_ABORT) {
2122 write_unlock(&journal->j_state_lock);
2123 if (!old_errno && old_errno != -ESHUTDOWN &&
2124 errno == -ESHUTDOWN)
2125 jbd2_journal_update_sb_errno(journal);
2126 return;
2127 }
2128 write_unlock(&journal->j_state_lock);
2129
f7f4bccb 2130 __jbd2_journal_abort_hard(journal);
470decc6 2131
4327ba52 2132 if (errno) {
24bcc89c 2133 jbd2_journal_update_sb_errno(journal);
4327ba52
DJ
2134 write_lock(&journal->j_state_lock);
2135 journal->j_flags |= JBD2_REC_ERR;
2136 write_unlock(&journal->j_state_lock);
2137 }
470decc6
DK
2138}
2139
2140/**
f7f4bccb 2141 * void jbd2_journal_abort () - Shutdown the journal immediately.
470decc6
DK
2142 * @journal: the journal to shutdown.
2143 * @errno: an error number to record in the journal indicating
2144 * the reason for the shutdown.
2145 *
2146 * Perform a complete, immediate shutdown of the ENTIRE
2147 * journal (not of a single transaction). This operation cannot be
2148 * undone without closing and reopening the journal.
2149 *
f7f4bccb 2150 * The jbd2_journal_abort function is intended to support higher level error
470decc6
DK
2151 * recovery mechanisms such as the ext2/ext3 remount-readonly error
2152 * mode.
2153 *
2154 * Journal abort has very specific semantics. Any existing dirty,
2155 * unjournaled buffers in the main filesystem will still be written to
2156 * disk by bdflush, but the journaling mechanism will be suspended
2157 * immediately and no further transaction commits will be honoured.
2158 *
2159 * Any dirty, journaled buffers will be written back to disk without
2160 * hitting the journal. Atomicity cannot be guaranteed on an aborted
2161 * filesystem, but we _do_ attempt to leave as much data as possible
2162 * behind for fsck to use for cleanup.
2163 *
2164 * Any attempt to get a new transaction handle on a journal which is in
2165 * ABORT state will just result in an -EROFS error return. A
f7f4bccb 2166 * jbd2_journal_stop on an existing handle will return -EIO if we have
470decc6
DK
2167 * entered abort state during the update.
2168 *
2169 * Recursive transactions are not disturbed by journal abort until the
f7f4bccb 2170 * final jbd2_journal_stop, which will receive the -EIO error.
470decc6 2171 *
f7f4bccb 2172 * Finally, the jbd2_journal_abort call allows the caller to supply an errno
470decc6
DK
2173 * which will be recorded (if possible) in the journal superblock. This
2174 * allows a client to record failure conditions in the middle of a
2175 * transaction without having to complete the transaction to record the
2176 * failure to disk. ext3_error, for example, now uses this
2177 * functionality.
2178 *
2179 * Errors which originate from within the journaling layer will NOT
2180 * supply an errno; a null errno implies that absolutely no further
2181 * writes are done to the journal (unless there are any already in
2182 * progress).
2183 *
2184 */
2185
f7f4bccb 2186void jbd2_journal_abort(journal_t *journal, int errno)
470decc6
DK
2187{
2188 __journal_abort_soft(journal, errno);
2189}
2190
2191/**
f7f4bccb 2192 * int jbd2_journal_errno () - returns the journal's error state.
470decc6
DK
2193 * @journal: journal to examine.
2194 *
bfcd3555 2195 * This is the errno number set with jbd2_journal_abort(), the last
470decc6
DK
2196 * time the journal was mounted - if the journal was stopped
2197 * without calling abort this will be 0.
2198 *
2199 * If the journal has been aborted on this mount time -EROFS will
2200 * be returned.
2201 */
f7f4bccb 2202int jbd2_journal_errno(journal_t *journal)
470decc6
DK
2203{
2204 int err;
2205
a931da6a 2206 read_lock(&journal->j_state_lock);
f7f4bccb 2207 if (journal->j_flags & JBD2_ABORT)
470decc6
DK
2208 err = -EROFS;
2209 else
2210 err = journal->j_errno;
a931da6a 2211 read_unlock(&journal->j_state_lock);
470decc6
DK
2212 return err;
2213}
2214
2215/**
f7f4bccb 2216 * int jbd2_journal_clear_err () - clears the journal's error state
470decc6
DK
2217 * @journal: journal to act on.
2218 *
bfcd3555 2219 * An error must be cleared or acked to take a FS out of readonly
470decc6
DK
2220 * mode.
2221 */
f7f4bccb 2222int jbd2_journal_clear_err(journal_t *journal)
470decc6
DK
2223{
2224 int err = 0;
2225
a931da6a 2226 write_lock(&journal->j_state_lock);
f7f4bccb 2227 if (journal->j_flags & JBD2_ABORT)
470decc6
DK
2228 err = -EROFS;
2229 else
2230 journal->j_errno = 0;
a931da6a 2231 write_unlock(&journal->j_state_lock);
470decc6
DK
2232 return err;
2233}
2234
2235/**
f7f4bccb 2236 * void jbd2_journal_ack_err() - Ack journal err.
470decc6
DK
2237 * @journal: journal to act on.
2238 *
bfcd3555 2239 * An error must be cleared or acked to take a FS out of readonly
470decc6
DK
2240 * mode.
2241 */
f7f4bccb 2242void jbd2_journal_ack_err(journal_t *journal)
470decc6 2243{
a931da6a 2244 write_lock(&journal->j_state_lock);
470decc6 2245 if (journal->j_errno)
f7f4bccb 2246 journal->j_flags |= JBD2_ACK_ERR;
a931da6a 2247 write_unlock(&journal->j_state_lock);
470decc6
DK
2248}
2249
f7f4bccb 2250int jbd2_journal_blocks_per_page(struct inode *inode)
470decc6 2251{
09cbfeaf 2252 return 1 << (PAGE_SHIFT - inode->i_sb->s_blocksize_bits);
470decc6
DK
2253}
2254
b517bea1
ZB
2255/*
2256 * helper functions to deal with 32 or 64bit block numbers.
2257 */
2258size_t journal_tag_bytes(journal_t *journal)
2259{
db9ee220
DW
2260 size_t sz;
2261
56316a0d 2262 if (jbd2_has_feature_csum3(journal))
db9ee220
DW
2263 return sizeof(journal_block_tag3_t);
2264
2265 sz = sizeof(journal_block_tag_t);
c3900875 2266
56316a0d 2267 if (jbd2_has_feature_csum2(journal))
db9ee220 2268 sz += sizeof(__u16);
c3900875 2269
56316a0d 2270 if (jbd2_has_feature_64bit(journal))
db9ee220 2271 return sz;
b517bea1 2272 else
db9ee220 2273 return sz - sizeof(__u32);
b517bea1
ZB
2274}
2275
d2eecb03
TT
2276/*
2277 * JBD memory management
2278 *
2279 * These functions are used to allocate block-sized chunks of memory
2280 * used for making copies of buffer_head data. Very often it will be
2281 * page-sized chunks of data, but sometimes it will be in
2282 * sub-page-size chunks. (For example, 16k pages on Power systems
2283 * with a 4k block file system.) For blocks smaller than a page, we
2284 * use a SLAB allocator. There are slab caches for each block size,
2285 * which are allocated at mount time, if necessary, and we only free
2286 * (all of) the slab caches when/if the jbd2 module is unloaded. For
2287 * this reason we don't need to a mutex to protect access to
2288 * jbd2_slab[] allocating or releasing memory; only in
2289 * jbd2_journal_create_slab().
2290 */
2291#define JBD2_MAX_SLABS 8
2292static struct kmem_cache *jbd2_slab[JBD2_MAX_SLABS];
d2eecb03
TT
2293
2294static const char *jbd2_slab_names[JBD2_MAX_SLABS] = {
2295 "jbd2_1k", "jbd2_2k", "jbd2_4k", "jbd2_8k",
2296 "jbd2_16k", "jbd2_32k", "jbd2_64k", "jbd2_128k"
2297};
2298
2299
2300static void jbd2_journal_destroy_slabs(void)
2301{
2302 int i;
2303
2304 for (i = 0; i < JBD2_MAX_SLABS; i++) {
8bdd5b60 2305 kmem_cache_destroy(jbd2_slab[i]);
d2eecb03
TT
2306 jbd2_slab[i] = NULL;
2307 }
2308}
2309
2310static int jbd2_journal_create_slab(size_t size)
2311{
51dfacde 2312 static DEFINE_MUTEX(jbd2_slab_create_mutex);
d2eecb03
TT
2313 int i = order_base_2(size) - 10;
2314 size_t slab_size;
2315
2316 if (size == PAGE_SIZE)
2317 return 0;
2318
2319 if (i >= JBD2_MAX_SLABS)
2320 return -EINVAL;
2321
2322 if (unlikely(i < 0))
2323 i = 0;
51dfacde 2324 mutex_lock(&jbd2_slab_create_mutex);
d2eecb03 2325 if (jbd2_slab[i]) {
51dfacde 2326 mutex_unlock(&jbd2_slab_create_mutex);
d2eecb03
TT
2327 return 0; /* Already created */
2328 }
2329
2330 slab_size = 1 << (i+10);
2331 jbd2_slab[i] = kmem_cache_create(jbd2_slab_names[i], slab_size,
2332 slab_size, 0, NULL);
51dfacde 2333 mutex_unlock(&jbd2_slab_create_mutex);
d2eecb03
TT
2334 if (!jbd2_slab[i]) {
2335 printk(KERN_EMERG "JBD2: no memory for jbd2_slab cache\n");
2336 return -ENOMEM;
2337 }
2338 return 0;
2339}
2340
2341static struct kmem_cache *get_slab(size_t size)
2342{
2343 int i = order_base_2(size) - 10;
2344
2345 BUG_ON(i >= JBD2_MAX_SLABS);
2346 if (unlikely(i < 0))
2347 i = 0;
8ac97b74 2348 BUG_ON(jbd2_slab[i] == NULL);
d2eecb03
TT
2349 return jbd2_slab[i];
2350}
2351
2352void *jbd2_alloc(size_t size, gfp_t flags)
2353{
2354 void *ptr;
2355
2356 BUG_ON(size & (size-1)); /* Must be a power of 2 */
2357
f2db1971 2358 if (size < PAGE_SIZE)
d2eecb03 2359 ptr = kmem_cache_alloc(get_slab(size), flags);
f2db1971
MH
2360 else
2361 ptr = (void *)__get_free_pages(flags, get_order(size));
d2eecb03
TT
2362
2363 /* Check alignment; SLUB has gotten this wrong in the past,
2364 * and this can lead to user data corruption! */
2365 BUG_ON(((unsigned long) ptr) & (size-1));
2366
2367 return ptr;
2368}
2369
2370void jbd2_free(void *ptr, size_t size)
2371{
f2db1971
MH
2372 if (size < PAGE_SIZE)
2373 kmem_cache_free(get_slab(size), ptr);
2374 else
2375 free_pages((unsigned long)ptr, get_order(size));
d2eecb03
TT
2376};
2377
470decc6
DK
2378/*
2379 * Journal_head storage management
2380 */
e18b890b 2381static struct kmem_cache *jbd2_journal_head_cache;
e23291b9 2382#ifdef CONFIG_JBD2_DEBUG
470decc6
DK
2383static atomic_t nr_journal_heads = ATOMIC_INIT(0);
2384#endif
2385
4185a2ac 2386static int jbd2_journal_init_journal_head_cache(void)
470decc6
DK
2387{
2388 int retval;
2389
1076d17a 2390 J_ASSERT(jbd2_journal_head_cache == NULL);
a920e941 2391 jbd2_journal_head_cache = kmem_cache_create("jbd2_journal_head",
470decc6
DK
2392 sizeof(struct journal_head),
2393 0, /* offset */
5f0d5a3a 2394 SLAB_TEMPORARY | SLAB_TYPESAFE_BY_RCU,
20c2df83 2395 NULL); /* ctor */
470decc6 2396 retval = 0;
1076d17a 2397 if (!jbd2_journal_head_cache) {
470decc6 2398 retval = -ENOMEM;
f2a44523 2399 printk(KERN_EMERG "JBD2: no memory for journal_head cache\n");
470decc6
DK
2400 }
2401 return retval;
2402}
2403
4185a2ac 2404static void jbd2_journal_destroy_journal_head_cache(void)
470decc6 2405{
8bdd5b60
WL
2406 kmem_cache_destroy(jbd2_journal_head_cache);
2407 jbd2_journal_head_cache = NULL;
470decc6
DK
2408}
2409
2410/*
2411 * journal_head splicing and dicing
2412 */
2413static struct journal_head *journal_alloc_journal_head(void)
2414{
2415 struct journal_head *ret;
470decc6 2416
e23291b9 2417#ifdef CONFIG_JBD2_DEBUG
470decc6
DK
2418 atomic_inc(&nr_journal_heads);
2419#endif
5d9cf9c6 2420 ret = kmem_cache_zalloc(jbd2_journal_head_cache, GFP_NOFS);
1076d17a 2421 if (!ret) {
470decc6 2422 jbd_debug(1, "out of memory for journal_head\n");
670be5a7 2423 pr_notice_ratelimited("ENOMEM in %s, retrying.\n", __func__);
7b506b10
MH
2424 ret = kmem_cache_zalloc(jbd2_journal_head_cache,
2425 GFP_NOFS | __GFP_NOFAIL);
470decc6
DK
2426 }
2427 return ret;
2428}
2429
2430static void journal_free_journal_head(struct journal_head *jh)
2431{
e23291b9 2432#ifdef CONFIG_JBD2_DEBUG
470decc6 2433 atomic_dec(&nr_journal_heads);
cd02ff0b 2434 memset(jh, JBD2_POISON_FREE, sizeof(*jh));
470decc6 2435#endif
f7f4bccb 2436 kmem_cache_free(jbd2_journal_head_cache, jh);
470decc6
DK
2437}
2438
2439/*
2440 * A journal_head is attached to a buffer_head whenever JBD has an
2441 * interest in the buffer.
2442 *
2443 * Whenever a buffer has an attached journal_head, its ->b_state:BH_JBD bit
2444 * is set. This bit is tested in core kernel code where we need to take
2445 * JBD-specific actions. Testing the zeroness of ->b_private is not reliable
2446 * there.
2447 *
2448 * When a buffer has its BH_JBD bit set, its ->b_count is elevated by one.
2449 *
2450 * When a buffer has its BH_JBD bit set it is immune from being released by
2451 * core kernel code, mainly via ->b_count.
2452 *
de1b7941
JK
2453 * A journal_head is detached from its buffer_head when the journal_head's
2454 * b_jcount reaches zero. Running transaction (b_transaction) and checkpoint
2455 * transaction (b_cp_transaction) hold their references to b_jcount.
470decc6
DK
2456 *
2457 * Various places in the kernel want to attach a journal_head to a buffer_head
2458 * _before_ attaching the journal_head to a transaction. To protect the
f7f4bccb 2459 * journal_head in this situation, jbd2_journal_add_journal_head elevates the
470decc6 2460 * journal_head's b_jcount refcount by one. The caller must call
f7f4bccb 2461 * jbd2_journal_put_journal_head() to undo this.
470decc6
DK
2462 *
2463 * So the typical usage would be:
2464 *
2465 * (Attach a journal_head if needed. Increments b_jcount)
f7f4bccb 2466 * struct journal_head *jh = jbd2_journal_add_journal_head(bh);
470decc6 2467 * ...
de1b7941
JK
2468 * (Get another reference for transaction)
2469 * jbd2_journal_grab_journal_head(bh);
470decc6 2470 * jh->b_transaction = xxx;
de1b7941 2471 * (Put original reference)
f7f4bccb 2472 * jbd2_journal_put_journal_head(jh);
470decc6
DK
2473 */
2474
2475/*
2476 * Give a buffer_head a journal_head.
2477 *
470decc6
DK
2478 * May sleep.
2479 */
f7f4bccb 2480struct journal_head *jbd2_journal_add_journal_head(struct buffer_head *bh)
470decc6
DK
2481{
2482 struct journal_head *jh;
2483 struct journal_head *new_jh = NULL;
2484
2485repeat:
5d9cf9c6 2486 if (!buffer_jbd(bh))
470decc6 2487 new_jh = journal_alloc_journal_head();
470decc6
DK
2488
2489 jbd_lock_bh_journal_head(bh);
2490 if (buffer_jbd(bh)) {
2491 jh = bh2jh(bh);
2492 } else {
2493 J_ASSERT_BH(bh,
2494 (atomic_read(&bh->b_count) > 0) ||
2495 (bh->b_page && bh->b_page->mapping));
2496
2497 if (!new_jh) {
2498 jbd_unlock_bh_journal_head(bh);
2499 goto repeat;
2500 }
2501
2502 jh = new_jh;
2503 new_jh = NULL; /* We consumed it */
2504 set_buffer_jbd(bh);
2505 bh->b_private = jh;
2506 jh->b_bh = bh;
2507 get_bh(bh);
2508 BUFFER_TRACE(bh, "added journal_head");
2509 }
2510 jh->b_jcount++;
2511 jbd_unlock_bh_journal_head(bh);
2512 if (new_jh)
2513 journal_free_journal_head(new_jh);
2514 return bh->b_private;
2515}
2516
2517/*
2518 * Grab a ref against this buffer_head's journal_head. If it ended up not
2519 * having a journal_head, return NULL
2520 */
f7f4bccb 2521struct journal_head *jbd2_journal_grab_journal_head(struct buffer_head *bh)
470decc6
DK
2522{
2523 struct journal_head *jh = NULL;
2524
2525 jbd_lock_bh_journal_head(bh);
2526 if (buffer_jbd(bh)) {
2527 jh = bh2jh(bh);
2528 jh->b_jcount++;
2529 }
2530 jbd_unlock_bh_journal_head(bh);
2531 return jh;
2532}
2533
2534static void __journal_remove_journal_head(struct buffer_head *bh)
2535{
2536 struct journal_head *jh = bh2jh(bh);
2537
2538 J_ASSERT_JH(jh, jh->b_jcount >= 0);
de1b7941
JK
2539 J_ASSERT_JH(jh, jh->b_transaction == NULL);
2540 J_ASSERT_JH(jh, jh->b_next_transaction == NULL);
2541 J_ASSERT_JH(jh, jh->b_cp_transaction == NULL);
2542 J_ASSERT_JH(jh, jh->b_jlist == BJ_None);
2543 J_ASSERT_BH(bh, buffer_jbd(bh));
2544 J_ASSERT_BH(bh, jh2bh(jh) == bh);
2545 BUFFER_TRACE(bh, "remove journal_head");
2546 if (jh->b_frozen_data) {
2547 printk(KERN_WARNING "%s: freeing b_frozen_data\n", __func__);
2548 jbd2_free(jh->b_frozen_data, bh->b_size);
470decc6 2549 }
de1b7941
JK
2550 if (jh->b_committed_data) {
2551 printk(KERN_WARNING "%s: freeing b_committed_data\n", __func__);
2552 jbd2_free(jh->b_committed_data, bh->b_size);
2553 }
2554 bh->b_private = NULL;
2555 jh->b_bh = NULL; /* debug, really */
2556 clear_buffer_jbd(bh);
2557 journal_free_journal_head(jh);
470decc6
DK
2558}
2559
2560/*
de1b7941 2561 * Drop a reference on the passed journal_head. If it fell to zero then
470decc6
DK
2562 * release the journal_head from the buffer_head.
2563 */
f7f4bccb 2564void jbd2_journal_put_journal_head(struct journal_head *jh)
470decc6
DK
2565{
2566 struct buffer_head *bh = jh2bh(jh);
2567
2568 jbd_lock_bh_journal_head(bh);
2569 J_ASSERT_JH(jh, jh->b_jcount > 0);
2570 --jh->b_jcount;
de1b7941 2571 if (!jh->b_jcount) {
470decc6 2572 __journal_remove_journal_head(bh);
de1b7941 2573 jbd_unlock_bh_journal_head(bh);
470decc6 2574 __brelse(bh);
de1b7941
JK
2575 } else
2576 jbd_unlock_bh_journal_head(bh);
470decc6
DK
2577}
2578
c851ed54
JK
2579/*
2580 * Initialize jbd inode head
2581 */
2582void jbd2_journal_init_jbd_inode(struct jbd2_inode *jinode, struct inode *inode)
2583{
2584 jinode->i_transaction = NULL;
2585 jinode->i_next_transaction = NULL;
2586 jinode->i_vfs_inode = inode;
2587 jinode->i_flags = 0;
2588 INIT_LIST_HEAD(&jinode->i_list);
2589}
2590
2591/*
2592 * Function to be called before we start removing inode from memory (i.e.,
2593 * clear_inode() is a fine place to be called from). It removes inode from
2594 * transaction's lists.
2595 */
2596void jbd2_journal_release_jbd_inode(journal_t *journal,
2597 struct jbd2_inode *jinode)
2598{
c851ed54
JK
2599 if (!journal)
2600 return;
2601restart:
2602 spin_lock(&journal->j_list_lock);
2603 /* Is commit writing out inode - we have to wait */
cb0d9d47 2604 if (jinode->i_flags & JI_COMMIT_RUNNING) {
c851ed54
JK
2605 wait_queue_head_t *wq;
2606 DEFINE_WAIT_BIT(wait, &jinode->i_flags, __JI_COMMIT_RUNNING);
2607 wq = bit_waitqueue(&jinode->i_flags, __JI_COMMIT_RUNNING);
21417136 2608 prepare_to_wait(wq, &wait.wq_entry, TASK_UNINTERRUPTIBLE);
c851ed54
JK
2609 spin_unlock(&journal->j_list_lock);
2610 schedule();
21417136 2611 finish_wait(wq, &wait.wq_entry);
c851ed54
JK
2612 goto restart;
2613 }
2614
c851ed54
JK
2615 if (jinode->i_transaction) {
2616 list_del(&jinode->i_list);
2617 jinode->i_transaction = NULL;
2618 }
2619 spin_unlock(&journal->j_list_lock);
2620}
2621
470decc6 2622
8e85fb3f
JL
2623#ifdef CONFIG_PROC_FS
2624
2625#define JBD2_STATS_PROC_NAME "fs/jbd2"
2626
2627static void __init jbd2_create_jbd_stats_proc_entry(void)
2628{
2629 proc_jbd2_stats = proc_mkdir(JBD2_STATS_PROC_NAME, NULL);
2630}
2631
2632static void __exit jbd2_remove_jbd_stats_proc_entry(void)
2633{
2634 if (proc_jbd2_stats)
2635 remove_proc_entry(JBD2_STATS_PROC_NAME, NULL);
2636}
2637
2638#else
2639
2640#define jbd2_create_jbd_stats_proc_entry() do {} while (0)
2641#define jbd2_remove_jbd_stats_proc_entry() do {} while (0)
2642
2643#endif
2644
8aefcd55 2645struct kmem_cache *jbd2_handle_cache, *jbd2_inode_cache;
470decc6 2646
4185a2ac 2647static int __init jbd2_journal_init_handle_cache(void)
470decc6 2648{
8aefcd55 2649 jbd2_handle_cache = KMEM_CACHE(jbd2_journal_handle, SLAB_TEMPORARY);
f7f4bccb 2650 if (jbd2_handle_cache == NULL) {
8aefcd55
TT
2651 printk(KERN_EMERG "JBD2: failed to create handle cache\n");
2652 return -ENOMEM;
2653 }
2654 jbd2_inode_cache = KMEM_CACHE(jbd2_inode, 0);
2655 if (jbd2_inode_cache == NULL) {
2656 printk(KERN_EMERG "JBD2: failed to create inode cache\n");
2657 kmem_cache_destroy(jbd2_handle_cache);
470decc6
DK
2658 return -ENOMEM;
2659 }
2660 return 0;
2661}
2662
f7f4bccb 2663static void jbd2_journal_destroy_handle_cache(void)
470decc6 2664{
8bdd5b60
WL
2665 kmem_cache_destroy(jbd2_handle_cache);
2666 jbd2_handle_cache = NULL;
2667 kmem_cache_destroy(jbd2_inode_cache);
2668 jbd2_inode_cache = NULL;
470decc6
DK
2669}
2670
2671/*
2672 * Module startup and shutdown
2673 */
2674
2675static int __init journal_init_caches(void)
2676{
2677 int ret;
2678
f7f4bccb 2679 ret = jbd2_journal_init_revoke_caches();
470decc6 2680 if (ret == 0)
4185a2ac 2681 ret = jbd2_journal_init_journal_head_cache();
470decc6 2682 if (ret == 0)
4185a2ac 2683 ret = jbd2_journal_init_handle_cache();
470decc6 2684 if (ret == 0)
0c2022ec 2685 ret = jbd2_journal_init_transaction_cache();
470decc6
DK
2686 return ret;
2687}
2688
f7f4bccb 2689static void jbd2_journal_destroy_caches(void)
470decc6 2690{
f7f4bccb 2691 jbd2_journal_destroy_revoke_caches();
4185a2ac 2692 jbd2_journal_destroy_journal_head_cache();
f7f4bccb 2693 jbd2_journal_destroy_handle_cache();
0c2022ec 2694 jbd2_journal_destroy_transaction_cache();
d2eecb03 2695 jbd2_journal_destroy_slabs();
470decc6
DK
2696}
2697
2698static int __init journal_init(void)
2699{
2700 int ret;
2701
2702 BUILD_BUG_ON(sizeof(struct journal_superblock_s) != 1024);
2703
2704 ret = journal_init_caches();
620de4e1 2705 if (ret == 0) {
620de4e1
DG
2706 jbd2_create_jbd_stats_proc_entry();
2707 } else {
f7f4bccb 2708 jbd2_journal_destroy_caches();
620de4e1 2709 }
470decc6
DK
2710 return ret;
2711}
2712
2713static void __exit journal_exit(void)
2714{
e23291b9 2715#ifdef CONFIG_JBD2_DEBUG
470decc6
DK
2716 int n = atomic_read(&nr_journal_heads);
2717 if (n)
75685071 2718 printk(KERN_ERR "JBD2: leaked %d journal_heads!\n", n);
470decc6 2719#endif
8e85fb3f 2720 jbd2_remove_jbd_stats_proc_entry();
f7f4bccb 2721 jbd2_journal_destroy_caches();
470decc6
DK
2722}
2723
2724MODULE_LICENSE("GPL");
2725module_init(journal_init);
2726module_exit(journal_exit);
2727