1 // SPDX-License-Identifier: GPL-2.0 2 #include "bcachefs.h" 3 #include "bkey_buf.h" 4 #include "btree_update.h" 5 #include "buckets.h" 6 #include "error.h" 7 #include "extents.h" 8 #include "inode.h" 9 #include "io_misc.h" 10 #include "io_write.h" 11 #include "rebalance.h" 12 #include "reflink.h" 13 #include "subvolume.h" 14 #include "super-io.h" 15 16 #include <linux/sched/signal.h> 17 18 static inline bool bkey_extent_is_reflink_data(const struct bkey *k) 19 { 20 switch (k->type) { 21 case KEY_TYPE_reflink_v: 22 case KEY_TYPE_indirect_inline_data: 23 return true; 24 default: 25 return false; 26 } 27 } 28 29 static inline unsigned bkey_type_to_indirect(const struct bkey *k) 30 { 31 switch (k->type) { 32 case KEY_TYPE_extent: 33 return KEY_TYPE_reflink_v; 34 case KEY_TYPE_inline_data: 35 return KEY_TYPE_indirect_inline_data; 36 default: 37 return 0; 38 } 39 } 40 41 /* reflink pointers */ 42 43 int bch2_reflink_p_validate(struct bch_fs *c, struct bkey_s_c k, 44 struct bkey_validate_context from) 45 { 46 struct bkey_s_c_reflink_p p = bkey_s_c_to_reflink_p(k); 47 int ret = 0; 48 49 bkey_fsck_err_on(REFLINK_P_IDX(p.v) < le32_to_cpu(p.v->front_pad), 50 c, reflink_p_front_pad_bad, 51 "idx < front_pad (%llu < %u)", 52 REFLINK_P_IDX(p.v), le32_to_cpu(p.v->front_pad)); 53 fsck_err: 54 return ret; 55 } 56 57 void bch2_reflink_p_to_text(struct printbuf *out, struct bch_fs *c, 58 struct bkey_s_c k) 59 { 60 struct bkey_s_c_reflink_p p = bkey_s_c_to_reflink_p(k); 61 62 prt_printf(out, "idx %llu front_pad %u back_pad %u", 63 REFLINK_P_IDX(p.v), 64 le32_to_cpu(p.v->front_pad), 65 le32_to_cpu(p.v->back_pad)); 66 } 67 68 bool bch2_reflink_p_merge(struct bch_fs *c, struct bkey_s _l, struct bkey_s_c _r) 69 { 70 struct bkey_s_reflink_p l = bkey_s_to_reflink_p(_l); 71 struct bkey_s_c_reflink_p r = bkey_s_c_to_reflink_p(_r); 72 73 /* 74 * Disabled for now, the triggers code needs to be reworked for merging 75 * of reflink pointers to work: 76 */ 77 return false; 78 79 if (REFLINK_P_IDX(l.v) + l.k->size != REFLINK_P_IDX(r.v)) 80 return false; 81 82 if (REFLINK_P_ERROR(l.v) != REFLINK_P_ERROR(r.v)) 83 return false; 84 85 bch2_key_resize(l.k, l.k->size + r.k->size); 86 return true; 87 } 88 89 /* indirect extents */ 90 91 int bch2_reflink_v_validate(struct bch_fs *c, struct bkey_s_c k, 92 struct bkey_validate_context from) 93 { 94 int ret = 0; 95 96 bkey_fsck_err_on(bkey_gt(k.k->p, POS(0, REFLINK_P_IDX_MAX)), 97 c, reflink_v_pos_bad, 98 "indirect extent above maximum position 0:%llu", 99 REFLINK_P_IDX_MAX); 100 101 ret = bch2_bkey_ptrs_validate(c, k, from); 102 fsck_err: 103 return ret; 104 } 105 106 void bch2_reflink_v_to_text(struct printbuf *out, struct bch_fs *c, 107 struct bkey_s_c k) 108 { 109 struct bkey_s_c_reflink_v r = bkey_s_c_to_reflink_v(k); 110 111 prt_printf(out, "refcount: %llu ", le64_to_cpu(r.v->refcount)); 112 113 bch2_bkey_ptrs_to_text(out, c, k); 114 } 115 116 #if 0 117 Currently disabled, needs to be debugged: 118 119 bool bch2_reflink_v_merge(struct bch_fs *c, struct bkey_s _l, struct bkey_s_c _r) 120 { 121 struct bkey_s_reflink_v l = bkey_s_to_reflink_v(_l); 122 struct bkey_s_c_reflink_v r = bkey_s_c_to_reflink_v(_r); 123 124 return l.v->refcount == r.v->refcount && bch2_extent_merge(c, _l, _r); 125 } 126 #endif 127 128 /* indirect inline data */ 129 130 int bch2_indirect_inline_data_validate(struct bch_fs *c, struct bkey_s_c k, 131 struct bkey_validate_context from) 132 { 133 return 0; 134 } 135 136 void bch2_indirect_inline_data_to_text(struct printbuf *out, 137 struct bch_fs *c, struct bkey_s_c k) 138 { 139 struct bkey_s_c_indirect_inline_data d = bkey_s_c_to_indirect_inline_data(k); 140 unsigned datalen = bkey_inline_data_bytes(k.k); 141 142 prt_printf(out, "refcount %llu datalen %u: %*phN", 143 le64_to_cpu(d.v->refcount), datalen, 144 min(datalen, 32U), d.v->data); 145 } 146 147 /* lookup */ 148 149 static int bch2_indirect_extent_not_missing(struct btree_trans *trans, struct bkey_s_c_reflink_p p, 150 bool should_commit) 151 { 152 struct bkey_i_reflink_p *new = bch2_bkey_make_mut_noupdate_typed(trans, p.s_c, reflink_p); 153 int ret = PTR_ERR_OR_ZERO(new); 154 if (ret) 155 return ret; 156 157 SET_REFLINK_P_ERROR(&new->v, false); 158 ret = bch2_btree_insert_trans(trans, BTREE_ID_extents, &new->k_i, BTREE_TRIGGER_norun); 159 if (ret) 160 return ret; 161 162 if (!should_commit) 163 return 0; 164 165 return bch2_trans_commit(trans, NULL, NULL, BCH_TRANS_COMMIT_no_enospc) ?: 166 -BCH_ERR_transaction_restart_nested; 167 } 168 169 static int bch2_indirect_extent_missing_error(struct btree_trans *trans, 170 struct bkey_s_c_reflink_p p, 171 u64 missing_start, u64 missing_end, 172 bool should_commit) 173 { 174 if (REFLINK_P_ERROR(p.v)) 175 return 0; 176 177 struct bch_fs *c = trans->c; 178 u64 live_start = REFLINK_P_IDX(p.v); 179 u64 live_end = REFLINK_P_IDX(p.v) + p.k->size; 180 u64 refd_start = live_start - le32_to_cpu(p.v->front_pad); 181 u64 refd_end = live_end + le32_to_cpu(p.v->back_pad); 182 struct printbuf buf = PRINTBUF; 183 int ret = 0; 184 185 BUG_ON(missing_start < refd_start); 186 BUG_ON(missing_end > refd_end); 187 188 struct bpos missing_pos = bkey_start_pos(p.k); 189 missing_pos.offset += missing_start - live_start; 190 191 prt_printf(&buf, "pointer to missing indirect extent in "); 192 ret = bch2_inum_snap_offset_err_msg_trans(trans, &buf, missing_pos); 193 if (ret) 194 goto err; 195 196 prt_printf(&buf, "-%llu\n", (missing_pos.offset + (missing_end - missing_start)) << 9); 197 bch2_bkey_val_to_text(&buf, c, p.s_c); 198 199 prt_printf(&buf, "\nmissing reflink btree range %llu-%llu", 200 missing_start, missing_end); 201 202 if (fsck_err(trans, reflink_p_to_missing_reflink_v, "%s", buf.buf)) { 203 struct bkey_i_reflink_p *new = bch2_bkey_make_mut_noupdate_typed(trans, p.s_c, reflink_p); 204 ret = PTR_ERR_OR_ZERO(new); 205 if (ret) 206 goto err; 207 208 /* 209 * Is the missing range not actually needed? 210 * 211 * p.v->idx refers to the data that we actually want, but if the 212 * indirect extent we point to was bigger, front_pad and back_pad 213 * indicate the range we took a reference on. 214 */ 215 216 if (missing_end <= live_start) { 217 new->v.front_pad = cpu_to_le32(live_start - missing_end); 218 } else if (missing_start >= live_end) { 219 new->v.back_pad = cpu_to_le32(missing_start - live_end); 220 } else { 221 struct bpos new_start = bkey_start_pos(&new->k); 222 struct bpos new_end = new->k.p; 223 224 if (missing_start > live_start) 225 new_start.offset += missing_start - live_start; 226 if (missing_end < live_end) 227 new_end.offset -= live_end - missing_end; 228 229 bch2_cut_front(new_start, &new->k_i); 230 bch2_cut_back(new_end, &new->k_i); 231 232 SET_REFLINK_P_ERROR(&new->v, true); 233 } 234 235 ret = bch2_btree_insert_trans(trans, BTREE_ID_extents, &new->k_i, BTREE_TRIGGER_norun); 236 if (ret) 237 goto err; 238 239 if (should_commit) 240 ret = bch2_trans_commit(trans, NULL, NULL, BCH_TRANS_COMMIT_no_enospc) ?: 241 -BCH_ERR_transaction_restart_nested; 242 } 243 err: 244 fsck_err: 245 printbuf_exit(&buf); 246 return ret; 247 } 248 249 /* 250 * This is used from the read path, which doesn't expect to have to do a 251 * transaction commit, and from triggers, which should not be doing a commit: 252 */ 253 struct bkey_s_c bch2_lookup_indirect_extent(struct btree_trans *trans, 254 struct btree_iter *iter, 255 s64 *offset_into_extent, 256 struct bkey_s_c_reflink_p p, 257 bool should_commit, 258 unsigned iter_flags) 259 { 260 BUG_ON(*offset_into_extent < -((s64) le32_to_cpu(p.v->front_pad))); 261 BUG_ON(*offset_into_extent >= p.k->size + le32_to_cpu(p.v->back_pad)); 262 263 u64 reflink_offset = REFLINK_P_IDX(p.v) + *offset_into_extent; 264 265 struct bkey_s_c k = bch2_bkey_get_iter(trans, iter, BTREE_ID_reflink, 266 POS(0, reflink_offset), iter_flags); 267 if (bkey_err(k)) 268 return k; 269 270 if (unlikely(!bkey_extent_is_reflink_data(k.k))) { 271 unsigned size = min((u64) k.k->size, 272 REFLINK_P_IDX(p.v) + p.k->size + le32_to_cpu(p.v->back_pad) - 273 reflink_offset); 274 bch2_key_resize(&iter->k, size); 275 276 int ret = bch2_indirect_extent_missing_error(trans, p, reflink_offset, 277 k.k->p.offset, should_commit); 278 if (ret) { 279 bch2_trans_iter_exit(trans, iter); 280 return bkey_s_c_err(ret); 281 } 282 } else if (unlikely(REFLINK_P_ERROR(p.v))) { 283 int ret = bch2_indirect_extent_not_missing(trans, p, should_commit); 284 if (ret) { 285 bch2_trans_iter_exit(trans, iter); 286 return bkey_s_c_err(ret); 287 } 288 } 289 290 *offset_into_extent = reflink_offset - bkey_start_offset(k.k); 291 return k; 292 } 293 294 /* reflink pointer trigger */ 295 296 static int trans_trigger_reflink_p_segment(struct btree_trans *trans, 297 struct bkey_s_c_reflink_p p, u64 *idx, 298 enum btree_iter_update_trigger_flags flags) 299 { 300 struct bch_fs *c = trans->c; 301 struct printbuf buf = PRINTBUF; 302 303 s64 offset_into_extent = *idx - REFLINK_P_IDX(p.v); 304 struct btree_iter iter; 305 struct bkey_s_c k = bch2_lookup_indirect_extent(trans, &iter, &offset_into_extent, p, false, 306 BTREE_ITER_intent| 307 BTREE_ITER_with_updates); 308 int ret = bkey_err(k); 309 if (ret) 310 return ret; 311 312 if (!bkey_refcount_c(k)) { 313 if (!(flags & BTREE_TRIGGER_overwrite)) 314 ret = -BCH_ERR_missing_indirect_extent; 315 goto next; 316 } 317 318 struct bkey_i *new = bch2_bkey_make_mut_noupdate(trans, k); 319 ret = PTR_ERR_OR_ZERO(new); 320 if (ret) 321 goto err; 322 323 __le64 *refcount = bkey_refcount(bkey_i_to_s(new)); 324 if (!*refcount && (flags & BTREE_TRIGGER_overwrite)) { 325 bch2_bkey_val_to_text(&buf, c, p.s_c); 326 prt_newline(&buf); 327 bch2_bkey_val_to_text(&buf, c, k); 328 log_fsck_err(trans, reflink_refcount_underflow, 329 "indirect extent refcount underflow while marking\n%s", 330 buf.buf); 331 goto next; 332 } 333 334 if (flags & BTREE_TRIGGER_insert) { 335 struct bch_reflink_p *v = (struct bch_reflink_p *) p.v; 336 u64 pad; 337 338 pad = max_t(s64, le32_to_cpu(v->front_pad), 339 REFLINK_P_IDX(v) - bkey_start_offset(&new->k)); 340 BUG_ON(pad > U32_MAX); 341 v->front_pad = cpu_to_le32(pad); 342 343 pad = max_t(s64, le32_to_cpu(v->back_pad), 344 new->k.p.offset - p.k->size - REFLINK_P_IDX(v)); 345 BUG_ON(pad > U32_MAX); 346 v->back_pad = cpu_to_le32(pad); 347 } 348 349 le64_add_cpu(refcount, !(flags & BTREE_TRIGGER_overwrite) ? 1 : -1); 350 351 bch2_btree_iter_set_pos_to_extent_start(&iter); 352 ret = bch2_trans_update(trans, &iter, new, 0); 353 if (ret) 354 goto err; 355 next: 356 *idx = k.k->p.offset; 357 err: 358 fsck_err: 359 bch2_trans_iter_exit(trans, &iter); 360 printbuf_exit(&buf); 361 return ret; 362 } 363 364 static s64 gc_trigger_reflink_p_segment(struct btree_trans *trans, 365 struct bkey_s_c_reflink_p p, u64 *idx, 366 enum btree_iter_update_trigger_flags flags, 367 size_t r_idx) 368 { 369 struct bch_fs *c = trans->c; 370 struct reflink_gc *r; 371 int add = !(flags & BTREE_TRIGGER_overwrite) ? 1 : -1; 372 u64 next_idx = REFLINK_P_IDX(p.v) + p.k->size + le32_to_cpu(p.v->back_pad); 373 s64 ret = 0; 374 struct printbuf buf = PRINTBUF; 375 376 if (r_idx >= c->reflink_gc_nr) 377 goto not_found; 378 379 r = genradix_ptr(&c->reflink_gc_table, r_idx); 380 next_idx = min(next_idx, r->offset - r->size); 381 if (*idx < next_idx) 382 goto not_found; 383 384 BUG_ON((s64) r->refcount + add < 0); 385 386 if (flags & BTREE_TRIGGER_gc) 387 r->refcount += add; 388 *idx = r->offset; 389 return 0; 390 not_found: 391 if (flags & BTREE_TRIGGER_check_repair) { 392 ret = bch2_indirect_extent_missing_error(trans, p, *idx, next_idx, false); 393 if (ret) 394 goto err; 395 } 396 397 *idx = next_idx; 398 err: 399 printbuf_exit(&buf); 400 return ret; 401 } 402 403 static int __trigger_reflink_p(struct btree_trans *trans, 404 enum btree_id btree_id, unsigned level, struct bkey_s_c k, 405 enum btree_iter_update_trigger_flags flags) 406 { 407 struct bch_fs *c = trans->c; 408 struct bkey_s_c_reflink_p p = bkey_s_c_to_reflink_p(k); 409 int ret = 0; 410 411 u64 idx = REFLINK_P_IDX(p.v) - le32_to_cpu(p.v->front_pad); 412 u64 end = REFLINK_P_IDX(p.v) + p.k->size + le32_to_cpu(p.v->back_pad); 413 414 if (flags & BTREE_TRIGGER_transactional) { 415 while (idx < end && !ret) 416 ret = trans_trigger_reflink_p_segment(trans, p, &idx, flags); 417 } 418 419 if (flags & (BTREE_TRIGGER_check_repair|BTREE_TRIGGER_gc)) { 420 size_t l = 0, r = c->reflink_gc_nr; 421 422 while (l < r) { 423 size_t m = l + (r - l) / 2; 424 struct reflink_gc *ref = genradix_ptr(&c->reflink_gc_table, m); 425 if (ref->offset <= idx) 426 l = m + 1; 427 else 428 r = m; 429 } 430 431 while (idx < end && !ret) 432 ret = gc_trigger_reflink_p_segment(trans, p, &idx, flags, l++); 433 } 434 435 return ret; 436 } 437 438 int bch2_trigger_reflink_p(struct btree_trans *trans, 439 enum btree_id btree_id, unsigned level, 440 struct bkey_s_c old, 441 struct bkey_s new, 442 enum btree_iter_update_trigger_flags flags) 443 { 444 if ((flags & BTREE_TRIGGER_transactional) && 445 (flags & BTREE_TRIGGER_insert)) { 446 struct bch_reflink_p *v = bkey_s_to_reflink_p(new).v; 447 448 v->front_pad = v->back_pad = 0; 449 } 450 451 return trigger_run_overwrite_then_insert(__trigger_reflink_p, trans, btree_id, level, old, new, flags); 452 } 453 454 /* indirect extent trigger */ 455 456 static inline void 457 check_indirect_extent_deleting(struct bkey_s new, 458 enum btree_iter_update_trigger_flags *flags) 459 { 460 if ((*flags & BTREE_TRIGGER_insert) && !*bkey_refcount(new)) { 461 new.k->type = KEY_TYPE_deleted; 462 new.k->size = 0; 463 set_bkey_val_u64s(new.k, 0); 464 *flags &= ~BTREE_TRIGGER_insert; 465 } 466 } 467 468 int bch2_trigger_reflink_v(struct btree_trans *trans, 469 enum btree_id btree_id, unsigned level, 470 struct bkey_s_c old, struct bkey_s new, 471 enum btree_iter_update_trigger_flags flags) 472 { 473 if ((flags & BTREE_TRIGGER_transactional) && 474 (flags & BTREE_TRIGGER_insert)) 475 check_indirect_extent_deleting(new, &flags); 476 477 return bch2_trigger_extent(trans, btree_id, level, old, new, flags); 478 } 479 480 int bch2_trigger_indirect_inline_data(struct btree_trans *trans, 481 enum btree_id btree_id, unsigned level, 482 struct bkey_s_c old, struct bkey_s new, 483 enum btree_iter_update_trigger_flags flags) 484 { 485 check_indirect_extent_deleting(new, &flags); 486 487 return 0; 488 } 489 490 /* create */ 491 492 static int bch2_make_extent_indirect(struct btree_trans *trans, 493 struct btree_iter *extent_iter, 494 struct bkey_i *orig, 495 bool reflink_p_may_update_opts_field) 496 { 497 struct bch_fs *c = trans->c; 498 struct btree_iter reflink_iter = {}; 499 struct bkey_s_c k; 500 struct bkey_i *r_v; 501 struct bkey_i_reflink_p *r_p; 502 __le64 *refcount; 503 int ret; 504 505 if (orig->k.type == KEY_TYPE_inline_data) 506 bch2_check_set_feature(c, BCH_FEATURE_reflink_inline_data); 507 508 bch2_trans_iter_init(trans, &reflink_iter, BTREE_ID_reflink, POS_MAX, 509 BTREE_ITER_intent); 510 k = bch2_btree_iter_peek_prev(trans, &reflink_iter); 511 ret = bkey_err(k); 512 if (ret) 513 goto err; 514 515 /* 516 * XXX: we're assuming that 56 bits will be enough for the life of the 517 * filesystem: we need to implement wraparound, with a cursor in the 518 * logged ops btree: 519 */ 520 if (bkey_ge(reflink_iter.pos, POS(0, REFLINK_P_IDX_MAX - orig->k.size))) 521 return -ENOSPC; 522 523 r_v = bch2_trans_kmalloc(trans, sizeof(__le64) + bkey_bytes(&orig->k)); 524 ret = PTR_ERR_OR_ZERO(r_v); 525 if (ret) 526 goto err; 527 528 bkey_init(&r_v->k); 529 r_v->k.type = bkey_type_to_indirect(&orig->k); 530 r_v->k.p = reflink_iter.pos; 531 bch2_key_resize(&r_v->k, orig->k.size); 532 r_v->k.bversion = orig->k.bversion; 533 534 set_bkey_val_bytes(&r_v->k, sizeof(__le64) + bkey_val_bytes(&orig->k)); 535 536 refcount = bkey_refcount(bkey_i_to_s(r_v)); 537 *refcount = 0; 538 memcpy(refcount + 1, &orig->v, bkey_val_bytes(&orig->k)); 539 540 ret = bch2_trans_update(trans, &reflink_iter, r_v, 0); 541 if (ret) 542 goto err; 543 544 /* 545 * orig is in a bkey_buf which statically allocates 5 64s for the val, 546 * so we know it will be big enough: 547 */ 548 orig->k.type = KEY_TYPE_reflink_p; 549 r_p = bkey_i_to_reflink_p(orig); 550 set_bkey_val_bytes(&r_p->k, sizeof(r_p->v)); 551 552 /* FORTIFY_SOURCE is broken here, and doesn't provide unsafe_memset() */ 553 #if !defined(__NO_FORTIFY) && defined(__OPTIMIZE__) && defined(CONFIG_FORTIFY_SOURCE) 554 __underlying_memset(&r_p->v, 0, sizeof(r_p->v)); 555 #else 556 memset(&r_p->v, 0, sizeof(r_p->v)); 557 #endif 558 559 SET_REFLINK_P_IDX(&r_p->v, bkey_start_offset(&r_v->k)); 560 561 if (reflink_p_may_update_opts_field) 562 SET_REFLINK_P_MAY_UPDATE_OPTIONS(&r_p->v, true); 563 564 ret = bch2_trans_update(trans, extent_iter, &r_p->k_i, 565 BTREE_UPDATE_internal_snapshot_node); 566 err: 567 bch2_trans_iter_exit(trans, &reflink_iter); 568 569 return ret; 570 } 571 572 static struct bkey_s_c get_next_src(struct btree_trans *trans, 573 struct btree_iter *iter, struct bpos end) 574 { 575 struct bkey_s_c k; 576 int ret; 577 578 for_each_btree_key_max_continue_norestart(trans, *iter, end, 0, k, ret) { 579 if (bkey_extent_is_unwritten(k)) 580 continue; 581 582 if (bkey_extent_is_data(k.k)) 583 return k; 584 } 585 586 if (bkey_ge(iter->pos, end)) 587 bch2_btree_iter_set_pos(trans, iter, end); 588 return ret ? bkey_s_c_err(ret) : bkey_s_c_null; 589 } 590 591 s64 bch2_remap_range(struct bch_fs *c, 592 subvol_inum dst_inum, u64 dst_offset, 593 subvol_inum src_inum, u64 src_offset, 594 u64 remap_sectors, 595 u64 new_i_size, s64 *i_sectors_delta, 596 bool may_change_src_io_path_opts) 597 { 598 struct btree_trans *trans; 599 struct btree_iter dst_iter, src_iter; 600 struct bkey_s_c src_k; 601 struct bkey_buf new_dst, new_src; 602 struct bpos dst_start = POS(dst_inum.inum, dst_offset); 603 struct bpos src_start = POS(src_inum.inum, src_offset); 604 struct bpos dst_end = dst_start, src_end = src_start; 605 struct bch_io_opts opts; 606 struct bpos src_want; 607 u64 dst_done = 0; 608 u32 dst_snapshot, src_snapshot; 609 bool reflink_p_may_update_opts_field = 610 !bch2_request_incompat_feature(c, bcachefs_metadata_version_reflink_p_may_update_opts); 611 int ret = 0, ret2 = 0; 612 613 if (!bch2_write_ref_tryget(c, BCH_WRITE_REF_reflink)) 614 return -BCH_ERR_erofs_no_writes; 615 616 bch2_check_set_feature(c, BCH_FEATURE_reflink); 617 618 dst_end.offset += remap_sectors; 619 src_end.offset += remap_sectors; 620 621 bch2_bkey_buf_init(&new_dst); 622 bch2_bkey_buf_init(&new_src); 623 trans = bch2_trans_get(c); 624 625 ret = bch2_inum_opts_get(trans, src_inum, &opts); 626 if (ret) 627 goto err; 628 629 bch2_trans_iter_init(trans, &src_iter, BTREE_ID_extents, src_start, 630 BTREE_ITER_intent); 631 bch2_trans_iter_init(trans, &dst_iter, BTREE_ID_extents, dst_start, 632 BTREE_ITER_intent); 633 634 while ((ret == 0 || 635 bch2_err_matches(ret, BCH_ERR_transaction_restart)) && 636 bkey_lt(dst_iter.pos, dst_end)) { 637 struct disk_reservation disk_res = { 0 }; 638 639 bch2_trans_begin(trans); 640 641 if (fatal_signal_pending(current)) { 642 ret = -EINTR; 643 break; 644 } 645 646 ret = bch2_subvolume_get_snapshot(trans, src_inum.subvol, 647 &src_snapshot); 648 if (ret) 649 continue; 650 651 bch2_btree_iter_set_snapshot(trans, &src_iter, src_snapshot); 652 653 ret = bch2_subvolume_get_snapshot(trans, dst_inum.subvol, 654 &dst_snapshot); 655 if (ret) 656 continue; 657 658 bch2_btree_iter_set_snapshot(trans, &dst_iter, dst_snapshot); 659 660 if (dst_inum.inum < src_inum.inum) { 661 /* Avoid some lock cycle transaction restarts */ 662 ret = bch2_btree_iter_traverse(trans, &dst_iter); 663 if (ret) 664 continue; 665 } 666 667 dst_done = dst_iter.pos.offset - dst_start.offset; 668 src_want = POS(src_start.inode, src_start.offset + dst_done); 669 bch2_btree_iter_set_pos(trans, &src_iter, src_want); 670 671 src_k = get_next_src(trans, &src_iter, src_end); 672 ret = bkey_err(src_k); 673 if (ret) 674 continue; 675 676 if (bkey_lt(src_want, src_iter.pos)) { 677 ret = bch2_fpunch_at(trans, &dst_iter, dst_inum, 678 min(dst_end.offset, 679 dst_iter.pos.offset + 680 src_iter.pos.offset - src_want.offset), 681 i_sectors_delta); 682 continue; 683 } 684 685 if (src_k.k->type != KEY_TYPE_reflink_p) { 686 bch2_btree_iter_set_pos_to_extent_start(&src_iter); 687 688 bch2_bkey_buf_reassemble(&new_src, c, src_k); 689 src_k = bkey_i_to_s_c(new_src.k); 690 691 ret = bch2_make_extent_indirect(trans, &src_iter, 692 new_src.k, 693 reflink_p_may_update_opts_field); 694 if (ret) 695 continue; 696 697 BUG_ON(src_k.k->type != KEY_TYPE_reflink_p); 698 } 699 700 if (src_k.k->type == KEY_TYPE_reflink_p) { 701 struct bkey_s_c_reflink_p src_p = 702 bkey_s_c_to_reflink_p(src_k); 703 struct bkey_i_reflink_p *dst_p = 704 bkey_reflink_p_init(new_dst.k); 705 706 u64 offset = REFLINK_P_IDX(src_p.v) + 707 (src_want.offset - 708 bkey_start_offset(src_k.k)); 709 710 SET_REFLINK_P_IDX(&dst_p->v, offset); 711 712 if (reflink_p_may_update_opts_field && 713 may_change_src_io_path_opts) 714 SET_REFLINK_P_MAY_UPDATE_OPTIONS(&dst_p->v, true); 715 } else { 716 BUG(); 717 } 718 719 new_dst.k->k.p = dst_iter.pos; 720 bch2_key_resize(&new_dst.k->k, 721 min(src_k.k->p.offset - src_want.offset, 722 dst_end.offset - dst_iter.pos.offset)); 723 724 ret = bch2_bkey_set_needs_rebalance(c, &opts, new_dst.k) ?: 725 bch2_extent_update(trans, dst_inum, &dst_iter, 726 new_dst.k, &disk_res, 727 new_i_size, i_sectors_delta, 728 true); 729 bch2_disk_reservation_put(c, &disk_res); 730 } 731 bch2_trans_iter_exit(trans, &dst_iter); 732 bch2_trans_iter_exit(trans, &src_iter); 733 734 BUG_ON(!ret && !bkey_eq(dst_iter.pos, dst_end)); 735 BUG_ON(bkey_gt(dst_iter.pos, dst_end)); 736 737 dst_done = dst_iter.pos.offset - dst_start.offset; 738 new_i_size = min(dst_iter.pos.offset << 9, new_i_size); 739 740 do { 741 struct bch_inode_unpacked inode_u; 742 struct btree_iter inode_iter = {}; 743 744 bch2_trans_begin(trans); 745 746 ret2 = bch2_inode_peek(trans, &inode_iter, &inode_u, 747 dst_inum, BTREE_ITER_intent); 748 749 if (!ret2 && 750 inode_u.bi_size < new_i_size) { 751 inode_u.bi_size = new_i_size; 752 ret2 = bch2_inode_write(trans, &inode_iter, &inode_u) ?: 753 bch2_trans_commit(trans, NULL, NULL, 754 BCH_TRANS_COMMIT_no_enospc); 755 } 756 757 bch2_trans_iter_exit(trans, &inode_iter); 758 } while (bch2_err_matches(ret2, BCH_ERR_transaction_restart)); 759 err: 760 bch2_trans_put(trans); 761 bch2_bkey_buf_exit(&new_src, c); 762 bch2_bkey_buf_exit(&new_dst, c); 763 764 bch2_write_ref_put(c, BCH_WRITE_REF_reflink); 765 766 return dst_done ?: ret ?: ret2; 767 } 768 769 /* fsck */ 770 771 static int bch2_gc_write_reflink_key(struct btree_trans *trans, 772 struct btree_iter *iter, 773 struct bkey_s_c k, 774 size_t *idx) 775 { 776 struct bch_fs *c = trans->c; 777 const __le64 *refcount = bkey_refcount_c(k); 778 struct printbuf buf = PRINTBUF; 779 struct reflink_gc *r; 780 int ret = 0; 781 782 if (!refcount) 783 return 0; 784 785 while ((r = genradix_ptr(&c->reflink_gc_table, *idx)) && 786 r->offset < k.k->p.offset) 787 ++*idx; 788 789 if (!r || 790 r->offset != k.k->p.offset || 791 r->size != k.k->size) { 792 bch_err(c, "unexpected inconsistency walking reflink table at gc finish"); 793 return -EINVAL; 794 } 795 796 if (fsck_err_on(r->refcount != le64_to_cpu(*refcount), 797 trans, reflink_v_refcount_wrong, 798 "reflink key has wrong refcount:\n" 799 "%s\n" 800 "should be %u", 801 (bch2_bkey_val_to_text(&buf, c, k), buf.buf), 802 r->refcount)) { 803 struct bkey_i *new = bch2_bkey_make_mut_noupdate(trans, k); 804 ret = PTR_ERR_OR_ZERO(new); 805 if (ret) 806 goto out; 807 808 if (!r->refcount) 809 new->k.type = KEY_TYPE_deleted; 810 else 811 *bkey_refcount(bkey_i_to_s(new)) = cpu_to_le64(r->refcount); 812 ret = bch2_trans_update(trans, iter, new, 0); 813 } 814 out: 815 fsck_err: 816 printbuf_exit(&buf); 817 return ret; 818 } 819 820 int bch2_gc_reflink_done(struct bch_fs *c) 821 { 822 size_t idx = 0; 823 824 int ret = bch2_trans_run(c, 825 for_each_btree_key_commit(trans, iter, 826 BTREE_ID_reflink, POS_MIN, 827 BTREE_ITER_prefetch, k, 828 NULL, NULL, BCH_TRANS_COMMIT_no_enospc, 829 bch2_gc_write_reflink_key(trans, &iter, k, &idx))); 830 c->reflink_gc_nr = 0; 831 return ret; 832 } 833 834 int bch2_gc_reflink_start(struct bch_fs *c) 835 { 836 c->reflink_gc_nr = 0; 837 838 int ret = bch2_trans_run(c, 839 for_each_btree_key(trans, iter, BTREE_ID_reflink, POS_MIN, 840 BTREE_ITER_prefetch, k, ({ 841 const __le64 *refcount = bkey_refcount_c(k); 842 843 if (!refcount) 844 continue; 845 846 struct reflink_gc *r = genradix_ptr_alloc(&c->reflink_gc_table, 847 c->reflink_gc_nr++, GFP_KERNEL); 848 if (!r) { 849 ret = -BCH_ERR_ENOMEM_gc_reflink_start; 850 break; 851 } 852 853 r->offset = k.k->p.offset; 854 r->size = k.k->size; 855 r->refcount = 0; 856 0; 857 }))); 858 859 bch_err_fn(c, ret); 860 return ret; 861 } 862