1 // SPDX-License-Identifier: GPL-2.0 2 #include "bcachefs.h" 3 #include "bkey_buf.h" 4 #include "btree_update.h" 5 #include "buckets.h" 6 #include "error.h" 7 #include "extents.h" 8 #include "inode.h" 9 #include "io_misc.h" 10 #include "io_write.h" 11 #include "rebalance.h" 12 #include "reflink.h" 13 #include "subvolume.h" 14 #include "super-io.h" 15 16 #include <linux/sched/signal.h> 17 18 static inline bool bkey_extent_is_reflink_data(const struct bkey *k) 19 { 20 switch (k->type) { 21 case KEY_TYPE_reflink_v: 22 case KEY_TYPE_indirect_inline_data: 23 return true; 24 default: 25 return false; 26 } 27 } 28 29 static inline unsigned bkey_type_to_indirect(const struct bkey *k) 30 { 31 switch (k->type) { 32 case KEY_TYPE_extent: 33 return KEY_TYPE_reflink_v; 34 case KEY_TYPE_inline_data: 35 return KEY_TYPE_indirect_inline_data; 36 default: 37 return 0; 38 } 39 } 40 41 /* reflink pointers */ 42 43 int bch2_reflink_p_validate(struct bch_fs *c, struct bkey_s_c k, 44 struct bkey_validate_context from) 45 { 46 struct bkey_s_c_reflink_p p = bkey_s_c_to_reflink_p(k); 47 int ret = 0; 48 49 bkey_fsck_err_on(REFLINK_P_IDX(p.v) < le32_to_cpu(p.v->front_pad), 50 c, reflink_p_front_pad_bad, 51 "idx < front_pad (%llu < %u)", 52 REFLINK_P_IDX(p.v), le32_to_cpu(p.v->front_pad)); 53 fsck_err: 54 return ret; 55 } 56 57 void bch2_reflink_p_to_text(struct printbuf *out, struct bch_fs *c, 58 struct bkey_s_c k) 59 { 60 struct bkey_s_c_reflink_p p = bkey_s_c_to_reflink_p(k); 61 62 prt_printf(out, "idx %llu front_pad %u back_pad %u", 63 REFLINK_P_IDX(p.v), 64 le32_to_cpu(p.v->front_pad), 65 le32_to_cpu(p.v->back_pad)); 66 } 67 68 bool bch2_reflink_p_merge(struct bch_fs *c, struct bkey_s _l, struct bkey_s_c _r) 69 { 70 struct bkey_s_reflink_p l = bkey_s_to_reflink_p(_l); 71 struct bkey_s_c_reflink_p r = bkey_s_c_to_reflink_p(_r); 72 73 /* 74 * Disabled for now, the triggers code needs to be reworked for merging 75 * of reflink pointers to work: 76 */ 77 return false; 78 79 if (REFLINK_P_IDX(l.v) + l.k->size != REFLINK_P_IDX(r.v)) 80 return false; 81 82 if (REFLINK_P_ERROR(l.v) != REFLINK_P_ERROR(r.v)) 83 return false; 84 85 bch2_key_resize(l.k, l.k->size + r.k->size); 86 return true; 87 } 88 89 /* indirect extents */ 90 91 int bch2_reflink_v_validate(struct bch_fs *c, struct bkey_s_c k, 92 struct bkey_validate_context from) 93 { 94 int ret = 0; 95 96 bkey_fsck_err_on(bkey_gt(k.k->p, POS(0, REFLINK_P_IDX_MAX)), 97 c, reflink_v_pos_bad, 98 "indirect extent above maximum position 0:%llu", 99 REFLINK_P_IDX_MAX); 100 101 ret = bch2_bkey_ptrs_validate(c, k, from); 102 fsck_err: 103 return ret; 104 } 105 106 void bch2_reflink_v_to_text(struct printbuf *out, struct bch_fs *c, 107 struct bkey_s_c k) 108 { 109 struct bkey_s_c_reflink_v r = bkey_s_c_to_reflink_v(k); 110 111 prt_printf(out, "refcount: %llu ", le64_to_cpu(r.v->refcount)); 112 113 bch2_bkey_ptrs_to_text(out, c, k); 114 } 115 116 #if 0 117 Currently disabled, needs to be debugged: 118 119 bool bch2_reflink_v_merge(struct bch_fs *c, struct bkey_s _l, struct bkey_s_c _r) 120 { 121 struct bkey_s_reflink_v l = bkey_s_to_reflink_v(_l); 122 struct bkey_s_c_reflink_v r = bkey_s_c_to_reflink_v(_r); 123 124 return l.v->refcount == r.v->refcount && bch2_extent_merge(c, _l, _r); 125 } 126 #endif 127 128 /* indirect inline data */ 129 130 int bch2_indirect_inline_data_validate(struct bch_fs *c, struct bkey_s_c k, 131 struct bkey_validate_context from) 132 { 133 return 0; 134 } 135 136 void bch2_indirect_inline_data_to_text(struct printbuf *out, 137 struct bch_fs *c, struct bkey_s_c k) 138 { 139 struct bkey_s_c_indirect_inline_data d = bkey_s_c_to_indirect_inline_data(k); 140 unsigned datalen = bkey_inline_data_bytes(k.k); 141 142 prt_printf(out, "refcount %llu datalen %u: %*phN", 143 le64_to_cpu(d.v->refcount), datalen, 144 min(datalen, 32U), d.v->data); 145 } 146 147 /* lookup */ 148 149 static int bch2_indirect_extent_not_missing(struct btree_trans *trans, struct bkey_s_c_reflink_p p, 150 bool should_commit) 151 { 152 struct bkey_i_reflink_p *new = bch2_bkey_make_mut_noupdate_typed(trans, p.s_c, reflink_p); 153 int ret = PTR_ERR_OR_ZERO(new); 154 if (ret) 155 return ret; 156 157 SET_REFLINK_P_ERROR(&new->v, false); 158 ret = bch2_btree_insert_trans(trans, BTREE_ID_extents, &new->k_i, BTREE_TRIGGER_norun); 159 if (ret) 160 return ret; 161 162 if (!should_commit) 163 return 0; 164 165 return bch2_trans_commit(trans, NULL, NULL, BCH_TRANS_COMMIT_no_enospc) ?: 166 -BCH_ERR_transaction_restart_nested; 167 } 168 169 static int bch2_indirect_extent_missing_error(struct btree_trans *trans, 170 struct bkey_s_c_reflink_p p, 171 u64 missing_start, u64 missing_end, 172 bool should_commit) 173 { 174 if (REFLINK_P_ERROR(p.v)) 175 return -BCH_ERR_missing_indirect_extent; 176 177 struct bch_fs *c = trans->c; 178 u64 live_start = REFLINK_P_IDX(p.v); 179 u64 live_end = REFLINK_P_IDX(p.v) + p.k->size; 180 u64 refd_start = live_start - le32_to_cpu(p.v->front_pad); 181 u64 refd_end = live_end + le32_to_cpu(p.v->back_pad); 182 struct printbuf buf = PRINTBUF; 183 int ret = 0; 184 185 BUG_ON(missing_start < refd_start); 186 BUG_ON(missing_end > refd_end); 187 188 if (fsck_err(trans, reflink_p_to_missing_reflink_v, 189 "pointer to missing indirect extent\n" 190 " %s\n" 191 " missing range %llu-%llu", 192 (bch2_bkey_val_to_text(&buf, c, p.s_c), buf.buf), 193 missing_start, missing_end)) { 194 struct bkey_i_reflink_p *new = bch2_bkey_make_mut_noupdate_typed(trans, p.s_c, reflink_p); 195 ret = PTR_ERR_OR_ZERO(new); 196 if (ret) 197 goto err; 198 199 /* 200 * Is the missing range not actually needed? 201 * 202 * p.v->idx refers to the data that we actually want, but if the 203 * indirect extent we point to was bigger, front_pad and back_pad 204 * indicate the range we took a reference on. 205 */ 206 207 if (missing_end <= live_start) { 208 new->v.front_pad = cpu_to_le32(live_start - missing_end); 209 } else if (missing_start >= live_end) { 210 new->v.back_pad = cpu_to_le32(missing_start - live_end); 211 } else { 212 struct bpos new_start = bkey_start_pos(&new->k); 213 struct bpos new_end = new->k.p; 214 215 if (missing_start > live_start) 216 new_start.offset += missing_start - live_start; 217 if (missing_end < live_end) 218 new_end.offset -= live_end - missing_end; 219 220 bch2_cut_front(new_start, &new->k_i); 221 bch2_cut_back(new_end, &new->k_i); 222 223 SET_REFLINK_P_ERROR(&new->v, true); 224 } 225 226 ret = bch2_btree_insert_trans(trans, BTREE_ID_extents, &new->k_i, BTREE_TRIGGER_norun); 227 if (ret) 228 goto err; 229 230 if (should_commit) 231 ret = bch2_trans_commit(trans, NULL, NULL, BCH_TRANS_COMMIT_no_enospc) ?: 232 -BCH_ERR_transaction_restart_nested; 233 } 234 err: 235 fsck_err: 236 printbuf_exit(&buf); 237 return ret; 238 } 239 240 /* 241 * This is used from the read path, which doesn't expect to have to do a 242 * transaction commit, and from triggers, which should not be doing a commit: 243 */ 244 struct bkey_s_c bch2_lookup_indirect_extent(struct btree_trans *trans, 245 struct btree_iter *iter, 246 s64 *offset_into_extent, 247 struct bkey_s_c_reflink_p p, 248 bool should_commit, 249 unsigned iter_flags) 250 { 251 BUG_ON(*offset_into_extent < -((s64) le32_to_cpu(p.v->front_pad))); 252 BUG_ON(*offset_into_extent >= p.k->size + le32_to_cpu(p.v->back_pad)); 253 254 u64 reflink_offset = REFLINK_P_IDX(p.v) + *offset_into_extent; 255 256 struct bkey_s_c k = bch2_bkey_get_iter(trans, iter, BTREE_ID_reflink, 257 POS(0, reflink_offset), iter_flags); 258 if (bkey_err(k)) 259 return k; 260 261 if (unlikely(!bkey_extent_is_reflink_data(k.k))) { 262 bch2_trans_iter_exit(trans, iter); 263 264 unsigned size = min((u64) k.k->size, 265 REFLINK_P_IDX(p.v) + p.k->size + le32_to_cpu(p.v->back_pad) - 266 reflink_offset); 267 bch2_key_resize(&iter->k, size); 268 269 int ret = bch2_indirect_extent_missing_error(trans, p, reflink_offset, 270 k.k->p.offset, should_commit); 271 if (ret) 272 return bkey_s_c_err(ret); 273 } else if (unlikely(REFLINK_P_ERROR(p.v))) { 274 bch2_trans_iter_exit(trans, iter); 275 276 int ret = bch2_indirect_extent_not_missing(trans, p, should_commit); 277 if (ret) 278 return bkey_s_c_err(ret); 279 } 280 281 *offset_into_extent = reflink_offset - bkey_start_offset(k.k); 282 return k; 283 } 284 285 /* reflink pointer trigger */ 286 287 static int trans_trigger_reflink_p_segment(struct btree_trans *trans, 288 struct bkey_s_c_reflink_p p, u64 *idx, 289 enum btree_iter_update_trigger_flags flags) 290 { 291 struct bch_fs *c = trans->c; 292 struct printbuf buf = PRINTBUF; 293 294 s64 offset_into_extent = *idx - REFLINK_P_IDX(p.v); 295 struct btree_iter iter; 296 struct bkey_s_c k = bch2_lookup_indirect_extent(trans, &iter, &offset_into_extent, p, false, 297 BTREE_ITER_intent| 298 BTREE_ITER_with_updates); 299 int ret = bkey_err(k); 300 if (ret) 301 return ret; 302 303 if (bkey_deleted(k.k)) { 304 if (!(flags & BTREE_TRIGGER_overwrite)) 305 ret = -BCH_ERR_missing_indirect_extent; 306 goto next; 307 } 308 309 struct bkey_i *new = bch2_bkey_make_mut_noupdate(trans, k); 310 ret = PTR_ERR_OR_ZERO(new); 311 if (ret) 312 goto err; 313 314 __le64 *refcount = bkey_refcount(bkey_i_to_s(new)); 315 if (!*refcount && (flags & BTREE_TRIGGER_overwrite)) { 316 bch2_bkey_val_to_text(&buf, c, p.s_c); 317 prt_printf(&buf, "\n "); 318 bch2_bkey_val_to_text(&buf, c, k); 319 log_fsck_err(trans, reflink_refcount_underflow, 320 "indirect extent refcount underflow while marking\n %s", 321 buf.buf); 322 goto next; 323 } 324 325 if (flags & BTREE_TRIGGER_insert) { 326 struct bch_reflink_p *v = (struct bch_reflink_p *) p.v; 327 u64 pad; 328 329 pad = max_t(s64, le32_to_cpu(v->front_pad), 330 REFLINK_P_IDX(v) - bkey_start_offset(&new->k)); 331 BUG_ON(pad > U32_MAX); 332 v->front_pad = cpu_to_le32(pad); 333 334 pad = max_t(s64, le32_to_cpu(v->back_pad), 335 new->k.p.offset - p.k->size - REFLINK_P_IDX(v)); 336 BUG_ON(pad > U32_MAX); 337 v->back_pad = cpu_to_le32(pad); 338 } 339 340 le64_add_cpu(refcount, !(flags & BTREE_TRIGGER_overwrite) ? 1 : -1); 341 342 bch2_btree_iter_set_pos_to_extent_start(&iter); 343 ret = bch2_trans_update(trans, &iter, new, 0); 344 if (ret) 345 goto err; 346 next: 347 *idx = k.k->p.offset; 348 err: 349 fsck_err: 350 bch2_trans_iter_exit(trans, &iter); 351 printbuf_exit(&buf); 352 return ret; 353 } 354 355 static s64 gc_trigger_reflink_p_segment(struct btree_trans *trans, 356 struct bkey_s_c_reflink_p p, u64 *idx, 357 enum btree_iter_update_trigger_flags flags, 358 size_t r_idx) 359 { 360 struct bch_fs *c = trans->c; 361 struct reflink_gc *r; 362 int add = !(flags & BTREE_TRIGGER_overwrite) ? 1 : -1; 363 u64 next_idx = REFLINK_P_IDX(p.v) + p.k->size + le32_to_cpu(p.v->back_pad); 364 s64 ret = 0; 365 struct printbuf buf = PRINTBUF; 366 367 if (r_idx >= c->reflink_gc_nr) 368 goto not_found; 369 370 r = genradix_ptr(&c->reflink_gc_table, r_idx); 371 next_idx = min(next_idx, r->offset - r->size); 372 if (*idx < next_idx) 373 goto not_found; 374 375 BUG_ON((s64) r->refcount + add < 0); 376 377 if (flags & BTREE_TRIGGER_gc) 378 r->refcount += add; 379 *idx = r->offset; 380 return 0; 381 not_found: 382 if (flags & BTREE_TRIGGER_check_repair) { 383 ret = bch2_indirect_extent_missing_error(trans, p, *idx, next_idx, false); 384 if (ret) 385 goto err; 386 } 387 388 *idx = next_idx; 389 err: 390 printbuf_exit(&buf); 391 return ret; 392 } 393 394 static int __trigger_reflink_p(struct btree_trans *trans, 395 enum btree_id btree_id, unsigned level, struct bkey_s_c k, 396 enum btree_iter_update_trigger_flags flags) 397 { 398 struct bch_fs *c = trans->c; 399 struct bkey_s_c_reflink_p p = bkey_s_c_to_reflink_p(k); 400 int ret = 0; 401 402 u64 idx = REFLINK_P_IDX(p.v) - le32_to_cpu(p.v->front_pad); 403 u64 end = REFLINK_P_IDX(p.v) + p.k->size + le32_to_cpu(p.v->back_pad); 404 405 if (flags & BTREE_TRIGGER_transactional) { 406 while (idx < end && !ret) 407 ret = trans_trigger_reflink_p_segment(trans, p, &idx, flags); 408 } 409 410 if (flags & (BTREE_TRIGGER_check_repair|BTREE_TRIGGER_gc)) { 411 size_t l = 0, r = c->reflink_gc_nr; 412 413 while (l < r) { 414 size_t m = l + (r - l) / 2; 415 struct reflink_gc *ref = genradix_ptr(&c->reflink_gc_table, m); 416 if (ref->offset <= idx) 417 l = m + 1; 418 else 419 r = m; 420 } 421 422 while (idx < end && !ret) 423 ret = gc_trigger_reflink_p_segment(trans, p, &idx, flags, l++); 424 } 425 426 return ret; 427 } 428 429 int bch2_trigger_reflink_p(struct btree_trans *trans, 430 enum btree_id btree_id, unsigned level, 431 struct bkey_s_c old, 432 struct bkey_s new, 433 enum btree_iter_update_trigger_flags flags) 434 { 435 if ((flags & BTREE_TRIGGER_transactional) && 436 (flags & BTREE_TRIGGER_insert)) { 437 struct bch_reflink_p *v = bkey_s_to_reflink_p(new).v; 438 439 v->front_pad = v->back_pad = 0; 440 } 441 442 return trigger_run_overwrite_then_insert(__trigger_reflink_p, trans, btree_id, level, old, new, flags); 443 } 444 445 /* indirect extent trigger */ 446 447 static inline void 448 check_indirect_extent_deleting(struct bkey_s new, 449 enum btree_iter_update_trigger_flags *flags) 450 { 451 if ((*flags & BTREE_TRIGGER_insert) && !*bkey_refcount(new)) { 452 new.k->type = KEY_TYPE_deleted; 453 new.k->size = 0; 454 set_bkey_val_u64s(new.k, 0); 455 *flags &= ~BTREE_TRIGGER_insert; 456 } 457 } 458 459 int bch2_trigger_reflink_v(struct btree_trans *trans, 460 enum btree_id btree_id, unsigned level, 461 struct bkey_s_c old, struct bkey_s new, 462 enum btree_iter_update_trigger_flags flags) 463 { 464 if ((flags & BTREE_TRIGGER_transactional) && 465 (flags & BTREE_TRIGGER_insert)) 466 check_indirect_extent_deleting(new, &flags); 467 468 return bch2_trigger_extent(trans, btree_id, level, old, new, flags); 469 } 470 471 int bch2_trigger_indirect_inline_data(struct btree_trans *trans, 472 enum btree_id btree_id, unsigned level, 473 struct bkey_s_c old, struct bkey_s new, 474 enum btree_iter_update_trigger_flags flags) 475 { 476 check_indirect_extent_deleting(new, &flags); 477 478 return 0; 479 } 480 481 /* create */ 482 483 static int bch2_make_extent_indirect(struct btree_trans *trans, 484 struct btree_iter *extent_iter, 485 struct bkey_i *orig, 486 bool reflink_p_may_update_opts_field) 487 { 488 struct bch_fs *c = trans->c; 489 struct btree_iter reflink_iter = { NULL }; 490 struct bkey_s_c k; 491 struct bkey_i *r_v; 492 struct bkey_i_reflink_p *r_p; 493 __le64 *refcount; 494 int ret; 495 496 if (orig->k.type == KEY_TYPE_inline_data) 497 bch2_check_set_feature(c, BCH_FEATURE_reflink_inline_data); 498 499 bch2_trans_iter_init(trans, &reflink_iter, BTREE_ID_reflink, POS_MAX, 500 BTREE_ITER_intent); 501 k = bch2_btree_iter_peek_prev(&reflink_iter); 502 ret = bkey_err(k); 503 if (ret) 504 goto err; 505 506 /* 507 * XXX: we're assuming that 56 bits will be enough for the life of the 508 * filesystem: we need to implement wraparound, with a cursor in the 509 * logged ops btree: 510 */ 511 if (bkey_ge(reflink_iter.pos, POS(0, REFLINK_P_IDX_MAX - orig->k.size))) 512 return -ENOSPC; 513 514 r_v = bch2_trans_kmalloc(trans, sizeof(__le64) + bkey_bytes(&orig->k)); 515 ret = PTR_ERR_OR_ZERO(r_v); 516 if (ret) 517 goto err; 518 519 bkey_init(&r_v->k); 520 r_v->k.type = bkey_type_to_indirect(&orig->k); 521 r_v->k.p = reflink_iter.pos; 522 bch2_key_resize(&r_v->k, orig->k.size); 523 r_v->k.bversion = orig->k.bversion; 524 525 set_bkey_val_bytes(&r_v->k, sizeof(__le64) + bkey_val_bytes(&orig->k)); 526 527 refcount = bkey_refcount(bkey_i_to_s(r_v)); 528 *refcount = 0; 529 memcpy(refcount + 1, &orig->v, bkey_val_bytes(&orig->k)); 530 531 ret = bch2_trans_update(trans, &reflink_iter, r_v, 0); 532 if (ret) 533 goto err; 534 535 /* 536 * orig is in a bkey_buf which statically allocates 5 64s for the val, 537 * so we know it will be big enough: 538 */ 539 orig->k.type = KEY_TYPE_reflink_p; 540 r_p = bkey_i_to_reflink_p(orig); 541 set_bkey_val_bytes(&r_p->k, sizeof(r_p->v)); 542 543 /* FORTIFY_SOURCE is broken here, and doesn't provide unsafe_memset() */ 544 #if !defined(__NO_FORTIFY) && defined(__OPTIMIZE__) && defined(CONFIG_FORTIFY_SOURCE) 545 __underlying_memset(&r_p->v, 0, sizeof(r_p->v)); 546 #else 547 memset(&r_p->v, 0, sizeof(r_p->v)); 548 #endif 549 550 SET_REFLINK_P_IDX(&r_p->v, bkey_start_offset(&r_v->k)); 551 552 if (reflink_p_may_update_opts_field) 553 SET_REFLINK_P_MAY_UPDATE_OPTIONS(&r_p->v, true); 554 555 ret = bch2_trans_update(trans, extent_iter, &r_p->k_i, 556 BTREE_UPDATE_internal_snapshot_node); 557 err: 558 bch2_trans_iter_exit(trans, &reflink_iter); 559 560 return ret; 561 } 562 563 static struct bkey_s_c get_next_src(struct btree_iter *iter, struct bpos end) 564 { 565 struct bkey_s_c k; 566 int ret; 567 568 for_each_btree_key_max_continue_norestart(*iter, end, 0, k, ret) { 569 if (bkey_extent_is_unwritten(k)) 570 continue; 571 572 if (bkey_extent_is_data(k.k)) 573 return k; 574 } 575 576 if (bkey_ge(iter->pos, end)) 577 bch2_btree_iter_set_pos(iter, end); 578 return ret ? bkey_s_c_err(ret) : bkey_s_c_null; 579 } 580 581 s64 bch2_remap_range(struct bch_fs *c, 582 subvol_inum dst_inum, u64 dst_offset, 583 subvol_inum src_inum, u64 src_offset, 584 u64 remap_sectors, 585 u64 new_i_size, s64 *i_sectors_delta, 586 bool may_change_src_io_path_opts) 587 { 588 struct btree_trans *trans; 589 struct btree_iter dst_iter, src_iter; 590 struct bkey_s_c src_k; 591 struct bkey_buf new_dst, new_src; 592 struct bpos dst_start = POS(dst_inum.inum, dst_offset); 593 struct bpos src_start = POS(src_inum.inum, src_offset); 594 struct bpos dst_end = dst_start, src_end = src_start; 595 struct bch_io_opts opts; 596 struct bpos src_want; 597 u64 dst_done = 0; 598 u32 dst_snapshot, src_snapshot; 599 bool reflink_p_may_update_opts_field = 600 bch2_request_incompat_feature(c, bcachefs_metadata_version_reflink_p_may_update_opts); 601 int ret = 0, ret2 = 0; 602 603 if (!bch2_write_ref_tryget(c, BCH_WRITE_REF_reflink)) 604 return -BCH_ERR_erofs_no_writes; 605 606 bch2_check_set_feature(c, BCH_FEATURE_reflink); 607 608 dst_end.offset += remap_sectors; 609 src_end.offset += remap_sectors; 610 611 bch2_bkey_buf_init(&new_dst); 612 bch2_bkey_buf_init(&new_src); 613 trans = bch2_trans_get(c); 614 615 ret = bch2_inum_opts_get(trans, src_inum, &opts); 616 if (ret) 617 goto err; 618 619 bch2_trans_iter_init(trans, &src_iter, BTREE_ID_extents, src_start, 620 BTREE_ITER_intent); 621 bch2_trans_iter_init(trans, &dst_iter, BTREE_ID_extents, dst_start, 622 BTREE_ITER_intent); 623 624 while ((ret == 0 || 625 bch2_err_matches(ret, BCH_ERR_transaction_restart)) && 626 bkey_lt(dst_iter.pos, dst_end)) { 627 struct disk_reservation disk_res = { 0 }; 628 629 bch2_trans_begin(trans); 630 631 if (fatal_signal_pending(current)) { 632 ret = -EINTR; 633 break; 634 } 635 636 ret = bch2_subvolume_get_snapshot(trans, src_inum.subvol, 637 &src_snapshot); 638 if (ret) 639 continue; 640 641 bch2_btree_iter_set_snapshot(&src_iter, src_snapshot); 642 643 ret = bch2_subvolume_get_snapshot(trans, dst_inum.subvol, 644 &dst_snapshot); 645 if (ret) 646 continue; 647 648 bch2_btree_iter_set_snapshot(&dst_iter, dst_snapshot); 649 650 if (dst_inum.inum < src_inum.inum) { 651 /* Avoid some lock cycle transaction restarts */ 652 ret = bch2_btree_iter_traverse(&dst_iter); 653 if (ret) 654 continue; 655 } 656 657 dst_done = dst_iter.pos.offset - dst_start.offset; 658 src_want = POS(src_start.inode, src_start.offset + dst_done); 659 bch2_btree_iter_set_pos(&src_iter, src_want); 660 661 src_k = get_next_src(&src_iter, src_end); 662 ret = bkey_err(src_k); 663 if (ret) 664 continue; 665 666 if (bkey_lt(src_want, src_iter.pos)) { 667 ret = bch2_fpunch_at(trans, &dst_iter, dst_inum, 668 min(dst_end.offset, 669 dst_iter.pos.offset + 670 src_iter.pos.offset - src_want.offset), 671 i_sectors_delta); 672 continue; 673 } 674 675 if (src_k.k->type != KEY_TYPE_reflink_p) { 676 bch2_btree_iter_set_pos_to_extent_start(&src_iter); 677 678 bch2_bkey_buf_reassemble(&new_src, c, src_k); 679 src_k = bkey_i_to_s_c(new_src.k); 680 681 ret = bch2_make_extent_indirect(trans, &src_iter, 682 new_src.k, 683 reflink_p_may_update_opts_field); 684 if (ret) 685 continue; 686 687 BUG_ON(src_k.k->type != KEY_TYPE_reflink_p); 688 } 689 690 if (src_k.k->type == KEY_TYPE_reflink_p) { 691 struct bkey_s_c_reflink_p src_p = 692 bkey_s_c_to_reflink_p(src_k); 693 struct bkey_i_reflink_p *dst_p = 694 bkey_reflink_p_init(new_dst.k); 695 696 u64 offset = REFLINK_P_IDX(src_p.v) + 697 (src_want.offset - 698 bkey_start_offset(src_k.k)); 699 700 SET_REFLINK_P_IDX(&dst_p->v, offset); 701 702 if (reflink_p_may_update_opts_field && 703 may_change_src_io_path_opts) 704 SET_REFLINK_P_MAY_UPDATE_OPTIONS(&dst_p->v, true); 705 } else { 706 BUG(); 707 } 708 709 new_dst.k->k.p = dst_iter.pos; 710 bch2_key_resize(&new_dst.k->k, 711 min(src_k.k->p.offset - src_want.offset, 712 dst_end.offset - dst_iter.pos.offset)); 713 714 ret = bch2_bkey_set_needs_rebalance(c, &opts, new_dst.k) ?: 715 bch2_extent_update(trans, dst_inum, &dst_iter, 716 new_dst.k, &disk_res, 717 new_i_size, i_sectors_delta, 718 true); 719 bch2_disk_reservation_put(c, &disk_res); 720 } 721 bch2_trans_iter_exit(trans, &dst_iter); 722 bch2_trans_iter_exit(trans, &src_iter); 723 724 BUG_ON(!ret && !bkey_eq(dst_iter.pos, dst_end)); 725 BUG_ON(bkey_gt(dst_iter.pos, dst_end)); 726 727 dst_done = dst_iter.pos.offset - dst_start.offset; 728 new_i_size = min(dst_iter.pos.offset << 9, new_i_size); 729 730 do { 731 struct bch_inode_unpacked inode_u; 732 struct btree_iter inode_iter = { NULL }; 733 734 bch2_trans_begin(trans); 735 736 ret2 = bch2_inode_peek(trans, &inode_iter, &inode_u, 737 dst_inum, BTREE_ITER_intent); 738 739 if (!ret2 && 740 inode_u.bi_size < new_i_size) { 741 inode_u.bi_size = new_i_size; 742 ret2 = bch2_inode_write(trans, &inode_iter, &inode_u) ?: 743 bch2_trans_commit(trans, NULL, NULL, 744 BCH_TRANS_COMMIT_no_enospc); 745 } 746 747 bch2_trans_iter_exit(trans, &inode_iter); 748 } while (bch2_err_matches(ret2, BCH_ERR_transaction_restart)); 749 err: 750 bch2_trans_put(trans); 751 bch2_bkey_buf_exit(&new_src, c); 752 bch2_bkey_buf_exit(&new_dst, c); 753 754 bch2_write_ref_put(c, BCH_WRITE_REF_reflink); 755 756 return dst_done ?: ret ?: ret2; 757 } 758 759 /* fsck */ 760 761 static int bch2_gc_write_reflink_key(struct btree_trans *trans, 762 struct btree_iter *iter, 763 struct bkey_s_c k, 764 size_t *idx) 765 { 766 struct bch_fs *c = trans->c; 767 const __le64 *refcount = bkey_refcount_c(k); 768 struct printbuf buf = PRINTBUF; 769 struct reflink_gc *r; 770 int ret = 0; 771 772 if (!refcount) 773 return 0; 774 775 while ((r = genradix_ptr(&c->reflink_gc_table, *idx)) && 776 r->offset < k.k->p.offset) 777 ++*idx; 778 779 if (!r || 780 r->offset != k.k->p.offset || 781 r->size != k.k->size) { 782 bch_err(c, "unexpected inconsistency walking reflink table at gc finish"); 783 return -EINVAL; 784 } 785 786 if (fsck_err_on(r->refcount != le64_to_cpu(*refcount), 787 trans, reflink_v_refcount_wrong, 788 "reflink key has wrong refcount:\n" 789 " %s\n" 790 " should be %u", 791 (bch2_bkey_val_to_text(&buf, c, k), buf.buf), 792 r->refcount)) { 793 struct bkey_i *new = bch2_bkey_make_mut_noupdate(trans, k); 794 ret = PTR_ERR_OR_ZERO(new); 795 if (ret) 796 goto out; 797 798 if (!r->refcount) 799 new->k.type = KEY_TYPE_deleted; 800 else 801 *bkey_refcount(bkey_i_to_s(new)) = cpu_to_le64(r->refcount); 802 ret = bch2_trans_update(trans, iter, new, 0); 803 } 804 out: 805 fsck_err: 806 printbuf_exit(&buf); 807 return ret; 808 } 809 810 int bch2_gc_reflink_done(struct bch_fs *c) 811 { 812 size_t idx = 0; 813 814 int ret = bch2_trans_run(c, 815 for_each_btree_key_commit(trans, iter, 816 BTREE_ID_reflink, POS_MIN, 817 BTREE_ITER_prefetch, k, 818 NULL, NULL, BCH_TRANS_COMMIT_no_enospc, 819 bch2_gc_write_reflink_key(trans, &iter, k, &idx))); 820 c->reflink_gc_nr = 0; 821 return ret; 822 } 823 824 int bch2_gc_reflink_start(struct bch_fs *c) 825 { 826 c->reflink_gc_nr = 0; 827 828 int ret = bch2_trans_run(c, 829 for_each_btree_key(trans, iter, BTREE_ID_reflink, POS_MIN, 830 BTREE_ITER_prefetch, k, ({ 831 const __le64 *refcount = bkey_refcount_c(k); 832 833 if (!refcount) 834 continue; 835 836 struct reflink_gc *r = genradix_ptr_alloc(&c->reflink_gc_table, 837 c->reflink_gc_nr++, GFP_KERNEL); 838 if (!r) { 839 ret = -BCH_ERR_ENOMEM_gc_reflink_start; 840 break; 841 } 842 843 r->offset = k.k->p.offset; 844 r->size = k.k->size; 845 r->refcount = 0; 846 0; 847 }))); 848 849 bch_err_fn(c, ret); 850 return ret; 851 } 852