2017-03-17 14:18:50 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
#ifndef NO_BCACHEFS_FS
|
|
|
|
|
|
|
|
#include "bcachefs.h"
|
|
|
|
#include "acl.h"
|
2020-12-18 04:08:58 +08:00
|
|
|
#include "bkey_buf.h"
|
2017-03-17 14:18:50 +08:00
|
|
|
#include "btree_update.h"
|
|
|
|
#include "buckets.h"
|
|
|
|
#include "chardev.h"
|
|
|
|
#include "dirent.h"
|
2022-07-19 07:42:58 +08:00
|
|
|
#include "errcode.h"
|
2017-03-17 14:18:50 +08:00
|
|
|
#include "extents.h"
|
|
|
|
#include "fs.h"
|
2019-10-03 06:35:36 +08:00
|
|
|
#include "fs-common.h"
|
2017-03-17 14:18:50 +08:00
|
|
|
#include "fs-io.h"
|
|
|
|
#include "fs-ioctl.h"
|
2023-08-04 06:18:21 +08:00
|
|
|
#include "fs-io-buffered.h"
|
|
|
|
#include "fs-io-direct.h"
|
|
|
|
#include "fs-io-pagecache.h"
|
2017-03-17 14:18:50 +08:00
|
|
|
#include "fsck.h"
|
|
|
|
#include "inode.h"
|
2023-09-11 06:05:17 +08:00
|
|
|
#include "io_read.h"
|
2017-03-17 14:18:50 +08:00
|
|
|
#include "journal.h"
|
|
|
|
#include "keylist.h"
|
|
|
|
#include "quota.h"
|
2023-08-17 04:54:33 +08:00
|
|
|
#include "snapshot.h"
|
2017-03-17 14:18:50 +08:00
|
|
|
#include "super.h"
|
|
|
|
#include "xattr.h"
|
|
|
|
|
|
|
|
#include <linux/aio.h>
|
|
|
|
#include <linux/backing-dev.h>
|
|
|
|
#include <linux/exportfs.h>
|
|
|
|
#include <linux/fiemap.h>
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/pagemap.h>
|
|
|
|
#include <linux/posix_acl.h>
|
|
|
|
#include <linux/random.h>
|
|
|
|
#include <linux/seq_file.h>
|
|
|
|
#include <linux/statfs.h>
|
2021-05-14 04:08:47 +08:00
|
|
|
#include <linux/string.h>
|
2017-03-17 14:18:50 +08:00
|
|
|
#include <linux/xattr.h>
|
|
|
|
|
|
|
|
static struct kmem_cache *bch2_inode_cache;
|
|
|
|
|
2021-11-06 12:03:40 +08:00
|
|
|
static void bch2_vfs_inode_init(struct btree_trans *, subvol_inum,
|
2017-03-17 14:18:50 +08:00
|
|
|
struct bch_inode_info *,
|
2021-10-28 01:05:56 +08:00
|
|
|
struct bch_inode_unpacked *,
|
|
|
|
struct bch_subvolume *);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2021-11-06 12:03:40 +08:00
|
|
|
void bch2_inode_update_after_write(struct btree_trans *trans,
|
2017-03-17 14:18:50 +08:00
|
|
|
struct bch_inode_info *inode,
|
|
|
|
struct bch_inode_unpacked *bi,
|
|
|
|
unsigned fields)
|
|
|
|
{
|
2021-11-06 12:03:40 +08:00
|
|
|
struct bch_fs *c = trans->c;
|
|
|
|
|
|
|
|
BUG_ON(bi->bi_inum != inode->v.i_ino);
|
|
|
|
|
|
|
|
bch2_assert_pos_locked(trans, BTREE_ID_inodes,
|
|
|
|
POS(0, bi->bi_inum),
|
2022-01-12 15:13:21 +08:00
|
|
|
c->opts.inodes_use_key_cache);
|
2021-11-06 12:03:40 +08:00
|
|
|
|
2019-09-26 04:19:52 +08:00
|
|
|
set_nlink(&inode->v, bch2_inode_nlink_get(bi));
|
2017-03-17 14:18:50 +08:00
|
|
|
i_uid_write(&inode->v, bi->bi_uid);
|
|
|
|
i_gid_write(&inode->v, bi->bi_gid);
|
|
|
|
inode->v.i_mode = bi->bi_mode;
|
|
|
|
|
|
|
|
if (fields & ATTR_ATIME)
|
2023-10-31 05:09:38 +08:00
|
|
|
inode_set_atime_to_ts(&inode->v, bch2_time_to_timespec(c, bi->bi_atime));
|
2017-03-17 14:18:50 +08:00
|
|
|
if (fields & ATTR_MTIME)
|
2023-10-31 05:09:38 +08:00
|
|
|
inode_set_mtime_to_ts(&inode->v, bch2_time_to_timespec(c, bi->bi_mtime));
|
2017-03-17 14:18:50 +08:00
|
|
|
if (fields & ATTR_CTIME)
|
|
|
|
inode_set_ctime_to_ts(&inode->v, bch2_time_to_timespec(c, bi->bi_ctime));
|
|
|
|
|
|
|
|
inode->ei_inode = *bi;
|
2018-07-18 02:12:42 +08:00
|
|
|
|
|
|
|
bch2_inode_flags_to_vfs(inode);
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
2018-07-18 02:12:42 +08:00
|
|
|
int __must_check bch2_write_inode(struct bch_fs *c,
|
|
|
|
struct bch_inode_info *inode,
|
|
|
|
inode_set_fn set,
|
|
|
|
void *p, unsigned fields)
|
2017-03-17 14:18:50 +08:00
|
|
|
{
|
2023-09-13 05:16:02 +08:00
|
|
|
struct btree_trans *trans = bch2_trans_get(c);
|
2021-08-31 03:18:31 +08:00
|
|
|
struct btree_iter iter = { NULL };
|
2017-03-17 14:18:50 +08:00
|
|
|
struct bch_inode_unpacked inode_u;
|
|
|
|
int ret;
|
|
|
|
retry:
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_begin(trans);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
ret = bch2_inode_peek(trans, &iter, &inode_u, inode_inum(inode),
|
2021-08-31 03:18:31 +08:00
|
|
|
BTREE_ITER_INTENT) ?:
|
2023-09-13 05:16:02 +08:00
|
|
|
(set ? set(trans, inode, &inode_u, p) : 0) ?:
|
|
|
|
bch2_inode_write(trans, &iter, &inode_u) ?:
|
|
|
|
bch2_trans_commit(trans, NULL, NULL, BTREE_INSERT_NOFAIL);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* the btree node lock protects inode->ei_inode, not ei_update_lock;
|
|
|
|
* this is important for inode updates via bchfs_write_index_update
|
|
|
|
*/
|
|
|
|
if (!ret)
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_inode_update_after_write(trans, inode, &inode_u, fields);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_iter_exit(trans, &iter);
|
2020-04-02 05:28:39 +08:00
|
|
|
|
2022-07-18 11:06:38 +08:00
|
|
|
if (bch2_err_matches(ret, BCH_ERR_transaction_restart))
|
2020-04-02 05:28:39 +08:00
|
|
|
goto retry;
|
|
|
|
|
2023-05-28 07:59:59 +08:00
|
|
|
bch2_fs_fatal_err_on(bch2_err_matches(ret, ENOENT), c,
|
2023-03-16 07:04:05 +08:00
|
|
|
"inode %u:%llu not found when updating",
|
|
|
|
inode_inum(inode).subvol,
|
|
|
|
inode_inum(inode).inum);
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_put(trans);
|
2017-03-17 14:18:50 +08:00
|
|
|
return ret < 0 ? ret : 0;
|
|
|
|
}
|
|
|
|
|
2018-12-17 18:43:00 +08:00
|
|
|
int bch2_fs_quota_transfer(struct bch_fs *c,
|
|
|
|
struct bch_inode_info *inode,
|
|
|
|
struct bch_qid new_qid,
|
|
|
|
unsigned qtypes,
|
|
|
|
enum quota_acct_mode mode)
|
|
|
|
{
|
|
|
|
unsigned i;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
qtypes &= enabled_qtypes(c);
|
|
|
|
|
|
|
|
for (i = 0; i < QTYP_NR; i++)
|
|
|
|
if (new_qid.q[i] == inode->ei_qid.q[i])
|
|
|
|
qtypes &= ~(1U << i);
|
|
|
|
|
|
|
|
if (!qtypes)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
mutex_lock(&inode->ei_quota_lock);
|
|
|
|
|
|
|
|
ret = bch2_quota_transfer(c, qtypes, new_qid,
|
|
|
|
inode->ei_qid,
|
|
|
|
inode->v.i_blocks +
|
|
|
|
inode->ei_quota_reserved,
|
|
|
|
mode);
|
|
|
|
if (!ret)
|
|
|
|
for (i = 0; i < QTYP_NR; i++)
|
|
|
|
if (qtypes & (1 << i))
|
|
|
|
inode->ei_qid.q[i] = new_qid.q[i];
|
|
|
|
|
|
|
|
mutex_unlock(&inode->ei_quota_lock);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-03-16 13:33:39 +08:00
|
|
|
static int bch2_iget5_test(struct inode *vinode, void *p)
|
|
|
|
{
|
|
|
|
struct bch_inode_info *inode = to_bch_ei(vinode);
|
|
|
|
subvol_inum *inum = p;
|
|
|
|
|
|
|
|
return inode->ei_subvol == inum->subvol &&
|
|
|
|
inode->ei_inode.bi_inum == inum->inum;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_iget5_set(struct inode *vinode, void *p)
|
|
|
|
{
|
|
|
|
struct bch_inode_info *inode = to_bch_ei(vinode);
|
|
|
|
subvol_inum *inum = p;
|
|
|
|
|
|
|
|
inode->v.i_ino = inum->inum;
|
|
|
|
inode->ei_subvol = inum->subvol;
|
|
|
|
inode->ei_inode.bi_inum = inum->inum;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static unsigned bch2_inode_hash(subvol_inum inum)
|
|
|
|
{
|
|
|
|
return jhash_3words(inum.subvol, inum.inum >> 32, inum.inum, JHASH_INITVAL);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct inode *bch2_vfs_inode_get(struct bch_fs *c, subvol_inum inum)
|
2017-03-17 14:18:50 +08:00
|
|
|
{
|
|
|
|
struct bch_inode_unpacked inode_u;
|
|
|
|
struct bch_inode_info *inode;
|
2023-09-13 05:16:02 +08:00
|
|
|
struct btree_trans *trans;
|
2021-10-28 01:05:56 +08:00
|
|
|
struct bch_subvolume subvol;
|
2017-03-17 14:18:50 +08:00
|
|
|
int ret;
|
|
|
|
|
2021-03-16 13:33:39 +08:00
|
|
|
inode = to_bch_ei(iget5_locked(c->vfs_sb,
|
|
|
|
bch2_inode_hash(inum),
|
|
|
|
bch2_iget5_test,
|
|
|
|
bch2_iget5_set,
|
|
|
|
&inum));
|
2017-03-17 14:18:50 +08:00
|
|
|
if (unlikely(!inode))
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
if (!(inode->v.i_state & I_NEW))
|
|
|
|
return &inode->v;
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
trans = bch2_trans_get(c);
|
|
|
|
ret = lockrestart_do(trans,
|
|
|
|
bch2_subvolume_get(trans, inum.subvol, true, 0, &subvol) ?:
|
|
|
|
bch2_inode_find_by_inum_trans(trans, inum, &inode_u));
|
2021-11-06 12:03:40 +08:00
|
|
|
|
|
|
|
if (!ret)
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_vfs_inode_init(trans, inum, inode, &inode_u, &subvol);
|
|
|
|
bch2_trans_put(trans);
|
2021-11-06 12:03:40 +08:00
|
|
|
|
2017-03-17 14:18:50 +08:00
|
|
|
if (ret) {
|
|
|
|
iget_failed(&inode->v);
|
2023-08-06 22:04:05 +08:00
|
|
|
return ERR_PTR(bch2_err_class(ret));
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
2023-03-15 23:53:51 +08:00
|
|
|
mutex_lock(&c->vfs_inodes_lock);
|
|
|
|
list_add(&inode->ei_vfs_inode_list, &c->vfs_inodes_list);
|
|
|
|
mutex_unlock(&c->vfs_inodes_lock);
|
|
|
|
|
2017-03-17 14:18:50 +08:00
|
|
|
unlock_new_inode(&inode->v);
|
|
|
|
|
|
|
|
return &inode->v;
|
|
|
|
}
|
|
|
|
|
2021-03-16 12:28:17 +08:00
|
|
|
struct bch_inode_info *
|
2017-03-17 14:18:50 +08:00
|
|
|
__bch2_create(struct mnt_idmap *idmap,
|
|
|
|
struct bch_inode_info *dir, struct dentry *dentry,
|
2021-03-17 11:28:43 +08:00
|
|
|
umode_t mode, dev_t rdev, subvol_inum snapshot_src,
|
|
|
|
unsigned flags)
|
2017-03-17 14:18:50 +08:00
|
|
|
{
|
|
|
|
struct bch_fs *c = dir->v.i_sb->s_fs_info;
|
2023-09-13 05:16:02 +08:00
|
|
|
struct btree_trans *trans;
|
2017-03-17 14:18:50 +08:00
|
|
|
struct bch_inode_unpacked dir_u;
|
|
|
|
struct bch_inode_info *inode, *old;
|
|
|
|
struct bch_inode_unpacked inode_u;
|
|
|
|
struct posix_acl *default_acl = NULL, *acl = NULL;
|
2021-03-16 13:33:39 +08:00
|
|
|
subvol_inum inum;
|
2021-10-28 01:05:56 +08:00
|
|
|
struct bch_subvolume subvol;
|
2018-07-23 17:48:35 +08:00
|
|
|
u64 journal_seq = 0;
|
2017-03-17 14:18:50 +08:00
|
|
|
int ret;
|
|
|
|
|
2019-10-03 06:35:36 +08:00
|
|
|
/*
|
|
|
|
* preallocate acls + vfs inode before btree transaction, so that
|
|
|
|
* nothing can fail after the transaction succeeds:
|
|
|
|
*/
|
2017-03-17 14:18:50 +08:00
|
|
|
#ifdef CONFIG_BCACHEFS_POSIX_ACL
|
2019-10-03 06:35:36 +08:00
|
|
|
ret = posix_acl_create(&dir->v, &mode, &default_acl, &acl);
|
2017-03-17 14:18:50 +08:00
|
|
|
if (ret)
|
2019-10-03 06:35:36 +08:00
|
|
|
return ERR_PTR(ret);
|
2017-03-17 14:18:50 +08:00
|
|
|
#endif
|
|
|
|
inode = to_bch_ei(new_inode(c->vfs_sb));
|
|
|
|
if (unlikely(!inode)) {
|
2019-10-03 06:35:36 +08:00
|
|
|
inode = ERR_PTR(-ENOMEM);
|
2017-03-17 14:18:50 +08:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2019-10-03 06:35:36 +08:00
|
|
|
bch2_inode_init_early(c, &inode_u);
|
|
|
|
|
2021-03-16 12:28:17 +08:00
|
|
|
if (!(flags & BCH_CREATE_TMPFILE))
|
2017-03-17 14:18:50 +08:00
|
|
|
mutex_lock(&dir->ei_update_lock);
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
trans = bch2_trans_get(c);
|
2017-03-17 14:18:50 +08:00
|
|
|
retry:
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_begin(trans);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
ret = bch2_create_trans(trans,
|
2021-03-16 12:28:17 +08:00
|
|
|
inode_inum(dir), &dir_u, &inode_u,
|
|
|
|
!(flags & BCH_CREATE_TMPFILE)
|
|
|
|
? &dentry->d_name : NULL,
|
2019-10-03 06:35:36 +08:00
|
|
|
from_kuid(i_user_ns(&dir->v), current_fsuid()),
|
|
|
|
from_kgid(i_user_ns(&dir->v), current_fsgid()),
|
|
|
|
mode, rdev,
|
2021-03-17 11:28:43 +08:00
|
|
|
default_acl, acl, snapshot_src, flags) ?:
|
2019-10-03 06:35:36 +08:00
|
|
|
bch2_quota_acct(c, bch_qid(&inode_u), Q_INO, 1,
|
|
|
|
KEY_TYPE_QUOTA_PREALLOC);
|
|
|
|
if (unlikely(ret))
|
|
|
|
goto err_before_quota;
|
|
|
|
|
2021-10-28 01:05:56 +08:00
|
|
|
inum.subvol = inode_u.bi_subvol ?: dir->ei_subvol;
|
|
|
|
inum.inum = inode_u.bi_inum;
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
ret = bch2_subvolume_get(trans, inum.subvol, true,
|
2021-10-28 01:05:56 +08:00
|
|
|
BTREE_ITER_WITH_UPDATES, &subvol) ?:
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_commit(trans, NULL, &journal_seq, 0);
|
2019-10-03 06:35:36 +08:00
|
|
|
if (unlikely(ret)) {
|
|
|
|
bch2_quota_acct(c, bch_qid(&inode_u), Q_INO, -1,
|
|
|
|
KEY_TYPE_QUOTA_WARN);
|
|
|
|
err_before_quota:
|
2022-07-18 11:06:38 +08:00
|
|
|
if (bch2_err_matches(ret, BCH_ERR_transaction_restart))
|
2019-10-03 06:35:36 +08:00
|
|
|
goto retry;
|
2017-03-17 14:18:50 +08:00
|
|
|
goto err_trans;
|
2019-10-03 06:35:36 +08:00
|
|
|
}
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2021-03-16 12:28:17 +08:00
|
|
|
if (!(flags & BCH_CREATE_TMPFILE)) {
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_inode_update_after_write(trans, dir, &dir_u,
|
2017-03-17 14:18:50 +08:00
|
|
|
ATTR_MTIME|ATTR_CTIME);
|
|
|
|
mutex_unlock(&dir->ei_update_lock);
|
|
|
|
}
|
|
|
|
|
2021-11-06 12:03:40 +08:00
|
|
|
bch2_iget5_set(&inode->v, &inum);
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_vfs_inode_init(trans, inum, inode, &inode_u, &subvol);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
set_cached_acl(&inode->v, ACL_TYPE_ACCESS, acl);
|
|
|
|
set_cached_acl(&inode->v, ACL_TYPE_DEFAULT, default_acl);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* we must insert the new inode into the inode cache before calling
|
|
|
|
* bch2_trans_exit() and dropping locks, else we could race with another
|
|
|
|
* thread pulling the inode in and modifying it:
|
|
|
|
*/
|
|
|
|
|
|
|
|
inode->v.i_state |= I_CREATING;
|
2021-03-16 13:33:39 +08:00
|
|
|
|
|
|
|
old = to_bch_ei(inode_insert5(&inode->v,
|
|
|
|
bch2_inode_hash(inum),
|
|
|
|
bch2_iget5_test,
|
|
|
|
bch2_iget5_set,
|
|
|
|
&inum));
|
2017-03-17 14:18:50 +08:00
|
|
|
BUG_ON(!old);
|
|
|
|
|
|
|
|
if (unlikely(old != inode)) {
|
|
|
|
/*
|
|
|
|
* We raced, another process pulled the new inode into cache
|
|
|
|
* before us:
|
|
|
|
*/
|
|
|
|
make_bad_inode(&inode->v);
|
|
|
|
iput(&inode->v);
|
|
|
|
|
|
|
|
inode = old;
|
|
|
|
} else {
|
2023-03-15 23:53:51 +08:00
|
|
|
mutex_lock(&c->vfs_inodes_lock);
|
|
|
|
list_add(&inode->ei_vfs_inode_list, &c->vfs_inodes_list);
|
|
|
|
mutex_unlock(&c->vfs_inodes_lock);
|
2017-03-17 14:18:50 +08:00
|
|
|
/*
|
|
|
|
* we really don't want insert_inode_locked2() to be setting
|
|
|
|
* I_NEW...
|
|
|
|
*/
|
|
|
|
unlock_new_inode(&inode->v);
|
|
|
|
}
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_put(trans);
|
2019-10-03 06:35:36 +08:00
|
|
|
err:
|
2017-03-17 14:18:50 +08:00
|
|
|
posix_acl_release(default_acl);
|
|
|
|
posix_acl_release(acl);
|
|
|
|
return inode;
|
|
|
|
err_trans:
|
2021-03-16 12:28:17 +08:00
|
|
|
if (!(flags & BCH_CREATE_TMPFILE))
|
2018-07-21 10:23:42 +08:00
|
|
|
mutex_unlock(&dir->ei_update_lock);
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_put(trans);
|
2017-03-17 14:18:50 +08:00
|
|
|
make_bad_inode(&inode->v);
|
|
|
|
iput(&inode->v);
|
|
|
|
inode = ERR_PTR(ret);
|
2019-10-03 06:35:36 +08:00
|
|
|
goto err;
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* methods */
|
|
|
|
|
|
|
|
static struct dentry *bch2_lookup(struct inode *vdir, struct dentry *dentry,
|
|
|
|
unsigned int flags)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = vdir->i_sb->s_fs_info;
|
|
|
|
struct bch_inode_info *dir = to_bch_ei(vdir);
|
2021-03-03 07:35:30 +08:00
|
|
|
struct bch_hash_info hash = bch2_hash_info_init(c, &dir->ei_inode);
|
2017-03-17 14:18:50 +08:00
|
|
|
struct inode *vinode = NULL;
|
2021-03-16 13:33:39 +08:00
|
|
|
subvol_inum inum = { .subvol = 1 };
|
2021-03-16 12:28:17 +08:00
|
|
|
int ret;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2021-03-16 12:28:17 +08:00
|
|
|
ret = bch2_dirent_lookup(c, inode_inum(dir), &hash,
|
|
|
|
&dentry->d_name, &inum);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2021-03-16 12:28:17 +08:00
|
|
|
if (!ret)
|
2017-03-17 14:18:50 +08:00
|
|
|
vinode = bch2_vfs_inode_get(c, inum);
|
|
|
|
|
|
|
|
return d_splice_alias(vinode, dentry);
|
|
|
|
}
|
|
|
|
|
2019-10-12 03:14:36 +08:00
|
|
|
static int bch2_mknod(struct mnt_idmap *idmap,
|
|
|
|
struct inode *vdir, struct dentry *dentry,
|
|
|
|
umode_t mode, dev_t rdev)
|
2017-03-17 14:18:50 +08:00
|
|
|
{
|
|
|
|
struct bch_inode_info *inode =
|
2021-03-17 11:28:43 +08:00
|
|
|
__bch2_create(idmap, to_bch_ei(vdir), dentry, mode, rdev,
|
|
|
|
(subvol_inum) { 0 }, 0);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
if (IS_ERR(inode))
|
2022-09-19 03:43:50 +08:00
|
|
|
return bch2_err_class(PTR_ERR(inode));
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
d_instantiate(dentry, &inode->v);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-10-12 03:14:36 +08:00
|
|
|
static int bch2_create(struct mnt_idmap *idmap,
|
|
|
|
struct inode *vdir, struct dentry *dentry,
|
|
|
|
umode_t mode, bool excl)
|
|
|
|
{
|
|
|
|
return bch2_mknod(idmap, vdir, dentry, mode|S_IFREG, 0);
|
|
|
|
}
|
|
|
|
|
2017-03-17 14:18:50 +08:00
|
|
|
static int __bch2_link(struct bch_fs *c,
|
|
|
|
struct bch_inode_info *inode,
|
|
|
|
struct bch_inode_info *dir,
|
|
|
|
struct dentry *dentry)
|
|
|
|
{
|
2023-09-13 05:16:02 +08:00
|
|
|
struct btree_trans *trans = bch2_trans_get(c);
|
2019-11-12 12:14:30 +08:00
|
|
|
struct bch_inode_unpacked dir_u, inode_u;
|
2017-03-17 14:18:50 +08:00
|
|
|
int ret;
|
|
|
|
|
2018-07-21 10:23:42 +08:00
|
|
|
mutex_lock(&inode->ei_update_lock);
|
2019-10-02 04:51:57 +08:00
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
ret = commit_do(trans, NULL, NULL, 0,
|
|
|
|
bch2_link_trans(trans,
|
2021-03-16 12:28:17 +08:00
|
|
|
inode_inum(dir), &dir_u,
|
|
|
|
inode_inum(inode), &inode_u,
|
2021-03-13 06:52:42 +08:00
|
|
|
&dentry->d_name));
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2019-11-12 12:14:30 +08:00
|
|
|
if (likely(!ret)) {
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_inode_update_after_write(trans, dir, &dir_u,
|
2019-11-12 12:14:30 +08:00
|
|
|
ATTR_MTIME|ATTR_CTIME);
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_inode_update_after_write(trans, inode, &inode_u, ATTR_CTIME);
|
2019-11-12 12:14:30 +08:00
|
|
|
}
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_put(trans);
|
2018-07-21 10:23:42 +08:00
|
|
|
mutex_unlock(&inode->ei_update_lock);
|
2017-03-17 14:18:50 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_link(struct dentry *old_dentry, struct inode *vdir,
|
|
|
|
struct dentry *dentry)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = vdir->i_sb->s_fs_info;
|
|
|
|
struct bch_inode_info *dir = to_bch_ei(vdir);
|
|
|
|
struct bch_inode_info *inode = to_bch_ei(old_dentry->d_inode);
|
|
|
|
int ret;
|
2018-07-18 02:03:47 +08:00
|
|
|
|
|
|
|
lockdep_assert_held(&inode->v.i_rwsem);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
ret = __bch2_link(c, inode, dir, dentry);
|
|
|
|
if (unlikely(ret))
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
ihold(&inode->v);
|
|
|
|
d_instantiate(dentry, &inode->v);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-03-17 11:28:43 +08:00
|
|
|
int __bch2_unlink(struct inode *vdir, struct dentry *dentry,
|
2021-10-12 00:03:19 +08:00
|
|
|
bool deleting_snapshot)
|
2017-03-17 14:18:50 +08:00
|
|
|
{
|
|
|
|
struct bch_fs *c = vdir->i_sb->s_fs_info;
|
|
|
|
struct bch_inode_info *dir = to_bch_ei(vdir);
|
|
|
|
struct bch_inode_info *inode = to_bch_ei(dentry->d_inode);
|
|
|
|
struct bch_inode_unpacked dir_u, inode_u;
|
2023-09-13 05:16:02 +08:00
|
|
|
struct btree_trans *trans = bch2_trans_get(c);
|
2017-03-17 14:18:50 +08:00
|
|
|
int ret;
|
|
|
|
|
2019-06-25 06:24:38 +08:00
|
|
|
bch2_lock_inodes(INODE_UPDATE_LOCK, dir, inode);
|
2019-10-02 04:51:57 +08:00
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
ret = commit_do(trans, NULL, NULL,
|
2023-03-16 23:04:28 +08:00
|
|
|
BTREE_INSERT_NOFAIL,
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_unlink_trans(trans,
|
2023-03-16 23:04:28 +08:00
|
|
|
inode_inum(dir), &dir_u,
|
|
|
|
&inode_u, &dentry->d_name,
|
|
|
|
deleting_snapshot));
|
|
|
|
if (unlikely(ret))
|
|
|
|
goto err;
|
2019-10-03 06:35:36 +08:00
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_inode_update_after_write(trans, dir, &dir_u,
|
2023-03-16 23:04:28 +08:00
|
|
|
ATTR_MTIME|ATTR_CTIME);
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_inode_update_after_write(trans, inode, &inode_u,
|
2023-03-16 23:04:28 +08:00
|
|
|
ATTR_MTIME);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2023-03-16 23:04:28 +08:00
|
|
|
if (inode_u.bi_subvol) {
|
|
|
|
/*
|
|
|
|
* Subvolume deletion is asynchronous, but we still want to tell
|
|
|
|
* the VFS that it's been deleted here:
|
|
|
|
*/
|
|
|
|
set_nlink(&inode->v, 0);
|
|
|
|
}
|
|
|
|
err:
|
2019-06-25 06:24:38 +08:00
|
|
|
bch2_unlock_inodes(INODE_UPDATE_LOCK, dir, inode);
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_put(trans);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2021-03-17 11:28:43 +08:00
|
|
|
static int bch2_unlink(struct inode *vdir, struct dentry *dentry)
|
|
|
|
{
|
2021-10-12 00:03:19 +08:00
|
|
|
return __bch2_unlink(vdir, dentry, false);
|
2021-03-17 11:28:43 +08:00
|
|
|
}
|
|
|
|
|
2017-03-17 14:18:50 +08:00
|
|
|
static int bch2_symlink(struct mnt_idmap *idmap,
|
|
|
|
struct inode *vdir, struct dentry *dentry,
|
|
|
|
const char *symname)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = vdir->i_sb->s_fs_info;
|
|
|
|
struct bch_inode_info *dir = to_bch_ei(vdir), *inode;
|
|
|
|
int ret;
|
|
|
|
|
2021-03-16 12:28:17 +08:00
|
|
|
inode = __bch2_create(idmap, dir, dentry, S_IFLNK|S_IRWXUGO, 0,
|
2021-03-17 11:28:43 +08:00
|
|
|
(subvol_inum) { 0 }, BCH_CREATE_TMPFILE);
|
2022-10-20 06:31:33 +08:00
|
|
|
if (IS_ERR(inode))
|
2022-09-19 03:43:50 +08:00
|
|
|
return bch2_err_class(PTR_ERR(inode));
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
inode_lock(&inode->v);
|
|
|
|
ret = page_symlink(&inode->v, symname, strlen(symname) + 1);
|
|
|
|
inode_unlock(&inode->v);
|
|
|
|
|
|
|
|
if (unlikely(ret))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
ret = filemap_write_and_wait_range(inode->v.i_mapping, 0, LLONG_MAX);
|
|
|
|
if (unlikely(ret))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
ret = __bch2_link(c, inode, dir, dentry);
|
|
|
|
if (unlikely(ret))
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
d_instantiate(dentry, &inode->v);
|
|
|
|
return 0;
|
|
|
|
err:
|
|
|
|
iput(&inode->v);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_mkdir(struct mnt_idmap *idmap,
|
|
|
|
struct inode *vdir, struct dentry *dentry, umode_t mode)
|
|
|
|
{
|
2019-10-12 03:14:36 +08:00
|
|
|
return bch2_mknod(idmap, vdir, dentry, mode|S_IFDIR, 0);
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_rename2(struct mnt_idmap *idmap,
|
|
|
|
struct inode *src_vdir, struct dentry *src_dentry,
|
|
|
|
struct inode *dst_vdir, struct dentry *dst_dentry,
|
|
|
|
unsigned flags)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = src_vdir->i_sb->s_fs_info;
|
2019-10-03 06:35:36 +08:00
|
|
|
struct bch_inode_info *src_dir = to_bch_ei(src_vdir);
|
|
|
|
struct bch_inode_info *dst_dir = to_bch_ei(dst_vdir);
|
|
|
|
struct bch_inode_info *src_inode = to_bch_ei(src_dentry->d_inode);
|
|
|
|
struct bch_inode_info *dst_inode = to_bch_ei(dst_dentry->d_inode);
|
2017-03-17 14:18:50 +08:00
|
|
|
struct bch_inode_unpacked dst_dir_u, src_dir_u;
|
|
|
|
struct bch_inode_unpacked src_inode_u, dst_inode_u;
|
2023-09-13 05:16:02 +08:00
|
|
|
struct btree_trans *trans;
|
2019-10-03 06:35:36 +08:00
|
|
|
enum bch_rename_mode mode = flags & RENAME_EXCHANGE
|
|
|
|
? BCH_RENAME_EXCHANGE
|
|
|
|
: dst_dentry->d_inode
|
|
|
|
? BCH_RENAME_OVERWRITE : BCH_RENAME;
|
2017-03-17 14:18:50 +08:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (flags & ~(RENAME_NOREPLACE|RENAME_EXCHANGE))
|
|
|
|
return -EINVAL;
|
|
|
|
|
2019-10-03 06:35:36 +08:00
|
|
|
if (mode == BCH_RENAME_OVERWRITE) {
|
|
|
|
ret = filemap_write_and_wait_range(src_inode->v.i_mapping,
|
2017-03-17 14:18:50 +08:00
|
|
|
0, LLONG_MAX);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
trans = bch2_trans_get(c);
|
2019-05-15 22:54:43 +08:00
|
|
|
|
2019-06-25 06:24:38 +08:00
|
|
|
bch2_lock_inodes(INODE_UPDATE_LOCK,
|
2019-10-03 06:35:36 +08:00
|
|
|
src_dir,
|
|
|
|
dst_dir,
|
|
|
|
src_inode,
|
|
|
|
dst_inode);
|
|
|
|
|
|
|
|
if (inode_attr_changing(dst_dir, src_inode, Inode_opt_project)) {
|
|
|
|
ret = bch2_fs_quota_transfer(c, src_inode,
|
|
|
|
dst_dir->ei_qid,
|
2018-12-17 18:31:49 +08:00
|
|
|
1 << QTYP_PRJ,
|
|
|
|
KEY_TYPE_QUOTA_PREALLOC);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2019-10-03 06:35:36 +08:00
|
|
|
if (mode == BCH_RENAME_EXCHANGE &&
|
|
|
|
inode_attr_changing(src_dir, dst_inode, Inode_opt_project)) {
|
|
|
|
ret = bch2_fs_quota_transfer(c, dst_inode,
|
|
|
|
src_dir->ei_qid,
|
2018-12-17 18:31:49 +08:00
|
|
|
1 << QTYP_PRJ,
|
|
|
|
KEY_TYPE_QUOTA_PREALLOC);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
ret = commit_do(trans, NULL, NULL, 0,
|
|
|
|
bch2_rename_trans(trans,
|
2021-03-16 12:28:17 +08:00
|
|
|
inode_inum(src_dir), &src_dir_u,
|
|
|
|
inode_inum(dst_dir), &dst_dir_u,
|
2021-03-13 06:52:42 +08:00
|
|
|
&src_inode_u,
|
|
|
|
&dst_inode_u,
|
|
|
|
&src_dentry->d_name,
|
|
|
|
&dst_dentry->d_name,
|
|
|
|
mode));
|
2017-03-17 14:18:50 +08:00
|
|
|
if (unlikely(ret))
|
|
|
|
goto err;
|
|
|
|
|
2019-10-03 06:35:36 +08:00
|
|
|
BUG_ON(src_inode->v.i_ino != src_inode_u.bi_inum);
|
|
|
|
BUG_ON(dst_inode &&
|
|
|
|
dst_inode->v.i_ino != dst_inode_u.bi_inum);
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_inode_update_after_write(trans, src_dir, &src_dir_u,
|
2017-03-17 14:18:50 +08:00
|
|
|
ATTR_MTIME|ATTR_CTIME);
|
|
|
|
|
2021-11-06 03:17:13 +08:00
|
|
|
if (src_dir != dst_dir)
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_inode_update_after_write(trans, dst_dir, &dst_dir_u,
|
2017-03-17 14:18:50 +08:00
|
|
|
ATTR_MTIME|ATTR_CTIME);
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_inode_update_after_write(trans, src_inode, &src_inode_u,
|
2017-03-17 14:18:50 +08:00
|
|
|
ATTR_CTIME);
|
2019-10-03 06:35:36 +08:00
|
|
|
|
2021-11-06 03:17:13 +08:00
|
|
|
if (dst_inode)
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_inode_update_after_write(trans, dst_inode, &dst_inode_u,
|
2017-03-17 14:18:50 +08:00
|
|
|
ATTR_CTIME);
|
|
|
|
err:
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_put(trans);
|
2018-12-17 18:31:49 +08:00
|
|
|
|
2019-10-03 06:35:36 +08:00
|
|
|
bch2_fs_quota_transfer(c, src_inode,
|
|
|
|
bch_qid(&src_inode->ei_inode),
|
2018-12-17 18:31:49 +08:00
|
|
|
1 << QTYP_PRJ,
|
|
|
|
KEY_TYPE_QUOTA_NOCHECK);
|
2019-10-03 06:35:36 +08:00
|
|
|
if (dst_inode)
|
|
|
|
bch2_fs_quota_transfer(c, dst_inode,
|
|
|
|
bch_qid(&dst_inode->ei_inode),
|
2018-12-17 18:31:49 +08:00
|
|
|
1 << QTYP_PRJ,
|
|
|
|
KEY_TYPE_QUOTA_NOCHECK);
|
|
|
|
|
2019-06-25 06:24:38 +08:00
|
|
|
bch2_unlock_inodes(INODE_UPDATE_LOCK,
|
2019-10-03 06:35:36 +08:00
|
|
|
src_dir,
|
|
|
|
dst_dir,
|
|
|
|
src_inode,
|
|
|
|
dst_inode);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2019-10-02 04:51:57 +08:00
|
|
|
static void bch2_setattr_copy(struct mnt_idmap *idmap,
|
|
|
|
struct bch_inode_info *inode,
|
|
|
|
struct bch_inode_unpacked *bi,
|
|
|
|
struct iattr *attr)
|
2017-03-17 14:18:50 +08:00
|
|
|
{
|
|
|
|
struct bch_fs *c = inode->v.i_sb->s_fs_info;
|
2019-10-02 04:51:57 +08:00
|
|
|
unsigned int ia_valid = attr->ia_valid;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
if (ia_valid & ATTR_UID)
|
2019-10-02 04:51:57 +08:00
|
|
|
bi->bi_uid = from_kuid(i_user_ns(&inode->v), attr->ia_uid);
|
2017-03-17 14:18:50 +08:00
|
|
|
if (ia_valid & ATTR_GID)
|
2019-10-02 04:51:57 +08:00
|
|
|
bi->bi_gid = from_kgid(i_user_ns(&inode->v), attr->ia_gid);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2021-06-15 10:29:54 +08:00
|
|
|
if (ia_valid & ATTR_SIZE)
|
|
|
|
bi->bi_size = attr->ia_size;
|
|
|
|
|
2017-03-17 14:18:50 +08:00
|
|
|
if (ia_valid & ATTR_ATIME)
|
2019-10-02 04:51:57 +08:00
|
|
|
bi->bi_atime = timespec_to_bch2_time(c, attr->ia_atime);
|
2017-03-17 14:18:50 +08:00
|
|
|
if (ia_valid & ATTR_MTIME)
|
2019-10-02 04:51:57 +08:00
|
|
|
bi->bi_mtime = timespec_to_bch2_time(c, attr->ia_mtime);
|
2017-03-17 14:18:50 +08:00
|
|
|
if (ia_valid & ATTR_CTIME)
|
2019-10-02 04:51:57 +08:00
|
|
|
bi->bi_ctime = timespec_to_bch2_time(c, attr->ia_ctime);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
if (ia_valid & ATTR_MODE) {
|
2019-10-02 04:51:57 +08:00
|
|
|
umode_t mode = attr->ia_mode;
|
2017-03-17 14:18:50 +08:00
|
|
|
kgid_t gid = ia_valid & ATTR_GID
|
2019-10-02 04:51:57 +08:00
|
|
|
? attr->ia_gid
|
2017-03-17 14:18:50 +08:00
|
|
|
: inode->v.i_gid;
|
|
|
|
|
|
|
|
if (!in_group_p(gid) &&
|
2019-10-02 04:51:57 +08:00
|
|
|
!capable_wrt_inode_uidgid(idmap, &inode->v, CAP_FSETID))
|
2017-03-17 14:18:50 +08:00
|
|
|
mode &= ~S_ISGID;
|
|
|
|
bi->bi_mode = mode;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-15 10:29:54 +08:00
|
|
|
int bch2_setattr_nonsize(struct mnt_idmap *idmap,
|
|
|
|
struct bch_inode_info *inode,
|
|
|
|
struct iattr *attr)
|
2017-03-17 14:18:50 +08:00
|
|
|
{
|
|
|
|
struct bch_fs *c = inode->v.i_sb->s_fs_info;
|
2018-12-17 18:43:00 +08:00
|
|
|
struct bch_qid qid;
|
2023-09-13 05:16:02 +08:00
|
|
|
struct btree_trans *trans;
|
2021-08-31 03:18:31 +08:00
|
|
|
struct btree_iter inode_iter = { NULL };
|
2017-03-17 14:18:50 +08:00
|
|
|
struct bch_inode_unpacked inode_u;
|
|
|
|
struct posix_acl *acl = NULL;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
mutex_lock(&inode->ei_update_lock);
|
|
|
|
|
2018-12-17 18:43:00 +08:00
|
|
|
qid = inode->ei_qid;
|
|
|
|
|
2019-10-02 04:51:57 +08:00
|
|
|
if (attr->ia_valid & ATTR_UID)
|
|
|
|
qid.q[QTYP_USR] = from_kuid(i_user_ns(&inode->v), attr->ia_uid);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2019-10-02 04:51:57 +08:00
|
|
|
if (attr->ia_valid & ATTR_GID)
|
|
|
|
qid.q[QTYP_GRP] = from_kgid(i_user_ns(&inode->v), attr->ia_gid);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2018-12-17 18:43:00 +08:00
|
|
|
ret = bch2_fs_quota_transfer(c, inode, qid, ~0,
|
|
|
|
KEY_TYPE_QUOTA_PREALLOC);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
trans = bch2_trans_get(c);
|
2017-03-17 14:18:50 +08:00
|
|
|
retry:
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_begin(trans);
|
2017-03-17 14:18:50 +08:00
|
|
|
kfree(acl);
|
|
|
|
acl = NULL;
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
ret = bch2_inode_peek(trans, &inode_iter, &inode_u, inode_inum(inode),
|
2021-08-31 03:18:31 +08:00
|
|
|
BTREE_ITER_INTENT);
|
2019-10-02 04:51:57 +08:00
|
|
|
if (ret)
|
|
|
|
goto btree_err;
|
|
|
|
|
|
|
|
bch2_setattr_copy(idmap, inode, &inode_u, attr);
|
|
|
|
|
|
|
|
if (attr->ia_valid & ATTR_MODE) {
|
2023-09-13 05:16:02 +08:00
|
|
|
ret = bch2_acl_chmod(trans, inode_inum(inode), &inode_u,
|
2021-03-16 12:28:17 +08:00
|
|
|
inode_u.bi_mode, &acl);
|
2019-10-02 04:51:57 +08:00
|
|
|
if (ret)
|
|
|
|
goto btree_err;
|
|
|
|
}
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
ret = bch2_inode_write(trans, &inode_iter, &inode_u) ?:
|
|
|
|
bch2_trans_commit(trans, NULL, NULL,
|
2017-03-17 14:18:50 +08:00
|
|
|
BTREE_INSERT_NOFAIL);
|
2019-10-02 04:51:57 +08:00
|
|
|
btree_err:
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_iter_exit(trans, &inode_iter);
|
2021-03-20 08:29:11 +08:00
|
|
|
|
2022-07-18 11:06:38 +08:00
|
|
|
if (bch2_err_matches(ret, BCH_ERR_transaction_restart))
|
2017-03-17 14:18:50 +08:00
|
|
|
goto retry;
|
|
|
|
if (unlikely(ret))
|
|
|
|
goto err_trans;
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_inode_update_after_write(trans, inode, &inode_u, attr->ia_valid);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
if (acl)
|
|
|
|
set_cached_acl(&inode->v, ACL_TYPE_ACCESS, acl);
|
|
|
|
err_trans:
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_put(trans);
|
2017-03-17 14:18:50 +08:00
|
|
|
err:
|
|
|
|
mutex_unlock(&inode->ei_update_lock);
|
|
|
|
|
2022-09-19 03:43:50 +08:00
|
|
|
return bch2_err_class(ret);
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_getattr(struct mnt_idmap *idmap,
|
|
|
|
const struct path *path, struct kstat *stat,
|
|
|
|
u32 request_mask, unsigned query_flags)
|
|
|
|
{
|
|
|
|
struct bch_inode_info *inode = to_bch_ei(d_inode(path->dentry));
|
|
|
|
struct bch_fs *c = inode->v.i_sb->s_fs_info;
|
|
|
|
|
|
|
|
stat->dev = inode->v.i_sb->s_dev;
|
|
|
|
stat->ino = inode->v.i_ino;
|
|
|
|
stat->mode = inode->v.i_mode;
|
|
|
|
stat->nlink = inode->v.i_nlink;
|
|
|
|
stat->uid = inode->v.i_uid;
|
|
|
|
stat->gid = inode->v.i_gid;
|
|
|
|
stat->rdev = inode->v.i_rdev;
|
|
|
|
stat->size = i_size_read(&inode->v);
|
2023-10-31 05:09:38 +08:00
|
|
|
stat->atime = inode_get_atime(&inode->v);
|
|
|
|
stat->mtime = inode_get_mtime(&inode->v);
|
2017-03-17 14:18:50 +08:00
|
|
|
stat->ctime = inode_get_ctime(&inode->v);
|
|
|
|
stat->blksize = block_bytes(c);
|
|
|
|
stat->blocks = inode->v.i_blocks;
|
|
|
|
|
|
|
|
if (request_mask & STATX_BTIME) {
|
|
|
|
stat->result_mask |= STATX_BTIME;
|
|
|
|
stat->btime = bch2_time_to_timespec(c, inode->ei_inode.bi_otime);
|
|
|
|
}
|
|
|
|
|
2023-11-02 23:42:48 +08:00
|
|
|
if (inode->ei_inode.bi_flags & BCH_INODE_immutable)
|
2017-03-17 14:18:50 +08:00
|
|
|
stat->attributes |= STATX_ATTR_IMMUTABLE;
|
2019-11-07 03:29:30 +08:00
|
|
|
stat->attributes_mask |= STATX_ATTR_IMMUTABLE;
|
|
|
|
|
2023-11-02 23:42:48 +08:00
|
|
|
if (inode->ei_inode.bi_flags & BCH_INODE_append)
|
2017-03-17 14:18:50 +08:00
|
|
|
stat->attributes |= STATX_ATTR_APPEND;
|
2019-11-07 03:29:30 +08:00
|
|
|
stat->attributes_mask |= STATX_ATTR_APPEND;
|
|
|
|
|
2023-11-02 23:42:48 +08:00
|
|
|
if (inode->ei_inode.bi_flags & BCH_INODE_nodump)
|
2017-03-17 14:18:50 +08:00
|
|
|
stat->attributes |= STATX_ATTR_NODUMP;
|
2019-11-07 03:29:30 +08:00
|
|
|
stat->attributes_mask |= STATX_ATTR_NODUMP;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_setattr(struct mnt_idmap *idmap,
|
|
|
|
struct dentry *dentry, struct iattr *iattr)
|
|
|
|
{
|
|
|
|
struct bch_inode_info *inode = to_bch_ei(dentry->d_inode);
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
lockdep_assert_held(&inode->v.i_rwsem);
|
|
|
|
|
|
|
|
ret = setattr_prepare(idmap, dentry, iattr);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
return iattr->ia_valid & ATTR_SIZE
|
2023-09-04 17:38:30 +08:00
|
|
|
? bchfs_truncate(idmap, inode, iattr)
|
2017-03-17 14:18:50 +08:00
|
|
|
: bch2_setattr_nonsize(idmap, inode, iattr);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_tmpfile(struct mnt_idmap *idmap,
|
|
|
|
struct inode *vdir, struct file *file, umode_t mode)
|
|
|
|
{
|
|
|
|
struct bch_inode_info *inode =
|
|
|
|
__bch2_create(idmap, to_bch_ei(vdir),
|
2021-03-16 12:28:17 +08:00
|
|
|
file->f_path.dentry, mode, 0,
|
2021-03-17 11:28:43 +08:00
|
|
|
(subvol_inum) { 0 }, BCH_CREATE_TMPFILE);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
if (IS_ERR(inode))
|
2022-09-19 03:43:50 +08:00
|
|
|
return bch2_err_class(PTR_ERR(inode));
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
d_mark_tmpfile(file, &inode->v);
|
|
|
|
d_instantiate(file->f_path.dentry, &inode->v);
|
|
|
|
return finish_open_simple(file, 0);
|
|
|
|
}
|
|
|
|
|
2019-06-30 05:59:21 +08:00
|
|
|
static int bch2_fill_extent(struct bch_fs *c,
|
|
|
|
struct fiemap_extent_info *info,
|
2019-07-26 01:52:14 +08:00
|
|
|
struct bkey_s_c k, unsigned flags)
|
2017-03-17 14:18:50 +08:00
|
|
|
{
|
2020-10-27 05:03:28 +08:00
|
|
|
if (bkey_extent_is_direct_data(k.k)) {
|
2019-07-26 01:52:14 +08:00
|
|
|
struct bkey_ptrs_c ptrs = bch2_bkey_ptrs_c(k);
|
2018-09-28 09:08:39 +08:00
|
|
|
const union bch_extent_entry *entry;
|
|
|
|
struct extent_ptr_decoded p;
|
2017-03-17 14:18:50 +08:00
|
|
|
int ret;
|
|
|
|
|
2019-08-16 21:59:56 +08:00
|
|
|
if (k.k->type == KEY_TYPE_reflink_v)
|
|
|
|
flags |= FIEMAP_EXTENT_SHARED;
|
|
|
|
|
2019-07-26 01:52:14 +08:00
|
|
|
bkey_for_each_ptr_decode(k.k, ptrs, p, entry) {
|
2017-03-17 14:18:50 +08:00
|
|
|
int flags2 = 0;
|
2018-09-28 09:08:39 +08:00
|
|
|
u64 offset = p.ptr.offset;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2022-11-14 07:59:01 +08:00
|
|
|
if (p.ptr.unwritten)
|
|
|
|
flags2 |= FIEMAP_EXTENT_UNWRITTEN;
|
|
|
|
|
2018-09-28 09:08:39 +08:00
|
|
|
if (p.crc.compression_type)
|
2017-03-17 14:18:50 +08:00
|
|
|
flags2 |= FIEMAP_EXTENT_ENCODED;
|
|
|
|
else
|
2018-09-28 09:08:39 +08:00
|
|
|
offset += p.crc.offset;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2021-12-15 03:24:41 +08:00
|
|
|
if ((offset & (block_sectors(c) - 1)) ||
|
|
|
|
(k.k->size & (block_sectors(c) - 1)))
|
2017-03-17 14:18:50 +08:00
|
|
|
flags2 |= FIEMAP_EXTENT_NOT_ALIGNED;
|
|
|
|
|
|
|
|
ret = fiemap_fill_next_extent(info,
|
2019-07-26 01:52:14 +08:00
|
|
|
bkey_start_offset(k.k) << 9,
|
2018-09-28 09:08:39 +08:00
|
|
|
offset << 9,
|
2019-07-26 01:52:14 +08:00
|
|
|
k.k->size << 9, flags|flags2);
|
2017-03-17 14:18:50 +08:00
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
2020-10-27 05:03:28 +08:00
|
|
|
} else if (bkey_extent_is_inline_data(k.k)) {
|
|
|
|
return fiemap_fill_next_extent(info,
|
|
|
|
bkey_start_offset(k.k) << 9,
|
|
|
|
0, k.k->size << 9,
|
|
|
|
flags|
|
|
|
|
FIEMAP_EXTENT_DATA_INLINE);
|
2019-07-26 01:52:14 +08:00
|
|
|
} else if (k.k->type == KEY_TYPE_reservation) {
|
2017-03-17 14:18:50 +08:00
|
|
|
return fiemap_fill_next_extent(info,
|
2019-07-26 01:52:14 +08:00
|
|
|
bkey_start_offset(k.k) << 9,
|
|
|
|
0, k.k->size << 9,
|
2017-03-17 14:18:50 +08:00
|
|
|
flags|
|
|
|
|
FIEMAP_EXTENT_DELALLOC|
|
|
|
|
FIEMAP_EXTENT_UNWRITTEN);
|
|
|
|
} else {
|
|
|
|
BUG();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_fiemap(struct inode *vinode, struct fiemap_extent_info *info,
|
|
|
|
u64 start, u64 len)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = vinode->i_sb->s_fs_info;
|
|
|
|
struct bch_inode_info *ei = to_bch_ei(vinode);
|
2023-09-13 05:16:02 +08:00
|
|
|
struct btree_trans *trans;
|
2021-08-31 03:18:31 +08:00
|
|
|
struct btree_iter iter;
|
2017-03-17 14:18:50 +08:00
|
|
|
struct bkey_s_c k;
|
2020-12-18 04:08:58 +08:00
|
|
|
struct bkey_buf cur, prev;
|
2019-08-23 04:12:28 +08:00
|
|
|
struct bpos end = POS(ei->v.i_ino, (start + len) >> 9);
|
2019-08-16 21:59:56 +08:00
|
|
|
unsigned offset_into_extent, sectors;
|
2017-03-17 14:18:50 +08:00
|
|
|
bool have_extent = false;
|
2021-03-16 12:28:17 +08:00
|
|
|
u32 snapshot;
|
2017-03-17 14:18:50 +08:00
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
ret = fiemap_prep(&ei->v, info, start, &len, FIEMAP_FLAG_SYNC);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
if (start + len < start)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2021-03-16 12:28:17 +08:00
|
|
|
start >>= 9;
|
|
|
|
|
2020-12-18 04:08:58 +08:00
|
|
|
bch2_bkey_buf_init(&cur);
|
|
|
|
bch2_bkey_buf_init(&prev);
|
2023-09-13 05:16:02 +08:00
|
|
|
trans = bch2_trans_get(c);
|
2019-08-23 04:12:28 +08:00
|
|
|
retry:
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_begin(trans);
|
2021-07-25 08:24:10 +08:00
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
ret = bch2_subvolume_get_snapshot(trans, ei->ei_subvol, &snapshot);
|
2021-03-16 12:28:17 +08:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_iter_init(trans, &iter, BTREE_ID_extents,
|
2021-03-16 12:28:17 +08:00
|
|
|
SPOS(ei->v.i_ino, start, snapshot), 0);
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
while (!(ret = btree_trans_too_many_iters(trans)) &&
|
2022-03-12 01:31:52 +08:00
|
|
|
(k = bch2_btree_iter_peek_upto(&iter, end)).k &&
|
|
|
|
!(ret = bkey_err(k))) {
|
2021-03-15 09:30:08 +08:00
|
|
|
enum btree_id data_btree = BTREE_ID_extents;
|
|
|
|
|
2019-08-23 04:12:28 +08:00
|
|
|
if (!bkey_extent_is_data(k.k) &&
|
|
|
|
k.k->type != KEY_TYPE_reservation) {
|
2021-08-31 03:18:31 +08:00
|
|
|
bch2_btree_iter_advance(&iter);
|
2019-08-23 04:12:28 +08:00
|
|
|
continue;
|
|
|
|
}
|
2019-07-26 01:52:14 +08:00
|
|
|
|
2021-08-31 03:18:31 +08:00
|
|
|
offset_into_extent = iter.pos.offset -
|
2019-08-16 21:59:56 +08:00
|
|
|
bkey_start_offset(k.k);
|
|
|
|
sectors = k.k->size - offset_into_extent;
|
|
|
|
|
2020-12-18 04:08:58 +08:00
|
|
|
bch2_bkey_buf_reassemble(&cur, c, k);
|
2020-10-25 08:56:47 +08:00
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
ret = bch2_read_indirect_extent(trans, &data_btree,
|
2020-05-22 22:50:05 +08:00
|
|
|
&offset_into_extent, &cur);
|
2019-08-16 21:59:56 +08:00
|
|
|
if (ret)
|
|
|
|
break;
|
|
|
|
|
2020-10-25 08:56:47 +08:00
|
|
|
k = bkey_i_to_s_c(cur.k);
|
2020-12-18 04:08:58 +08:00
|
|
|
bch2_bkey_buf_realloc(&prev, c, k.k->u64s);
|
2020-10-25 08:56:47 +08:00
|
|
|
|
2019-08-16 21:59:56 +08:00
|
|
|
sectors = min(sectors, k.k->size - offset_into_extent);
|
|
|
|
|
2020-10-27 05:03:28 +08:00
|
|
|
bch2_cut_front(POS(k.k->p.inode,
|
|
|
|
bkey_start_offset(k.k) +
|
|
|
|
offset_into_extent),
|
|
|
|
cur.k);
|
2019-11-10 05:01:15 +08:00
|
|
|
bch2_key_resize(&cur.k->k, sectors);
|
2021-08-31 03:18:31 +08:00
|
|
|
cur.k->k.p = iter.pos;
|
2019-11-10 05:01:15 +08:00
|
|
|
cur.k->k.p.offset += cur.k->k.size;
|
2019-08-16 21:59:56 +08:00
|
|
|
|
2019-08-23 04:12:28 +08:00
|
|
|
if (have_extent) {
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_unlock(trans);
|
2019-08-23 04:12:28 +08:00
|
|
|
ret = bch2_fill_extent(c, info,
|
2019-11-10 05:01:15 +08:00
|
|
|
bkey_i_to_s_c(prev.k), 0);
|
2019-08-23 04:12:28 +08:00
|
|
|
if (ret)
|
|
|
|
break;
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
2019-08-16 21:59:56 +08:00
|
|
|
|
2019-11-10 05:01:15 +08:00
|
|
|
bkey_copy(prev.k, cur.k);
|
2019-08-23 04:12:28 +08:00
|
|
|
have_extent = true;
|
|
|
|
|
2021-08-31 03:18:31 +08:00
|
|
|
bch2_btree_iter_set_pos(&iter,
|
|
|
|
POS(iter.pos.inode, iter.pos.offset + sectors));
|
2019-07-26 01:52:14 +08:00
|
|
|
}
|
2021-03-16 12:28:17 +08:00
|
|
|
start = iter.pos.offset;
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_iter_exit(trans, &iter);
|
2021-03-16 12:28:17 +08:00
|
|
|
err:
|
2022-07-18 11:06:38 +08:00
|
|
|
if (bch2_err_matches(ret, BCH_ERR_transaction_restart))
|
2019-08-23 04:12:28 +08:00
|
|
|
goto retry;
|
|
|
|
|
2023-06-20 09:12:05 +08:00
|
|
|
if (!ret && have_extent) {
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_unlock(trans);
|
2019-11-10 05:01:15 +08:00
|
|
|
ret = bch2_fill_extent(c, info, bkey_i_to_s_c(prev.k),
|
2019-07-26 01:52:14 +08:00
|
|
|
FIEMAP_EXTENT_LAST);
|
2023-06-20 09:12:05 +08:00
|
|
|
}
|
2019-08-23 04:12:28 +08:00
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_put(trans);
|
2020-12-18 04:08:58 +08:00
|
|
|
bch2_bkey_buf_exit(&cur, c);
|
|
|
|
bch2_bkey_buf_exit(&prev, c);
|
2017-03-17 14:18:50 +08:00
|
|
|
return ret < 0 ? ret : 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct vm_operations_struct bch_vm_ops = {
|
|
|
|
.fault = bch2_page_fault,
|
|
|
|
.map_pages = filemap_map_pages,
|
|
|
|
.page_mkwrite = bch2_page_mkwrite,
|
|
|
|
};
|
|
|
|
|
|
|
|
static int bch2_mmap(struct file *file, struct vm_area_struct *vma)
|
|
|
|
{
|
|
|
|
file_accessed(file);
|
|
|
|
|
|
|
|
vma->vm_ops = &bch_vm_ops;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Directories: */
|
|
|
|
|
|
|
|
static loff_t bch2_dir_llseek(struct file *file, loff_t offset, int whence)
|
|
|
|
{
|
|
|
|
return generic_file_llseek_size(file, offset, whence,
|
|
|
|
S64_MAX, S64_MAX);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_vfs_readdir(struct file *file, struct dir_context *ctx)
|
|
|
|
{
|
2019-10-03 06:35:36 +08:00
|
|
|
struct bch_inode_info *inode = file_bch_inode(file);
|
|
|
|
struct bch_fs *c = inode->v.i_sb->s_fs_info;
|
2023-08-06 22:04:05 +08:00
|
|
|
int ret;
|
2019-10-03 06:35:36 +08:00
|
|
|
|
|
|
|
if (!dir_emit_dots(file, ctx))
|
|
|
|
return 0;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2023-08-06 22:04:05 +08:00
|
|
|
ret = bch2_readdir(c, inode_inum(inode), ctx);
|
|
|
|
if (ret)
|
|
|
|
bch_err_fn(c, ret);
|
|
|
|
|
|
|
|
return bch2_err_class(ret);
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static const struct file_operations bch_file_operations = {
|
|
|
|
.llseek = bch2_llseek,
|
|
|
|
.read_iter = bch2_read_iter,
|
|
|
|
.write_iter = bch2_write_iter,
|
|
|
|
.mmap = bch2_mmap,
|
|
|
|
.open = generic_file_open,
|
|
|
|
.fsync = bch2_fsync,
|
|
|
|
.splice_read = filemap_splice_read,
|
|
|
|
.splice_write = iter_file_splice_write,
|
|
|
|
.fallocate = bch2_fallocate_dispatch,
|
|
|
|
.unlocked_ioctl = bch2_fs_file_ioctl,
|
|
|
|
#ifdef CONFIG_COMPAT
|
|
|
|
.compat_ioctl = bch2_compat_fs_ioctl,
|
|
|
|
#endif
|
2019-08-16 21:59:56 +08:00
|
|
|
.remap_file_range = bch2_remap_file_range,
|
2017-03-17 14:18:50 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static const struct inode_operations bch_file_inode_operations = {
|
|
|
|
.getattr = bch2_getattr,
|
|
|
|
.setattr = bch2_setattr,
|
|
|
|
.fiemap = bch2_fiemap,
|
|
|
|
.listxattr = bch2_xattr_list,
|
|
|
|
#ifdef CONFIG_BCACHEFS_POSIX_ACL
|
|
|
|
.get_acl = bch2_get_acl,
|
|
|
|
.set_acl = bch2_set_acl,
|
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct inode_operations bch_dir_inode_operations = {
|
|
|
|
.lookup = bch2_lookup,
|
|
|
|
.create = bch2_create,
|
|
|
|
.link = bch2_link,
|
|
|
|
.unlink = bch2_unlink,
|
|
|
|
.symlink = bch2_symlink,
|
|
|
|
.mkdir = bch2_mkdir,
|
2019-10-12 03:14:36 +08:00
|
|
|
.rmdir = bch2_unlink,
|
2017-03-17 14:18:50 +08:00
|
|
|
.mknod = bch2_mknod,
|
|
|
|
.rename = bch2_rename2,
|
|
|
|
.getattr = bch2_getattr,
|
|
|
|
.setattr = bch2_setattr,
|
|
|
|
.tmpfile = bch2_tmpfile,
|
|
|
|
.listxattr = bch2_xattr_list,
|
|
|
|
#ifdef CONFIG_BCACHEFS_POSIX_ACL
|
|
|
|
.get_acl = bch2_get_acl,
|
|
|
|
.set_acl = bch2_set_acl,
|
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct file_operations bch_dir_file_operations = {
|
|
|
|
.llseek = bch2_dir_llseek,
|
|
|
|
.read = generic_read_dir,
|
|
|
|
.iterate_shared = bch2_vfs_readdir,
|
|
|
|
.fsync = bch2_fsync,
|
|
|
|
.unlocked_ioctl = bch2_fs_file_ioctl,
|
|
|
|
#ifdef CONFIG_COMPAT
|
|
|
|
.compat_ioctl = bch2_compat_fs_ioctl,
|
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct inode_operations bch_symlink_inode_operations = {
|
|
|
|
.get_link = page_get_link,
|
|
|
|
.getattr = bch2_getattr,
|
|
|
|
.setattr = bch2_setattr,
|
|
|
|
.listxattr = bch2_xattr_list,
|
|
|
|
#ifdef CONFIG_BCACHEFS_POSIX_ACL
|
|
|
|
.get_acl = bch2_get_acl,
|
|
|
|
.set_acl = bch2_set_acl,
|
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct inode_operations bch_special_inode_operations = {
|
|
|
|
.getattr = bch2_getattr,
|
|
|
|
.setattr = bch2_setattr,
|
|
|
|
.listxattr = bch2_xattr_list,
|
|
|
|
#ifdef CONFIG_BCACHEFS_POSIX_ACL
|
|
|
|
.get_acl = bch2_get_acl,
|
|
|
|
.set_acl = bch2_set_acl,
|
|
|
|
#endif
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct address_space_operations bch_address_space_operations = {
|
|
|
|
.read_folio = bch2_read_folio,
|
|
|
|
.writepages = bch2_writepages,
|
|
|
|
.readahead = bch2_readahead,
|
2019-07-03 02:59:15 +08:00
|
|
|
.dirty_folio = filemap_dirty_folio,
|
2017-03-17 14:18:50 +08:00
|
|
|
.write_begin = bch2_write_begin,
|
|
|
|
.write_end = bch2_write_end,
|
|
|
|
.invalidate_folio = bch2_invalidate_folio,
|
|
|
|
.release_folio = bch2_release_folio,
|
|
|
|
.direct_IO = noop_direct_IO,
|
|
|
|
#ifdef CONFIG_MIGRATION
|
|
|
|
.migrate_folio = filemap_migrate_folio,
|
|
|
|
#endif
|
|
|
|
.error_remove_page = generic_error_remove_page,
|
|
|
|
};
|
|
|
|
|
2021-11-14 08:49:14 +08:00
|
|
|
struct bcachefs_fid {
|
|
|
|
u64 inum;
|
|
|
|
u32 subvol;
|
|
|
|
u32 gen;
|
|
|
|
} __packed;
|
|
|
|
|
|
|
|
struct bcachefs_fid_with_parent {
|
|
|
|
struct bcachefs_fid fid;
|
|
|
|
struct bcachefs_fid dir;
|
|
|
|
} __packed;
|
|
|
|
|
|
|
|
static int bcachefs_fid_valid(int fh_len, int fh_type)
|
2017-03-17 14:18:50 +08:00
|
|
|
{
|
2021-11-14 08:49:14 +08:00
|
|
|
switch (fh_type) {
|
|
|
|
case FILEID_BCACHEFS_WITHOUT_PARENT:
|
|
|
|
return fh_len == sizeof(struct bcachefs_fid) / sizeof(u32);
|
|
|
|
case FILEID_BCACHEFS_WITH_PARENT:
|
|
|
|
return fh_len == sizeof(struct bcachefs_fid_with_parent) / sizeof(u32);
|
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct bcachefs_fid bch2_inode_to_fid(struct bch_inode_info *inode)
|
|
|
|
{
|
|
|
|
return (struct bcachefs_fid) {
|
|
|
|
.inum = inode->ei_inode.bi_inum,
|
|
|
|
.subvol = inode->ei_subvol,
|
|
|
|
.gen = inode->ei_inode.bi_generation,
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_encode_fh(struct inode *vinode, u32 *fh, int *len,
|
|
|
|
struct inode *vdir)
|
|
|
|
{
|
|
|
|
struct bch_inode_info *inode = to_bch_ei(vinode);
|
|
|
|
struct bch_inode_info *dir = to_bch_ei(vdir);
|
2023-12-14 00:51:04 +08:00
|
|
|
int min_len;
|
2021-11-14 08:49:14 +08:00
|
|
|
|
|
|
|
if (!S_ISDIR(inode->v.i_mode) && dir) {
|
|
|
|
struct bcachefs_fid_with_parent *fid = (void *) fh;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2023-12-14 00:51:04 +08:00
|
|
|
min_len = sizeof(*fid) / sizeof(u32);
|
|
|
|
if (*len < min_len) {
|
|
|
|
*len = min_len;
|
|
|
|
return FILEID_INVALID;
|
|
|
|
}
|
|
|
|
|
2021-11-14 08:49:14 +08:00
|
|
|
fid->fid = bch2_inode_to_fid(inode);
|
|
|
|
fid->dir = bch2_inode_to_fid(dir);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2023-12-14 00:51:04 +08:00
|
|
|
*len = min_len;
|
2021-11-14 08:49:14 +08:00
|
|
|
return FILEID_BCACHEFS_WITH_PARENT;
|
|
|
|
} else {
|
|
|
|
struct bcachefs_fid *fid = (void *) fh;
|
|
|
|
|
2023-12-14 00:51:04 +08:00
|
|
|
min_len = sizeof(*fid) / sizeof(u32);
|
|
|
|
if (*len < min_len) {
|
|
|
|
*len = min_len;
|
|
|
|
return FILEID_INVALID;
|
|
|
|
}
|
2021-11-14 08:49:14 +08:00
|
|
|
*fid = bch2_inode_to_fid(inode);
|
|
|
|
|
2023-12-14 00:51:04 +08:00
|
|
|
*len = min_len;
|
2021-11-14 08:49:14 +08:00
|
|
|
return FILEID_BCACHEFS_WITHOUT_PARENT;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct inode *bch2_nfs_get_inode(struct super_block *sb,
|
|
|
|
struct bcachefs_fid fid)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = sb->s_fs_info;
|
|
|
|
struct inode *vinode = bch2_vfs_inode_get(c, (subvol_inum) {
|
|
|
|
.subvol = fid.subvol,
|
|
|
|
.inum = fid.inum,
|
|
|
|
});
|
|
|
|
if (!IS_ERR(vinode) && vinode->i_generation != fid.gen) {
|
2017-03-17 14:18:50 +08:00
|
|
|
iput(vinode);
|
2021-11-14 08:49:14 +08:00
|
|
|
vinode = ERR_PTR(-ESTALE);
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
return vinode;
|
|
|
|
}
|
|
|
|
|
2021-11-14 08:49:14 +08:00
|
|
|
static struct dentry *bch2_fh_to_dentry(struct super_block *sb, struct fid *_fid,
|
2017-03-17 14:18:50 +08:00
|
|
|
int fh_len, int fh_type)
|
|
|
|
{
|
2021-11-14 08:49:14 +08:00
|
|
|
struct bcachefs_fid *fid = (void *) _fid;
|
|
|
|
|
|
|
|
if (!bcachefs_fid_valid(fh_len, fh_type))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
return d_obtain_alias(bch2_nfs_get_inode(sb, *fid));
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
2021-11-14 08:49:14 +08:00
|
|
|
static struct dentry *bch2_fh_to_parent(struct super_block *sb, struct fid *_fid,
|
2017-03-17 14:18:50 +08:00
|
|
|
int fh_len, int fh_type)
|
|
|
|
{
|
2021-11-14 08:49:14 +08:00
|
|
|
struct bcachefs_fid_with_parent *fid = (void *) _fid;
|
|
|
|
|
|
|
|
if (!bcachefs_fid_valid(fh_len, fh_type) ||
|
|
|
|
fh_type != FILEID_BCACHEFS_WITH_PARENT)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
return d_obtain_alias(bch2_nfs_get_inode(sb, fid->dir));
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct dentry *bch2_get_parent(struct dentry *child)
|
|
|
|
{
|
|
|
|
struct bch_inode_info *inode = to_bch_ei(child->d_inode);
|
|
|
|
struct bch_fs *c = inode->v.i_sb->s_fs_info;
|
|
|
|
subvol_inum parent_inum = {
|
|
|
|
.subvol = inode->ei_inode.bi_parent_subvol ?:
|
|
|
|
inode->ei_subvol,
|
|
|
|
.inum = inode->ei_inode.bi_dir,
|
|
|
|
};
|
|
|
|
|
|
|
|
return d_obtain_alias(bch2_vfs_inode_get(c, parent_inum));
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_get_name(struct dentry *parent, char *name, struct dentry *child)
|
|
|
|
{
|
|
|
|
struct bch_inode_info *inode = to_bch_ei(child->d_inode);
|
|
|
|
struct bch_inode_info *dir = to_bch_ei(parent->d_inode);
|
|
|
|
struct bch_fs *c = inode->v.i_sb->s_fs_info;
|
2023-09-13 05:16:02 +08:00
|
|
|
struct btree_trans *trans;
|
2021-11-14 08:49:14 +08:00
|
|
|
struct btree_iter iter1;
|
|
|
|
struct btree_iter iter2;
|
|
|
|
struct bkey_s_c k;
|
|
|
|
struct bkey_s_c_dirent d;
|
|
|
|
struct bch_inode_unpacked inode_u;
|
|
|
|
subvol_inum target;
|
|
|
|
u32 snapshot;
|
2023-08-13 05:26:29 +08:00
|
|
|
struct qstr dirent_name;
|
|
|
|
unsigned name_len = 0;
|
2021-11-14 08:49:14 +08:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!S_ISDIR(dir->v.i_mode))
|
|
|
|
return -EINVAL;
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
trans = bch2_trans_get(c);
|
2021-11-14 08:49:14 +08:00
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_iter_init(trans, &iter1, BTREE_ID_dirents,
|
2021-11-14 08:49:14 +08:00
|
|
|
POS(dir->ei_inode.bi_inum, 0), 0);
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_iter_init(trans, &iter2, BTREE_ID_dirents,
|
2021-11-14 08:49:14 +08:00
|
|
|
POS(dir->ei_inode.bi_inum, 0), 0);
|
|
|
|
retry:
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_begin(trans);
|
2021-11-14 08:49:14 +08:00
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
ret = bch2_subvolume_get_snapshot(trans, dir->ei_subvol, &snapshot);
|
2021-11-14 08:49:14 +08:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
bch2_btree_iter_set_snapshot(&iter1, snapshot);
|
|
|
|
bch2_btree_iter_set_snapshot(&iter2, snapshot);
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
ret = bch2_inode_find_by_inum_trans(trans, inode_inum(inode), &inode_u);
|
2021-11-14 08:49:14 +08:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
if (inode_u.bi_dir == dir->ei_inode.bi_inum) {
|
|
|
|
bch2_btree_iter_set_pos(&iter1, POS(inode_u.bi_dir, inode_u.bi_dir_offset));
|
|
|
|
|
|
|
|
k = bch2_btree_iter_peek_slot(&iter1);
|
|
|
|
ret = bkey_err(k);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
if (k.k->type != KEY_TYPE_dirent) {
|
2023-05-28 07:59:59 +08:00
|
|
|
ret = -BCH_ERR_ENOENT_dirent_doesnt_match_inode;
|
2021-11-14 08:49:14 +08:00
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
d = bkey_s_c_to_dirent(k);
|
2023-09-13 05:16:02 +08:00
|
|
|
ret = bch2_dirent_read_target(trans, inode_inum(dir), d, &target);
|
2021-11-14 08:49:14 +08:00
|
|
|
if (ret > 0)
|
2023-05-28 07:59:59 +08:00
|
|
|
ret = -BCH_ERR_ENOENT_dirent_doesnt_match_inode;
|
2021-11-14 08:49:14 +08:00
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
if (target.subvol == inode->ei_subvol &&
|
|
|
|
target.inum == inode->ei_inode.bi_inum)
|
|
|
|
goto found;
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* File with multiple hardlinks and our backref is to the wrong
|
|
|
|
* directory - linear search:
|
|
|
|
*/
|
|
|
|
for_each_btree_key_continue_norestart(iter2, 0, k, ret) {
|
|
|
|
if (k.k->p.inode > dir->ei_inode.bi_inum)
|
|
|
|
break;
|
|
|
|
|
|
|
|
if (k.k->type != KEY_TYPE_dirent)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
d = bkey_s_c_to_dirent(k);
|
2023-09-13 05:16:02 +08:00
|
|
|
ret = bch2_dirent_read_target(trans, inode_inum(dir), d, &target);
|
2021-11-14 08:49:14 +08:00
|
|
|
if (ret < 0)
|
|
|
|
break;
|
|
|
|
if (ret)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (target.subvol == inode->ei_subvol &&
|
|
|
|
target.inum == inode->ei_inode.bi_inum)
|
|
|
|
goto found;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = -ENOENT;
|
|
|
|
goto err;
|
|
|
|
found:
|
2023-08-13 05:26:29 +08:00
|
|
|
dirent_name = bch2_dirent_get_name(d);
|
2021-11-14 08:49:14 +08:00
|
|
|
|
2023-08-13 05:26:29 +08:00
|
|
|
name_len = min_t(unsigned, dirent_name.len, NAME_MAX);
|
|
|
|
memcpy(name, dirent_name.name, name_len);
|
2021-11-14 08:49:14 +08:00
|
|
|
name[name_len] = '\0';
|
|
|
|
err:
|
2022-07-18 11:06:38 +08:00
|
|
|
if (bch2_err_matches(ret, BCH_ERR_transaction_restart))
|
2021-11-14 08:49:14 +08:00
|
|
|
goto retry;
|
|
|
|
|
2023-09-13 05:16:02 +08:00
|
|
|
bch2_trans_iter_exit(trans, &iter1);
|
|
|
|
bch2_trans_iter_exit(trans, &iter2);
|
|
|
|
bch2_trans_put(trans);
|
2021-11-14 08:49:14 +08:00
|
|
|
|
|
|
|
return ret;
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static const struct export_operations bch_export_ops = {
|
2021-11-14 08:49:14 +08:00
|
|
|
.encode_fh = bch2_encode_fh,
|
|
|
|
.fh_to_dentry = bch2_fh_to_dentry,
|
|
|
|
.fh_to_parent = bch2_fh_to_parent,
|
|
|
|
.get_parent = bch2_get_parent,
|
|
|
|
.get_name = bch2_get_name,
|
2017-03-17 14:18:50 +08:00
|
|
|
};
|
|
|
|
|
2021-11-06 12:03:40 +08:00
|
|
|
static void bch2_vfs_inode_init(struct btree_trans *trans, subvol_inum inum,
|
2017-03-17 14:18:50 +08:00
|
|
|
struct bch_inode_info *inode,
|
2021-10-28 01:05:56 +08:00
|
|
|
struct bch_inode_unpacked *bi,
|
|
|
|
struct bch_subvolume *subvol)
|
2017-03-17 14:18:50 +08:00
|
|
|
{
|
2021-11-06 12:03:40 +08:00
|
|
|
bch2_inode_update_after_write(trans, inode, bi, ~0);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2021-10-28 01:05:56 +08:00
|
|
|
if (BCH_SUBVOLUME_SNAP(subvol))
|
|
|
|
set_bit(EI_INODE_SNAPSHOT, &inode->ei_flags);
|
|
|
|
else
|
|
|
|
clear_bit(EI_INODE_SNAPSHOT, &inode->ei_flags);
|
|
|
|
|
2017-03-17 14:18:50 +08:00
|
|
|
inode->v.i_blocks = bi->bi_sectors;
|
|
|
|
inode->v.i_ino = bi->bi_inum;
|
|
|
|
inode->v.i_rdev = bi->bi_dev;
|
|
|
|
inode->v.i_generation = bi->bi_generation;
|
|
|
|
inode->v.i_size = bi->bi_size;
|
|
|
|
|
2020-12-04 03:27:20 +08:00
|
|
|
inode->ei_flags = 0;
|
2017-03-17 14:18:50 +08:00
|
|
|
inode->ei_quota_reserved = 0;
|
2018-12-17 18:43:00 +08:00
|
|
|
inode->ei_qid = bch_qid(bi);
|
2021-03-16 13:33:39 +08:00
|
|
|
inode->ei_subvol = inum.subvol;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
inode->v.i_mapping->a_ops = &bch_address_space_operations;
|
|
|
|
|
|
|
|
switch (inode->v.i_mode & S_IFMT) {
|
|
|
|
case S_IFREG:
|
|
|
|
inode->v.i_op = &bch_file_inode_operations;
|
|
|
|
inode->v.i_fop = &bch_file_operations;
|
|
|
|
break;
|
|
|
|
case S_IFDIR:
|
|
|
|
inode->v.i_op = &bch_dir_inode_operations;
|
|
|
|
inode->v.i_fop = &bch_dir_file_operations;
|
|
|
|
break;
|
|
|
|
case S_IFLNK:
|
|
|
|
inode_nohighmem(&inode->v);
|
|
|
|
inode->v.i_op = &bch_symlink_inode_operations;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
init_special_inode(&inode->v, inode->v.i_mode, inode->v.i_rdev);
|
|
|
|
inode->v.i_op = &bch_special_inode_operations;
|
|
|
|
break;
|
|
|
|
}
|
2023-03-20 04:47:30 +08:00
|
|
|
|
|
|
|
mapping_set_large_folios(inode->v.i_mapping);
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct inode *bch2_alloc_inode(struct super_block *sb)
|
|
|
|
{
|
|
|
|
struct bch_inode_info *inode;
|
|
|
|
|
|
|
|
inode = kmem_cache_alloc(bch2_inode_cache, GFP_NOFS);
|
|
|
|
if (!inode)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
inode_init_once(&inode->v);
|
|
|
|
mutex_init(&inode->ei_update_lock);
|
2022-11-05 01:25:57 +08:00
|
|
|
two_state_lock_init(&inode->ei_pagecache_lock);
|
2023-03-15 23:53:51 +08:00
|
|
|
INIT_LIST_HEAD(&inode->ei_vfs_inode_list);
|
2017-03-17 14:18:50 +08:00
|
|
|
mutex_init(&inode->ei_quota_lock);
|
|
|
|
|
|
|
|
return &inode->v;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void bch2_i_callback(struct rcu_head *head)
|
|
|
|
{
|
|
|
|
struct inode *vinode = container_of(head, struct inode, i_rcu);
|
|
|
|
struct bch_inode_info *inode = to_bch_ei(vinode);
|
|
|
|
|
|
|
|
kmem_cache_free(bch2_inode_cache, inode);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void bch2_destroy_inode(struct inode *vinode)
|
|
|
|
{
|
|
|
|
call_rcu(&vinode->i_rcu, bch2_i_callback);
|
|
|
|
}
|
|
|
|
|
2023-08-12 22:47:45 +08:00
|
|
|
static int inode_update_times_fn(struct btree_trans *trans,
|
|
|
|
struct bch_inode_info *inode,
|
2017-03-17 14:18:50 +08:00
|
|
|
struct bch_inode_unpacked *bi,
|
|
|
|
void *p)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = inode->v.i_sb->s_fs_info;
|
|
|
|
|
2023-10-31 05:09:38 +08:00
|
|
|
bi->bi_atime = timespec_to_bch2_time(c, inode_get_atime(&inode->v));
|
|
|
|
bi->bi_mtime = timespec_to_bch2_time(c, inode_get_mtime(&inode->v));
|
2017-03-17 14:18:50 +08:00
|
|
|
bi->bi_ctime = timespec_to_bch2_time(c, inode_get_ctime(&inode->v));
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_vfs_write_inode(struct inode *vinode,
|
|
|
|
struct writeback_control *wbc)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = vinode->i_sb->s_fs_info;
|
|
|
|
struct bch_inode_info *inode = to_bch_ei(vinode);
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
mutex_lock(&inode->ei_update_lock);
|
2018-07-18 02:12:42 +08:00
|
|
|
ret = bch2_write_inode(c, inode, inode_update_times_fn, NULL,
|
|
|
|
ATTR_ATIME|ATTR_MTIME|ATTR_CTIME);
|
2017-03-17 14:18:50 +08:00
|
|
|
mutex_unlock(&inode->ei_update_lock);
|
|
|
|
|
2022-09-19 03:43:50 +08:00
|
|
|
return bch2_err_class(ret);
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void bch2_evict_inode(struct inode *vinode)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = vinode->i_sb->s_fs_info;
|
|
|
|
struct bch_inode_info *inode = to_bch_ei(vinode);
|
|
|
|
|
|
|
|
truncate_inode_pages_final(&inode->v.i_data);
|
|
|
|
|
|
|
|
clear_inode(&inode->v);
|
|
|
|
|
|
|
|
BUG_ON(!is_bad_inode(&inode->v) && inode->ei_quota_reserved);
|
|
|
|
|
|
|
|
if (!inode->v.i_nlink && !is_bad_inode(&inode->v)) {
|
|
|
|
bch2_quota_acct(c, inode->ei_qid, Q_SPC, -((s64) inode->v.i_blocks),
|
2018-11-02 03:10:01 +08:00
|
|
|
KEY_TYPE_QUOTA_WARN);
|
2017-03-17 14:18:50 +08:00
|
|
|
bch2_quota_acct(c, inode->ei_qid, Q_INO, -1,
|
2018-11-02 03:10:01 +08:00
|
|
|
KEY_TYPE_QUOTA_WARN);
|
2022-01-12 15:13:21 +08:00
|
|
|
bch2_inode_rm(c, inode_inum(inode));
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
2023-03-15 23:53:51 +08:00
|
|
|
|
|
|
|
mutex_lock(&c->vfs_inodes_lock);
|
|
|
|
list_del_init(&inode->ei_vfs_inode_list);
|
|
|
|
mutex_unlock(&c->vfs_inodes_lock);
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
2023-03-15 23:53:51 +08:00
|
|
|
void bch2_evict_subvolume_inodes(struct bch_fs *c, snapshot_id_list *s)
|
2021-10-29 04:24:39 +08:00
|
|
|
{
|
2023-03-15 23:53:51 +08:00
|
|
|
struct bch_inode_info *inode, **i;
|
|
|
|
DARRAY(struct bch_inode_info *) grabbed;
|
|
|
|
bool clean_pass = false, this_pass_clean;
|
2021-10-29 04:24:39 +08:00
|
|
|
|
2023-03-15 23:53:51 +08:00
|
|
|
/*
|
|
|
|
* Initially, we scan for inodes without I_DONTCACHE, then mark them to
|
|
|
|
* be pruned with d_mark_dontcache().
|
|
|
|
*
|
|
|
|
* Once we've had a clean pass where we didn't find any inodes without
|
|
|
|
* I_DONTCACHE, we wait for them to be freed:
|
|
|
|
*/
|
2021-10-29 04:24:39 +08:00
|
|
|
|
2023-03-15 23:53:51 +08:00
|
|
|
darray_init(&grabbed);
|
|
|
|
darray_make_room(&grabbed, 1024);
|
2021-10-29 04:24:39 +08:00
|
|
|
again:
|
|
|
|
cond_resched();
|
2023-03-15 23:53:51 +08:00
|
|
|
this_pass_clean = true;
|
|
|
|
|
|
|
|
mutex_lock(&c->vfs_inodes_lock);
|
|
|
|
list_for_each_entry(inode, &c->vfs_inodes_list, ei_vfs_inode_list) {
|
|
|
|
if (!snapshot_list_has_id(s, inode->ei_subvol))
|
2021-10-29 04:24:39 +08:00
|
|
|
continue;
|
|
|
|
|
2023-03-15 23:53:51 +08:00
|
|
|
if (!(inode->v.i_state & I_DONTCACHE) &&
|
2023-06-10 03:41:41 +08:00
|
|
|
!(inode->v.i_state & I_FREEING) &&
|
|
|
|
igrab(&inode->v)) {
|
2023-03-15 23:53:51 +08:00
|
|
|
this_pass_clean = false;
|
|
|
|
|
2023-06-10 03:41:41 +08:00
|
|
|
if (darray_push_gfp(&grabbed, inode, GFP_ATOMIC|__GFP_NOWARN)) {
|
|
|
|
iput(&inode->v);
|
2023-03-15 23:53:51 +08:00
|
|
|
break;
|
2023-06-10 03:41:41 +08:00
|
|
|
}
|
2023-03-15 23:53:51 +08:00
|
|
|
} else if (clean_pass && this_pass_clean) {
|
|
|
|
wait_queue_head_t *wq = bit_waitqueue(&inode->v.i_state, __I_NEW);
|
|
|
|
DEFINE_WAIT_BIT(wait, &inode->v.i_state, __I_NEW);
|
2021-10-29 04:24:39 +08:00
|
|
|
|
|
|
|
prepare_to_wait(wq, &wait.wq_entry, TASK_UNINTERRUPTIBLE);
|
2023-03-15 23:53:51 +08:00
|
|
|
mutex_unlock(&c->vfs_inodes_lock);
|
|
|
|
|
2021-10-29 04:24:39 +08:00
|
|
|
schedule();
|
|
|
|
finish_wait(wq, &wait.wq_entry);
|
|
|
|
goto again;
|
|
|
|
}
|
2023-03-15 23:53:51 +08:00
|
|
|
}
|
|
|
|
mutex_unlock(&c->vfs_inodes_lock);
|
2021-10-29 04:24:39 +08:00
|
|
|
|
2023-06-10 03:41:41 +08:00
|
|
|
darray_for_each(grabbed, i) {
|
|
|
|
inode = *i;
|
|
|
|
d_mark_dontcache(&inode->v);
|
|
|
|
d_prune_aliases(&inode->v);
|
|
|
|
iput(&inode->v);
|
|
|
|
}
|
2023-03-15 23:53:51 +08:00
|
|
|
grabbed.nr = 0;
|
|
|
|
|
|
|
|
if (!clean_pass || !this_pass_clean) {
|
|
|
|
clean_pass = this_pass_clean;
|
|
|
|
goto again;
|
2021-10-29 04:24:39 +08:00
|
|
|
}
|
2023-03-15 23:53:51 +08:00
|
|
|
|
|
|
|
darray_exit(&grabbed);
|
2021-10-29 04:24:39 +08:00
|
|
|
}
|
|
|
|
|
2017-03-17 14:18:50 +08:00
|
|
|
static int bch2_statfs(struct dentry *dentry, struct kstatfs *buf)
|
|
|
|
{
|
|
|
|
struct super_block *sb = dentry->d_sb;
|
|
|
|
struct bch_fs *c = sb->s_fs_info;
|
2018-11-27 21:23:22 +08:00
|
|
|
struct bch_fs_usage_short usage = bch2_fs_usage_read_short(c);
|
2018-07-25 02:54:39 +08:00
|
|
|
unsigned shift = sb->s_blocksize_bits - 9;
|
2020-11-03 08:49:23 +08:00
|
|
|
/*
|
|
|
|
* this assumes inodes take up 64 bytes, which is a decent average
|
|
|
|
* number:
|
|
|
|
*/
|
|
|
|
u64 avail_inodes = ((usage.capacity - usage.used) << 3);
|
2017-03-17 14:18:50 +08:00
|
|
|
u64 fsid;
|
|
|
|
|
|
|
|
buf->f_type = BCACHEFS_STATFS_MAGIC;
|
|
|
|
buf->f_bsize = sb->s_blocksize;
|
2018-11-27 21:23:22 +08:00
|
|
|
buf->f_blocks = usage.capacity >> shift;
|
2023-09-11 11:35:02 +08:00
|
|
|
buf->f_bfree = usage.free >> shift;
|
|
|
|
buf->f_bavail = avail_factor(usage.free) >> shift;
|
2020-11-03 08:49:23 +08:00
|
|
|
|
|
|
|
buf->f_files = usage.nr_inodes + avail_inodes;
|
|
|
|
buf->f_ffree = avail_inodes;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
fsid = le64_to_cpup((void *) c->sb.user_uuid.b) ^
|
|
|
|
le64_to_cpup((void *) c->sb.user_uuid.b + sizeof(u64));
|
|
|
|
buf->f_fsid.val[0] = fsid & 0xFFFFFFFFUL;
|
|
|
|
buf->f_fsid.val[1] = (fsid >> 32) & 0xFFFFFFFFUL;
|
|
|
|
buf->f_namelen = BCH_NAME_MAX;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_sync_fs(struct super_block *sb, int wait)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = sb->s_fs_info;
|
2022-09-19 03:43:50 +08:00
|
|
|
int ret;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2019-08-23 04:30:55 +08:00
|
|
|
if (c->opts.journal_flush_disabled)
|
|
|
|
return 0;
|
|
|
|
|
2017-03-17 14:18:50 +08:00
|
|
|
if (!wait) {
|
|
|
|
bch2_journal_flush_async(&c->journal, NULL);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-09-19 03:43:50 +08:00
|
|
|
ret = bch2_journal_flush(&c->journal);
|
|
|
|
return bch2_err_class(ret);
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct bch_fs *bch2_path_to_fs(const char *path)
|
|
|
|
{
|
|
|
|
struct bch_fs *c;
|
|
|
|
dev_t dev;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = lookup_bdev(path, &dev);
|
|
|
|
if (ret)
|
|
|
|
return ERR_PTR(ret);
|
|
|
|
|
|
|
|
c = bch2_dev_to_fs(dev);
|
2020-09-09 06:30:32 +08:00
|
|
|
if (c)
|
2017-03-17 14:18:50 +08:00
|
|
|
closure_put(&c->cl);
|
2020-09-09 06:30:32 +08:00
|
|
|
return c ?: ERR_PTR(-ENOENT);
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
2020-09-09 06:30:32 +08:00
|
|
|
static char **split_devs(const char *_dev_name, unsigned *nr)
|
2017-03-17 14:18:50 +08:00
|
|
|
{
|
|
|
|
char *dev_name = NULL, **devs = NULL, *s;
|
2023-09-28 12:50:27 +08:00
|
|
|
size_t i = 0, nr_devs = 0;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
dev_name = kstrdup(_dev_name, GFP_KERNEL);
|
|
|
|
if (!dev_name)
|
2020-09-09 06:30:32 +08:00
|
|
|
return NULL;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
for (s = dev_name; s; s = strchr(s + 1, ':'))
|
|
|
|
nr_devs++;
|
|
|
|
|
2020-09-09 06:30:32 +08:00
|
|
|
devs = kcalloc(nr_devs + 1, sizeof(const char *), GFP_KERNEL);
|
|
|
|
if (!devs) {
|
|
|
|
kfree(dev_name);
|
|
|
|
return NULL;
|
|
|
|
}
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2023-09-28 12:50:27 +08:00
|
|
|
while ((s = strsep(&dev_name, ":")))
|
2017-03-17 14:18:50 +08:00
|
|
|
devs[i++] = s;
|
|
|
|
|
2020-09-09 06:30:32 +08:00
|
|
|
*nr = nr_devs;
|
|
|
|
return devs;
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_remount(struct super_block *sb, int *flags, char *data)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = sb->s_fs_info;
|
|
|
|
struct bch_opts opts = bch2_opts_empty();
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
opt_set(opts, read_only, (*flags & SB_RDONLY) != 0);
|
|
|
|
|
2020-10-24 09:07:17 +08:00
|
|
|
ret = bch2_parse_mount_opts(c, &opts, data);
|
2017-03-17 14:18:50 +08:00
|
|
|
if (ret)
|
2022-09-19 03:43:50 +08:00
|
|
|
goto err;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
if (opts.read_only != c->opts.read_only) {
|
2020-06-16 02:58:47 +08:00
|
|
|
down_write(&c->state_lock);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
if (opts.read_only) {
|
|
|
|
bch2_fs_read_only(c);
|
|
|
|
|
|
|
|
sb->s_flags |= SB_RDONLY;
|
|
|
|
} else {
|
2019-03-22 10:19:57 +08:00
|
|
|
ret = bch2_fs_read_write(c);
|
|
|
|
if (ret) {
|
|
|
|
bch_err(c, "error going rw: %i", ret);
|
2020-06-16 02:58:47 +08:00
|
|
|
up_write(&c->state_lock);
|
2022-09-19 03:43:50 +08:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto err;
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
sb->s_flags &= ~SB_RDONLY;
|
|
|
|
}
|
|
|
|
|
|
|
|
c->opts.read_only = opts.read_only;
|
|
|
|
|
2020-06-16 02:58:47 +08:00
|
|
|
up_write(&c->state_lock);
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
2023-09-13 06:41:22 +08:00
|
|
|
if (opt_defined(opts, errors))
|
2017-03-17 14:18:50 +08:00
|
|
|
c->opts.errors = opts.errors;
|
2022-09-19 03:43:50 +08:00
|
|
|
err:
|
|
|
|
return bch2_err_class(ret);
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
2020-09-07 10:58:28 +08:00
|
|
|
static int bch2_show_devname(struct seq_file *seq, struct dentry *root)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = root->d_sb->s_fs_info;
|
|
|
|
struct bch_dev *ca;
|
|
|
|
unsigned i;
|
|
|
|
bool first = true;
|
|
|
|
|
|
|
|
for_each_online_member(ca, c, i) {
|
|
|
|
if (!first)
|
|
|
|
seq_putc(seq, ':');
|
|
|
|
first = false;
|
2023-11-17 01:13:43 +08:00
|
|
|
seq_puts(seq, ca->disk_sb.sb_name);
|
2020-09-07 10:58:28 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-03-17 14:18:50 +08:00
|
|
|
static int bch2_show_options(struct seq_file *seq, struct dentry *root)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = root->d_sb->s_fs_info;
|
|
|
|
enum bch_opt_id i;
|
2022-02-26 02:18:19 +08:00
|
|
|
struct printbuf buf = PRINTBUF;
|
|
|
|
int ret = 0;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
for (i = 0; i < bch2_opts_nr; i++) {
|
|
|
|
const struct bch_option *opt = &bch2_opt_table[i];
|
|
|
|
u64 v = bch2_opt_get_by_id(&c->opts, i);
|
|
|
|
|
2021-12-15 03:24:41 +08:00
|
|
|
if (!(opt->flags & OPT_MOUNT))
|
2017-03-17 14:18:50 +08:00
|
|
|
continue;
|
|
|
|
|
|
|
|
if (v == bch2_opt_get_by_id(&bch2_opts_default, i))
|
|
|
|
continue;
|
|
|
|
|
2022-02-26 02:18:19 +08:00
|
|
|
printbuf_reset(&buf);
|
2022-03-06 01:01:16 +08:00
|
|
|
bch2_opt_to_text(&buf, c, c->disk_sb.sb, opt, v,
|
2017-03-17 14:18:50 +08:00
|
|
|
OPT_SHOW_MOUNT_STYLE);
|
|
|
|
seq_putc(seq, ',');
|
2022-02-26 02:18:19 +08:00
|
|
|
seq_puts(seq, buf.buf);
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
2022-02-26 02:18:19 +08:00
|
|
|
if (buf.allocation_failure)
|
|
|
|
ret = -ENOMEM;
|
|
|
|
printbuf_exit(&buf);
|
|
|
|
return ret;
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
2020-09-09 06:30:32 +08:00
|
|
|
static void bch2_put_super(struct super_block *sb)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = sb->s_fs_info;
|
|
|
|
|
|
|
|
__bch2_fs_stop(c);
|
|
|
|
}
|
|
|
|
|
bcachefs: initial freeze/unfreeze support
Initial support for the vfs superblock freeze and unfreeze
operations. Superblock freeze occurs in stages, where the vfs
attempts to quiesce high level write operations, page faults, fs
internal operations, and then finally calls into the filesystem for
any last stage steps (i.e. log flushing, etc.) before marking the
superblock frozen.
The majority of write paths are covered by freeze protection (i.e.
sb_start_write() and friends) in higher level common code, with the
exception of the fs-internal SB_FREEZE_FS stage (i.e.
sb_start_intwrite()). This typically maps to active filesystem
transactions in a manner that allows the vfs to implement a barrier
of internal fs operations during the freeze sequence. This is not a
viable model for bcachefs, however, because it utilizes transactions
both to populate the journal as well as to perform journal reclaim.
This means that mapping intwrite protection to transaction lifecycle
or transaction commit is likely to deadlock freeze, as quiescing the
journal requires transactional operations blocked by the final stage
of freeze.
The flipside of this is that bcachefs does already maintain its own
internal sets of write references for similar purposes, currently
utilized for transitions from read-write to read-only mode. Since
this largely mirrors the high level sequence involved with freeze,
we can simply invoke this mechanism in the freeze callback to fully
quiesce the filesystem in the final stage. This means that while the
SB_FREEZE_FS stage is essentially a no-op, the ->freeze_fs()
callback that immediately follows begins by performing effectively
the same step by quiescing all internal write references.
One caveat to this approach is that without integration of internal
freeze protection, write operations gated on internal write refs
will fail with an internal -EROFS error rather than block on
acquiring freeze protection. IOW, this is roughly equivalent to only
having support for sb_start_intwrite_trylock(), and not the blocking
variant. Many of these paths already use non-blocking internal write
refs and so would map into an sb_start_intwrite_trylock() anyways.
The only instance of this I've been able to uncover that doesn't
explicitly rely on a higher level non-blocking write ref is the
bch2_rbio_narrow_crcs() path, which updates crcs in certain read
cases, and Kent has pointed out isn't critical if it happens to fail
due to read-only status.
Given that, implement basic freeze support as described above and
leave tighter integration with internal freeze protection as a
possible future enhancement. There are multiple potential ideas
worth exploring here. For example, we could implement a multi-stage
freeze callback that might allow bcachefs to quiesce its internal
write references without deadlocks, we could integrate intwrite
protection with bcachefs' internal write references somehow or
another, or perhaps consider implementing blocking support for
internal write refs to be used specifically for freeze, etc. In the
meantime, this enables functional freeze support and the associated
test coverage that comes with it.
Signed-off-by: Brian Foster <bfoster@redhat.com>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2023-09-15 20:51:54 +08:00
|
|
|
/*
|
|
|
|
* bcachefs doesn't currently integrate intwrite freeze protection but the
|
|
|
|
* internal write references serve the same purpose. Therefore reuse the
|
|
|
|
* read-only transition code to perform the quiesce. The caveat is that we don't
|
|
|
|
* currently have the ability to block tasks that want a write reference while
|
|
|
|
* the superblock is frozen. This is fine for now, but we should either add
|
|
|
|
* blocking support or find a way to integrate sb_start_intwrite() and friends.
|
|
|
|
*/
|
|
|
|
static int bch2_freeze(struct super_block *sb)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = sb->s_fs_info;
|
|
|
|
|
|
|
|
down_write(&c->state_lock);
|
|
|
|
bch2_fs_read_only(c);
|
|
|
|
up_write(&c->state_lock);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_unfreeze(struct super_block *sb)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = sb->s_fs_info;
|
|
|
|
int ret;
|
|
|
|
|
2023-12-05 21:24:38 +08:00
|
|
|
if (test_bit(BCH_FS_EMERGENCY_RO, &c->flags))
|
|
|
|
return 0;
|
|
|
|
|
bcachefs: initial freeze/unfreeze support
Initial support for the vfs superblock freeze and unfreeze
operations. Superblock freeze occurs in stages, where the vfs
attempts to quiesce high level write operations, page faults, fs
internal operations, and then finally calls into the filesystem for
any last stage steps (i.e. log flushing, etc.) before marking the
superblock frozen.
The majority of write paths are covered by freeze protection (i.e.
sb_start_write() and friends) in higher level common code, with the
exception of the fs-internal SB_FREEZE_FS stage (i.e.
sb_start_intwrite()). This typically maps to active filesystem
transactions in a manner that allows the vfs to implement a barrier
of internal fs operations during the freeze sequence. This is not a
viable model for bcachefs, however, because it utilizes transactions
both to populate the journal as well as to perform journal reclaim.
This means that mapping intwrite protection to transaction lifecycle
or transaction commit is likely to deadlock freeze, as quiescing the
journal requires transactional operations blocked by the final stage
of freeze.
The flipside of this is that bcachefs does already maintain its own
internal sets of write references for similar purposes, currently
utilized for transitions from read-write to read-only mode. Since
this largely mirrors the high level sequence involved with freeze,
we can simply invoke this mechanism in the freeze callback to fully
quiesce the filesystem in the final stage. This means that while the
SB_FREEZE_FS stage is essentially a no-op, the ->freeze_fs()
callback that immediately follows begins by performing effectively
the same step by quiescing all internal write references.
One caveat to this approach is that without integration of internal
freeze protection, write operations gated on internal write refs
will fail with an internal -EROFS error rather than block on
acquiring freeze protection. IOW, this is roughly equivalent to only
having support for sb_start_intwrite_trylock(), and not the blocking
variant. Many of these paths already use non-blocking internal write
refs and so would map into an sb_start_intwrite_trylock() anyways.
The only instance of this I've been able to uncover that doesn't
explicitly rely on a higher level non-blocking write ref is the
bch2_rbio_narrow_crcs() path, which updates crcs in certain read
cases, and Kent has pointed out isn't critical if it happens to fail
due to read-only status.
Given that, implement basic freeze support as described above and
leave tighter integration with internal freeze protection as a
possible future enhancement. There are multiple potential ideas
worth exploring here. For example, we could implement a multi-stage
freeze callback that might allow bcachefs to quiesce its internal
write references without deadlocks, we could integrate intwrite
protection with bcachefs' internal write references somehow or
another, or perhaps consider implementing blocking support for
internal write refs to be used specifically for freeze, etc. In the
meantime, this enables functional freeze support and the associated
test coverage that comes with it.
Signed-off-by: Brian Foster <bfoster@redhat.com>
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2023-09-15 20:51:54 +08:00
|
|
|
down_write(&c->state_lock);
|
|
|
|
ret = bch2_fs_read_write(c);
|
|
|
|
up_write(&c->state_lock);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2017-03-17 14:18:50 +08:00
|
|
|
static const struct super_operations bch_super_operations = {
|
|
|
|
.alloc_inode = bch2_alloc_inode,
|
|
|
|
.destroy_inode = bch2_destroy_inode,
|
|
|
|
.write_inode = bch2_vfs_write_inode,
|
|
|
|
.evict_inode = bch2_evict_inode,
|
|
|
|
.sync_fs = bch2_sync_fs,
|
|
|
|
.statfs = bch2_statfs,
|
2020-09-07 10:58:28 +08:00
|
|
|
.show_devname = bch2_show_devname,
|
2017-03-17 14:18:50 +08:00
|
|
|
.show_options = bch2_show_options,
|
|
|
|
.remount_fs = bch2_remount,
|
|
|
|
.put_super = bch2_put_super,
|
|
|
|
.freeze_fs = bch2_freeze,
|
|
|
|
.unfreeze_fs = bch2_unfreeze,
|
|
|
|
};
|
|
|
|
|
|
|
|
static int bch2_set_super(struct super_block *s, void *data)
|
|
|
|
{
|
|
|
|
s->s_fs_info = data;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-09-09 06:30:32 +08:00
|
|
|
static int bch2_noset_super(struct super_block *s, void *data)
|
|
|
|
{
|
|
|
|
return -EBUSY;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int bch2_test_super(struct super_block *s, void *data)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = s->s_fs_info;
|
|
|
|
struct bch_fs **devs = data;
|
|
|
|
unsigned i;
|
|
|
|
|
|
|
|
if (!c)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
for (i = 0; devs[i]; i++)
|
|
|
|
if (c != devs[i])
|
|
|
|
return false;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2017-03-17 14:18:50 +08:00
|
|
|
static struct dentry *bch2_mount(struct file_system_type *fs_type,
|
|
|
|
int flags, const char *dev_name, void *data)
|
|
|
|
{
|
|
|
|
struct bch_fs *c;
|
|
|
|
struct bch_dev *ca;
|
|
|
|
struct super_block *sb;
|
|
|
|
struct inode *vinode;
|
|
|
|
struct bch_opts opts = bch2_opts_empty();
|
2020-09-09 06:30:32 +08:00
|
|
|
char **devs;
|
|
|
|
struct bch_fs **devs_to_fs = NULL;
|
|
|
|
unsigned i, nr_devs;
|
2017-03-17 14:18:50 +08:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
opt_set(opts, read_only, (flags & SB_RDONLY) != 0);
|
|
|
|
|
2020-10-24 09:07:17 +08:00
|
|
|
ret = bch2_parse_mount_opts(NULL, &opts, data);
|
2017-03-17 14:18:50 +08:00
|
|
|
if (ret)
|
|
|
|
return ERR_PTR(ret);
|
|
|
|
|
2021-06-10 19:52:42 +08:00
|
|
|
if (!dev_name || strlen(dev_name) == 0)
|
|
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
|
2020-09-09 06:30:32 +08:00
|
|
|
devs = split_devs(dev_name, &nr_devs);
|
|
|
|
if (!devs)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2020-09-09 06:30:32 +08:00
|
|
|
devs_to_fs = kcalloc(nr_devs + 1, sizeof(void *), GFP_KERNEL);
|
|
|
|
if (!devs_to_fs) {
|
|
|
|
sb = ERR_PTR(-ENOMEM);
|
|
|
|
goto got_sb;
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
2020-09-09 06:30:32 +08:00
|
|
|
for (i = 0; i < nr_devs; i++)
|
|
|
|
devs_to_fs[i] = bch2_path_to_fs(devs[i]);
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2020-09-09 06:30:32 +08:00
|
|
|
sb = sget(fs_type, bch2_test_super, bch2_noset_super,
|
|
|
|
flags|SB_NOSEC, devs_to_fs);
|
|
|
|
if (!IS_ERR(sb))
|
|
|
|
goto got_sb;
|
|
|
|
|
|
|
|
c = bch2_fs_open(devs, nr_devs, opts);
|
2020-10-24 09:07:17 +08:00
|
|
|
if (IS_ERR(c)) {
|
2020-09-09 06:30:32 +08:00
|
|
|
sb = ERR_CAST(c);
|
2020-10-24 09:07:17 +08:00
|
|
|
goto got_sb;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Some options can't be parsed until after the fs is started: */
|
|
|
|
ret = bch2_parse_mount_opts(c, &opts, data);
|
|
|
|
if (ret) {
|
|
|
|
bch2_fs_stop(c);
|
|
|
|
sb = ERR_PTR(ret);
|
|
|
|
goto got_sb;
|
|
|
|
}
|
|
|
|
|
|
|
|
bch2_opts_apply(&c->opts, opts);
|
|
|
|
|
|
|
|
sb = sget(fs_type, NULL, bch2_set_super, flags|SB_NOSEC, c);
|
|
|
|
if (IS_ERR(sb))
|
|
|
|
bch2_fs_stop(c);
|
2020-09-09 06:30:32 +08:00
|
|
|
got_sb:
|
|
|
|
kfree(devs_to_fs);
|
|
|
|
kfree(devs[0]);
|
|
|
|
kfree(devs);
|
|
|
|
|
2022-11-20 11:39:08 +08:00
|
|
|
if (IS_ERR(sb)) {
|
|
|
|
ret = PTR_ERR(sb);
|
|
|
|
ret = bch2_err_class(ret);
|
|
|
|
return ERR_PTR(ret);
|
|
|
|
}
|
2020-09-09 06:30:32 +08:00
|
|
|
|
|
|
|
c = sb->s_fs_info;
|
2017-03-17 14:18:50 +08:00
|
|
|
|
2020-09-09 06:30:32 +08:00
|
|
|
if (sb->s_root) {
|
2017-03-17 14:18:50 +08:00
|
|
|
if ((flags ^ sb->s_flags) & SB_RDONLY) {
|
|
|
|
ret = -EBUSY;
|
|
|
|
goto err_put_super;
|
|
|
|
}
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2019-06-30 05:59:21 +08:00
|
|
|
sb->s_blocksize = block_bytes(c);
|
|
|
|
sb->s_blocksize_bits = ilog2(block_bytes(c));
|
2017-03-17 14:18:50 +08:00
|
|
|
sb->s_maxbytes = MAX_LFS_FILESIZE;
|
|
|
|
sb->s_op = &bch_super_operations;
|
|
|
|
sb->s_export_op = &bch_export_ops;
|
|
|
|
#ifdef CONFIG_BCACHEFS_QUOTA
|
|
|
|
sb->s_qcop = &bch2_quotactl_operations;
|
|
|
|
sb->s_quota_types = QTYPE_MASK_USR|QTYPE_MASK_GRP|QTYPE_MASK_PRJ;
|
|
|
|
#endif
|
|
|
|
sb->s_xattr = bch2_xattr_handlers;
|
|
|
|
sb->s_magic = BCACHEFS_STATFS_MAGIC;
|
2021-04-29 10:51:42 +08:00
|
|
|
sb->s_time_gran = c->sb.nsec_per_time_unit;
|
|
|
|
sb->s_time_min = div_s64(S64_MIN, c->sb.time_units_per_sec) + 1;
|
|
|
|
sb->s_time_max = div_s64(S64_MAX, c->sb.time_units_per_sec);
|
2017-03-17 14:18:50 +08:00
|
|
|
c->vfs_sb = sb;
|
2022-10-20 06:31:33 +08:00
|
|
|
strscpy(sb->s_id, c->name, sizeof(sb->s_id));
|
2017-03-17 14:18:50 +08:00
|
|
|
|
|
|
|
ret = super_setup_bdi(sb);
|
|
|
|
if (ret)
|
|
|
|
goto err_put_super;
|
|
|
|
|
|
|
|
sb->s_bdi->ra_pages = VM_READAHEAD_PAGES;
|
|
|
|
|
|
|
|
for_each_online_member(ca, c, i) {
|
|
|
|
struct block_device *bdev = ca->disk_sb.bdev;
|
|
|
|
|
|
|
|
/* XXX: create an anonymous device for multi device filesystems */
|
|
|
|
sb->s_bdev = bdev;
|
|
|
|
sb->s_dev = bdev->bd_dev;
|
|
|
|
percpu_ref_put(&ca->io_ref);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2021-05-28 07:15:44 +08:00
|
|
|
c->dev = sb->s_dev;
|
|
|
|
|
2017-03-17 14:18:50 +08:00
|
|
|
#ifdef CONFIG_BCACHEFS_POSIX_ACL
|
|
|
|
if (c->opts.acl)
|
|
|
|
sb->s_flags |= SB_POSIXACL;
|
|
|
|
#endif
|
|
|
|
|
Many singleton patches against the MM code. The patch series which are
included in this merge do the following:
- Kemeng Shi has contributed some compation maintenance work in the
series "Fixes and cleanups to compaction".
- Joel Fernandes has a patchset ("Optimize mremap during mutual
alignment within PMD") which fixes an obscure issue with mremap()'s
pagetable handling during a subsequent exec(), based upon an
implementation which Linus suggested.
- More DAMON/DAMOS maintenance and feature work from SeongJae Park i the
following patch series:
mm/damon: misc fixups for documents, comments and its tracepoint
mm/damon: add a tracepoint for damos apply target regions
mm/damon: provide pseudo-moving sum based access rate
mm/damon: implement DAMOS apply intervals
mm/damon/core-test: Fix memory leaks in core-test
mm/damon/sysfs-schemes: Do DAMOS tried regions update for only one apply interval
- In the series "Do not try to access unaccepted memory" Adrian Hunter
provides some fixups for the recently-added "unaccepted memory' feature.
To increase the feature's checking coverage. "Plug a few gaps where
RAM is exposed without checking if it is unaccepted memory".
- In the series "cleanups for lockless slab shrink" Qi Zheng has done
some maintenance work which is preparation for the lockless slab
shrinking code.
- Qi Zheng has redone the earlier (and reverted) attempt to make slab
shrinking lockless in the series "use refcount+RCU method to implement
lockless slab shrink".
- David Hildenbrand contributes some maintenance work for the rmap code
in the series "Anon rmap cleanups".
- Kefeng Wang does more folio conversions and some maintenance work in
the migration code. Series "mm: migrate: more folio conversion and
unification".
- Matthew Wilcox has fixed an issue in the buffer_head code which was
causing long stalls under some heavy memory/IO loads. Some cleanups
were added on the way. Series "Add and use bdev_getblk()".
- In the series "Use nth_page() in place of direct struct page
manipulation" Zi Yan has fixed a potential issue with the direct
manipulation of hugetlb page frames.
- In the series "mm: hugetlb: Skip initialization of gigantic tail
struct pages if freed by HVO" has improved our handling of gigantic
pages in the hugetlb vmmemmep optimizaton code. This provides
significant boot time improvements when significant amounts of gigantic
pages are in use.
- Matthew Wilcox has sent the series "Small hugetlb cleanups" - code
rationalization and folio conversions in the hugetlb code.
- Yin Fengwei has improved mlock()'s handling of large folios in the
series "support large folio for mlock"
- In the series "Expose swapcache stat for memcg v1" Liu Shixin has
added statistics for memcg v1 users which are available (and useful)
under memcg v2.
- Florent Revest has enhanced the MDWE (Memory-Deny-Write-Executable)
prctl so that userspace may direct the kernel to not automatically
propagate the denial to child processes. The series is named "MDWE
without inheritance".
- Kefeng Wang has provided the series "mm: convert numa balancing
functions to use a folio" which does what it says.
- In the series "mm/ksm: add fork-exec support for prctl" Stefan Roesch
makes is possible for a process to propagate KSM treatment across
exec().
- Huang Ying has enhanced memory tiering's calculation of memory
distances. This is used to permit the dax/kmem driver to use "high
bandwidth memory" in addition to Optane Data Center Persistent Memory
Modules (DCPMM). The series is named "memory tiering: calculate
abstract distance based on ACPI HMAT"
- In the series "Smart scanning mode for KSM" Stefan Roesch has
optimized KSM by teaching it to retain and use some historical
information from previous scans.
- Yosry Ahmed has fixed some inconsistencies in memcg statistics in the
series "mm: memcg: fix tracking of pending stats updates values".
- In the series "Implement IOCTL to get and optionally clear info about
PTEs" Peter Xu has added an ioctl to /proc/<pid>/pagemap which permits
us to atomically read-then-clear page softdirty state. This is mainly
used by CRIU.
- Hugh Dickins contributed the series "shmem,tmpfs: general maintenance"
- a bunch of relatively minor maintenance tweaks to this code.
- Matthew Wilcox has increased the use of the VMA lock over file-backed
page faults in the series "Handle more faults under the VMA lock". Some
rationalizations of the fault path became possible as a result.
- In the series "mm/rmap: convert page_move_anon_rmap() to
folio_move_anon_rmap()" David Hildenbrand has implemented some cleanups
and folio conversions.
- In the series "various improvements to the GUP interface" Lorenzo
Stoakes has simplified and improved the GUP interface with an eye to
providing groundwork for future improvements.
- Andrey Konovalov has sent along the series "kasan: assorted fixes and
improvements" which does those things.
- Some page allocator maintenance work from Kemeng Shi in the series
"Two minor cleanups to break_down_buddy_pages".
- In thes series "New selftest for mm" Breno Leitao has developed
another MM self test which tickles a race we had between madvise() and
page faults.
- In the series "Add folio_end_read" Matthew Wilcox provides cleanups
and an optimization to the core pagecache code.
- Nhat Pham has added memcg accounting for hugetlb memory in the series
"hugetlb memcg accounting".
- Cleanups and rationalizations to the pagemap code from Lorenzo
Stoakes, in the series "Abstract vma_merge() and split_vma()".
- Audra Mitchell has fixed issues in the procfs page_owner code's new
timestamping feature which was causing some misbehaviours. In the
series "Fix page_owner's use of free timestamps".
- Lorenzo Stoakes has fixed the handling of new mappings of sealed files
in the series "permit write-sealed memfd read-only shared mappings".
- Mike Kravetz has optimized the hugetlb vmemmap optimization in the
series "Batch hugetlb vmemmap modification operations".
- Some buffer_head folio conversions and cleanups from Matthew Wilcox in
the series "Finish the create_empty_buffers() transition".
- As a page allocator performance optimization Huang Ying has added
automatic tuning to the allocator's per-cpu-pages feature, in the series
"mm: PCP high auto-tuning".
- Roman Gushchin has contributed the patchset "mm: improve performance
of accounted kernel memory allocations" which improves their performance
by ~30% as measured by a micro-benchmark.
- folio conversions from Kefeng Wang in the series "mm: convert page
cpupid functions to folios".
- Some kmemleak fixups in Liu Shixin's series "Some bugfix about
kmemleak".
- Qi Zheng has improved our handling of memoryless nodes by keeping them
off the allocation fallback list. This is done in the series "handle
memoryless nodes more appropriately".
- khugepaged conversions from Vishal Moola in the series "Some
khugepaged folio conversions".
-----BEGIN PGP SIGNATURE-----
iHUEABYIAB0WIQTTMBEPP41GrTpTJgfdBJ7gKXxAjgUCZULEMwAKCRDdBJ7gKXxA
jhQHAQCYpD3g849x69DmHnHWHm/EHQLvQmRMDeYZI+nx/sCJOwEAw4AKg0Oemv9y
FgeUPAD1oasg6CP+INZvCj34waNxwAc=
=E+Y4
-----END PGP SIGNATURE-----
Merge tag 'mm-stable-2023-11-01-14-33' of git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm
Pull MM updates from Andrew Morton:
"Many singleton patches against the MM code. The patch series which are
included in this merge do the following:
- Kemeng Shi has contributed some compation maintenance work in the
series 'Fixes and cleanups to compaction'
- Joel Fernandes has a patchset ('Optimize mremap during mutual
alignment within PMD') which fixes an obscure issue with mremap()'s
pagetable handling during a subsequent exec(), based upon an
implementation which Linus suggested
- More DAMON/DAMOS maintenance and feature work from SeongJae Park i
the following patch series:
mm/damon: misc fixups for documents, comments and its tracepoint
mm/damon: add a tracepoint for damos apply target regions
mm/damon: provide pseudo-moving sum based access rate
mm/damon: implement DAMOS apply intervals
mm/damon/core-test: Fix memory leaks in core-test
mm/damon/sysfs-schemes: Do DAMOS tried regions update for only one apply interval
- In the series 'Do not try to access unaccepted memory' Adrian
Hunter provides some fixups for the recently-added 'unaccepted
memory' feature. To increase the feature's checking coverage. 'Plug
a few gaps where RAM is exposed without checking if it is
unaccepted memory'
- In the series 'cleanups for lockless slab shrink' Qi Zheng has done
some maintenance work which is preparation for the lockless slab
shrinking code
- Qi Zheng has redone the earlier (and reverted) attempt to make slab
shrinking lockless in the series 'use refcount+RCU method to
implement lockless slab shrink'
- David Hildenbrand contributes some maintenance work for the rmap
code in the series 'Anon rmap cleanups'
- Kefeng Wang does more folio conversions and some maintenance work
in the migration code. Series 'mm: migrate: more folio conversion
and unification'
- Matthew Wilcox has fixed an issue in the buffer_head code which was
causing long stalls under some heavy memory/IO loads. Some cleanups
were added on the way. Series 'Add and use bdev_getblk()'
- In the series 'Use nth_page() in place of direct struct page
manipulation' Zi Yan has fixed a potential issue with the direct
manipulation of hugetlb page frames
- In the series 'mm: hugetlb: Skip initialization of gigantic tail
struct pages if freed by HVO' has improved our handling of gigantic
pages in the hugetlb vmmemmep optimizaton code. This provides
significant boot time improvements when significant amounts of
gigantic pages are in use
- Matthew Wilcox has sent the series 'Small hugetlb cleanups' - code
rationalization and folio conversions in the hugetlb code
- Yin Fengwei has improved mlock()'s handling of large folios in the
series 'support large folio for mlock'
- In the series 'Expose swapcache stat for memcg v1' Liu Shixin has
added statistics for memcg v1 users which are available (and
useful) under memcg v2
- Florent Revest has enhanced the MDWE (Memory-Deny-Write-Executable)
prctl so that userspace may direct the kernel to not automatically
propagate the denial to child processes. The series is named 'MDWE
without inheritance'
- Kefeng Wang has provided the series 'mm: convert numa balancing
functions to use a folio' which does what it says
- In the series 'mm/ksm: add fork-exec support for prctl' Stefan
Roesch makes is possible for a process to propagate KSM treatment
across exec()
- Huang Ying has enhanced memory tiering's calculation of memory
distances. This is used to permit the dax/kmem driver to use 'high
bandwidth memory' in addition to Optane Data Center Persistent
Memory Modules (DCPMM). The series is named 'memory tiering:
calculate abstract distance based on ACPI HMAT'
- In the series 'Smart scanning mode for KSM' Stefan Roesch has
optimized KSM by teaching it to retain and use some historical
information from previous scans
- Yosry Ahmed has fixed some inconsistencies in memcg statistics in
the series 'mm: memcg: fix tracking of pending stats updates
values'
- In the series 'Implement IOCTL to get and optionally clear info
about PTEs' Peter Xu has added an ioctl to /proc/<pid>/pagemap
which permits us to atomically read-then-clear page softdirty
state. This is mainly used by CRIU
- Hugh Dickins contributed the series 'shmem,tmpfs: general
maintenance', a bunch of relatively minor maintenance tweaks to
this code
- Matthew Wilcox has increased the use of the VMA lock over
file-backed page faults in the series 'Handle more faults under the
VMA lock'. Some rationalizations of the fault path became possible
as a result
- In the series 'mm/rmap: convert page_move_anon_rmap() to
folio_move_anon_rmap()' David Hildenbrand has implemented some
cleanups and folio conversions
- In the series 'various improvements to the GUP interface' Lorenzo
Stoakes has simplified and improved the GUP interface with an eye
to providing groundwork for future improvements
- Andrey Konovalov has sent along the series 'kasan: assorted fixes
and improvements' which does those things
- Some page allocator maintenance work from Kemeng Shi in the series
'Two minor cleanups to break_down_buddy_pages'
- In thes series 'New selftest for mm' Breno Leitao has developed
another MM self test which tickles a race we had between madvise()
and page faults
- In the series 'Add folio_end_read' Matthew Wilcox provides cleanups
and an optimization to the core pagecache code
- Nhat Pham has added memcg accounting for hugetlb memory in the
series 'hugetlb memcg accounting'
- Cleanups and rationalizations to the pagemap code from Lorenzo
Stoakes, in the series 'Abstract vma_merge() and split_vma()'
- Audra Mitchell has fixed issues in the procfs page_owner code's new
timestamping feature which was causing some misbehaviours. In the
series 'Fix page_owner's use of free timestamps'
- Lorenzo Stoakes has fixed the handling of new mappings of sealed
files in the series 'permit write-sealed memfd read-only shared
mappings'
- Mike Kravetz has optimized the hugetlb vmemmap optimization in the
series 'Batch hugetlb vmemmap modification operations'
- Some buffer_head folio conversions and cleanups from Matthew Wilcox
in the series 'Finish the create_empty_buffers() transition'
- As a page allocator performance optimization Huang Ying has added
automatic tuning to the allocator's per-cpu-pages feature, in the
series 'mm: PCP high auto-tuning'
- Roman Gushchin has contributed the patchset 'mm: improve
performance of accounted kernel memory allocations' which improves
their performance by ~30% as measured by a micro-benchmark
- folio conversions from Kefeng Wang in the series 'mm: convert page
cpupid functions to folios'
- Some kmemleak fixups in Liu Shixin's series 'Some bugfix about
kmemleak'
- Qi Zheng has improved our handling of memoryless nodes by keeping
them off the allocation fallback list. This is done in the series
'handle memoryless nodes more appropriately'
- khugepaged conversions from Vishal Moola in the series 'Some
khugepaged folio conversions'"
[ bcachefs conflicts with the dynamically allocated shrinkers have been
resolved as per Stephen Rothwell in
https://lore.kernel.org/all/20230913093553.4290421e@canb.auug.org.au/
with help from Qi Zheng.
The clone3 test filtering conflict was half-arsed by yours truly ]
* tag 'mm-stable-2023-11-01-14-33' of git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm: (406 commits)
mm/damon/sysfs: update monitoring target regions for online input commit
mm/damon/sysfs: remove requested targets when online-commit inputs
selftests: add a sanity check for zswap
Documentation: maple_tree: fix word spelling error
mm/vmalloc: fix the unchecked dereference warning in vread_iter()
zswap: export compression failure stats
Documentation: ubsan: drop "the" from article title
mempolicy: migration attempt to match interleave nodes
mempolicy: mmap_lock is not needed while migrating folios
mempolicy: alloc_pages_mpol() for NUMA policy without vma
mm: add page_rmappable_folio() wrapper
mempolicy: remove confusing MPOL_MF_LAZY dead code
mempolicy: mpol_shared_policy_init() without pseudo-vma
mempolicy trivia: use pgoff_t in shared mempolicy tree
mempolicy trivia: slightly more consistent naming
mempolicy trivia: delete those ancient pr_debug()s
mempolicy: fix migrate_pages(2) syscall return nr_failed
kernfs: drop shared NUMA mempolicy hooks
hugetlbfs: drop shared NUMA mempolicy pretence
mm/damon/sysfs-test: add a unit test for damon_sysfs_set_targets()
...
2023-11-03 13:38:47 +08:00
|
|
|
sb->s_shrink->seeks = 0;
|
2021-11-14 02:36:26 +08:00
|
|
|
|
2021-03-16 13:33:39 +08:00
|
|
|
vinode = bch2_vfs_inode_get(c, BCACHEFS_ROOT_SUBVOL_INUM);
|
2022-07-19 07:42:58 +08:00
|
|
|
ret = PTR_ERR_OR_ZERO(vinode);
|
|
|
|
if (ret) {
|
2023-09-11 13:37:34 +08:00
|
|
|
bch_err_msg(c, ret, "mounting: error getting root inode");
|
2017-03-17 14:18:50 +08:00
|
|
|
goto err_put_super;
|
|
|
|
}
|
|
|
|
|
|
|
|
sb->s_root = d_make_root(vinode);
|
|
|
|
if (!sb->s_root) {
|
2019-04-18 06:21:19 +08:00
|
|
|
bch_err(c, "error mounting: error allocating root dentry");
|
2017-03-17 14:18:50 +08:00
|
|
|
ret = -ENOMEM;
|
|
|
|
goto err_put_super;
|
|
|
|
}
|
|
|
|
|
|
|
|
sb->s_flags |= SB_ACTIVE;
|
|
|
|
out:
|
|
|
|
return dget(sb->s_root);
|
|
|
|
|
|
|
|
err_put_super:
|
|
|
|
deactivate_locked_super(sb);
|
2023-03-31 08:16:06 +08:00
|
|
|
return ERR_PTR(bch2_err_class(ret));
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void bch2_kill_sb(struct super_block *sb)
|
|
|
|
{
|
|
|
|
struct bch_fs *c = sb->s_fs_info;
|
|
|
|
|
|
|
|
generic_shutdown_super(sb);
|
2023-11-13 03:15:35 +08:00
|
|
|
bch2_fs_free(c);
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct file_system_type bcache_fs_type = {
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.name = "bcachefs",
|
|
|
|
.mount = bch2_mount,
|
|
|
|
.kill_sb = bch2_kill_sb,
|
|
|
|
.fs_flags = FS_REQUIRES_DEV,
|
|
|
|
};
|
|
|
|
|
|
|
|
MODULE_ALIAS_FS("bcachefs");
|
|
|
|
|
|
|
|
void bch2_vfs_exit(void)
|
|
|
|
{
|
|
|
|
unregister_filesystem(&bcache_fs_type);
|
2022-10-20 06:31:33 +08:00
|
|
|
kmem_cache_destroy(bch2_inode_cache);
|
2017-03-17 14:18:50 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int __init bch2_vfs_init(void)
|
|
|
|
{
|
|
|
|
int ret = -ENOMEM;
|
|
|
|
|
2023-07-14 00:00:28 +08:00
|
|
|
bch2_inode_cache = KMEM_CACHE(bch_inode_info, SLAB_RECLAIM_ACCOUNT);
|
2017-03-17 14:18:50 +08:00
|
|
|
if (!bch2_inode_cache)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
ret = register_filesystem(&bcache_fs_type);
|
|
|
|
if (ret)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
err:
|
|
|
|
bch2_vfs_exit();
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* NO_BCACHEFS_FS */
|