2022-06-14 07:07:19 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
|
|
|
|
#include "bcachefs.h"
|
|
|
|
#include "alloc_foreground.h"
|
|
|
|
#include "bkey_buf.h"
|
|
|
|
#include "btree_update.h"
|
|
|
|
#include "buckets.h"
|
|
|
|
#include "data_update.h"
|
|
|
|
#include "ec.h"
|
2023-03-11 06:34:29 +08:00
|
|
|
#include "error.h"
|
2022-06-14 07:07:19 +08:00
|
|
|
#include "extents.h"
|
2023-09-11 06:05:17 +08:00
|
|
|
#include "io_write.h"
|
2022-06-14 07:07:19 +08:00
|
|
|
#include "keylist.h"
|
|
|
|
#include "move.h"
|
2022-12-15 09:52:11 +08:00
|
|
|
#include "nocow_locking.h"
|
2022-06-14 07:07:19 +08:00
|
|
|
#include "subvolume.h"
|
|
|
|
#include "trace.h"
|
|
|
|
|
2023-04-21 03:24:07 +08:00
|
|
|
static void trace_move_extent_finish2(struct bch_fs *c, struct bkey_s_c k)
|
|
|
|
{
|
|
|
|
if (trace_move_extent_finish_enabled()) {
|
|
|
|
struct printbuf buf = PRINTBUF;
|
|
|
|
|
|
|
|
bch2_bkey_val_to_text(&buf, c, k);
|
|
|
|
trace_move_extent_finish(c, buf.buf);
|
|
|
|
printbuf_exit(&buf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-03-11 06:34:29 +08:00
|
|
|
static void trace_move_extent_fail2(struct data_update *m,
|
|
|
|
struct bkey_s_c new,
|
|
|
|
struct bkey_s_c wrote,
|
|
|
|
struct bkey_i *insert,
|
|
|
|
const char *msg)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = m->op.c;
|
|
|
|
struct bkey_s_c old = bkey_i_to_s_c(m->k.k);
|
|
|
|
const union bch_extent_entry *entry;
|
|
|
|
struct bch_extent_ptr *ptr;
|
|
|
|
struct extent_ptr_decoded p;
|
|
|
|
struct printbuf buf = PRINTBUF;
|
|
|
|
unsigned i, rewrites_found = 0;
|
|
|
|
|
|
|
|
if (!trace_move_extent_fail_enabled())
|
|
|
|
return;
|
|
|
|
|
|
|
|
prt_str(&buf, msg);
|
|
|
|
|
|
|
|
if (insert) {
|
|
|
|
i = 0;
|
|
|
|
bkey_for_each_ptr_decode(old.k, bch2_bkey_ptrs_c(old), p, entry) {
|
|
|
|
if (((1U << i) & m->data_opts.rewrite_ptrs) &&
|
|
|
|
(ptr = bch2_extent_has_ptr(old, p, bkey_i_to_s(insert))) &&
|
|
|
|
!ptr->cached)
|
|
|
|
rewrites_found |= 1U << i;
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
prt_printf(&buf, "\nrewrite ptrs: %u%u%u%u",
|
|
|
|
(m->data_opts.rewrite_ptrs & (1 << 0)) != 0,
|
|
|
|
(m->data_opts.rewrite_ptrs & (1 << 1)) != 0,
|
|
|
|
(m->data_opts.rewrite_ptrs & (1 << 2)) != 0,
|
|
|
|
(m->data_opts.rewrite_ptrs & (1 << 3)) != 0);
|
|
|
|
|
|
|
|
prt_printf(&buf, "\nrewrites found: %u%u%u%u",
|
|
|
|
(rewrites_found & (1 << 0)) != 0,
|
|
|
|
(rewrites_found & (1 << 1)) != 0,
|
|
|
|
(rewrites_found & (1 << 2)) != 0,
|
|
|
|
(rewrites_found & (1 << 3)) != 0);
|
|
|
|
|
|
|
|
prt_str(&buf, "\nold: ");
|
|
|
|
bch2_bkey_val_to_text(&buf, c, old);
|
|
|
|
|
|
|
|
prt_str(&buf, "\nnew: ");
|
|
|
|
bch2_bkey_val_to_text(&buf, c, new);
|
|
|
|
|
|
|
|
prt_str(&buf, "\nwrote: ");
|
|
|
|
bch2_bkey_val_to_text(&buf, c, wrote);
|
|
|
|
|
|
|
|
if (insert) {
|
|
|
|
prt_str(&buf, "\ninsert: ");
|
|
|
|
bch2_bkey_val_to_text(&buf, c, bkey_i_to_s_c(insert));
|
|
|
|
}
|
|
|
|
|
|
|
|
trace_move_extent_fail(c, buf.buf);
|
|
|
|
printbuf_exit(&buf);
|
|
|
|
}
|
|
|
|
|
2022-11-14 14:31:10 +08:00
|
|
|
static int __bch2_data_update_index_update(struct btree_trans *trans,
|
|
|
|
struct bch_write_op *op)
|
2022-06-14 07:07:19 +08:00
|
|
|
{
|
|
|
|
struct bch_fs *c = op->c;
|
|
|
|
struct btree_iter iter;
|
|
|
|
struct data_update *m =
|
|
|
|
container_of(op, struct data_update, op);
|
|
|
|
struct keylist *keys = &op->insert_keys;
|
|
|
|
struct bkey_buf _new, _insert;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
bch2_bkey_buf_init(&_new);
|
|
|
|
bch2_bkey_buf_init(&_insert);
|
|
|
|
bch2_bkey_buf_realloc(&_insert, c, U8_MAX);
|
|
|
|
|
2022-11-14 14:31:10 +08:00
|
|
|
bch2_trans_iter_init(trans, &iter, m->btree_id,
|
2022-06-14 07:07:19 +08:00
|
|
|
bkey_start_pos(&bch2_keylist_front(keys)->k),
|
|
|
|
BTREE_ITER_SLOTS|BTREE_ITER_INTENT);
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
struct bkey_s_c k;
|
2022-06-14 07:17:45 +08:00
|
|
|
struct bkey_s_c old = bkey_i_to_s_c(m->k.k);
|
2023-03-04 16:21:34 +08:00
|
|
|
struct bkey_i *insert = NULL;
|
2022-06-14 07:07:19 +08:00
|
|
|
struct bkey_i_extent *new;
|
2023-03-04 16:21:34 +08:00
|
|
|
const union bch_extent_entry *entry_c;
|
|
|
|
union bch_extent_entry *entry;
|
2022-06-14 07:07:19 +08:00
|
|
|
struct extent_ptr_decoded p;
|
2023-03-04 16:21:34 +08:00
|
|
|
struct bch_extent_ptr *ptr;
|
|
|
|
const struct bch_extent_ptr *ptr_c;
|
2022-06-14 07:07:19 +08:00
|
|
|
struct bpos next_pos;
|
2021-11-09 01:30:47 +08:00
|
|
|
bool should_check_enospc;
|
2022-06-14 07:07:19 +08:00
|
|
|
s64 i_sectors_delta = 0, disk_sectors_delta = 0;
|
2023-03-04 16:21:34 +08:00
|
|
|
unsigned rewrites_found = 0, durability, i;
|
2022-06-14 07:07:19 +08:00
|
|
|
|
2022-11-14 14:31:10 +08:00
|
|
|
bch2_trans_begin(trans);
|
2022-06-14 07:07:19 +08:00
|
|
|
|
|
|
|
k = bch2_btree_iter_peek_slot(&iter);
|
|
|
|
ret = bkey_err(k);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
new = bkey_i_to_extent(bch2_keylist_front(keys));
|
|
|
|
|
2023-03-11 06:34:29 +08:00
|
|
|
if (!bch2_extents_match(k, old)) {
|
|
|
|
trace_move_extent_fail2(m, k, bkey_i_to_s_c(&new->k_i),
|
|
|
|
NULL, "no match:");
|
2023-03-04 16:21:34 +08:00
|
|
|
goto nowork;
|
2023-03-11 06:34:29 +08:00
|
|
|
}
|
2022-06-14 07:07:19 +08:00
|
|
|
|
|
|
|
bkey_reassemble(_insert.k, k);
|
|
|
|
insert = _insert.k;
|
|
|
|
|
|
|
|
bch2_bkey_buf_copy(&_new, c, bch2_keylist_front(keys));
|
|
|
|
new = bkey_i_to_extent(_new.k);
|
|
|
|
bch2_cut_front(iter.pos, &new->k_i);
|
|
|
|
|
|
|
|
bch2_cut_front(iter.pos, insert);
|
|
|
|
bch2_cut_back(new->k.p, insert);
|
|
|
|
bch2_cut_back(insert->k.p, &new->k_i);
|
|
|
|
|
2022-06-14 07:17:45 +08:00
|
|
|
/*
|
|
|
|
* @old: extent that we read from
|
|
|
|
* @insert: key that we're going to update, initialized from
|
|
|
|
* extent currently in btree - same as @old unless we raced with
|
|
|
|
* other updates
|
|
|
|
* @new: extent with new pointers that we'll be adding to @insert
|
|
|
|
*
|
|
|
|
* Fist, drop rewrite_ptrs from @new:
|
|
|
|
*/
|
|
|
|
i = 0;
|
2023-03-04 16:21:34 +08:00
|
|
|
bkey_for_each_ptr_decode(old.k, bch2_bkey_ptrs_c(old), p, entry_c) {
|
2022-06-14 07:17:45 +08:00
|
|
|
if (((1U << i) & m->data_opts.rewrite_ptrs) &&
|
2023-03-04 16:21:34 +08:00
|
|
|
(ptr = bch2_extent_has_ptr(old, p, bkey_i_to_s(insert))) &&
|
|
|
|
!ptr->cached) {
|
2023-03-30 10:47:30 +08:00
|
|
|
bch2_bkey_drop_ptr_noerror(bkey_i_to_s(insert), ptr);
|
|
|
|
/*
|
|
|
|
* See comment below:
|
2023-03-04 16:21:34 +08:00
|
|
|
bch2_extent_ptr_set_cached(bkey_i_to_s(insert), ptr);
|
2023-03-30 10:47:30 +08:00
|
|
|
*/
|
2023-03-04 16:21:34 +08:00
|
|
|
rewrites_found |= 1U << i;
|
2022-06-14 07:17:45 +08:00
|
|
|
}
|
|
|
|
i++;
|
2022-06-14 07:07:19 +08:00
|
|
|
}
|
|
|
|
|
2023-03-04 16:21:34 +08:00
|
|
|
if (m->data_opts.rewrite_ptrs &&
|
|
|
|
!rewrites_found &&
|
2023-03-11 06:34:29 +08:00
|
|
|
bch2_bkey_durability(c, k) >= m->op.opts.data_replicas) {
|
|
|
|
trace_move_extent_fail2(m, k, bkey_i_to_s_c(&new->k_i), insert, "no rewrites found:");
|
2023-03-04 16:21:34 +08:00
|
|
|
goto nowork;
|
2023-03-11 06:34:29 +08:00
|
|
|
}
|
2022-06-14 07:17:45 +08:00
|
|
|
|
2023-03-04 16:21:34 +08:00
|
|
|
/*
|
|
|
|
* A replica that we just wrote might conflict with a replica
|
|
|
|
* that we want to keep, due to racing with another move:
|
|
|
|
*/
|
|
|
|
restart_drop_conflicting_replicas:
|
|
|
|
extent_for_each_ptr(extent_i_to_s(new), ptr)
|
|
|
|
if ((ptr_c = bch2_bkey_has_device_c(bkey_i_to_s_c(insert), ptr->dev)) &&
|
|
|
|
!ptr_c->cached) {
|
|
|
|
bch2_bkey_drop_ptr_noerror(bkey_i_to_s(&new->k_i), ptr);
|
|
|
|
goto restart_drop_conflicting_replicas;
|
2022-06-14 07:07:19 +08:00
|
|
|
}
|
|
|
|
|
2023-03-11 06:34:29 +08:00
|
|
|
if (!bkey_val_u64s(&new->k)) {
|
|
|
|
trace_move_extent_fail2(m, k, bkey_i_to_s_c(&new->k_i), insert, "new replicas conflicted:");
|
2023-03-04 16:21:34 +08:00
|
|
|
goto nowork;
|
2023-03-11 06:34:29 +08:00
|
|
|
}
|
2023-03-04 16:21:34 +08:00
|
|
|
|
|
|
|
/* Now, drop pointers that conflict with what we just wrote: */
|
|
|
|
extent_for_each_ptr_decode(extent_i_to_s(new), p, entry)
|
|
|
|
if ((ptr = bch2_bkey_has_device(bkey_i_to_s(insert), p.ptr.dev)))
|
|
|
|
bch2_bkey_drop_ptr_noerror(bkey_i_to_s(insert), ptr);
|
|
|
|
|
|
|
|
durability = bch2_bkey_durability(c, bkey_i_to_s_c(insert)) +
|
|
|
|
bch2_bkey_durability(c, bkey_i_to_s_c(&new->k_i));
|
|
|
|
|
|
|
|
/* Now, drop excess replicas: */
|
|
|
|
restart_drop_extra_replicas:
|
|
|
|
bkey_for_each_ptr_decode(old.k, bch2_bkey_ptrs(bkey_i_to_s(insert)), p, entry) {
|
|
|
|
unsigned ptr_durability = bch2_extent_ptr_durability(c, &p);
|
|
|
|
|
|
|
|
if (!p.ptr.cached &&
|
|
|
|
durability - ptr_durability >= m->op.opts.data_replicas) {
|
|
|
|
durability -= ptr_durability;
|
2023-03-30 10:47:30 +08:00
|
|
|
bch2_bkey_drop_ptr_noerror(bkey_i_to_s(insert), &entry->ptr);
|
|
|
|
/*
|
|
|
|
* Currently, we're dropping unneeded replicas
|
|
|
|
* instead of marking them as cached, since
|
|
|
|
* cached data in stripe buckets prevents them
|
|
|
|
* from being reused:
|
2023-03-04 16:21:34 +08:00
|
|
|
bch2_extent_ptr_set_cached(bkey_i_to_s(insert), &entry->ptr);
|
2023-03-30 10:47:30 +08:00
|
|
|
*/
|
2023-03-04 16:21:34 +08:00
|
|
|
goto restart_drop_extra_replicas;
|
|
|
|
}
|
2022-06-14 07:07:19 +08:00
|
|
|
}
|
|
|
|
|
2023-03-04 16:21:34 +08:00
|
|
|
/* Finally, add the pointers we just wrote: */
|
|
|
|
extent_for_each_ptr_decode(extent_i_to_s(new), p, entry)
|
|
|
|
bch2_extent_ptr_decoded_append(insert, &p);
|
2022-06-14 07:07:19 +08:00
|
|
|
|
2022-06-14 07:17:45 +08:00
|
|
|
bch2_bkey_narrow_crcs(insert, (struct bch_extent_crc_unpacked) { 0 });
|
2022-06-14 07:07:19 +08:00
|
|
|
bch2_extent_normalize(c, bkey_i_to_s(insert));
|
|
|
|
|
2022-11-14 14:31:10 +08:00
|
|
|
ret = bch2_sum_sector_overwrites(trans, &iter, insert,
|
2022-06-14 07:07:19 +08:00
|
|
|
&should_check_enospc,
|
|
|
|
&i_sectors_delta,
|
|
|
|
&disk_sectors_delta);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
if (disk_sectors_delta > (s64) op->res.sectors) {
|
|
|
|
ret = bch2_disk_reservation_add(c, &op->res,
|
|
|
|
disk_sectors_delta - op->res.sectors,
|
|
|
|
!should_check_enospc
|
|
|
|
? BCH_DISK_RESERVATION_NOFAIL : 0);
|
|
|
|
if (ret)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
next_pos = insert->k.p;
|
|
|
|
|
2023-05-28 11:19:13 +08:00
|
|
|
ret = bch2_insert_snapshot_whiteouts(trans, m->btree_id,
|
|
|
|
k.k->p, bkey_start_pos(&insert->k)) ?:
|
|
|
|
bch2_insert_snapshot_whiteouts(trans, m->btree_id,
|
|
|
|
k.k->p, insert->k.p);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
2023-02-17 12:42:09 +08:00
|
|
|
|
|
|
|
ret = bch2_trans_update(trans, &iter, insert,
|
2022-06-14 07:07:19 +08:00
|
|
|
BTREE_UPDATE_INTERNAL_SNAPSHOT_NODE) ?:
|
2022-11-14 14:31:10 +08:00
|
|
|
bch2_trans_commit(trans, &op->res,
|
2022-11-03 12:29:43 +08:00
|
|
|
NULL,
|
2023-03-14 10:01:47 +08:00
|
|
|
BTREE_INSERT_NOCHECK_RW|
|
2022-06-14 07:07:19 +08:00
|
|
|
BTREE_INSERT_NOFAIL|
|
|
|
|
m->data_opts.btree_insert_flags);
|
|
|
|
if (!ret) {
|
|
|
|
bch2_btree_iter_set_pos(&iter, next_pos);
|
2022-08-28 00:48:36 +08:00
|
|
|
|
|
|
|
this_cpu_add(c->counters[BCH_COUNTER_move_extent_finish], new->k.size);
|
2023-04-21 03:24:07 +08:00
|
|
|
trace_move_extent_finish2(c, bkey_i_to_s_c(&new->k_i));
|
2022-06-14 07:07:19 +08:00
|
|
|
}
|
|
|
|
err:
|
2022-07-18 11:06:38 +08:00
|
|
|
if (bch2_err_matches(ret, BCH_ERR_transaction_restart))
|
2022-06-14 07:07:19 +08:00
|
|
|
ret = 0;
|
|
|
|
if (ret)
|
|
|
|
break;
|
|
|
|
next:
|
2022-11-24 16:12:22 +08:00
|
|
|
while (bkey_ge(iter.pos, bch2_keylist_front(keys)->k.p)) {
|
2022-06-14 07:07:19 +08:00
|
|
|
bch2_keylist_pop_front(keys);
|
|
|
|
if (bch2_keylist_empty(keys))
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
continue;
|
2023-03-04 16:21:34 +08:00
|
|
|
nowork:
|
2023-10-24 03:36:45 +08:00
|
|
|
if (m->stats && m->stats) {
|
2022-06-14 07:07:19 +08:00
|
|
|
BUG_ON(k.k->p.offset <= iter.pos.offset);
|
2023-10-24 03:36:45 +08:00
|
|
|
atomic64_inc(&m->stats->keys_raced);
|
2022-06-14 07:07:19 +08:00
|
|
|
atomic64_add(k.k->p.offset - iter.pos.offset,
|
2023-10-24 03:36:45 +08:00
|
|
|
&m->stats->sectors_raced);
|
2022-06-14 07:07:19 +08:00
|
|
|
}
|
2022-08-28 00:48:36 +08:00
|
|
|
|
2023-05-27 06:12:55 +08:00
|
|
|
this_cpu_inc(c->counters[BCH_COUNTER_move_extent_fail]);
|
2022-08-28 00:48:36 +08:00
|
|
|
|
2022-06-14 07:07:19 +08:00
|
|
|
bch2_btree_iter_advance(&iter);
|
|
|
|
goto next;
|
|
|
|
}
|
|
|
|
out:
|
2022-11-14 14:31:10 +08:00
|
|
|
bch2_trans_iter_exit(trans, &iter);
|
2022-06-14 07:07:19 +08:00
|
|
|
bch2_bkey_buf_exit(&_insert, c);
|
|
|
|
bch2_bkey_buf_exit(&_new, c);
|
2022-07-18 11:06:38 +08:00
|
|
|
BUG_ON(bch2_err_matches(ret, BCH_ERR_transaction_restart));
|
2022-06-14 07:07:19 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2022-11-14 14:31:10 +08:00
|
|
|
int bch2_data_update_index_update(struct bch_write_op *op)
|
|
|
|
{
|
2023-09-13 05:16:02 +08:00
|
|
|
return bch2_trans_run(op->c, __bch2_data_update_index_update(trans, op));
|
2022-11-14 14:31:10 +08:00
|
|
|
}
|
|
|
|
|
2022-06-14 07:17:45 +08:00
|
|
|
void bch2_data_update_read_done(struct data_update *m,
|
|
|
|
struct bch_extent_crc_unpacked crc)
|
2022-06-14 07:07:19 +08:00
|
|
|
{
|
|
|
|
/* write bio must own pages: */
|
|
|
|
BUG_ON(!m->op.wbio.bio.bi_vcnt);
|
|
|
|
|
2022-06-14 07:17:45 +08:00
|
|
|
m->op.crc = crc;
|
|
|
|
m->op.wbio.bio.bi_iter.bi_size = crc.compressed_size << 9;
|
2022-06-14 07:07:19 +08:00
|
|
|
|
2022-06-14 07:17:45 +08:00
|
|
|
closure_call(&m->op.cl, bch2_write, NULL, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
void bch2_data_update_exit(struct data_update *update)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = update->op.c;
|
bcachefs: Nocow support
This adds support for nocow mode, where we do writes in-place when
possible. Patch components:
- New boolean filesystem and inode option, nocow: note that when nocow
is enabled, data checksumming and compression are implicitly disabled
- To prevent in-place writes from racing with data moves
(data_update.c) or bucket reuse (i.e. a bucket being reused and
re-allocated while a nocow write is in flight, we have a new locking
mechanism.
Buckets can be locked for either data update or data move, using a
fixed size hash table of two_state_shared locks. We don't have any
chaining, meaning updates and moves to different buckets that hash to
the same lock will wait unnecessarily - we'll want to watch for this
becoming an issue.
- The allocator path also needs to check for in-place writes in flight
to a given bucket before giving it out: thus we add another counter
to bucket_alloc_state so we can track this.
- Fsync now may need to issue cache flushes to block devices instead of
flushing the journal. We add a device bitmask to bch_inode_info,
ei_devs_need_flush, which tracks devices that need to have flushes
issued - note that this will lead to unnecessary flushes when other
codepaths have already issued flushes, we may want to replace this with
a sequence number.
- New nocow write path: look up extents, and if they're writable write
to them - otherwise fall back to the normal COW write path.
XXX: switch to sequence numbers instead of bitmask for devs needing
journal flush
XXX: ei_quota_lock being a mutex means bch2_nocow_write_done() needs to
run in process context - see if we can improve this
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2022-11-03 05:12:00 +08:00
|
|
|
struct bkey_ptrs_c ptrs =
|
|
|
|
bch2_bkey_ptrs_c(bkey_i_to_s_c(update->k.k));
|
|
|
|
const struct bch_extent_ptr *ptr;
|
|
|
|
|
2023-02-12 01:38:28 +08:00
|
|
|
bkey_for_each_ptr(ptrs, ptr) {
|
2023-02-25 08:07:21 +08:00
|
|
|
if (c->opts.nocow_enabled)
|
|
|
|
bch2_bucket_nocow_unlock(&c->nocow_locks,
|
|
|
|
PTR_BUCKET_POS(c, ptr), 0);
|
2023-02-12 01:38:28 +08:00
|
|
|
percpu_ref_put(&bch_dev_bkey_exists(c, ptr->dev)->ref);
|
|
|
|
}
|
2022-06-14 07:17:45 +08:00
|
|
|
|
|
|
|
bch2_bkey_buf_exit(&update->k, c);
|
|
|
|
bch2_disk_reservation_put(c, &update->op.res);
|
|
|
|
bch2_bio_free_pages_pool(c, &update->op.wbio.bio);
|
2022-06-14 07:07:19 +08:00
|
|
|
}
|
|
|
|
|
2022-11-14 14:31:10 +08:00
|
|
|
void bch2_update_unwritten_extent(struct btree_trans *trans,
|
|
|
|
struct data_update *update)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = update->op.c;
|
|
|
|
struct bio *bio = &update->op.wbio.bio;
|
|
|
|
struct bkey_i_extent *e;
|
|
|
|
struct write_point *wp;
|
|
|
|
struct bch_extent_ptr *ptr;
|
|
|
|
struct closure cl;
|
|
|
|
struct btree_iter iter;
|
|
|
|
struct bkey_s_c k;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
closure_init_stack(&cl);
|
|
|
|
bch2_keylist_init(&update->op.insert_keys, update->op.inline_keys);
|
|
|
|
|
|
|
|
while (bio_sectors(bio)) {
|
|
|
|
unsigned sectors = bio_sectors(bio);
|
|
|
|
|
|
|
|
bch2_trans_iter_init(trans, &iter, update->btree_id, update->op.pos,
|
|
|
|
BTREE_ITER_SLOTS);
|
|
|
|
ret = lockrestart_do(trans, ({
|
|
|
|
k = bch2_btree_iter_peek_slot(&iter);
|
|
|
|
bkey_err(k);
|
|
|
|
}));
|
|
|
|
bch2_trans_iter_exit(trans, &iter);
|
|
|
|
|
|
|
|
if (ret || !bch2_extents_match(k, bkey_i_to_s_c(update->k.k)))
|
|
|
|
break;
|
|
|
|
|
|
|
|
e = bkey_extent_init(update->op.insert_keys.top);
|
|
|
|
e->k.p = update->op.pos;
|
|
|
|
|
|
|
|
ret = bch2_alloc_sectors_start_trans(trans,
|
|
|
|
update->op.target,
|
|
|
|
false,
|
|
|
|
update->op.write_point,
|
|
|
|
&update->op.devs_have,
|
|
|
|
update->op.nr_replicas,
|
|
|
|
update->op.nr_replicas,
|
2023-06-25 07:30:10 +08:00
|
|
|
update->op.watermark,
|
2022-11-14 14:31:10 +08:00
|
|
|
0, &cl, &wp);
|
|
|
|
if (bch2_err_matches(ret, BCH_ERR_operation_blocked)) {
|
|
|
|
bch2_trans_unlock(trans);
|
|
|
|
closure_sync(&cl);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ret)
|
|
|
|
return;
|
|
|
|
|
|
|
|
sectors = min(sectors, wp->sectors_free);
|
|
|
|
|
|
|
|
bch2_key_resize(&e->k, sectors);
|
|
|
|
|
|
|
|
bch2_open_bucket_get(c, wp, &update->op.open_buckets);
|
|
|
|
bch2_alloc_sectors_append_ptrs(c, wp, &e->k_i, sectors, false);
|
|
|
|
bch2_alloc_sectors_done(c, wp);
|
|
|
|
|
|
|
|
bio_advance(bio, sectors << 9);
|
|
|
|
update->op.pos.offset += sectors;
|
|
|
|
|
|
|
|
extent_for_each_ptr(extent_i_to_s(e), ptr)
|
|
|
|
ptr->unwritten = true;
|
|
|
|
bch2_keylist_push(&update->op.insert_keys);
|
|
|
|
|
|
|
|
ret = __bch2_data_update_index_update(trans, &update->op);
|
|
|
|
|
|
|
|
bch2_open_buckets_put(c, &update->op.open_buckets);
|
|
|
|
|
|
|
|
if (ret)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2023-08-13 04:51:45 +08:00
|
|
|
if (closure_nr_remaining(&cl) != 1) {
|
2022-11-14 14:31:10 +08:00
|
|
|
bch2_trans_unlock(trans);
|
|
|
|
closure_sync(&cl);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-01-03 06:53:02 +08:00
|
|
|
int bch2_data_update_init(struct btree_trans *trans,
|
|
|
|
struct moving_context *ctxt,
|
|
|
|
struct data_update *m,
|
2022-06-14 07:07:19 +08:00
|
|
|
struct write_point_specifier wp,
|
|
|
|
struct bch_io_opts io_opts,
|
2022-06-14 07:17:45 +08:00
|
|
|
struct data_update_opts data_opts,
|
2022-06-14 07:07:19 +08:00
|
|
|
enum btree_id btree_id,
|
|
|
|
struct bkey_s_c k)
|
|
|
|
{
|
2023-01-03 06:53:02 +08:00
|
|
|
struct bch_fs *c = trans->c;
|
2022-06-14 07:07:19 +08:00
|
|
|
struct bkey_ptrs_c ptrs = bch2_bkey_ptrs_c(k);
|
|
|
|
const union bch_extent_entry *entry;
|
|
|
|
struct extent_ptr_decoded p;
|
2023-02-12 01:38:28 +08:00
|
|
|
const struct bch_extent_ptr *ptr;
|
2022-06-14 07:17:45 +08:00
|
|
|
unsigned i, reserve_sectors = k.k->size * data_opts.extra_replicas;
|
2023-02-28 12:16:37 +08:00
|
|
|
unsigned ptrs_locked = 0;
|
2022-06-14 07:07:19 +08:00
|
|
|
int ret;
|
|
|
|
|
2022-06-14 07:17:45 +08:00
|
|
|
bch2_bkey_buf_init(&m->k);
|
|
|
|
bch2_bkey_buf_reassemble(&m->k, c, k);
|
2022-06-14 07:07:19 +08:00
|
|
|
m->btree_id = btree_id;
|
|
|
|
m->data_opts = data_opts;
|
2023-10-24 03:36:45 +08:00
|
|
|
m->ctxt = ctxt;
|
|
|
|
m->stats = ctxt->stats;
|
2022-06-14 07:07:19 +08:00
|
|
|
|
|
|
|
bch2_write_op_init(&m->op, c, io_opts);
|
2022-06-14 07:17:45 +08:00
|
|
|
m->op.pos = bkey_start_pos(k.k);
|
|
|
|
m->op.version = k.k->version;
|
2022-10-20 06:31:33 +08:00
|
|
|
m->op.target = data_opts.target;
|
2022-06-14 07:07:19 +08:00
|
|
|
m->op.write_point = wp;
|
2023-02-28 12:16:37 +08:00
|
|
|
m->op.nr_replicas = 0;
|
2022-06-14 07:17:45 +08:00
|
|
|
m->op.flags |= BCH_WRITE_PAGES_STABLE|
|
2022-06-14 07:07:19 +08:00
|
|
|
BCH_WRITE_PAGES_OWNED|
|
|
|
|
BCH_WRITE_DATA_ENCODED|
|
2022-06-14 07:17:45 +08:00
|
|
|
BCH_WRITE_MOVE|
|
|
|
|
m->data_opts.write_flags;
|
2023-07-13 10:27:16 +08:00
|
|
|
m->op.compression_opt = io_opts.background_compression ?: io_opts.compression;
|
2023-06-28 05:32:48 +08:00
|
|
|
m->op.watermark = m->data_opts.btree_insert_flags & BCH_WATERMARK_MASK;
|
2022-06-14 07:07:19 +08:00
|
|
|
|
2023-02-12 01:38:28 +08:00
|
|
|
bkey_for_each_ptr(ptrs, ptr)
|
|
|
|
percpu_ref_get(&bch_dev_bkey_exists(c, ptr->dev)->ref);
|
|
|
|
|
2022-06-14 07:17:45 +08:00
|
|
|
i = 0;
|
|
|
|
bkey_for_each_ptr_decode(k.k, ptrs, p, entry) {
|
2023-01-06 16:11:07 +08:00
|
|
|
bool locked;
|
|
|
|
|
2023-02-28 12:16:37 +08:00
|
|
|
if (((1U << i) & m->data_opts.rewrite_ptrs)) {
|
|
|
|
BUG_ON(p.ptr.cached);
|
2022-06-14 07:07:19 +08:00
|
|
|
|
2023-02-28 12:16:37 +08:00
|
|
|
if (crc_is_compressed(p.crc))
|
|
|
|
reserve_sectors += k.k->size;
|
2022-06-14 07:07:19 +08:00
|
|
|
|
2023-06-14 03:12:04 +08:00
|
|
|
m->op.nr_replicas += bch2_extent_ptr_desired_durability(c, &p);
|
2023-02-28 12:16:37 +08:00
|
|
|
} else if (!p.ptr.cached) {
|
|
|
|
bch2_dev_list_add_dev(&m->op.devs_have, p.ptr.dev);
|
|
|
|
}
|
2022-06-14 07:07:19 +08:00
|
|
|
|
2022-06-14 07:17:45 +08:00
|
|
|
/*
|
|
|
|
* op->csum_type is normally initialized from the fs/file's
|
|
|
|
* current options - but if an extent is encrypted, we require
|
|
|
|
* that it stays encrypted:
|
|
|
|
*/
|
|
|
|
if (bch2_csum_type_is_encryption(p.crc.csum_type)) {
|
|
|
|
m->op.nonce = p.crc.nonce + p.crc.offset;
|
|
|
|
m->op.csum_type = p.crc.csum_type;
|
2022-06-14 07:07:19 +08:00
|
|
|
}
|
|
|
|
|
2022-06-14 07:17:45 +08:00
|
|
|
if (p.crc.compression_type == BCH_COMPRESSION_TYPE_incompressible)
|
|
|
|
m->op.incompressible = true;
|
2022-06-14 07:07:19 +08:00
|
|
|
|
2023-02-25 08:07:21 +08:00
|
|
|
if (c->opts.nocow_enabled) {
|
|
|
|
if (ctxt) {
|
2023-10-21 01:32:42 +08:00
|
|
|
move_ctxt_wait_event(ctxt,
|
2023-02-25 08:07:21 +08:00
|
|
|
(locked = bch2_bucket_nocow_trylock(&c->nocow_locks,
|
|
|
|
PTR_BUCKET_POS(c, &p.ptr), 0)) ||
|
|
|
|
!atomic_read(&ctxt->read_sectors));
|
|
|
|
|
|
|
|
if (!locked)
|
|
|
|
bch2_bucket_nocow_lock(&c->nocow_locks,
|
|
|
|
PTR_BUCKET_POS(c, &p.ptr), 0);
|
|
|
|
} else {
|
|
|
|
if (!bch2_bucket_nocow_trylock(&c->nocow_locks,
|
|
|
|
PTR_BUCKET_POS(c, &p.ptr), 0)) {
|
|
|
|
ret = -BCH_ERR_nocow_lock_blocked;
|
|
|
|
goto err;
|
|
|
|
}
|
2023-01-06 16:11:07 +08:00
|
|
|
}
|
2023-02-25 08:07:21 +08:00
|
|
|
ptrs_locked |= (1U << i);
|
2023-01-03 06:53:02 +08:00
|
|
|
}
|
2023-02-25 08:07:21 +08:00
|
|
|
|
2023-01-06 16:11:07 +08:00
|
|
|
i++;
|
2022-06-14 07:07:19 +08:00
|
|
|
}
|
2022-06-14 07:17:45 +08:00
|
|
|
|
|
|
|
if (reserve_sectors) {
|
|
|
|
ret = bch2_disk_reservation_add(c, &m->op.res, reserve_sectors,
|
|
|
|
m->data_opts.extra_replicas
|
|
|
|
? 0
|
|
|
|
: BCH_DISK_RESERVATION_NOFAIL);
|
|
|
|
if (ret)
|
2022-12-09 07:37:56 +08:00
|
|
|
goto err;
|
2022-06-14 07:07:19 +08:00
|
|
|
}
|
|
|
|
|
2023-02-28 12:16:37 +08:00
|
|
|
m->op.nr_replicas += m->data_opts.extra_replicas;
|
|
|
|
m->op.nr_replicas_required = m->op.nr_replicas;
|
2022-10-09 15:32:17 +08:00
|
|
|
|
|
|
|
BUG_ON(!m->op.nr_replicas);
|
2022-11-14 14:31:10 +08:00
|
|
|
|
|
|
|
/* Special handling required: */
|
|
|
|
if (bkey_extent_is_unwritten(k))
|
|
|
|
return -BCH_ERR_unwritten_extent_update;
|
2022-06-14 07:07:19 +08:00
|
|
|
return 0;
|
2022-12-09 07:37:56 +08:00
|
|
|
err:
|
2023-01-06 16:11:07 +08:00
|
|
|
i = 0;
|
|
|
|
bkey_for_each_ptr_decode(k.k, ptrs, p, entry) {
|
|
|
|
if ((1U << i) & ptrs_locked)
|
|
|
|
bch2_bucket_nocow_unlock(&c->nocow_locks,
|
2023-02-12 01:38:28 +08:00
|
|
|
PTR_BUCKET_POS(c, &p.ptr), 0);
|
|
|
|
percpu_ref_put(&bch_dev_bkey_exists(c, p.ptr.dev)->ref);
|
2023-01-06 16:11:07 +08:00
|
|
|
i++;
|
|
|
|
}
|
2022-12-09 07:37:56 +08:00
|
|
|
|
|
|
|
bch2_bkey_buf_exit(&m->k, c);
|
|
|
|
bch2_bio_free_pages_pool(c, &m->op.wbio.bio);
|
|
|
|
return ret;
|
2022-06-14 07:07:19 +08:00
|
|
|
}
|
2022-10-09 15:32:17 +08:00
|
|
|
|
|
|
|
void bch2_data_update_opts_normalize(struct bkey_s_c k, struct data_update_opts *opts)
|
|
|
|
{
|
|
|
|
struct bkey_ptrs_c ptrs = bch2_bkey_ptrs_c(k);
|
|
|
|
const struct bch_extent_ptr *ptr;
|
|
|
|
unsigned i = 0;
|
|
|
|
|
|
|
|
bkey_for_each_ptr(ptrs, ptr) {
|
|
|
|
if ((opts->rewrite_ptrs & (1U << i)) && ptr->cached) {
|
|
|
|
opts->kill_ptrs |= 1U << i;
|
|
|
|
opts->rewrite_ptrs ^= 1U << i;
|
|
|
|
}
|
|
|
|
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
}
|