mm/filemap: Add folio_wait_bit()
[linux-2.6-block.git] / mm / filemap.c
CommitLineData
457c8996 1// SPDX-License-Identifier: GPL-2.0-only
1da177e4
LT
2/*
3 * linux/mm/filemap.c
4 *
5 * Copyright (C) 1994-1999 Linus Torvalds
6 */
7
8/*
9 * This file handles the generic file mmap semantics used by
10 * most "normal" filesystems (but you don't /have/ to use this:
11 * the NFS filesystem used to do this differently, for example)
12 */
b95f1b31 13#include <linux/export.h>
1da177e4 14#include <linux/compiler.h>
f9fe48be 15#include <linux/dax.h>
1da177e4 16#include <linux/fs.h>
3f07c014 17#include <linux/sched/signal.h>
c22ce143 18#include <linux/uaccess.h>
c59ede7b 19#include <linux/capability.h>
1da177e4 20#include <linux/kernel_stat.h>
5a0e3ad6 21#include <linux/gfp.h>
1da177e4
LT
22#include <linux/mm.h>
23#include <linux/swap.h>
24#include <linux/mman.h>
25#include <linux/pagemap.h>
26#include <linux/file.h>
27#include <linux/uio.h>
cfcbfb13 28#include <linux/error-injection.h>
1da177e4
LT
29#include <linux/hash.h>
30#include <linux/writeback.h>
53253383 31#include <linux/backing-dev.h>
1da177e4
LT
32#include <linux/pagevec.h>
33#include <linux/blkdev.h>
34#include <linux/security.h>
44110fe3 35#include <linux/cpuset.h>
00501b53 36#include <linux/hugetlb.h>
8a9f3ccd 37#include <linux/memcontrol.h>
c515e1fd 38#include <linux/cleancache.h>
c7df8ad2 39#include <linux/shmem_fs.h>
f1820361 40#include <linux/rmap.h>
b1d29ba8 41#include <linux/delayacct.h>
eb414681 42#include <linux/psi.h>
d0e6a582 43#include <linux/ramfs.h>
b9306a79 44#include <linux/page_idle.h>
f9ce0be7 45#include <asm/pgalloc.h>
de591a82 46#include <asm/tlbflush.h>
0f8053a5
NP
47#include "internal.h"
48
fe0bfaaf
RJ
49#define CREATE_TRACE_POINTS
50#include <trace/events/filemap.h>
51
1da177e4 52/*
1da177e4
LT
53 * FIXME: remove all knowledge of the buffer layer from the core VM
54 */
148f948b 55#include <linux/buffer_head.h> /* for try_to_free_buffers */
1da177e4 56
1da177e4
LT
57#include <asm/mman.h>
58
59/*
60 * Shared mappings implemented 30.11.1994. It's not fully working yet,
61 * though.
62 *
63 * Shared mappings now work. 15.8.1995 Bruno.
64 *
65 * finished 'unifying' the page and buffer cache and SMP-threaded the
66 * page-cache, 21.05.1999, Ingo Molnar <mingo@redhat.com>
67 *
68 * SMP-threaded pagemap-LRU 1999, Andrea Arcangeli <andrea@suse.de>
69 */
70
71/*
72 * Lock ordering:
73 *
c8c06efa 74 * ->i_mmap_rwsem (truncate_pagecache)
1da177e4 75 * ->private_lock (__free_pte->__set_page_dirty_buffers)
5d337b91 76 * ->swap_lock (exclusive_swap_page, others)
b93b0163 77 * ->i_pages lock
1da177e4 78 *
9608703e 79 * ->i_rwsem
730633f0
JK
80 * ->invalidate_lock (acquired by fs in truncate path)
81 * ->i_mmap_rwsem (truncate->unmap_mapping_range)
1da177e4 82 *
c1e8d7c6 83 * ->mmap_lock
c8c06efa 84 * ->i_mmap_rwsem
b8072f09 85 * ->page_table_lock or pte_lock (various, mainly in memory.c)
b93b0163 86 * ->i_pages lock (arch-dependent flush_dcache_mmap_lock)
1da177e4 87 *
c1e8d7c6 88 * ->mmap_lock
730633f0
JK
89 * ->invalidate_lock (filemap_fault)
90 * ->lock_page (filemap_fault, access_process_vm)
1da177e4 91 *
9608703e 92 * ->i_rwsem (generic_perform_write)
c1e8d7c6 93 * ->mmap_lock (fault_in_pages_readable->do_page_fault)
1da177e4 94 *
f758eeab 95 * bdi->wb.list_lock
a66979ab 96 * sb_lock (fs/fs-writeback.c)
b93b0163 97 * ->i_pages lock (__sync_single_inode)
1da177e4 98 *
c8c06efa 99 * ->i_mmap_rwsem
1da177e4
LT
100 * ->anon_vma.lock (vma_adjust)
101 *
102 * ->anon_vma.lock
b8072f09 103 * ->page_table_lock or pte_lock (anon_vma_prepare and various)
1da177e4 104 *
b8072f09 105 * ->page_table_lock or pte_lock
5d337b91 106 * ->swap_lock (try_to_unmap_one)
1da177e4 107 * ->private_lock (try_to_unmap_one)
b93b0163 108 * ->i_pages lock (try_to_unmap_one)
15b44736
HD
109 * ->lruvec->lru_lock (follow_page->mark_page_accessed)
110 * ->lruvec->lru_lock (check_pte_range->isolate_lru_page)
1da177e4 111 * ->private_lock (page_remove_rmap->set_page_dirty)
b93b0163 112 * ->i_pages lock (page_remove_rmap->set_page_dirty)
f758eeab 113 * bdi.wb->list_lock (page_remove_rmap->set_page_dirty)
250df6ed 114 * ->inode->i_lock (page_remove_rmap->set_page_dirty)
81f8c3a4 115 * ->memcg->move_lock (page_remove_rmap->lock_page_memcg)
f758eeab 116 * bdi.wb->list_lock (zap_pte_range->set_page_dirty)
250df6ed 117 * ->inode->i_lock (zap_pte_range->set_page_dirty)
1da177e4
LT
118 * ->private_lock (zap_pte_range->__set_page_dirty_buffers)
119 *
c8c06efa 120 * ->i_mmap_rwsem
9a3c531d 121 * ->tasklist_lock (memory_failure, collect_procs_ao)
1da177e4
LT
122 */
123
5c024e6a 124static void page_cache_delete(struct address_space *mapping,
91b0abe3
JW
125 struct page *page, void *shadow)
126{
5c024e6a
MW
127 XA_STATE(xas, &mapping->i_pages, page->index);
128 unsigned int nr = 1;
c70b647d 129
5c024e6a 130 mapping_set_update(&xas, mapping);
c70b647d 131
5c024e6a
MW
132 /* hugetlb pages are represented by a single entry in the xarray */
133 if (!PageHuge(page)) {
134 xas_set_order(&xas, page->index, compound_order(page));
d8c6546b 135 nr = compound_nr(page);
5c024e6a 136 }
91b0abe3 137
83929372
KS
138 VM_BUG_ON_PAGE(!PageLocked(page), page);
139 VM_BUG_ON_PAGE(PageTail(page), page);
140 VM_BUG_ON_PAGE(nr != 1 && shadow, page);
449dd698 141
5c024e6a
MW
142 xas_store(&xas, shadow);
143 xas_init_marks(&xas);
d3798ae8 144
2300638b
JK
145 page->mapping = NULL;
146 /* Leave page->index set: truncation lookup relies upon it */
d3798ae8 147 mapping->nrpages -= nr;
91b0abe3
JW
148}
149
5ecc4d85
JK
150static void unaccount_page_cache_page(struct address_space *mapping,
151 struct page *page)
1da177e4 152{
5ecc4d85 153 int nr;
1da177e4 154
c515e1fd
DM
155 /*
156 * if we're uptodate, flush out into the cleancache, otherwise
157 * invalidate any existing cleancache entries. We can't leave
158 * stale data around in the cleancache once our page is gone
159 */
160 if (PageUptodate(page) && PageMappedToDisk(page))
161 cleancache_put_page(page);
162 else
3167760f 163 cleancache_invalidate_page(mapping, page);
c515e1fd 164
83929372 165 VM_BUG_ON_PAGE(PageTail(page), page);
06b241f3
HD
166 VM_BUG_ON_PAGE(page_mapped(page), page);
167 if (!IS_ENABLED(CONFIG_DEBUG_VM) && unlikely(page_mapped(page))) {
168 int mapcount;
169
170 pr_alert("BUG: Bad page cache in process %s pfn:%05lx\n",
171 current->comm, page_to_pfn(page));
172 dump_page(page, "still mapped when deleted");
173 dump_stack();
174 add_taint(TAINT_BAD_PAGE, LOCKDEP_NOW_UNRELIABLE);
175
176 mapcount = page_mapcount(page);
177 if (mapping_exiting(mapping) &&
178 page_count(page) >= mapcount + 2) {
179 /*
180 * All vmas have already been torn down, so it's
181 * a good bet that actually the page is unmapped,
182 * and we'd prefer not to leak it: if we're wrong,
183 * some other bad page check should catch it later.
184 */
185 page_mapcount_reset(page);
6d061f9f 186 page_ref_sub(page, mapcount);
06b241f3
HD
187 }
188 }
189
4165b9b4 190 /* hugetlb pages do not participate in page cache accounting. */
5ecc4d85
JK
191 if (PageHuge(page))
192 return;
09612fa6 193
6c357848 194 nr = thp_nr_pages(page);
5ecc4d85 195
0d1c2072 196 __mod_lruvec_page_state(page, NR_FILE_PAGES, -nr);
5ecc4d85 197 if (PageSwapBacked(page)) {
0d1c2072 198 __mod_lruvec_page_state(page, NR_SHMEM, -nr);
5ecc4d85 199 if (PageTransHuge(page))
57b2847d 200 __mod_lruvec_page_state(page, NR_SHMEM_THPS, -nr);
99cb0dbd 201 } else if (PageTransHuge(page)) {
bf9ecead 202 __mod_lruvec_page_state(page, NR_FILE_THPS, -nr);
09d91cda 203 filemap_nr_thps_dec(mapping);
800d8c63 204 }
5ecc4d85
JK
205
206 /*
207 * At this point page must be either written or cleaned by
208 * truncate. Dirty page here signals a bug and loss of
209 * unwritten data.
210 *
211 * This fixes dirty accounting after removing the page entirely
212 * but leaves PageDirty set: it has no effect for truncated
213 * page and anyway will be cleared before returning page into
214 * buddy allocator.
215 */
216 if (WARN_ON_ONCE(PageDirty(page)))
217 account_page_cleaned(page, mapping, inode_to_wb(mapping->host));
218}
219
220/*
221 * Delete a page from the page cache and free it. Caller has to make
222 * sure the page is locked and that nobody else uses it - or that usage
b93b0163 223 * is safe. The caller must hold the i_pages lock.
5ecc4d85
JK
224 */
225void __delete_from_page_cache(struct page *page, void *shadow)
226{
227 struct address_space *mapping = page->mapping;
228
229 trace_mm_filemap_delete_from_page_cache(page);
230
231 unaccount_page_cache_page(mapping, page);
5c024e6a 232 page_cache_delete(mapping, page, shadow);
1da177e4
LT
233}
234
59c66c5f
JK
235static void page_cache_free_page(struct address_space *mapping,
236 struct page *page)
237{
238 void (*freepage)(struct page *);
239
240 freepage = mapping->a_ops->freepage;
241 if (freepage)
242 freepage(page);
243
244 if (PageTransHuge(page) && !PageHuge(page)) {
887b22c6 245 page_ref_sub(page, thp_nr_pages(page));
59c66c5f
JK
246 VM_BUG_ON_PAGE(page_count(page) <= 0, page);
247 } else {
248 put_page(page);
249 }
250}
251
702cfbf9
MK
252/**
253 * delete_from_page_cache - delete page from page cache
254 * @page: the page which the kernel is trying to remove from page cache
255 *
256 * This must be called only on pages that have been verified to be in the page
257 * cache and locked. It will never put the page into the free list, the caller
258 * has a reference on the page.
259 */
260void delete_from_page_cache(struct page *page)
1da177e4 261{
83929372 262 struct address_space *mapping = page_mapping(page);
1da177e4 263
cd7619d6 264 BUG_ON(!PageLocked(page));
30472509 265 xa_lock_irq(&mapping->i_pages);
62cccb8c 266 __delete_from_page_cache(page, NULL);
30472509 267 xa_unlock_irq(&mapping->i_pages);
6072d13c 268
59c66c5f 269 page_cache_free_page(mapping, page);
97cecb5a
MK
270}
271EXPORT_SYMBOL(delete_from_page_cache);
272
aa65c29c 273/*
ef8e5717 274 * page_cache_delete_batch - delete several pages from page cache
aa65c29c
JK
275 * @mapping: the mapping to which pages belong
276 * @pvec: pagevec with pages to delete
277 *
b93b0163 278 * The function walks over mapping->i_pages and removes pages passed in @pvec
4101196b
MWO
279 * from the mapping. The function expects @pvec to be sorted by page index
280 * and is optimised for it to be dense.
b93b0163 281 * It tolerates holes in @pvec (mapping entries at those indices are not
aa65c29c 282 * modified). The function expects only THP head pages to be present in the
4101196b 283 * @pvec.
aa65c29c 284 *
b93b0163 285 * The function expects the i_pages lock to be held.
aa65c29c 286 */
ef8e5717 287static void page_cache_delete_batch(struct address_space *mapping,
aa65c29c
JK
288 struct pagevec *pvec)
289{
ef8e5717 290 XA_STATE(xas, &mapping->i_pages, pvec->pages[0]->index);
aa65c29c 291 int total_pages = 0;
4101196b 292 int i = 0;
aa65c29c 293 struct page *page;
aa65c29c 294
ef8e5717
MW
295 mapping_set_update(&xas, mapping);
296 xas_for_each(&xas, page, ULONG_MAX) {
4101196b 297 if (i >= pagevec_count(pvec))
aa65c29c 298 break;
4101196b
MWO
299
300 /* A swap/dax/shadow entry got inserted? Skip it. */
3159f943 301 if (xa_is_value(page))
aa65c29c 302 continue;
4101196b
MWO
303 /*
304 * A page got inserted in our range? Skip it. We have our
305 * pages locked so they are protected from being removed.
306 * If we see a page whose index is higher than ours, it
307 * means our page has been removed, which shouldn't be
308 * possible because we're holding the PageLock.
309 */
310 if (page != pvec->pages[i]) {
311 VM_BUG_ON_PAGE(page->index > pvec->pages[i]->index,
312 page);
313 continue;
314 }
315
316 WARN_ON_ONCE(!PageLocked(page));
317
318 if (page->index == xas.xa_index)
aa65c29c 319 page->mapping = NULL;
4101196b
MWO
320 /* Leave page->index set: truncation lookup relies on it */
321
322 /*
323 * Move to the next page in the vector if this is a regular
324 * page or the index is of the last sub-page of this compound
325 * page.
326 */
327 if (page->index + compound_nr(page) - 1 == xas.xa_index)
aa65c29c 328 i++;
ef8e5717 329 xas_store(&xas, NULL);
aa65c29c
JK
330 total_pages++;
331 }
332 mapping->nrpages -= total_pages;
333}
334
335void delete_from_page_cache_batch(struct address_space *mapping,
336 struct pagevec *pvec)
337{
338 int i;
aa65c29c
JK
339
340 if (!pagevec_count(pvec))
341 return;
342
30472509 343 xa_lock_irq(&mapping->i_pages);
aa65c29c
JK
344 for (i = 0; i < pagevec_count(pvec); i++) {
345 trace_mm_filemap_delete_from_page_cache(pvec->pages[i]);
346
347 unaccount_page_cache_page(mapping, pvec->pages[i]);
348 }
ef8e5717 349 page_cache_delete_batch(mapping, pvec);
30472509 350 xa_unlock_irq(&mapping->i_pages);
aa65c29c
JK
351
352 for (i = 0; i < pagevec_count(pvec); i++)
353 page_cache_free_page(mapping, pvec->pages[i]);
354}
355
d72d9e2a 356int filemap_check_errors(struct address_space *mapping)
865ffef3
DM
357{
358 int ret = 0;
359 /* Check for outstanding write errors */
7fcbbaf1
JA
360 if (test_bit(AS_ENOSPC, &mapping->flags) &&
361 test_and_clear_bit(AS_ENOSPC, &mapping->flags))
865ffef3 362 ret = -ENOSPC;
7fcbbaf1
JA
363 if (test_bit(AS_EIO, &mapping->flags) &&
364 test_and_clear_bit(AS_EIO, &mapping->flags))
865ffef3
DM
365 ret = -EIO;
366 return ret;
367}
d72d9e2a 368EXPORT_SYMBOL(filemap_check_errors);
865ffef3 369
76341cab
JL
370static int filemap_check_and_keep_errors(struct address_space *mapping)
371{
372 /* Check for outstanding write errors */
373 if (test_bit(AS_EIO, &mapping->flags))
374 return -EIO;
375 if (test_bit(AS_ENOSPC, &mapping->flags))
376 return -ENOSPC;
377 return 0;
378}
379
5a798493
JB
380/**
381 * filemap_fdatawrite_wbc - start writeback on mapping dirty pages in range
382 * @mapping: address space structure to write
383 * @wbc: the writeback_control controlling the writeout
384 *
385 * Call writepages on the mapping using the provided wbc to control the
386 * writeout.
387 *
388 * Return: %0 on success, negative error code otherwise.
389 */
390int filemap_fdatawrite_wbc(struct address_space *mapping,
391 struct writeback_control *wbc)
392{
393 int ret;
394
395 if (!mapping_can_writeback(mapping) ||
396 !mapping_tagged(mapping, PAGECACHE_TAG_DIRTY))
397 return 0;
398
399 wbc_attach_fdatawrite_inode(wbc, mapping->host);
400 ret = do_writepages(mapping, wbc);
401 wbc_detach_inode(wbc);
402 return ret;
403}
404EXPORT_SYMBOL(filemap_fdatawrite_wbc);
405
1da177e4 406/**
485bb99b 407 * __filemap_fdatawrite_range - start writeback on mapping dirty pages in range
67be2dd1
MW
408 * @mapping: address space structure to write
409 * @start: offset in bytes where the range starts
469eb4d0 410 * @end: offset in bytes where the range ends (inclusive)
67be2dd1 411 * @sync_mode: enable synchronous operation
1da177e4 412 *
485bb99b
RD
413 * Start writeback against all of a mapping's dirty pages that lie
414 * within the byte offsets <start, end> inclusive.
415 *
1da177e4 416 * If sync_mode is WB_SYNC_ALL then this is a "data integrity" operation, as
485bb99b 417 * opposed to a regular memory cleansing writeback. The difference between
1da177e4
LT
418 * these two operations is that if a dirty page/buffer is encountered, it must
419 * be waited upon, and not just skipped over.
a862f68a
MR
420 *
421 * Return: %0 on success, negative error code otherwise.
1da177e4 422 */
ebcf28e1
AM
423int __filemap_fdatawrite_range(struct address_space *mapping, loff_t start,
424 loff_t end, int sync_mode)
1da177e4 425{
1da177e4
LT
426 struct writeback_control wbc = {
427 .sync_mode = sync_mode,
05fe478d 428 .nr_to_write = LONG_MAX,
111ebb6e
OH
429 .range_start = start,
430 .range_end = end,
1da177e4
LT
431 };
432
5a798493 433 return filemap_fdatawrite_wbc(mapping, &wbc);
1da177e4
LT
434}
435
436static inline int __filemap_fdatawrite(struct address_space *mapping,
437 int sync_mode)
438{
111ebb6e 439 return __filemap_fdatawrite_range(mapping, 0, LLONG_MAX, sync_mode);
1da177e4
LT
440}
441
442int filemap_fdatawrite(struct address_space *mapping)
443{
444 return __filemap_fdatawrite(mapping, WB_SYNC_ALL);
445}
446EXPORT_SYMBOL(filemap_fdatawrite);
447
f4c0a0fd 448int filemap_fdatawrite_range(struct address_space *mapping, loff_t start,
ebcf28e1 449 loff_t end)
1da177e4
LT
450{
451 return __filemap_fdatawrite_range(mapping, start, end, WB_SYNC_ALL);
452}
f4c0a0fd 453EXPORT_SYMBOL(filemap_fdatawrite_range);
1da177e4 454
485bb99b
RD
455/**
456 * filemap_flush - mostly a non-blocking flush
457 * @mapping: target address_space
458 *
1da177e4
LT
459 * This is a mostly non-blocking flush. Not suitable for data-integrity
460 * purposes - I/O may not be started against all dirty pages.
a862f68a
MR
461 *
462 * Return: %0 on success, negative error code otherwise.
1da177e4
LT
463 */
464int filemap_flush(struct address_space *mapping)
465{
466 return __filemap_fdatawrite(mapping, WB_SYNC_NONE);
467}
468EXPORT_SYMBOL(filemap_flush);
469
7fc9e472
GR
470/**
471 * filemap_range_has_page - check if a page exists in range.
472 * @mapping: address space within which to check
473 * @start_byte: offset in bytes where the range starts
474 * @end_byte: offset in bytes where the range ends (inclusive)
475 *
476 * Find at least one page in the range supplied, usually used to check if
477 * direct writing in this range will trigger a writeback.
a862f68a
MR
478 *
479 * Return: %true if at least one page exists in the specified range,
480 * %false otherwise.
7fc9e472
GR
481 */
482bool filemap_range_has_page(struct address_space *mapping,
483 loff_t start_byte, loff_t end_byte)
484{
f7b68046 485 struct page *page;
8fa8e538
MW
486 XA_STATE(xas, &mapping->i_pages, start_byte >> PAGE_SHIFT);
487 pgoff_t max = end_byte >> PAGE_SHIFT;
7fc9e472
GR
488
489 if (end_byte < start_byte)
490 return false;
491
8fa8e538
MW
492 rcu_read_lock();
493 for (;;) {
494 page = xas_find(&xas, max);
495 if (xas_retry(&xas, page))
496 continue;
497 /* Shadow entries don't count */
498 if (xa_is_value(page))
499 continue;
500 /*
501 * We don't need to try to pin this page; we're about to
502 * release the RCU lock anyway. It is enough to know that
503 * there was a page here recently.
504 */
505 break;
506 }
507 rcu_read_unlock();
7fc9e472 508
8fa8e538 509 return page != NULL;
7fc9e472
GR
510}
511EXPORT_SYMBOL(filemap_range_has_page);
512
5e8fcc1a 513static void __filemap_fdatawait_range(struct address_space *mapping,
aa750fd7 514 loff_t start_byte, loff_t end_byte)
1da177e4 515{
09cbfeaf
KS
516 pgoff_t index = start_byte >> PAGE_SHIFT;
517 pgoff_t end = end_byte >> PAGE_SHIFT;
1da177e4
LT
518 struct pagevec pvec;
519 int nr_pages;
1da177e4 520
94004ed7 521 if (end_byte < start_byte)
5e8fcc1a 522 return;
1da177e4 523
86679820 524 pagevec_init(&pvec);
312e9d2f 525 while (index <= end) {
1da177e4
LT
526 unsigned i;
527
312e9d2f 528 nr_pages = pagevec_lookup_range_tag(&pvec, mapping, &index,
67fd707f 529 end, PAGECACHE_TAG_WRITEBACK);
312e9d2f
JK
530 if (!nr_pages)
531 break;
532
1da177e4
LT
533 for (i = 0; i < nr_pages; i++) {
534 struct page *page = pvec.pages[i];
535
1da177e4 536 wait_on_page_writeback(page);
5e8fcc1a 537 ClearPageError(page);
1da177e4
LT
538 }
539 pagevec_release(&pvec);
540 cond_resched();
541 }
aa750fd7
JN
542}
543
544/**
545 * filemap_fdatawait_range - wait for writeback to complete
546 * @mapping: address space structure to wait for
547 * @start_byte: offset in bytes where the range starts
548 * @end_byte: offset in bytes where the range ends (inclusive)
549 *
550 * Walk the list of under-writeback pages of the given address space
551 * in the given range and wait for all of them. Check error status of
552 * the address space and return it.
553 *
554 * Since the error status of the address space is cleared by this function,
555 * callers are responsible for checking the return value and handling and/or
556 * reporting the error.
a862f68a
MR
557 *
558 * Return: error status of the address space.
aa750fd7
JN
559 */
560int filemap_fdatawait_range(struct address_space *mapping, loff_t start_byte,
561 loff_t end_byte)
562{
5e8fcc1a
JL
563 __filemap_fdatawait_range(mapping, start_byte, end_byte);
564 return filemap_check_errors(mapping);
1da177e4 565}
d3bccb6f
JK
566EXPORT_SYMBOL(filemap_fdatawait_range);
567
aa0bfcd9
RZ
568/**
569 * filemap_fdatawait_range_keep_errors - wait for writeback to complete
570 * @mapping: address space structure to wait for
571 * @start_byte: offset in bytes where the range starts
572 * @end_byte: offset in bytes where the range ends (inclusive)
573 *
574 * Walk the list of under-writeback pages of the given address space in the
575 * given range and wait for all of them. Unlike filemap_fdatawait_range(),
576 * this function does not clear error status of the address space.
577 *
578 * Use this function if callers don't handle errors themselves. Expected
579 * call sites are system-wide / filesystem-wide data flushers: e.g. sync(2),
580 * fsfreeze(8)
581 */
582int filemap_fdatawait_range_keep_errors(struct address_space *mapping,
583 loff_t start_byte, loff_t end_byte)
584{
585 __filemap_fdatawait_range(mapping, start_byte, end_byte);
586 return filemap_check_and_keep_errors(mapping);
587}
588EXPORT_SYMBOL(filemap_fdatawait_range_keep_errors);
589
a823e458
JL
590/**
591 * file_fdatawait_range - wait for writeback to complete
592 * @file: file pointing to address space structure to wait for
593 * @start_byte: offset in bytes where the range starts
594 * @end_byte: offset in bytes where the range ends (inclusive)
595 *
596 * Walk the list of under-writeback pages of the address space that file
597 * refers to, in the given range and wait for all of them. Check error
598 * status of the address space vs. the file->f_wb_err cursor and return it.
599 *
600 * Since the error status of the file is advanced by this function,
601 * callers are responsible for checking the return value and handling and/or
602 * reporting the error.
a862f68a
MR
603 *
604 * Return: error status of the address space vs. the file->f_wb_err cursor.
a823e458
JL
605 */
606int file_fdatawait_range(struct file *file, loff_t start_byte, loff_t end_byte)
607{
608 struct address_space *mapping = file->f_mapping;
609
610 __filemap_fdatawait_range(mapping, start_byte, end_byte);
611 return file_check_and_advance_wb_err(file);
612}
613EXPORT_SYMBOL(file_fdatawait_range);
d3bccb6f 614
aa750fd7
JN
615/**
616 * filemap_fdatawait_keep_errors - wait for writeback without clearing errors
617 * @mapping: address space structure to wait for
618 *
619 * Walk the list of under-writeback pages of the given address space
620 * and wait for all of them. Unlike filemap_fdatawait(), this function
621 * does not clear error status of the address space.
622 *
623 * Use this function if callers don't handle errors themselves. Expected
624 * call sites are system-wide / filesystem-wide data flushers: e.g. sync(2),
625 * fsfreeze(8)
a862f68a
MR
626 *
627 * Return: error status of the address space.
aa750fd7 628 */
76341cab 629int filemap_fdatawait_keep_errors(struct address_space *mapping)
aa750fd7 630{
ffb959bb 631 __filemap_fdatawait_range(mapping, 0, LLONG_MAX);
76341cab 632 return filemap_check_and_keep_errors(mapping);
aa750fd7 633}
76341cab 634EXPORT_SYMBOL(filemap_fdatawait_keep_errors);
aa750fd7 635
875d91b1 636/* Returns true if writeback might be needed or already in progress. */
9326c9b2 637static bool mapping_needs_writeback(struct address_space *mapping)
1da177e4 638{
875d91b1 639 return mapping->nrpages;
1da177e4 640}
1da177e4 641
63135aa3
JA
642/**
643 * filemap_range_needs_writeback - check if range potentially needs writeback
644 * @mapping: address space within which to check
645 * @start_byte: offset in bytes where the range starts
646 * @end_byte: offset in bytes where the range ends (inclusive)
647 *
648 * Find at least one page in the range supplied, usually used to check if
649 * direct writing in this range will trigger a writeback. Used by O_DIRECT
650 * read/write with IOCB_NOWAIT, to see if the caller needs to do
651 * filemap_write_and_wait_range() before proceeding.
652 *
653 * Return: %true if the caller should do filemap_write_and_wait_range() before
654 * doing O_DIRECT to a page in this range, %false otherwise.
655 */
656bool filemap_range_needs_writeback(struct address_space *mapping,
657 loff_t start_byte, loff_t end_byte)
658{
659 XA_STATE(xas, &mapping->i_pages, start_byte >> PAGE_SHIFT);
660 pgoff_t max = end_byte >> PAGE_SHIFT;
661 struct page *page;
662
663 if (!mapping_needs_writeback(mapping))
664 return false;
665 if (!mapping_tagged(mapping, PAGECACHE_TAG_DIRTY) &&
666 !mapping_tagged(mapping, PAGECACHE_TAG_WRITEBACK))
667 return false;
668 if (end_byte < start_byte)
669 return false;
670
671 rcu_read_lock();
672 xas_for_each(&xas, page, max) {
673 if (xas_retry(&xas, page))
674 continue;
675 if (xa_is_value(page))
676 continue;
677 if (PageDirty(page) || PageLocked(page) || PageWriteback(page))
678 break;
679 }
680 rcu_read_unlock();
681 return page != NULL;
682}
683EXPORT_SYMBOL_GPL(filemap_range_needs_writeback);
684
485bb99b
RD
685/**
686 * filemap_write_and_wait_range - write out & wait on a file range
687 * @mapping: the address_space for the pages
688 * @lstart: offset in bytes where the range starts
689 * @lend: offset in bytes where the range ends (inclusive)
690 *
469eb4d0
AM
691 * Write out and wait upon file offsets lstart->lend, inclusive.
692 *
0e056eb5 693 * Note that @lend is inclusive (describes the last byte to be written) so
469eb4d0 694 * that this function can be used to write to the very end-of-file (end = -1).
a862f68a
MR
695 *
696 * Return: error status of the address space.
469eb4d0 697 */
1da177e4
LT
698int filemap_write_and_wait_range(struct address_space *mapping,
699 loff_t lstart, loff_t lend)
700{
28fd1298 701 int err = 0;
1da177e4 702
9326c9b2 703 if (mapping_needs_writeback(mapping)) {
28fd1298
OH
704 err = __filemap_fdatawrite_range(mapping, lstart, lend,
705 WB_SYNC_ALL);
ddf8f376
IW
706 /*
707 * Even if the above returned error, the pages may be
708 * written partially (e.g. -ENOSPC), so we wait for it.
709 * But the -EIO is special case, it may indicate the worst
710 * thing (e.g. bug) happened, so we avoid waiting for it.
711 */
28fd1298 712 if (err != -EIO) {
94004ed7
CH
713 int err2 = filemap_fdatawait_range(mapping,
714 lstart, lend);
28fd1298
OH
715 if (!err)
716 err = err2;
cbeaf951
JL
717 } else {
718 /* Clear any previously stored errors */
719 filemap_check_errors(mapping);
28fd1298 720 }
865ffef3
DM
721 } else {
722 err = filemap_check_errors(mapping);
1da177e4 723 }
28fd1298 724 return err;
1da177e4 725}
f6995585 726EXPORT_SYMBOL(filemap_write_and_wait_range);
1da177e4 727
5660e13d
JL
728void __filemap_set_wb_err(struct address_space *mapping, int err)
729{
3acdfd28 730 errseq_t eseq = errseq_set(&mapping->wb_err, err);
5660e13d
JL
731
732 trace_filemap_set_wb_err(mapping, eseq);
733}
734EXPORT_SYMBOL(__filemap_set_wb_err);
735
736/**
737 * file_check_and_advance_wb_err - report wb error (if any) that was previously
738 * and advance wb_err to current one
739 * @file: struct file on which the error is being reported
740 *
741 * When userland calls fsync (or something like nfsd does the equivalent), we
742 * want to report any writeback errors that occurred since the last fsync (or
743 * since the file was opened if there haven't been any).
744 *
745 * Grab the wb_err from the mapping. If it matches what we have in the file,
746 * then just quickly return 0. The file is all caught up.
747 *
748 * If it doesn't match, then take the mapping value, set the "seen" flag in
749 * it and try to swap it into place. If it works, or another task beat us
750 * to it with the new value, then update the f_wb_err and return the error
751 * portion. The error at this point must be reported via proper channels
752 * (a'la fsync, or NFS COMMIT operation, etc.).
753 *
754 * While we handle mapping->wb_err with atomic operations, the f_wb_err
755 * value is protected by the f_lock since we must ensure that it reflects
756 * the latest value swapped in for this file descriptor.
a862f68a
MR
757 *
758 * Return: %0 on success, negative error code otherwise.
5660e13d
JL
759 */
760int file_check_and_advance_wb_err(struct file *file)
761{
762 int err = 0;
763 errseq_t old = READ_ONCE(file->f_wb_err);
764 struct address_space *mapping = file->f_mapping;
765
766 /* Locklessly handle the common case where nothing has changed */
767 if (errseq_check(&mapping->wb_err, old)) {
768 /* Something changed, must use slow path */
769 spin_lock(&file->f_lock);
770 old = file->f_wb_err;
771 err = errseq_check_and_advance(&mapping->wb_err,
772 &file->f_wb_err);
773 trace_file_check_and_advance_wb_err(file, old);
774 spin_unlock(&file->f_lock);
775 }
f4e222c5
JL
776
777 /*
778 * We're mostly using this function as a drop in replacement for
779 * filemap_check_errors. Clear AS_EIO/AS_ENOSPC to emulate the effect
780 * that the legacy code would have had on these flags.
781 */
782 clear_bit(AS_EIO, &mapping->flags);
783 clear_bit(AS_ENOSPC, &mapping->flags);
5660e13d
JL
784 return err;
785}
786EXPORT_SYMBOL(file_check_and_advance_wb_err);
787
788/**
789 * file_write_and_wait_range - write out & wait on a file range
790 * @file: file pointing to address_space with pages
791 * @lstart: offset in bytes where the range starts
792 * @lend: offset in bytes where the range ends (inclusive)
793 *
794 * Write out and wait upon file offsets lstart->lend, inclusive.
795 *
796 * Note that @lend is inclusive (describes the last byte to be written) so
797 * that this function can be used to write to the very end-of-file (end = -1).
798 *
799 * After writing out and waiting on the data, we check and advance the
800 * f_wb_err cursor to the latest value, and return any errors detected there.
a862f68a
MR
801 *
802 * Return: %0 on success, negative error code otherwise.
5660e13d
JL
803 */
804int file_write_and_wait_range(struct file *file, loff_t lstart, loff_t lend)
805{
806 int err = 0, err2;
807 struct address_space *mapping = file->f_mapping;
808
9326c9b2 809 if (mapping_needs_writeback(mapping)) {
5660e13d
JL
810 err = __filemap_fdatawrite_range(mapping, lstart, lend,
811 WB_SYNC_ALL);
812 /* See comment of filemap_write_and_wait() */
813 if (err != -EIO)
814 __filemap_fdatawait_range(mapping, lstart, lend);
815 }
816 err2 = file_check_and_advance_wb_err(file);
817 if (!err)
818 err = err2;
819 return err;
820}
821EXPORT_SYMBOL(file_write_and_wait_range);
822
ef6a3c63
MS
823/**
824 * replace_page_cache_page - replace a pagecache page with a new one
825 * @old: page to be replaced
826 * @new: page to replace with
ef6a3c63
MS
827 *
828 * This function replaces a page in the pagecache with a new one. On
829 * success it acquires the pagecache reference for the new page and
830 * drops it for the old page. Both the old and new pages must be
831 * locked. This function does not add the new page to the LRU, the
832 * caller must do that.
833 *
74d60958 834 * The remove + add is atomic. This function cannot fail.
ef6a3c63 835 */
1f7ef657 836void replace_page_cache_page(struct page *old, struct page *new)
ef6a3c63 837{
74d60958
MW
838 struct address_space *mapping = old->mapping;
839 void (*freepage)(struct page *) = mapping->a_ops->freepage;
840 pgoff_t offset = old->index;
841 XA_STATE(xas, &mapping->i_pages, offset);
ef6a3c63 842
309381fe
SL
843 VM_BUG_ON_PAGE(!PageLocked(old), old);
844 VM_BUG_ON_PAGE(!PageLocked(new), new);
845 VM_BUG_ON_PAGE(new->mapping, new);
ef6a3c63 846
74d60958
MW
847 get_page(new);
848 new->mapping = mapping;
849 new->index = offset;
ef6a3c63 850
0d1c2072
JW
851 mem_cgroup_migrate(old, new);
852
30472509 853 xas_lock_irq(&xas);
74d60958 854 xas_store(&xas, new);
4165b9b4 855
74d60958
MW
856 old->mapping = NULL;
857 /* hugetlb pages do not participate in page cache accounting. */
858 if (!PageHuge(old))
0d1c2072 859 __dec_lruvec_page_state(old, NR_FILE_PAGES);
74d60958 860 if (!PageHuge(new))
0d1c2072 861 __inc_lruvec_page_state(new, NR_FILE_PAGES);
74d60958 862 if (PageSwapBacked(old))
0d1c2072 863 __dec_lruvec_page_state(old, NR_SHMEM);
74d60958 864 if (PageSwapBacked(new))
0d1c2072 865 __inc_lruvec_page_state(new, NR_SHMEM);
30472509 866 xas_unlock_irq(&xas);
74d60958
MW
867 if (freepage)
868 freepage(old);
869 put_page(old);
ef6a3c63
MS
870}
871EXPORT_SYMBOL_GPL(replace_page_cache_page);
872
16c0cc0c 873noinline int __add_to_page_cache_locked(struct page *page,
76cd6173 874 struct address_space *mapping,
c4cf498d 875 pgoff_t offset, gfp_t gfp,
76cd6173 876 void **shadowp)
1da177e4 877{
74d60958 878 XA_STATE(xas, &mapping->i_pages, offset);
00501b53 879 int huge = PageHuge(page);
e286781d 880 int error;
da74240e 881 bool charged = false;
e286781d 882
309381fe
SL
883 VM_BUG_ON_PAGE(!PageLocked(page), page);
884 VM_BUG_ON_PAGE(PageSwapBacked(page), page);
74d60958 885 mapping_set_update(&xas, mapping);
e286781d 886
09cbfeaf 887 get_page(page);
66a0c8ee
KS
888 page->mapping = mapping;
889 page->index = offset;
890
3fea5a49 891 if (!huge) {
04f94e3f 892 error = mem_cgroup_charge(page, NULL, gfp);
3fea5a49
JW
893 if (error)
894 goto error;
da74240e 895 charged = true;
3fea5a49
JW
896 }
897
198b62f8
MWO
898 gfp &= GFP_RECLAIM_MASK;
899
74d60958 900 do {
198b62f8
MWO
901 unsigned int order = xa_get_order(xas.xa, xas.xa_index);
902 void *entry, *old = NULL;
903
904 if (order > thp_order(page))
905 xas_split_alloc(&xas, xa_load(xas.xa, xas.xa_index),
906 order, gfp);
74d60958 907 xas_lock_irq(&xas);
198b62f8
MWO
908 xas_for_each_conflict(&xas, entry) {
909 old = entry;
910 if (!xa_is_value(entry)) {
911 xas_set_err(&xas, -EEXIST);
912 goto unlock;
913 }
914 }
915
916 if (old) {
917 if (shadowp)
918 *shadowp = old;
919 /* entry may have been split before we acquired lock */
920 order = xa_get_order(xas.xa, xas.xa_index);
921 if (order > thp_order(page)) {
922 xas_split(&xas, old, order);
923 xas_reset(&xas);
924 }
925 }
926
74d60958
MW
927 xas_store(&xas, page);
928 if (xas_error(&xas))
929 goto unlock;
930
74d60958
MW
931 mapping->nrpages++;
932
933 /* hugetlb pages do not participate in page cache accounting */
934 if (!huge)
0d1c2072 935 __inc_lruvec_page_state(page, NR_FILE_PAGES);
74d60958
MW
936unlock:
937 xas_unlock_irq(&xas);
198b62f8 938 } while (xas_nomem(&xas, gfp));
74d60958 939
3fea5a49
JW
940 if (xas_error(&xas)) {
941 error = xas_error(&xas);
da74240e
WL
942 if (charged)
943 mem_cgroup_uncharge(page);
74d60958 944 goto error;
3fea5a49 945 }
4165b9b4 946
66a0c8ee
KS
947 trace_mm_filemap_add_to_page_cache(page);
948 return 0;
74d60958 949error:
66a0c8ee
KS
950 page->mapping = NULL;
951 /* Leave page->index set: truncation relies upon it */
09cbfeaf 952 put_page(page);
3fea5a49 953 return error;
1da177e4 954}
cfcbfb13 955ALLOW_ERROR_INJECTION(__add_to_page_cache_locked, ERRNO);
a528910e
JW
956
957/**
958 * add_to_page_cache_locked - add a locked page to the pagecache
959 * @page: page to add
960 * @mapping: the page's address_space
961 * @offset: page index
962 * @gfp_mask: page allocation mode
963 *
964 * This function is used to add a page to the pagecache. It must be locked.
965 * This function does not add the page to the LRU. The caller must do that.
a862f68a
MR
966 *
967 * Return: %0 on success, negative error code otherwise.
a528910e
JW
968 */
969int add_to_page_cache_locked(struct page *page, struct address_space *mapping,
970 pgoff_t offset, gfp_t gfp_mask)
971{
972 return __add_to_page_cache_locked(page, mapping, offset,
973 gfp_mask, NULL);
974}
e286781d 975EXPORT_SYMBOL(add_to_page_cache_locked);
1da177e4
LT
976
977int add_to_page_cache_lru(struct page *page, struct address_space *mapping,
6daa0e28 978 pgoff_t offset, gfp_t gfp_mask)
1da177e4 979{
a528910e 980 void *shadow = NULL;
4f98a2fe
RR
981 int ret;
982
48c935ad 983 __SetPageLocked(page);
a528910e
JW
984 ret = __add_to_page_cache_locked(page, mapping, offset,
985 gfp_mask, &shadow);
986 if (unlikely(ret))
48c935ad 987 __ClearPageLocked(page);
a528910e
JW
988 else {
989 /*
990 * The page might have been evicted from cache only
991 * recently, in which case it should be activated like
992 * any other repeatedly accessed page.
f0281a00
RR
993 * The exception is pages getting rewritten; evicting other
994 * data from the working set, only to cache data that will
995 * get overwritten with something else, is a waste of memory.
a528910e 996 */
1899ad18
JW
997 WARN_ON_ONCE(PageActive(page));
998 if (!(gfp_mask & __GFP_WRITE) && shadow)
999 workingset_refault(page, shadow);
a528910e
JW
1000 lru_cache_add(page);
1001 }
1da177e4
LT
1002 return ret;
1003}
18bc0bbd 1004EXPORT_SYMBOL_GPL(add_to_page_cache_lru);
1da177e4 1005
44110fe3 1006#ifdef CONFIG_NUMA
2ae88149 1007struct page *__page_cache_alloc(gfp_t gfp)
44110fe3 1008{
c0ff7453
MX
1009 int n;
1010 struct page *page;
1011
44110fe3 1012 if (cpuset_do_page_mem_spread()) {
cc9a6c87
MG
1013 unsigned int cpuset_mems_cookie;
1014 do {
d26914d1 1015 cpuset_mems_cookie = read_mems_allowed_begin();
cc9a6c87 1016 n = cpuset_mem_spread_node();
96db800f 1017 page = __alloc_pages_node(n, gfp, 0);
d26914d1 1018 } while (!page && read_mems_allowed_retry(cpuset_mems_cookie));
cc9a6c87 1019
c0ff7453 1020 return page;
44110fe3 1021 }
2ae88149 1022 return alloc_pages(gfp, 0);
44110fe3 1023}
2ae88149 1024EXPORT_SYMBOL(__page_cache_alloc);
44110fe3
PJ
1025#endif
1026
7506ae6a
JK
1027/*
1028 * filemap_invalidate_lock_two - lock invalidate_lock for two mappings
1029 *
1030 * Lock exclusively invalidate_lock of any passed mapping that is not NULL.
1031 *
1032 * @mapping1: the first mapping to lock
1033 * @mapping2: the second mapping to lock
1034 */
1035void filemap_invalidate_lock_two(struct address_space *mapping1,
1036 struct address_space *mapping2)
1037{
1038 if (mapping1 > mapping2)
1039 swap(mapping1, mapping2);
1040 if (mapping1)
1041 down_write(&mapping1->invalidate_lock);
1042 if (mapping2 && mapping1 != mapping2)
1043 down_write_nested(&mapping2->invalidate_lock, 1);
1044}
1045EXPORT_SYMBOL(filemap_invalidate_lock_two);
1046
1047/*
1048 * filemap_invalidate_unlock_two - unlock invalidate_lock for two mappings
1049 *
1050 * Unlock exclusive invalidate_lock of any passed mapping that is not NULL.
1051 *
1052 * @mapping1: the first mapping to unlock
1053 * @mapping2: the second mapping to unlock
1054 */
1055void filemap_invalidate_unlock_two(struct address_space *mapping1,
1056 struct address_space *mapping2)
1057{
1058 if (mapping1)
1059 up_write(&mapping1->invalidate_lock);
1060 if (mapping2 && mapping1 != mapping2)
1061 up_write(&mapping2->invalidate_lock);
1062}
1063EXPORT_SYMBOL(filemap_invalidate_unlock_two);
1064
1da177e4
LT
1065/*
1066 * In order to wait for pages to become available there must be
1067 * waitqueues associated with pages. By using a hash table of
1068 * waitqueues where the bucket discipline is to maintain all
1069 * waiters on the same queue and wake all when any of the pages
1070 * become available, and for the woken contexts to check to be
1071 * sure the appropriate page became available, this saves space
1072 * at a cost of "thundering herd" phenomena during rare hash
1073 * collisions.
1074 */
62906027
NP
1075#define PAGE_WAIT_TABLE_BITS 8
1076#define PAGE_WAIT_TABLE_SIZE (1 << PAGE_WAIT_TABLE_BITS)
1077static wait_queue_head_t page_wait_table[PAGE_WAIT_TABLE_SIZE] __cacheline_aligned;
1078
1079static wait_queue_head_t *page_waitqueue(struct page *page)
1da177e4 1080{
62906027 1081 return &page_wait_table[hash_ptr(page, PAGE_WAIT_TABLE_BITS)];
1da177e4 1082}
1da177e4 1083
62906027 1084void __init pagecache_init(void)
1da177e4 1085{
62906027 1086 int i;
1da177e4 1087
62906027
NP
1088 for (i = 0; i < PAGE_WAIT_TABLE_SIZE; i++)
1089 init_waitqueue_head(&page_wait_table[i]);
1090
1091 page_writeback_init();
1da177e4 1092}
1da177e4 1093
5ef64cc8
LT
1094/*
1095 * The page wait code treats the "wait->flags" somewhat unusually, because
5868ec26 1096 * we have multiple different kinds of waits, not just the usual "exclusive"
5ef64cc8
LT
1097 * one.
1098 *
1099 * We have:
1100 *
1101 * (a) no special bits set:
1102 *
1103 * We're just waiting for the bit to be released, and when a waker
1104 * calls the wakeup function, we set WQ_FLAG_WOKEN and wake it up,
1105 * and remove it from the wait queue.
1106 *
1107 * Simple and straightforward.
1108 *
1109 * (b) WQ_FLAG_EXCLUSIVE:
1110 *
1111 * The waiter is waiting to get the lock, and only one waiter should
1112 * be woken up to avoid any thundering herd behavior. We'll set the
1113 * WQ_FLAG_WOKEN bit, wake it up, and remove it from the wait queue.
1114 *
1115 * This is the traditional exclusive wait.
1116 *
5868ec26 1117 * (c) WQ_FLAG_EXCLUSIVE | WQ_FLAG_CUSTOM:
5ef64cc8
LT
1118 *
1119 * The waiter is waiting to get the bit, and additionally wants the
1120 * lock to be transferred to it for fair lock behavior. If the lock
1121 * cannot be taken, we stop walking the wait queue without waking
1122 * the waiter.
1123 *
1124 * This is the "fair lock handoff" case, and in addition to setting
1125 * WQ_FLAG_WOKEN, we set WQ_FLAG_DONE to let the waiter easily see
1126 * that it now has the lock.
1127 */
ac6424b9 1128static int wake_page_function(wait_queue_entry_t *wait, unsigned mode, int sync, void *arg)
f62e00cc 1129{
5ef64cc8 1130 unsigned int flags;
62906027
NP
1131 struct wait_page_key *key = arg;
1132 struct wait_page_queue *wait_page
1133 = container_of(wait, struct wait_page_queue, wait);
1134
cdc8fcb4 1135 if (!wake_page_match(wait_page, key))
62906027 1136 return 0;
3510ca20 1137
9a1ea439 1138 /*
5ef64cc8
LT
1139 * If it's a lock handoff wait, we get the bit for it, and
1140 * stop walking (and do not wake it up) if we can't.
9a1ea439 1141 */
5ef64cc8
LT
1142 flags = wait->flags;
1143 if (flags & WQ_FLAG_EXCLUSIVE) {
1144 if (test_bit(key->bit_nr, &key->page->flags))
2a9127fc 1145 return -1;
5ef64cc8
LT
1146 if (flags & WQ_FLAG_CUSTOM) {
1147 if (test_and_set_bit(key->bit_nr, &key->page->flags))
1148 return -1;
1149 flags |= WQ_FLAG_DONE;
1150 }
2a9127fc 1151 }
f62e00cc 1152
5ef64cc8
LT
1153 /*
1154 * We are holding the wait-queue lock, but the waiter that
1155 * is waiting for this will be checking the flags without
1156 * any locking.
1157 *
1158 * So update the flags atomically, and wake up the waiter
1159 * afterwards to avoid any races. This store-release pairs
101c0bf6 1160 * with the load-acquire in folio_wait_bit_common().
5ef64cc8
LT
1161 */
1162 smp_store_release(&wait->flags, flags | WQ_FLAG_WOKEN);
2a9127fc
LT
1163 wake_up_state(wait->private, mode);
1164
1165 /*
1166 * Ok, we have successfully done what we're waiting for,
1167 * and we can unconditionally remove the wait entry.
1168 *
5ef64cc8
LT
1169 * Note that this pairs with the "finish_wait()" in the
1170 * waiter, and has to be the absolute last thing we do.
1171 * After this list_del_init(&wait->entry) the wait entry
2a9127fc
LT
1172 * might be de-allocated and the process might even have
1173 * exited.
2a9127fc 1174 */
c6fe44d9 1175 list_del_init_careful(&wait->entry);
5ef64cc8 1176 return (flags & WQ_FLAG_EXCLUSIVE) != 0;
f62e00cc
KM
1177}
1178
74d81bfa 1179static void wake_up_page_bit(struct page *page, int bit_nr)
cbbce822 1180{
62906027
NP
1181 wait_queue_head_t *q = page_waitqueue(page);
1182 struct wait_page_key key;
1183 unsigned long flags;
11a19c7b 1184 wait_queue_entry_t bookmark;
cbbce822 1185
62906027
NP
1186 key.page = page;
1187 key.bit_nr = bit_nr;
1188 key.page_match = 0;
1189
11a19c7b
TC
1190 bookmark.flags = 0;
1191 bookmark.private = NULL;
1192 bookmark.func = NULL;
1193 INIT_LIST_HEAD(&bookmark.entry);
1194
62906027 1195 spin_lock_irqsave(&q->lock, flags);
11a19c7b
TC
1196 __wake_up_locked_key_bookmark(q, TASK_NORMAL, &key, &bookmark);
1197
1198 while (bookmark.flags & WQ_FLAG_BOOKMARK) {
1199 /*
1200 * Take a breather from holding the lock,
1201 * allow pages that finish wake up asynchronously
1202 * to acquire the lock and remove themselves
1203 * from wait queue
1204 */
1205 spin_unlock_irqrestore(&q->lock, flags);
1206 cpu_relax();
1207 spin_lock_irqsave(&q->lock, flags);
1208 __wake_up_locked_key_bookmark(q, TASK_NORMAL, &key, &bookmark);
1209 }
1210
62906027
NP
1211 /*
1212 * It is possible for other pages to have collided on the waitqueue
1213 * hash, so in that case check for a page match. That prevents a long-
1214 * term waiter
1215 *
1216 * It is still possible to miss a case here, when we woke page waiters
1217 * and removed them from the waitqueue, but there are still other
1218 * page waiters.
1219 */
1220 if (!waitqueue_active(q) || !key.page_match) {
1221 ClearPageWaiters(page);
1222 /*
1223 * It's possible to miss clearing Waiters here, when we woke
1224 * our page waiters, but the hashed waitqueue has waiters for
1225 * other pages on it.
1226 *
1227 * That's okay, it's a rare case. The next waker will clear it.
1228 */
1229 }
1230 spin_unlock_irqrestore(&q->lock, flags);
1231}
74d81bfa 1232
4268b480 1233static void folio_wake(struct folio *folio, int bit)
74d81bfa 1234{
4268b480 1235 if (!folio_test_waiters(folio))
74d81bfa 1236 return;
4268b480 1237 wake_up_page_bit(&folio->page, bit);
74d81bfa 1238}
62906027 1239
9a1ea439 1240/*
101c0bf6 1241 * A choice of three behaviors for folio_wait_bit_common():
9a1ea439
HD
1242 */
1243enum behavior {
1244 EXCLUSIVE, /* Hold ref to page and take the bit when woken, like
7c23c782 1245 * __folio_lock() waiting on then setting PG_locked.
9a1ea439
HD
1246 */
1247 SHARED, /* Hold ref to page and check the bit when woken, like
1248 * wait_on_page_writeback() waiting on PG_writeback.
1249 */
1250 DROP, /* Drop ref to page before wait, no check when woken,
1251 * like put_and_wait_on_page_locked() on PG_locked.
1252 */
1253};
1254
2a9127fc 1255/*
101c0bf6 1256 * Attempt to check (or get) the folio flag, and mark us done
5ef64cc8 1257 * if successful.
2a9127fc 1258 */
101c0bf6 1259static inline bool folio_trylock_flag(struct folio *folio, int bit_nr,
2a9127fc
LT
1260 struct wait_queue_entry *wait)
1261{
1262 if (wait->flags & WQ_FLAG_EXCLUSIVE) {
101c0bf6 1263 if (test_and_set_bit(bit_nr, &folio->flags))
2a9127fc 1264 return false;
101c0bf6 1265 } else if (test_bit(bit_nr, &folio->flags))
2a9127fc
LT
1266 return false;
1267
5ef64cc8 1268 wait->flags |= WQ_FLAG_WOKEN | WQ_FLAG_DONE;
2a9127fc
LT
1269 return true;
1270}
1271
5ef64cc8
LT
1272/* How many times do we accept lock stealing from under a waiter? */
1273int sysctl_page_lock_unfairness = 5;
1274
101c0bf6
MWO
1275static inline int folio_wait_bit_common(struct folio *folio, int bit_nr,
1276 int state, enum behavior behavior)
62906027 1277{
101c0bf6 1278 wait_queue_head_t *q = page_waitqueue(&folio->page);
5ef64cc8 1279 int unfairness = sysctl_page_lock_unfairness;
62906027 1280 struct wait_page_queue wait_page;
ac6424b9 1281 wait_queue_entry_t *wait = &wait_page.wait;
b1d29ba8 1282 bool thrashing = false;
9a1ea439 1283 bool delayacct = false;
eb414681 1284 unsigned long pflags;
62906027 1285
eb414681 1286 if (bit_nr == PG_locked &&
101c0bf6
MWO
1287 !folio_test_uptodate(folio) && folio_test_workingset(folio)) {
1288 if (!folio_test_swapbacked(folio)) {
eb414681 1289 delayacct_thrashing_start();
9a1ea439
HD
1290 delayacct = true;
1291 }
eb414681 1292 psi_memstall_enter(&pflags);
b1d29ba8
JW
1293 thrashing = true;
1294 }
1295
62906027
NP
1296 init_wait(wait);
1297 wait->func = wake_page_function;
101c0bf6 1298 wait_page.page = &folio->page;
62906027
NP
1299 wait_page.bit_nr = bit_nr;
1300
5ef64cc8
LT
1301repeat:
1302 wait->flags = 0;
1303 if (behavior == EXCLUSIVE) {
1304 wait->flags = WQ_FLAG_EXCLUSIVE;
1305 if (--unfairness < 0)
1306 wait->flags |= WQ_FLAG_CUSTOM;
1307 }
1308
2a9127fc
LT
1309 /*
1310 * Do one last check whether we can get the
1311 * page bit synchronously.
1312 *
101c0bf6 1313 * Do the folio_set_waiters() marking before that
2a9127fc
LT
1314 * to let any waker we _just_ missed know they
1315 * need to wake us up (otherwise they'll never
1316 * even go to the slow case that looks at the
1317 * page queue), and add ourselves to the wait
1318 * queue if we need to sleep.
1319 *
1320 * This part needs to be done under the queue
1321 * lock to avoid races.
1322 */
1323 spin_lock_irq(&q->lock);
101c0bf6
MWO
1324 folio_set_waiters(folio);
1325 if (!folio_trylock_flag(folio, bit_nr, wait))
2a9127fc
LT
1326 __add_wait_queue_entry_tail(q, wait);
1327 spin_unlock_irq(&q->lock);
62906027 1328
2a9127fc
LT
1329 /*
1330 * From now on, all the logic will be based on
5ef64cc8
LT
1331 * the WQ_FLAG_WOKEN and WQ_FLAG_DONE flag, to
1332 * see whether the page bit testing has already
1333 * been done by the wake function.
2a9127fc 1334 *
101c0bf6 1335 * We can drop our reference to the folio.
2a9127fc
LT
1336 */
1337 if (behavior == DROP)
101c0bf6 1338 folio_put(folio);
62906027 1339
5ef64cc8
LT
1340 /*
1341 * Note that until the "finish_wait()", or until
1342 * we see the WQ_FLAG_WOKEN flag, we need to
1343 * be very careful with the 'wait->flags', because
1344 * we may race with a waker that sets them.
1345 */
2a9127fc 1346 for (;;) {
5ef64cc8
LT
1347 unsigned int flags;
1348
62906027
NP
1349 set_current_state(state);
1350
5ef64cc8
LT
1351 /* Loop until we've been woken or interrupted */
1352 flags = smp_load_acquire(&wait->flags);
1353 if (!(flags & WQ_FLAG_WOKEN)) {
1354 if (signal_pending_state(state, current))
1355 break;
1356
1357 io_schedule();
1358 continue;
1359 }
1360
1361 /* If we were non-exclusive, we're done */
1362 if (behavior != EXCLUSIVE)
a8b169af 1363 break;
9a1ea439 1364
5ef64cc8
LT
1365 /* If the waker got the lock for us, we're done */
1366 if (flags & WQ_FLAG_DONE)
9a1ea439 1367 break;
2a9127fc 1368
5ef64cc8
LT
1369 /*
1370 * Otherwise, if we're getting the lock, we need to
1371 * try to get it ourselves.
1372 *
1373 * And if that fails, we'll have to retry this all.
1374 */
101c0bf6 1375 if (unlikely(test_and_set_bit(bit_nr, folio_flags(folio, 0))))
5ef64cc8
LT
1376 goto repeat;
1377
1378 wait->flags |= WQ_FLAG_DONE;
1379 break;
62906027
NP
1380 }
1381
5ef64cc8
LT
1382 /*
1383 * If a signal happened, this 'finish_wait()' may remove the last
101c0bf6 1384 * waiter from the wait-queues, but the folio waiters bit will remain
5ef64cc8
LT
1385 * set. That's ok. The next wakeup will take care of it, and trying
1386 * to do it here would be difficult and prone to races.
1387 */
62906027
NP
1388 finish_wait(q, wait);
1389
eb414681 1390 if (thrashing) {
9a1ea439 1391 if (delayacct)
eb414681
JW
1392 delayacct_thrashing_end();
1393 psi_memstall_leave(&pflags);
1394 }
b1d29ba8 1395
62906027 1396 /*
5ef64cc8
LT
1397 * NOTE! The wait->flags weren't stable until we've done the
1398 * 'finish_wait()', and we could have exited the loop above due
1399 * to a signal, and had a wakeup event happen after the signal
1400 * test but before the 'finish_wait()'.
1401 *
1402 * So only after the finish_wait() can we reliably determine
1403 * if we got woken up or not, so we can now figure out the final
1404 * return value based on that state without races.
1405 *
1406 * Also note that WQ_FLAG_WOKEN is sufficient for a non-exclusive
1407 * waiter, but an exclusive one requires WQ_FLAG_DONE.
62906027 1408 */
5ef64cc8
LT
1409 if (behavior == EXCLUSIVE)
1410 return wait->flags & WQ_FLAG_DONE ? 0 : -EINTR;
62906027 1411
2a9127fc 1412 return wait->flags & WQ_FLAG_WOKEN ? 0 : -EINTR;
62906027
NP
1413}
1414
101c0bf6 1415void folio_wait_bit(struct folio *folio, int bit_nr)
62906027 1416{
101c0bf6 1417 folio_wait_bit_common(folio, bit_nr, TASK_UNINTERRUPTIBLE, SHARED);
62906027 1418}
101c0bf6 1419EXPORT_SYMBOL(folio_wait_bit);
62906027 1420
101c0bf6 1421int folio_wait_bit_killable(struct folio *folio, int bit_nr)
62906027 1422{
101c0bf6 1423 return folio_wait_bit_common(folio, bit_nr, TASK_KILLABLE, SHARED);
cbbce822 1424}
101c0bf6 1425EXPORT_SYMBOL(folio_wait_bit_killable);
cbbce822 1426
9a1ea439
HD
1427/**
1428 * put_and_wait_on_page_locked - Drop a reference and wait for it to be unlocked
1429 * @page: The page to wait for.
48054625 1430 * @state: The sleep state (TASK_KILLABLE, TASK_UNINTERRUPTIBLE, etc).
9a1ea439
HD
1431 *
1432 * The caller should hold a reference on @page. They expect the page to
1433 * become unlocked relatively soon, but do not wish to hold up migration
1434 * (for example) by holding the reference while waiting for the page to
1435 * come unlocked. After this function returns, the caller should not
1436 * dereference @page.
48054625
MWO
1437 *
1438 * Return: 0 if the page was unlocked or -EINTR if interrupted by a signal.
9a1ea439 1439 */
48054625 1440int put_and_wait_on_page_locked(struct page *page, int state)
9a1ea439 1441{
101c0bf6
MWO
1442 return folio_wait_bit_common(page_folio(page), PG_locked, state,
1443 DROP);
9a1ea439
HD
1444}
1445
385e1ca5
DH
1446/**
1447 * add_page_wait_queue - Add an arbitrary waiter to a page's wait queue
697f619f
RD
1448 * @page: Page defining the wait queue of interest
1449 * @waiter: Waiter to add to the queue
385e1ca5
DH
1450 *
1451 * Add an arbitrary @waiter to the wait queue for the nominated @page.
1452 */
ac6424b9 1453void add_page_wait_queue(struct page *page, wait_queue_entry_t *waiter)
385e1ca5
DH
1454{
1455 wait_queue_head_t *q = page_waitqueue(page);
1456 unsigned long flags;
1457
1458 spin_lock_irqsave(&q->lock, flags);
9c3a815f 1459 __add_wait_queue_entry_tail(q, waiter);
62906027 1460 SetPageWaiters(page);
385e1ca5
DH
1461 spin_unlock_irqrestore(&q->lock, flags);
1462}
1463EXPORT_SYMBOL_GPL(add_page_wait_queue);
1464
b91e1302
LT
1465#ifndef clear_bit_unlock_is_negative_byte
1466
1467/*
1468 * PG_waiters is the high bit in the same byte as PG_lock.
1469 *
1470 * On x86 (and on many other architectures), we can clear PG_lock and
1471 * test the sign bit at the same time. But if the architecture does
1472 * not support that special operation, we just do this all by hand
1473 * instead.
1474 *
1475 * The read of PG_waiters has to be after (or concurrently with) PG_locked
ffceeb62 1476 * being cleared, but a memory barrier should be unnecessary since it is
b91e1302
LT
1477 * in the same byte as PG_locked.
1478 */
1479static inline bool clear_bit_unlock_is_negative_byte(long nr, volatile void *mem)
1480{
1481 clear_bit_unlock(nr, mem);
1482 /* smp_mb__after_atomic(); */
98473f9f 1483 return test_bit(PG_waiters, mem);
b91e1302
LT
1484}
1485
1486#endif
1487
1da177e4 1488/**
4e136428
MWO
1489 * folio_unlock - Unlock a locked folio.
1490 * @folio: The folio.
1491 *
1492 * Unlocks the folio and wakes up any thread sleeping on the page lock.
1493 *
1494 * Context: May be called from interrupt or process context. May not be
1495 * called from NMI context.
1da177e4 1496 */
4e136428 1497void folio_unlock(struct folio *folio)
1da177e4 1498{
4e136428 1499 /* Bit 7 allows x86 to check the byte's sign bit */
b91e1302 1500 BUILD_BUG_ON(PG_waiters != 7);
4e136428
MWO
1501 BUILD_BUG_ON(PG_locked > 7);
1502 VM_BUG_ON_FOLIO(!folio_test_locked(folio), folio);
1503 if (clear_bit_unlock_is_negative_byte(PG_locked, folio_flags(folio, 0)))
1504 wake_up_page_bit(&folio->page, PG_locked);
1da177e4 1505}
4e136428 1506EXPORT_SYMBOL(folio_unlock);
1da177e4 1507
73e10ded
DH
1508/**
1509 * end_page_private_2 - Clear PG_private_2 and release any waiters
1510 * @page: The page
1511 *
1512 * Clear the PG_private_2 bit on a page and wake up any sleepers waiting for
1513 * this. The page ref held for PG_private_2 being set is released.
1514 *
1515 * This is, for example, used when a netfs page is being written to a local
1516 * disk cache, thereby allowing writes to the cache for the same page to be
1517 * serialised.
1518 */
1519void end_page_private_2(struct page *page)
1520{
1521 page = compound_head(page);
1522 VM_BUG_ON_PAGE(!PagePrivate2(page), page);
1523 clear_bit_unlock(PG_private_2, &page->flags);
1524 wake_up_page_bit(page, PG_private_2);
1525 put_page(page);
1526}
1527EXPORT_SYMBOL(end_page_private_2);
1528
1529/**
1530 * wait_on_page_private_2 - Wait for PG_private_2 to be cleared on a page
1531 * @page: The page to wait on
1532 *
1533 * Wait for PG_private_2 (aka PG_fscache) to be cleared on a page.
1534 */
1535void wait_on_page_private_2(struct page *page)
1536{
101c0bf6
MWO
1537 struct folio *folio = page_folio(page);
1538
1539 while (folio_test_private_2(folio))
1540 folio_wait_bit(folio, PG_private_2);
73e10ded
DH
1541}
1542EXPORT_SYMBOL(wait_on_page_private_2);
1543
1544/**
1545 * wait_on_page_private_2_killable - Wait for PG_private_2 to be cleared on a page
1546 * @page: The page to wait on
1547 *
1548 * Wait for PG_private_2 (aka PG_fscache) to be cleared on a page or until a
1549 * fatal signal is received by the calling task.
1550 *
1551 * Return:
1552 * - 0 if successful.
1553 * - -EINTR if a fatal signal was encountered.
1554 */
1555int wait_on_page_private_2_killable(struct page *page)
1556{
101c0bf6 1557 struct folio *folio = page_folio(page);
73e10ded
DH
1558 int ret = 0;
1559
101c0bf6
MWO
1560 while (folio_test_private_2(folio)) {
1561 ret = folio_wait_bit_killable(folio, PG_private_2);
73e10ded
DH
1562 if (ret < 0)
1563 break;
1564 }
1565
1566 return ret;
1567}
1568EXPORT_SYMBOL(wait_on_page_private_2_killable);
1569
485bb99b 1570/**
4268b480
MWO
1571 * folio_end_writeback - End writeback against a folio.
1572 * @folio: The folio.
1da177e4 1573 */
4268b480 1574void folio_end_writeback(struct folio *folio)
1da177e4 1575{
888cf2db 1576 /*
4268b480
MWO
1577 * folio_test_clear_reclaim() could be used here but it is an
1578 * atomic operation and overkill in this particular case. Failing
1579 * to shuffle a folio marked for immediate reclaim is too mild
1580 * a gain to justify taking an atomic operation penalty at the
1581 * end of every folio writeback.
888cf2db 1582 */
4268b480
MWO
1583 if (folio_test_reclaim(folio)) {
1584 folio_clear_reclaim(folio);
575ced1c 1585 folio_rotate_reclaimable(folio);
888cf2db 1586 }
ac6aadb2 1587
073861ed 1588 /*
4268b480 1589 * Writeback does not hold a folio reference of its own, relying
073861ed 1590 * on truncation to wait for the clearing of PG_writeback.
4268b480
MWO
1591 * But here we must make sure that the folio is not freed and
1592 * reused before the folio_wake().
073861ed 1593 */
4268b480
MWO
1594 folio_get(folio);
1595 if (!test_clear_page_writeback(&folio->page))
ac6aadb2
MS
1596 BUG();
1597
4e857c58 1598 smp_mb__after_atomic();
4268b480
MWO
1599 folio_wake(folio, PG_writeback);
1600 folio_put(folio);
1da177e4 1601}
4268b480 1602EXPORT_SYMBOL(folio_end_writeback);
1da177e4 1603
57d99845
MW
1604/*
1605 * After completing I/O on a page, call this routine to update the page
1606 * flags appropriately
1607 */
c11f0c0b 1608void page_endio(struct page *page, bool is_write, int err)
57d99845 1609{
c11f0c0b 1610 if (!is_write) {
57d99845
MW
1611 if (!err) {
1612 SetPageUptodate(page);
1613 } else {
1614 ClearPageUptodate(page);
1615 SetPageError(page);
1616 }
1617 unlock_page(page);
abf54548 1618 } else {
57d99845 1619 if (err) {
dd8416c4
MK
1620 struct address_space *mapping;
1621
57d99845 1622 SetPageError(page);
dd8416c4
MK
1623 mapping = page_mapping(page);
1624 if (mapping)
1625 mapping_set_error(mapping, err);
57d99845
MW
1626 }
1627 end_page_writeback(page);
1628 }
1629}
1630EXPORT_SYMBOL_GPL(page_endio);
1631
485bb99b 1632/**
7c23c782
MWO
1633 * __folio_lock - Get a lock on the folio, assuming we need to sleep to get it.
1634 * @folio: The folio to lock
1da177e4 1635 */
7c23c782 1636void __folio_lock(struct folio *folio)
1da177e4 1637{
101c0bf6 1638 folio_wait_bit_common(folio, PG_locked, TASK_UNINTERRUPTIBLE,
9a1ea439 1639 EXCLUSIVE);
1da177e4 1640}
7c23c782 1641EXPORT_SYMBOL(__folio_lock);
1da177e4 1642
af7f29d9 1643int __folio_lock_killable(struct folio *folio)
2687a356 1644{
101c0bf6 1645 return folio_wait_bit_common(folio, PG_locked, TASK_KILLABLE,
9a1ea439 1646 EXCLUSIVE);
2687a356 1647}
af7f29d9 1648EXPORT_SYMBOL_GPL(__folio_lock_killable);
2687a356 1649
ffdc8dab 1650static int __folio_lock_async(struct folio *folio, struct wait_page_queue *wait)
dd3e6d50 1651{
ffdc8dab 1652 struct wait_queue_head *q = page_waitqueue(&folio->page);
f32b5dd7
MWO
1653 int ret = 0;
1654
ffdc8dab 1655 wait->page = &folio->page;
f32b5dd7
MWO
1656 wait->bit_nr = PG_locked;
1657
1658 spin_lock_irq(&q->lock);
1659 __add_wait_queue_entry_tail(q, &wait->wait);
ffdc8dab
MWO
1660 folio_set_waiters(folio);
1661 ret = !folio_trylock(folio);
f32b5dd7
MWO
1662 /*
1663 * If we were successful now, we know we're still on the
1664 * waitqueue as we're still under the lock. This means it's
1665 * safe to remove and return success, we know the callback
1666 * isn't going to trigger.
1667 */
1668 if (!ret)
1669 __remove_wait_queue(q, &wait->wait);
1670 else
1671 ret = -EIOCBQUEUED;
1672 spin_unlock_irq(&q->lock);
1673 return ret;
dd3e6d50
JA
1674}
1675
9a95f3cf
PC
1676/*
1677 * Return values:
9138e47e
MWO
1678 * true - folio is locked; mmap_lock is still held.
1679 * false - folio is not locked.
3e4e28c5 1680 * mmap_lock has been released (mmap_read_unlock(), unless flags had both
9a95f3cf 1681 * FAULT_FLAG_ALLOW_RETRY and FAULT_FLAG_RETRY_NOWAIT set, in
c1e8d7c6 1682 * which case mmap_lock is still held.
9a95f3cf 1683 *
9138e47e
MWO
1684 * If neither ALLOW_RETRY nor KILLABLE are set, will always return true
1685 * with the folio locked and the mmap_lock unperturbed.
9a95f3cf 1686 */
9138e47e 1687bool __folio_lock_or_retry(struct folio *folio, struct mm_struct *mm,
d065bd81
ML
1688 unsigned int flags)
1689{
4064b982 1690 if (fault_flag_allow_retry_first(flags)) {
37b23e05 1691 /*
c1e8d7c6 1692 * CAUTION! In this case, mmap_lock is not released
37b23e05
KM
1693 * even though return 0.
1694 */
1695 if (flags & FAULT_FLAG_RETRY_NOWAIT)
9138e47e 1696 return false;
37b23e05 1697
d8ed45c5 1698 mmap_read_unlock(mm);
37b23e05 1699 if (flags & FAULT_FLAG_KILLABLE)
6baa8d60 1700 folio_wait_locked_killable(folio);
37b23e05 1701 else
6baa8d60 1702 folio_wait_locked(folio);
9138e47e 1703 return false;
800bca7c
HL
1704 }
1705 if (flags & FAULT_FLAG_KILLABLE) {
9138e47e 1706 bool ret;
37b23e05 1707
af7f29d9 1708 ret = __folio_lock_killable(folio);
800bca7c
HL
1709 if (ret) {
1710 mmap_read_unlock(mm);
9138e47e 1711 return false;
800bca7c
HL
1712 }
1713 } else {
af7f29d9 1714 __folio_lock(folio);
d065bd81 1715 }
800bca7c 1716
9138e47e 1717 return true;
d065bd81
ML
1718}
1719
e7b563bb 1720/**
0d3f9296
MW
1721 * page_cache_next_miss() - Find the next gap in the page cache.
1722 * @mapping: Mapping.
1723 * @index: Index.
1724 * @max_scan: Maximum range to search.
e7b563bb 1725 *
0d3f9296
MW
1726 * Search the range [index, min(index + max_scan - 1, ULONG_MAX)] for the
1727 * gap with the lowest index.
e7b563bb 1728 *
0d3f9296
MW
1729 * This function may be called under the rcu_read_lock. However, this will
1730 * not atomically search a snapshot of the cache at a single point in time.
1731 * For example, if a gap is created at index 5, then subsequently a gap is
1732 * created at index 10, page_cache_next_miss covering both indices may
1733 * return 10 if called under the rcu_read_lock.
e7b563bb 1734 *
0d3f9296
MW
1735 * Return: The index of the gap if found, otherwise an index outside the
1736 * range specified (in which case 'return - index >= max_scan' will be true).
1737 * In the rare case of index wrap-around, 0 will be returned.
e7b563bb 1738 */
0d3f9296 1739pgoff_t page_cache_next_miss(struct address_space *mapping,
e7b563bb
JW
1740 pgoff_t index, unsigned long max_scan)
1741{
0d3f9296 1742 XA_STATE(xas, &mapping->i_pages, index);
e7b563bb 1743
0d3f9296
MW
1744 while (max_scan--) {
1745 void *entry = xas_next(&xas);
1746 if (!entry || xa_is_value(entry))
e7b563bb 1747 break;
0d3f9296 1748 if (xas.xa_index == 0)
e7b563bb
JW
1749 break;
1750 }
1751
0d3f9296 1752 return xas.xa_index;
e7b563bb 1753}
0d3f9296 1754EXPORT_SYMBOL(page_cache_next_miss);
e7b563bb
JW
1755
1756/**
2346a560 1757 * page_cache_prev_miss() - Find the previous gap in the page cache.
0d3f9296
MW
1758 * @mapping: Mapping.
1759 * @index: Index.
1760 * @max_scan: Maximum range to search.
e7b563bb 1761 *
0d3f9296
MW
1762 * Search the range [max(index - max_scan + 1, 0), index] for the
1763 * gap with the highest index.
e7b563bb 1764 *
0d3f9296
MW
1765 * This function may be called under the rcu_read_lock. However, this will
1766 * not atomically search a snapshot of the cache at a single point in time.
1767 * For example, if a gap is created at index 10, then subsequently a gap is
1768 * created at index 5, page_cache_prev_miss() covering both indices may
1769 * return 5 if called under the rcu_read_lock.
e7b563bb 1770 *
0d3f9296
MW
1771 * Return: The index of the gap if found, otherwise an index outside the
1772 * range specified (in which case 'index - return >= max_scan' will be true).
1773 * In the rare case of wrap-around, ULONG_MAX will be returned.
e7b563bb 1774 */
0d3f9296 1775pgoff_t page_cache_prev_miss(struct address_space *mapping,
e7b563bb
JW
1776 pgoff_t index, unsigned long max_scan)
1777{
0d3f9296 1778 XA_STATE(xas, &mapping->i_pages, index);
e7b563bb 1779
0d3f9296
MW
1780 while (max_scan--) {
1781 void *entry = xas_prev(&xas);
1782 if (!entry || xa_is_value(entry))
e7b563bb 1783 break;
0d3f9296 1784 if (xas.xa_index == ULONG_MAX)
e7b563bb
JW
1785 break;
1786 }
1787
0d3f9296 1788 return xas.xa_index;
e7b563bb 1789}
0d3f9296 1790EXPORT_SYMBOL(page_cache_prev_miss);
e7b563bb 1791
020853b6
MWO
1792/*
1793 * Lockless page cache protocol:
1794 * On the lookup side:
1795 * 1. Load the folio from i_pages
1796 * 2. Increment the refcount if it's not zero
1797 * 3. If the folio is not found by xas_reload(), put the refcount and retry
1798 *
1799 * On the removal side:
1800 * A. Freeze the page (by zeroing the refcount if nobody else has a reference)
1801 * B. Remove the page from i_pages
1802 * C. Return the page to the page allocator
1803 *
1804 * This means that any page may have its reference count temporarily
1805 * increased by a speculative page cache (or fast GUP) lookup as it can
1806 * be allocated by another user before the RCU grace period expires.
1807 * Because the refcount temporarily acquired here may end up being the
1808 * last refcount on the page, any page allocation must be freeable by
1809 * folio_put().
1810 */
1811
44835d20 1812/*
bc5a3011 1813 * mapping_get_entry - Get a page cache entry.
485bb99b 1814 * @mapping: the address_space to search
a6de4b48 1815 * @index: The page cache index.
0cd6144a 1816 *
4b17f030 1817 * Looks up the page cache slot at @mapping & @index. If there is a
a6de4b48 1818 * page cache page, the head page is returned with an increased refcount.
485bb99b 1819 *
139b6a6f
JW
1820 * If the slot holds a shadow entry of a previously evicted page, or a
1821 * swap entry from shmem/tmpfs, it is returned.
0cd6144a 1822 *
a6de4b48 1823 * Return: The head page or shadow entry, %NULL if nothing is found.
1da177e4 1824 */
bc5a3011
MWO
1825static struct page *mapping_get_entry(struct address_space *mapping,
1826 pgoff_t index)
1da177e4 1827{
a6de4b48 1828 XA_STATE(xas, &mapping->i_pages, index);
4101196b 1829 struct page *page;
1da177e4 1830
a60637c8
NP
1831 rcu_read_lock();
1832repeat:
4c7472c0
MW
1833 xas_reset(&xas);
1834 page = xas_load(&xas);
1835 if (xas_retry(&xas, page))
1836 goto repeat;
1837 /*
1838 * A shadow entry of a recently evicted page, or a swap entry from
1839 * shmem/tmpfs. Return it without attempting to raise page count.
1840 */
1841 if (!page || xa_is_value(page))
1842 goto out;
83929372 1843
4101196b 1844 if (!page_cache_get_speculative(page))
4c7472c0 1845 goto repeat;
83929372 1846
4c7472c0 1847 /*
4101196b 1848 * Has the page moved or been split?
4c7472c0
MW
1849 * This is part of the lockless pagecache protocol. See
1850 * include/linux/pagemap.h for details.
1851 */
1852 if (unlikely(page != xas_reload(&xas))) {
4101196b 1853 put_page(page);
4c7472c0 1854 goto repeat;
a60637c8 1855 }
27d20fdd 1856out:
a60637c8
NP
1857 rcu_read_unlock();
1858
1da177e4
LT
1859 return page;
1860}
1da177e4 1861
0cd6144a 1862/**
2294b32e
MWO
1863 * pagecache_get_page - Find and get a reference to a page.
1864 * @mapping: The address_space to search.
1865 * @index: The page index.
1866 * @fgp_flags: %FGP flags modify how the page is returned.
1867 * @gfp_mask: Memory allocation flags to use if %FGP_CREAT is specified.
1da177e4 1868 *
2294b32e 1869 * Looks up the page cache entry at @mapping & @index.
0cd6144a 1870 *
2294b32e 1871 * @fgp_flags can be zero or more of these flags:
0e056eb5 1872 *
2294b32e
MWO
1873 * * %FGP_ACCESSED - The page will be marked accessed.
1874 * * %FGP_LOCK - The page is returned locked.
a8cf7f27
MWO
1875 * * %FGP_HEAD - If the page is present and a THP, return the head page
1876 * rather than the exact page specified by the index.
44835d20
MWO
1877 * * %FGP_ENTRY - If there is a shadow / swap / DAX entry, return it
1878 * instead of allocating a new page to replace it.
2294b32e
MWO
1879 * * %FGP_CREAT - If no page is present then a new page is allocated using
1880 * @gfp_mask and added to the page cache and the VM's LRU list.
1881 * The page is returned locked and with an increased refcount.
1882 * * %FGP_FOR_MMAP - The caller wants to do its own locking dance if the
1883 * page is already in cache. If the page was allocated, unlock it before
1884 * returning so the caller can do the same dance.
605cad83
YS
1885 * * %FGP_WRITE - The page will be written
1886 * * %FGP_NOFS - __GFP_FS will get cleared in gfp mask
1887 * * %FGP_NOWAIT - Don't get blocked by page lock
1da177e4 1888 *
2294b32e
MWO
1889 * If %FGP_LOCK or %FGP_CREAT are specified then the function may sleep even
1890 * if the %GFP flags specified for %FGP_CREAT are atomic.
1da177e4 1891 *
2457aec6 1892 * If there is a page cache page, it is returned with an increased refcount.
a862f68a 1893 *
2294b32e 1894 * Return: The found page or %NULL otherwise.
1da177e4 1895 */
2294b32e
MWO
1896struct page *pagecache_get_page(struct address_space *mapping, pgoff_t index,
1897 int fgp_flags, gfp_t gfp_mask)
1da177e4 1898{
eb2be189 1899 struct page *page;
2457aec6 1900
1da177e4 1901repeat:
bc5a3011 1902 page = mapping_get_entry(mapping, index);
44835d20
MWO
1903 if (xa_is_value(page)) {
1904 if (fgp_flags & FGP_ENTRY)
1905 return page;
2457aec6 1906 page = NULL;
44835d20 1907 }
2457aec6
MG
1908 if (!page)
1909 goto no_page;
1910
1911 if (fgp_flags & FGP_LOCK) {
1912 if (fgp_flags & FGP_NOWAIT) {
1913 if (!trylock_page(page)) {
09cbfeaf 1914 put_page(page);
2457aec6
MG
1915 return NULL;
1916 }
1917 } else {
1918 lock_page(page);
1919 }
1920
1921 /* Has the page been truncated? */
a8cf7f27 1922 if (unlikely(page->mapping != mapping)) {
2457aec6 1923 unlock_page(page);
09cbfeaf 1924 put_page(page);
2457aec6
MG
1925 goto repeat;
1926 }
a8cf7f27 1927 VM_BUG_ON_PAGE(!thp_contains(page, index), page);
2457aec6
MG
1928 }
1929
c16eb000 1930 if (fgp_flags & FGP_ACCESSED)
2457aec6 1931 mark_page_accessed(page);
b9306a79
YS
1932 else if (fgp_flags & FGP_WRITE) {
1933 /* Clear idle flag for buffer write */
1934 if (page_is_idle(page))
1935 clear_page_idle(page);
1936 }
a8cf7f27
MWO
1937 if (!(fgp_flags & FGP_HEAD))
1938 page = find_subpage(page, index);
2457aec6
MG
1939
1940no_page:
1941 if (!page && (fgp_flags & FGP_CREAT)) {
1942 int err;
f56753ac 1943 if ((fgp_flags & FGP_WRITE) && mapping_can_writeback(mapping))
45f87de5
MH
1944 gfp_mask |= __GFP_WRITE;
1945 if (fgp_flags & FGP_NOFS)
1946 gfp_mask &= ~__GFP_FS;
2457aec6 1947
45f87de5 1948 page = __page_cache_alloc(gfp_mask);
eb2be189
NP
1949 if (!page)
1950 return NULL;
2457aec6 1951
a75d4c33 1952 if (WARN_ON_ONCE(!(fgp_flags & (FGP_LOCK | FGP_FOR_MMAP))))
2457aec6
MG
1953 fgp_flags |= FGP_LOCK;
1954
eb39d618 1955 /* Init accessed so avoid atomic mark_page_accessed later */
2457aec6 1956 if (fgp_flags & FGP_ACCESSED)
eb39d618 1957 __SetPageReferenced(page);
2457aec6 1958
2294b32e 1959 err = add_to_page_cache_lru(page, mapping, index, gfp_mask);
eb2be189 1960 if (unlikely(err)) {
09cbfeaf 1961 put_page(page);
eb2be189
NP
1962 page = NULL;
1963 if (err == -EEXIST)
1964 goto repeat;
1da177e4 1965 }
a75d4c33
JB
1966
1967 /*
1968 * add_to_page_cache_lru locks the page, and for mmap we expect
1969 * an unlocked page.
1970 */
1971 if (page && (fgp_flags & FGP_FOR_MMAP))
1972 unlock_page(page);
1da177e4 1973 }
2457aec6 1974
1da177e4
LT
1975 return page;
1976}
2457aec6 1977EXPORT_SYMBOL(pagecache_get_page);
1da177e4 1978
c7bad633
MWO
1979static inline struct page *find_get_entry(struct xa_state *xas, pgoff_t max,
1980 xa_mark_t mark)
1981{
1982 struct page *page;
1983
1984retry:
1985 if (mark == XA_PRESENT)
1986 page = xas_find(xas, max);
1987 else
1988 page = xas_find_marked(xas, max, mark);
1989
1990 if (xas_retry(xas, page))
1991 goto retry;
1992 /*
1993 * A shadow entry of a recently evicted page, a swap
1994 * entry from shmem/tmpfs or a DAX entry. Return it
1995 * without attempting to raise page count.
1996 */
1997 if (!page || xa_is_value(page))
1998 return page;
1999
2000 if (!page_cache_get_speculative(page))
2001 goto reset;
2002
2003 /* Has the page moved or been split? */
2004 if (unlikely(page != xas_reload(xas))) {
2005 put_page(page);
2006 goto reset;
2007 }
2008
2009 return page;
2010reset:
2011 xas_reset(xas);
2012 goto retry;
2013}
2014
0cd6144a
JW
2015/**
2016 * find_get_entries - gang pagecache lookup
2017 * @mapping: The address_space to search
2018 * @start: The starting page cache index
ca122fe4 2019 * @end: The final page index (inclusive).
cf2039af 2020 * @pvec: Where the resulting entries are placed.
0cd6144a
JW
2021 * @indices: The cache indices corresponding to the entries in @entries
2022 *
cf2039af
MWO
2023 * find_get_entries() will search for and return a batch of entries in
2024 * the mapping. The entries are placed in @pvec. find_get_entries()
2025 * takes a reference on any actual pages it returns.
0cd6144a
JW
2026 *
2027 * The search returns a group of mapping-contiguous page cache entries
2028 * with ascending indexes. There may be holes in the indices due to
2029 * not-present pages.
2030 *
139b6a6f
JW
2031 * Any shadow entries of evicted pages, or swap entries from
2032 * shmem/tmpfs, are included in the returned array.
0cd6144a 2033 *
71725ed1
HD
2034 * If it finds a Transparent Huge Page, head or tail, find_get_entries()
2035 * stops at that page: the caller is likely to have a better way to handle
2036 * the compound page as a whole, and then skip its extent, than repeatedly
2037 * calling find_get_entries() to return all its tails.
2038 *
a862f68a 2039 * Return: the number of pages and shadow entries which were found.
0cd6144a 2040 */
ca122fe4 2041unsigned find_get_entries(struct address_space *mapping, pgoff_t start,
cf2039af 2042 pgoff_t end, struct pagevec *pvec, pgoff_t *indices)
0cd6144a 2043{
f280bf09
MW
2044 XA_STATE(xas, &mapping->i_pages, start);
2045 struct page *page;
0cd6144a 2046 unsigned int ret = 0;
cf2039af 2047 unsigned nr_entries = PAGEVEC_SIZE;
0cd6144a
JW
2048
2049 rcu_read_lock();
ca122fe4 2050 while ((page = find_get_entry(&xas, end, XA_PRESENT))) {
71725ed1
HD
2051 /*
2052 * Terminate early on finding a THP, to allow the caller to
2053 * handle it all at once; but continue if this is hugetlbfs.
2054 */
c7bad633
MWO
2055 if (!xa_is_value(page) && PageTransHuge(page) &&
2056 !PageHuge(page)) {
71725ed1
HD
2057 page = find_subpage(page, xas.xa_index);
2058 nr_entries = ret + 1;
2059 }
c7bad633 2060
f280bf09 2061 indices[ret] = xas.xa_index;
cf2039af 2062 pvec->pages[ret] = page;
0cd6144a
JW
2063 if (++ret == nr_entries)
2064 break;
2065 }
2066 rcu_read_unlock();
cf2039af
MWO
2067
2068 pvec->nr = ret;
0cd6144a
JW
2069 return ret;
2070}
2071
5c211ba2
MWO
2072/**
2073 * find_lock_entries - Find a batch of pagecache entries.
2074 * @mapping: The address_space to search.
2075 * @start: The starting page cache index.
2076 * @end: The final page index (inclusive).
2077 * @pvec: Where the resulting entries are placed.
2078 * @indices: The cache indices of the entries in @pvec.
2079 *
2080 * find_lock_entries() will return a batch of entries from @mapping.
2081 * Swap, shadow and DAX entries are included. Pages are returned
2082 * locked and with an incremented refcount. Pages which are locked by
2083 * somebody else or under writeback are skipped. Only the head page of
2084 * a THP is returned. Pages which are partially outside the range are
2085 * not returned.
2086 *
2087 * The entries have ascending indexes. The indices may not be consecutive
2088 * due to not-present entries, THP pages, pages which could not be locked
2089 * or pages under writeback.
2090 *
2091 * Return: The number of entries which were found.
2092 */
2093unsigned find_lock_entries(struct address_space *mapping, pgoff_t start,
2094 pgoff_t end, struct pagevec *pvec, pgoff_t *indices)
2095{
2096 XA_STATE(xas, &mapping->i_pages, start);
2097 struct page *page;
2098
2099 rcu_read_lock();
2100 while ((page = find_get_entry(&xas, end, XA_PRESENT))) {
2101 if (!xa_is_value(page)) {
2102 if (page->index < start)
2103 goto put;
2104 VM_BUG_ON_PAGE(page->index != xas.xa_index, page);
2105 if (page->index + thp_nr_pages(page) - 1 > end)
2106 goto put;
2107 if (!trylock_page(page))
2108 goto put;
2109 if (page->mapping != mapping || PageWriteback(page))
2110 goto unlock;
2111 VM_BUG_ON_PAGE(!thp_contains(page, xas.xa_index),
2112 page);
2113 }
2114 indices[pvec->nr] = xas.xa_index;
2115 if (!pagevec_add(pvec, page))
2116 break;
2117 goto next;
2118unlock:
2119 unlock_page(page);
2120put:
2121 put_page(page);
2122next:
2d11e738
HD
2123 if (!xa_is_value(page) && PageTransHuge(page)) {
2124 unsigned int nr_pages = thp_nr_pages(page);
2125
2126 /* Final THP may cross MAX_LFS_FILESIZE on 32-bit */
2127 xas_set(&xas, page->index + nr_pages);
2128 if (xas.xa_index < nr_pages)
2129 break;
2130 }
5c211ba2
MWO
2131 }
2132 rcu_read_unlock();
2133
2134 return pagevec_count(pvec);
2135}
2136
1da177e4 2137/**
b947cee4 2138 * find_get_pages_range - gang pagecache lookup
1da177e4
LT
2139 * @mapping: The address_space to search
2140 * @start: The starting page index
b947cee4 2141 * @end: The final page index (inclusive)
1da177e4
LT
2142 * @nr_pages: The maximum number of pages
2143 * @pages: Where the resulting pages are placed
2144 *
b947cee4
JK
2145 * find_get_pages_range() will search for and return a group of up to @nr_pages
2146 * pages in the mapping starting at index @start and up to index @end
2147 * (inclusive). The pages are placed at @pages. find_get_pages_range() takes
2148 * a reference against the returned pages.
1da177e4
LT
2149 *
2150 * The search returns a group of mapping-contiguous pages with ascending
2151 * indexes. There may be holes in the indices due to not-present pages.
d72dc8a2 2152 * We also update @start to index the next page for the traversal.
1da177e4 2153 *
a862f68a
MR
2154 * Return: the number of pages which were found. If this number is
2155 * smaller than @nr_pages, the end of specified range has been
b947cee4 2156 * reached.
1da177e4 2157 */
b947cee4
JK
2158unsigned find_get_pages_range(struct address_space *mapping, pgoff_t *start,
2159 pgoff_t end, unsigned int nr_pages,
2160 struct page **pages)
1da177e4 2161{
fd1b3cee
MW
2162 XA_STATE(xas, &mapping->i_pages, *start);
2163 struct page *page;
0fc9d104
KK
2164 unsigned ret = 0;
2165
2166 if (unlikely(!nr_pages))
2167 return 0;
a60637c8
NP
2168
2169 rcu_read_lock();
c7bad633 2170 while ((page = find_get_entry(&xas, end, XA_PRESENT))) {
fd1b3cee
MW
2171 /* Skip over shadow, swap and DAX entries */
2172 if (xa_is_value(page))
8079b1c8 2173 continue;
a60637c8 2174
4101196b 2175 pages[ret] = find_subpage(page, xas.xa_index);
b947cee4 2176 if (++ret == nr_pages) {
5d3ee42f 2177 *start = xas.xa_index + 1;
b947cee4
JK
2178 goto out;
2179 }
a60637c8 2180 }
5b280c0c 2181
b947cee4
JK
2182 /*
2183 * We come here when there is no page beyond @end. We take care to not
2184 * overflow the index @start as it confuses some of the callers. This
fd1b3cee 2185 * breaks the iteration when there is a page at index -1 but that is
b947cee4
JK
2186 * already broken anyway.
2187 */
2188 if (end == (pgoff_t)-1)
2189 *start = (pgoff_t)-1;
2190 else
2191 *start = end + 1;
2192out:
a60637c8 2193 rcu_read_unlock();
d72dc8a2 2194
1da177e4
LT
2195 return ret;
2196}
2197
ebf43500
JA
2198/**
2199 * find_get_pages_contig - gang contiguous pagecache lookup
2200 * @mapping: The address_space to search
2201 * @index: The starting page index
2202 * @nr_pages: The maximum number of pages
2203 * @pages: Where the resulting pages are placed
2204 *
2205 * find_get_pages_contig() works exactly like find_get_pages(), except
2206 * that the returned number of pages are guaranteed to be contiguous.
2207 *
a862f68a 2208 * Return: the number of pages which were found.
ebf43500
JA
2209 */
2210unsigned find_get_pages_contig(struct address_space *mapping, pgoff_t index,
2211 unsigned int nr_pages, struct page **pages)
2212{
3ece58a2
MW
2213 XA_STATE(xas, &mapping->i_pages, index);
2214 struct page *page;
0fc9d104
KK
2215 unsigned int ret = 0;
2216
2217 if (unlikely(!nr_pages))
2218 return 0;
a60637c8
NP
2219
2220 rcu_read_lock();
3ece58a2 2221 for (page = xas_load(&xas); page; page = xas_next(&xas)) {
3ece58a2
MW
2222 if (xas_retry(&xas, page))
2223 continue;
2224 /*
2225 * If the entry has been swapped out, we can stop looking.
2226 * No current caller is looking for DAX entries.
2227 */
2228 if (xa_is_value(page))
8079b1c8 2229 break;
ebf43500 2230
4101196b 2231 if (!page_cache_get_speculative(page))
3ece58a2 2232 goto retry;
83929372 2233
4101196b 2234 /* Has the page moved or been split? */
3ece58a2
MW
2235 if (unlikely(page != xas_reload(&xas)))
2236 goto put_page;
a60637c8 2237
4101196b 2238 pages[ret] = find_subpage(page, xas.xa_index);
0fc9d104
KK
2239 if (++ret == nr_pages)
2240 break;
3ece58a2
MW
2241 continue;
2242put_page:
4101196b 2243 put_page(page);
3ece58a2
MW
2244retry:
2245 xas_reset(&xas);
ebf43500 2246 }
a60637c8
NP
2247 rcu_read_unlock();
2248 return ret;
ebf43500 2249}
ef71c15c 2250EXPORT_SYMBOL(find_get_pages_contig);
ebf43500 2251
485bb99b 2252/**
c49f50d1 2253 * find_get_pages_range_tag - Find and return head pages matching @tag.
485bb99b
RD
2254 * @mapping: the address_space to search
2255 * @index: the starting page index
72b045ae 2256 * @end: The final page index (inclusive)
485bb99b
RD
2257 * @tag: the tag index
2258 * @nr_pages: the maximum number of pages
2259 * @pages: where the resulting pages are placed
2260 *
c49f50d1
MWO
2261 * Like find_get_pages(), except we only return head pages which are tagged
2262 * with @tag. @index is updated to the index immediately after the last
2263 * page we return, ready for the next iteration.
a862f68a
MR
2264 *
2265 * Return: the number of pages which were found.
1da177e4 2266 */
72b045ae 2267unsigned find_get_pages_range_tag(struct address_space *mapping, pgoff_t *index,
a6906972 2268 pgoff_t end, xa_mark_t tag, unsigned int nr_pages,
72b045ae 2269 struct page **pages)
1da177e4 2270{
a6906972
MW
2271 XA_STATE(xas, &mapping->i_pages, *index);
2272 struct page *page;
0fc9d104
KK
2273 unsigned ret = 0;
2274
2275 if (unlikely(!nr_pages))
2276 return 0;
a60637c8
NP
2277
2278 rcu_read_lock();
c7bad633 2279 while ((page = find_get_entry(&xas, end, tag))) {
a6906972
MW
2280 /*
2281 * Shadow entries should never be tagged, but this iteration
2282 * is lockless so there is a window for page reclaim to evict
2283 * a page we saw tagged. Skip over it.
2284 */
2285 if (xa_is_value(page))
139b6a6f 2286 continue;
a60637c8 2287
c49f50d1 2288 pages[ret] = page;
72b045ae 2289 if (++ret == nr_pages) {
c49f50d1 2290 *index = page->index + thp_nr_pages(page);
72b045ae
JK
2291 goto out;
2292 }
a60637c8 2293 }
5b280c0c 2294
72b045ae 2295 /*
a6906972 2296 * We come here when we got to @end. We take care to not overflow the
72b045ae 2297 * index @index as it confuses some of the callers. This breaks the
a6906972
MW
2298 * iteration when there is a page at index -1 but that is already
2299 * broken anyway.
72b045ae
JK
2300 */
2301 if (end == (pgoff_t)-1)
2302 *index = (pgoff_t)-1;
2303 else
2304 *index = end + 1;
2305out:
a60637c8 2306 rcu_read_unlock();
1da177e4 2307
1da177e4
LT
2308 return ret;
2309}
72b045ae 2310EXPORT_SYMBOL(find_get_pages_range_tag);
1da177e4 2311
76d42bd9
WF
2312/*
2313 * CD/DVDs are error prone. When a medium error occurs, the driver may fail
2314 * a _large_ part of the i/o request. Imagine the worst scenario:
2315 *
2316 * ---R__________________________________________B__________
2317 * ^ reading here ^ bad block(assume 4k)
2318 *
2319 * read(R) => miss => readahead(R...B) => media error => frustrating retries
2320 * => failing the whole request => read(R) => read(R+1) =>
2321 * readahead(R+1...B+1) => bang => read(R+2) => read(R+3) =>
2322 * readahead(R+3...B+2) => bang => read(R+3) => read(R+4) =>
2323 * readahead(R+4...B+3) => bang => read(R+4) => read(R+5) => ......
2324 *
2325 * It is going insane. Fix it by quickly scaling down the readahead size.
2326 */
0f8e2db4 2327static void shrink_readahead_size_eio(struct file_ra_state *ra)
76d42bd9 2328{
76d42bd9 2329 ra->ra_pages /= 4;
76d42bd9
WF
2330}
2331
cbd59c48
MWO
2332/*
2333 * filemap_get_read_batch - Get a batch of pages for read
2334 *
2335 * Get a batch of pages which represent a contiguous range of bytes
2336 * in the file. No tail pages will be returned. If @index is in the
2337 * middle of a THP, the entire THP will be returned. The last page in
2338 * the batch may have Readahead set or be not Uptodate so that the
2339 * caller can take the appropriate action.
2340 */
2341static void filemap_get_read_batch(struct address_space *mapping,
2342 pgoff_t index, pgoff_t max, struct pagevec *pvec)
2343{
2344 XA_STATE(xas, &mapping->i_pages, index);
2345 struct page *head;
2346
2347 rcu_read_lock();
2348 for (head = xas_load(&xas); head; head = xas_next(&xas)) {
2349 if (xas_retry(&xas, head))
2350 continue;
2351 if (xas.xa_index > max || xa_is_value(head))
2352 break;
2353 if (!page_cache_get_speculative(head))
2354 goto retry;
2355
2356 /* Has the page moved or been split? */
2357 if (unlikely(head != xas_reload(&xas)))
2358 goto put_page;
2359
2360 if (!pagevec_add(pvec, head))
2361 break;
2362 if (!PageUptodate(head))
2363 break;
2364 if (PageReadahead(head))
2365 break;
2366 xas.xa_index = head->index + thp_nr_pages(head) - 1;
2367 xas.xa_offset = (xas.xa_index >> xas.xa_shift) & XA_CHUNK_MASK;
2368 continue;
2369put_page:
2370 put_page(head);
2371retry:
2372 xas_reset(&xas);
2373 }
2374 rcu_read_unlock();
2375}
2376
68430303
MWO
2377static int filemap_read_page(struct file *file, struct address_space *mapping,
2378 struct page *page)
723ef24b 2379{
723ef24b
KO
2380 int error;
2381
723ef24b 2382 /*
68430303
MWO
2383 * A previous I/O error may have been due to temporary failures,
2384 * eg. multipath errors. PG_error will be set again if readpage
2385 * fails.
723ef24b
KO
2386 */
2387 ClearPageError(page);
2388 /* Start the actual read. The read will unlock the page. */
68430303
MWO
2389 error = mapping->a_ops->readpage(file, page);
2390 if (error)
2391 return error;
723ef24b 2392
aa1ec2f6 2393 error = wait_on_page_locked_killable(page);
68430303
MWO
2394 if (error)
2395 return error;
aa1ec2f6
MWO
2396 if (PageUptodate(page))
2397 return 0;
aa1ec2f6
MWO
2398 shrink_readahead_size_eio(&file->f_ra);
2399 return -EIO;
723ef24b
KO
2400}
2401
fce70da3
MWO
2402static bool filemap_range_uptodate(struct address_space *mapping,
2403 loff_t pos, struct iov_iter *iter, struct page *page)
2404{
2405 int count;
2406
2407 if (PageUptodate(page))
2408 return true;
2409 /* pipes can't handle partially uptodate pages */
2410 if (iov_iter_is_pipe(iter))
2411 return false;
2412 if (!mapping->a_ops->is_partially_uptodate)
2413 return false;
2414 if (mapping->host->i_blkbits >= (PAGE_SHIFT + thp_order(page)))
2415 return false;
2416
2417 count = iter->count;
2418 if (page_offset(page) > pos) {
2419 count -= page_offset(page) - pos;
2420 pos = 0;
2421 } else {
2422 pos -= page_offset(page);
2423 }
2424
2425 return mapping->a_ops->is_partially_uptodate(page, pos, count);
2426}
2427
4612aeef
MWO
2428static int filemap_update_page(struct kiocb *iocb,
2429 struct address_space *mapping, struct iov_iter *iter,
fce70da3 2430 struct page *page)
723ef24b 2431{
ffdc8dab 2432 struct folio *folio = page_folio(page);
723ef24b
KO
2433 int error;
2434
730633f0
JK
2435 if (iocb->ki_flags & IOCB_NOWAIT) {
2436 if (!filemap_invalidate_trylock_shared(mapping))
2437 return -EAGAIN;
2438 } else {
2439 filemap_invalidate_lock_shared(mapping);
2440 }
2441
ffdc8dab 2442 if (!folio_trylock(folio)) {
730633f0 2443 error = -EAGAIN;
87d1d7b6 2444 if (iocb->ki_flags & (IOCB_NOWAIT | IOCB_NOIO))
730633f0 2445 goto unlock_mapping;
87d1d7b6 2446 if (!(iocb->ki_flags & IOCB_WAITQ)) {
730633f0 2447 filemap_invalidate_unlock_shared(mapping);
ffdc8dab 2448 put_and_wait_on_page_locked(&folio->page, TASK_KILLABLE);
4612aeef 2449 return AOP_TRUNCATED_PAGE;
bd8a1f36 2450 }
ffdc8dab 2451 error = __folio_lock_async(folio, iocb->ki_waitq);
87d1d7b6 2452 if (error)
730633f0 2453 goto unlock_mapping;
723ef24b 2454 }
723ef24b 2455
730633f0 2456 error = AOP_TRUNCATED_PAGE;
ffdc8dab 2457 if (!folio->mapping)
730633f0 2458 goto unlock;
723ef24b 2459
fce70da3 2460 error = 0;
ffdc8dab 2461 if (filemap_range_uptodate(mapping, iocb->ki_pos, iter, &folio->page))
fce70da3
MWO
2462 goto unlock;
2463
2464 error = -EAGAIN;
2465 if (iocb->ki_flags & (IOCB_NOIO | IOCB_NOWAIT | IOCB_WAITQ))
2466 goto unlock;
2467
ffdc8dab 2468 error = filemap_read_page(iocb->ki_filp, mapping, &folio->page);
730633f0 2469 goto unlock_mapping;
fce70da3 2470unlock:
ffdc8dab 2471 folio_unlock(folio);
730633f0
JK
2472unlock_mapping:
2473 filemap_invalidate_unlock_shared(mapping);
2474 if (error == AOP_TRUNCATED_PAGE)
ffdc8dab 2475 folio_put(folio);
fce70da3 2476 return error;
723ef24b
KO
2477}
2478
f253e185
MWO
2479static int filemap_create_page(struct file *file,
2480 struct address_space *mapping, pgoff_t index,
2481 struct pagevec *pvec)
723ef24b 2482{
723ef24b
KO
2483 struct page *page;
2484 int error;
2485
723ef24b
KO
2486 page = page_cache_alloc(mapping);
2487 if (!page)
f253e185 2488 return -ENOMEM;
723ef24b 2489
730633f0
JK
2490 /*
2491 * Protect against truncate / hole punch. Grabbing invalidate_lock here
2492 * assures we cannot instantiate and bring uptodate new pagecache pages
2493 * after evicting page cache during truncate and before actually
2494 * freeing blocks. Note that we could release invalidate_lock after
2495 * inserting the page into page cache as the locked page would then be
2496 * enough to synchronize with hole punching. But there are code paths
2497 * such as filemap_update_page() filling in partially uptodate pages or
2498 * ->readpages() that need to hold invalidate_lock while mapping blocks
2499 * for IO so let's hold the lock here as well to keep locking rules
2500 * simple.
2501 */
2502 filemap_invalidate_lock_shared(mapping);
723ef24b 2503 error = add_to_page_cache_lru(page, mapping, index,
f253e185
MWO
2504 mapping_gfp_constraint(mapping, GFP_KERNEL));
2505 if (error == -EEXIST)
2506 error = AOP_TRUNCATED_PAGE;
2507 if (error)
2508 goto error;
2509
2510 error = filemap_read_page(file, mapping, page);
2511 if (error)
2512 goto error;
2513
730633f0 2514 filemap_invalidate_unlock_shared(mapping);
f253e185
MWO
2515 pagevec_add(pvec, page);
2516 return 0;
2517error:
730633f0 2518 filemap_invalidate_unlock_shared(mapping);
68430303 2519 put_page(page);
f253e185 2520 return error;
723ef24b
KO
2521}
2522
5963fe03
MWO
2523static int filemap_readahead(struct kiocb *iocb, struct file *file,
2524 struct address_space *mapping, struct page *page,
2525 pgoff_t last_index)
2526{
2527 if (iocb->ki_flags & IOCB_NOIO)
2528 return -EAGAIN;
2529 page_cache_async_readahead(mapping, &file->f_ra, file, page,
2530 page->index, last_index - page->index);
2531 return 0;
2532}
2533
3a6bae48 2534static int filemap_get_pages(struct kiocb *iocb, struct iov_iter *iter,
ff993ba1 2535 struct pagevec *pvec)
06c04442
KO
2536{
2537 struct file *filp = iocb->ki_filp;
2538 struct address_space *mapping = filp->f_mapping;
2539 struct file_ra_state *ra = &filp->f_ra;
2540 pgoff_t index = iocb->ki_pos >> PAGE_SHIFT;
cbd59c48 2541 pgoff_t last_index;
2642fca6 2542 struct page *page;
cbd59c48 2543 int err = 0;
06c04442 2544
cbd59c48 2545 last_index = DIV_ROUND_UP(iocb->ki_pos + iter->count, PAGE_SIZE);
2642fca6 2546retry:
06c04442
KO
2547 if (fatal_signal_pending(current))
2548 return -EINTR;
2549
cbd59c48 2550 filemap_get_read_batch(mapping, index, last_index, pvec);
2642fca6
MWO
2551 if (!pagevec_count(pvec)) {
2552 if (iocb->ki_flags & IOCB_NOIO)
2553 return -EAGAIN;
2554 page_cache_sync_readahead(mapping, ra, filp, index,
2555 last_index - index);
2556 filemap_get_read_batch(mapping, index, last_index, pvec);
2557 }
f253e185
MWO
2558 if (!pagevec_count(pvec)) {
2559 if (iocb->ki_flags & (IOCB_NOWAIT | IOCB_WAITQ))
2560 return -EAGAIN;
2561 err = filemap_create_page(filp, mapping,
2562 iocb->ki_pos >> PAGE_SHIFT, pvec);
2563 if (err == AOP_TRUNCATED_PAGE)
2642fca6 2564 goto retry;
f253e185
MWO
2565 return err;
2566 }
06c04442 2567
2642fca6
MWO
2568 page = pvec->pages[pagevec_count(pvec) - 1];
2569 if (PageReadahead(page)) {
2570 err = filemap_readahead(iocb, filp, mapping, page, last_index);
2571 if (err)
2572 goto err;
2573 }
2574 if (!PageUptodate(page)) {
2575 if ((iocb->ki_flags & IOCB_WAITQ) && pagevec_count(pvec) > 1)
2576 iocb->ki_flags |= IOCB_NOWAIT;
2577 err = filemap_update_page(iocb, mapping, iter, page);
2578 if (err)
2579 goto err;
06c04442
KO
2580 }
2581
2642fca6 2582 return 0;
cbd59c48 2583err:
2642fca6
MWO
2584 if (err < 0)
2585 put_page(page);
2586 if (likely(--pvec->nr))
ff993ba1 2587 return 0;
4612aeef 2588 if (err == AOP_TRUNCATED_PAGE)
2642fca6
MWO
2589 goto retry;
2590 return err;
06c04442
KO
2591}
2592
485bb99b 2593/**
87fa0f3e
CH
2594 * filemap_read - Read data from the page cache.
2595 * @iocb: The iocb to read.
2596 * @iter: Destination for the data.
2597 * @already_read: Number of bytes already read by the caller.
485bb99b 2598 *
87fa0f3e
CH
2599 * Copies data from the page cache. If the data is not currently present,
2600 * uses the readahead and readpage address_space operations to fetch it.
1da177e4 2601 *
87fa0f3e
CH
2602 * Return: Total number of bytes copied, including those already read by
2603 * the caller. If an error happens before any bytes are copied, returns
2604 * a negative error number.
1da177e4 2605 */
87fa0f3e
CH
2606ssize_t filemap_read(struct kiocb *iocb, struct iov_iter *iter,
2607 ssize_t already_read)
1da177e4 2608{
47c27bc4 2609 struct file *filp = iocb->ki_filp;
06c04442 2610 struct file_ra_state *ra = &filp->f_ra;
36e78914 2611 struct address_space *mapping = filp->f_mapping;
1da177e4 2612 struct inode *inode = mapping->host;
ff993ba1
MWO
2613 struct pagevec pvec;
2614 int i, error = 0;
06c04442
KO
2615 bool writably_mapped;
2616 loff_t isize, end_offset;
1da177e4 2617
723ef24b 2618 if (unlikely(iocb->ki_pos >= inode->i_sb->s_maxbytes))
d05c5f7b 2619 return 0;
3644e2d2
KO
2620 if (unlikely(!iov_iter_count(iter)))
2621 return 0;
2622
c2a9737f 2623 iov_iter_truncate(iter, inode->i_sb->s_maxbytes);
cbd59c48 2624 pagevec_init(&pvec);
c2a9737f 2625
06c04442 2626 do {
1da177e4 2627 cond_resched();
5abf186a 2628
723ef24b 2629 /*
06c04442
KO
2630 * If we've already successfully copied some data, then we
2631 * can no longer safely return -EIOCBQUEUED. Hence mark
2632 * an async read NOWAIT at that point.
723ef24b 2633 */
87fa0f3e 2634 if ((iocb->ki_flags & IOCB_WAITQ) && already_read)
723ef24b
KO
2635 iocb->ki_flags |= IOCB_NOWAIT;
2636
ff993ba1
MWO
2637 error = filemap_get_pages(iocb, iter, &pvec);
2638 if (error < 0)
06c04442 2639 break;
1da177e4 2640
06c04442
KO
2641 /*
2642 * i_size must be checked after we know the pages are Uptodate.
2643 *
2644 * Checking i_size after the check allows us to calculate
2645 * the correct value for "nr", which means the zero-filled
2646 * part of the page is not copied back to userspace (unless
2647 * another truncate extends the file - this is desired though).
2648 */
2649 isize = i_size_read(inode);
2650 if (unlikely(iocb->ki_pos >= isize))
2651 goto put_pages;
06c04442
KO
2652 end_offset = min_t(loff_t, isize, iocb->ki_pos + iter->count);
2653
06c04442
KO
2654 /*
2655 * Once we start copying data, we don't want to be touching any
2656 * cachelines that might be contended:
2657 */
2658 writably_mapped = mapping_writably_mapped(mapping);
2659
2660 /*
2661 * When a sequential read accesses a page several times, only
2662 * mark it as accessed the first time.
2663 */
2664 if (iocb->ki_pos >> PAGE_SHIFT !=
2665 ra->prev_pos >> PAGE_SHIFT)
ff993ba1 2666 mark_page_accessed(pvec.pages[0]);
06c04442 2667
ff993ba1 2668 for (i = 0; i < pagevec_count(&pvec); i++) {
cbd59c48
MWO
2669 struct page *page = pvec.pages[i];
2670 size_t page_size = thp_size(page);
2671 size_t offset = iocb->ki_pos & (page_size - 1);
2672 size_t bytes = min_t(loff_t, end_offset - iocb->ki_pos,
2673 page_size - offset);
2674 size_t copied;
06c04442 2675
cbd59c48
MWO
2676 if (end_offset < page_offset(page))
2677 break;
2678 if (i > 0)
2679 mark_page_accessed(page);
06c04442
KO
2680 /*
2681 * If users can be writing to this page using arbitrary
2682 * virtual addresses, take care about potential aliasing
2683 * before reading the page on the kernel side.
2684 */
cbd59c48
MWO
2685 if (writably_mapped) {
2686 int j;
2687
2688 for (j = 0; j < thp_nr_pages(page); j++)
2689 flush_dcache_page(page + j);
2690 }
06c04442 2691
cbd59c48 2692 copied = copy_page_to_iter(page, offset, bytes, iter);
06c04442 2693
87fa0f3e 2694 already_read += copied;
06c04442
KO
2695 iocb->ki_pos += copied;
2696 ra->prev_pos = iocb->ki_pos;
2697
2698 if (copied < bytes) {
2699 error = -EFAULT;
2700 break;
2701 }
1da177e4 2702 }
06c04442 2703put_pages:
ff993ba1
MWO
2704 for (i = 0; i < pagevec_count(&pvec); i++)
2705 put_page(pvec.pages[i]);
cbd59c48 2706 pagevec_reinit(&pvec);
06c04442 2707 } while (iov_iter_count(iter) && iocb->ki_pos < isize && !error);
1da177e4 2708
0c6aa263 2709 file_accessed(filp);
06c04442 2710
87fa0f3e 2711 return already_read ? already_read : error;
1da177e4 2712}
87fa0f3e 2713EXPORT_SYMBOL_GPL(filemap_read);
1da177e4 2714
485bb99b 2715/**
6abd2322 2716 * generic_file_read_iter - generic filesystem read routine
485bb99b 2717 * @iocb: kernel I/O control block
6abd2322 2718 * @iter: destination for the data read
485bb99b 2719 *
6abd2322 2720 * This is the "read_iter()" routine for all filesystems
1da177e4 2721 * that can use the page cache directly.
41da51bc
AG
2722 *
2723 * The IOCB_NOWAIT flag in iocb->ki_flags indicates that -EAGAIN shall
2724 * be returned when no data can be read without waiting for I/O requests
2725 * to complete; it doesn't prevent readahead.
2726 *
2727 * The IOCB_NOIO flag in iocb->ki_flags indicates that no new I/O
2728 * requests shall be made for the read or for readahead. When no data
2729 * can be read, -EAGAIN shall be returned. When readahead would be
2730 * triggered, a partial, possibly empty read shall be returned.
2731 *
a862f68a
MR
2732 * Return:
2733 * * number of bytes copied, even for partial reads
41da51bc 2734 * * negative error code (or 0 if IOCB_NOIO) if nothing was read
1da177e4
LT
2735 */
2736ssize_t
ed978a81 2737generic_file_read_iter(struct kiocb *iocb, struct iov_iter *iter)
1da177e4 2738{
e7080a43 2739 size_t count = iov_iter_count(iter);
47c27bc4 2740 ssize_t retval = 0;
e7080a43
NS
2741
2742 if (!count)
826ea860 2743 return 0; /* skip atime */
1da177e4 2744
2ba48ce5 2745 if (iocb->ki_flags & IOCB_DIRECT) {
47c27bc4 2746 struct file *file = iocb->ki_filp;
ed978a81
AV
2747 struct address_space *mapping = file->f_mapping;
2748 struct inode *inode = mapping->host;
543ade1f 2749 loff_t size;
1da177e4 2750
1da177e4 2751 size = i_size_read(inode);
6be96d3a 2752 if (iocb->ki_flags & IOCB_NOWAIT) {
7a60d6d7
JA
2753 if (filemap_range_needs_writeback(mapping, iocb->ki_pos,
2754 iocb->ki_pos + count - 1))
6be96d3a
GR
2755 return -EAGAIN;
2756 } else {
2757 retval = filemap_write_and_wait_range(mapping,
2758 iocb->ki_pos,
2759 iocb->ki_pos + count - 1);
2760 if (retval < 0)
826ea860 2761 return retval;
6be96d3a 2762 }
d8d3d94b 2763
0d5b0cf2
CH
2764 file_accessed(file);
2765
5ecda137 2766 retval = mapping->a_ops->direct_IO(iocb, iter);
c3a69024 2767 if (retval >= 0) {
c64fb5c7 2768 iocb->ki_pos += retval;
5ecda137 2769 count -= retval;
9fe55eea 2770 }
ab2125df
PB
2771 if (retval != -EIOCBQUEUED)
2772 iov_iter_revert(iter, count - iov_iter_count(iter));
66f998f6 2773
9fe55eea
SW
2774 /*
2775 * Btrfs can have a short DIO read if we encounter
2776 * compressed extents, so if there was an error, or if
2777 * we've already read everything we wanted to, or if
2778 * there was a short read because we hit EOF, go ahead
2779 * and return. Otherwise fallthrough to buffered io for
fbbbad4b
MW
2780 * the rest of the read. Buffered reads will not work for
2781 * DAX files, so don't bother trying.
9fe55eea 2782 */
5ecda137 2783 if (retval < 0 || !count || iocb->ki_pos >= size ||
0d5b0cf2 2784 IS_DAX(inode))
826ea860 2785 return retval;
1da177e4
LT
2786 }
2787
826ea860 2788 return filemap_read(iocb, iter, retval);
1da177e4 2789}
ed978a81 2790EXPORT_SYMBOL(generic_file_read_iter);
1da177e4 2791
54fa39ac
MWO
2792static inline loff_t page_seek_hole_data(struct xa_state *xas,
2793 struct address_space *mapping, struct page *page,
2794 loff_t start, loff_t end, bool seek_data)
41139aa4 2795{
54fa39ac
MWO
2796 const struct address_space_operations *ops = mapping->a_ops;
2797 size_t offset, bsz = i_blocksize(mapping->host);
2798
41139aa4 2799 if (xa_is_value(page) || PageUptodate(page))
54fa39ac
MWO
2800 return seek_data ? start : end;
2801 if (!ops->is_partially_uptodate)
2802 return seek_data ? end : start;
2803
2804 xas_pause(xas);
2805 rcu_read_unlock();
2806 lock_page(page);
2807 if (unlikely(page->mapping != mapping))
2808 goto unlock;
2809
2810 offset = offset_in_thp(page, start) & ~(bsz - 1);
2811
2812 do {
2813 if (ops->is_partially_uptodate(page, offset, bsz) == seek_data)
2814 break;
2815 start = (start + bsz) & ~(bsz - 1);
2816 offset += bsz;
2817 } while (offset < thp_size(page));
2818unlock:
2819 unlock_page(page);
2820 rcu_read_lock();
2821 return start;
41139aa4
MWO
2822}
2823
2824static inline
2825unsigned int seek_page_size(struct xa_state *xas, struct page *page)
2826{
2827 if (xa_is_value(page))
2828 return PAGE_SIZE << xa_get_order(xas->xa, xas->xa_index);
2829 return thp_size(page);
2830}
2831
2832/**
2833 * mapping_seek_hole_data - Seek for SEEK_DATA / SEEK_HOLE in the page cache.
2834 * @mapping: Address space to search.
2835 * @start: First byte to consider.
2836 * @end: Limit of search (exclusive).
2837 * @whence: Either SEEK_HOLE or SEEK_DATA.
2838 *
2839 * If the page cache knows which blocks contain holes and which blocks
2840 * contain data, your filesystem can use this function to implement
2841 * SEEK_HOLE and SEEK_DATA. This is useful for filesystems which are
2842 * entirely memory-based such as tmpfs, and filesystems which support
2843 * unwritten extents.
2844 *
f0953a1b 2845 * Return: The requested offset on success, or -ENXIO if @whence specifies
41139aa4
MWO
2846 * SEEK_DATA and there is no data after @start. There is an implicit hole
2847 * after @end - 1, so SEEK_HOLE returns @end if all the bytes between @start
2848 * and @end contain data.
2849 */
2850loff_t mapping_seek_hole_data(struct address_space *mapping, loff_t start,
2851 loff_t end, int whence)
2852{
2853 XA_STATE(xas, &mapping->i_pages, start >> PAGE_SHIFT);
ed98b015 2854 pgoff_t max = (end - 1) >> PAGE_SHIFT;
41139aa4
MWO
2855 bool seek_data = (whence == SEEK_DATA);
2856 struct page *page;
2857
2858 if (end <= start)
2859 return -ENXIO;
2860
2861 rcu_read_lock();
2862 while ((page = find_get_entry(&xas, max, XA_PRESENT))) {
ed98b015
HD
2863 loff_t pos = (u64)xas.xa_index << PAGE_SHIFT;
2864 unsigned int seek_size;
41139aa4
MWO
2865
2866 if (start < pos) {
2867 if (!seek_data)
2868 goto unlock;
2869 start = pos;
2870 }
2871
ed98b015
HD
2872 seek_size = seek_page_size(&xas, page);
2873 pos = round_up(pos + 1, seek_size);
54fa39ac
MWO
2874 start = page_seek_hole_data(&xas, mapping, page, start, pos,
2875 seek_data);
2876 if (start < pos)
41139aa4 2877 goto unlock;
ed98b015
HD
2878 if (start >= end)
2879 break;
2880 if (seek_size > PAGE_SIZE)
2881 xas_set(&xas, pos >> PAGE_SHIFT);
41139aa4
MWO
2882 if (!xa_is_value(page))
2883 put_page(page);
2884 }
41139aa4 2885 if (seek_data)
ed98b015 2886 start = -ENXIO;
41139aa4
MWO
2887unlock:
2888 rcu_read_unlock();
ed98b015 2889 if (page && !xa_is_value(page))
41139aa4 2890 put_page(page);
41139aa4
MWO
2891 if (start > end)
2892 return end;
2893 return start;
2894}
2895
1da177e4 2896#ifdef CONFIG_MMU
1da177e4 2897#define MMAP_LOTSAMISS (100)
6b4c9f44 2898/*
c1e8d7c6 2899 * lock_page_maybe_drop_mmap - lock the page, possibly dropping the mmap_lock
6b4c9f44
JB
2900 * @vmf - the vm_fault for this fault.
2901 * @page - the page to lock.
2902 * @fpin - the pointer to the file we may pin (or is already pinned).
2903 *
c1e8d7c6 2904 * This works similar to lock_page_or_retry in that it can drop the mmap_lock.
6b4c9f44 2905 * It differs in that it actually returns the page locked if it returns 1 and 0
c1e8d7c6 2906 * if it couldn't lock the page. If we did have to drop the mmap_lock then fpin
6b4c9f44
JB
2907 * will point to the pinned file and needs to be fput()'ed at a later point.
2908 */
2909static int lock_page_maybe_drop_mmap(struct vm_fault *vmf, struct page *page,
2910 struct file **fpin)
2911{
7c23c782
MWO
2912 struct folio *folio = page_folio(page);
2913
2914 if (folio_trylock(folio))
6b4c9f44
JB
2915 return 1;
2916
8b0f9fa2
LT
2917 /*
2918 * NOTE! This will make us return with VM_FAULT_RETRY, but with
c1e8d7c6 2919 * the mmap_lock still held. That's how FAULT_FLAG_RETRY_NOWAIT
8b0f9fa2
LT
2920 * is supposed to work. We have way too many special cases..
2921 */
6b4c9f44
JB
2922 if (vmf->flags & FAULT_FLAG_RETRY_NOWAIT)
2923 return 0;
2924
2925 *fpin = maybe_unlock_mmap_for_io(vmf, *fpin);
2926 if (vmf->flags & FAULT_FLAG_KILLABLE) {
af7f29d9 2927 if (__folio_lock_killable(folio)) {
6b4c9f44 2928 /*
c1e8d7c6 2929 * We didn't have the right flags to drop the mmap_lock,
6b4c9f44
JB
2930 * but all fault_handlers only check for fatal signals
2931 * if we return VM_FAULT_RETRY, so we need to drop the
c1e8d7c6 2932 * mmap_lock here and return 0 if we don't have a fpin.
6b4c9f44
JB
2933 */
2934 if (*fpin == NULL)
d8ed45c5 2935 mmap_read_unlock(vmf->vma->vm_mm);
6b4c9f44
JB
2936 return 0;
2937 }
2938 } else
7c23c782
MWO
2939 __folio_lock(folio);
2940
6b4c9f44
JB
2941 return 1;
2942}
2943
ef00e08e 2944/*
6b4c9f44
JB
2945 * Synchronous readahead happens when we don't even find a page in the page
2946 * cache at all. We don't want to perform IO under the mmap sem, so if we have
2947 * to drop the mmap sem we return the file that was pinned in order for us to do
2948 * that. If we didn't pin a file then we return NULL. The file that is
2949 * returned needs to be fput()'ed when we're done with it.
ef00e08e 2950 */
6b4c9f44 2951static struct file *do_sync_mmap_readahead(struct vm_fault *vmf)
ef00e08e 2952{
2a1180f1
JB
2953 struct file *file = vmf->vma->vm_file;
2954 struct file_ra_state *ra = &file->f_ra;
ef00e08e 2955 struct address_space *mapping = file->f_mapping;
fcd9ae4f 2956 DEFINE_READAHEAD(ractl, file, ra, mapping, vmf->pgoff);
6b4c9f44 2957 struct file *fpin = NULL;
e630bfac 2958 unsigned int mmap_miss;
ef00e08e
LT
2959
2960 /* If we don't want any read-ahead, don't bother */
2a1180f1 2961 if (vmf->vma->vm_flags & VM_RAND_READ)
6b4c9f44 2962 return fpin;
275b12bf 2963 if (!ra->ra_pages)
6b4c9f44 2964 return fpin;
ef00e08e 2965
2a1180f1 2966 if (vmf->vma->vm_flags & VM_SEQ_READ) {
6b4c9f44 2967 fpin = maybe_unlock_mmap_for_io(vmf, fpin);
fcd9ae4f 2968 page_cache_sync_ra(&ractl, ra->ra_pages);
6b4c9f44 2969 return fpin;
ef00e08e
LT
2970 }
2971
207d04ba 2972 /* Avoid banging the cache line if not needed */
e630bfac
KS
2973 mmap_miss = READ_ONCE(ra->mmap_miss);
2974 if (mmap_miss < MMAP_LOTSAMISS * 10)
2975 WRITE_ONCE(ra->mmap_miss, ++mmap_miss);
ef00e08e
LT
2976
2977 /*
2978 * Do we miss much more than hit in this file? If so,
2979 * stop bothering with read-ahead. It will only hurt.
2980 */
e630bfac 2981 if (mmap_miss > MMAP_LOTSAMISS)
6b4c9f44 2982 return fpin;
ef00e08e 2983
d30a1100
WF
2984 /*
2985 * mmap read-around
2986 */
6b4c9f44 2987 fpin = maybe_unlock_mmap_for_io(vmf, fpin);
db660d46 2988 ra->start = max_t(long, 0, vmf->pgoff - ra->ra_pages / 2);
600e19af
RG
2989 ra->size = ra->ra_pages;
2990 ra->async_size = ra->ra_pages / 4;
db660d46
DH
2991 ractl._index = ra->start;
2992 do_page_cache_ra(&ractl, ra->size, ra->async_size);
6b4c9f44 2993 return fpin;
ef00e08e
LT
2994}
2995
2996/*
2997 * Asynchronous readahead happens when we find the page and PG_readahead,
6b4c9f44 2998 * so we want to possibly extend the readahead further. We return the file that
c1e8d7c6 2999 * was pinned if we have to drop the mmap_lock in order to do IO.
ef00e08e 3000 */
6b4c9f44
JB
3001static struct file *do_async_mmap_readahead(struct vm_fault *vmf,
3002 struct page *page)
ef00e08e 3003{
2a1180f1
JB
3004 struct file *file = vmf->vma->vm_file;
3005 struct file_ra_state *ra = &file->f_ra;
ef00e08e 3006 struct address_space *mapping = file->f_mapping;
6b4c9f44 3007 struct file *fpin = NULL;
e630bfac 3008 unsigned int mmap_miss;
2a1180f1 3009 pgoff_t offset = vmf->pgoff;
ef00e08e
LT
3010
3011 /* If we don't want any read-ahead, don't bother */
5c72feee 3012 if (vmf->vma->vm_flags & VM_RAND_READ || !ra->ra_pages)
6b4c9f44 3013 return fpin;
e630bfac
KS
3014 mmap_miss = READ_ONCE(ra->mmap_miss);
3015 if (mmap_miss)
3016 WRITE_ONCE(ra->mmap_miss, --mmap_miss);
6b4c9f44
JB
3017 if (PageReadahead(page)) {
3018 fpin = maybe_unlock_mmap_for_io(vmf, fpin);
2fad6f5d
WF
3019 page_cache_async_readahead(mapping, ra, file,
3020 page, offset, ra->ra_pages);
6b4c9f44
JB
3021 }
3022 return fpin;
ef00e08e
LT
3023}
3024
485bb99b 3025/**
54cb8821 3026 * filemap_fault - read in file data for page fault handling
d0217ac0 3027 * @vmf: struct vm_fault containing details of the fault
485bb99b 3028 *
54cb8821 3029 * filemap_fault() is invoked via the vma operations vector for a
1da177e4
LT
3030 * mapped memory region to read in file data during a page fault.
3031 *
3032 * The goto's are kind of ugly, but this streamlines the normal case of having
3033 * it in the page cache, and handles the special cases reasonably without
3034 * having a lot of duplicated code.
9a95f3cf 3035 *
c1e8d7c6 3036 * vma->vm_mm->mmap_lock must be held on entry.
9a95f3cf 3037 *
c1e8d7c6 3038 * If our return value has VM_FAULT_RETRY set, it's because the mmap_lock
a4985833 3039 * may be dropped before doing I/O or by lock_page_maybe_drop_mmap().
9a95f3cf 3040 *
c1e8d7c6 3041 * If our return value does not have VM_FAULT_RETRY set, the mmap_lock
9a95f3cf
PC
3042 * has not been released.
3043 *
3044 * We never return with VM_FAULT_RETRY and a bit from VM_FAULT_ERROR set.
a862f68a
MR
3045 *
3046 * Return: bitwise-OR of %VM_FAULT_ codes.
1da177e4 3047 */
2bcd6454 3048vm_fault_t filemap_fault(struct vm_fault *vmf)
1da177e4
LT
3049{
3050 int error;
11bac800 3051 struct file *file = vmf->vma->vm_file;
6b4c9f44 3052 struct file *fpin = NULL;
1da177e4 3053 struct address_space *mapping = file->f_mapping;
1da177e4 3054 struct inode *inode = mapping->host;
ef00e08e 3055 pgoff_t offset = vmf->pgoff;
9ab2594f 3056 pgoff_t max_off;
1da177e4 3057 struct page *page;
2bcd6454 3058 vm_fault_t ret = 0;
730633f0 3059 bool mapping_locked = false;
1da177e4 3060
9ab2594f
MW
3061 max_off = DIV_ROUND_UP(i_size_read(inode), PAGE_SIZE);
3062 if (unlikely(offset >= max_off))
5307cc1a 3063 return VM_FAULT_SIGBUS;
1da177e4 3064
1da177e4 3065 /*
49426420 3066 * Do we have something in the page cache already?
1da177e4 3067 */
ef00e08e 3068 page = find_get_page(mapping, offset);
730633f0 3069 if (likely(page)) {
1da177e4 3070 /*
730633f0
JK
3071 * We found the page, so try async readahead before waiting for
3072 * the lock.
1da177e4 3073 */
730633f0
JK
3074 if (!(vmf->flags & FAULT_FLAG_TRIED))
3075 fpin = do_async_mmap_readahead(vmf, page);
3076 if (unlikely(!PageUptodate(page))) {
3077 filemap_invalidate_lock_shared(mapping);
3078 mapping_locked = true;
3079 }
3080 } else {
ef00e08e 3081 /* No page in the page cache at all */
ef00e08e 3082 count_vm_event(PGMAJFAULT);
2262185c 3083 count_memcg_event_mm(vmf->vma->vm_mm, PGMAJFAULT);
ef00e08e 3084 ret = VM_FAULT_MAJOR;
6b4c9f44 3085 fpin = do_sync_mmap_readahead(vmf);
ef00e08e 3086retry_find:
730633f0
JK
3087 /*
3088 * See comment in filemap_create_page() why we need
3089 * invalidate_lock
3090 */
3091 if (!mapping_locked) {
3092 filemap_invalidate_lock_shared(mapping);
3093 mapping_locked = true;
3094 }
a75d4c33
JB
3095 page = pagecache_get_page(mapping, offset,
3096 FGP_CREAT|FGP_FOR_MMAP,
3097 vmf->gfp_mask);
6b4c9f44
JB
3098 if (!page) {
3099 if (fpin)
3100 goto out_retry;
730633f0 3101 filemap_invalidate_unlock_shared(mapping);
e520e932 3102 return VM_FAULT_OOM;
6b4c9f44 3103 }
1da177e4
LT
3104 }
3105
6b4c9f44
JB
3106 if (!lock_page_maybe_drop_mmap(vmf, page, &fpin))
3107 goto out_retry;
b522c94d
ML
3108
3109 /* Did it get truncated? */
585e5a7b 3110 if (unlikely(compound_head(page)->mapping != mapping)) {
b522c94d
ML
3111 unlock_page(page);
3112 put_page(page);
3113 goto retry_find;
3114 }
520e5ba4 3115 VM_BUG_ON_PAGE(page_to_pgoff(page) != offset, page);
b522c94d 3116
1da177e4 3117 /*
d00806b1
NP
3118 * We have a locked page in the page cache, now we need to check
3119 * that it's up-to-date. If not, it is going to be due to an error.
1da177e4 3120 */
730633f0
JK
3121 if (unlikely(!PageUptodate(page))) {
3122 /*
3123 * The page was in cache and uptodate and now it is not.
3124 * Strange but possible since we didn't hold the page lock all
3125 * the time. Let's drop everything get the invalidate lock and
3126 * try again.
3127 */
3128 if (!mapping_locked) {
3129 unlock_page(page);
3130 put_page(page);
3131 goto retry_find;
3132 }
1da177e4 3133 goto page_not_uptodate;
730633f0 3134 }
1da177e4 3135
6b4c9f44 3136 /*
c1e8d7c6 3137 * We've made it this far and we had to drop our mmap_lock, now is the
6b4c9f44
JB
3138 * time to return to the upper layer and have it re-find the vma and
3139 * redo the fault.
3140 */
3141 if (fpin) {
3142 unlock_page(page);
3143 goto out_retry;
3144 }
730633f0
JK
3145 if (mapping_locked)
3146 filemap_invalidate_unlock_shared(mapping);
6b4c9f44 3147
ef00e08e
LT
3148 /*
3149 * Found the page and have a reference on it.
3150 * We must recheck i_size under page lock.
3151 */
9ab2594f
MW
3152 max_off = DIV_ROUND_UP(i_size_read(inode), PAGE_SIZE);
3153 if (unlikely(offset >= max_off)) {
d00806b1 3154 unlock_page(page);
09cbfeaf 3155 put_page(page);
5307cc1a 3156 return VM_FAULT_SIGBUS;
d00806b1
NP
3157 }
3158
d0217ac0 3159 vmf->page = page;
83c54070 3160 return ret | VM_FAULT_LOCKED;
1da177e4 3161
1da177e4 3162page_not_uptodate:
1da177e4
LT
3163 /*
3164 * Umm, take care of errors if the page isn't up-to-date.
3165 * Try to re-read it _once_. We do this synchronously,
3166 * because there really aren't any performance issues here
3167 * and we need to check for errors.
3168 */
6b4c9f44 3169 fpin = maybe_unlock_mmap_for_io(vmf, fpin);
d31fa86a 3170 error = filemap_read_page(file, mapping, page);
6b4c9f44
JB
3171 if (fpin)
3172 goto out_retry;
09cbfeaf 3173 put_page(page);
d00806b1
NP
3174
3175 if (!error || error == AOP_TRUNCATED_PAGE)
994fc28c 3176 goto retry_find;
730633f0 3177 filemap_invalidate_unlock_shared(mapping);
1da177e4 3178
d0217ac0 3179 return VM_FAULT_SIGBUS;
6b4c9f44
JB
3180
3181out_retry:
3182 /*
c1e8d7c6 3183 * We dropped the mmap_lock, we need to return to the fault handler to
6b4c9f44
JB
3184 * re-find the vma and come back and find our hopefully still populated
3185 * page.
3186 */
3187 if (page)
3188 put_page(page);
730633f0
JK
3189 if (mapping_locked)
3190 filemap_invalidate_unlock_shared(mapping);
6b4c9f44
JB
3191 if (fpin)
3192 fput(fpin);
3193 return ret | VM_FAULT_RETRY;
54cb8821
NP
3194}
3195EXPORT_SYMBOL(filemap_fault);
3196
f9ce0be7 3197static bool filemap_map_pmd(struct vm_fault *vmf, struct page *page)
f1820361 3198{
f9ce0be7
KS
3199 struct mm_struct *mm = vmf->vma->vm_mm;
3200
3201 /* Huge page is mapped? No need to proceed. */
3202 if (pmd_trans_huge(*vmf->pmd)) {
3203 unlock_page(page);
3204 put_page(page);
3205 return true;
3206 }
3207
3208 if (pmd_none(*vmf->pmd) && PageTransHuge(page)) {
3209 vm_fault_t ret = do_set_pmd(vmf, page);
3210 if (!ret) {
3211 /* The page is mapped successfully, reference consumed. */
3212 unlock_page(page);
3213 return true;
3214 }
3215 }
3216
3217 if (pmd_none(*vmf->pmd)) {
3218 vmf->ptl = pmd_lock(mm, vmf->pmd);
3219 if (likely(pmd_none(*vmf->pmd))) {
3220 mm_inc_nr_ptes(mm);
3221 pmd_populate(mm, vmf->pmd, vmf->prealloc_pte);
3222 vmf->prealloc_pte = NULL;
3223 }
3224 spin_unlock(vmf->ptl);
3225 }
3226
3227 /* See comment in handle_pte_fault() */
3228 if (pmd_devmap_trans_unstable(vmf->pmd)) {
3229 unlock_page(page);
3230 put_page(page);
3231 return true;
3232 }
3233
3234 return false;
3235}
3236
3237static struct page *next_uptodate_page(struct page *page,
3238 struct address_space *mapping,
3239 struct xa_state *xas, pgoff_t end_pgoff)
3240{
3241 unsigned long max_idx;
3242
3243 do {
3244 if (!page)
3245 return NULL;
3246 if (xas_retry(xas, page))
3247 continue;
3248 if (xa_is_value(page))
3249 continue;
3250 if (PageLocked(page))
3251 continue;
3252 if (!page_cache_get_speculative(page))
3253 continue;
3254 /* Has the page moved or been split? */
3255 if (unlikely(page != xas_reload(xas)))
3256 goto skip;
3257 if (!PageUptodate(page) || PageReadahead(page))
3258 goto skip;
3259 if (PageHWPoison(page))
3260 goto skip;
3261 if (!trylock_page(page))
3262 goto skip;
3263 if (page->mapping != mapping)
3264 goto unlock;
3265 if (!PageUptodate(page))
3266 goto unlock;
3267 max_idx = DIV_ROUND_UP(i_size_read(mapping->host), PAGE_SIZE);
3268 if (xas->xa_index >= max_idx)
3269 goto unlock;
3270 return page;
3271unlock:
3272 unlock_page(page);
3273skip:
3274 put_page(page);
3275 } while ((page = xas_next_entry(xas, end_pgoff)) != NULL);
3276
3277 return NULL;
3278}
3279
3280static inline struct page *first_map_page(struct address_space *mapping,
3281 struct xa_state *xas,
3282 pgoff_t end_pgoff)
3283{
3284 return next_uptodate_page(xas_find(xas, end_pgoff),
3285 mapping, xas, end_pgoff);
3286}
3287
3288static inline struct page *next_map_page(struct address_space *mapping,
3289 struct xa_state *xas,
3290 pgoff_t end_pgoff)
3291{
3292 return next_uptodate_page(xas_next_entry(xas, end_pgoff),
3293 mapping, xas, end_pgoff);
3294}
3295
3296vm_fault_t filemap_map_pages(struct vm_fault *vmf,
3297 pgoff_t start_pgoff, pgoff_t end_pgoff)
3298{
3299 struct vm_area_struct *vma = vmf->vma;
3300 struct file *file = vma->vm_file;
f1820361 3301 struct address_space *mapping = file->f_mapping;
bae473a4 3302 pgoff_t last_pgoff = start_pgoff;
9d3af4b4 3303 unsigned long addr;
070e807c 3304 XA_STATE(xas, &mapping->i_pages, start_pgoff);
27a83a60 3305 struct page *head, *page;
e630bfac 3306 unsigned int mmap_miss = READ_ONCE(file->f_ra.mmap_miss);
f9ce0be7 3307 vm_fault_t ret = 0;
f1820361
KS
3308
3309 rcu_read_lock();
f9ce0be7
KS
3310 head = first_map_page(mapping, &xas, end_pgoff);
3311 if (!head)
3312 goto out;
f1820361 3313
f9ce0be7
KS
3314 if (filemap_map_pmd(vmf, head)) {
3315 ret = VM_FAULT_NOPAGE;
3316 goto out;
3317 }
f1820361 3318
9d3af4b4
WD
3319 addr = vma->vm_start + ((start_pgoff - vma->vm_pgoff) << PAGE_SHIFT);
3320 vmf->pte = pte_offset_map_lock(vma->vm_mm, vmf->pmd, addr, &vmf->ptl);
f9ce0be7 3321 do {
27a83a60 3322 page = find_subpage(head, xas.xa_index);
f9ce0be7 3323 if (PageHWPoison(page))
f1820361
KS
3324 goto unlock;
3325
e630bfac
KS
3326 if (mmap_miss > 0)
3327 mmap_miss--;
7267ec00 3328
9d3af4b4 3329 addr += (xas.xa_index - last_pgoff) << PAGE_SHIFT;
f9ce0be7 3330 vmf->pte += xas.xa_index - last_pgoff;
070e807c 3331 last_pgoff = xas.xa_index;
f9ce0be7
KS
3332
3333 if (!pte_none(*vmf->pte))
7267ec00 3334 goto unlock;
f9ce0be7 3335
46bdb427 3336 /* We're about to handle the fault */
9d3af4b4 3337 if (vmf->address == addr)
46bdb427 3338 ret = VM_FAULT_NOPAGE;
46bdb427 3339
9d3af4b4 3340 do_set_pte(vmf, page, addr);
f9ce0be7 3341 /* no need to invalidate: a not-present page won't be cached */
9d3af4b4 3342 update_mmu_cache(vma, addr, vmf->pte);
27a83a60 3343 unlock_page(head);
f9ce0be7 3344 continue;
f1820361 3345unlock:
27a83a60 3346 unlock_page(head);
27a83a60 3347 put_page(head);
f9ce0be7
KS
3348 } while ((head = next_map_page(mapping, &xas, end_pgoff)) != NULL);
3349 pte_unmap_unlock(vmf->pte, vmf->ptl);
3350out:
f1820361 3351 rcu_read_unlock();
e630bfac 3352 WRITE_ONCE(file->f_ra.mmap_miss, mmap_miss);
f9ce0be7 3353 return ret;
f1820361
KS
3354}
3355EXPORT_SYMBOL(filemap_map_pages);
3356
2bcd6454 3357vm_fault_t filemap_page_mkwrite(struct vm_fault *vmf)
4fcf1c62 3358{
5df1a672 3359 struct address_space *mapping = vmf->vma->vm_file->f_mapping;
4fcf1c62 3360 struct page *page = vmf->page;
2bcd6454 3361 vm_fault_t ret = VM_FAULT_LOCKED;
4fcf1c62 3362
5df1a672 3363 sb_start_pagefault(mapping->host->i_sb);
11bac800 3364 file_update_time(vmf->vma->vm_file);
4fcf1c62 3365 lock_page(page);
5df1a672 3366 if (page->mapping != mapping) {
4fcf1c62
JK
3367 unlock_page(page);
3368 ret = VM_FAULT_NOPAGE;
3369 goto out;
3370 }
14da9200
JK
3371 /*
3372 * We mark the page dirty already here so that when freeze is in
3373 * progress, we are guaranteed that writeback during freezing will
3374 * see the dirty page and writeprotect it again.
3375 */
3376 set_page_dirty(page);
1d1d1a76 3377 wait_for_stable_page(page);
4fcf1c62 3378out:
5df1a672 3379 sb_end_pagefault(mapping->host->i_sb);
4fcf1c62
JK
3380 return ret;
3381}
4fcf1c62 3382
f0f37e2f 3383const struct vm_operations_struct generic_file_vm_ops = {
54cb8821 3384 .fault = filemap_fault,
f1820361 3385 .map_pages = filemap_map_pages,
4fcf1c62 3386 .page_mkwrite = filemap_page_mkwrite,
1da177e4
LT
3387};
3388
3389/* This is used for a general mmap of a disk file */
3390
68d68ff6 3391int generic_file_mmap(struct file *file, struct vm_area_struct *vma)
1da177e4
LT
3392{
3393 struct address_space *mapping = file->f_mapping;
3394
3395 if (!mapping->a_ops->readpage)
3396 return -ENOEXEC;
3397 file_accessed(file);
3398 vma->vm_ops = &generic_file_vm_ops;
3399 return 0;
3400}
1da177e4
LT
3401
3402/*
3403 * This is for filesystems which do not implement ->writepage.
3404 */
3405int generic_file_readonly_mmap(struct file *file, struct vm_area_struct *vma)
3406{
3407 if ((vma->vm_flags & VM_SHARED) && (vma->vm_flags & VM_MAYWRITE))
3408 return -EINVAL;
3409 return generic_file_mmap(file, vma);
3410}
3411#else
4b96a37d 3412vm_fault_t filemap_page_mkwrite(struct vm_fault *vmf)
45397228 3413{
4b96a37d 3414 return VM_FAULT_SIGBUS;
45397228 3415}
68d68ff6 3416int generic_file_mmap(struct file *file, struct vm_area_struct *vma)
1da177e4
LT
3417{
3418 return -ENOSYS;
3419}
68d68ff6 3420int generic_file_readonly_mmap(struct file *file, struct vm_area_struct *vma)
1da177e4
LT
3421{
3422 return -ENOSYS;
3423}
3424#endif /* CONFIG_MMU */
3425
45397228 3426EXPORT_SYMBOL(filemap_page_mkwrite);
1da177e4
LT
3427EXPORT_SYMBOL(generic_file_mmap);
3428EXPORT_SYMBOL(generic_file_readonly_mmap);
3429
67f9fd91
SL
3430static struct page *wait_on_page_read(struct page *page)
3431{
3432 if (!IS_ERR(page)) {
3433 wait_on_page_locked(page);
3434 if (!PageUptodate(page)) {
09cbfeaf 3435 put_page(page);
67f9fd91
SL
3436 page = ERR_PTR(-EIO);
3437 }
3438 }
3439 return page;
3440}
3441
32b63529 3442static struct page *do_read_cache_page(struct address_space *mapping,
57f6b96c 3443 pgoff_t index,
5e5358e7 3444 int (*filler)(void *, struct page *),
0531b2aa
LT
3445 void *data,
3446 gfp_t gfp)
1da177e4 3447{
eb2be189 3448 struct page *page;
1da177e4
LT
3449 int err;
3450repeat:
3451 page = find_get_page(mapping, index);
3452 if (!page) {
453f85d4 3453 page = __page_cache_alloc(gfp);
eb2be189
NP
3454 if (!page)
3455 return ERR_PTR(-ENOMEM);
e6f67b8c 3456 err = add_to_page_cache_lru(page, mapping, index, gfp);
eb2be189 3457 if (unlikely(err)) {
09cbfeaf 3458 put_page(page);
eb2be189
NP
3459 if (err == -EEXIST)
3460 goto repeat;
22ecdb4f 3461 /* Presumably ENOMEM for xarray node */
1da177e4
LT
3462 return ERR_PTR(err);
3463 }
32b63529
MG
3464
3465filler:
6c45b454
CH
3466 if (filler)
3467 err = filler(data, page);
3468 else
3469 err = mapping->a_ops->readpage(data, page);
3470
1da177e4 3471 if (err < 0) {
09cbfeaf 3472 put_page(page);
32b63529 3473 return ERR_PTR(err);
1da177e4 3474 }
1da177e4 3475
32b63529
MG
3476 page = wait_on_page_read(page);
3477 if (IS_ERR(page))
3478 return page;
3479 goto out;
3480 }
1da177e4
LT
3481 if (PageUptodate(page))
3482 goto out;
3483
ebded027 3484 /*
0e9aa675 3485 * Page is not up to date and may be locked due to one of the following
ebded027
MG
3486 * case a: Page is being filled and the page lock is held
3487 * case b: Read/write error clearing the page uptodate status
3488 * case c: Truncation in progress (page locked)
3489 * case d: Reclaim in progress
3490 *
3491 * Case a, the page will be up to date when the page is unlocked.
3492 * There is no need to serialise on the page lock here as the page
3493 * is pinned so the lock gives no additional protection. Even if the
ce89fddf 3494 * page is truncated, the data is still valid if PageUptodate as
ebded027
MG
3495 * it's a race vs truncate race.
3496 * Case b, the page will not be up to date
3497 * Case c, the page may be truncated but in itself, the data may still
3498 * be valid after IO completes as it's a read vs truncate race. The
3499 * operation must restart if the page is not uptodate on unlock but
3500 * otherwise serialising on page lock to stabilise the mapping gives
3501 * no additional guarantees to the caller as the page lock is
3502 * released before return.
3503 * Case d, similar to truncation. If reclaim holds the page lock, it
3504 * will be a race with remove_mapping that determines if the mapping
3505 * is valid on unlock but otherwise the data is valid and there is
3506 * no need to serialise with page lock.
3507 *
3508 * As the page lock gives no additional guarantee, we optimistically
3509 * wait on the page to be unlocked and check if it's up to date and
3510 * use the page if it is. Otherwise, the page lock is required to
3511 * distinguish between the different cases. The motivation is that we
3512 * avoid spurious serialisations and wakeups when multiple processes
3513 * wait on the same page for IO to complete.
3514 */
3515 wait_on_page_locked(page);
3516 if (PageUptodate(page))
3517 goto out;
3518
3519 /* Distinguish between all the cases under the safety of the lock */
1da177e4 3520 lock_page(page);
ebded027
MG
3521
3522 /* Case c or d, restart the operation */
1da177e4
LT
3523 if (!page->mapping) {
3524 unlock_page(page);
09cbfeaf 3525 put_page(page);
32b63529 3526 goto repeat;
1da177e4 3527 }
ebded027
MG
3528
3529 /* Someone else locked and filled the page in a very small window */
1da177e4
LT
3530 if (PageUptodate(page)) {
3531 unlock_page(page);
3532 goto out;
3533 }
faffdfa0
XT
3534
3535 /*
3536 * A previous I/O error may have been due to temporary
3537 * failures.
3538 * Clear page error before actual read, PG_error will be
3539 * set again if read page fails.
3540 */
3541 ClearPageError(page);
32b63529
MG
3542 goto filler;
3543
c855ff37 3544out:
6fe6900e
NP
3545 mark_page_accessed(page);
3546 return page;
3547}
0531b2aa
LT
3548
3549/**
67f9fd91 3550 * read_cache_page - read into page cache, fill it if needed
0531b2aa
LT
3551 * @mapping: the page's address_space
3552 * @index: the page index
3553 * @filler: function to perform the read
5e5358e7 3554 * @data: first arg to filler(data, page) function, often left as NULL
0531b2aa 3555 *
0531b2aa 3556 * Read into the page cache. If a page already exists, and PageUptodate() is
67f9fd91 3557 * not set, try to fill the page and wait for it to become unlocked.
0531b2aa
LT
3558 *
3559 * If the page does not get brought uptodate, return -EIO.
a862f68a 3560 *
730633f0
JK
3561 * The function expects mapping->invalidate_lock to be already held.
3562 *
a862f68a 3563 * Return: up to date page on success, ERR_PTR() on failure.
0531b2aa 3564 */
67f9fd91 3565struct page *read_cache_page(struct address_space *mapping,
0531b2aa 3566 pgoff_t index,
5e5358e7 3567 int (*filler)(void *, struct page *),
0531b2aa
LT
3568 void *data)
3569{
d322a8e5
CH
3570 return do_read_cache_page(mapping, index, filler, data,
3571 mapping_gfp_mask(mapping));
0531b2aa 3572}
67f9fd91 3573EXPORT_SYMBOL(read_cache_page);
0531b2aa
LT
3574
3575/**
3576 * read_cache_page_gfp - read into page cache, using specified page allocation flags.
3577 * @mapping: the page's address_space
3578 * @index: the page index
3579 * @gfp: the page allocator flags to use if allocating
3580 *
3581 * This is the same as "read_mapping_page(mapping, index, NULL)", but with
e6f67b8c 3582 * any new page allocations done using the specified allocation flags.
0531b2aa
LT
3583 *
3584 * If the page does not get brought uptodate, return -EIO.
a862f68a 3585 *
730633f0
JK
3586 * The function expects mapping->invalidate_lock to be already held.
3587 *
a862f68a 3588 * Return: up to date page on success, ERR_PTR() on failure.
0531b2aa
LT
3589 */
3590struct page *read_cache_page_gfp(struct address_space *mapping,
3591 pgoff_t index,
3592 gfp_t gfp)
3593{
6c45b454 3594 return do_read_cache_page(mapping, index, NULL, NULL, gfp);
0531b2aa
LT
3595}
3596EXPORT_SYMBOL(read_cache_page_gfp);
3597
afddba49
NP
3598int pagecache_write_begin(struct file *file, struct address_space *mapping,
3599 loff_t pos, unsigned len, unsigned flags,
3600 struct page **pagep, void **fsdata)
3601{
3602 const struct address_space_operations *aops = mapping->a_ops;
3603
4e02ed4b 3604 return aops->write_begin(file, mapping, pos, len, flags,
afddba49 3605 pagep, fsdata);
afddba49
NP
3606}
3607EXPORT_SYMBOL(pagecache_write_begin);
3608
3609int pagecache_write_end(struct file *file, struct address_space *mapping,
3610 loff_t pos, unsigned len, unsigned copied,
3611 struct page *page, void *fsdata)
3612{
3613 const struct address_space_operations *aops = mapping->a_ops;
afddba49 3614
4e02ed4b 3615 return aops->write_end(file, mapping, pos, len, copied, page, fsdata);
afddba49
NP
3616}
3617EXPORT_SYMBOL(pagecache_write_end);
3618
a92853b6
KK
3619/*
3620 * Warn about a page cache invalidation failure during a direct I/O write.
3621 */
3622void dio_warn_stale_pagecache(struct file *filp)
3623{
3624 static DEFINE_RATELIMIT_STATE(_rs, 86400 * HZ, DEFAULT_RATELIMIT_BURST);
3625 char pathname[128];
a92853b6
KK
3626 char *path;
3627
5df1a672 3628 errseq_set(&filp->f_mapping->wb_err, -EIO);
a92853b6
KK
3629 if (__ratelimit(&_rs)) {
3630 path = file_path(filp, pathname, sizeof(pathname));
3631 if (IS_ERR(path))
3632 path = "(unknown)";
3633 pr_crit("Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O!\n");
3634 pr_crit("File: %s PID: %d Comm: %.20s\n", path, current->pid,
3635 current->comm);
3636 }
3637}
3638
1da177e4 3639ssize_t
1af5bb49 3640generic_file_direct_write(struct kiocb *iocb, struct iov_iter *from)
1da177e4
LT
3641{
3642 struct file *file = iocb->ki_filp;
3643 struct address_space *mapping = file->f_mapping;
3644 struct inode *inode = mapping->host;
1af5bb49 3645 loff_t pos = iocb->ki_pos;
1da177e4 3646 ssize_t written;
a969e903
CH
3647 size_t write_len;
3648 pgoff_t end;
1da177e4 3649
0c949334 3650 write_len = iov_iter_count(from);
09cbfeaf 3651 end = (pos + write_len - 1) >> PAGE_SHIFT;
a969e903 3652
6be96d3a
GR
3653 if (iocb->ki_flags & IOCB_NOWAIT) {
3654 /* If there are pages to writeback, return */
5df1a672 3655 if (filemap_range_has_page(file->f_mapping, pos,
35f12f0f 3656 pos + write_len - 1))
6be96d3a
GR
3657 return -EAGAIN;
3658 } else {
3659 written = filemap_write_and_wait_range(mapping, pos,
3660 pos + write_len - 1);
3661 if (written)
3662 goto out;
3663 }
a969e903
CH
3664
3665 /*
3666 * After a write we want buffered reads to be sure to go to disk to get
3667 * the new data. We invalidate clean cached page from the region we're
3668 * about to write. We do this *before* the write so that we can return
6ccfa806 3669 * without clobbering -EIOCBQUEUED from ->direct_IO().
a969e903 3670 */
55635ba7 3671 written = invalidate_inode_pages2_range(mapping,
09cbfeaf 3672 pos >> PAGE_SHIFT, end);
55635ba7
AR
3673 /*
3674 * If a page can not be invalidated, return 0 to fall back
3675 * to buffered write.
3676 */
3677 if (written) {
3678 if (written == -EBUSY)
3679 return 0;
3680 goto out;
a969e903
CH
3681 }
3682
639a93a5 3683 written = mapping->a_ops->direct_IO(iocb, from);
a969e903
CH
3684
3685 /*
3686 * Finally, try again to invalidate clean pages which might have been
3687 * cached by non-direct readahead, or faulted in by get_user_pages()
3688 * if the source of the write was an mmap'ed region of the file
3689 * we're writing. Either one is a pretty crazy thing to do,
3690 * so we don't support it 100%. If this invalidation
3691 * fails, tough, the write still worked...
332391a9
LC
3692 *
3693 * Most of the time we do not need this since dio_complete() will do
3694 * the invalidation for us. However there are some file systems that
3695 * do not end up with dio_complete() being called, so let's not break
80c1fe90
KK
3696 * them by removing it completely.
3697 *
9266a140
KK
3698 * Noticeable example is a blkdev_direct_IO().
3699 *
80c1fe90 3700 * Skip invalidation for async writes or if mapping has no pages.
a969e903 3701 */
9266a140
KK
3702 if (written > 0 && mapping->nrpages &&
3703 invalidate_inode_pages2_range(mapping, pos >> PAGE_SHIFT, end))
3704 dio_warn_stale_pagecache(file);
a969e903 3705
1da177e4 3706 if (written > 0) {
0116651c 3707 pos += written;
639a93a5 3708 write_len -= written;
0116651c
NK
3709 if (pos > i_size_read(inode) && !S_ISBLK(inode->i_mode)) {
3710 i_size_write(inode, pos);
1da177e4
LT
3711 mark_inode_dirty(inode);
3712 }
5cb6c6c7 3713 iocb->ki_pos = pos;
1da177e4 3714 }
ab2125df
PB
3715 if (written != -EIOCBQUEUED)
3716 iov_iter_revert(from, write_len - iov_iter_count(from));
a969e903 3717out:
1da177e4
LT
3718 return written;
3719}
3720EXPORT_SYMBOL(generic_file_direct_write);
3721
eb2be189
NP
3722/*
3723 * Find or create a page at the given pagecache position. Return the locked
3724 * page. This function is specifically for buffered writes.
3725 */
54566b2c
NP
3726struct page *grab_cache_page_write_begin(struct address_space *mapping,
3727 pgoff_t index, unsigned flags)
eb2be189 3728{
eb2be189 3729 struct page *page;
bbddabe2 3730 int fgp_flags = FGP_LOCK|FGP_WRITE|FGP_CREAT;
0faa70cb 3731
54566b2c 3732 if (flags & AOP_FLAG_NOFS)
2457aec6
MG
3733 fgp_flags |= FGP_NOFS;
3734
3735 page = pagecache_get_page(mapping, index, fgp_flags,
45f87de5 3736 mapping_gfp_mask(mapping));
c585a267 3737 if (page)
2457aec6 3738 wait_for_stable_page(page);
eb2be189 3739
eb2be189
NP
3740 return page;
3741}
54566b2c 3742EXPORT_SYMBOL(grab_cache_page_write_begin);
eb2be189 3743
3b93f911 3744ssize_t generic_perform_write(struct file *file,
afddba49
NP
3745 struct iov_iter *i, loff_t pos)
3746{
3747 struct address_space *mapping = file->f_mapping;
3748 const struct address_space_operations *a_ops = mapping->a_ops;
3749 long status = 0;
3750 ssize_t written = 0;
674b892e
NP
3751 unsigned int flags = 0;
3752
afddba49
NP
3753 do {
3754 struct page *page;
afddba49
NP
3755 unsigned long offset; /* Offset into pagecache page */
3756 unsigned long bytes; /* Bytes to write to page */
3757 size_t copied; /* Bytes copied from user */
3758 void *fsdata;
3759
09cbfeaf
KS
3760 offset = (pos & (PAGE_SIZE - 1));
3761 bytes = min_t(unsigned long, PAGE_SIZE - offset,
afddba49
NP
3762 iov_iter_count(i));
3763
3764again:
00a3d660
LT
3765 /*
3766 * Bring in the user page that we will copy from _first_.
3767 * Otherwise there's a nasty deadlock on copying from the
3768 * same page as we're writing to, without it being marked
3769 * up-to-date.
00a3d660
LT
3770 */
3771 if (unlikely(iov_iter_fault_in_readable(i, bytes))) {
3772 status = -EFAULT;
3773 break;
3774 }
3775
296291cd
JK
3776 if (fatal_signal_pending(current)) {
3777 status = -EINTR;
3778 break;
3779 }
3780
674b892e 3781 status = a_ops->write_begin(file, mapping, pos, bytes, flags,
afddba49 3782 &page, &fsdata);
2457aec6 3783 if (unlikely(status < 0))
afddba49
NP
3784 break;
3785
931e80e4 3786 if (mapping_writably_mapped(mapping))
3787 flush_dcache_page(page);
00a3d660 3788
f0b65f39 3789 copied = copy_page_from_iter_atomic(page, offset, bytes, i);
afddba49
NP
3790 flush_dcache_page(page);
3791
3792 status = a_ops->write_end(file, mapping, pos, bytes, copied,
3793 page, fsdata);
f0b65f39
AV
3794 if (unlikely(status != copied)) {
3795 iov_iter_revert(i, copied - max(status, 0L));
3796 if (unlikely(status < 0))
3797 break;
3798 }
afddba49
NP
3799 cond_resched();
3800
bc1bb416 3801 if (unlikely(status == 0)) {
afddba49 3802 /*
bc1bb416
AV
3803 * A short copy made ->write_end() reject the
3804 * thing entirely. Might be memory poisoning
3805 * halfway through, might be a race with munmap,
3806 * might be severe memory pressure.
afddba49 3807 */
bc1bb416
AV
3808 if (copied)
3809 bytes = copied;
afddba49
NP
3810 goto again;
3811 }
f0b65f39
AV
3812 pos += status;
3813 written += status;
afddba49
NP
3814
3815 balance_dirty_pages_ratelimited(mapping);
afddba49
NP
3816 } while (iov_iter_count(i));
3817
3818 return written ? written : status;
3819}
3b93f911 3820EXPORT_SYMBOL(generic_perform_write);
1da177e4 3821
e4dd9de3 3822/**
8174202b 3823 * __generic_file_write_iter - write data to a file
e4dd9de3 3824 * @iocb: IO state structure (file, offset, etc.)
8174202b 3825 * @from: iov_iter with data to write
e4dd9de3
JK
3826 *
3827 * This function does all the work needed for actually writing data to a
3828 * file. It does all basic checks, removes SUID from the file, updates
3829 * modification times and calls proper subroutines depending on whether we
3830 * do direct IO or a standard buffered write.
3831 *
9608703e 3832 * It expects i_rwsem to be grabbed unless we work on a block device or similar
e4dd9de3
JK
3833 * object which does not need locking at all.
3834 *
3835 * This function does *not* take care of syncing data in case of O_SYNC write.
3836 * A caller has to handle it. This is mainly due to the fact that we want to
9608703e 3837 * avoid syncing under i_rwsem.
a862f68a
MR
3838 *
3839 * Return:
3840 * * number of bytes written, even for truncated writes
3841 * * negative error code if no data has been written at all
e4dd9de3 3842 */
8174202b 3843ssize_t __generic_file_write_iter(struct kiocb *iocb, struct iov_iter *from)
1da177e4
LT
3844{
3845 struct file *file = iocb->ki_filp;
68d68ff6 3846 struct address_space *mapping = file->f_mapping;
1da177e4 3847 struct inode *inode = mapping->host;
3b93f911 3848 ssize_t written = 0;
1da177e4 3849 ssize_t err;
3b93f911 3850 ssize_t status;
1da177e4 3851
1da177e4 3852 /* We can write back this queue in page reclaim */
de1414a6 3853 current->backing_dev_info = inode_to_bdi(inode);
5fa8e0a1 3854 err = file_remove_privs(file);
1da177e4
LT
3855 if (err)
3856 goto out;
3857
c3b2da31
JB
3858 err = file_update_time(file);
3859 if (err)
3860 goto out;
1da177e4 3861
2ba48ce5 3862 if (iocb->ki_flags & IOCB_DIRECT) {
0b8def9d 3863 loff_t pos, endbyte;
fb5527e6 3864
1af5bb49 3865 written = generic_file_direct_write(iocb, from);
1da177e4 3866 /*
fbbbad4b
MW
3867 * If the write stopped short of completing, fall back to
3868 * buffered writes. Some filesystems do this for writes to
3869 * holes, for example. For DAX files, a buffered write will
3870 * not succeed (even if it did, DAX does not handle dirty
3871 * page-cache pages correctly).
1da177e4 3872 */
0b8def9d 3873 if (written < 0 || !iov_iter_count(from) || IS_DAX(inode))
fbbbad4b
MW
3874 goto out;
3875
0b8def9d 3876 status = generic_perform_write(file, from, pos = iocb->ki_pos);
fb5527e6 3877 /*
3b93f911 3878 * If generic_perform_write() returned a synchronous error
fb5527e6
JM
3879 * then we want to return the number of bytes which were
3880 * direct-written, or the error code if that was zero. Note
3881 * that this differs from normal direct-io semantics, which
3882 * will return -EFOO even if some bytes were written.
3883 */
60bb4529 3884 if (unlikely(status < 0)) {
3b93f911 3885 err = status;
fb5527e6
JM
3886 goto out;
3887 }
fb5527e6
JM
3888 /*
3889 * We need to ensure that the page cache pages are written to
3890 * disk and invalidated to preserve the expected O_DIRECT
3891 * semantics.
3892 */
3b93f911 3893 endbyte = pos + status - 1;
0b8def9d 3894 err = filemap_write_and_wait_range(mapping, pos, endbyte);
fb5527e6 3895 if (err == 0) {
0b8def9d 3896 iocb->ki_pos = endbyte + 1;
3b93f911 3897 written += status;
fb5527e6 3898 invalidate_mapping_pages(mapping,
09cbfeaf
KS
3899 pos >> PAGE_SHIFT,
3900 endbyte >> PAGE_SHIFT);
fb5527e6
JM
3901 } else {
3902 /*
3903 * We don't know how much we wrote, so just return
3904 * the number of bytes which were direct-written
3905 */
3906 }
3907 } else {
0b8def9d
AV
3908 written = generic_perform_write(file, from, iocb->ki_pos);
3909 if (likely(written > 0))
3910 iocb->ki_pos += written;
fb5527e6 3911 }
1da177e4
LT
3912out:
3913 current->backing_dev_info = NULL;
3914 return written ? written : err;
3915}
8174202b 3916EXPORT_SYMBOL(__generic_file_write_iter);
e4dd9de3 3917
e4dd9de3 3918/**
8174202b 3919 * generic_file_write_iter - write data to a file
e4dd9de3 3920 * @iocb: IO state structure
8174202b 3921 * @from: iov_iter with data to write
e4dd9de3 3922 *
8174202b 3923 * This is a wrapper around __generic_file_write_iter() to be used by most
e4dd9de3 3924 * filesystems. It takes care of syncing the file in case of O_SYNC file
9608703e 3925 * and acquires i_rwsem as needed.
a862f68a
MR
3926 * Return:
3927 * * negative error code if no data has been written at all of
3928 * vfs_fsync_range() failed for a synchronous write
3929 * * number of bytes written, even for truncated writes
e4dd9de3 3930 */
8174202b 3931ssize_t generic_file_write_iter(struct kiocb *iocb, struct iov_iter *from)
1da177e4
LT
3932{
3933 struct file *file = iocb->ki_filp;
148f948b 3934 struct inode *inode = file->f_mapping->host;
1da177e4 3935 ssize_t ret;
1da177e4 3936
5955102c 3937 inode_lock(inode);
3309dd04
AV
3938 ret = generic_write_checks(iocb, from);
3939 if (ret > 0)
5f380c7f 3940 ret = __generic_file_write_iter(iocb, from);
5955102c 3941 inode_unlock(inode);
1da177e4 3942
e2592217
CH
3943 if (ret > 0)
3944 ret = generic_write_sync(iocb, ret);
1da177e4
LT
3945 return ret;
3946}
8174202b 3947EXPORT_SYMBOL(generic_file_write_iter);
1da177e4 3948
cf9a2ae8
DH
3949/**
3950 * try_to_release_page() - release old fs-specific metadata on a page
3951 *
3952 * @page: the page which the kernel is trying to free
3953 * @gfp_mask: memory allocation flags (and I/O mode)
3954 *
3955 * The address_space is to try to release any data against the page
a862f68a 3956 * (presumably at page->private).
cf9a2ae8 3957 *
266cf658
DH
3958 * This may also be called if PG_fscache is set on a page, indicating that the
3959 * page is known to the local caching routines.
3960 *
cf9a2ae8 3961 * The @gfp_mask argument specifies whether I/O may be performed to release
71baba4b 3962 * this page (__GFP_IO), and whether the call may block (__GFP_RECLAIM & __GFP_FS).
cf9a2ae8 3963 *
a862f68a 3964 * Return: %1 if the release was successful, otherwise return zero.
cf9a2ae8
DH
3965 */
3966int try_to_release_page(struct page *page, gfp_t gfp_mask)
3967{
3968 struct address_space * const mapping = page->mapping;
3969
3970 BUG_ON(!PageLocked(page));
3971 if (PageWriteback(page))
3972 return 0;
3973
3974 if (mapping && mapping->a_ops->releasepage)
3975 return mapping->a_ops->releasepage(page, gfp_mask);
3976 return try_to_free_buffers(page);
3977}
3978
3979EXPORT_SYMBOL(try_to_release_page);