From: David Howells <dhowells@redhat.com>
To: Trond.Myklebust@netapp.com
Cc: nfsv4@linux-nfs.org, linux-kernel@vger.kernel.org,
linux-fsdevel@vger.kernel.org, selinux@tycho.nsa.gov,
linux-security-module@vger.kernel.org, dhowells@redhat.com
Subject: [PATCH 13/27] FS-Cache: Release page->private after failed readahead
Date: Wed, 23 Jan 2008 00:44:54 +0000 [thread overview]
Message-ID: <20080123004454.15602.47814.stgit@warthog.procyon.org.uk> (raw)
In-Reply-To: <20080123004344.15602.35710.stgit@warthog.procyon.org.uk>
The attached patch causes read_cache_pages() to release page-private data on a
page for which add_to_page_cache() fails or the filler function fails. This
permits pages with caching references associated with them to be cleaned up.
The invalidatepage() address space op is called (indirectly) to do the honours.
Signed-off-by: David Howells <dhowells@redhat.com>
---
mm/readahead.c | 39 +++++++++++++++++++++++++++++++++++++--
1 files changed, 37 insertions(+), 2 deletions(-)
diff --git a/mm/readahead.c b/mm/readahead.c
index c9c50ca..75aa6b6 100644
--- a/mm/readahead.c
+++ b/mm/readahead.c
@@ -44,6 +44,41 @@ EXPORT_SYMBOL_GPL(file_ra_state_init);
#define list_to_page(head) (list_entry((head)->prev, struct page, lru))
+/*
+ * see if a page needs releasing upon read_cache_pages() failure
+ * - the caller of read_cache_pages() may have set PG_private before calling,
+ * such as the NFS fs marking pages that are cached locally on disk, thus we
+ * need to give the fs a chance to clean up in the event of an error
+ */
+static void read_cache_pages_invalidate_page(struct address_space *mapping,
+ struct page *page)
+{
+ if (PagePrivate(page)) {
+ if (TestSetPageLocked(page))
+ BUG();
+ page->mapping = mapping;
+ do_invalidatepage(page, 0);
+ page->mapping = NULL;
+ unlock_page(page);
+ }
+ page_cache_release(page);
+}
+
+/*
+ * release a list of pages, invalidating them first if need be
+ */
+static void read_cache_pages_invalidate_pages(struct address_space *mapping,
+ struct list_head *pages)
+{
+ struct page *victim;
+
+ while (!list_empty(pages)) {
+ victim = list_to_page(pages);
+ list_del(&victim->lru);
+ read_cache_pages_invalidate_page(mapping, victim);
+ }
+}
+
/**
* read_cache_pages - populate an address space with some pages & start reads against them
* @mapping: the address_space
@@ -65,14 +100,14 @@ int read_cache_pages(struct address_space *mapping, struct list_head *pages,
list_del(&page->lru);
if (add_to_page_cache_lru(page, mapping,
page->index, GFP_KERNEL)) {
- page_cache_release(page);
+ read_cache_pages_invalidate_page(mapping, page);
continue;
}
page_cache_release(page);
ret = filler(data, page);
if (unlikely(ret)) {
- put_pages_list(pages);
+ read_cache_pages_invalidate_pages(mapping, pages);
break;
}
task_io_account_read(PAGE_CACHE_SIZE);
next prev parent reply other threads:[~2008-01-23 0:44 UTC|newest]
Thread overview: 29+ messages / expand[flat|nested] mbox.gz Atom feed top
2008-01-23 0:43 [PATCH 00/27] Permit filesystem local caching David Howells
2008-01-23 0:43 ` [PATCH 01/27] KEYS: Increase the payload size when instantiating a key David Howells
2008-01-23 0:43 ` [PATCH 02/27] KEYS: Check starting keyring as part of search David Howells
2008-01-23 0:44 ` [PATCH 03/27] KEYS: Allow the callout data to be passed as a blob rather than a string David Howells
2008-01-23 0:44 ` [PATCH 04/27] KEYS: Add keyctl function to get a security label David Howells
2008-01-23 0:44 ` [PATCH 05/27] Security: Change current->fs[ug]id to current_fs[ug]id() David Howells
2008-01-23 0:44 ` [PATCH 06/27] Security: Separate task security context from task_struct David Howells
2008-01-23 0:44 ` [PATCH 07/27] Security: De-embed task security record from task and use refcounting David Howells
2008-01-23 0:44 ` [PATCH 08/27] Add a secctx_to_secid() LSM hook to go along with the existing David Howells
2008-01-23 0:44 ` [PATCH 09/27] Security: Pre-add additional non-caching classes David Howells
2008-01-23 0:44 ` [PATCH 10/27] Security: Add a kernel_service object class to SELinux David Howells
2008-01-23 0:44 ` [PATCH 11/27] Security: Allow kernel services to override LSM settings for task actions David Howells
2008-01-23 0:44 ` [PATCH 12/27] Security: Make NFSD work with detached security David Howells
2008-01-23 0:44 ` David Howells [this message]
2008-01-23 0:45 ` [PATCH 14/27] FS-Cache: Recruit a couple of page flags for cache management David Howells
2008-01-23 0:45 ` [PATCH 15/27] FS-Cache: Provide an add_wait_queue_tail() function David Howells
2008-01-23 0:45 ` [PATCH 16/27] FS-Cache: Generic filesystem caching facility David Howells
2008-01-23 0:45 ` [PATCH 17/27] CacheFiles: Add missing copy_page export for ia64 David Howells
2008-01-23 0:45 ` [PATCH 18/27] CacheFiles: Be consistent about the use of mapping vs file->f_mapping in Ext3 David Howells
2008-01-23 0:45 ` [PATCH 19/27] CacheFiles: Add a hook to write a single page of data to an inode David Howells
2008-01-23 0:45 ` [PATCH 20/27] CacheFiles: Permit the page lock state to be monitored David Howells
2008-01-23 0:45 ` [PATCH 21/27] CacheFiles: Export things for CacheFiles David Howells
2008-01-23 0:45 ` [PATCH 22/27] CacheFiles: A cache that backs onto a mounted filesystem David Howells
2008-01-23 0:45 ` [PATCH 23/27] NFS: Fix memory leak David Howells
2008-01-23 0:45 ` [PATCH 24/27] NFS: Use local caching David Howells
2008-01-23 0:45 ` [PATCH 25/27] NFS: Configuration and mount option changes to enable local caching on NFS David Howells
2008-01-23 0:46 ` [PATCH 26/27] NFS: Display local caching state David Howells
2008-01-23 0:46 ` [PATCH 27/27] NFS: Separate caching by superblock, explicitly if necessary David Howells
2008-01-23 17:20 ` [PATCH 14/27] FS-Cache: Recruit a couple of page flags for cache management David Howells
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20080123004454.15602.47814.stgit@warthog.procyon.org.uk \
--to=dhowells@redhat.com \
--cc=Trond.Myklebust@netapp.com \
--cc=linux-fsdevel@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-security-module@vger.kernel.org \
--cc=nfsv4@linux-nfs.org \
--cc=selinux@tycho.nsa.gov \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).