Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2397024imu; Thu, 24 Jan 2019 12:04:00 -0800 (PST) X-Google-Smtp-Source: ALg8bN6zlPZsemLBaf+FR8C9q74oQtXuimZFKN4/d7BOMMOllhSaZfBaOImqR2qg8FQcv+vaK+Oo X-Received: by 2002:a62:7086:: with SMTP id l128mr7842909pfc.68.1548360239953; Thu, 24 Jan 2019 12:03:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548360239; cv=none; d=google.com; s=arc-20160816; b=Z/CTCIPhpJnAqNwTFUd+ZLwaYwLBxaNRXO5i2SgT8+krh5Qxig6ZIXVzuo7HpPjJkm gioaxfB6sg6rUPx5v6i0j3tUzOmdFvTN4paOdXlYZ8tDwUm6xEzBiilUA12MKQNi7cCv Lfs2VYByHkKFVyWS7XXyZ6e6ACWuvBfx3gn8Geyzkzee3Pb1zkQT5RDCXlOE4UfeONFa jb16xt7FegWXnBj0nxIHGfBNdocAP83zqIGznD7kmySX5CI7LAAwfZegkXYc9UTm24yN XU0V110fYum+ccKrKob7Char7+8ONeVAg6IXmpV+qIOD+NPy3BD9FIOmcndiBgDKqDlR gN7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=TMpXjtAgS/QYz7cIo/QF5RVec678F+d1wd35U7YwXxk=; b=sjztHreT/Bo9ccGWDVtiMPDdDPqCgiXKy4lRhPtkU9DmIanQiAMcV/XpckY0jWoOZC Qx4AaRICL1PFR1VR5guhrcsgrOmqIWhH+rzBBqjsgF4pfY1e9QcN+1fzWMr2Vy1O5LCw jJhyRTMbYEmtHSBHzbOOpbcwl4JRou9IQaCi/NbsWA/WRva3ExtyiVj0Vptq0vsFLZ2c FDksKNnTbSfg2ZUUkTU+9AUJNvi+6DUS16lj1N6RQZH6laehPgaZ6nD7aEZQfM1OyYu1 n1G/PMGtmWObhh417B+M0hAqzFvZ7zRFn48xFI8OSuFm+G48tvqG2CGx01u05wsqJ+yJ uzUQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="PuQjUU/+"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f16si18197997pgb.140.2019.01.24.12.03.44; Thu, 24 Jan 2019 12:03:59 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="PuQjUU/+"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729165AbfAXUC1 (ORCPT + 99 others); Thu, 24 Jan 2019 15:02:27 -0500 Received: from mail.kernel.org ([198.145.29.99]:32886 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731504AbfAXTdH (ORCPT ); Thu, 24 Jan 2019 14:33:07 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 973AD218FC; Thu, 24 Jan 2019 19:33:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548358386; bh=RWZ0sZv5yccdk0dbzzxcdZgP+1msRZTx8UEF0X9r+NQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=PuQjUU/+1pGIjSd0z5eRE0uCenfy1Do0l81ZAQztdAX89XC9E6taA3bJVwl/tx/4Q kO409WQgrMnQjF0/jZ9iqyi7KePNmUhrbHwmFv6UtjtvbQ1MrXleunKPQmhwUkDbqj MsSrn1EHJC3/+7q1fAXvabtZOlVlC07ATnQeLTZw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Brian Foster , Jan Kara , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 4.14 55/63] mm/page-writeback.c: dont break integrity writeback on ->writepage() error Date: Thu, 24 Jan 2019 20:20:44 +0100 Message-Id: <20190124190201.816132683@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190124190155.176570028@linuxfoundation.org> References: <20190124190155.176570028@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 3fa750dcf29e8606e3969d13d8e188cc1c0f511d ] write_cache_pages() is used in both background and integrity writeback scenarios by various filesystems. Background writeback is mostly concerned with cleaning a certain number of dirty pages based on various mm heuristics. It may not write the full set of dirty pages or wait for I/O to complete. Integrity writeback is responsible for persisting a set of dirty pages before the writeback job completes. For example, an fsync() call must perform integrity writeback to ensure data is on disk before the call returns. write_cache_pages() unconditionally breaks out of its processing loop in the event of a ->writepage() error. This is fine for background writeback, which had no strict requirements and will eventually come around again. This can cause problems for integrity writeback on filesystems that might need to clean up state associated with failed page writeouts. For example, XFS performs internal delayed allocation accounting before returning a ->writepage() error, where applicable. If the current writeback happens to be associated with an unmount and write_cache_pages() completes the writeback prematurely due to error, the filesystem is unmounted in an inconsistent state if dirty+delalloc pages still exist. To handle this problem, update write_cache_pages() to always process the full set of pages for integrity writeback regardless of ->writepage() errors. Save the first encountered error and return it to the caller once complete. This facilitates XFS (or any other fs that expects integrity writeback to process the entire set of dirty pages) to clean up its internal state completely in the event of persistent mapping errors. Background writeback continues to exit on the first error encountered. [akpm@linux-foundation.org: fix typo in comment] Link: http://lkml.kernel.org/r/20181116134304.32440-1-bfoster@redhat.com Signed-off-by: Brian Foster Reviewed-by: Jan Kara Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- mm/page-writeback.c | 35 +++++++++++++++++++++-------------- 1 file changed, 21 insertions(+), 14 deletions(-) diff --git a/mm/page-writeback.c b/mm/page-writeback.c index 3175ac850a53..e001de5ac50c 100644 --- a/mm/page-writeback.c +++ b/mm/page-writeback.c @@ -2157,6 +2157,7 @@ int write_cache_pages(struct address_space *mapping, { int ret = 0; int done = 0; + int error; struct pagevec pvec; int nr_pages; pgoff_t uninitialized_var(writeback_index); @@ -2253,25 +2254,31 @@ continue_unlock: goto continue_unlock; trace_wbc_writepage(wbc, inode_to_bdi(mapping->host)); - ret = (*writepage)(page, wbc, data); - if (unlikely(ret)) { - if (ret == AOP_WRITEPAGE_ACTIVATE) { + error = (*writepage)(page, wbc, data); + if (unlikely(error)) { + /* + * Handle errors according to the type of + * writeback. There's no need to continue for + * background writeback. Just push done_index + * past this page so media errors won't choke + * writeout for the entire file. For integrity + * writeback, we must process the entire dirty + * set regardless of errors because the fs may + * still have state to clear for each page. In + * that case we continue processing and return + * the first error. + */ + if (error == AOP_WRITEPAGE_ACTIVATE) { unlock_page(page); - ret = 0; - } else { - /* - * done_index is set past this page, - * so media errors will not choke - * background writeout for the entire - * file. This has consequences for - * range_cyclic semantics (ie. it may - * not be suitable for data integrity - * writeout). - */ + error = 0; + } else if (wbc->sync_mode != WB_SYNC_ALL) { + ret = error; done_index = page->index + 1; done = 1; break; } + if (!ret) + ret = error; } /* -- 2.19.1