xref: /linux/fs/bcachefs/reflink.c (revision bf0e5ed0082ef0dbaa43c0296b045d6d9832082e)
1 // SPDX-License-Identifier: GPL-2.0
2 #include "bcachefs.h"
3 #include "bkey_buf.h"
4 #include "btree_update.h"
5 #include "buckets.h"
6 #include "error.h"
7 #include "extents.h"
8 #include "inode.h"
9 #include "io_misc.h"
10 #include "io_write.h"
11 #include "rebalance.h"
12 #include "reflink.h"
13 #include "subvolume.h"
14 #include "super-io.h"
15 
16 #include <linux/sched/signal.h>
17 
bkey_extent_is_reflink_data(const struct bkey * k)18 static inline bool bkey_extent_is_reflink_data(const struct bkey *k)
19 {
20 	switch (k->type) {
21 	case KEY_TYPE_reflink_v:
22 	case KEY_TYPE_indirect_inline_data:
23 		return true;
24 	default:
25 		return false;
26 	}
27 }
28 
bkey_type_to_indirect(const struct bkey * k)29 static inline unsigned bkey_type_to_indirect(const struct bkey *k)
30 {
31 	switch (k->type) {
32 	case KEY_TYPE_extent:
33 		return KEY_TYPE_reflink_v;
34 	case KEY_TYPE_inline_data:
35 		return KEY_TYPE_indirect_inline_data;
36 	default:
37 		return 0;
38 	}
39 }
40 
41 /* reflink pointers */
42 
bch2_reflink_p_validate(struct bch_fs * c,struct bkey_s_c k,struct bkey_validate_context from)43 int bch2_reflink_p_validate(struct bch_fs *c, struct bkey_s_c k,
44 			    struct bkey_validate_context from)
45 {
46 	struct bkey_s_c_reflink_p p = bkey_s_c_to_reflink_p(k);
47 	int ret = 0;
48 
49 	bkey_fsck_err_on(REFLINK_P_IDX(p.v) < le32_to_cpu(p.v->front_pad),
50 			 c, reflink_p_front_pad_bad,
51 			 "idx < front_pad (%llu < %u)",
52 			 REFLINK_P_IDX(p.v), le32_to_cpu(p.v->front_pad));
53 fsck_err:
54 	return ret;
55 }
56 
bch2_reflink_p_to_text(struct printbuf * out,struct bch_fs * c,struct bkey_s_c k)57 void bch2_reflink_p_to_text(struct printbuf *out, struct bch_fs *c,
58 			    struct bkey_s_c k)
59 {
60 	struct bkey_s_c_reflink_p p = bkey_s_c_to_reflink_p(k);
61 
62 	prt_printf(out, "idx %llu front_pad %u back_pad %u",
63 	       REFLINK_P_IDX(p.v),
64 	       le32_to_cpu(p.v->front_pad),
65 	       le32_to_cpu(p.v->back_pad));
66 }
67 
bch2_reflink_p_merge(struct bch_fs * c,struct bkey_s _l,struct bkey_s_c _r)68 bool bch2_reflink_p_merge(struct bch_fs *c, struct bkey_s _l, struct bkey_s_c _r)
69 {
70 	struct bkey_s_reflink_p l = bkey_s_to_reflink_p(_l);
71 	struct bkey_s_c_reflink_p r = bkey_s_c_to_reflink_p(_r);
72 
73 	/*
74 	 * Disabled for now, the triggers code needs to be reworked for merging
75 	 * of reflink pointers to work:
76 	 */
77 	return false;
78 
79 	if (REFLINK_P_IDX(l.v) + l.k->size != REFLINK_P_IDX(r.v))
80 		return false;
81 
82 	if (REFLINK_P_ERROR(l.v) != REFLINK_P_ERROR(r.v))
83 		return false;
84 
85 	bch2_key_resize(l.k, l.k->size + r.k->size);
86 	return true;
87 }
88 
89 /* indirect extents */
90 
bch2_reflink_v_validate(struct bch_fs * c,struct bkey_s_c k,struct bkey_validate_context from)91 int bch2_reflink_v_validate(struct bch_fs *c, struct bkey_s_c k,
92 			    struct bkey_validate_context from)
93 {
94 	int ret = 0;
95 
96 	bkey_fsck_err_on(bkey_gt(k.k->p, POS(0, REFLINK_P_IDX_MAX)),
97 			 c, reflink_v_pos_bad,
98 			 "indirect extent above maximum position 0:%llu",
99 			 REFLINK_P_IDX_MAX);
100 
101 	ret = bch2_bkey_ptrs_validate(c, k, from);
102 fsck_err:
103 	return ret;
104 }
105 
bch2_reflink_v_to_text(struct printbuf * out,struct bch_fs * c,struct bkey_s_c k)106 void bch2_reflink_v_to_text(struct printbuf *out, struct bch_fs *c,
107 			    struct bkey_s_c k)
108 {
109 	struct bkey_s_c_reflink_v r = bkey_s_c_to_reflink_v(k);
110 
111 	prt_printf(out, "refcount: %llu ", le64_to_cpu(r.v->refcount));
112 
113 	bch2_bkey_ptrs_to_text(out, c, k);
114 }
115 
116 #if 0
117 Currently disabled, needs to be debugged:
118 
119 bool bch2_reflink_v_merge(struct bch_fs *c, struct bkey_s _l, struct bkey_s_c _r)
120 {
121 	struct bkey_s_reflink_v   l = bkey_s_to_reflink_v(_l);
122 	struct bkey_s_c_reflink_v r = bkey_s_c_to_reflink_v(_r);
123 
124 	return l.v->refcount == r.v->refcount && bch2_extent_merge(c, _l, _r);
125 }
126 #endif
127 
128 /* indirect inline data */
129 
bch2_indirect_inline_data_validate(struct bch_fs * c,struct bkey_s_c k,struct bkey_validate_context from)130 int bch2_indirect_inline_data_validate(struct bch_fs *c, struct bkey_s_c k,
131 				       struct bkey_validate_context from)
132 {
133 	return 0;
134 }
135 
bch2_indirect_inline_data_to_text(struct printbuf * out,struct bch_fs * c,struct bkey_s_c k)136 void bch2_indirect_inline_data_to_text(struct printbuf *out,
137 				       struct bch_fs *c, struct bkey_s_c k)
138 {
139 	struct bkey_s_c_indirect_inline_data d = bkey_s_c_to_indirect_inline_data(k);
140 	unsigned datalen = bkey_inline_data_bytes(k.k);
141 
142 	prt_printf(out, "refcount %llu datalen %u: %*phN",
143 	       le64_to_cpu(d.v->refcount), datalen,
144 	       min(datalen, 32U), d.v->data);
145 }
146 
147 /* lookup */
148 
bch2_indirect_extent_not_missing(struct btree_trans * trans,struct bkey_s_c_reflink_p p,bool should_commit)149 static int bch2_indirect_extent_not_missing(struct btree_trans *trans, struct bkey_s_c_reflink_p p,
150 					    bool should_commit)
151 {
152 	struct bkey_i_reflink_p *new = bch2_bkey_make_mut_noupdate_typed(trans, p.s_c, reflink_p);
153 	int ret = PTR_ERR_OR_ZERO(new);
154 	if (ret)
155 		return ret;
156 
157 	SET_REFLINK_P_ERROR(&new->v, false);
158 	ret = bch2_btree_insert_trans(trans, BTREE_ID_extents, &new->k_i, BTREE_TRIGGER_norun);
159 	if (ret)
160 		return ret;
161 
162 	if (!should_commit)
163 		return 0;
164 
165 	return bch2_trans_commit(trans, NULL, NULL, BCH_TRANS_COMMIT_no_enospc) ?:
166 		-BCH_ERR_transaction_restart_nested;
167 }
168 
bch2_indirect_extent_missing_error(struct btree_trans * trans,struct bkey_s_c_reflink_p p,u64 missing_start,u64 missing_end,bool should_commit)169 static int bch2_indirect_extent_missing_error(struct btree_trans *trans,
170 					      struct bkey_s_c_reflink_p p,
171 					      u64 missing_start, u64 missing_end,
172 					      bool should_commit)
173 {
174 	if (REFLINK_P_ERROR(p.v))
175 		return 0;
176 
177 	struct bch_fs *c = trans->c;
178 	u64 live_start	= REFLINK_P_IDX(p.v);
179 	u64 live_end	= REFLINK_P_IDX(p.v) + p.k->size;
180 	u64 refd_start	= live_start	- le32_to_cpu(p.v->front_pad);
181 	u64 refd_end	= live_end	+ le32_to_cpu(p.v->back_pad);
182 	struct printbuf buf = PRINTBUF;
183 	int ret = 0;
184 
185 	BUG_ON(missing_start	< refd_start);
186 	BUG_ON(missing_end	> refd_end);
187 
188 	if (fsck_err(trans, reflink_p_to_missing_reflink_v,
189 		     "pointer to missing indirect extent\n"
190 		     "  %s\n"
191 		     "  missing range %llu-%llu",
192 		     (bch2_bkey_val_to_text(&buf, c, p.s_c), buf.buf),
193 		     missing_start, missing_end)) {
194 		struct bkey_i_reflink_p *new = bch2_bkey_make_mut_noupdate_typed(trans, p.s_c, reflink_p);
195 		ret = PTR_ERR_OR_ZERO(new);
196 		if (ret)
197 			goto err;
198 
199 		/*
200 		 * Is the missing range not actually needed?
201 		 *
202 		 * p.v->idx refers to the data that we actually want, but if the
203 		 * indirect extent we point to was bigger, front_pad and back_pad
204 		 * indicate the range we took a reference on.
205 		 */
206 
207 		if (missing_end <= live_start) {
208 			new->v.front_pad = cpu_to_le32(live_start - missing_end);
209 		} else if (missing_start >= live_end) {
210 			new->v.back_pad = cpu_to_le32(missing_start - live_end);
211 		} else {
212 			struct bpos new_start	= bkey_start_pos(&new->k);
213 			struct bpos new_end	= new->k.p;
214 
215 			if (missing_start > live_start)
216 				new_start.offset += missing_start - live_start;
217 			if (missing_end < live_end)
218 				new_end.offset -= live_end - missing_end;
219 
220 			bch2_cut_front(new_start, &new->k_i);
221 			bch2_cut_back(new_end, &new->k_i);
222 
223 			SET_REFLINK_P_ERROR(&new->v, true);
224 		}
225 
226 		ret = bch2_btree_insert_trans(trans, BTREE_ID_extents, &new->k_i, BTREE_TRIGGER_norun);
227 		if (ret)
228 			goto err;
229 
230 		if (should_commit)
231 			ret =   bch2_trans_commit(trans, NULL, NULL, BCH_TRANS_COMMIT_no_enospc) ?:
232 				-BCH_ERR_transaction_restart_nested;
233 	}
234 err:
235 fsck_err:
236 	printbuf_exit(&buf);
237 	return ret;
238 }
239 
240 /*
241  * This is used from the read path, which doesn't expect to have to do a
242  * transaction commit, and from triggers, which should not be doing a commit:
243  */
bch2_lookup_indirect_extent(struct btree_trans * trans,struct btree_iter * iter,s64 * offset_into_extent,struct bkey_s_c_reflink_p p,bool should_commit,unsigned iter_flags)244 struct bkey_s_c bch2_lookup_indirect_extent(struct btree_trans *trans,
245 					    struct btree_iter *iter,
246 					    s64 *offset_into_extent,
247 					    struct bkey_s_c_reflink_p p,
248 					    bool should_commit,
249 					    unsigned iter_flags)
250 {
251 	BUG_ON(*offset_into_extent < -((s64) le32_to_cpu(p.v->front_pad)));
252 	BUG_ON(*offset_into_extent >= p.k->size + le32_to_cpu(p.v->back_pad));
253 
254 	u64 reflink_offset = REFLINK_P_IDX(p.v) + *offset_into_extent;
255 
256 	struct bkey_s_c k = bch2_bkey_get_iter(trans, iter, BTREE_ID_reflink,
257 				       POS(0, reflink_offset), iter_flags);
258 	if (bkey_err(k))
259 		return k;
260 
261 	if (unlikely(!bkey_extent_is_reflink_data(k.k))) {
262 		unsigned size = min((u64) k.k->size,
263 				    REFLINK_P_IDX(p.v) + p.k->size + le32_to_cpu(p.v->back_pad) -
264 				    reflink_offset);
265 		bch2_key_resize(&iter->k, size);
266 
267 		int ret = bch2_indirect_extent_missing_error(trans, p, reflink_offset,
268 							     k.k->p.offset, should_commit);
269 		if (ret) {
270 			bch2_trans_iter_exit(trans, iter);
271 			return bkey_s_c_err(ret);
272 		}
273 	} else if (unlikely(REFLINK_P_ERROR(p.v))) {
274 		int ret = bch2_indirect_extent_not_missing(trans, p, should_commit);
275 		if (ret) {
276 			bch2_trans_iter_exit(trans, iter);
277 			return bkey_s_c_err(ret);
278 		}
279 	}
280 
281 	*offset_into_extent = reflink_offset - bkey_start_offset(k.k);
282 	return k;
283 }
284 
285 /* reflink pointer trigger */
286 
trans_trigger_reflink_p_segment(struct btree_trans * trans,struct bkey_s_c_reflink_p p,u64 * idx,enum btree_iter_update_trigger_flags flags)287 static int trans_trigger_reflink_p_segment(struct btree_trans *trans,
288 			struct bkey_s_c_reflink_p p, u64 *idx,
289 			enum btree_iter_update_trigger_flags flags)
290 {
291 	struct bch_fs *c = trans->c;
292 	struct printbuf buf = PRINTBUF;
293 
294 	s64 offset_into_extent = *idx - REFLINK_P_IDX(p.v);
295 	struct btree_iter iter;
296 	struct bkey_s_c k = bch2_lookup_indirect_extent(trans, &iter, &offset_into_extent, p, false,
297 							BTREE_ITER_intent|
298 							BTREE_ITER_with_updates);
299 	int ret = bkey_err(k);
300 	if (ret)
301 		return ret;
302 
303 	if (!bkey_refcount_c(k)) {
304 		if (!(flags & BTREE_TRIGGER_overwrite))
305 			ret = -BCH_ERR_missing_indirect_extent;
306 		goto next;
307 	}
308 
309 	struct bkey_i *new = bch2_bkey_make_mut_noupdate(trans, k);
310 	ret = PTR_ERR_OR_ZERO(new);
311 	if (ret)
312 		goto err;
313 
314 	__le64 *refcount = bkey_refcount(bkey_i_to_s(new));
315 	if (!*refcount && (flags & BTREE_TRIGGER_overwrite)) {
316 		bch2_bkey_val_to_text(&buf, c, p.s_c);
317 		prt_printf(&buf, "\n  ");
318 		bch2_bkey_val_to_text(&buf, c, k);
319 		log_fsck_err(trans, reflink_refcount_underflow,
320 			     "indirect extent refcount underflow while marking\n  %s",
321 			   buf.buf);
322 		goto next;
323 	}
324 
325 	if (flags & BTREE_TRIGGER_insert) {
326 		struct bch_reflink_p *v = (struct bch_reflink_p *) p.v;
327 		u64 pad;
328 
329 		pad = max_t(s64, le32_to_cpu(v->front_pad),
330 			    REFLINK_P_IDX(v) - bkey_start_offset(&new->k));
331 		BUG_ON(pad > U32_MAX);
332 		v->front_pad = cpu_to_le32(pad);
333 
334 		pad = max_t(s64, le32_to_cpu(v->back_pad),
335 			    new->k.p.offset - p.k->size - REFLINK_P_IDX(v));
336 		BUG_ON(pad > U32_MAX);
337 		v->back_pad = cpu_to_le32(pad);
338 	}
339 
340 	le64_add_cpu(refcount, !(flags & BTREE_TRIGGER_overwrite) ? 1 : -1);
341 
342 	bch2_btree_iter_set_pos_to_extent_start(&iter);
343 	ret = bch2_trans_update(trans, &iter, new, 0);
344 	if (ret)
345 		goto err;
346 next:
347 	*idx = k.k->p.offset;
348 err:
349 fsck_err:
350 	bch2_trans_iter_exit(trans, &iter);
351 	printbuf_exit(&buf);
352 	return ret;
353 }
354 
gc_trigger_reflink_p_segment(struct btree_trans * trans,struct bkey_s_c_reflink_p p,u64 * idx,enum btree_iter_update_trigger_flags flags,size_t r_idx)355 static s64 gc_trigger_reflink_p_segment(struct btree_trans *trans,
356 				struct bkey_s_c_reflink_p p, u64 *idx,
357 				enum btree_iter_update_trigger_flags flags,
358 				size_t r_idx)
359 {
360 	struct bch_fs *c = trans->c;
361 	struct reflink_gc *r;
362 	int add = !(flags & BTREE_TRIGGER_overwrite) ? 1 : -1;
363 	u64 next_idx = REFLINK_P_IDX(p.v) + p.k->size + le32_to_cpu(p.v->back_pad);
364 	s64 ret = 0;
365 	struct printbuf buf = PRINTBUF;
366 
367 	if (r_idx >= c->reflink_gc_nr)
368 		goto not_found;
369 
370 	r = genradix_ptr(&c->reflink_gc_table, r_idx);
371 	next_idx = min(next_idx, r->offset - r->size);
372 	if (*idx < next_idx)
373 		goto not_found;
374 
375 	BUG_ON((s64) r->refcount + add < 0);
376 
377 	if (flags & BTREE_TRIGGER_gc)
378 		r->refcount += add;
379 	*idx = r->offset;
380 	return 0;
381 not_found:
382 	if (flags & BTREE_TRIGGER_check_repair) {
383 		ret = bch2_indirect_extent_missing_error(trans, p, *idx, next_idx, false);
384 		if (ret)
385 			goto err;
386 	}
387 
388 	*idx = next_idx;
389 err:
390 	printbuf_exit(&buf);
391 	return ret;
392 }
393 
__trigger_reflink_p(struct btree_trans * trans,enum btree_id btree_id,unsigned level,struct bkey_s_c k,enum btree_iter_update_trigger_flags flags)394 static int __trigger_reflink_p(struct btree_trans *trans,
395 		enum btree_id btree_id, unsigned level, struct bkey_s_c k,
396 		enum btree_iter_update_trigger_flags flags)
397 {
398 	struct bch_fs *c = trans->c;
399 	struct bkey_s_c_reflink_p p = bkey_s_c_to_reflink_p(k);
400 	int ret = 0;
401 
402 	u64 idx = REFLINK_P_IDX(p.v) - le32_to_cpu(p.v->front_pad);
403 	u64 end = REFLINK_P_IDX(p.v) + p.k->size + le32_to_cpu(p.v->back_pad);
404 
405 	if (flags & BTREE_TRIGGER_transactional) {
406 		while (idx < end && !ret)
407 			ret = trans_trigger_reflink_p_segment(trans, p, &idx, flags);
408 	}
409 
410 	if (flags & (BTREE_TRIGGER_check_repair|BTREE_TRIGGER_gc)) {
411 		size_t l = 0, r = c->reflink_gc_nr;
412 
413 		while (l < r) {
414 			size_t m = l + (r - l) / 2;
415 			struct reflink_gc *ref = genradix_ptr(&c->reflink_gc_table, m);
416 			if (ref->offset <= idx)
417 				l = m + 1;
418 			else
419 				r = m;
420 		}
421 
422 		while (idx < end && !ret)
423 			ret = gc_trigger_reflink_p_segment(trans, p, &idx, flags, l++);
424 	}
425 
426 	return ret;
427 }
428 
bch2_trigger_reflink_p(struct btree_trans * trans,enum btree_id btree_id,unsigned level,struct bkey_s_c old,struct bkey_s new,enum btree_iter_update_trigger_flags flags)429 int bch2_trigger_reflink_p(struct btree_trans *trans,
430 			   enum btree_id btree_id, unsigned level,
431 			   struct bkey_s_c old,
432 			   struct bkey_s new,
433 			   enum btree_iter_update_trigger_flags flags)
434 {
435 	if ((flags & BTREE_TRIGGER_transactional) &&
436 	    (flags & BTREE_TRIGGER_insert)) {
437 		struct bch_reflink_p *v = bkey_s_to_reflink_p(new).v;
438 
439 		v->front_pad = v->back_pad = 0;
440 	}
441 
442 	return trigger_run_overwrite_then_insert(__trigger_reflink_p, trans, btree_id, level, old, new, flags);
443 }
444 
445 /* indirect extent trigger */
446 
447 static inline void
check_indirect_extent_deleting(struct bkey_s new,enum btree_iter_update_trigger_flags * flags)448 check_indirect_extent_deleting(struct bkey_s new,
449 			       enum btree_iter_update_trigger_flags *flags)
450 {
451 	if ((*flags & BTREE_TRIGGER_insert) && !*bkey_refcount(new)) {
452 		new.k->type = KEY_TYPE_deleted;
453 		new.k->size = 0;
454 		set_bkey_val_u64s(new.k, 0);
455 		*flags &= ~BTREE_TRIGGER_insert;
456 	}
457 }
458 
bch2_trigger_reflink_v(struct btree_trans * trans,enum btree_id btree_id,unsigned level,struct bkey_s_c old,struct bkey_s new,enum btree_iter_update_trigger_flags flags)459 int bch2_trigger_reflink_v(struct btree_trans *trans,
460 			   enum btree_id btree_id, unsigned level,
461 			   struct bkey_s_c old, struct bkey_s new,
462 			   enum btree_iter_update_trigger_flags flags)
463 {
464 	if ((flags & BTREE_TRIGGER_transactional) &&
465 	    (flags & BTREE_TRIGGER_insert))
466 		check_indirect_extent_deleting(new, &flags);
467 
468 	return bch2_trigger_extent(trans, btree_id, level, old, new, flags);
469 }
470 
bch2_trigger_indirect_inline_data(struct btree_trans * trans,enum btree_id btree_id,unsigned level,struct bkey_s_c old,struct bkey_s new,enum btree_iter_update_trigger_flags flags)471 int bch2_trigger_indirect_inline_data(struct btree_trans *trans,
472 			      enum btree_id btree_id, unsigned level,
473 			      struct bkey_s_c old, struct bkey_s new,
474 			      enum btree_iter_update_trigger_flags flags)
475 {
476 	check_indirect_extent_deleting(new, &flags);
477 
478 	return 0;
479 }
480 
481 /* create */
482 
bch2_make_extent_indirect(struct btree_trans * trans,struct btree_iter * extent_iter,struct bkey_i * orig,bool reflink_p_may_update_opts_field)483 static int bch2_make_extent_indirect(struct btree_trans *trans,
484 				     struct btree_iter *extent_iter,
485 				     struct bkey_i *orig,
486 				     bool reflink_p_may_update_opts_field)
487 {
488 	struct bch_fs *c = trans->c;
489 	struct btree_iter reflink_iter = { NULL };
490 	struct bkey_s_c k;
491 	struct bkey_i *r_v;
492 	struct bkey_i_reflink_p *r_p;
493 	__le64 *refcount;
494 	int ret;
495 
496 	if (orig->k.type == KEY_TYPE_inline_data)
497 		bch2_check_set_feature(c, BCH_FEATURE_reflink_inline_data);
498 
499 	bch2_trans_iter_init(trans, &reflink_iter, BTREE_ID_reflink, POS_MAX,
500 			     BTREE_ITER_intent);
501 	k = bch2_btree_iter_peek_prev(&reflink_iter);
502 	ret = bkey_err(k);
503 	if (ret)
504 		goto err;
505 
506 	/*
507 	 * XXX: we're assuming that 56 bits will be enough for the life of the
508 	 * filesystem: we need to implement wraparound, with a cursor in the
509 	 * logged ops btree:
510 	 */
511 	if (bkey_ge(reflink_iter.pos, POS(0, REFLINK_P_IDX_MAX - orig->k.size)))
512 		return -ENOSPC;
513 
514 	r_v = bch2_trans_kmalloc(trans, sizeof(__le64) + bkey_bytes(&orig->k));
515 	ret = PTR_ERR_OR_ZERO(r_v);
516 	if (ret)
517 		goto err;
518 
519 	bkey_init(&r_v->k);
520 	r_v->k.type	= bkey_type_to_indirect(&orig->k);
521 	r_v->k.p	= reflink_iter.pos;
522 	bch2_key_resize(&r_v->k, orig->k.size);
523 	r_v->k.bversion	= orig->k.bversion;
524 
525 	set_bkey_val_bytes(&r_v->k, sizeof(__le64) + bkey_val_bytes(&orig->k));
526 
527 	refcount	= bkey_refcount(bkey_i_to_s(r_v));
528 	*refcount	= 0;
529 	memcpy(refcount + 1, &orig->v, bkey_val_bytes(&orig->k));
530 
531 	ret = bch2_trans_update(trans, &reflink_iter, r_v, 0);
532 	if (ret)
533 		goto err;
534 
535 	/*
536 	 * orig is in a bkey_buf which statically allocates 5 64s for the val,
537 	 * so we know it will be big enough:
538 	 */
539 	orig->k.type = KEY_TYPE_reflink_p;
540 	r_p = bkey_i_to_reflink_p(orig);
541 	set_bkey_val_bytes(&r_p->k, sizeof(r_p->v));
542 
543 	/* FORTIFY_SOURCE is broken here, and doesn't provide unsafe_memset() */
544 #if !defined(__NO_FORTIFY) && defined(__OPTIMIZE__) && defined(CONFIG_FORTIFY_SOURCE)
545 	__underlying_memset(&r_p->v, 0, sizeof(r_p->v));
546 #else
547 	memset(&r_p->v, 0, sizeof(r_p->v));
548 #endif
549 
550 	SET_REFLINK_P_IDX(&r_p->v, bkey_start_offset(&r_v->k));
551 
552 	if (reflink_p_may_update_opts_field)
553 		SET_REFLINK_P_MAY_UPDATE_OPTIONS(&r_p->v, true);
554 
555 	ret = bch2_trans_update(trans, extent_iter, &r_p->k_i,
556 				BTREE_UPDATE_internal_snapshot_node);
557 err:
558 	bch2_trans_iter_exit(trans, &reflink_iter);
559 
560 	return ret;
561 }
562 
get_next_src(struct btree_iter * iter,struct bpos end)563 static struct bkey_s_c get_next_src(struct btree_iter *iter, struct bpos end)
564 {
565 	struct bkey_s_c k;
566 	int ret;
567 
568 	for_each_btree_key_max_continue_norestart(*iter, end, 0, k, ret) {
569 		if (bkey_extent_is_unwritten(k))
570 			continue;
571 
572 		if (bkey_extent_is_data(k.k))
573 			return k;
574 	}
575 
576 	if (bkey_ge(iter->pos, end))
577 		bch2_btree_iter_set_pos(iter, end);
578 	return ret ? bkey_s_c_err(ret) : bkey_s_c_null;
579 }
580 
bch2_remap_range(struct bch_fs * c,subvol_inum dst_inum,u64 dst_offset,subvol_inum src_inum,u64 src_offset,u64 remap_sectors,u64 new_i_size,s64 * i_sectors_delta,bool may_change_src_io_path_opts)581 s64 bch2_remap_range(struct bch_fs *c,
582 		     subvol_inum dst_inum, u64 dst_offset,
583 		     subvol_inum src_inum, u64 src_offset,
584 		     u64 remap_sectors,
585 		     u64 new_i_size, s64 *i_sectors_delta,
586 		     bool may_change_src_io_path_opts)
587 {
588 	struct btree_trans *trans;
589 	struct btree_iter dst_iter, src_iter;
590 	struct bkey_s_c src_k;
591 	struct bkey_buf new_dst, new_src;
592 	struct bpos dst_start = POS(dst_inum.inum, dst_offset);
593 	struct bpos src_start = POS(src_inum.inum, src_offset);
594 	struct bpos dst_end = dst_start, src_end = src_start;
595 	struct bch_io_opts opts;
596 	struct bpos src_want;
597 	u64 dst_done = 0;
598 	u32 dst_snapshot, src_snapshot;
599 	bool reflink_p_may_update_opts_field =
600 		bch2_request_incompat_feature(c, bcachefs_metadata_version_reflink_p_may_update_opts);
601 	int ret = 0, ret2 = 0;
602 
603 	if (!bch2_write_ref_tryget(c, BCH_WRITE_REF_reflink))
604 		return -BCH_ERR_erofs_no_writes;
605 
606 	bch2_check_set_feature(c, BCH_FEATURE_reflink);
607 
608 	dst_end.offset += remap_sectors;
609 	src_end.offset += remap_sectors;
610 
611 	bch2_bkey_buf_init(&new_dst);
612 	bch2_bkey_buf_init(&new_src);
613 	trans = bch2_trans_get(c);
614 
615 	ret = bch2_inum_opts_get(trans, src_inum, &opts);
616 	if (ret)
617 		goto err;
618 
619 	bch2_trans_iter_init(trans, &src_iter, BTREE_ID_extents, src_start,
620 			     BTREE_ITER_intent);
621 	bch2_trans_iter_init(trans, &dst_iter, BTREE_ID_extents, dst_start,
622 			     BTREE_ITER_intent);
623 
624 	while ((ret == 0 ||
625 		bch2_err_matches(ret, BCH_ERR_transaction_restart)) &&
626 	       bkey_lt(dst_iter.pos, dst_end)) {
627 		struct disk_reservation disk_res = { 0 };
628 
629 		bch2_trans_begin(trans);
630 
631 		if (fatal_signal_pending(current)) {
632 			ret = -EINTR;
633 			break;
634 		}
635 
636 		ret = bch2_subvolume_get_snapshot(trans, src_inum.subvol,
637 						  &src_snapshot);
638 		if (ret)
639 			continue;
640 
641 		bch2_btree_iter_set_snapshot(&src_iter, src_snapshot);
642 
643 		ret = bch2_subvolume_get_snapshot(trans, dst_inum.subvol,
644 						  &dst_snapshot);
645 		if (ret)
646 			continue;
647 
648 		bch2_btree_iter_set_snapshot(&dst_iter, dst_snapshot);
649 
650 		if (dst_inum.inum < src_inum.inum) {
651 			/* Avoid some lock cycle transaction restarts */
652 			ret = bch2_btree_iter_traverse(&dst_iter);
653 			if (ret)
654 				continue;
655 		}
656 
657 		dst_done = dst_iter.pos.offset - dst_start.offset;
658 		src_want = POS(src_start.inode, src_start.offset + dst_done);
659 		bch2_btree_iter_set_pos(&src_iter, src_want);
660 
661 		src_k = get_next_src(&src_iter, src_end);
662 		ret = bkey_err(src_k);
663 		if (ret)
664 			continue;
665 
666 		if (bkey_lt(src_want, src_iter.pos)) {
667 			ret = bch2_fpunch_at(trans, &dst_iter, dst_inum,
668 					min(dst_end.offset,
669 					    dst_iter.pos.offset +
670 					    src_iter.pos.offset - src_want.offset),
671 					i_sectors_delta);
672 			continue;
673 		}
674 
675 		if (src_k.k->type != KEY_TYPE_reflink_p) {
676 			bch2_btree_iter_set_pos_to_extent_start(&src_iter);
677 
678 			bch2_bkey_buf_reassemble(&new_src, c, src_k);
679 			src_k = bkey_i_to_s_c(new_src.k);
680 
681 			ret = bch2_make_extent_indirect(trans, &src_iter,
682 						new_src.k,
683 						reflink_p_may_update_opts_field);
684 			if (ret)
685 				continue;
686 
687 			BUG_ON(src_k.k->type != KEY_TYPE_reflink_p);
688 		}
689 
690 		if (src_k.k->type == KEY_TYPE_reflink_p) {
691 			struct bkey_s_c_reflink_p src_p =
692 				bkey_s_c_to_reflink_p(src_k);
693 			struct bkey_i_reflink_p *dst_p =
694 				bkey_reflink_p_init(new_dst.k);
695 
696 			u64 offset = REFLINK_P_IDX(src_p.v) +
697 				(src_want.offset -
698 				 bkey_start_offset(src_k.k));
699 
700 			SET_REFLINK_P_IDX(&dst_p->v, offset);
701 
702 			if (reflink_p_may_update_opts_field &&
703 			    may_change_src_io_path_opts)
704 				SET_REFLINK_P_MAY_UPDATE_OPTIONS(&dst_p->v, true);
705 		} else {
706 			BUG();
707 		}
708 
709 		new_dst.k->k.p = dst_iter.pos;
710 		bch2_key_resize(&new_dst.k->k,
711 				min(src_k.k->p.offset - src_want.offset,
712 				    dst_end.offset - dst_iter.pos.offset));
713 
714 		ret =   bch2_bkey_set_needs_rebalance(c, &opts, new_dst.k) ?:
715 			bch2_extent_update(trans, dst_inum, &dst_iter,
716 					new_dst.k, &disk_res,
717 					new_i_size, i_sectors_delta,
718 					true);
719 		bch2_disk_reservation_put(c, &disk_res);
720 	}
721 	bch2_trans_iter_exit(trans, &dst_iter);
722 	bch2_trans_iter_exit(trans, &src_iter);
723 
724 	BUG_ON(!ret && !bkey_eq(dst_iter.pos, dst_end));
725 	BUG_ON(bkey_gt(dst_iter.pos, dst_end));
726 
727 	dst_done = dst_iter.pos.offset - dst_start.offset;
728 	new_i_size = min(dst_iter.pos.offset << 9, new_i_size);
729 
730 	do {
731 		struct bch_inode_unpacked inode_u;
732 		struct btree_iter inode_iter = { NULL };
733 
734 		bch2_trans_begin(trans);
735 
736 		ret2 = bch2_inode_peek(trans, &inode_iter, &inode_u,
737 				       dst_inum, BTREE_ITER_intent);
738 
739 		if (!ret2 &&
740 		    inode_u.bi_size < new_i_size) {
741 			inode_u.bi_size = new_i_size;
742 			ret2  = bch2_inode_write(trans, &inode_iter, &inode_u) ?:
743 				bch2_trans_commit(trans, NULL, NULL,
744 						  BCH_TRANS_COMMIT_no_enospc);
745 		}
746 
747 		bch2_trans_iter_exit(trans, &inode_iter);
748 	} while (bch2_err_matches(ret2, BCH_ERR_transaction_restart));
749 err:
750 	bch2_trans_put(trans);
751 	bch2_bkey_buf_exit(&new_src, c);
752 	bch2_bkey_buf_exit(&new_dst, c);
753 
754 	bch2_write_ref_put(c, BCH_WRITE_REF_reflink);
755 
756 	return dst_done ?: ret ?: ret2;
757 }
758 
759 /* fsck */
760 
bch2_gc_write_reflink_key(struct btree_trans * trans,struct btree_iter * iter,struct bkey_s_c k,size_t * idx)761 static int bch2_gc_write_reflink_key(struct btree_trans *trans,
762 				     struct btree_iter *iter,
763 				     struct bkey_s_c k,
764 				     size_t *idx)
765 {
766 	struct bch_fs *c = trans->c;
767 	const __le64 *refcount = bkey_refcount_c(k);
768 	struct printbuf buf = PRINTBUF;
769 	struct reflink_gc *r;
770 	int ret = 0;
771 
772 	if (!refcount)
773 		return 0;
774 
775 	while ((r = genradix_ptr(&c->reflink_gc_table, *idx)) &&
776 	       r->offset < k.k->p.offset)
777 		++*idx;
778 
779 	if (!r ||
780 	    r->offset != k.k->p.offset ||
781 	    r->size != k.k->size) {
782 		bch_err(c, "unexpected inconsistency walking reflink table at gc finish");
783 		return -EINVAL;
784 	}
785 
786 	if (fsck_err_on(r->refcount != le64_to_cpu(*refcount),
787 			trans, reflink_v_refcount_wrong,
788 			"reflink key has wrong refcount:\n"
789 			"  %s\n"
790 			"  should be %u",
791 			(bch2_bkey_val_to_text(&buf, c, k), buf.buf),
792 			r->refcount)) {
793 		struct bkey_i *new = bch2_bkey_make_mut_noupdate(trans, k);
794 		ret = PTR_ERR_OR_ZERO(new);
795 		if (ret)
796 			goto out;
797 
798 		if (!r->refcount)
799 			new->k.type = KEY_TYPE_deleted;
800 		else
801 			*bkey_refcount(bkey_i_to_s(new)) = cpu_to_le64(r->refcount);
802 		ret = bch2_trans_update(trans, iter, new, 0);
803 	}
804 out:
805 fsck_err:
806 	printbuf_exit(&buf);
807 	return ret;
808 }
809 
bch2_gc_reflink_done(struct bch_fs * c)810 int bch2_gc_reflink_done(struct bch_fs *c)
811 {
812 	size_t idx = 0;
813 
814 	int ret = bch2_trans_run(c,
815 		for_each_btree_key_commit(trans, iter,
816 				BTREE_ID_reflink, POS_MIN,
817 				BTREE_ITER_prefetch, k,
818 				NULL, NULL, BCH_TRANS_COMMIT_no_enospc,
819 			bch2_gc_write_reflink_key(trans, &iter, k, &idx)));
820 	c->reflink_gc_nr = 0;
821 	return ret;
822 }
823 
bch2_gc_reflink_start(struct bch_fs * c)824 int bch2_gc_reflink_start(struct bch_fs *c)
825 {
826 	c->reflink_gc_nr = 0;
827 
828 	int ret = bch2_trans_run(c,
829 		for_each_btree_key(trans, iter, BTREE_ID_reflink, POS_MIN,
830 				   BTREE_ITER_prefetch, k, ({
831 			const __le64 *refcount = bkey_refcount_c(k);
832 
833 			if (!refcount)
834 				continue;
835 
836 			struct reflink_gc *r = genradix_ptr_alloc(&c->reflink_gc_table,
837 							c->reflink_gc_nr++, GFP_KERNEL);
838 			if (!r) {
839 				ret = -BCH_ERR_ENOMEM_gc_reflink_start;
840 				break;
841 			}
842 
843 			r->offset	= k.k->p.offset;
844 			r->size		= k.k->size;
845 			r->refcount	= 0;
846 			0;
847 		})));
848 
849 	bch_err_fn(c, ret);
850 	return ret;
851 }
852