2017-03-17 14:18:50 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
|
|
|
|
#include "bcachefs.h"
|
2022-03-18 08:51:27 +08:00
|
|
|
#include "backpointers.h"
|
2020-12-18 04:08:58 +08:00
|
|
|
#include "bkey_buf.h"
|
2018-10-06 12:46:55 +08:00
|
|
|
#include "alloc_background.h"
|
2017-03-17 14:18:50 +08:00
|
|
|
#include "btree_gc.h"
|
2023-08-06 04:08:44 +08:00
|
|
|
#include "btree_journal_iter.h"
|
2017-03-17 14:18:50 +08:00
|
|
|
#include "btree_update.h"
|
|
|
|
#include "btree_update_interior.h"
|
|
|
|
#include "btree_io.h"
|
2019-01-25 09:25:40 +08:00
|
|
|
#include "buckets.h"
|
2017-03-17 14:18:50 +08:00
|
|
|
#include "dirent.h"
|
2018-11-02 03:13:19 +08:00
|
|
|
#include "ec.h"
|
2022-07-19 07:42:58 +08:00
|
|
|
#include "errcode.h"
|
2017-03-17 14:18:50 +08:00
|
|
|
#include "error.h"
|
2019-10-03 06:35:36 +08:00
|
|
|
#include "fs-common.h"
|
2017-03-17 14:18:50 +08:00
|
|
|
#include "fsck.h"
|
|
|
|
#include "journal_io.h"
|
2019-04-12 10:39:39 +08:00
|
|
|
#include "journal_reclaim.h"
|
2019-04-05 09:53:12 +08:00
|
|
|
#include "journal_seq_blacklist.h"
|
2022-02-17 16:11:39 +08:00
|
|
|
#include "lru.h"
|
2023-08-28 06:27:41 +08:00
|
|
|
#include "logged_ops.h"
|
2021-03-23 06:39:16 +08:00
|
|
|
#include "move.h"
|
2017-03-17 14:18:50 +08:00
|
|
|
#include "quota.h"
|
bcachefs: rebalance_work
This adds a new btree, rebalance_work, to eliminate scanning required
for finding extents that need work done on them in the background - i.e.
for the background_target and background_compression options.
rebalance_work is a bitset btree, where a KEY_TYPE_set corresponds to an
extent in the extents or reflink btree at the same pos.
A new extent field is added, bch_extent_rebalance, which indicates that
this extent has work that needs to be done in the background - and which
options to use. This allows per-inode options to be propagated to
indirect extents - at least in some circumstances. In this patch,
changing IO options on a file will not propagate the new options to
indirect extents pointed to by that file.
Updating (setting/clearing) the rebalance_work btree is done by the
extent trigger, which looks at the bch_extent_rebalance field.
Scanning is still requrired after changing IO path options - either just
for a given inode, or for the whole filesystem. We indicate that
scanning is required by adding a KEY_TYPE_cookie key to the
rebalance_work btree: the cookie counter is so that we can detect that
scanning is still required when an option has been flipped mid-way
through an existing scan.
Future possible work:
- Propagate options to indirect extents when being changed
- Add other IO path options - nr_replicas, ec, to rebalance_work so
they can be applied in the background when they change
- Add a counter, for bcachefs fs usage output, showing the pending
amount of rebalance work: we'll probably want to do this after the
disk space accounting rewrite (moving it to a new btree)
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2023-10-21 01:33:14 +08:00
|
|
|
#include "rebalance.h"
|
2017-03-17 14:18:50 +08:00
|
|
|
#include "recovery.h"
|
2019-01-25 08:09:49 +08:00
|
|
|
#include "replicas.h"
|
2023-08-06 03:54:38 +08:00
|
|
|
#include "sb-clean.h"
|
2023-08-17 04:54:33 +08:00
|
|
|
#include "snapshot.h"
|
2021-03-16 12:42:25 +08:00
|
|
|
#include "subvolume.h"
|
2017-03-17 14:18:50 +08:00
|
|
|
#include "super-io.h"
|
|
|
|
|
2019-04-12 10:39:39 +08:00
|
|
|
#include <linux/sort.h>
|
2017-03-17 14:18:50 +08:00
|
|
|
#include <linux/stat.h>
|
|
|
|
|
|
|
|
#define QSTR(n) { { { .len = strlen(n) } }, .name = n }
|
|
|
|
|
2023-09-30 04:13:00 +08:00
|
|
|
static bool btree_id_is_alloc(enum btree_id id)
|
|
|
|
{
|
|
|
|
switch (id) {
|
|
|
|
case BTREE_ID_alloc:
|
|
|
|
case BTREE_ID_backpointers:
|
|
|
|
case BTREE_ID_need_discard:
|
|
|
|
case BTREE_ID_freespace:
|
|
|
|
case BTREE_ID_bucket_gens:
|
|
|
|
return true;
|
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-10-25 09:20:16 +08:00
|
|
|
/* for -o reconstruct_alloc: */
|
|
|
|
static void drop_alloc_keys(struct journal_keys *keys)
|
|
|
|
{
|
|
|
|
size_t src, dst;
|
|
|
|
|
|
|
|
for (src = 0, dst = 0; src < keys->nr; src++)
|
2023-09-30 04:13:00 +08:00
|
|
|
if (!btree_id_is_alloc(keys->d[src].btree_id))
|
2020-10-25 09:20:16 +08:00
|
|
|
keys->d[dst++] = keys->d[src];
|
|
|
|
|
|
|
|
keys->nr = dst;
|
|
|
|
}
|
|
|
|
|
2021-07-31 02:33:06 +08:00
|
|
|
/*
|
|
|
|
* Btree node pointers have a field to stack a pointer to the in memory btree
|
|
|
|
* node; we need to zero out this field when reading in btree nodes, or when
|
|
|
|
* reading in keys from the journal:
|
|
|
|
*/
|
|
|
|
static void zero_out_btree_mem_ptr(struct journal_keys *keys)
|
|
|
|
{
|
|
|
|
struct journal_key *i;
|
|
|
|
|
|
|
|
for (i = keys->d; i < keys->d + keys->nr; i++)
|
|
|
|
if (i->k->k.type == KEY_TYPE_btree_ptr_v2)
|
|
|
|
bkey_i_to_btree_ptr_v2(i->k)->v.mem_ptr = 0;
|
|
|
|
}
|
|
|
|
|
2019-04-12 10:39:39 +08:00
|
|
|
/* journal replay: */
|
|
|
|
|
|
|
|
static void replay_now_at(struct journal *j, u64 seq)
|
|
|
|
{
|
|
|
|
BUG_ON(seq < j->replay_journal_seq);
|
2022-04-12 13:31:33 +08:00
|
|
|
|
|
|
|
seq = min(seq, j->replay_journal_seq_end);
|
2019-04-12 10:39:39 +08:00
|
|
|
|
|
|
|
while (j->replay_journal_seq < seq)
|
|
|
|
bch2_journal_pin_put(j, j->replay_journal_seq++);
|
|
|
|
}
|
|
|
|
|
2021-12-28 12:10:06 +08:00
|
|
|
static int bch2_journal_replay_key(struct btree_trans *trans,
|
|
|
|
struct journal_key *k)
|
2020-01-01 05:17:42 +08:00
|
|
|
{
|
2021-08-31 03:18:31 +08:00
|
|
|
struct btree_iter iter;
|
2021-10-27 05:35:58 +08:00
|
|
|
unsigned iter_flags =
|
|
|
|
BTREE_ITER_INTENT|
|
|
|
|
BTREE_ITER_NOT_EXTENTS;
|
2023-06-26 06:04:46 +08:00
|
|
|
unsigned update_flags = BTREE_TRIGGER_NORUN;
|
2020-03-10 04:15:54 +08:00
|
|
|
int ret;
|
2020-01-01 05:17:42 +08:00
|
|
|
|
2023-06-26 06:04:46 +08:00
|
|
|
/*
|
|
|
|
* BTREE_UPDATE_KEY_CACHE_RECLAIM disables key cache lookup/update to
|
|
|
|
* keep the key cache coherent with the underlying btree. Nothing
|
|
|
|
* besides the allocator is doing updates yet so we don't need key cache
|
|
|
|
* coherency for non-alloc btrees, and key cache fills for snapshots
|
|
|
|
* btrees use BTREE_ITER_FILTER_SNAPSHOTS, which isn't available until
|
|
|
|
* the snapshots recovery pass runs.
|
|
|
|
*/
|
2021-10-27 05:35:58 +08:00
|
|
|
if (!k->level && k->btree_id == BTREE_ID_alloc)
|
2021-12-28 12:10:06 +08:00
|
|
|
iter_flags |= BTREE_ITER_CACHED;
|
2023-06-26 06:04:46 +08:00
|
|
|
else
|
|
|
|
update_flags |= BTREE_UPDATE_KEY_CACHE_RECLAIM;
|
2021-10-27 05:35:58 +08:00
|
|
|
|
|
|
|
bch2_trans_node_iter_init(trans, &iter, k->btree_id, k->k->k.p,
|
|
|
|
BTREE_MAX_DEPTH, k->level,
|
|
|
|
iter_flags);
|
2022-01-01 06:54:13 +08:00
|
|
|
ret = bch2_btree_iter_traverse(&iter);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* Must be checked with btree locked: */
|
|
|
|
if (k->overwritten)
|
|
|
|
goto out;
|
|
|
|
|
2023-06-26 06:04:46 +08:00
|
|
|
ret = bch2_trans_update(trans, &iter, k->k, update_flags);
|
2022-01-01 06:54:13 +08:00
|
|
|
out:
|
2021-08-31 03:18:31 +08:00
|
|
|
bch2_trans_iter_exit(trans, &iter);
|
2020-03-10 04:15:54 +08:00
|
|
|
return ret;
|
2020-01-01 05:17:42 +08:00
|
|
|
}
|
|
|
|
|
2019-10-06 00:54:53 +08:00
|
|
|
static int journal_sort_seq_cmp(const void *_l, const void *_r)
|
|
|
|
{
|
2021-12-30 04:55:25 +08:00
|
|
|
const struct journal_key *l = *((const struct journal_key **)_l);
|
|
|
|
const struct journal_key *r = *((const struct journal_key **)_r);
|
2019-10-06 00:54:53 +08:00
|
|
|
|
2021-12-28 12:10:06 +08:00
|
|
|
return cmp_int(l->journal_seq, r->journal_seq);
|
2019-10-06 00:54:53 +08:00
|
|
|
}
|
|
|
|
|
2023-07-09 10:33:29 +08:00
|
|
|
static int bch2_journal_replay(struct bch_fs *c)
|
2019-04-12 10:39:39 +08:00
|
|
|
{
|
2021-12-30 04:55:25 +08:00
|
|
|
struct journal_keys *keys = &c->journal_keys;
|
|
|
|
struct journal_key **keys_sorted, *k;
|
2019-04-12 10:39:39 +08:00
|
|
|
struct journal *j = &c->journal;
|
2023-07-09 10:33:29 +08:00
|
|
|
u64 start_seq = c->journal_replay_seq_start;
|
|
|
|
u64 end_seq = c->journal_replay_seq_start;
|
2021-12-30 04:55:25 +08:00
|
|
|
size_t i;
|
|
|
|
int ret;
|
|
|
|
|
2022-04-04 13:09:26 +08:00
|
|
|
move_gap(keys->d, keys->nr, keys->size, keys->gap, keys->nr);
|
|
|
|
keys->gap = keys->nr;
|
|
|
|
|
2023-08-08 00:04:05 +08:00
|
|
|
keys_sorted = kvmalloc_array(keys->nr, sizeof(*keys_sorted), GFP_KERNEL);
|
2021-12-30 04:55:25 +08:00
|
|
|
if (!keys_sorted)
|
2023-03-15 03:35:57 +08:00
|
|
|
return -BCH_ERR_ENOMEM_journal_replay;
|
2019-03-30 07:13:54 +08:00
|
|
|
|
2021-12-30 04:55:25 +08:00
|
|
|
for (i = 0; i < keys->nr; i++)
|
|
|
|
keys_sorted[i] = &keys->d[i];
|
2019-03-30 07:13:54 +08:00
|
|
|
|
2021-12-30 04:55:25 +08:00
|
|
|
sort(keys_sorted, keys->nr,
|
|
|
|
sizeof(keys_sorted[0]),
|
|
|
|
journal_sort_seq_cmp, NULL);
|
|
|
|
|
2022-12-14 23:39:04 +08:00
|
|
|
if (keys->nr) {
|
2023-03-22 20:27:58 +08:00
|
|
|
ret = bch2_journal_log_msg(c, "Starting journal replay (%zu keys in entries %llu-%llu)",
|
|
|
|
keys->nr, start_seq, end_seq);
|
2022-12-14 23:39:04 +08:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2023-11-18 12:13:49 +08:00
|
|
|
BUG_ON(!atomic_read(&keys->ref));
|
|
|
|
|
2021-12-30 04:55:25 +08:00
|
|
|
for (i = 0; i < keys->nr; i++) {
|
|
|
|
k = keys_sorted[i];
|
|
|
|
|
2019-04-12 10:39:39 +08:00
|
|
|
cond_resched();
|
2019-10-06 00:54:53 +08:00
|
|
|
|
2022-09-12 14:22:47 +08:00
|
|
|
replay_now_at(j, k->journal_seq);
|
2019-10-06 00:54:53 +08:00
|
|
|
|
2021-12-28 12:10:06 +08:00
|
|
|
ret = bch2_trans_do(c, NULL, NULL,
|
|
|
|
BTREE_INSERT_LAZY_RW|
|
|
|
|
BTREE_INSERT_NOFAIL|
|
2022-03-15 09:48:42 +08:00
|
|
|
(!k->allocated
|
2023-06-28 05:32:38 +08:00
|
|
|
? BTREE_INSERT_JOURNAL_REPLAY|BCH_WATERMARK_reclaim
|
2022-03-15 09:48:42 +08:00
|
|
|
: 0),
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_journal_replay_key(trans, k));
|
2021-12-28 12:10:06 +08:00
|
|
|
if (ret) {
|
2022-12-12 09:37:11 +08:00
|
|
|
bch_err(c, "journal replay: error while replaying key at btree %s level %u: %s",
|
2023-10-20 10:49:08 +08:00
|
|
|
bch2_btree_id_str(k->btree_id), k->level, bch2_err_str(ret));
|
2019-10-06 00:54:53 +08:00
|
|
|
goto err;
|
2021-12-28 12:10:06 +08:00
|
|
|
}
|
2019-03-30 07:13:54 +08:00
|
|
|
}
|
2019-04-12 10:39:39 +08:00
|
|
|
|
2023-11-18 12:13:49 +08:00
|
|
|
if (!c->opts.keep_journal)
|
|
|
|
bch2_journal_keys_put_initial(c);
|
|
|
|
|
2019-04-12 10:39:39 +08:00
|
|
|
replay_now_at(j, j->replay_journal_seq_end);
|
|
|
|
j->replay_journal_seq = 0;
|
|
|
|
|
|
|
|
bch2_journal_set_replay_done(j);
|
|
|
|
bch2_journal_flush_all_pins(j);
|
2021-12-28 12:10:06 +08:00
|
|
|
ret = bch2_journal_error(j);
|
2022-03-11 03:25:16 +08:00
|
|
|
|
|
|
|
if (keys->nr && !ret)
|
2023-03-22 20:27:58 +08:00
|
|
|
bch2_journal_log_msg(c, "journal replay finished");
|
2019-10-06 00:54:53 +08:00
|
|
|
err:
|
2022-01-03 17:17:02 +08:00
|
|
|
kvfree(keys_sorted);
|
2023-06-21 01:49:25 +08:00
|
|
|
|
|
|
|
if (ret)
|
|
|
|
bch_err_fn(c, ret);
|
2019-10-06 00:54:53 +08:00
|
|
|
return ret;
|
2019-03-30 07:13:54 +08:00
|
|
|
}
|
|
|
|
|
2019-04-12 10:39:39 +08:00
|
|
|
/* journal replay early: */
|
2019-03-30 07:13:54 +08:00
|
|
|
|
2019-01-25 08:09:49 +08:00
|
|
|
static int journal_replay_entry_early(struct bch_fs *c,
|
|
|
|
struct jset_entry *entry)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
switch (entry->type) {
|
|
|
|
case BCH_JSET_ENTRY_btree_root: {
|
2019-06-25 06:11:35 +08:00
|
|
|
struct btree_root *r;
|
|
|
|
|
2023-06-29 10:09:13 +08:00
|
|
|
while (entry->btree_id >= c->btree_roots_extra.nr + BTREE_ID_NR) {
|
|
|
|
ret = darray_push(&c->btree_roots_extra, (struct btree_root) { NULL });
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
2019-06-25 06:11:35 +08:00
|
|
|
}
|
|
|
|
|
2023-06-29 10:09:13 +08:00
|
|
|
r = bch2_btree_id_root(c, entry->btree_id);
|
2019-01-25 08:09:49 +08:00
|
|
|
|
|
|
|
if (entry->u64s) {
|
|
|
|
r->level = entry->level;
|
2023-11-01 06:05:22 +08:00
|
|
|
bkey_copy(&r->key, (struct bkey_i *) entry->start);
|
2019-01-25 08:09:49 +08:00
|
|
|
r->error = 0;
|
|
|
|
} else {
|
|
|
|
r->error = -EIO;
|
|
|
|
}
|
|
|
|
r->alive = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case BCH_JSET_ENTRY_usage: {
|
|
|
|
struct jset_entry_usage *u =
|
|
|
|
container_of(entry, struct jset_entry_usage, entry);
|
|
|
|
|
2019-02-10 08:20:57 +08:00
|
|
|
switch (entry->btree_id) {
|
2022-01-01 06:06:29 +08:00
|
|
|
case BCH_FS_USAGE_reserved:
|
2019-02-10 08:20:57 +08:00
|
|
|
if (entry->level < BCH_REPLICAS_MAX)
|
2019-02-11 08:34:47 +08:00
|
|
|
c->usage_base->persistent_reserved[entry->level] =
|
|
|
|
le64_to_cpu(u->v);
|
2019-01-25 08:09:49 +08:00
|
|
|
break;
|
2022-01-01 06:06:29 +08:00
|
|
|
case BCH_FS_USAGE_inodes:
|
2019-02-11 08:34:47 +08:00
|
|
|
c->usage_base->nr_inodes = le64_to_cpu(u->v);
|
2019-01-25 08:09:49 +08:00
|
|
|
break;
|
2022-01-01 06:06:29 +08:00
|
|
|
case BCH_FS_USAGE_key_version:
|
2019-01-25 08:09:49 +08:00
|
|
|
atomic64_set(&c->key_version,
|
2019-02-10 08:20:57 +08:00
|
|
|
le64_to_cpu(u->v));
|
2019-01-25 08:09:49 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
2019-02-10 08:20:57 +08:00
|
|
|
case BCH_JSET_ENTRY_data_usage: {
|
|
|
|
struct jset_entry_data_usage *u =
|
|
|
|
container_of(entry, struct jset_entry_data_usage, entry);
|
2021-01-22 10:52:06 +08:00
|
|
|
|
2019-02-10 08:20:57 +08:00
|
|
|
ret = bch2_replicas_set_usage(c, &u->r,
|
|
|
|
le64_to_cpu(u->v));
|
|
|
|
break;
|
|
|
|
}
|
2021-01-22 10:52:06 +08:00
|
|
|
case BCH_JSET_ENTRY_dev_usage: {
|
|
|
|
struct jset_entry_dev_usage *u =
|
|
|
|
container_of(entry, struct jset_entry_dev_usage, entry);
|
2021-05-24 05:04:13 +08:00
|
|
|
struct bch_dev *ca = bch_dev_bkey_exists(c, le32_to_cpu(u->dev));
|
2022-01-01 06:06:29 +08:00
|
|
|
unsigned i, nr_types = jset_entry_dev_usage_nr_types(u);
|
2021-01-22 10:52:06 +08:00
|
|
|
|
|
|
|
ca->usage_base->buckets_ec = le64_to_cpu(u->buckets_ec);
|
|
|
|
|
2021-06-11 11:51:09 +08:00
|
|
|
for (i = 0; i < min_t(unsigned, nr_types, BCH_DATA_NR); i++) {
|
2021-01-22 10:52:06 +08:00
|
|
|
ca->usage_base->d[i].buckets = le64_to_cpu(u->d[i].buckets);
|
|
|
|
ca->usage_base->d[i].sectors = le64_to_cpu(u->d[i].sectors);
|
|
|
|
ca->usage_base->d[i].fragmented = le64_to_cpu(u->d[i].fragmented);
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
2019-04-05 09:53:12 +08:00
|
|
|
case BCH_JSET_ENTRY_blacklist: {
|
|
|
|
struct jset_entry_blacklist *bl_entry =
|
|
|
|
container_of(entry, struct jset_entry_blacklist, entry);
|
|
|
|
|
|
|
|
ret = bch2_journal_seq_blacklist_add(c,
|
|
|
|
le64_to_cpu(bl_entry->seq),
|
|
|
|
le64_to_cpu(bl_entry->seq) + 1);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case BCH_JSET_ENTRY_blacklist_v2: {
|
|
|
|
struct jset_entry_blacklist_v2 *bl_entry =
|
|
|
|
container_of(entry, struct jset_entry_blacklist_v2, entry);
|
|
|
|
|
|
|
|
ret = bch2_journal_seq_blacklist_add(c,
|
|
|
|
le64_to_cpu(bl_entry->start),
|
|
|
|
le64_to_cpu(bl_entry->end) + 1);
|
|
|
|
break;
|
|
|
|
}
|
2021-01-22 04:28:59 +08:00
|
|
|
case BCH_JSET_ENTRY_clock: {
|
|
|
|
struct jset_entry_clock *clock =
|
|
|
|
container_of(entry, struct jset_entry_clock, entry);
|
|
|
|
|
2021-05-24 05:04:13 +08:00
|
|
|
atomic64_set(&c->io_clock[clock->rw].now, le64_to_cpu(clock->time));
|
2021-01-22 04:28:59 +08:00
|
|
|
}
|
2019-01-25 08:09:49 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2019-04-05 09:53:12 +08:00
|
|
|
static int journal_replay_early(struct bch_fs *c,
|
2022-03-21 12:15:53 +08:00
|
|
|
struct bch_sb_field_clean *clean)
|
2017-03-17 14:18:50 +08:00
|
|
|
{
|
2019-03-30 07:13:54 +08:00
|
|
|
struct jset_entry *entry;
|
|
|
|
int ret;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2019-03-30 07:13:54 +08:00
|
|
|
if (clean) {
|
|
|
|
for (entry = clean->start;
|
|
|
|
entry != vstruct_end(&clean->field);
|
|
|
|
entry = vstruct_next(entry)) {
|
|
|
|
ret = journal_replay_entry_early(c, entry);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
} else {
|
2022-03-21 12:15:53 +08:00
|
|
|
struct genradix_iter iter;
|
|
|
|
struct journal_replay *i, **_i;
|
|
|
|
|
|
|
|
genradix_for_each(&c->journal_entries, iter, _i) {
|
|
|
|
i = *_i;
|
|
|
|
|
|
|
|
if (!i || i->ignore)
|
bcachefs: Don't require flush/fua on every journal write
This patch adds a flag to journal entries which, if set, indicates that
they weren't done as flush/fua writes.
- non flush/fua journal writes don't update last_seq (i.e. they don't
free up space in the journal), thus the journal free space
calculations now check whether nonflush journal writes are currently
allowed (i.e. are we low on free space, or would doing a flush write
free up a lot of space in the journal)
- write_delay_ms, the user configurable option for when open journal
entries are automatically written, is now interpreted as the max
delay between flush journal writes (default 1 second).
- bch2_journal_flush_seq_async is changed to ensure a flush write >=
the requested sequence number has happened
- journal read/replay must now ignore, and blacklist, any journal
entries newer than the most recent flush entry in the journal. Also,
the way the read_entire_journal option is handled has been improved;
struct journal_replay now has an entry, 'ignore', for entries that
were read but should not be used.
- assorted refactoring and improvements related to journal read in
journal_io.c and recovery.c
Previously, we'd have to issue a flush/fua write every time we
accumulated a full journal entry - typically the bucket size. Now we
need to issue them much less frequently: when an fsync is requested, or
it's been more than write_delay_ms since the last flush, or when we need
to free up space in the journal. This is a significant performance
improvement on many write heavy workloads.
Signed-off-by: Kent Overstreet <kent.overstreet@gmail.com>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2020-11-14 22:59:58 +08:00
|
|
|
continue;
|
2019-03-30 07:13:54 +08:00
|
|
|
|
|
|
|
vstruct_for_each(&i->j, entry) {
|
|
|
|
ret = journal_replay_entry_early(c, entry);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
}
|
bcachefs: Don't require flush/fua on every journal write
This patch adds a flag to journal entries which, if set, indicates that
they weren't done as flush/fua writes.
- non flush/fua journal writes don't update last_seq (i.e. they don't
free up space in the journal), thus the journal free space
calculations now check whether nonflush journal writes are currently
allowed (i.e. are we low on free space, or would doing a flush write
free up a lot of space in the journal)
- write_delay_ms, the user configurable option for when open journal
entries are automatically written, is now interpreted as the max
delay between flush journal writes (default 1 second).
- bch2_journal_flush_seq_async is changed to ensure a flush write >=
the requested sequence number has happened
- journal read/replay must now ignore, and blacklist, any journal
entries newer than the most recent flush entry in the journal. Also,
the way the read_entire_journal option is handled has been improved;
struct journal_replay now has an entry, 'ignore', for entries that
were read but should not be used.
- assorted refactoring and improvements related to journal read in
journal_io.c and recovery.c
Previously, we'd have to issue a flush/fua write every time we
accumulated a full journal entry - typically the bucket size. Now we
need to issue them much less frequently: when an fsync is requested, or
it's been more than write_delay_ms since the last flush, or when we need
to free up space in the journal. This is a significant performance
improvement on many write heavy workloads.
Signed-off-by: Kent Overstreet <kent.overstreet@gmail.com>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2020-11-14 22:59:58 +08:00
|
|
|
}
|
2019-03-22 10:19:57 +08:00
|
|
|
}
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2019-03-30 07:13:54 +08:00
|
|
|
bch2_fs_usage_initialize(c);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-04-12 10:39:39 +08:00
|
|
|
/* sb clean section: */
|
|
|
|
|
2019-03-30 07:13:54 +08:00
|
|
|
static int read_btree_roots(struct bch_fs *c)
|
|
|
|
{
|
|
|
|
unsigned i;
|
|
|
|
int ret = 0;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2023-06-29 10:09:13 +08:00
|
|
|
for (i = 0; i < btree_id_nr_alive(c); i++) {
|
|
|
|
struct btree_root *r = bch2_btree_id_root(c, i);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2019-03-30 07:13:54 +08:00
|
|
|
if (!r->alive)
|
|
|
|
continue;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2022-06-23 11:06:16 +08:00
|
|
|
if (btree_id_is_alloc(i) &&
|
2019-08-29 01:20:31 +08:00
|
|
|
c->opts.reconstruct_alloc) {
|
2021-04-05 09:57:35 +08:00
|
|
|
c->sb.compat &= ~(1ULL << BCH_COMPAT_alloc_info);
|
2017-03-17 14:18:50 +08:00
|
|
|
continue;
|
2019-03-30 07:13:54 +08:00
|
|
|
}
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2019-03-30 07:13:54 +08:00
|
|
|
if (r->error) {
|
2023-10-25 08:44:36 +08:00
|
|
|
__fsck_err(c,
|
|
|
|
btree_id_is_alloc(i)
|
2019-03-30 07:13:54 +08:00
|
|
|
? FSCK_CAN_IGNORE : 0,
|
2023-10-25 08:44:36 +08:00
|
|
|
btree_root_bkey_invalid,
|
2019-03-30 07:13:54 +08:00
|
|
|
"invalid btree root %s",
|
2023-10-20 10:49:08 +08:00
|
|
|
bch2_btree_id_str(i));
|
2021-02-21 08:27:37 +08:00
|
|
|
if (i == BTREE_ID_alloc)
|
2021-04-05 09:57:35 +08:00
|
|
|
c->sb.compat &= ~(1ULL << BCH_COMPAT_alloc_info);
|
2019-03-30 07:13:54 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
ret = bch2_btree_root_read(c, i, &r->key, r->level);
|
|
|
|
if (ret) {
|
2023-09-27 05:21:21 +08:00
|
|
|
fsck_err(c,
|
2023-10-25 08:44:36 +08:00
|
|
|
btree_root_read_error,
|
2023-09-27 05:21:21 +08:00
|
|
|
"error reading btree root %s",
|
2023-10-20 10:49:08 +08:00
|
|
|
bch2_btree_id_str(i));
|
2022-06-23 11:06:16 +08:00
|
|
|
if (btree_id_is_alloc(i))
|
2021-04-05 09:57:35 +08:00
|
|
|
c->sb.compat &= ~(1ULL << BCH_COMPAT_alloc_info);
|
2023-09-27 05:21:21 +08:00
|
|
|
ret = 0;
|
2019-03-30 07:13:54 +08:00
|
|
|
}
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
2019-03-30 07:13:54 +08:00
|
|
|
|
2023-02-13 08:24:34 +08:00
|
|
|
for (i = 0; i < BTREE_ID_NR; i++) {
|
2023-06-29 10:09:13 +08:00
|
|
|
struct btree_root *r = bch2_btree_id_root(c, i);
|
2023-02-13 08:24:34 +08:00
|
|
|
|
|
|
|
if (!r->b) {
|
|
|
|
r->alive = false;
|
|
|
|
r->level = 0;
|
2019-03-30 07:13:54 +08:00
|
|
|
bch2_btree_root_alloc(c, i);
|
2023-02-13 08:24:34 +08:00
|
|
|
}
|
|
|
|
}
|
2017-03-17 14:18:50 +08:00
|
|
|
fsck_err:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2023-07-07 14:42:28 +08:00
|
|
|
static int bch2_initialize_subvolumes(struct bch_fs *c)
|
2021-03-16 12:42:25 +08:00
|
|
|
{
|
2023-03-29 23:18:52 +08:00
|
|
|
struct bkey_i_snapshot_tree root_tree;
|
|
|
|
struct bkey_i_snapshot root_snapshot;
|
|
|
|
struct bkey_i_subvolume root_volume;
|
2021-03-16 12:42:25 +08:00
|
|
|
int ret;
|
|
|
|
|
2023-03-29 23:18:52 +08:00
|
|
|
bkey_snapshot_tree_init(&root_tree.k_i);
|
|
|
|
root_tree.k.p.offset = 1;
|
|
|
|
root_tree.v.master_subvol = cpu_to_le32(1);
|
|
|
|
root_tree.v.root_snapshot = cpu_to_le32(U32_MAX);
|
|
|
|
|
2021-03-16 12:42:25 +08:00
|
|
|
bkey_snapshot_init(&root_snapshot.k_i);
|
|
|
|
root_snapshot.k.p.offset = U32_MAX;
|
|
|
|
root_snapshot.v.flags = 0;
|
|
|
|
root_snapshot.v.parent = 0;
|
2023-07-07 10:47:42 +08:00
|
|
|
root_snapshot.v.subvol = cpu_to_le32(BCACHEFS_ROOT_SUBVOL);
|
2023-03-29 23:18:52 +08:00
|
|
|
root_snapshot.v.tree = cpu_to_le32(1);
|
2021-03-16 12:42:25 +08:00
|
|
|
SET_BCH_SNAPSHOT_SUBVOL(&root_snapshot.v, true);
|
|
|
|
|
|
|
|
bkey_subvolume_init(&root_volume.k_i);
|
|
|
|
root_volume.k.p.offset = BCACHEFS_ROOT_SUBVOL;
|
|
|
|
root_volume.v.flags = 0;
|
|
|
|
root_volume.v.snapshot = cpu_to_le32(U32_MAX);
|
|
|
|
root_volume.v.inode = cpu_to_le64(BCACHEFS_ROOT_INO);
|
|
|
|
|
2023-09-13 06:41:22 +08:00
|
|
|
ret = bch2_btree_insert(c, BTREE_ID_snapshot_trees, &root_tree.k_i, NULL, 0) ?:
|
|
|
|
bch2_btree_insert(c, BTREE_ID_snapshots, &root_snapshot.k_i, NULL, 0) ?:
|
|
|
|
bch2_btree_insert(c, BTREE_ID_subvolumes, &root_volume.k_i, NULL, 0);
|
2021-03-16 12:42:25 +08:00
|
|
|
if (ret)
|
2023-06-21 01:49:25 +08:00
|
|
|
bch_err_fn(c, ret);
|
|
|
|
return ret;
|
2021-03-16 12:42:25 +08:00
|
|
|
}
|
|
|
|
|
2023-06-21 01:49:25 +08:00
|
|
|
static int __bch2_fs_upgrade_for_subvolumes(struct btree_trans *trans)
|
2021-03-16 12:42:25 +08:00
|
|
|
{
|
|
|
|
struct btree_iter iter;
|
|
|
|
struct bkey_s_c k;
|
|
|
|
struct bch_inode_unpacked inode;
|
|
|
|
int ret;
|
|
|
|
|
2023-04-30 07:33:09 +08:00
|
|
|
k = bch2_bkey_get_iter(trans, &iter, BTREE_ID_inodes,
|
|
|
|
SPOS(0, BCACHEFS_ROOT_INO, U32_MAX), 0);
|
2021-03-16 12:42:25 +08:00
|
|
|
ret = bkey_err(k);
|
|
|
|
if (ret)
|
2023-04-30 07:33:09 +08:00
|
|
|
return ret;
|
2021-03-16 12:42:25 +08:00
|
|
|
|
2021-10-30 09:14:23 +08:00
|
|
|
if (!bkey_is_inode(k.k)) {
|
2022-01-05 08:05:08 +08:00
|
|
|
bch_err(trans->c, "root inode not found");
|
2023-05-28 07:59:59 +08:00
|
|
|
ret = -BCH_ERR_ENOENT_inode;
|
2021-03-16 12:42:25 +08:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2021-10-30 09:14:23 +08:00
|
|
|
ret = bch2_inode_unpack(k, &inode);
|
2021-03-16 12:42:25 +08:00
|
|
|
BUG_ON(ret);
|
|
|
|
|
|
|
|
inode.bi_subvol = BCACHEFS_ROOT_SUBVOL;
|
|
|
|
|
2021-09-28 01:25:18 +08:00
|
|
|
ret = bch2_inode_write(trans, &iter, &inode);
|
2021-03-16 12:42:25 +08:00
|
|
|
err:
|
|
|
|
bch2_trans_iter_exit(trans, &iter);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2023-06-21 01:49:25 +08:00
|
|
|
/* set bi_subvol on root inode */
|
|
|
|
noinline_for_stack
|
|
|
|
static int bch2_fs_upgrade_for_subvolumes(struct bch_fs *c)
|
|
|
|
{
|
|
|
|
int ret = bch2_trans_do(c, NULL, NULL, BTREE_INSERT_LAZY_RW,
|
2023-09-13 05:16:02 +08:00
|
|
|
__bch2_fs_upgrade_for_subvolumes(trans));
|
2023-06-21 01:49:25 +08:00
|
|
|
if (ret)
|
|
|
|
bch_err_fn(c, ret);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2023-08-04 08:37:32 +08:00
|
|
|
const char * const bch2_recovery_passes[] = {
|
2023-08-04 05:33:20 +08:00
|
|
|
#define x(_fn, _when) #_fn,
|
|
|
|
BCH_RECOVERY_PASSES()
|
|
|
|
#undef x
|
|
|
|
NULL
|
|
|
|
};
|
|
|
|
|
|
|
|
static int bch2_check_allocations(struct bch_fs *c)
|
|
|
|
{
|
|
|
|
return bch2_gc(c, true, c->opts.norecovery);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_set_may_go_rw(struct bch_fs *c)
|
|
|
|
{
|
|
|
|
set_bit(BCH_FS_MAY_GO_RW, &c->flags);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct recovery_pass_fn {
|
|
|
|
int (*fn)(struct bch_fs *);
|
|
|
|
unsigned when;
|
|
|
|
};
|
|
|
|
|
2023-08-04 08:37:32 +08:00
|
|
|
static struct recovery_pass_fn recovery_pass_fns[] = {
|
2023-08-04 05:33:20 +08:00
|
|
|
#define x(_fn, _when) { .fn = bch2_##_fn, .when = _when },
|
|
|
|
BCH_RECOVERY_PASSES()
|
|
|
|
#undef x
|
|
|
|
};
|
|
|
|
|
2023-06-29 07:59:56 +08:00
|
|
|
static void check_version_upgrade(struct bch_fs *c)
|
|
|
|
{
|
2023-08-12 10:22:31 +08:00
|
|
|
unsigned latest_compatible = bch2_latest_compatible_version(c->sb.version);
|
2023-06-28 10:09:35 +08:00
|
|
|
unsigned latest_version = bcachefs_metadata_version_current;
|
|
|
|
unsigned old_version = c->sb.version_upgrade_complete ?: c->sb.version;
|
|
|
|
unsigned new_version = 0;
|
2023-07-11 01:42:26 +08:00
|
|
|
u64 recovery_passes;
|
2023-06-28 10:09:35 +08:00
|
|
|
|
|
|
|
if (old_version < bcachefs_metadata_required_upgrade_below) {
|
|
|
|
if (c->opts.version_upgrade == BCH_VERSION_UPGRADE_incompatible ||
|
|
|
|
latest_compatible < bcachefs_metadata_required_upgrade_below)
|
|
|
|
new_version = latest_version;
|
|
|
|
else
|
|
|
|
new_version = latest_compatible;
|
|
|
|
} else {
|
|
|
|
switch (c->opts.version_upgrade) {
|
|
|
|
case BCH_VERSION_UPGRADE_compatible:
|
|
|
|
new_version = latest_compatible;
|
|
|
|
break;
|
|
|
|
case BCH_VERSION_UPGRADE_incompatible:
|
|
|
|
new_version = latest_version;
|
|
|
|
break;
|
|
|
|
case BCH_VERSION_UPGRADE_none:
|
|
|
|
new_version = old_version;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2023-06-29 07:59:56 +08:00
|
|
|
|
2023-06-28 10:09:35 +08:00
|
|
|
if (new_version > old_version) {
|
2023-06-29 07:59:56 +08:00
|
|
|
struct printbuf buf = PRINTBUF;
|
|
|
|
|
2023-06-28 10:09:35 +08:00
|
|
|
if (old_version < bcachefs_metadata_required_upgrade_below)
|
|
|
|
prt_str(&buf, "Version upgrade required:\n");
|
|
|
|
|
|
|
|
if (old_version != c->sb.version) {
|
|
|
|
prt_str(&buf, "Version upgrade from ");
|
|
|
|
bch2_version_to_text(&buf, c->sb.version_upgrade_complete);
|
|
|
|
prt_str(&buf, " to ");
|
2023-06-28 11:34:02 +08:00
|
|
|
bch2_version_to_text(&buf, c->sb.version);
|
2023-06-28 10:09:35 +08:00
|
|
|
prt_str(&buf, " incomplete\n");
|
2023-06-28 11:34:02 +08:00
|
|
|
}
|
2023-06-29 07:59:56 +08:00
|
|
|
|
2023-06-28 10:09:35 +08:00
|
|
|
prt_printf(&buf, "Doing %s version upgrade from ",
|
|
|
|
BCH_VERSION_MAJOR(old_version) != BCH_VERSION_MAJOR(new_version)
|
|
|
|
? "incompatible" : "compatible");
|
|
|
|
bch2_version_to_text(&buf, old_version);
|
|
|
|
prt_str(&buf, " to ");
|
|
|
|
bch2_version_to_text(&buf, new_version);
|
|
|
|
prt_newline(&buf);
|
|
|
|
|
2023-07-11 01:42:26 +08:00
|
|
|
recovery_passes = bch2_upgrade_recovery_passes(c, old_version, new_version);
|
|
|
|
if (recovery_passes) {
|
2023-08-04 05:33:20 +08:00
|
|
|
if ((recovery_passes & RECOVERY_PASS_ALL_FSCK) == RECOVERY_PASS_ALL_FSCK)
|
|
|
|
prt_str(&buf, "fsck required");
|
|
|
|
else {
|
2023-09-12 16:25:27 +08:00
|
|
|
prt_str(&buf, "running recovery passes: ");
|
2023-08-04 08:37:32 +08:00
|
|
|
prt_bitflags(&buf, bch2_recovery_passes, recovery_passes);
|
2023-08-04 05:33:20 +08:00
|
|
|
}
|
2023-06-29 07:59:56 +08:00
|
|
|
|
2023-07-11 01:42:26 +08:00
|
|
|
c->recovery_passes_explicit |= recovery_passes;
|
2023-07-12 11:47:29 +08:00
|
|
|
c->opts.fix_errors = FSCK_FIX_yes;
|
2023-07-11 01:42:26 +08:00
|
|
|
}
|
2023-06-29 07:59:56 +08:00
|
|
|
|
2023-07-11 01:42:26 +08:00
|
|
|
bch_info(c, "%s", buf.buf);
|
2023-06-28 10:09:35 +08:00
|
|
|
|
|
|
|
mutex_lock(&c->sb_lock);
|
2023-07-11 00:23:01 +08:00
|
|
|
bch2_sb_upgrade(c, new_version);
|
2023-06-28 10:09:35 +08:00
|
|
|
mutex_unlock(&c->sb_lock);
|
|
|
|
|
|
|
|
printbuf_exit(&buf);
|
2023-06-29 07:59:56 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-07-11 01:42:26 +08:00
|
|
|
u64 bch2_fsck_recovery_passes(void)
|
|
|
|
{
|
|
|
|
u64 ret = 0;
|
|
|
|
|
2023-08-04 08:37:32 +08:00
|
|
|
for (unsigned i = 0; i < ARRAY_SIZE(recovery_pass_fns); i++)
|
|
|
|
if (recovery_pass_fns[i].when & PASS_FSCK)
|
2023-07-11 01:42:26 +08:00
|
|
|
ret |= BIT_ULL(i);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2023-07-07 14:42:28 +08:00
|
|
|
static bool should_run_recovery_pass(struct bch_fs *c, enum bch_recovery_pass pass)
|
|
|
|
{
|
2023-08-04 08:37:32 +08:00
|
|
|
struct recovery_pass_fn *p = recovery_pass_fns + c->curr_recovery_pass;
|
2023-07-07 14:42:28 +08:00
|
|
|
|
|
|
|
if (c->opts.norecovery && pass > BCH_RECOVERY_PASS_snapshots_read)
|
|
|
|
return false;
|
2023-07-11 01:42:26 +08:00
|
|
|
if (c->recovery_passes_explicit & BIT_ULL(pass))
|
|
|
|
return true;
|
2023-07-07 14:42:28 +08:00
|
|
|
if ((p->when & PASS_FSCK) && c->opts.fsck)
|
|
|
|
return true;
|
|
|
|
if ((p->when & PASS_UNCLEAN) && !c->sb.clean)
|
|
|
|
return true;
|
|
|
|
if (p->when & PASS_ALWAYS)
|
|
|
|
return true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_run_recovery_pass(struct bch_fs *c, enum bch_recovery_pass pass)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
c->curr_recovery_pass = pass;
|
|
|
|
|
|
|
|
if (should_run_recovery_pass(c, pass)) {
|
2023-08-04 08:37:32 +08:00
|
|
|
struct recovery_pass_fn *p = recovery_pass_fns + pass;
|
2023-07-07 14:42:28 +08:00
|
|
|
|
|
|
|
if (!(p->when & PASS_SILENT))
|
2023-08-04 05:33:20 +08:00
|
|
|
printk(KERN_INFO bch2_log_msg(c, "%s..."),
|
2023-08-04 08:37:32 +08:00
|
|
|
bch2_recovery_passes[pass]);
|
2023-07-07 14:42:28 +08:00
|
|
|
ret = p->fn(c);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
if (!(p->when & PASS_SILENT))
|
|
|
|
printk(KERN_CONT " done\n");
|
2023-08-04 08:57:06 +08:00
|
|
|
|
|
|
|
c->recovery_passes_complete |= BIT_ULL(pass);
|
2023-07-07 14:42:28 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_run_recovery_passes(struct bch_fs *c)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
2023-07-17 11:19:49 +08:00
|
|
|
|
2023-08-04 08:37:32 +08:00
|
|
|
while (c->curr_recovery_pass < ARRAY_SIZE(recovery_pass_fns)) {
|
2023-07-07 14:42:28 +08:00
|
|
|
ret = bch2_run_recovery_pass(c, c->curr_recovery_pass);
|
2023-07-17 11:19:49 +08:00
|
|
|
if (bch2_err_matches(ret, BCH_ERR_restart_recovery))
|
|
|
|
continue;
|
2023-07-07 14:42:28 +08:00
|
|
|
if (ret)
|
|
|
|
break;
|
|
|
|
c->curr_recovery_pass++;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2017-03-17 14:18:50 +08:00
|
|
|
int bch2_fs_recovery(struct bch_fs *c)
|
|
|
|
{
|
2019-04-05 09:53:12 +08:00
|
|
|
struct bch_sb_field_clean *clean = NULL;
|
bcachefs: Don't require flush/fua on every journal write
This patch adds a flag to journal entries which, if set, indicates that
they weren't done as flush/fua writes.
- non flush/fua journal writes don't update last_seq (i.e. they don't
free up space in the journal), thus the journal free space
calculations now check whether nonflush journal writes are currently
allowed (i.e. are we low on free space, or would doing a flush write
free up a lot of space in the journal)
- write_delay_ms, the user configurable option for when open journal
entries are automatically written, is now interpreted as the max
delay between flush journal writes (default 1 second).
- bch2_journal_flush_seq_async is changed to ensure a flush write >=
the requested sequence number has happened
- journal read/replay must now ignore, and blacklist, any journal
entries newer than the most recent flush entry in the journal. Also,
the way the read_entire_journal option is handled has been improved;
struct journal_replay now has an entry, 'ignore', for entries that
were read but should not be used.
- assorted refactoring and improvements related to journal read in
journal_io.c and recovery.c
Previously, we'd have to issue a flush/fua write every time we
accumulated a full journal entry - typically the bucket size. Now we
need to issue them much less frequently: when an fsync is requested, or
it's been more than write_delay_ms since the last flush, or when we need
to free up space in the journal. This is a significant performance
improvement on many write heavy workloads.
Signed-off-by: Kent Overstreet <kent.overstreet@gmail.com>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2020-11-14 22:59:58 +08:00
|
|
|
struct jset *last_journal_entry = NULL;
|
2023-09-28 12:54:12 +08:00
|
|
|
u64 last_seq = 0, blacklist_seq, journal_seq;
|
2021-01-09 10:20:58 +08:00
|
|
|
bool write_sb = false;
|
2021-04-25 06:02:59 +08:00
|
|
|
int ret = 0;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2023-08-06 03:54:38 +08:00
|
|
|
if (c->sb.clean) {
|
|
|
|
clean = bch2_read_superblock_clean(c);
|
|
|
|
ret = PTR_ERR_OR_ZERO(clean);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
2019-04-05 09:53:12 +08:00
|
|
|
|
2017-03-17 14:18:50 +08:00
|
|
|
bch_info(c, "recovering from clean shutdown, journal seq %llu",
|
|
|
|
le64_to_cpu(clean->journal_seq));
|
2023-08-06 03:54:38 +08:00
|
|
|
} else {
|
2021-11-16 04:03:06 +08:00
|
|
|
bch_info(c, "recovering from unclean shutdown");
|
2023-08-06 03:54:38 +08:00
|
|
|
}
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2021-02-20 13:00:23 +08:00
|
|
|
if (!(c->sb.features & (1ULL << BCH_FEATURE_new_extent_overwrite))) {
|
|
|
|
bch_err(c, "feature new_extent_overwrite not set, filesystem no longer supported");
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2021-03-22 04:20:40 +08:00
|
|
|
if (!c->sb.clean &&
|
|
|
|
!(c->sb.features & (1ULL << BCH_FEATURE_extents_above_btree_updates))) {
|
|
|
|
bch_err(c, "filesystem needs recovery from older version; run fsck from older bcachefs-tools to fix");
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2023-07-11 01:42:26 +08:00
|
|
|
if (c->opts.fsck || !(c->opts.nochanges && c->opts.norecovery))
|
2023-06-29 07:59:56 +08:00
|
|
|
check_version_upgrade(c);
|
2021-07-11 01:44:42 +08:00
|
|
|
|
2022-04-22 01:13:57 +08:00
|
|
|
if (c->opts.fsck && c->opts.norecovery) {
|
|
|
|
bch_err(c, "cannot select both norecovery and fsck");
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
bcachefs: Don't require flush/fua on every journal write
This patch adds a flag to journal entries which, if set, indicates that
they weren't done as flush/fua writes.
- non flush/fua journal writes don't update last_seq (i.e. they don't
free up space in the journal), thus the journal free space
calculations now check whether nonflush journal writes are currently
allowed (i.e. are we low on free space, or would doing a flush write
free up a lot of space in the journal)
- write_delay_ms, the user configurable option for when open journal
entries are automatically written, is now interpreted as the max
delay between flush journal writes (default 1 second).
- bch2_journal_flush_seq_async is changed to ensure a flush write >=
the requested sequence number has happened
- journal read/replay must now ignore, and blacklist, any journal
entries newer than the most recent flush entry in the journal. Also,
the way the read_entire_journal option is handled has been improved;
struct journal_replay now has an entry, 'ignore', for entries that
were read but should not be used.
- assorted refactoring and improvements related to journal read in
journal_io.c and recovery.c
Previously, we'd have to issue a flush/fua write every time we
accumulated a full journal entry - typically the bucket size. Now we
need to issue them much less frequently: when an fsync is requested, or
it's been more than write_delay_ms since the last flush, or when we need
to free up space in the journal. This is a significant performance
improvement on many write heavy workloads.
Signed-off-by: Kent Overstreet <kent.overstreet@gmail.com>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2020-11-14 22:59:58 +08:00
|
|
|
ret = bch2_blacklist_table_initialize(c);
|
|
|
|
if (ret) {
|
|
|
|
bch_err(c, "error initializing blacklist table");
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2020-03-29 06:26:01 +08:00
|
|
|
if (!c->sb.clean || c->opts.fsck || c->opts.keep_journal) {
|
2022-03-21 12:15:53 +08:00
|
|
|
struct genradix_iter iter;
|
|
|
|
struct journal_replay **i;
|
2019-04-05 09:53:12 +08:00
|
|
|
|
2022-01-04 13:06:49 +08:00
|
|
|
bch_verbose(c, "starting journal read");
|
2022-12-14 23:39:04 +08:00
|
|
|
ret = bch2_journal_read(c, &last_seq, &blacklist_seq, &journal_seq);
|
2017-03-17 14:18:50 +08:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
2022-12-02 00:17:18 +08:00
|
|
|
/*
|
|
|
|
* note: cmd_list_journal needs the blacklist table fully up to date so
|
|
|
|
* it can asterisk ignored journal entries:
|
|
|
|
*/
|
|
|
|
if (c->opts.read_journal_only)
|
|
|
|
goto out;
|
|
|
|
|
2022-03-21 12:15:53 +08:00
|
|
|
genradix_for_each_reverse(&c->journal_entries, iter, i)
|
|
|
|
if (*i && !(*i)->ignore) {
|
|
|
|
last_journal_entry = &(*i)->j;
|
bcachefs: Don't require flush/fua on every journal write
This patch adds a flag to journal entries which, if set, indicates that
they weren't done as flush/fua writes.
- non flush/fua journal writes don't update last_seq (i.e. they don't
free up space in the journal), thus the journal free space
calculations now check whether nonflush journal writes are currently
allowed (i.e. are we low on free space, or would doing a flush write
free up a lot of space in the journal)
- write_delay_ms, the user configurable option for when open journal
entries are automatically written, is now interpreted as the max
delay between flush journal writes (default 1 second).
- bch2_journal_flush_seq_async is changed to ensure a flush write >=
the requested sequence number has happened
- journal read/replay must now ignore, and blacklist, any journal
entries newer than the most recent flush entry in the journal. Also,
the way the read_entire_journal option is handled has been improved;
struct journal_replay now has an entry, 'ignore', for entries that
were read but should not be used.
- assorted refactoring and improvements related to journal read in
journal_io.c and recovery.c
Previously, we'd have to issue a flush/fua write every time we
accumulated a full journal entry - typically the bucket size. Now we
need to issue them much less frequently: when an fsync is requested, or
it's been more than write_delay_ms since the last flush, or when we need
to free up space in the journal. This is a significant performance
improvement on many write heavy workloads.
Signed-off-by: Kent Overstreet <kent.overstreet@gmail.com>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2020-11-14 22:59:58 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (mustfix_fsck_err_on(c->sb.clean &&
|
|
|
|
last_journal_entry &&
|
|
|
|
!journal_entry_empty(last_journal_entry), c,
|
2023-10-25 08:44:36 +08:00
|
|
|
clean_but_journal_not_empty,
|
2019-03-12 02:59:58 +08:00
|
|
|
"filesystem marked clean but journal not empty")) {
|
2021-04-05 09:57:35 +08:00
|
|
|
c->sb.compat &= ~(1ULL << BCH_COMPAT_alloc_info);
|
2019-03-12 02:59:58 +08:00
|
|
|
SET_BCH_SB_CLEAN(c->disk_sb.sb, false);
|
|
|
|
c->sb.clean = false;
|
|
|
|
}
|
2019-04-05 09:53:12 +08:00
|
|
|
|
bcachefs: Don't require flush/fua on every journal write
This patch adds a flag to journal entries which, if set, indicates that
they weren't done as flush/fua writes.
- non flush/fua journal writes don't update last_seq (i.e. they don't
free up space in the journal), thus the journal free space
calculations now check whether nonflush journal writes are currently
allowed (i.e. are we low on free space, or would doing a flush write
free up a lot of space in the journal)
- write_delay_ms, the user configurable option for when open journal
entries are automatically written, is now interpreted as the max
delay between flush journal writes (default 1 second).
- bch2_journal_flush_seq_async is changed to ensure a flush write >=
the requested sequence number has happened
- journal read/replay must now ignore, and blacklist, any journal
entries newer than the most recent flush entry in the journal. Also,
the way the read_entire_journal option is handled has been improved;
struct journal_replay now has an entry, 'ignore', for entries that
were read but should not be used.
- assorted refactoring and improvements related to journal read in
journal_io.c and recovery.c
Previously, we'd have to issue a flush/fua write every time we
accumulated a full journal entry - typically the bucket size. Now we
need to issue them much less frequently: when an fsync is requested, or
it's been more than write_delay_ms since the last flush, or when we need
to free up space in the journal. This is a significant performance
improvement on many write heavy workloads.
Signed-off-by: Kent Overstreet <kent.overstreet@gmail.com>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2020-11-14 22:59:58 +08:00
|
|
|
if (!last_journal_entry) {
|
2023-10-25 08:44:36 +08:00
|
|
|
fsck_err_on(!c->sb.clean, c,
|
|
|
|
dirty_but_no_journal_entries,
|
|
|
|
"no journal entries found");
|
2022-12-15 03:47:42 +08:00
|
|
|
if (clean)
|
|
|
|
goto use_clean;
|
|
|
|
|
|
|
|
genradix_for_each_reverse(&c->journal_entries, iter, i)
|
|
|
|
if (*i) {
|
|
|
|
last_journal_entry = &(*i)->j;
|
|
|
|
(*i)->ignore = false;
|
2023-11-03 23:55:44 +08:00
|
|
|
/*
|
|
|
|
* This was probably a NO_FLUSH entry,
|
|
|
|
* so last_seq was garbage - but we know
|
|
|
|
* we're only using a single journal
|
|
|
|
* entry, set it here:
|
|
|
|
*/
|
|
|
|
(*i)->j.last_seq = (*i)->j.seq;
|
2022-12-15 03:47:42 +08:00
|
|
|
break;
|
|
|
|
}
|
2019-04-05 09:53:12 +08:00
|
|
|
}
|
|
|
|
|
2023-08-06 04:08:44 +08:00
|
|
|
ret = bch2_journal_keys_sort(c);
|
2022-03-21 12:15:53 +08:00
|
|
|
if (ret)
|
2019-04-12 10:39:39 +08:00
|
|
|
goto err;
|
|
|
|
|
bcachefs: Don't require flush/fua on every journal write
This patch adds a flag to journal entries which, if set, indicates that
they weren't done as flush/fua writes.
- non flush/fua journal writes don't update last_seq (i.e. they don't
free up space in the journal), thus the journal free space
calculations now check whether nonflush journal writes are currently
allowed (i.e. are we low on free space, or would doing a flush write
free up a lot of space in the journal)
- write_delay_ms, the user configurable option for when open journal
entries are automatically written, is now interpreted as the max
delay between flush journal writes (default 1 second).
- bch2_journal_flush_seq_async is changed to ensure a flush write >=
the requested sequence number has happened
- journal read/replay must now ignore, and blacklist, any journal
entries newer than the most recent flush entry in the journal. Also,
the way the read_entire_journal option is handled has been improved;
struct journal_replay now has an entry, 'ignore', for entries that
were read but should not be used.
- assorted refactoring and improvements related to journal read in
journal_io.c and recovery.c
Previously, we'd have to issue a flush/fua write every time we
accumulated a full journal entry - typically the bucket size. Now we
need to issue them much less frequently: when an fsync is requested, or
it's been more than write_delay_ms since the last flush, or when we need
to free up space in the journal. This is a significant performance
improvement on many write heavy workloads.
Signed-off-by: Kent Overstreet <kent.overstreet@gmail.com>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2020-11-14 22:59:58 +08:00
|
|
|
if (c->sb.clean && last_journal_entry) {
|
2023-08-06 03:54:38 +08:00
|
|
|
ret = bch2_verify_superblock_clean(c, &clean,
|
bcachefs: Don't require flush/fua on every journal write
This patch adds a flag to journal entries which, if set, indicates that
they weren't done as flush/fua writes.
- non flush/fua journal writes don't update last_seq (i.e. they don't
free up space in the journal), thus the journal free space
calculations now check whether nonflush journal writes are currently
allowed (i.e. are we low on free space, or would doing a flush write
free up a lot of space in the journal)
- write_delay_ms, the user configurable option for when open journal
entries are automatically written, is now interpreted as the max
delay between flush journal writes (default 1 second).
- bch2_journal_flush_seq_async is changed to ensure a flush write >=
the requested sequence number has happened
- journal read/replay must now ignore, and blacklist, any journal
entries newer than the most recent flush entry in the journal. Also,
the way the read_entire_journal option is handled has been improved;
struct journal_replay now has an entry, 'ignore', for entries that
were read but should not be used.
- assorted refactoring and improvements related to journal read in
journal_io.c and recovery.c
Previously, we'd have to issue a flush/fua write every time we
accumulated a full journal entry - typically the bucket size. Now we
need to issue them much less frequently: when an fsync is requested, or
it's been more than write_delay_ms since the last flush, or when we need
to free up space in the journal. This is a significant performance
improvement on many write heavy workloads.
Signed-off-by: Kent Overstreet <kent.overstreet@gmail.com>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2020-11-14 22:59:58 +08:00
|
|
|
last_journal_entry);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
use_clean:
|
|
|
|
if (!clean) {
|
|
|
|
bch_err(c, "no superblock clean section found");
|
2022-07-20 05:20:18 +08:00
|
|
|
ret = -BCH_ERR_fsck_repair_impossible;
|
2019-03-30 07:13:54 +08:00
|
|
|
goto err;
|
2019-04-05 09:53:12 +08:00
|
|
|
|
bcachefs: Don't require flush/fua on every journal write
This patch adds a flag to journal entries which, if set, indicates that
they weren't done as flush/fua writes.
- non flush/fua journal writes don't update last_seq (i.e. they don't
free up space in the journal), thus the journal free space
calculations now check whether nonflush journal writes are currently
allowed (i.e. are we low on free space, or would doing a flush write
free up a lot of space in the journal)
- write_delay_ms, the user configurable option for when open journal
entries are automatically written, is now interpreted as the max
delay between flush journal writes (default 1 second).
- bch2_journal_flush_seq_async is changed to ensure a flush write >=
the requested sequence number has happened
- journal read/replay must now ignore, and blacklist, any journal
entries newer than the most recent flush entry in the journal. Also,
the way the read_entire_journal option is handled has been improved;
struct journal_replay now has an entry, 'ignore', for entries that
were read but should not be used.
- assorted refactoring and improvements related to journal read in
journal_io.c and recovery.c
Previously, we'd have to issue a flush/fua write every time we
accumulated a full journal entry - typically the bucket size. Now we
need to issue them much less frequently: when an fsync is requested, or
it's been more than write_delay_ms since the last flush, or when we need
to free up space in the journal. This is a significant performance
improvement on many write heavy workloads.
Signed-off-by: Kent Overstreet <kent.overstreet@gmail.com>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2020-11-14 22:59:58 +08:00
|
|
|
}
|
|
|
|
blacklist_seq = journal_seq = le64_to_cpu(clean->journal_seq) + 1;
|
2019-04-05 09:53:12 +08:00
|
|
|
}
|
|
|
|
|
2023-07-09 10:33:29 +08:00
|
|
|
c->journal_replay_seq_start = last_seq;
|
2023-08-08 00:04:05 +08:00
|
|
|
c->journal_replay_seq_end = blacklist_seq - 1;
|
2023-07-09 10:33:29 +08:00
|
|
|
|
2020-10-25 09:20:16 +08:00
|
|
|
if (c->opts.reconstruct_alloc) {
|
2021-04-05 09:57:35 +08:00
|
|
|
c->sb.compat &= ~(1ULL << BCH_COMPAT_alloc_info);
|
2020-10-25 09:20:16 +08:00
|
|
|
drop_alloc_keys(&c->journal_keys);
|
|
|
|
}
|
|
|
|
|
2021-07-31 02:33:06 +08:00
|
|
|
zero_out_btree_mem_ptr(&c->journal_keys);
|
|
|
|
|
2022-03-21 12:15:53 +08:00
|
|
|
ret = journal_replay_early(c, clean);
|
2019-04-05 09:53:12 +08:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
2022-01-05 08:41:23 +08:00
|
|
|
/*
|
|
|
|
* After an unclean shutdown, skip then next few journal sequence
|
|
|
|
* numbers as they may have been referenced by btree writes that
|
|
|
|
* happened before their corresponding journal writes - those btree
|
|
|
|
* writes need to be ignored, by skipping and blacklisting the next few
|
|
|
|
* journal sequence numbers:
|
|
|
|
*/
|
|
|
|
if (!c->sb.clean)
|
|
|
|
journal_seq += 8;
|
|
|
|
|
bcachefs: Don't require flush/fua on every journal write
This patch adds a flag to journal entries which, if set, indicates that
they weren't done as flush/fua writes.
- non flush/fua journal writes don't update last_seq (i.e. they don't
free up space in the journal), thus the journal free space
calculations now check whether nonflush journal writes are currently
allowed (i.e. are we low on free space, or would doing a flush write
free up a lot of space in the journal)
- write_delay_ms, the user configurable option for when open journal
entries are automatically written, is now interpreted as the max
delay between flush journal writes (default 1 second).
- bch2_journal_flush_seq_async is changed to ensure a flush write >=
the requested sequence number has happened
- journal read/replay must now ignore, and blacklist, any journal
entries newer than the most recent flush entry in the journal. Also,
the way the read_entire_journal option is handled has been improved;
struct journal_replay now has an entry, 'ignore', for entries that
were read but should not be used.
- assorted refactoring and improvements related to journal read in
journal_io.c and recovery.c
Previously, we'd have to issue a flush/fua write every time we
accumulated a full journal entry - typically the bucket size. Now we
need to issue them much less frequently: when an fsync is requested, or
it's been more than write_delay_ms since the last flush, or when we need
to free up space in the journal. This is a significant performance
improvement on many write heavy workloads.
Signed-off-by: Kent Overstreet <kent.overstreet@gmail.com>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2020-11-14 22:59:58 +08:00
|
|
|
if (blacklist_seq != journal_seq) {
|
2023-03-22 20:27:58 +08:00
|
|
|
ret = bch2_journal_log_msg(c, "blacklisting entries %llu-%llu",
|
|
|
|
blacklist_seq, journal_seq) ?:
|
2022-12-14 23:39:04 +08:00
|
|
|
bch2_journal_seq_blacklist_add(c,
|
bcachefs: Don't require flush/fua on every journal write
This patch adds a flag to journal entries which, if set, indicates that
they weren't done as flush/fua writes.
- non flush/fua journal writes don't update last_seq (i.e. they don't
free up space in the journal), thus the journal free space
calculations now check whether nonflush journal writes are currently
allowed (i.e. are we low on free space, or would doing a flush write
free up a lot of space in the journal)
- write_delay_ms, the user configurable option for when open journal
entries are automatically written, is now interpreted as the max
delay between flush journal writes (default 1 second).
- bch2_journal_flush_seq_async is changed to ensure a flush write >=
the requested sequence number has happened
- journal read/replay must now ignore, and blacklist, any journal
entries newer than the most recent flush entry in the journal. Also,
the way the read_entire_journal option is handled has been improved;
struct journal_replay now has an entry, 'ignore', for entries that
were read but should not be used.
- assorted refactoring and improvements related to journal read in
journal_io.c and recovery.c
Previously, we'd have to issue a flush/fua write every time we
accumulated a full journal entry - typically the bucket size. Now we
need to issue them much less frequently: when an fsync is requested, or
it's been more than write_delay_ms since the last flush, or when we need
to free up space in the journal. This is a significant performance
improvement on many write heavy workloads.
Signed-off-by: Kent Overstreet <kent.overstreet@gmail.com>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2020-11-14 22:59:58 +08:00
|
|
|
blacklist_seq, journal_seq);
|
2019-04-05 09:53:12 +08:00
|
|
|
if (ret) {
|
|
|
|
bch_err(c, "error creating new journal seq blacklist entry");
|
2019-03-30 07:13:54 +08:00
|
|
|
goto err;
|
2019-04-05 09:53:12 +08:00
|
|
|
}
|
2019-06-19 07:37:39 +08:00
|
|
|
}
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2023-03-22 20:27:58 +08:00
|
|
|
ret = bch2_journal_log_msg(c, "starting journal at entry %llu, replaying %llu-%llu",
|
|
|
|
journal_seq, last_seq, blacklist_seq - 1) ?:
|
2022-12-14 23:39:04 +08:00
|
|
|
bch2_fs_journal_start(&c->journal, journal_seq);
|
2019-03-30 07:13:54 +08:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2022-06-23 11:06:16 +08:00
|
|
|
if (c->opts.reconstruct_alloc)
|
2023-03-22 20:27:58 +08:00
|
|
|
bch2_journal_log_msg(c, "dropping alloc info");
|
2022-06-23 11:06:16 +08:00
|
|
|
|
2022-04-22 01:13:57 +08:00
|
|
|
/*
|
|
|
|
* Skip past versions that might have possibly been used (as nonces),
|
|
|
|
* but hadn't had their pointers written:
|
|
|
|
*/
|
|
|
|
if (c->sb.encryption_type && !c->sb.clean)
|
|
|
|
atomic64_add(1 << 16, &c->key_version);
|
|
|
|
|
2019-03-30 07:13:54 +08:00
|
|
|
ret = read_btree_roots(c);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2023-07-17 11:19:49 +08:00
|
|
|
if (c->opts.fsck &&
|
|
|
|
(IS_ENABLED(CONFIG_BCACHEFS_DEBUG) ||
|
|
|
|
BCH_SB_HAS_TOPOLOGY_ERRORS(c->disk_sb.sb)))
|
|
|
|
c->recovery_passes_explicit |= BIT_ULL(BCH_RECOVERY_PASS_check_topology);
|
|
|
|
|
2023-07-07 14:42:28 +08:00
|
|
|
ret = bch2_run_recovery_passes(c);
|
2018-11-23 15:50:33 +08:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2023-08-03 08:19:58 +08:00
|
|
|
/* If we fixed errors, verify that fs is actually clean now: */
|
|
|
|
if (IS_ENABLED(CONFIG_BCACHEFS_DEBUG) &&
|
|
|
|
test_bit(BCH_FS_ERRORS_FIXED, &c->flags) &&
|
|
|
|
!test_bit(BCH_FS_ERRORS_NOT_FIXED, &c->flags) &&
|
|
|
|
!test_bit(BCH_FS_ERROR, &c->flags)) {
|
|
|
|
bch_info(c, "Fixed errors, running fsck a second time to verify fs is clean");
|
|
|
|
clear_bit(BCH_FS_ERRORS_FIXED, &c->flags);
|
|
|
|
|
|
|
|
c->curr_recovery_pass = BCH_RECOVERY_PASS_check_alloc_info;
|
|
|
|
|
|
|
|
ret = bch2_run_recovery_passes(c);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
if (test_bit(BCH_FS_ERRORS_FIXED, &c->flags) ||
|
|
|
|
test_bit(BCH_FS_ERRORS_NOT_FIXED, &c->flags)) {
|
|
|
|
bch_err(c, "Second fsck run was not clean");
|
|
|
|
set_bit(BCH_FS_ERRORS_NOT_FIXED, &c->flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
set_bit(BCH_FS_ERRORS_FIXED, &c->flags);
|
|
|
|
}
|
|
|
|
|
2019-03-30 07:13:54 +08:00
|
|
|
if (enabled_qtypes(c)) {
|
2019-04-18 06:21:19 +08:00
|
|
|
bch_verbose(c, "reading quotas");
|
2019-03-30 07:13:54 +08:00
|
|
|
ret = bch2_fs_quota_read(c);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
bch_verbose(c, "quotas done");
|
|
|
|
}
|
|
|
|
|
2018-11-02 03:10:01 +08:00
|
|
|
mutex_lock(&c->sb_lock);
|
2023-06-29 07:59:56 +08:00
|
|
|
if (BCH_SB_VERSION_UPGRADE_COMPLETE(c->disk_sb.sb) != c->sb.version) {
|
|
|
|
SET_BCH_SB_VERSION_UPGRADE_COMPLETE(c->disk_sb.sb, c->sb.version);
|
2019-03-12 02:59:58 +08:00
|
|
|
write_sb = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!test_bit(BCH_FS_ERROR, &c->flags)) {
|
2021-05-24 05:04:13 +08:00
|
|
|
c->disk_sb.sb->compat[0] |= cpu_to_le64(1ULL << BCH_COMPAT_alloc_info);
|
2019-03-12 02:59:58 +08:00
|
|
|
write_sb = true;
|
2018-07-15 09:06:51 +08:00
|
|
|
}
|
|
|
|
|
2019-03-28 21:34:55 +08:00
|
|
|
if (c->opts.fsck &&
|
2021-04-13 22:26:59 +08:00
|
|
|
!test_bit(BCH_FS_ERROR, &c->flags) &&
|
2021-04-25 04:32:35 +08:00
|
|
|
!test_bit(BCH_FS_ERRORS_NOT_FIXED, &c->flags)) {
|
2019-03-28 21:34:55 +08:00
|
|
|
SET_BCH_SB_HAS_ERRORS(c->disk_sb.sb, 0);
|
2021-04-25 04:32:35 +08:00
|
|
|
SET_BCH_SB_HAS_TOPOLOGY_ERRORS(c->disk_sb.sb, 0);
|
2019-03-12 02:59:58 +08:00
|
|
|
write_sb = true;
|
2019-03-28 21:34:55 +08:00
|
|
|
}
|
2019-03-12 02:59:58 +08:00
|
|
|
|
|
|
|
if (write_sb)
|
|
|
|
bch2_write_super(c);
|
2018-11-02 03:10:01 +08:00
|
|
|
mutex_unlock(&c->sb_lock);
|
2019-04-05 09:53:12 +08:00
|
|
|
|
2021-12-28 09:05:07 +08:00
|
|
|
if (!(c->sb.compat & (1ULL << BCH_COMPAT_extents_above_btree_updates_done)) ||
|
2023-07-07 10:47:42 +08:00
|
|
|
c->sb.version_min < bcachefs_metadata_version_btree_ptr_sectors_written) {
|
2021-12-28 09:05:07 +08:00
|
|
|
struct bch_move_stats stats;
|
|
|
|
|
2022-11-14 09:01:42 +08:00
|
|
|
bch2_move_stats_init(&stats, "recovery");
|
2021-12-28 09:05:07 +08:00
|
|
|
|
|
|
|
bch_info(c, "scanning for old btree nodes");
|
2023-06-21 01:49:25 +08:00
|
|
|
ret = bch2_fs_read_write(c) ?:
|
|
|
|
bch2_scan_old_btree_nodes(c, &stats);
|
2021-12-28 09:05:07 +08:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
bch_info(c, "scanning for old btree nodes done");
|
|
|
|
}
|
|
|
|
|
2022-01-05 08:41:23 +08:00
|
|
|
if (c->journal_seq_blacklist_table &&
|
|
|
|
c->journal_seq_blacklist_table->nr > 128)
|
|
|
|
queue_work(system_long_wq, &c->journal_seq_blacklist_gc_work);
|
|
|
|
|
2019-04-18 06:21:19 +08:00
|
|
|
ret = 0;
|
2021-04-25 06:02:59 +08:00
|
|
|
out:
|
2019-09-08 00:42:27 +08:00
|
|
|
set_bit(BCH_FS_FSCK_DONE, &c->flags);
|
2019-04-18 06:21:19 +08:00
|
|
|
bch2_flush_fsck_errs(c);
|
2019-09-08 00:42:27 +08:00
|
|
|
|
2022-10-24 05:37:23 +08:00
|
|
|
if (!c->opts.keep_journal &&
|
2023-11-18 12:13:49 +08:00
|
|
|
test_bit(JOURNAL_REPLAY_DONE, &c->journal.flags))
|
|
|
|
bch2_journal_keys_put_initial(c);
|
2017-03-17 14:18:50 +08:00
|
|
|
kfree(clean);
|
2022-07-14 13:10:24 +08:00
|
|
|
|
2023-10-20 09:25:04 +08:00
|
|
|
if (!ret && test_bit(BCH_FS_NEED_DELETE_DEAD_SNAPSHOTS, &c->flags)) {
|
2022-07-14 13:10:24 +08:00
|
|
|
bch2_fs_read_write_early(c);
|
|
|
|
bch2_delete_dead_snapshots_async(c);
|
|
|
|
}
|
|
|
|
|
2019-04-18 06:21:19 +08:00
|
|
|
if (ret)
|
2023-06-21 01:49:25 +08:00
|
|
|
bch_err_fn(c, ret);
|
2017-03-17 14:18:50 +08:00
|
|
|
return ret;
|
2021-04-25 06:02:59 +08:00
|
|
|
err:
|
|
|
|
fsck_err:
|
|
|
|
bch2_fs_emergency_read_only(c);
|
|
|
|
goto out;
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int bch2_fs_initialize(struct bch_fs *c)
|
|
|
|
{
|
|
|
|
struct bch_inode_unpacked root_inode, lostfound_inode;
|
|
|
|
struct bkey_inode_buf packed_inode;
|
|
|
|
struct qstr lostfound = QSTR("lost+found");
|
|
|
|
struct bch_dev *ca;
|
|
|
|
unsigned i;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
bch_notice(c, "initializing new filesystem");
|
|
|
|
|
2019-01-25 09:25:40 +08:00
|
|
|
mutex_lock(&c->sb_lock);
|
2021-05-24 05:04:13 +08:00
|
|
|
c->disk_sb.sb->compat[0] |= cpu_to_le64(1ULL << BCH_COMPAT_extents_above_btree_updates_done);
|
|
|
|
c->disk_sb.sb->compat[0] |= cpu_to_le64(1ULL << BCH_COMPAT_bformat_overflow_done);
|
2020-06-04 04:20:22 +08:00
|
|
|
|
2023-07-11 00:23:01 +08:00
|
|
|
bch2_sb_maybe_downgrade(c);
|
|
|
|
|
2023-06-28 11:34:02 +08:00
|
|
|
if (c->opts.version_upgrade != BCH_VERSION_UPGRADE_none) {
|
2023-07-11 00:23:01 +08:00
|
|
|
bch2_sb_upgrade(c, bcachefs_metadata_version_current);
|
2023-06-28 11:34:02 +08:00
|
|
|
SET_BCH_SB_VERSION_UPGRADE_COMPLETE(c->disk_sb.sb, bcachefs_metadata_version_current);
|
2021-03-22 04:20:40 +08:00
|
|
|
bch2_write_super(c);
|
|
|
|
}
|
2020-06-04 04:20:22 +08:00
|
|
|
mutex_unlock(&c->sb_lock);
|
|
|
|
|
2023-08-04 08:37:32 +08:00
|
|
|
c->curr_recovery_pass = ARRAY_SIZE(recovery_pass_fns);
|
2022-02-19 15:48:27 +08:00
|
|
|
set_bit(BCH_FS_MAY_GO_RW, &c->flags);
|
2022-01-02 08:46:12 +08:00
|
|
|
set_bit(BCH_FS_FSCK_DONE, &c->flags);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2018-11-25 06:09:44 +08:00
|
|
|
for (i = 0; i < BTREE_ID_NR; i++)
|
|
|
|
bch2_btree_root_alloc(c, i);
|
|
|
|
|
2023-10-22 01:54:39 +08:00
|
|
|
for_each_member_device(ca, c, i)
|
2022-04-01 13:29:59 +08:00
|
|
|
bch2_dev_usage_init(ca);
|
|
|
|
|
2023-10-22 01:54:39 +08:00
|
|
|
ret = bch2_fs_journal_alloc(c);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* journal_res_get() will crash if called before this has
|
|
|
|
* set up the journal.pin FIFO and journal.cur pointer:
|
|
|
|
*/
|
2022-03-21 12:15:53 +08:00
|
|
|
bch2_fs_journal_start(&c->journal, 1);
|
2017-03-17 14:18:50 +08:00
|
|
|
bch2_journal_set_replay_done(&c->journal);
|
|
|
|
|
2020-10-17 09:36:26 +08:00
|
|
|
ret = bch2_fs_read_write_early(c);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Write out the superblock and journal buckets, now that we can do
|
|
|
|
* btree updates
|
|
|
|
*/
|
2022-01-10 09:48:31 +08:00
|
|
|
bch_verbose(c, "marking superblocks");
|
2023-10-22 01:54:39 +08:00
|
|
|
ret = bch2_trans_mark_dev_sbs(c);
|
|
|
|
bch_err_msg(c, ret, "marking superblocks");
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
2021-12-24 17:22:20 +08:00
|
|
|
|
2023-10-22 01:54:39 +08:00
|
|
|
for_each_online_member(ca, c, i)
|
2021-12-24 17:22:20 +08:00
|
|
|
ca->new_fs_bucket_idx = 0;
|
2020-10-17 09:36:26 +08:00
|
|
|
|
2021-12-12 06:13:09 +08:00
|
|
|
ret = bch2_fs_freespace_init(c);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
2023-07-07 14:42:28 +08:00
|
|
|
ret = bch2_initialize_subvolumes(c);
|
2021-03-16 12:42:25 +08:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
bch_verbose(c, "reading snapshots table");
|
2023-07-07 14:42:28 +08:00
|
|
|
ret = bch2_snapshots_read(c);
|
2021-03-16 12:42:25 +08:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
bch_verbose(c, "reading snapshots done");
|
|
|
|
|
2022-10-23 03:59:53 +08:00
|
|
|
bch2_inode_init(c, &root_inode, 0, 0, S_IFDIR|0755, 0, NULL);
|
2021-03-16 12:42:25 +08:00
|
|
|
root_inode.bi_inum = BCACHEFS_ROOT_INO;
|
|
|
|
root_inode.bi_subvol = BCACHEFS_ROOT_SUBVOL;
|
2022-10-22 01:21:03 +08:00
|
|
|
bch2_inode_pack(&packed_inode, &root_inode);
|
bcachefs: Start using bpos.snapshot field
This patch starts treating the bpos.snapshot field like part of the key
in the btree code:
* bpos_successor() and bpos_predecessor() now include the snapshot field
* Keys in btrees that will be using snapshots (extents, inodes, dirents
and xattrs) now always have their snapshot field set to U32_MAX
The btree iterator code gets a new flag, BTREE_ITER_ALL_SNAPSHOTS, that
determines whether we're iterating over keys in all snapshots or not -
internally, this controlls whether bkey_(successor|predecessor)
increment/decrement the snapshot field, or only the higher bits of the
key.
We add a new member to struct btree_iter, iter->snapshot: when
BTREE_ITER_ALL_SNAPSHOTS is not set, iter->pos.snapshot should always
equal iter->snapshot, which will be 0 for btrees that don't use
snapshots, and alsways U32_MAX for btrees that will use snapshots
(until we enable snapshot creation).
This patch also introduces a new metadata version number, and compat
code for reading from/writing to older versions - this isn't a forced
upgrade (yet).
Signed-off-by: Kent Overstreet <kent.overstreet@gmail.com>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2021-03-25 06:02:16 +08:00
|
|
|
packed_inode.inode.k.p.snapshot = U32_MAX;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2023-09-13 06:41:22 +08:00
|
|
|
ret = bch2_btree_insert(c, BTREE_ID_inodes, &packed_inode.inode.k_i, NULL, 0);
|
2023-06-21 01:49:25 +08:00
|
|
|
if (ret) {
|
|
|
|
bch_err_msg(c, ret, "creating root directory");
|
2017-03-17 14:18:50 +08:00
|
|
|
goto err;
|
2023-06-21 01:49:25 +08:00
|
|
|
}
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2019-10-03 06:35:36 +08:00
|
|
|
bch2_inode_init_early(c, &lostfound_inode);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2019-12-23 12:39:28 +08:00
|
|
|
ret = bch2_trans_do(c, NULL, NULL, 0,
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_create_trans(trans,
|
2021-03-16 12:28:17 +08:00
|
|
|
BCACHEFS_ROOT_SUBVOL_INUM,
|
2019-10-03 06:35:36 +08:00
|
|
|
&root_inode, &lostfound_inode,
|
|
|
|
&lostfound,
|
2019-11-10 11:15:40 +08:00
|
|
|
0, 0, S_IFDIR|0700, 0,
|
2021-03-17 11:28:43 +08:00
|
|
|
NULL, NULL, (subvol_inum) { 0 }, 0));
|
2021-02-24 04:16:41 +08:00
|
|
|
if (ret) {
|
2023-06-21 01:49:25 +08:00
|
|
|
bch_err_msg(c, ret, "creating lost+found");
|
2017-03-17 14:18:50 +08:00
|
|
|
goto err;
|
2021-02-24 04:16:41 +08:00
|
|
|
}
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
if (enabled_qtypes(c)) {
|
|
|
|
ret = bch2_fs_quota_read(c);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2021-11-16 06:30:11 +08:00
|
|
|
ret = bch2_journal_flush(&c->journal);
|
2023-06-21 01:49:25 +08:00
|
|
|
if (ret) {
|
|
|
|
bch_err_msg(c, ret, "writing first journal entry");
|
2017-03-17 14:18:50 +08:00
|
|
|
goto err;
|
2023-06-21 01:49:25 +08:00
|
|
|
}
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
mutex_lock(&c->sb_lock);
|
|
|
|
SET_BCH_SB_INITIALIZED(c->disk_sb.sb, true);
|
|
|
|
SET_BCH_SB_CLEAN(c->disk_sb.sb, false);
|
|
|
|
|
|
|
|
bch2_write_super(c);
|
|
|
|
mutex_unlock(&c->sb_lock);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
err:
|
2023-06-21 01:49:25 +08:00
|
|
|
bch_err_fn(ca, ret);
|
2017-03-17 14:18:50 +08:00
|
|
|
return ret;
|
|
|
|
}
|