Update bcachefs sources to 841a95c29f4c bcachefs: fix userspace build errors

Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
This commit is contained in:
Kent Overstreet 2023-12-15 21:57:44 -05:00
parent 4c5dcb018d
commit b6740e5392
64 changed files with 2430 additions and 1435 deletions

View File

@ -1 +1 @@
6d44812757ddf81fad087d6abe662355e6712e02 841a95c29f4caefb9c3875466024f3549f45f842

View File

@ -270,7 +270,7 @@ update-bcachefs-sources:
git add include/linux/kmemleak.h git add include/linux/kmemleak.h
cp $(LINUX_DIR)/lib/math/int_sqrt.c linux/ cp $(LINUX_DIR)/lib/math/int_sqrt.c linux/
git add linux/int_sqrt.c git add linux/int_sqrt.c
git rm libbcachefs/mean_and_variance_test.c git rm -f libbcachefs/mean_and_variance_test.c
# cp $(LINUX_DIR)/lib/math/mean_and_variance.c linux/ # cp $(LINUX_DIR)/lib/math/mean_and_variance.c linux/
# git add linux/mean_and_variance.c # git add linux/mean_and_variance.c
# cp $(LINUX_DIR)/include/linux/mean_and_variance.h include/linux/ # cp $(LINUX_DIR)/include/linux/mean_and_variance.h include/linux/

View File

@ -47,6 +47,7 @@
#define __builtin_warning(x, y...) (1) #define __builtin_warning(x, y...) (1)
#define __must_hold(x) #define __must_hold(x)
#define __acquires(x) #define __acquires(x)
#define __cond_acquires(x)
#define __releases(x) #define __releases(x)
#define __acquire(x) (void)0 #define __acquire(x) (void)0
#define __release(x) (void)0 #define __release(x) (void)0

View File

@ -19,6 +19,7 @@
#define KERN_DEBUG "" #define KERN_DEBUG ""
#define KERN_DEFAULT "" #define KERN_DEFAULT ""
#define KERN_CONT "" #define KERN_CONT ""
#define KERN_SOH "\001"
static inline int vscnprintf(char *buf, size_t size, const char *fmt, va_list args) static inline int vscnprintf(char *buf, size_t size, const char *fmt, va_list args)
{ {

View File

@ -12,6 +12,7 @@
#define rcu_access_pointer(p) READ_ONCE(p) #define rcu_access_pointer(p) READ_ONCE(p)
#define kfree_rcu(ptr, rcu_head) kfree(ptr) /* XXX */ #define kfree_rcu(ptr, rcu_head) kfree(ptr) /* XXX */
#define kfree_rcu_mightsleep(ptr) kfree(ptr) /* XXX */
#define kvfree_rcu_mightsleep(ptr) kfree(ptr) /* XXX */ #define kvfree_rcu_mightsleep(ptr) kfree(ptr) /* XXX */
#define RCU_INIT_POINTER(p, v) WRITE_ONCE(p, v) #define RCU_INIT_POINTER(p, v) WRITE_ONCE(p, v)

352
include/linux/refcount.h Normal file
View File

@ -0,0 +1,352 @@
/* SPDX-License-Identifier: GPL-2.0 */
/*
* Variant of atomic_t specialized for reference counts.
*
* The interface matches the atomic_t interface (to aid in porting) but only
* provides the few functions one should use for reference counting.
*
* Saturation semantics
* ====================
*
* refcount_t differs from atomic_t in that the counter saturates at
* REFCOUNT_SATURATED and will not move once there. This avoids wrapping the
* counter and causing 'spurious' use-after-free issues. In order to avoid the
* cost associated with introducing cmpxchg() loops into all of the saturating
* operations, we temporarily allow the counter to take on an unchecked value
* and then explicitly set it to REFCOUNT_SATURATED on detecting that underflow
* or overflow has occurred. Although this is racy when multiple threads
* access the refcount concurrently, by placing REFCOUNT_SATURATED roughly
* equidistant from 0 and INT_MAX we minimise the scope for error:
*
* INT_MAX REFCOUNT_SATURATED UINT_MAX
* 0 (0x7fff_ffff) (0xc000_0000) (0xffff_ffff)
* +--------------------------------+----------------+----------------+
* <---------- bad value! ---------->
*
* (in a signed view of the world, the "bad value" range corresponds to
* a negative counter value).
*
* As an example, consider a refcount_inc() operation that causes the counter
* to overflow:
*
* int old = atomic_fetch_add_relaxed(r);
* // old is INT_MAX, refcount now INT_MIN (0x8000_0000)
* if (old < 0)
* atomic_set(r, REFCOUNT_SATURATED);
*
* If another thread also performs a refcount_inc() operation between the two
* atomic operations, then the count will continue to edge closer to 0. If it
* reaches a value of 1 before /any/ of the threads reset it to the saturated
* value, then a concurrent refcount_dec_and_test() may erroneously free the
* underlying object.
* Linux limits the maximum number of tasks to PID_MAX_LIMIT, which is currently
* 0x400000 (and can't easily be raised in the future beyond FUTEX_TID_MASK).
* With the current PID limit, if no batched refcounting operations are used and
* the attacker can't repeatedly trigger kernel oopses in the middle of refcount
* operations, this makes it impossible for a saturated refcount to leave the
* saturation range, even if it is possible for multiple uses of the same
* refcount to nest in the context of a single task:
*
* (UINT_MAX+1-REFCOUNT_SATURATED) / PID_MAX_LIMIT =
* 0x40000000 / 0x400000 = 0x100 = 256
*
* If hundreds of references are added/removed with a single refcounting
* operation, it may potentially be possible to leave the saturation range; but
* given the precise timing details involved with the round-robin scheduling of
* each thread manipulating the refcount and the need to hit the race multiple
* times in succession, there doesn't appear to be a practical avenue of attack
* even if using refcount_add() operations with larger increments.
*
* Memory ordering
* ===============
*
* Memory ordering rules are slightly relaxed wrt regular atomic_t functions
* and provide only what is strictly required for refcounts.
*
* The increments are fully relaxed; these will not provide ordering. The
* rationale is that whatever is used to obtain the object we're increasing the
* reference count on will provide the ordering. For locked data structures,
* its the lock acquire, for RCU/lockless data structures its the dependent
* load.
*
* Do note that inc_not_zero() provides a control dependency which will order
* future stores against the inc, this ensures we'll never modify the object
* if we did not in fact acquire a reference.
*
* The decrements will provide release order, such that all the prior loads and
* stores will be issued before, it also provides a control dependency, which
* will order us against the subsequent free().
*
* The control dependency is against the load of the cmpxchg (ll/sc) that
* succeeded. This means the stores aren't fully ordered, but this is fine
* because the 1->0 transition indicates no concurrency.
*
* Note that the allocator is responsible for ordering things between free()
* and alloc().
*
* The decrements dec_and_test() and sub_and_test() also provide acquire
* ordering on success.
*
*/
#ifndef _LINUX_REFCOUNT_H
#define _LINUX_REFCOUNT_H
#include <linux/atomic.h>
#include <linux/bug.h>
#include <linux/compiler.h>
#include <linux/limits.h>
struct mutex;
/**
* typedef refcount_t - variant of atomic_t specialized for reference counts
* @refs: atomic_t counter field
*
* The counter saturates at REFCOUNT_SATURATED and will not move once
* there. This avoids wrapping the counter and causing 'spurious'
* use-after-free bugs.
*/
typedef struct refcount_struct {
atomic_t refs;
} refcount_t;
#define REFCOUNT_INIT(n) { .refs = ATOMIC_INIT(n), }
#define REFCOUNT_MAX INT_MAX
#define REFCOUNT_SATURATED (INT_MIN / 2)
enum refcount_saturation_type {
REFCOUNT_ADD_NOT_ZERO_OVF,
REFCOUNT_ADD_OVF,
REFCOUNT_ADD_UAF,
REFCOUNT_SUB_UAF,
REFCOUNT_DEC_LEAK,
};
/**
* refcount_set - set a refcount's value
* @r: the refcount
* @n: value to which the refcount will be set
*/
static inline void refcount_set(refcount_t *r, int n)
{
atomic_set(&r->refs, n);
}
/**
* refcount_read - get a refcount's value
* @r: the refcount
*
* Return: the refcount's value
*/
static inline unsigned int refcount_read(const refcount_t *r)
{
return atomic_read(&r->refs);
}
static inline __must_check bool __refcount_add_not_zero(int i, refcount_t *r, int *oldp)
{
int old = refcount_read(r);
do {
if (!old)
break;
} while (!atomic_try_cmpxchg_acquire(&r->refs, &old, old + i));
if (oldp)
*oldp = old;
return old;
}
/**
* refcount_add_not_zero - add a value to a refcount unless it is 0
* @i: the value to add to the refcount
* @r: the refcount
*
* Will saturate at REFCOUNT_SATURATED and WARN.
*
* Provides no memory ordering, it is assumed the caller has guaranteed the
* object memory to be stable (RCU, etc.). It does provide a control dependency
* and thereby orders future stores. See the comment on top.
*
* Use of this function is not recommended for the normal reference counting
* use case in which references are taken and released one at a time. In these
* cases, refcount_inc(), or one of its variants, should instead be used to
* increment a reference count.
*
* Return: false if the passed refcount is 0, true otherwise
*/
static inline __must_check bool refcount_add_not_zero(int i, refcount_t *r)
{
return __refcount_add_not_zero(i, r, NULL);
}
static inline void __refcount_add(int i, refcount_t *r, int *oldp)
{
int old = atomic_add_return(i, &r->refs);
if (oldp)
*oldp = old;
}
/**
* refcount_add - add a value to a refcount
* @i: the value to add to the refcount
* @r: the refcount
*
* Similar to atomic_add(), but will saturate at REFCOUNT_SATURATED and WARN.
*
* Provides no memory ordering, it is assumed the caller has guaranteed the
* object memory to be stable (RCU, etc.). It does provide a control dependency
* and thereby orders future stores. See the comment on top.
*
* Use of this function is not recommended for the normal reference counting
* use case in which references are taken and released one at a time. In these
* cases, refcount_inc(), or one of its variants, should instead be used to
* increment a reference count.
*/
static inline void refcount_add(int i, refcount_t *r)
{
__refcount_add(i, r, NULL);
}
static inline __must_check bool __refcount_inc_not_zero(refcount_t *r, int *oldp)
{
return __refcount_add_not_zero(1, r, oldp);
}
/**
* refcount_inc_not_zero - increment a refcount unless it is 0
* @r: the refcount to increment
*
* Similar to atomic_inc_not_zero(), but will saturate at REFCOUNT_SATURATED
* and WARN.
*
* Provides no memory ordering, it is assumed the caller has guaranteed the
* object memory to be stable (RCU, etc.). It does provide a control dependency
* and thereby orders future stores. See the comment on top.
*
* Return: true if the increment was successful, false otherwise
*/
static inline __must_check bool refcount_inc_not_zero(refcount_t *r)
{
return __refcount_inc_not_zero(r, NULL);
}
static inline void __refcount_inc(refcount_t *r, int *oldp)
{
__refcount_add(1, r, oldp);
}
/**
* refcount_inc - increment a refcount
* @r: the refcount to increment
*
* Similar to atomic_inc(), but will saturate at REFCOUNT_SATURATED and WARN.
*
* Provides no memory ordering, it is assumed the caller already has a
* reference on the object.
*
* Will WARN if the refcount is 0, as this represents a possible use-after-free
* condition.
*/
static inline void refcount_inc(refcount_t *r)
{
__refcount_inc(r, NULL);
}
static inline __must_check bool __refcount_sub_and_test(int i, refcount_t *r, int *oldp)
{
int old = atomic_sub_return_release(i, &r->refs);
if (oldp)
*oldp = old;
if (old == i) {
smp_acquire__after_ctrl_dep();
return true;
}
return false;
}
/**
* refcount_sub_and_test - subtract from a refcount and test if it is 0
* @i: amount to subtract from the refcount
* @r: the refcount
*
* Similar to atomic_dec_and_test(), but it will WARN, return false and
* ultimately leak on underflow and will fail to decrement when saturated
* at REFCOUNT_SATURATED.
*
* Provides release memory ordering, such that prior loads and stores are done
* before, and provides an acquire ordering on success such that free()
* must come after.
*
* Use of this function is not recommended for the normal reference counting
* use case in which references are taken and released one at a time. In these
* cases, refcount_dec(), or one of its variants, should instead be used to
* decrement a reference count.
*
* Return: true if the resulting refcount is 0, false otherwise
*/
static inline __must_check bool refcount_sub_and_test(int i, refcount_t *r)
{
return __refcount_sub_and_test(i, r, NULL);
}
static inline __must_check bool __refcount_dec_and_test(refcount_t *r, int *oldp)
{
return __refcount_sub_and_test(1, r, oldp);
}
/**
* refcount_dec_and_test - decrement a refcount and test if it is 0
* @r: the refcount
*
* Similar to atomic_dec_and_test(), it will WARN on underflow and fail to
* decrement when saturated at REFCOUNT_SATURATED.
*
* Provides release memory ordering, such that prior loads and stores are done
* before, and provides an acquire ordering on success such that free()
* must come after.
*
* Return: true if the resulting refcount is 0, false otherwise
*/
static inline __must_check bool refcount_dec_and_test(refcount_t *r)
{
return __refcount_dec_and_test(r, NULL);
}
static inline void __refcount_dec(refcount_t *r, int *oldp)
{
int old = atomic_sub_return_release(1, &r->refs);
if (oldp)
*oldp = old;
}
/**
* refcount_dec - decrement a refcount
* @r: the refcount
*
* Similar to atomic_dec(), it will WARN on underflow and fail to decrement
* when saturated at REFCOUNT_SATURATED.
*
* Provides release memory ordering, such that prior loads and stores are done
* before.
*/
static inline void refcount_dec(refcount_t *r)
{
__refcount_dec(r, NULL);
}
extern __must_check bool refcount_dec_if_one(refcount_t *r);
extern __must_check bool refcount_dec_not_one(refcount_t *r);
extern __must_check bool refcount_dec_and_mutex_lock(refcount_t *r, struct mutex *lock) __cond_acquires(lock);
extern __must_check bool refcount_dec_and_lock(refcount_t *r, spinlock_t *lock) __cond_acquires(lock);
extern __must_check bool refcount_dec_and_lock_irqsave(refcount_t *r,
spinlock_t *lock,
unsigned long *flags) __cond_acquires(lock);
#endif /* _LINUX_REFCOUNT_H */

View File

@ -544,8 +544,8 @@ int bch2_bucket_gens_init(struct bch_fs *c)
u8 gen; u8 gen;
int ret; int ret;
for_each_btree_key(trans, iter, BTREE_ID_alloc, POS_MIN, ret = for_each_btree_key(trans, iter, BTREE_ID_alloc, POS_MIN,
BTREE_ITER_PREFETCH, k, ret) { BTREE_ITER_PREFETCH, k, ({
/* /*
* Not a fsck error because this is checked/repaired by * Not a fsck error because this is checked/repaired by
* bch2_check_alloc_key() which runs later: * bch2_check_alloc_key() which runs later:
@ -572,8 +572,8 @@ int bch2_bucket_gens_init(struct bch_fs *c)
} }
g.v.gens[offset] = gen; g.v.gens[offset] = gen;
} 0;
bch2_trans_iter_exit(trans, &iter); }));
if (have_bucket_gens_key && !ret) if (have_bucket_gens_key && !ret)
ret = commit_do(trans, NULL, NULL, ret = commit_do(trans, NULL, NULL,
@ -582,8 +582,7 @@ int bch2_bucket_gens_init(struct bch_fs *c)
bch2_trans_put(trans); bch2_trans_put(trans);
if (ret) bch_err_fn(c, ret);
bch_err_fn(c, ret);
return ret; return ret;
} }
@ -601,8 +600,8 @@ int bch2_alloc_read(struct bch_fs *c)
const struct bch_bucket_gens *g; const struct bch_bucket_gens *g;
u64 b; u64 b;
for_each_btree_key(trans, iter, BTREE_ID_bucket_gens, POS_MIN, ret = for_each_btree_key(trans, iter, BTREE_ID_bucket_gens, POS_MIN,
BTREE_ITER_PREFETCH, k, ret) { BTREE_ITER_PREFETCH, k, ({
u64 start = bucket_gens_pos_to_alloc(k.k->p, 0).offset; u64 start = bucket_gens_pos_to_alloc(k.k->p, 0).offset;
u64 end = bucket_gens_pos_to_alloc(bpos_nosnap_successor(k.k->p), 0).offset; u64 end = bucket_gens_pos_to_alloc(bpos_nosnap_successor(k.k->p), 0).offset;
@ -624,13 +623,13 @@ int bch2_alloc_read(struct bch_fs *c)
b < min_t(u64, ca->mi.nbuckets, end); b < min_t(u64, ca->mi.nbuckets, end);
b++) b++)
*bucket_gen(ca, b) = g->gens[b & KEY_TYPE_BUCKET_GENS_MASK]; *bucket_gen(ca, b) = g->gens[b & KEY_TYPE_BUCKET_GENS_MASK];
} 0;
bch2_trans_iter_exit(trans, &iter); }));
} else { } else {
struct bch_alloc_v4 a; struct bch_alloc_v4 a;
for_each_btree_key(trans, iter, BTREE_ID_alloc, POS_MIN, ret = for_each_btree_key(trans, iter, BTREE_ID_alloc, POS_MIN,
BTREE_ITER_PREFETCH, k, ret) { BTREE_ITER_PREFETCH, k, ({
/* /*
* Not a fsck error because this is checked/repaired by * Not a fsck error because this is checked/repaired by
* bch2_check_alloc_key() which runs later: * bch2_check_alloc_key() which runs later:
@ -641,16 +640,14 @@ int bch2_alloc_read(struct bch_fs *c)
ca = bch_dev_bkey_exists(c, k.k->p.inode); ca = bch_dev_bkey_exists(c, k.k->p.inode);
*bucket_gen(ca, k.k->p.offset) = bch2_alloc_to_v4(k, &a)->gen; *bucket_gen(ca, k.k->p.offset) = bch2_alloc_to_v4(k, &a)->gen;
} 0;
bch2_trans_iter_exit(trans, &iter); }));
} }
bch2_trans_put(trans); bch2_trans_put(trans);
up_read(&c->gc_lock); up_read(&c->gc_lock);
if (ret) bch_err_fn(c, ret);
bch_err_fn(c, ret);
return ret; return ret;
} }
@ -876,8 +873,9 @@ static struct bkey_s_c bch2_get_key_or_hole(struct btree_iter *iter, struct bpos
bch2_trans_copy_iter(&iter2, iter); bch2_trans_copy_iter(&iter2, iter);
if (!bpos_eq(iter->path->l[0].b->key.k.p, SPOS_MAX)) struct btree_path *path = btree_iter_path(iter->trans, iter);
end = bkey_min(end, bpos_nosnap_successor(iter->path->l[0].b->key.k.p)); if (!bpos_eq(path->l[0].b->key.k.p, SPOS_MAX))
end = bkey_min(end, bpos_nosnap_successor(path->l[0].b->key.k.p));
end = bkey_min(end, POS(iter->pos.inode, iter->pos.offset + U32_MAX - 1)); end = bkey_min(end, POS(iter->pos.inode, iter->pos.offset + U32_MAX - 1));
@ -1430,7 +1428,7 @@ bkey_err:
if (ret < 0) if (ret < 0)
goto err; goto err;
ret = for_each_btree_key2(trans, iter, ret = for_each_btree_key(trans, iter,
BTREE_ID_need_discard, POS_MIN, BTREE_ID_need_discard, POS_MIN,
BTREE_ITER_PREFETCH, k, BTREE_ITER_PREFETCH, k,
bch2_check_discard_freespace_key(trans, &iter)); bch2_check_discard_freespace_key(trans, &iter));
@ -1696,8 +1694,8 @@ static void bch2_do_discards_work(struct work_struct *work)
* successful commit: * successful commit:
*/ */
ret = bch2_trans_run(c, ret = bch2_trans_run(c,
for_each_btree_key2(trans, iter, for_each_btree_key(trans, iter,
BTREE_ID_need_discard, POS_MIN, 0, k, BTREE_ID_need_discard, POS_MIN, 0, k,
bch2_discard_one_bucket(trans, &iter, &discard_pos_done, bch2_discard_one_bucket(trans, &iter, &discard_pos_done,
&seen, &seen,
&open, &open,

View File

@ -239,9 +239,8 @@ static struct open_bucket *__try_alloc_bucket(struct bch_fs *c, struct bch_dev *
if (cl) if (cl)
closure_wait(&c->open_buckets_wait, cl); closure_wait(&c->open_buckets_wait, cl);
if (!c->blocked_allocate_open_bucket) track_event_change(&c->times[BCH_TIME_blocked_allocate_open_bucket],
c->blocked_allocate_open_bucket = local_clock(); &c->blocked_allocate_open_bucket, true);
spin_unlock(&c->freelist_lock); spin_unlock(&c->freelist_lock);
return ERR_PTR(-BCH_ERR_open_buckets_empty); return ERR_PTR(-BCH_ERR_open_buckets_empty);
} }
@ -267,19 +266,11 @@ static struct open_bucket *__try_alloc_bucket(struct bch_fs *c, struct bch_dev *
ca->nr_open_buckets++; ca->nr_open_buckets++;
bch2_open_bucket_hash_add(c, ob); bch2_open_bucket_hash_add(c, ob);
if (c->blocked_allocate_open_bucket) { track_event_change(&c->times[BCH_TIME_blocked_allocate_open_bucket],
bch2_time_stats_update( &c->blocked_allocate_open_bucket, false);
&c->times[BCH_TIME_blocked_allocate_open_bucket],
c->blocked_allocate_open_bucket);
c->blocked_allocate_open_bucket = 0;
}
if (c->blocked_allocate) { track_event_change(&c->times[BCH_TIME_blocked_allocate],
bch2_time_stats_update( &c->blocked_allocate, false);
&c->times[BCH_TIME_blocked_allocate],
c->blocked_allocate);
c->blocked_allocate = 0;
}
spin_unlock(&c->freelist_lock); spin_unlock(&c->freelist_lock);
return ob; return ob;
@ -377,9 +368,9 @@ static struct open_bucket *try_alloc_bucket(struct btree_trans *trans, struct bc
ob = __try_alloc_bucket(c, ca, b, watermark, a, s, cl); ob = __try_alloc_bucket(c, ca, b, watermark, a, s, cl);
if (!ob) if (!ob)
iter.path->preserve = false; set_btree_iter_dontneed(&iter);
err: err:
if (iter.trans && iter.path) if (iter.path)
set_btree_iter_dontneed(&iter); set_btree_iter_dontneed(&iter);
bch2_trans_iter_exit(trans, &iter); bch2_trans_iter_exit(trans, &iter);
printbuf_exit(&buf); printbuf_exit(&buf);
@ -447,7 +438,7 @@ again:
ob = __try_alloc_bucket(trans->c, ca, k.k->p.offset, watermark, a, s, cl); ob = __try_alloc_bucket(trans->c, ca, k.k->p.offset, watermark, a, s, cl);
next: next:
citer.path->preserve = false; set_btree_iter_dontneed(&citer);
bch2_trans_iter_exit(trans, &citer); bch2_trans_iter_exit(trans, &citer);
if (ob) if (ob)
break; break;
@ -502,7 +493,7 @@ again:
ob = try_alloc_bucket(trans, ca, watermark, ob = try_alloc_bucket(trans, ca, watermark,
alloc_cursor, s, k, cl); alloc_cursor, s, k, cl);
if (ob) { if (ob) {
iter.path->preserve = false; set_btree_iter_dontneed(&iter);
break; break;
} }
} }
@ -567,8 +558,8 @@ again:
goto again; goto again;
} }
if (!c->blocked_allocate) track_event_change(&c->times[BCH_TIME_blocked_allocate],
c->blocked_allocate = local_clock(); &c->blocked_allocate, true);
ob = ERR_PTR(-BCH_ERR_freelist_empty); ob = ERR_PTR(-BCH_ERR_freelist_empty);
goto err; goto err;

View File

@ -417,8 +417,11 @@ static int check_bp_exists(struct btree_trans *trans,
struct btree_iter bp_iter = { NULL }; struct btree_iter bp_iter = { NULL };
struct printbuf buf = PRINTBUF; struct printbuf buf = PRINTBUF;
struct bkey_s_c bp_k; struct bkey_s_c bp_k;
struct bkey_buf tmp;
int ret; int ret;
bch2_bkey_buf_init(&tmp);
if (bpos_lt(bucket, bucket_start) || if (bpos_lt(bucket, bucket_start) ||
bpos_gt(bucket, bucket_end)) bpos_gt(bucket, bucket_end))
return 0; return 0;
@ -438,6 +441,8 @@ static int check_bp_exists(struct btree_trans *trans,
if (!bpos_eq(orig_k.k->p, last_flushed->k->k.p) || if (!bpos_eq(orig_k.k->p, last_flushed->k->k.p) ||
bkey_bytes(orig_k.k) != bkey_bytes(&last_flushed->k->k) || bkey_bytes(orig_k.k) != bkey_bytes(&last_flushed->k->k) ||
memcmp(orig_k.v, &last_flushed->k->v, bkey_val_bytes(orig_k.k))) { memcmp(orig_k.v, &last_flushed->k->v, bkey_val_bytes(orig_k.k))) {
bch2_bkey_buf_reassemble(&tmp, c, orig_k);
if (bp.level) { if (bp.level) {
bch2_trans_unlock(trans); bch2_trans_unlock(trans);
bch2_btree_interior_updates_flush(c); bch2_btree_interior_updates_flush(c);
@ -447,7 +452,7 @@ static int check_bp_exists(struct btree_trans *trans,
if (ret) if (ret)
goto err; goto err;
bch2_bkey_buf_reassemble(last_flushed, c, orig_k); bch2_bkey_buf_copy(last_flushed, c, tmp.k);
ret = -BCH_ERR_transaction_restart_write_buffer_flush; ret = -BCH_ERR_transaction_restart_write_buffer_flush;
goto out; goto out;
} }
@ -457,6 +462,7 @@ out:
err: err:
fsck_err: fsck_err:
bch2_trans_iter_exit(trans, &bp_iter); bch2_trans_iter_exit(trans, &bp_iter);
bch2_bkey_buf_exit(&tmp, c);
printbuf_exit(&buf); printbuf_exit(&buf);
return ret; return ret;
missing: missing:

View File

@ -193,6 +193,7 @@
#include <linux/mutex.h> #include <linux/mutex.h>
#include <linux/percpu-refcount.h> #include <linux/percpu-refcount.h>
#include <linux/percpu-rwsem.h> #include <linux/percpu-rwsem.h>
#include <linux/refcount.h>
#include <linux/rhashtable.h> #include <linux/rhashtable.h>
#include <linux/rwsem.h> #include <linux/rwsem.h>
#include <linux/semaphore.h> #include <linux/semaphore.h>
@ -264,6 +265,7 @@ do { \
#define bch2_fmt(_c, fmt) bch2_log_msg(_c, fmt "\n") #define bch2_fmt(_c, fmt) bch2_log_msg(_c, fmt "\n")
__printf(2, 3)
void __bch2_print(struct bch_fs *c, const char *fmt, ...); void __bch2_print(struct bch_fs *c, const char *fmt, ...);
#define maybe_dev_to_fs(_c) _Generic((_c), \ #define maybe_dev_to_fs(_c) _Generic((_c), \
@ -426,6 +428,7 @@ BCH_DEBUG_PARAMS_DEBUG()
x(blocked_journal_max_in_flight) \ x(blocked_journal_max_in_flight) \
x(blocked_allocate) \ x(blocked_allocate) \
x(blocked_allocate_open_bucket) \ x(blocked_allocate_open_bucket) \
x(blocked_write_buffer_full) \
x(nocow_lock_contended) x(nocow_lock_contended)
enum bch_time_stats { enum bch_time_stats {
@ -636,7 +639,7 @@ struct btree_transaction_stats {
struct bch2_time_stats lock_hold_times; struct bch2_time_stats lock_hold_times;
struct mutex lock; struct mutex lock;
unsigned nr_max_paths; unsigned nr_max_paths;
unsigned wb_updates_size; unsigned journal_entries_size;
unsigned max_mem; unsigned max_mem;
char *max_paths_text; char *max_paths_text;
}; };
@ -725,6 +728,7 @@ struct bch_fs {
dev_t dev; dev_t dev;
char name[40]; char name[40];
struct log_output *output; struct log_output *output;
struct task_struct *output_filter;
/* ro/rw, add/remove/resize devices: */ /* ro/rw, add/remove/resize devices: */
struct rw_semaphore state_lock; struct rw_semaphore state_lock;
@ -735,6 +739,13 @@ struct bch_fs {
#else #else
struct percpu_ref writes; struct percpu_ref writes;
#endif #endif
/*
* Analagous to c->writes, for asynchronous ops that don't necessarily
* need fs to be read-write
*/
refcount_t ro_ref;
wait_queue_head_t ro_ref_wait;
struct work_struct read_only_work; struct work_struct read_only_work;
struct bch_dev __rcu *devs[BCH_SB_MEMBERS_MAX]; struct bch_dev __rcu *devs[BCH_SB_MEMBERS_MAX];
@ -1037,10 +1048,21 @@ struct bch_fs {
/* RECOVERY */ /* RECOVERY */
u64 journal_replay_seq_start; u64 journal_replay_seq_start;
u64 journal_replay_seq_end; u64 journal_replay_seq_end;
/*
* Two different uses:
* "Has this fsck pass?" - i.e. should this type of error be an
* emergency read-only
* And, in certain situations fsck will rewind to an earlier pass: used
* for signaling to the toplevel code which pass we want to run now.
*/
enum bch_recovery_pass curr_recovery_pass; enum bch_recovery_pass curr_recovery_pass;
/* bitmap of explicitly enabled recovery passes: */ /* bitmap of explicitly enabled recovery passes: */
u64 recovery_passes_explicit; u64 recovery_passes_explicit;
/* bitmask of recovery passes that we actually ran */
u64 recovery_passes_complete; u64 recovery_passes_complete;
/* never rewinds version of curr_recovery_pass */
enum bch_recovery_pass recovery_pass_done;
struct semaphore online_fsck_mutex;
/* DEBUG JUNK */ /* DEBUG JUNK */
struct dentry *fs_debug_dir; struct dentry *fs_debug_dir;
@ -1100,6 +1122,16 @@ static inline void bch2_write_ref_get(struct bch_fs *c, enum bch_write_ref ref)
#endif #endif
} }
static inline bool __bch2_write_ref_tryget(struct bch_fs *c, enum bch_write_ref ref)
{
#ifdef BCH_WRITE_REF_DEBUG
return !test_bit(BCH_FS_going_ro, &c->flags) &&
atomic_long_inc_not_zero(&c->writes[ref]);
#else
return percpu_ref_tryget(&c->writes);
#endif
}
static inline bool bch2_write_ref_tryget(struct bch_fs *c, enum bch_write_ref ref) static inline bool bch2_write_ref_tryget(struct bch_fs *c, enum bch_write_ref ref)
{ {
#ifdef BCH_WRITE_REF_DEBUG #ifdef BCH_WRITE_REF_DEBUG
@ -1129,6 +1161,20 @@ static inline void bch2_write_ref_put(struct bch_fs *c, enum bch_write_ref ref)
#endif #endif
} }
static inline bool bch2_ro_ref_tryget(struct bch_fs *c)
{
if (test_bit(BCH_FS_stopping, &c->flags))
return false;
return refcount_inc_not_zero(&c->ro_ref);
}
static inline void bch2_ro_ref_put(struct bch_fs *c)
{
if (refcount_dec_and_test(&c->ro_ref))
wake_up(&c->ro_ref_wait);
}
static inline void bch2_set_ra_pages(struct bch_fs *c, unsigned ra_pages) static inline void bch2_set_ra_pages(struct bch_fs *c, unsigned ra_pages)
{ {
#ifndef NO_BCACHEFS_FS #ifndef NO_BCACHEFS_FS

View File

@ -2137,7 +2137,8 @@ static inline __u64 __bset_magic(struct bch_sb *sb)
x(clock, 7) \ x(clock, 7) \
x(dev_usage, 8) \ x(dev_usage, 8) \
x(log, 9) \ x(log, 9) \
x(overwrite, 10) x(overwrite, 10) \
x(write_buffer_keys, 11)
enum { enum {
#define x(f, nr) BCH_JSET_ENTRY_##f = nr, #define x(f, nr) BCH_JSET_ENTRY_##f = nr,
@ -2223,7 +2224,7 @@ static inline unsigned jset_entry_dev_usage_nr_types(struct jset_entry_dev_usage
struct jset_entry_log { struct jset_entry_log {
struct jset_entry entry; struct jset_entry entry;
u8 d[]; u8 d[];
} __packed; } __packed __aligned(8);
/* /*
* On disk format for a journal entry: * On disk format for a journal entry:

View File

@ -83,9 +83,8 @@ struct bch_ioctl_incremental {
#define BCH_IOCTL_DEV_USAGE_V2 _IOWR(0xbc, 18, struct bch_ioctl_dev_usage_v2) #define BCH_IOCTL_DEV_USAGE_V2 _IOWR(0xbc, 18, struct bch_ioctl_dev_usage_v2)
#define BCH_IOCTL_FSCK_OFFLINE _IOW(0xbc, 19, struct bch_ioctl_fsck_offline) #define BCH_IOCTL_FSCK_OFFLINE _IOW(0xbc, 19, struct bch_ioctl_fsck_offline)
#define BCH_IOCTL_FSCK_ONLINE _IOW(0xbc, 20, struct bch_ioctl_fsck_online)
#define BCH_IOCTL_FSCK_ONLINE _IOW(0xbc, 20, struct bch_ioctl_fsck_online)
/* ioctl below act on a particular file, not the filesystem as a whole: */ /* ioctl below act on a particular file, not the filesystem as a whole: */

View File

@ -1538,8 +1538,8 @@ static int bch2_gc_alloc_start(struct bch_fs *c, bool metadata_only)
rcu_assign_pointer(ca->buckets_gc, buckets); rcu_assign_pointer(ca->buckets_gc, buckets);
} }
ret = for_each_btree_key2(trans, iter, BTREE_ID_alloc, POS_MIN, ret = for_each_btree_key(trans, iter, BTREE_ID_alloc, POS_MIN,
BTREE_ITER_PREFETCH, k, ({ BTREE_ITER_PREFETCH, k, ({
ca = bch_dev_bkey_exists(c, k.k->p.inode); ca = bch_dev_bkey_exists(c, k.k->p.inode);
g = gc_bucket(ca, k.k->p.offset); g = gc_bucket(ca, k.k->p.offset);
@ -1665,7 +1665,6 @@ static int bch2_gc_reflink_done(struct bch_fs *c, bool metadata_only)
static int bch2_gc_reflink_start(struct bch_fs *c, static int bch2_gc_reflink_start(struct bch_fs *c,
bool metadata_only) bool metadata_only)
{ {
struct btree_trans *trans;
struct btree_iter iter; struct btree_iter iter;
struct bkey_s_c k; struct bkey_s_c k;
struct reflink_gc *r; struct reflink_gc *r;
@ -1674,30 +1673,30 @@ static int bch2_gc_reflink_start(struct bch_fs *c,
if (metadata_only) if (metadata_only)
return 0; return 0;
trans = bch2_trans_get(c);
c->reflink_gc_nr = 0; c->reflink_gc_nr = 0;
for_each_btree_key(trans, iter, BTREE_ID_reflink, POS_MIN, ret = bch2_trans_run(c,
BTREE_ITER_PREFETCH, k, ret) { for_each_btree_key(trans, iter, BTREE_ID_reflink, POS_MIN,
const __le64 *refcount = bkey_refcount_c(k); BTREE_ITER_PREFETCH, k, ({
const __le64 *refcount = bkey_refcount_c(k);
if (!refcount) if (!refcount)
continue; continue;
r = genradix_ptr_alloc(&c->reflink_gc_table, c->reflink_gc_nr++, r = genradix_ptr_alloc(&c->reflink_gc_table, c->reflink_gc_nr++,
GFP_KERNEL); GFP_KERNEL);
if (!r) { if (!r) {
ret = -BCH_ERR_ENOMEM_gc_reflink_start; ret = -BCH_ERR_ENOMEM_gc_reflink_start;
break; break;
} }
r->offset = k.k->p.offset; r->offset = k.k->p.offset;
r->size = k.k->size; r->size = k.k->size;
r->refcount = 0; r->refcount = 0;
} 0;
bch2_trans_iter_exit(trans, &iter); })));
bch2_trans_put(trans); bch_err_fn(c, ret);
return ret; return ret;
} }

View File

@ -968,12 +968,20 @@ int bch2_btree_node_read_done(struct bch_fs *c, struct bch_dev *ca,
struct bch_btree_ptr_v2 *bp = struct bch_btree_ptr_v2 *bp =
&bkey_i_to_btree_ptr_v2(&b->key)->v; &bkey_i_to_btree_ptr_v2(&b->key)->v;
bch2_bpos_to_text(&buf, b->data->min_key);
prt_str(&buf, "-");
bch2_bpos_to_text(&buf, b->data->max_key);
btree_err_on(b->data->keys.seq != bp->seq, btree_err_on(b->data->keys.seq != bp->seq,
-BCH_ERR_btree_node_read_err_must_retry, -BCH_ERR_btree_node_read_err_must_retry,
c, ca, b, NULL, c, ca, b, NULL,
btree_node_bad_seq, btree_node_bad_seq,
"got wrong btree node (seq %llx want %llx)", "got wrong btree node (want %llx got %llx)\n"
b->data->keys.seq, bp->seq); "got btree %s level %llu pos %s",
bp->seq, b->data->keys.seq,
bch2_btree_id_str(BTREE_NODE_ID(b->data)),
BTREE_NODE_LEVEL(b->data),
buf.buf);
} else { } else {
btree_err_on(!b->data->keys.seq, btree_err_on(!b->data->keys.seq,
-BCH_ERR_btree_node_read_err_must_retry, -BCH_ERR_btree_node_read_err_must_retry,
@ -2007,6 +2015,29 @@ do_write:
/* buffer must be a multiple of the block size */ /* buffer must be a multiple of the block size */
bytes = round_up(bytes, block_bytes(c)); bytes = round_up(bytes, block_bytes(c));
if (bytes > btree_bytes(c)) {
struct printbuf buf = PRINTBUF;
prt_printf(&buf, "btree node write bounce buffer overrun: %u > %zu\n",
bytes, btree_bytes(c));
prt_printf(&buf, "header: %zu\n", b->written
? sizeof(struct btree_node)
: sizeof(struct btree_node_entry));
prt_printf(&buf, "unwritten: %zu\n", b->whiteout_u64s * sizeof(u64));
for_each_bset(b, t) {
i = bset(b, t);
if (bset_written(b, i))
continue;
prt_printf(&buf, "bset %zu: %zu\n", t - b->set, le16_to_cpu(i->u64s) * sizeof(u64));
}
panic("%s", buf.buf);
printbuf_exit(&buf);
}
data = btree_bounce_alloc(c, bytes, &used_mempool); data = btree_bounce_alloc(c, bytes, &used_mempool);
if (!b->written) { if (!b->written) {

File diff suppressed because it is too large Load Diff

View File

@ -63,47 +63,57 @@ static inline void btree_trans_sort_paths(struct btree_trans *trans)
__bch2_btree_trans_sort_paths(trans); __bch2_btree_trans_sort_paths(trans);
} }
static inline struct btree_path * static inline unsigned long *trans_paths_nr(struct btree_path *paths)
__trans_next_path(struct btree_trans *trans, unsigned idx)
{ {
idx = find_next_bit(trans->paths_allocated, BTREE_ITER_MAX, idx); return &container_of(paths, struct btree_trans_paths, paths[0])->nr_paths;
if (idx == BTREE_ITER_MAX)
return NULL;
EBUG_ON(idx > BTREE_ITER_MAX);
EBUG_ON(trans->paths[idx].idx != idx);
return &trans->paths[idx];
} }
#define trans_for_each_path_from(_trans, _path, _start) \ static inline unsigned long *trans_paths_allocated(struct btree_path *paths)
for (_path = __trans_next_path((_trans), _start); \ {
(_path); \ unsigned long *v = trans_paths_nr(paths);
_path = __trans_next_path((_trans), (_path)->idx + 1)) return v - BITS_TO_LONGS(*v);
}
#define trans_for_each_path(_trans, _path) \ #define trans_for_each_path_idx_from(_paths_allocated, _nr, _idx, _start)\
trans_for_each_path_from(_trans, _path, 0) for (_idx = _start; \
(_idx = find_next_bit(_paths_allocated, _nr, _idx)) < _nr; \
_idx++)
static inline struct btree_path * static inline struct btree_path *
__trans_next_path_safe(struct btree_trans *trans, unsigned *idx) __trans_next_path(struct btree_trans *trans, unsigned *idx)
{ {
*idx = find_next_bit(trans->paths_allocated, BTREE_ITER_MAX, *idx); unsigned long *w = trans->paths_allocated + *idx / BITS_PER_LONG;
if (*idx == BTREE_ITER_MAX) /*
return NULL; * Open coded find_next_bit(), because
* - this is fast path, we can't afford the function call
* - and we know that nr_paths is a multiple of BITS_PER_LONG,
*/
while (*idx < trans->nr_paths) {
unsigned long v = *w >> (*idx & (BITS_PER_LONG - 1));
if (v) {
*idx += __ffs(v);
return trans->paths + *idx;
}
EBUG_ON(*idx > BTREE_ITER_MAX); *idx += BITS_PER_LONG;
return &trans->paths[*idx]; *idx &= ~(BITS_PER_LONG - 1);
w++;
}
return NULL;
} }
/* /*
* This version is intended to be safe for use on a btree_trans that is owned by * This version is intended to be safe for use on a btree_trans that is owned by
* another thread, for bch2_btree_trans_to_text(); * another thread, for bch2_btree_trans_to_text();
*/ */
#define trans_for_each_path_safe_from(_trans, _path, _idx, _start) \ #define trans_for_each_path_from(_trans, _path, _idx, _start) \
for (_idx = _start; \ for (_idx = _start; \
(_path = __trans_next_path_safe((_trans), &_idx)); \ (_path = __trans_next_path((_trans), &_idx)); \
_idx++) _idx++)
#define trans_for_each_path_safe(_trans, _path, _idx) \ #define trans_for_each_path(_trans, _path, _idx) \
trans_for_each_path_safe_from(_trans, _path, _idx, 0) trans_for_each_path_from(_trans, _path, _idx, 1)
static inline struct btree_path *next_btree_path(struct btree_trans *trans, struct btree_path *path) static inline struct btree_path *next_btree_path(struct btree_trans *trans, struct btree_path *path)
{ {
@ -125,10 +135,23 @@ static inline struct btree_path *prev_btree_path(struct btree_trans *trans, stru
: NULL; : NULL;
} }
#define trans_for_each_path_inorder(_trans, _path, _i) \ #define trans_for_each_path_idx_inorder(_trans, _iter) \
for (_i = 0; \ for (_iter = (struct trans_for_each_path_inorder_iter) { 0 }; \
((_path) = (_trans)->paths + trans->sorted[_i]), (_i) < (_trans)->nr_sorted;\ (_iter.path_idx = trans->sorted[_iter.sorted_idx], \
_i++) _iter.sorted_idx < (_trans)->nr_sorted); \
_iter.sorted_idx++)
struct trans_for_each_path_inorder_iter {
btree_path_idx_t sorted_idx;
btree_path_idx_t path_idx;
};
#define trans_for_each_path_inorder(_trans, _path, _iter) \
for (_iter = (struct trans_for_each_path_inorder_iter) { 0 }; \
(_iter.path_idx = trans->sorted[_iter.sorted_idx], \
_path = (_trans)->paths + _iter.path_idx, \
_iter.sorted_idx < (_trans)->nr_sorted); \
_iter.sorted_idx++)
#define trans_for_each_path_inorder_reverse(_trans, _path, _i) \ #define trans_for_each_path_inorder_reverse(_trans, _path, _i) \
for (_i = trans->nr_sorted - 1; \ for (_i = trans->nr_sorted - 1; \
@ -144,67 +167,65 @@ static inline bool __path_has_node(const struct btree_path *path,
static inline struct btree_path * static inline struct btree_path *
__trans_next_path_with_node(struct btree_trans *trans, struct btree *b, __trans_next_path_with_node(struct btree_trans *trans, struct btree *b,
unsigned idx) unsigned *idx)
{ {
struct btree_path *path = __trans_next_path(trans, idx); struct btree_path *path;
while (path && !__path_has_node(path, b)) while ((path = __trans_next_path(trans, idx)) &&
path = __trans_next_path(trans, path->idx + 1); !__path_has_node(path, b))
(*idx)++;
return path; return path;
} }
#define trans_for_each_path_with_node(_trans, _b, _path) \ #define trans_for_each_path_with_node(_trans, _b, _path, _iter) \
for (_path = __trans_next_path_with_node((_trans), (_b), 0); \ for (_iter = 1; \
(_path); \ (_path = __trans_next_path_with_node((_trans), (_b), &_iter));\
_path = __trans_next_path_with_node((_trans), (_b), \ _iter++)
(_path)->idx + 1))
struct btree_path *__bch2_btree_path_make_mut(struct btree_trans *, struct btree_path *, btree_path_idx_t __bch2_btree_path_make_mut(struct btree_trans *, btree_path_idx_t,
bool, unsigned long); bool, unsigned long);
static inline struct btree_path * __must_check static inline btree_path_idx_t __must_check
bch2_btree_path_make_mut(struct btree_trans *trans, bch2_btree_path_make_mut(struct btree_trans *trans,
struct btree_path *path, bool intent, btree_path_idx_t path, bool intent,
unsigned long ip) unsigned long ip)
{ {
if (path->ref > 1 || path->preserve) if (trans->paths[path].ref > 1 ||
trans->paths[path].preserve)
path = __bch2_btree_path_make_mut(trans, path, intent, ip); path = __bch2_btree_path_make_mut(trans, path, intent, ip);
path->should_be_locked = false; trans->paths[path].should_be_locked = false;
return path; return path;
} }
struct btree_path * __must_check btree_path_idx_t __must_check
__bch2_btree_path_set_pos(struct btree_trans *, struct btree_path *, __bch2_btree_path_set_pos(struct btree_trans *, btree_path_idx_t,
struct bpos, bool, unsigned long, int); struct bpos, bool, unsigned long);
static inline struct btree_path * __must_check static inline btree_path_idx_t __must_check
bch2_btree_path_set_pos(struct btree_trans *trans, bch2_btree_path_set_pos(struct btree_trans *trans,
struct btree_path *path, struct bpos new_pos, btree_path_idx_t path, struct bpos new_pos,
bool intent, unsigned long ip) bool intent, unsigned long ip)
{ {
int cmp = bpos_cmp(new_pos, path->pos); return !bpos_eq(new_pos, trans->paths[path].pos)
? __bch2_btree_path_set_pos(trans, path, new_pos, intent, ip)
return cmp
? __bch2_btree_path_set_pos(trans, path, new_pos, intent, ip, cmp)
: path; : path;
} }
int __must_check bch2_btree_path_traverse_one(struct btree_trans *, struct btree_path *, int __must_check bch2_btree_path_traverse_one(struct btree_trans *,
btree_path_idx_t,
unsigned, unsigned long); unsigned, unsigned long);
static inline int __must_check bch2_btree_path_traverse(struct btree_trans *trans, static inline int __must_check bch2_btree_path_traverse(struct btree_trans *trans,
struct btree_path *path, unsigned flags) btree_path_idx_t path, unsigned flags)
{ {
if (path->uptodate < BTREE_ITER_NEED_RELOCK) if (trans->paths[path].uptodate < BTREE_ITER_NEED_RELOCK)
return 0; return 0;
return bch2_btree_path_traverse_one(trans, path, flags, _RET_IP_); return bch2_btree_path_traverse_one(trans, path, flags, _RET_IP_);
} }
int __must_check bch2_btree_path_traverse(struct btree_trans *, btree_path_idx_t bch2_path_get(struct btree_trans *, enum btree_id, struct bpos,
struct btree_path *, unsigned);
struct btree_path *bch2_path_get(struct btree_trans *, enum btree_id, struct bpos,
unsigned, unsigned, unsigned, unsigned long); unsigned, unsigned, unsigned, unsigned long);
struct bkey_s_c bch2_btree_path_peek_slot(struct btree_path *, struct bkey *); struct bkey_s_c bch2_btree_path_peek_slot(struct btree_path *, struct bkey *);
@ -256,7 +277,7 @@ void bch2_btree_node_iter_fix(struct btree_trans *trans, struct btree_path *,
int bch2_btree_path_relock_intent(struct btree_trans *, struct btree_path *); int bch2_btree_path_relock_intent(struct btree_trans *, struct btree_path *);
void bch2_path_put(struct btree_trans *, struct btree_path *, bool); void bch2_path_put(struct btree_trans *, btree_path_idx_t, bool);
int bch2_trans_relock(struct btree_trans *); int bch2_trans_relock(struct btree_trans *);
int bch2_trans_relock_notrace(struct btree_trans *); int bch2_trans_relock_notrace(struct btree_trans *);
@ -322,7 +343,7 @@ static inline void bch2_btree_path_downgrade(struct btree_trans *trans,
void bch2_trans_downgrade(struct btree_trans *); void bch2_trans_downgrade(struct btree_trans *);
void bch2_trans_node_add(struct btree_trans *trans, struct btree *); void bch2_trans_node_add(struct btree_trans *trans, struct btree_path *, struct btree *);
void bch2_trans_node_reinit_iter(struct btree_trans *, struct btree *); void bch2_trans_node_reinit_iter(struct btree_trans *, struct btree *);
int __must_check __bch2_btree_iter_traverse(struct btree_iter *iter); int __must_check __bch2_btree_iter_traverse(struct btree_iter *iter);
@ -361,10 +382,12 @@ static inline void __bch2_btree_iter_set_pos(struct btree_iter *iter, struct bpo
static inline void bch2_btree_iter_set_pos(struct btree_iter *iter, struct bpos new_pos) static inline void bch2_btree_iter_set_pos(struct btree_iter *iter, struct bpos new_pos)
{ {
struct btree_trans *trans = iter->trans;
if (unlikely(iter->update_path)) if (unlikely(iter->update_path))
bch2_path_put(iter->trans, iter->update_path, bch2_path_put(trans, iter->update_path,
iter->flags & BTREE_ITER_INTENT); iter->flags & BTREE_ITER_INTENT);
iter->update_path = NULL; iter->update_path = 0;
if (!(iter->flags & BTREE_ITER_ALL_SNAPSHOTS)) if (!(iter->flags & BTREE_ITER_ALL_SNAPSHOTS))
new_pos.snapshot = iter->snapshot; new_pos.snapshot = iter->snapshot;
@ -433,8 +456,8 @@ static inline void bch2_trans_iter_init_common(struct btree_trans *trans,
unsigned long ip) unsigned long ip)
{ {
iter->trans = trans; iter->trans = trans;
iter->update_path = NULL; iter->update_path = 0;
iter->key_cache_path = NULL; iter->key_cache_path = 0;
iter->btree_id = btree_id; iter->btree_id = btree_id;
iter->min_depth = 0; iter->min_depth = 0;
iter->flags = flags; iter->flags = flags;
@ -473,8 +496,10 @@ void bch2_trans_copy_iter(struct btree_iter *, struct btree_iter *);
static inline void set_btree_iter_dontneed(struct btree_iter *iter) static inline void set_btree_iter_dontneed(struct btree_iter *iter)
{ {
if (!iter->trans->restarted) struct btree_trans *trans = iter->trans;
iter->path->preserve = false;
if (!trans->restarted)
btree_iter_path(trans, iter)->preserve = false;
} }
void *__bch2_trans_kmalloc(struct btree_trans *, size_t); void *__bch2_trans_kmalloc(struct btree_trans *, size_t);
@ -496,7 +521,7 @@ static inline void *bch2_trans_kmalloc(struct btree_trans *trans, size_t size)
static inline void *bch2_trans_kmalloc_nomemzero(struct btree_trans *trans, size_t size) static inline void *bch2_trans_kmalloc_nomemzero(struct btree_trans *trans, size_t size)
{ {
size = roundup(size, 8); size = round_up(size, 8);
if (likely(trans->mem_top + size <= trans->mem_bytes)) { if (likely(trans->mem_top + size <= trans->mem_bytes)) {
void *p = trans->mem + trans->mem_top; void *p = trans->mem + trans->mem_top;
@ -565,7 +590,6 @@ static inline int __bch2_bkey_get_val_typed(struct btree_trans *trans,
KEY_TYPE_##_type, sizeof(*_val), _val) KEY_TYPE_##_type, sizeof(*_val), _val)
void bch2_trans_srcu_unlock(struct btree_trans *); void bch2_trans_srcu_unlock(struct btree_trans *);
void bch2_trans_srcu_lock(struct btree_trans *);
u32 bch2_trans_begin(struct btree_trans *); u32 bch2_trans_begin(struct btree_trans *);
@ -618,7 +642,7 @@ int __bch2_btree_trans_too_many_iters(struct btree_trans *);
static inline int btree_trans_too_many_iters(struct btree_trans *trans) static inline int btree_trans_too_many_iters(struct btree_trans *trans)
{ {
if (bitmap_weight(trans->paths_allocated, BTREE_ITER_MAX) > BTREE_ITER_MAX - 8) if (bitmap_weight(trans->paths_allocated, trans->nr_paths) > BTREE_ITER_MAX - 8)
return __bch2_btree_trans_too_many_iters(trans); return __bch2_btree_trans_too_many_iters(trans);
return 0; return 0;
@ -656,19 +680,24 @@ __bch2_btree_iter_peek_upto_and_restart(struct btree_trans *trans,
return k; return k;
} }
/*
* goto instead of loop, so that when used inside for_each_btree_key2()
* break/continue work correctly
*/
#define lockrestart_do(_trans, _do) \ #define lockrestart_do(_trans, _do) \
({ \ ({ \
__label__ transaction_restart; \
u32 _restart_count; \ u32 _restart_count; \
int _ret2; \ int _ret2; \
transaction_restart: \
_restart_count = bch2_trans_begin(_trans); \
_ret2 = (_do); \
\ \
do { \ if (bch2_err_matches(_ret2, BCH_ERR_transaction_restart)) \
_restart_count = bch2_trans_begin(_trans); \ goto transaction_restart; \
_ret2 = (_do); \
} while (bch2_err_matches(_ret2, BCH_ERR_transaction_restart)); \
\ \
if (!_ret2) \ if (!_ret2) \
bch2_trans_verify_not_restarted(_trans, _restart_count);\ bch2_trans_verify_not_restarted(_trans, _restart_count);\
\
_ret2; \ _ret2; \
}) })
@ -697,65 +726,33 @@ __bch2_btree_iter_peek_upto_and_restart(struct btree_trans *trans,
_ret2 ?: trans_was_restarted(_trans, _restart_count); \ _ret2 ?: trans_was_restarted(_trans, _restart_count); \
}) })
#define for_each_btree_key2(_trans, _iter, _btree_id, \ #define for_each_btree_key2_upto(_trans, _iter, _btree_id, \
_start, _flags, _k, _do) \ _start, _end, _flags, _k, _do) \
({ \ ({ \
int _ret3 = 0; \ int _ret3 = 0; \
\ \
bch2_trans_iter_init((_trans), &(_iter), (_btree_id), \ bch2_trans_iter_init((_trans), &(_iter), (_btree_id), \
(_start), (_flags)); \ (_start), (_flags)); \
\ \
while (1) { \ do { \
u32 _restart_count = bch2_trans_begin(_trans); \ _ret3 = lockrestart_do(_trans, ({ \
(_k) = bch2_btree_iter_peek_upto_type(&(_iter), \
_end, (_flags)); \
if (!(_k).k) \
break; \
\ \
_ret3 = 0; \ bkey_err(_k) ?: (_do); \
(_k) = bch2_btree_iter_peek_type(&(_iter), (_flags)); \ })); \
if (!(_k).k) \ } while (!_ret3 && bch2_btree_iter_advance(&(_iter))); \
break; \
\
_ret3 = bkey_err(_k) ?: (_do); \
if (bch2_err_matches(_ret3, BCH_ERR_transaction_restart))\
continue; \
if (_ret3) \
break; \
bch2_trans_verify_not_restarted(_trans, _restart_count);\
if (!bch2_btree_iter_advance(&(_iter))) \
break; \
} \
\ \
bch2_trans_iter_exit((_trans), &(_iter)); \ bch2_trans_iter_exit((_trans), &(_iter)); \
_ret3; \ _ret3; \
}) })
#define for_each_btree_key2_upto(_trans, _iter, _btree_id, \ #define for_each_btree_key(_trans, _iter, _btree_id, \
_start, _end, _flags, _k, _do) \ _start, _flags, _k, _do) \
({ \ for_each_btree_key2_upto(_trans, _iter, _btree_id, _start, \
int _ret3 = 0; \ SPOS_MAX, _flags, _k, _do)
\
bch2_trans_iter_init((_trans), &(_iter), (_btree_id), \
(_start), (_flags)); \
\
while (1) { \
u32 _restart_count = bch2_trans_begin(_trans); \
\
_ret3 = 0; \
(_k) = bch2_btree_iter_peek_upto_type(&(_iter), _end, (_flags));\
if (!(_k).k) \
break; \
\
_ret3 = bkey_err(_k) ?: (_do); \
if (bch2_err_matches(_ret3, BCH_ERR_transaction_restart))\
continue; \
if (_ret3) \
break; \
bch2_trans_verify_not_restarted(_trans, _restart_count);\
if (!bch2_btree_iter_advance(&(_iter))) \
break; \
} \
\
bch2_trans_iter_exit((_trans), &(_iter)); \
_ret3; \
})
#define for_each_btree_key_reverse(_trans, _iter, _btree_id, \ #define for_each_btree_key_reverse(_trans, _iter, _btree_id, \
_start, _flags, _k, _do) \ _start, _flags, _k, _do) \
@ -765,23 +762,16 @@ __bch2_btree_iter_peek_upto_and_restart(struct btree_trans *trans,
bch2_trans_iter_init((_trans), &(_iter), (_btree_id), \ bch2_trans_iter_init((_trans), &(_iter), (_btree_id), \
(_start), (_flags)); \ (_start), (_flags)); \
\ \
while (1) { \ do { \
u32 _restart_count = bch2_trans_begin(_trans); \ _ret3 = lockrestart_do(_trans, ({ \
(_k) = bch2_btree_iter_peek_prev_type(&(_iter), (_flags));\ (_k) = bch2_btree_iter_peek_prev_type(&(_iter), \
if (!(_k).k) { \ (_flags)); \
_ret3 = 0; \ if (!(_k).k) \
break; \ break; \
} \
\ \
_ret3 = bkey_err(_k) ?: (_do); \ bkey_err(_k) ?: (_do); \
if (bch2_err_matches(_ret3, BCH_ERR_transaction_restart))\ })); \
continue; \ } while (!_ret3 && bch2_btree_iter_rewind(&(_iter))); \
if (_ret3) \
break; \
bch2_trans_verify_not_restarted(_trans, _restart_count);\
if (!bch2_btree_iter_rewind(&(_iter))) \
break; \
} \
\ \
bch2_trans_iter_exit((_trans), &(_iter)); \ bch2_trans_iter_exit((_trans), &(_iter)); \
_ret3; \ _ret3; \
@ -791,7 +781,7 @@ __bch2_btree_iter_peek_upto_and_restart(struct btree_trans *trans,
_start, _iter_flags, _k, \ _start, _iter_flags, _k, \
_disk_res, _journal_seq, _commit_flags,\ _disk_res, _journal_seq, _commit_flags,\
_do) \ _do) \
for_each_btree_key2(_trans, _iter, _btree_id, _start, _iter_flags, _k,\ for_each_btree_key(_trans, _iter, _btree_id, _start, _iter_flags, _k,\
(_do) ?: bch2_trans_commit(_trans, (_disk_res),\ (_do) ?: bch2_trans_commit(_trans, (_disk_res),\
(_journal_seq), (_commit_flags))) (_journal_seq), (_commit_flags)))
@ -811,7 +801,7 @@ __bch2_btree_iter_peek_upto_and_restart(struct btree_trans *trans,
(_do) ?: bch2_trans_commit(_trans, (_disk_res),\ (_do) ?: bch2_trans_commit(_trans, (_disk_res),\
(_journal_seq), (_commit_flags))) (_journal_seq), (_commit_flags)))
#define for_each_btree_key(_trans, _iter, _btree_id, \ #define for_each_btree_key_old(_trans, _iter, _btree_id, \
_start, _flags, _k, _ret) \ _start, _flags, _k, _ret) \
for (bch2_trans_iter_init((_trans), &(_iter), (_btree_id), \ for (bch2_trans_iter_init((_trans), &(_iter), (_btree_id), \
(_start), (_flags)); \ (_start), (_flags)); \
@ -896,7 +886,6 @@ __bch2_btree_iter_peek_upto_and_restart(struct btree_trans *trans,
/* new multiple iterator interface: */ /* new multiple iterator interface: */
void bch2_trans_updates_to_text(struct printbuf *, struct btree_trans *); void bch2_trans_updates_to_text(struct printbuf *, struct btree_trans *);
void bch2_btree_path_to_text(struct printbuf *, struct btree_path *);
void bch2_trans_paths_to_text(struct printbuf *, struct btree_trans *); void bch2_trans_paths_to_text(struct printbuf *, struct btree_trans *);
void bch2_dump_trans_updates(struct btree_trans *); void bch2_dump_trans_updates(struct btree_trans *);
void bch2_dump_trans_paths_updates(struct btree_trans *); void bch2_dump_trans_paths_updates(struct btree_trans *);
@ -919,6 +908,7 @@ unsigned bch2_trans_get_fn_idx(const char *);
void bch2_btree_trans_to_text(struct printbuf *, struct btree_trans *); void bch2_btree_trans_to_text(struct printbuf *, struct btree_trans *);
void bch2_fs_btree_iter_exit(struct bch_fs *); void bch2_fs_btree_iter_exit(struct bch_fs *);
void bch2_fs_btree_iter_init_early(struct bch_fs *);
int bch2_fs_btree_iter_init(struct bch_fs *); int bch2_fs_btree_iter_init(struct bch_fs *);
#endif /* _BCACHEFS_BTREE_ITER_H */ #endif /* _BCACHEFS_BTREE_ITER_H */

View File

@ -630,7 +630,7 @@ static int btree_key_cache_flush_pos(struct btree_trans *trans,
if (ret) if (ret)
goto out; goto out;
ck = (void *) c_iter.path->l[0].b; ck = (void *) btree_iter_path(trans, &c_iter)->l[0].b;
if (!ck) if (!ck)
goto out; goto out;
@ -678,7 +678,8 @@ static int btree_key_cache_flush_pos(struct btree_trans *trans,
bch2_journal_pin_drop(j, &ck->journal); bch2_journal_pin_drop(j, &ck->journal);
BUG_ON(!btree_node_locked(c_iter.path, 0)); struct btree_path *path = btree_iter_path(trans, &c_iter);
BUG_ON(!btree_node_locked(path, 0));
if (!evict) { if (!evict) {
if (test_bit(BKEY_CACHED_DIRTY, &ck->flags)) { if (test_bit(BKEY_CACHED_DIRTY, &ck->flags)) {
@ -687,19 +688,20 @@ static int btree_key_cache_flush_pos(struct btree_trans *trans,
} }
} else { } else {
struct btree_path *path2; struct btree_path *path2;
unsigned i;
evict: evict:
trans_for_each_path(trans, path2) trans_for_each_path(trans, path2, i)
if (path2 != c_iter.path) if (path2 != path)
__bch2_btree_path_unlock(trans, path2); __bch2_btree_path_unlock(trans, path2);
bch2_btree_node_lock_write_nofail(trans, c_iter.path, &ck->c); bch2_btree_node_lock_write_nofail(trans, path, &ck->c);
if (test_bit(BKEY_CACHED_DIRTY, &ck->flags)) { if (test_bit(BKEY_CACHED_DIRTY, &ck->flags)) {
clear_bit(BKEY_CACHED_DIRTY, &ck->flags); clear_bit(BKEY_CACHED_DIRTY, &ck->flags);
atomic_long_dec(&c->btree_key_cache.nr_dirty); atomic_long_dec(&c->btree_key_cache.nr_dirty);
} }
mark_btree_node_locked_noreset(c_iter.path, 0, BTREE_NODE_UNLOCKED); mark_btree_node_locked_noreset(path, 0, BTREE_NODE_UNLOCKED);
bkey_cached_evict(&c->btree_key_cache, ck); bkey_cached_evict(&c->btree_key_cache, ck);
bkey_cached_free_fast(&c->btree_key_cache, ck); bkey_cached_free_fast(&c->btree_key_cache, ck);
} }
@ -747,28 +749,12 @@ unlock:
return ret; return ret;
} }
/*
* Flush and evict a key from the key cache:
*/
int bch2_btree_key_cache_flush(struct btree_trans *trans,
enum btree_id id, struct bpos pos)
{
struct bch_fs *c = trans->c;
struct bkey_cached_key key = { id, pos };
/* Fastpath - assume it won't be found: */
if (!bch2_btree_key_cache_find(c, id, pos))
return 0;
return btree_key_cache_flush_pos(trans, key, 0, 0, true);
}
bool bch2_btree_insert_key_cached(struct btree_trans *trans, bool bch2_btree_insert_key_cached(struct btree_trans *trans,
unsigned flags, unsigned flags,
struct btree_insert_entry *insert_entry) struct btree_insert_entry *insert_entry)
{ {
struct bch_fs *c = trans->c; struct bch_fs *c = trans->c;
struct bkey_cached *ck = (void *) insert_entry->path->l[0].b; struct bkey_cached *ck = (void *) (trans->paths + insert_entry->path)->l[0].b;
struct bkey_i *insert = insert_entry->k; struct bkey_i *insert = insert_entry->k;
bool kick_reclaim = false; bool kick_reclaim = false;

View File

@ -31,8 +31,6 @@ int bch2_btree_path_traverse_cached(struct btree_trans *, struct btree_path *,
bool bch2_btree_insert_key_cached(struct btree_trans *, unsigned, bool bch2_btree_insert_key_cached(struct btree_trans *, unsigned,
struct btree_insert_entry *); struct btree_insert_entry *);
int bch2_btree_key_cache_flush(struct btree_trans *,
enum btree_id, struct bpos);
void bch2_btree_key_cache_drop(struct btree_trans *, void bch2_btree_key_cache_drop(struct btree_trans *,
struct btree_path *); struct btree_path *);

View File

@ -32,13 +32,14 @@ struct six_lock_count bch2_btree_node_lock_counts(struct btree_trans *trans,
{ {
struct btree_path *path; struct btree_path *path;
struct six_lock_count ret; struct six_lock_count ret;
unsigned i;
memset(&ret, 0, sizeof(ret)); memset(&ret, 0, sizeof(ret));
if (IS_ERR_OR_NULL(b)) if (IS_ERR_OR_NULL(b))
return ret; return ret;
trans_for_each_path(trans, path) trans_for_each_path(trans, path, i)
if (path != skip && &path->l[level].b->c == b) { if (path != skip && &path->l[level].b->c == b) {
int t = btree_node_locked_type(path, level); int t = btree_node_locked_type(path, level);
@ -94,9 +95,10 @@ static noinline void print_chain(struct printbuf *out, struct lock_graph *g)
struct trans_waiting_for_lock *i; struct trans_waiting_for_lock *i;
for (i = g->g; i != g->g + g->nr; i++) { for (i = g->g; i != g->g + g->nr; i++) {
struct task_struct *task = i->trans->locking_wait.task;
if (i != g->g) if (i != g->g)
prt_str(out, "<- "); prt_str(out, "<- ");
prt_printf(out, "%u ", i->trans->locking_wait.task->pid); prt_printf(out, "%u ", task ?task->pid : 0);
} }
prt_newline(out); prt_newline(out);
} }
@ -280,9 +282,8 @@ int bch2_check_for_deadlock(struct btree_trans *trans, struct printbuf *cycle)
struct lock_graph g; struct lock_graph g;
struct trans_waiting_for_lock *top; struct trans_waiting_for_lock *top;
struct btree_bkey_cached_common *b; struct btree_bkey_cached_common *b;
struct btree_path *path; btree_path_idx_t path_idx;
unsigned path_idx; int ret = 0;
int ret;
g.nr = 0; g.nr = 0;
@ -295,13 +296,26 @@ int bch2_check_for_deadlock(struct btree_trans *trans, struct printbuf *cycle)
} }
lock_graph_down(&g, trans); lock_graph_down(&g, trans);
/* trans->paths is rcu protected vs. freeing */
rcu_read_lock();
if (cycle)
cycle->atomic++;
next: next:
if (!g.nr) if (!g.nr)
return 0; goto out;
top = &g.g[g.nr - 1]; top = &g.g[g.nr - 1];
trans_for_each_path_safe_from(top->trans, path, path_idx, top->path_idx) { struct btree_path *paths = rcu_dereference(top->trans->paths);
if (!paths)
goto up;
unsigned long *paths_allocated = trans_paths_allocated(paths);
trans_for_each_path_idx_from(paths_allocated, *trans_paths_nr(paths),
path_idx, top->path_idx) {
struct btree_path *path = paths + path_idx;
if (!path->nodes_locked) if (!path->nodes_locked)
continue; continue;
@ -367,18 +381,23 @@ next:
ret = lock_graph_descend(&g, trans, cycle); ret = lock_graph_descend(&g, trans, cycle);
if (ret) if (ret)
return ret; goto out;
goto next; goto next;
} }
raw_spin_unlock(&b->lock.wait_lock); raw_spin_unlock(&b->lock.wait_lock);
} }
} }
up:
if (g.nr > 1 && cycle) if (g.nr > 1 && cycle)
print_chain(cycle, &g); print_chain(cycle, &g);
lock_graph_up(&g); lock_graph_up(&g);
goto next; goto next;
out:
if (cycle)
--cycle->atomic;
rcu_read_unlock();
return ret;
} }
int bch2_six_check_for_deadlock(struct six_lock *lock, void *p) int bch2_six_check_for_deadlock(struct six_lock *lock, void *p)
@ -417,7 +436,7 @@ void bch2_btree_node_lock_write_nofail(struct btree_trans *trans,
struct btree_bkey_cached_common *b) struct btree_bkey_cached_common *b)
{ {
struct btree_path *linked; struct btree_path *linked;
unsigned i; unsigned i, iter;
int ret; int ret;
/* /*
@ -431,7 +450,7 @@ void bch2_btree_node_lock_write_nofail(struct btree_trans *trans,
* already taken are no longer needed: * already taken are no longer needed:
*/ */
trans_for_each_path(trans, linked) { trans_for_each_path(trans, linked, iter) {
if (!linked->nodes_locked) if (!linked->nodes_locked)
continue; continue;
@ -643,8 +662,6 @@ bool __bch2_btree_path_upgrade(struct btree_trans *trans,
unsigned new_locks_want, unsigned new_locks_want,
struct get_locks_fail *f) struct get_locks_fail *f)
{ {
struct btree_path *linked;
if (bch2_btree_path_upgrade_noupgrade_sibs(trans, path, new_locks_want, f)) if (bch2_btree_path_upgrade_noupgrade_sibs(trans, path, new_locks_want, f))
return true; return true;
@ -667,8 +684,11 @@ bool __bch2_btree_path_upgrade(struct btree_trans *trans,
* before interior nodes - now that's handled by * before interior nodes - now that's handled by
* bch2_btree_path_traverse_all(). * bch2_btree_path_traverse_all().
*/ */
if (!path->cached && !trans->in_traverse_all) if (!path->cached && !trans->in_traverse_all) {
trans_for_each_path(trans, linked) struct btree_path *linked;
unsigned i;
trans_for_each_path(trans, linked, i)
if (linked != path && if (linked != path &&
linked->cached == path->cached && linked->cached == path->cached &&
linked->btree_id == path->btree_id && linked->btree_id == path->btree_id &&
@ -676,6 +696,7 @@ bool __bch2_btree_path_upgrade(struct btree_trans *trans,
linked->locks_want = new_locks_want; linked->locks_want = new_locks_want;
btree_path_get_locks(trans, linked, true, NULL); btree_path_get_locks(trans, linked, true, NULL);
} }
}
return false; return false;
} }
@ -708,7 +729,6 @@ void __bch2_btree_path_downgrade(struct btree_trans *trans,
bch2_btree_path_verify_locks(path); bch2_btree_path_verify_locks(path);
path->downgrade_seq++;
trace_path_downgrade(trans, _RET_IP_, path, old_locks_want); trace_path_downgrade(trans, _RET_IP_, path, old_locks_want);
} }
@ -717,22 +737,24 @@ void __bch2_btree_path_downgrade(struct btree_trans *trans,
void bch2_trans_downgrade(struct btree_trans *trans) void bch2_trans_downgrade(struct btree_trans *trans)
{ {
struct btree_path *path; struct btree_path *path;
unsigned i;
if (trans->restarted) if (trans->restarted)
return; return;
trans_for_each_path(trans, path) trans_for_each_path(trans, path, i)
bch2_btree_path_downgrade(trans, path); bch2_btree_path_downgrade(trans, path);
} }
int bch2_trans_relock(struct btree_trans *trans) int bch2_trans_relock(struct btree_trans *trans)
{ {
struct btree_path *path; struct btree_path *path;
unsigned i;
if (unlikely(trans->restarted)) if (unlikely(trans->restarted))
return -((int) trans->restarted); return -((int) trans->restarted);
trans_for_each_path(trans, path) trans_for_each_path(trans, path, i)
if (path->should_be_locked && if (path->should_be_locked &&
!bch2_btree_path_relock_norestart(trans, path, _RET_IP_)) { !bch2_btree_path_relock_norestart(trans, path, _RET_IP_)) {
trace_and_count(trans->c, trans_restart_relock, trans, _RET_IP_, path); trace_and_count(trans->c, trans_restart_relock, trans, _RET_IP_, path);
@ -744,11 +766,12 @@ int bch2_trans_relock(struct btree_trans *trans)
int bch2_trans_relock_notrace(struct btree_trans *trans) int bch2_trans_relock_notrace(struct btree_trans *trans)
{ {
struct btree_path *path; struct btree_path *path;
unsigned i;
if (unlikely(trans->restarted)) if (unlikely(trans->restarted))
return -((int) trans->restarted); return -((int) trans->restarted);
trans_for_each_path(trans, path) trans_for_each_path(trans, path, i)
if (path->should_be_locked && if (path->should_be_locked &&
!bch2_btree_path_relock_norestart(trans, path, _RET_IP_)) { !bch2_btree_path_relock_norestart(trans, path, _RET_IP_)) {
return btree_trans_restart(trans, BCH_ERR_transaction_restart_relock); return btree_trans_restart(trans, BCH_ERR_transaction_restart_relock);
@ -759,16 +782,18 @@ int bch2_trans_relock_notrace(struct btree_trans *trans)
void bch2_trans_unlock_noassert(struct btree_trans *trans) void bch2_trans_unlock_noassert(struct btree_trans *trans)
{ {
struct btree_path *path; struct btree_path *path;
unsigned i;
trans_for_each_path(trans, path) trans_for_each_path(trans, path, i)
__bch2_btree_path_unlock(trans, path); __bch2_btree_path_unlock(trans, path);
} }
void bch2_trans_unlock(struct btree_trans *trans) void bch2_trans_unlock(struct btree_trans *trans)
{ {
struct btree_path *path; struct btree_path *path;
unsigned i;
trans_for_each_path(trans, path) trans_for_each_path(trans, path, i)
__bch2_btree_path_unlock(trans, path); __bch2_btree_path_unlock(trans, path);
} }
@ -781,8 +806,9 @@ void bch2_trans_unlock_long(struct btree_trans *trans)
bool bch2_trans_locked(struct btree_trans *trans) bool bch2_trans_locked(struct btree_trans *trans)
{ {
struct btree_path *path; struct btree_path *path;
unsigned i;
trans_for_each_path(trans, path) trans_for_each_path(trans, path, i)
if (path->nodes_locked) if (path->nodes_locked)
return true; return true;
return false; return false;
@ -828,8 +854,9 @@ void bch2_btree_path_verify_locks(struct btree_path *path)
void bch2_trans_verify_locks(struct btree_trans *trans) void bch2_trans_verify_locks(struct btree_trans *trans)
{ {
struct btree_path *path; struct btree_path *path;
unsigned i;
trans_for_each_path(trans, path) trans_for_each_path(trans, path, i)
bch2_btree_path_verify_locks(path); bch2_btree_path_verify_locks(path);
} }

View File

@ -175,6 +175,7 @@ bch2_btree_node_unlock_write_inlined(struct btree_trans *trans, struct btree_pat
struct btree *b) struct btree *b)
{ {
struct btree_path *linked; struct btree_path *linked;
unsigned i;
EBUG_ON(path->l[b->c.level].b != b); EBUG_ON(path->l[b->c.level].b != b);
EBUG_ON(path->l[b->c.level].lock_seq != six_lock_seq(&b->c.lock)); EBUG_ON(path->l[b->c.level].lock_seq != six_lock_seq(&b->c.lock));
@ -182,7 +183,7 @@ bch2_btree_node_unlock_write_inlined(struct btree_trans *trans, struct btree_pat
mark_btree_node_locked_noreset(path, b->c.level, BTREE_NODE_INTENT_LOCKED); mark_btree_node_locked_noreset(path, b->c.level, BTREE_NODE_INTENT_LOCKED);
trans_for_each_path_with_node(trans, b, linked) trans_for_each_path_with_node(trans, b, linked, i)
linked->l[b->c.level].lock_seq++; linked->l[b->c.level].lock_seq++;
six_unlock_write(&b->c.lock); six_unlock_write(&b->c.lock);
@ -242,8 +243,9 @@ static inline bool btree_node_lock_increment(struct btree_trans *trans,
enum btree_node_locked_type want) enum btree_node_locked_type want)
{ {
struct btree_path *path; struct btree_path *path;
unsigned i;
trans_for_each_path(trans, path) trans_for_each_path(trans, path, i)
if (&path->l[level].b->c == b && if (&path->l[level].b->c == b &&
btree_node_locked_type(path, level) >= want) { btree_node_locked_type(path, level) >= want) {
six_lock_increment(&b->lock, (enum six_lock_type) want); six_lock_increment(&b->lock, (enum six_lock_type) want);
@ -263,7 +265,6 @@ static inline int btree_node_lock(struct btree_trans *trans,
int ret = 0; int ret = 0;
EBUG_ON(level >= BTREE_MAX_DEPTH); EBUG_ON(level >= BTREE_MAX_DEPTH);
EBUG_ON(!test_bit(path->idx, trans->paths_allocated));
if (likely(six_trylock_type(&b->lock, type)) || if (likely(six_trylock_type(&b->lock, type)) ||
btree_node_lock_increment(trans, b, level, (enum btree_node_locked_type) type) || btree_node_lock_increment(trans, b, level, (enum btree_node_locked_type) type) ||

View File

@ -23,7 +23,7 @@ static void verify_update_old_key(struct btree_trans *trans, struct btree_insert
#ifdef CONFIG_BCACHEFS_DEBUG #ifdef CONFIG_BCACHEFS_DEBUG
struct bch_fs *c = trans->c; struct bch_fs *c = trans->c;
struct bkey u; struct bkey u;
struct bkey_s_c k = bch2_btree_path_peek_slot_exact(i->path, &u); struct bkey_s_c k = bch2_btree_path_peek_slot_exact(trans->paths + i->path, &u);
if (unlikely(trans->journal_replay_not_finished)) { if (unlikely(trans->journal_replay_not_finished)) {
struct bkey_i *j_k = struct bkey_i *j_k =
@ -41,23 +41,23 @@ static void verify_update_old_key(struct btree_trans *trans, struct btree_insert
#endif #endif
} }
static inline struct btree_path_level *insert_l(struct btree_insert_entry *i) static inline struct btree_path_level *insert_l(struct btree_trans *trans, struct btree_insert_entry *i)
{ {
return i->path->l + i->level; return (trans->paths + i->path)->l + i->level;
} }
static inline bool same_leaf_as_prev(struct btree_trans *trans, static inline bool same_leaf_as_prev(struct btree_trans *trans,
struct btree_insert_entry *i) struct btree_insert_entry *i)
{ {
return i != trans->updates && return i != trans->updates &&
insert_l(&i[0])->b == insert_l(&i[-1])->b; insert_l(trans, &i[0])->b == insert_l(trans, &i[-1])->b;
} }
static inline bool same_leaf_as_next(struct btree_trans *trans, static inline bool same_leaf_as_next(struct btree_trans *trans,
struct btree_insert_entry *i) struct btree_insert_entry *i)
{ {
return i + 1 < trans->updates + trans->nr_updates && return i + 1 < trans->updates + trans->nr_updates &&
insert_l(&i[0])->b == insert_l(&i[1])->b; insert_l(trans, &i[0])->b == insert_l(trans, &i[1])->b;
} }
inline void bch2_btree_node_prep_for_write(struct btree_trans *trans, inline void bch2_btree_node_prep_for_write(struct btree_trans *trans,
@ -84,7 +84,7 @@ static noinline int trans_lock_write_fail(struct btree_trans *trans, struct btre
if (same_leaf_as_prev(trans, i)) if (same_leaf_as_prev(trans, i))
continue; continue;
bch2_btree_node_unlock_write(trans, i->path, insert_l(i)->b); bch2_btree_node_unlock_write(trans, trans->paths + i->path, insert_l(trans, i)->b);
} }
trace_and_count(trans->c, trans_restart_would_deadlock_write, trans); trace_and_count(trans->c, trans_restart_would_deadlock_write, trans);
@ -101,11 +101,11 @@ static inline int bch2_trans_lock_write(struct btree_trans *trans)
if (same_leaf_as_prev(trans, i)) if (same_leaf_as_prev(trans, i))
continue; continue;
if (bch2_btree_node_lock_write(trans, i->path, &insert_l(i)->b->c)) if (bch2_btree_node_lock_write(trans, trans->paths + i->path, &insert_l(trans, i)->b->c))
return trans_lock_write_fail(trans, i); return trans_lock_write_fail(trans, i);
if (!i->cached) if (!i->cached)
bch2_btree_node_prep_for_write(trans, i->path, insert_l(i)->b); bch2_btree_node_prep_for_write(trans, trans->paths + i->path, insert_l(trans, i)->b);
} }
trans->write_locked = true; trans->write_locked = true;
@ -119,8 +119,8 @@ static inline void bch2_trans_unlock_write(struct btree_trans *trans)
trans_for_each_update(trans, i) trans_for_each_update(trans, i)
if (!same_leaf_as_prev(trans, i)) if (!same_leaf_as_prev(trans, i))
bch2_btree_node_unlock_write_inlined(trans, i->path, bch2_btree_node_unlock_write_inlined(trans,
insert_l(i)->b); trans->paths + i->path, insert_l(trans, i)->b);
trans->write_locked = false; trans->write_locked = false;
} }
} }
@ -311,10 +311,12 @@ inline void bch2_btree_insert_key_leaf(struct btree_trans *trans,
static inline void btree_insert_entry_checks(struct btree_trans *trans, static inline void btree_insert_entry_checks(struct btree_trans *trans,
struct btree_insert_entry *i) struct btree_insert_entry *i)
{ {
BUG_ON(!bpos_eq(i->k->k.p, i->path->pos)); struct btree_path *path = trans->paths + i->path;
BUG_ON(i->cached != i->path->cached);
BUG_ON(i->level != i->path->level); BUG_ON(!bpos_eq(i->k->k.p, path->pos));
BUG_ON(i->btree_id != i->path->btree_id); BUG_ON(i->cached != path->cached);
BUG_ON(i->level != path->level);
BUG_ON(i->btree_id != path->btree_id);
EBUG_ON(!i->level && EBUG_ON(!i->level &&
btree_type_has_snapshots(i->btree_id) && btree_type_has_snapshots(i->btree_id) &&
!(i->flags & BTREE_UPDATE_INTERNAL_SNAPSHOT_NODE) && !(i->flags & BTREE_UPDATE_INTERNAL_SNAPSHOT_NODE) &&
@ -459,11 +461,9 @@ static int run_one_mem_trigger(struct btree_trans *trans,
old, bkey_i_to_s_c(new), old, bkey_i_to_s_c(new),
BTREE_TRIGGER_INSERT|BTREE_TRIGGER_OVERWRITE|flags); BTREE_TRIGGER_INSERT|BTREE_TRIGGER_OVERWRITE|flags);
} else { } else {
struct bkey _deleted = KEY(0, 0, 0); struct bkey _deleted = POS_KEY((trans->paths + i->path)->pos);
struct bkey_s_c deleted = (struct bkey_s_c) { &_deleted, NULL }; struct bkey_s_c deleted = (struct bkey_s_c) { &_deleted, NULL };
_deleted.p = i->path->pos;
ret = bch2_mark_key(trans, i->btree_id, i->level, ret = bch2_mark_key(trans, i->btree_id, i->level,
deleted, bkey_i_to_s_c(new), deleted, bkey_i_to_s_c(new),
BTREE_TRIGGER_INSERT|flags) ?: BTREE_TRIGGER_INSERT|flags) ?:
@ -607,7 +607,7 @@ static noinline int bch2_trans_commit_run_gc_triggers(struct btree_trans *trans)
*/ */
BUG_ON(i->cached || i->level); BUG_ON(i->cached || i->level);
if (gc_visited(c, gc_pos_btree_node(insert_l(i)->b))) { if (gc_visited(c, gc_pos_btree_node(insert_l(trans, i)->b))) {
ret = run_one_mem_trigger(trans, i, i->flags|BTREE_TRIGGER_GC); ret = run_one_mem_trigger(trans, i, i->flags|BTREE_TRIGGER_GC);
if (ret) if (ret)
break; break;
@ -624,7 +624,6 @@ bch2_trans_commit_write_locked(struct btree_trans *trans, unsigned flags,
{ {
struct bch_fs *c = trans->c; struct bch_fs *c = trans->c;
struct btree_insert_entry *i; struct btree_insert_entry *i;
struct btree_write_buffered_key *wb;
struct btree_trans_commit_hook *h; struct btree_trans_commit_hook *h;
unsigned u64s = 0; unsigned u64s = 0;
int ret; int ret;
@ -649,8 +648,8 @@ bch2_trans_commit_write_locked(struct btree_trans *trans, unsigned flags,
u64s += i->k->k.u64s; u64s += i->k->k.u64s;
ret = !i->cached ret = !i->cached
? btree_key_can_insert(trans, insert_l(i)->b, u64s) ? btree_key_can_insert(trans, insert_l(trans, i)->b, u64s)
: btree_key_can_insert_cached(trans, flags, i->path, u64s); : btree_key_can_insert_cached(trans, flags, trans->paths + i->path, u64s);
if (ret) { if (ret) {
*stopped_at = i; *stopped_at = i;
return ret; return ret;
@ -659,10 +658,6 @@ bch2_trans_commit_write_locked(struct btree_trans *trans, unsigned flags,
i->k->k.needs_whiteout = false; i->k->k.needs_whiteout = false;
} }
if (trans->nr_wb_updates &&
trans->nr_wb_updates + c->btree_write_buffer.state.nr > c->btree_write_buffer.size)
return -BCH_ERR_btree_insert_need_flush_buffer;
/* /*
* Don't get journal reservation until after we know insert will * Don't get journal reservation until after we know insert will
* succeed: * succeed:
@ -697,14 +692,6 @@ bch2_trans_commit_write_locked(struct btree_trans *trans, unsigned flags,
bch2_trans_fs_usage_apply(trans, trans->fs_usage_deltas)) bch2_trans_fs_usage_apply(trans, trans->fs_usage_deltas))
return -BCH_ERR_btree_insert_need_mark_replicas; return -BCH_ERR_btree_insert_need_mark_replicas;
if (trans->nr_wb_updates) {
EBUG_ON(flags & BCH_TRANS_COMMIT_no_journal_res);
ret = bch2_btree_insert_keys_write_buffer(trans);
if (ret)
goto revert_fs_usage;
}
h = trans->hooks; h = trans->hooks;
while (h) { while (h) {
ret = h->fn(trans, h); ret = h->fn(trans, h);
@ -726,15 +713,6 @@ bch2_trans_commit_write_locked(struct btree_trans *trans, unsigned flags,
goto fatal_err; goto fatal_err;
} }
if (unlikely(trans->extra_journal_entries.nr)) {
memcpy_u64s_small(journal_res_entry(&c->journal, &trans->journal_res),
trans->extra_journal_entries.data,
trans->extra_journal_entries.nr);
trans->journal_res.offset += trans->extra_journal_entries.nr;
trans->journal_res.u64s -= trans->extra_journal_entries.nr;
}
if (likely(!(flags & BCH_TRANS_COMMIT_no_journal_res))) { if (likely(!(flags & BCH_TRANS_COMMIT_no_journal_res))) {
struct journal *j = &c->journal; struct journal *j = &c->journal;
struct jset_entry *entry; struct jset_entry *entry;
@ -764,26 +742,27 @@ bch2_trans_commit_write_locked(struct btree_trans *trans, unsigned flags,
bkey_copy((struct bkey_i *) entry->start, i->k); bkey_copy((struct bkey_i *) entry->start, i->k);
} }
trans_for_each_wb_update(trans, wb) { memcpy_u64s_small(journal_res_entry(&c->journal, &trans->journal_res),
entry = bch2_journal_add_entry(j, &trans->journal_res, trans->journal_entries,
BCH_JSET_ENTRY_btree_keys, trans->journal_entries_u64s);
wb->btree, 0,
wb->k.k.u64s); trans->journal_res.offset += trans->journal_entries_u64s;
bkey_copy((struct bkey_i *) entry->start, &wb->k); trans->journal_res.u64s -= trans->journal_entries_u64s;
}
if (trans->journal_seq) if (trans->journal_seq)
*trans->journal_seq = trans->journal_res.seq; *trans->journal_seq = trans->journal_res.seq;
} }
trans_for_each_update(trans, i) { trans_for_each_update(trans, i) {
struct btree_path *path = trans->paths + i->path;
if (!i->cached) { if (!i->cached) {
bch2_btree_insert_key_leaf(trans, i->path, i->k, trans->journal_res.seq); bch2_btree_insert_key_leaf(trans, path, i->k, trans->journal_res.seq);
} else if (!i->key_cache_already_flushed) } else if (!i->key_cache_already_flushed)
bch2_btree_insert_key_cached(trans, flags, i); bch2_btree_insert_key_cached(trans, flags, i);
else { else {
bch2_btree_key_cache_drop(trans, i->path); bch2_btree_key_cache_drop(trans, path);
btree_path_set_dirty(i->path, BTREE_ITER_NEED_TRAVERSE); btree_path_set_dirty(path, BTREE_ITER_NEED_TRAVERSE);
} }
} }
@ -799,13 +778,9 @@ revert_fs_usage:
static noinline void bch2_drop_overwrites_from_journal(struct btree_trans *trans) static noinline void bch2_drop_overwrites_from_journal(struct btree_trans *trans)
{ {
struct btree_insert_entry *i; struct btree_insert_entry *i;
struct btree_write_buffered_key *wb;
trans_for_each_update(trans, i) trans_for_each_update(trans, i)
bch2_journal_key_overwritten(trans->c, i->btree_id, i->level, i->k->k.p); bch2_journal_key_overwritten(trans->c, i->btree_id, i->level, i->k->k.p);
trans_for_each_wb_update(trans, wb)
bch2_journal_key_overwritten(trans->c, wb->btree, 0, wb->k.k.p);
} }
static noinline int bch2_trans_commit_bkey_invalid(struct btree_trans *trans, static noinline int bch2_trans_commit_bkey_invalid(struct btree_trans *trans,
@ -916,7 +891,8 @@ int bch2_trans_commit_error(struct btree_trans *trans, unsigned flags,
case -BCH_ERR_btree_insert_btree_node_full: case -BCH_ERR_btree_insert_btree_node_full:
ret = bch2_btree_split_leaf(trans, i->path, flags); ret = bch2_btree_split_leaf(trans, i->path, flags);
if (bch2_err_matches(ret, BCH_ERR_transaction_restart)) if (bch2_err_matches(ret, BCH_ERR_transaction_restart))
trace_and_count(c, trans_restart_btree_node_split, trans, trace_ip, i->path); trace_and_count(c, trans_restart_btree_node_split, trans,
trace_ip, trans->paths + i->path);
break; break;
case -BCH_ERR_btree_insert_need_mark_replicas: case -BCH_ERR_btree_insert_need_mark_replicas:
ret = drop_locks_do(trans, ret = drop_locks_do(trans,
@ -950,30 +926,6 @@ int bch2_trans_commit_error(struct btree_trans *trans, unsigned flags,
ret = bch2_trans_relock(trans); ret = bch2_trans_relock(trans);
break; break;
case -BCH_ERR_btree_insert_need_flush_buffer: {
struct btree_write_buffer *wb = &c->btree_write_buffer;
ret = 0;
if (wb->state.nr > wb->size * 3 / 4) {
bch2_trans_unlock(trans);
mutex_lock(&wb->flush_lock);
if (wb->state.nr > wb->size * 3 / 4) {
bch2_trans_begin(trans);
ret = bch2_btree_write_buffer_flush_locked(trans);
mutex_unlock(&wb->flush_lock);
if (!ret) {
trace_and_count(c, trans_restart_write_buffer_flush, trans, _THIS_IP_);
ret = btree_trans_restart(trans, BCH_ERR_transaction_restart_write_buffer_flush);
}
} else {
mutex_unlock(&wb->flush_lock);
ret = bch2_trans_relock(trans);
}
}
break;
}
default: default:
BUG_ON(ret >= 0); BUG_ON(ret >= 0);
break; break;
@ -1031,12 +983,10 @@ int __bch2_trans_commit(struct btree_trans *trans, unsigned flags)
{ {
struct bch_fs *c = trans->c; struct bch_fs *c = trans->c;
struct btree_insert_entry *i = NULL; struct btree_insert_entry *i = NULL;
struct btree_write_buffered_key *wb;
int ret = 0; int ret = 0;
if (!trans->nr_updates && if (!trans->nr_updates &&
!trans->nr_wb_updates && !trans->journal_entries_u64s)
!trans->extra_journal_entries.nr)
goto out_reset; goto out_reset;
ret = bch2_trans_commit_run_triggers(trans); ret = bch2_trans_commit_run_triggers(trans);
@ -1072,35 +1022,23 @@ int __bch2_trans_commit(struct btree_trans *trans, unsigned flags)
goto out_reset; goto out_reset;
} }
if (c->btree_write_buffer.state.nr > c->btree_write_buffer.size / 2 &&
mutex_trylock(&c->btree_write_buffer.flush_lock)) {
bch2_trans_begin(trans);
bch2_trans_unlock(trans);
ret = bch2_btree_write_buffer_flush_locked(trans);
mutex_unlock(&c->btree_write_buffer.flush_lock);
if (!ret) {
trace_and_count(c, trans_restart_write_buffer_flush, trans, _THIS_IP_);
ret = btree_trans_restart(trans, BCH_ERR_transaction_restart_write_buffer_flush);
}
goto out;
}
EBUG_ON(test_bit(BCH_FS_clean_shutdown, &c->flags)); EBUG_ON(test_bit(BCH_FS_clean_shutdown, &c->flags));
trans->journal_u64s = trans->extra_journal_entries.nr; trans->journal_u64s = trans->journal_entries_u64s;
trans->journal_transaction_names = READ_ONCE(c->opts.journal_transaction_names); trans->journal_transaction_names = READ_ONCE(c->opts.journal_transaction_names);
if (trans->journal_transaction_names) if (trans->journal_transaction_names)
trans->journal_u64s += jset_u64s(JSET_ENTRY_LOG_U64s); trans->journal_u64s += jset_u64s(JSET_ENTRY_LOG_U64s);
trans_for_each_update(trans, i) { trans_for_each_update(trans, i) {
EBUG_ON(!i->path->should_be_locked); struct btree_path *path = trans->paths + i->path;
ret = bch2_btree_path_upgrade(trans, i->path, i->level + 1); EBUG_ON(!path->should_be_locked);
ret = bch2_btree_path_upgrade(trans, path, i->level + 1);
if (unlikely(ret)) if (unlikely(ret))
goto out; goto out;
EBUG_ON(!btree_node_intent_locked(i->path, i->level)); EBUG_ON(!btree_node_intent_locked(path, i->level));
if (i->key_cache_already_flushed) if (i->key_cache_already_flushed)
continue; continue;
@ -1116,12 +1054,9 @@ int __bch2_trans_commit(struct btree_trans *trans, unsigned flags)
trans->journal_u64s += jset_u64s(i->old_k.u64s); trans->journal_u64s += jset_u64s(i->old_k.u64s);
} }
trans_for_each_wb_update(trans, wb) if (trans->extra_disk_res) {
trans->journal_u64s += jset_u64s(wb->k.k.u64s);
if (trans->extra_journal_res) {
ret = bch2_disk_reservation_add(c, trans->disk_res, ret = bch2_disk_reservation_add(c, trans->disk_res,
trans->extra_journal_res, trans->extra_disk_res,
(flags & BCH_TRANS_COMMIT_no_enospc) (flags & BCH_TRANS_COMMIT_no_enospc)
? BCH_DISK_RESERVATION_NOFAIL : 0); ? BCH_DISK_RESERVATION_NOFAIL : 0);
if (ret) if (ret)

View File

@ -222,13 +222,12 @@ enum btree_path_uptodate {
#define TRACK_PATH_ALLOCATED #define TRACK_PATH_ALLOCATED
#endif #endif
typedef u16 btree_path_idx_t;
struct btree_path { struct btree_path {
u8 idx; btree_path_idx_t sorted_idx;
u8 sorted_idx;
u8 ref; u8 ref;
u8 intent_ref; u8 intent_ref;
u32 alloc_seq;
u32 downgrade_seq;
/* btree_iter_copy starts here: */ /* btree_iter_copy starts here: */
struct bpos pos; struct bpos pos;
@ -282,9 +281,9 @@ static inline unsigned long btree_path_ip_allocated(struct btree_path *path)
*/ */
struct btree_iter { struct btree_iter {
struct btree_trans *trans; struct btree_trans *trans;
struct btree_path *path; btree_path_idx_t path;
struct btree_path *update_path; btree_path_idx_t update_path;
struct btree_path *key_cache_path; btree_path_idx_t key_cache_path;
enum btree_id btree_id:8; enum btree_id btree_id:8;
u8 min_depth; u8 min_depth;
@ -351,8 +350,8 @@ struct btree_insert_entry {
* to the size of the key being overwritten in the btree: * to the size of the key being overwritten in the btree:
*/ */
u8 old_btree_u64s; u8 old_btree_u64s;
btree_path_idx_t path;
struct bkey_i *k; struct bkey_i *k;
struct btree_path *path;
/* key being overwritten: */ /* key being overwritten: */
struct bkey old_k; struct bkey old_k;
const struct bch_val *old_v; const struct bch_val *old_v;
@ -373,25 +372,30 @@ struct btree_trans_commit_hook {
#define BTREE_TRANS_MAX_LOCK_HOLD_TIME_NS 10000 #define BTREE_TRANS_MAX_LOCK_HOLD_TIME_NS 10000
struct btree_trans_paths {
unsigned long nr_paths;
struct btree_path paths[];
};
struct btree_trans { struct btree_trans {
struct bch_fs *c; struct bch_fs *c;
const char *fn;
struct closure ref;
struct list_head list;
u64 last_begin_time;
u8 lock_may_not_fail; unsigned long *paths_allocated;
u8 lock_must_abort; struct btree_path *paths;
struct btree_bkey_cached_common *locking; u8 *sorted;
struct six_lock_waiter locking_wait; struct btree_insert_entry *updates;
int srcu_idx; void *mem;
unsigned mem_top;
unsigned mem_bytes;
btree_path_idx_t nr_sorted;
btree_path_idx_t nr_paths;
btree_path_idx_t nr_paths_max;
u8 fn_idx; u8 fn_idx;
u8 nr_sorted;
u8 nr_updates; u8 nr_updates;
u8 nr_wb_updates; u8 lock_must_abort;
u8 wb_updates_size; bool lock_may_not_fail:1;
bool srcu_held:1; bool srcu_held:1;
bool used_mempool:1; bool used_mempool:1;
bool in_traverse_all:1; bool in_traverse_all:1;
@ -403,41 +407,56 @@ struct btree_trans {
bool write_locked:1; bool write_locked:1;
enum bch_errcode restarted:16; enum bch_errcode restarted:16;
u32 restart_count; u32 restart_count;
u64 last_begin_time;
unsigned long last_begin_ip; unsigned long last_begin_ip;
unsigned long last_restarted_ip; unsigned long last_restarted_ip;
unsigned long srcu_lock_time; unsigned long srcu_lock_time;
/* const char *fn;
* For when bch2_trans_update notices we'll be splitting a compressed struct btree_bkey_cached_common *locking;
* extent: struct six_lock_waiter locking_wait;
*/ int srcu_idx;
unsigned extra_journal_res;
unsigned nr_max_paths;
unsigned long paths_allocated[BITS_TO_LONGS(BTREE_ITER_MAX)];
unsigned mem_top;
unsigned mem_max;
unsigned mem_bytes;
void *mem;
u8 sorted[BTREE_ITER_MAX + 8];
struct btree_path paths[BTREE_ITER_MAX];
struct btree_insert_entry updates[BTREE_ITER_MAX];
struct btree_write_buffered_key *wb_updates;
/* update path: */ /* update path: */
u16 journal_entries_u64s;
u16 journal_entries_size;
struct jset_entry *journal_entries;
struct btree_trans_commit_hook *hooks; struct btree_trans_commit_hook *hooks;
darray_u64 extra_journal_entries;
struct journal_entry_pin *journal_pin; struct journal_entry_pin *journal_pin;
struct journal_res journal_res; struct journal_res journal_res;
u64 *journal_seq; u64 *journal_seq;
struct disk_reservation *disk_res; struct disk_reservation *disk_res;
unsigned journal_u64s; unsigned journal_u64s;
unsigned extra_disk_res; /* XXX kill */
struct replicas_delta_list *fs_usage_deltas; struct replicas_delta_list *fs_usage_deltas;
/* Entries before this are zeroed out on every bch2_trans_get() call */
struct list_head list;
struct closure ref;
unsigned long _paths_allocated[BITS_TO_LONGS(BTREE_ITER_MAX)];
struct btree_trans_paths trans_paths;
struct btree_path _paths[BTREE_ITER_MAX];
u8 _sorted[BTREE_ITER_MAX + 8];
struct btree_insert_entry _updates[BTREE_ITER_MAX];
}; };
static inline struct btree_path *btree_iter_path(struct btree_trans *trans, struct btree_iter *iter)
{
return trans->paths + iter->path;
}
static inline struct btree_path *btree_iter_key_cache_path(struct btree_trans *trans, struct btree_iter *iter)
{
return iter->key_cache_path
? trans->paths + iter->key_cache_path
: NULL;
}
#define BCH_BTREE_WRITE_TYPES() \ #define BCH_BTREE_WRITE_TYPES() \
x(initial, 0) \ x(initial, 0) \
x(init_next_bset, 1) \ x(init_next_bset, 1) \

View File

@ -24,7 +24,7 @@ static inline int btree_insert_entry_cmp(const struct btree_insert_entry *l,
} }
static int __must_check static int __must_check
bch2_trans_update_by_path(struct btree_trans *, struct btree_path *, bch2_trans_update_by_path(struct btree_trans *, btree_path_idx_t,
struct bkey_i *, enum btree_update_flags, struct bkey_i *, enum btree_update_flags,
unsigned long ip); unsigned long ip);
@ -198,7 +198,7 @@ int bch2_trans_update_extent_overwrite(struct btree_trans *trans,
if (((front_split && back_split) || if (((front_split && back_split) ||
((front_split || back_split) && old.k->p.snapshot != new.k->p.snapshot)) && ((front_split || back_split) && old.k->p.snapshot != new.k->p.snapshot)) &&
(compressed_sectors = bch2_bkey_sectors_compressed(old))) (compressed_sectors = bch2_bkey_sectors_compressed(old)))
trans->extra_journal_res += compressed_sectors; trans->extra_disk_res += compressed_sectors;
if (front_split) { if (front_split) {
update = bch2_bkey_make_mut_noupdate(trans, old); update = bch2_bkey_make_mut_noupdate(trans, old);
@ -338,21 +338,22 @@ err:
} }
static noinline int flush_new_cached_update(struct btree_trans *trans, static noinline int flush_new_cached_update(struct btree_trans *trans,
struct btree_path *path,
struct btree_insert_entry *i, struct btree_insert_entry *i,
enum btree_update_flags flags, enum btree_update_flags flags,
unsigned long ip) unsigned long ip)
{ {
struct btree_path *btree_path;
struct bkey k; struct bkey k;
int ret; int ret;
btree_path = bch2_path_get(trans, path->btree_id, path->pos, 1, 0, btree_path_idx_t path_idx =
BTREE_ITER_INTENT, _THIS_IP_); bch2_path_get(trans, i->btree_id, i->old_k.p, 1, 0,
ret = bch2_btree_path_traverse(trans, btree_path, 0); BTREE_ITER_INTENT, _THIS_IP_);
ret = bch2_btree_path_traverse(trans, path_idx, 0);
if (ret) if (ret)
goto out; goto out;
struct btree_path *btree_path = trans->paths + path_idx;
/* /*
* The old key in the insert entry might actually refer to an existing * The old key in the insert entry might actually refer to an existing
* key in the btree that has been deleted from cache and not yet * key in the btree that has been deleted from cache and not yet
@ -367,14 +368,14 @@ static noinline int flush_new_cached_update(struct btree_trans *trans,
i->flags |= BTREE_TRIGGER_NORUN; i->flags |= BTREE_TRIGGER_NORUN;
btree_path_set_should_be_locked(btree_path); btree_path_set_should_be_locked(btree_path);
ret = bch2_trans_update_by_path(trans, btree_path, i->k, flags, ip); ret = bch2_trans_update_by_path(trans, path_idx, i->k, flags, ip);
out: out:
bch2_path_put(trans, btree_path, true); bch2_path_put(trans, path_idx, true);
return ret; return ret;
} }
static int __must_check static int __must_check
bch2_trans_update_by_path(struct btree_trans *trans, struct btree_path *path, bch2_trans_update_by_path(struct btree_trans *trans, btree_path_idx_t path_idx,
struct bkey_i *k, enum btree_update_flags flags, struct bkey_i *k, enum btree_update_flags flags,
unsigned long ip) unsigned long ip)
{ {
@ -382,8 +383,9 @@ bch2_trans_update_by_path(struct btree_trans *trans, struct btree_path *path,
struct btree_insert_entry *i, n; struct btree_insert_entry *i, n;
int cmp; int cmp;
struct btree_path *path = trans->paths + path_idx;
EBUG_ON(!path->should_be_locked); EBUG_ON(!path->should_be_locked);
EBUG_ON(trans->nr_updates >= BTREE_ITER_MAX); EBUG_ON(trans->nr_updates >= trans->nr_paths);
EBUG_ON(!bpos_eq(k->k.p, path->pos)); EBUG_ON(!bpos_eq(k->k.p, path->pos));
n = (struct btree_insert_entry) { n = (struct btree_insert_entry) {
@ -392,7 +394,7 @@ bch2_trans_update_by_path(struct btree_trans *trans, struct btree_path *path,
.btree_id = path->btree_id, .btree_id = path->btree_id,
.level = path->level, .level = path->level,
.cached = path->cached, .cached = path->cached,
.path = path, .path = path_idx,
.k = k, .k = k,
.ip_allocated = ip, .ip_allocated = ip,
}; };
@ -440,7 +442,7 @@ bch2_trans_update_by_path(struct btree_trans *trans, struct btree_path *path,
} }
} }
__btree_path_get(i->path, true); __btree_path_get(trans->paths + i->path, true);
/* /*
* If a key is present in the key cache, it must also exist in the * If a key is present in the key cache, it must also exist in the
@ -450,7 +452,7 @@ bch2_trans_update_by_path(struct btree_trans *trans, struct btree_path *path,
* work: * work:
*/ */
if (path->cached && bkey_deleted(&i->old_k)) if (path->cached && bkey_deleted(&i->old_k))
return flush_new_cached_update(trans, path, i, flags, ip); return flush_new_cached_update(trans, i, flags, ip);
return 0; return 0;
} }
@ -459,9 +461,11 @@ static noinline int bch2_trans_update_get_key_cache(struct btree_trans *trans,
struct btree_iter *iter, struct btree_iter *iter,
struct btree_path *path) struct btree_path *path)
{ {
if (!iter->key_cache_path || struct btree_path *key_cache_path = btree_iter_key_cache_path(trans, iter);
!iter->key_cache_path->should_be_locked ||
!bpos_eq(iter->key_cache_path->pos, iter->pos)) { if (!key_cache_path ||
!key_cache_path->should_be_locked ||
!bpos_eq(key_cache_path->pos, iter->pos)) {
struct bkey_cached *ck; struct bkey_cached *ck;
int ret; int ret;
@ -476,19 +480,18 @@ static noinline int bch2_trans_update_get_key_cache(struct btree_trans *trans,
iter->flags & BTREE_ITER_INTENT, iter->flags & BTREE_ITER_INTENT,
_THIS_IP_); _THIS_IP_);
ret = bch2_btree_path_traverse(trans, iter->key_cache_path, ret = bch2_btree_path_traverse(trans, iter->key_cache_path, BTREE_ITER_CACHED);
BTREE_ITER_CACHED);
if (unlikely(ret)) if (unlikely(ret))
return ret; return ret;
ck = (void *) iter->key_cache_path->l[0].b; ck = (void *) trans->paths[iter->key_cache_path].l[0].b;
if (test_bit(BKEY_CACHED_DIRTY, &ck->flags)) { if (test_bit(BKEY_CACHED_DIRTY, &ck->flags)) {
trace_and_count(trans->c, trans_restart_key_cache_raced, trans, _RET_IP_); trace_and_count(trans->c, trans_restart_key_cache_raced, trans, _RET_IP_);
return btree_trans_restart(trans, BCH_ERR_transaction_restart_key_cache_raced); return btree_trans_restart(trans, BCH_ERR_transaction_restart_key_cache_raced);
} }
btree_path_set_should_be_locked(iter->key_cache_path); btree_path_set_should_be_locked(trans->paths + iter->key_cache_path);
} }
return 0; return 0;
@ -497,7 +500,7 @@ static noinline int bch2_trans_update_get_key_cache(struct btree_trans *trans,
int __must_check bch2_trans_update(struct btree_trans *trans, struct btree_iter *iter, int __must_check bch2_trans_update(struct btree_trans *trans, struct btree_iter *iter,
struct bkey_i *k, enum btree_update_flags flags) struct bkey_i *k, enum btree_update_flags flags)
{ {
struct btree_path *path = iter->update_path ?: iter->path; btree_path_idx_t path_idx = iter->update_path ?: iter->path;
int ret; int ret;
if (iter->flags & BTREE_ITER_IS_EXTENTS) if (iter->flags & BTREE_ITER_IS_EXTENTS)
@ -517,6 +520,7 @@ int __must_check bch2_trans_update(struct btree_trans *trans, struct btree_iter
/* /*
* Ensure that updates to cached btrees go to the key cache: * Ensure that updates to cached btrees go to the key cache:
*/ */
struct btree_path *path = trans->paths + path_idx;
if (!(flags & BTREE_UPDATE_KEY_CACHE_RECLAIM) && if (!(flags & BTREE_UPDATE_KEY_CACHE_RECLAIM) &&
!path->cached && !path->cached &&
!path->level && !path->level &&
@ -525,15 +529,15 @@ int __must_check bch2_trans_update(struct btree_trans *trans, struct btree_iter
if (ret) if (ret)
return ret; return ret;
path = iter->key_cache_path; path_idx = iter->key_cache_path;
} }
return bch2_trans_update_by_path(trans, path, k, flags, _RET_IP_); return bch2_trans_update_by_path(trans, path_idx, k, flags, _RET_IP_);
} }
static noinline int bch2_btree_insert_clone_trans(struct btree_trans *trans, int bch2_btree_insert_clone_trans(struct btree_trans *trans,
enum btree_id btree, enum btree_id btree,
struct bkey_i *k) struct bkey_i *k)
{ {
struct bkey_i *n = bch2_trans_kmalloc(trans, bkey_bytes(&k->k)); struct bkey_i *n = bch2_trans_kmalloc(trans, bkey_bytes(&k->k));
int ret = PTR_ERR_OR_ZERO(n); int ret = PTR_ERR_OR_ZERO(n);
@ -544,60 +548,32 @@ static noinline int bch2_btree_insert_clone_trans(struct btree_trans *trans,
return bch2_btree_insert_trans(trans, btree, n, 0); return bch2_btree_insert_trans(trans, btree, n, 0);
} }
int __must_check bch2_trans_update_buffered(struct btree_trans *trans, struct jset_entry *__bch2_trans_jset_entry_alloc(struct btree_trans *trans, unsigned u64s)
enum btree_id btree,
struct bkey_i *k)
{ {
struct btree_write_buffered_key *i; unsigned new_top = trans->journal_entries_u64s + u64s;
int ret; unsigned old_size = trans->journal_entries_size;
EBUG_ON(trans->nr_wb_updates > trans->wb_updates_size); if (new_top > trans->journal_entries_size) {
EBUG_ON(k->k.u64s > BTREE_WRITE_BUFERED_U64s_MAX); trans->journal_entries_size = roundup_pow_of_two(new_top);
if (unlikely(trans->journal_replay_not_finished)) struct btree_transaction_stats *s = btree_trans_stats(trans);
return bch2_btree_insert_clone_trans(trans, btree, k); if (s)
s->journal_entries_size = trans->journal_entries_size;
trans_for_each_wb_update(trans, i) {
if (i->btree == btree && bpos_eq(i->k.k.p, k->k.p)) {
bkey_copy(&i->k, k);
return 0;
}
} }
if (!trans->wb_updates || struct jset_entry *n =
trans->nr_wb_updates == trans->wb_updates_size) { bch2_trans_kmalloc_nomemzero(trans,
struct btree_write_buffered_key *u; trans->journal_entries_size * sizeof(u64));
if (IS_ERR(n))
return ERR_CAST(n);
if (trans->nr_wb_updates == trans->wb_updates_size) { if (trans->journal_entries)
struct btree_transaction_stats *s = btree_trans_stats(trans); memcpy(n, trans->journal_entries, old_size * sizeof(u64));
trans->journal_entries = n;
BUG_ON(trans->wb_updates_size > U8_MAX / 2); struct jset_entry *e = btree_trans_journal_entries_top(trans);
trans->wb_updates_size = max(1, trans->wb_updates_size * 2); trans->journal_entries_u64s = new_top;
if (s) return e;
s->wb_updates_size = trans->wb_updates_size;
}
u = bch2_trans_kmalloc_nomemzero(trans,
trans->wb_updates_size *
sizeof(struct btree_write_buffered_key));
ret = PTR_ERR_OR_ZERO(u);
if (ret)
return ret;
if (trans->nr_wb_updates)
memcpy(u, trans->wb_updates, trans->nr_wb_updates *
sizeof(struct btree_write_buffered_key));
trans->wb_updates = u;
}
trans->wb_updates[trans->nr_wb_updates] = (struct btree_write_buffered_key) {
.btree = btree,
};
bkey_copy(&trans->wb_updates[trans->nr_wb_updates].k, k);
trans->nr_wb_updates++;
return 0;
} }
int bch2_bkey_get_empty_slot(struct btree_trans *trans, struct btree_iter *iter, int bch2_bkey_get_empty_slot(struct btree_trans *trans, struct btree_iter *iter,
@ -822,41 +798,17 @@ int bch2_btree_bit_mod(struct btree_trans *trans, enum btree_id btree,
return bch2_trans_update_buffered(trans, btree, &k); return bch2_trans_update_buffered(trans, btree, &k);
} }
__printf(2, 0) static int __bch2_trans_log_msg(struct btree_trans *trans, struct printbuf *buf, unsigned u64s)
static int __bch2_trans_log_msg(darray_u64 *entries, const char *fmt, va_list args)
{ {
struct printbuf buf = PRINTBUF; struct jset_entry *e = bch2_trans_jset_entry_alloc(trans, jset_u64s(u64s));
struct jset_entry_log *l; int ret = PTR_ERR_OR_ZERO(e);
unsigned u64s;
int ret;
prt_vprintf(&buf, fmt, args);
ret = buf.allocation_failure ? -BCH_ERR_ENOMEM_trans_log_msg : 0;
if (ret) if (ret)
goto err; return ret;
u64s = DIV_ROUND_UP(buf.pos, sizeof(u64)); struct jset_entry_log *l = container_of(e, struct jset_entry_log, entry);
journal_entry_init(e, BCH_JSET_ENTRY_log, 0, 1, u64s);
ret = darray_make_room(entries, jset_u64s(u64s)); memcpy(l->d, buf->buf, buf->pos);
if (ret) return 0;
goto err;
l = (void *) &darray_top(*entries);
l->entry.u64s = cpu_to_le16(u64s);
l->entry.btree_id = 0;
l->entry.level = 1;
l->entry.type = BCH_JSET_ENTRY_log;
l->entry.pad[0] = 0;
l->entry.pad[1] = 0;
l->entry.pad[2] = 0;
memcpy(l->d, buf.buf, buf.pos);
while (buf.pos & 7)
l->d[buf.pos++] = '\0';
entries->nr += jset_u64s(u64s);
err:
printbuf_exit(&buf);
return ret;
} }
__printf(3, 0) __printf(3, 0)
@ -864,16 +816,32 @@ static int
__bch2_fs_log_msg(struct bch_fs *c, unsigned commit_flags, const char *fmt, __bch2_fs_log_msg(struct bch_fs *c, unsigned commit_flags, const char *fmt,
va_list args) va_list args)
{ {
int ret; struct printbuf buf = PRINTBUF;
prt_vprintf(&buf, fmt, args);
unsigned u64s = DIV_ROUND_UP(buf.pos, sizeof(u64));
prt_chars(&buf, '\0', u64s * sizeof(u64) - buf.pos);
int ret = buf.allocation_failure ? -BCH_ERR_ENOMEM_trans_log_msg : 0;
if (ret)
goto err;
if (!test_bit(JOURNAL_STARTED, &c->journal.flags)) { if (!test_bit(JOURNAL_STARTED, &c->journal.flags)) {
ret = __bch2_trans_log_msg(&c->journal.early_journal_entries, fmt, args); ret = darray_make_room(&c->journal.early_journal_entries, jset_u64s(u64s));
if (ret)
goto err;
struct jset_entry_log *l = (void *) &darray_top(c->journal.early_journal_entries);
journal_entry_init(&l->entry, BCH_JSET_ENTRY_log, 0, 1, u64s);
memcpy(l->d, buf.buf, buf.pos);
c->journal.early_journal_entries.nr += jset_u64s(u64s);
} else { } else {
ret = bch2_trans_do(c, NULL, NULL, ret = bch2_trans_do(c, NULL, NULL,
BCH_TRANS_COMMIT_lazy_rw|commit_flags, BCH_TRANS_COMMIT_lazy_rw|commit_flags,
__bch2_trans_log_msg(&trans->extra_journal_entries, fmt, args)); __bch2_trans_log_msg(trans, &buf, u64s));
} }
err:
printbuf_exit(&buf);
return ret; return ret;
} }

View File

@ -101,10 +101,44 @@ int bch2_bkey_get_empty_slot(struct btree_trans *, struct btree_iter *,
int __must_check bch2_trans_update(struct btree_trans *, struct btree_iter *, int __must_check bch2_trans_update(struct btree_trans *, struct btree_iter *,
struct bkey_i *, enum btree_update_flags); struct bkey_i *, enum btree_update_flags);
int __must_check bch2_trans_update_seq(struct btree_trans *, u64, struct btree_iter *,
struct bkey_i *, enum btree_update_flags); struct jset_entry *__bch2_trans_jset_entry_alloc(struct btree_trans *, unsigned);
int __must_check bch2_trans_update_buffered(struct btree_trans *,
enum btree_id, struct bkey_i *); static inline struct jset_entry *btree_trans_journal_entries_top(struct btree_trans *trans)
{
return (void *) ((u64 *) trans->journal_entries + trans->journal_entries_u64s);
}
static inline struct jset_entry *
bch2_trans_jset_entry_alloc(struct btree_trans *trans, unsigned u64s)
{
if (!trans->journal_entries ||
trans->journal_entries_u64s + u64s > trans->journal_entries_size)
return __bch2_trans_jset_entry_alloc(trans, u64s);
struct jset_entry *e = btree_trans_journal_entries_top(trans);
trans->journal_entries_u64s += u64s;
return e;
}
int bch2_btree_insert_clone_trans(struct btree_trans *, enum btree_id, struct bkey_i *);
static inline int __must_check bch2_trans_update_buffered(struct btree_trans *trans,
enum btree_id btree,
struct bkey_i *k)
{
if (unlikely(trans->journal_replay_not_finished))
return bch2_btree_insert_clone_trans(trans, btree, k);
struct jset_entry *e = bch2_trans_jset_entry_alloc(trans, jset_u64s(k->k.u64s));
int ret = PTR_ERR_OR_ZERO(e);
if (ret)
return ret;
journal_entry_init(e, BCH_JSET_ENTRY_write_buffer_keys, btree, 0, k->k.u64s);
bkey_copy(e->start, k);
return 0;
}
void bch2_trans_commit_hook(struct btree_trans *, void bch2_trans_commit_hook(struct btree_trans *,
struct btree_trans_commit_hook *); struct btree_trans_commit_hook *);
@ -157,11 +191,6 @@ static inline int bch2_trans_commit(struct btree_trans *trans,
(_i) < (_trans)->updates + (_trans)->nr_updates; \ (_i) < (_trans)->updates + (_trans)->nr_updates; \
(_i)++) (_i)++)
#define trans_for_each_wb_update(_trans, _i) \
for ((_i) = (_trans)->wb_updates; \
(_i) < (_trans)->wb_updates + (_trans)->nr_wb_updates; \
(_i)++)
static inline void bch2_trans_reset_updates(struct btree_trans *trans) static inline void bch2_trans_reset_updates(struct btree_trans *trans)
{ {
struct btree_insert_entry *i; struct btree_insert_entry *i;
@ -169,12 +198,10 @@ static inline void bch2_trans_reset_updates(struct btree_trans *trans)
trans_for_each_update(trans, i) trans_for_each_update(trans, i)
bch2_path_put(trans, i->path, true); bch2_path_put(trans, i->path, true);
trans->extra_journal_res = 0;
trans->nr_updates = 0; trans->nr_updates = 0;
trans->nr_wb_updates = 0; trans->journal_entries_u64s = 0;
trans->wb_updates = NULL;
trans->hooks = NULL; trans->hooks = NULL;
trans->extra_journal_entries.nr = 0; trans->extra_disk_res = 0;
if (trans->fs_usage_deltas) { if (trans->fs_usage_deltas) {
trans->fs_usage_deltas->used = 0; trans->fs_usage_deltas->used = 0;

View File

@ -25,24 +25,24 @@
#include <linux/random.h> #include <linux/random.h>
static int bch2_btree_insert_node(struct btree_update *, struct btree_trans *, static int bch2_btree_insert_node(struct btree_update *, struct btree_trans *,
struct btree_path *, struct btree *, btree_path_idx_t, struct btree *,
struct keylist *, unsigned); struct keylist *, unsigned);
static void bch2_btree_update_add_new_node(struct btree_update *, struct btree *); static void bch2_btree_update_add_new_node(struct btree_update *, struct btree *);
static struct btree_path *get_unlocked_mut_path(struct btree_trans *trans, static btree_path_idx_t get_unlocked_mut_path(struct btree_trans *trans,
enum btree_id btree_id, enum btree_id btree_id,
unsigned level, unsigned level,
struct bpos pos) struct bpos pos)
{ {
struct btree_path *path; btree_path_idx_t path_idx = bch2_path_get(trans, btree_id, pos, level + 1, level,
path = bch2_path_get(trans, btree_id, pos, level + 1, level,
BTREE_ITER_NOPRESERVE| BTREE_ITER_NOPRESERVE|
BTREE_ITER_INTENT, _RET_IP_); BTREE_ITER_INTENT, _RET_IP_);
path = bch2_btree_path_make_mut(trans, path, true, _RET_IP_); path_idx = bch2_btree_path_make_mut(trans, path_idx, true, _RET_IP_);
struct btree_path *path = trans->paths + path_idx;
bch2_btree_path_downgrade(trans, path); bch2_btree_path_downgrade(trans, path);
__bch2_btree_path_unlock(trans, path); __bch2_btree_path_unlock(trans, path);
return path; return path_idx;
} }
/* Debug code: */ /* Debug code: */
@ -189,7 +189,7 @@ static void bch2_btree_node_free_inmem(struct btree_trans *trans,
struct btree *b) struct btree *b)
{ {
struct bch_fs *c = trans->c; struct bch_fs *c = trans->c;
unsigned level = b->c.level; unsigned i, level = b->c.level;
bch2_btree_node_lock_write_nofail(trans, path, &b->c); bch2_btree_node_lock_write_nofail(trans, path, &b->c);
bch2_btree_node_hash_remove(&c->btree_cache, b); bch2_btree_node_hash_remove(&c->btree_cache, b);
@ -197,7 +197,7 @@ static void bch2_btree_node_free_inmem(struct btree_trans *trans,
six_unlock_write(&b->c.lock); six_unlock_write(&b->c.lock);
mark_btree_node_locked_noreset(path, level, BTREE_NODE_INTENT_LOCKED); mark_btree_node_locked_noreset(path, level, BTREE_NODE_INTENT_LOCKED);
trans_for_each_path(trans, path) trans_for_each_path(trans, path, i)
if (path->l[level].b == b) { if (path->l[level].b == b) {
btree_node_unlock(trans, path, level); btree_node_unlock(trans, path, level);
path->l[level].b = ERR_PTR(-BCH_ERR_no_btree_node_init); path->l[level].b = ERR_PTR(-BCH_ERR_no_btree_node_init);
@ -211,7 +211,7 @@ static void bch2_btree_node_free_never_used(struct btree_update *as,
struct bch_fs *c = as->c; struct bch_fs *c = as->c;
struct prealloc_nodes *p = &as->prealloc_nodes[b->c.lock.readers != NULL]; struct prealloc_nodes *p = &as->prealloc_nodes[b->c.lock.readers != NULL];
struct btree_path *path; struct btree_path *path;
unsigned level = b->c.level; unsigned i, level = b->c.level;
BUG_ON(!list_empty(&b->write_blocked)); BUG_ON(!list_empty(&b->write_blocked));
BUG_ON(b->will_make_reachable != (1UL|(unsigned long) as)); BUG_ON(b->will_make_reachable != (1UL|(unsigned long) as));
@ -234,7 +234,7 @@ static void bch2_btree_node_free_never_used(struct btree_update *as,
six_unlock_intent(&b->c.lock); six_unlock_intent(&b->c.lock);
trans_for_each_path(trans, path) trans_for_each_path(trans, path, i)
if (path->l[level].b == b) { if (path->l[level].b == b) {
btree_node_unlock(trans, path, level); btree_node_unlock(trans, path, level);
path->l[level].b = ERR_PTR(-BCH_ERR_no_btree_node_init); path->l[level].b = ERR_PTR(-BCH_ERR_no_btree_node_init);
@ -556,16 +556,13 @@ static int btree_update_nodes_written_trans(struct btree_trans *trans,
struct btree_update *as) struct btree_update *as)
{ {
struct bkey_i *k; struct bkey_i *k;
int ret;
ret = darray_make_room(&trans->extra_journal_entries, as->journal_u64s); struct jset_entry *e = bch2_trans_jset_entry_alloc(trans, as->journal_u64s);
int ret = PTR_ERR_OR_ZERO(e);
if (ret) if (ret)
return ret; return ret;
memcpy(&darray_top(trans->extra_journal_entries), memcpy(e, as->journal_entries, as->journal_u64s * sizeof(u64));
as->journal_entries,
as->journal_u64s * sizeof(u64));
trans->extra_journal_entries.nr += as->journal_u64s;
trans->journal_pin = &as->journal; trans->journal_pin = &as->journal;
@ -651,10 +648,11 @@ static void btree_update_nodes_written(struct btree_update *as)
"%s(): error %s", __func__, bch2_err_str(ret)); "%s(): error %s", __func__, bch2_err_str(ret));
err: err:
if (as->b) { if (as->b) {
struct btree_path *path;
b = as->b; b = as->b;
path = get_unlocked_mut_path(trans, as->btree_id, b->c.level, b->key.k.p); btree_path_idx_t path_idx = get_unlocked_mut_path(trans,
as->btree_id, b->c.level, b->key.k.p);
struct btree_path *path = trans->paths + path_idx;
/* /*
* @b is the node we did the final insert into: * @b is the node we did the final insert into:
* *
@ -724,7 +722,7 @@ err:
btree_node_write_if_need(c, b, SIX_LOCK_intent); btree_node_write_if_need(c, b, SIX_LOCK_intent);
btree_node_unlock(trans, path, b->c.level); btree_node_unlock(trans, path, b->c.level);
bch2_path_put(trans, path, true); bch2_path_put(trans, path_idx, true);
} }
bch2_journal_pin_drop(&c->journal, &as->journal); bch2_journal_pin_drop(&c->journal, &as->journal);
@ -1442,10 +1440,12 @@ static void __btree_split_node(struct btree_update *as,
*/ */
static void btree_split_insert_keys(struct btree_update *as, static void btree_split_insert_keys(struct btree_update *as,
struct btree_trans *trans, struct btree_trans *trans,
struct btree_path *path, btree_path_idx_t path_idx,
struct btree *b, struct btree *b,
struct keylist *keys) struct keylist *keys)
{ {
struct btree_path *path = trans->paths + path_idx;
if (!bch2_keylist_empty(keys) && if (!bch2_keylist_empty(keys) &&
bpos_le(bch2_keylist_front(keys)->k.p, b->data->max_key)) { bpos_le(bch2_keylist_front(keys)->k.p, b->data->max_key)) {
struct btree_node_iter node_iter; struct btree_node_iter node_iter;
@ -1459,18 +1459,18 @@ static void btree_split_insert_keys(struct btree_update *as,
} }
static int btree_split(struct btree_update *as, struct btree_trans *trans, static int btree_split(struct btree_update *as, struct btree_trans *trans,
struct btree_path *path, struct btree *b, btree_path_idx_t path, struct btree *b,
struct keylist *keys, unsigned flags) struct keylist *keys, unsigned flags)
{ {
struct bch_fs *c = as->c; struct bch_fs *c = as->c;
struct btree *parent = btree_node_parent(path, b); struct btree *parent = btree_node_parent(trans->paths + path, b);
struct btree *n1, *n2 = NULL, *n3 = NULL; struct btree *n1, *n2 = NULL, *n3 = NULL;
struct btree_path *path1 = NULL, *path2 = NULL; btree_path_idx_t path1 = 0, path2 = 0;
u64 start_time = local_clock(); u64 start_time = local_clock();
int ret = 0; int ret = 0;
BUG_ON(!parent && (b != btree_node_root(c, b))); BUG_ON(!parent && (b != btree_node_root(c, b)));
BUG_ON(parent && !btree_node_intent_locked(path, b->c.level + 1)); BUG_ON(parent && !btree_node_intent_locked(trans->paths + path, b->c.level + 1));
bch2_btree_interior_update_will_free_node(as, b); bch2_btree_interior_update_will_free_node(as, b);
@ -1498,15 +1498,15 @@ static int btree_split(struct btree_update *as, struct btree_trans *trans,
six_unlock_write(&n2->c.lock); six_unlock_write(&n2->c.lock);
six_unlock_write(&n1->c.lock); six_unlock_write(&n1->c.lock);
path1 = get_unlocked_mut_path(trans, path->btree_id, n1->c.level, n1->key.k.p); path1 = get_unlocked_mut_path(trans, as->btree_id, n1->c.level, n1->key.k.p);
six_lock_increment(&n1->c.lock, SIX_LOCK_intent); six_lock_increment(&n1->c.lock, SIX_LOCK_intent);
mark_btree_node_locked(trans, path1, n1->c.level, BTREE_NODE_INTENT_LOCKED); mark_btree_node_locked(trans, trans->paths + path1, n1->c.level, BTREE_NODE_INTENT_LOCKED);
bch2_btree_path_level_init(trans, path1, n1); bch2_btree_path_level_init(trans, trans->paths + path1, n1);
path2 = get_unlocked_mut_path(trans, path->btree_id, n2->c.level, n2->key.k.p); path2 = get_unlocked_mut_path(trans, as->btree_id, n2->c.level, n2->key.k.p);
six_lock_increment(&n2->c.lock, SIX_LOCK_intent); six_lock_increment(&n2->c.lock, SIX_LOCK_intent);
mark_btree_node_locked(trans, path2, n2->c.level, BTREE_NODE_INTENT_LOCKED); mark_btree_node_locked(trans, trans->paths + path2, n2->c.level, BTREE_NODE_INTENT_LOCKED);
bch2_btree_path_level_init(trans, path2, n2); bch2_btree_path_level_init(trans, trans->paths + path2, n2);
/* /*
* Note that on recursive parent_keys == keys, so we * Note that on recursive parent_keys == keys, so we
@ -1523,11 +1523,11 @@ static int btree_split(struct btree_update *as, struct btree_trans *trans,
bch2_btree_update_add_new_node(as, n3); bch2_btree_update_add_new_node(as, n3);
six_unlock_write(&n3->c.lock); six_unlock_write(&n3->c.lock);
path2->locks_want++; trans->paths[path2].locks_want++;
BUG_ON(btree_node_locked(path2, n3->c.level)); BUG_ON(btree_node_locked(trans->paths + path2, n3->c.level));
six_lock_increment(&n3->c.lock, SIX_LOCK_intent); six_lock_increment(&n3->c.lock, SIX_LOCK_intent);
mark_btree_node_locked(trans, path2, n3->c.level, BTREE_NODE_INTENT_LOCKED); mark_btree_node_locked(trans, trans->paths + path2, n3->c.level, BTREE_NODE_INTENT_LOCKED);
bch2_btree_path_level_init(trans, path2, n3); bch2_btree_path_level_init(trans, trans->paths + path2, n3);
n3->sib_u64s[0] = U16_MAX; n3->sib_u64s[0] = U16_MAX;
n3->sib_u64s[1] = U16_MAX; n3->sib_u64s[1] = U16_MAX;
@ -1548,10 +1548,10 @@ static int btree_split(struct btree_update *as, struct btree_trans *trans,
bch2_btree_update_add_new_node(as, n1); bch2_btree_update_add_new_node(as, n1);
six_unlock_write(&n1->c.lock); six_unlock_write(&n1->c.lock);
path1 = get_unlocked_mut_path(trans, path->btree_id, n1->c.level, n1->key.k.p); path1 = get_unlocked_mut_path(trans, as->btree_id, n1->c.level, n1->key.k.p);
six_lock_increment(&n1->c.lock, SIX_LOCK_intent); six_lock_increment(&n1->c.lock, SIX_LOCK_intent);
mark_btree_node_locked(trans, path1, n1->c.level, BTREE_NODE_INTENT_LOCKED); mark_btree_node_locked(trans, trans->paths + path1, n1->c.level, BTREE_NODE_INTENT_LOCKED);
bch2_btree_path_level_init(trans, path1, n1); bch2_btree_path_level_init(trans, trans->paths + path1, n1);
if (parent) if (parent)
bch2_keylist_add(&as->parent_keys, &n1->key); bch2_keylist_add(&as->parent_keys, &n1->key);
@ -1565,10 +1565,10 @@ static int btree_split(struct btree_update *as, struct btree_trans *trans,
if (ret) if (ret)
goto err; goto err;
} else if (n3) { } else if (n3) {
bch2_btree_set_root(as, trans, path, n3); bch2_btree_set_root(as, trans, trans->paths + path, n3);
} else { } else {
/* Root filled up but didn't need to be split */ /* Root filled up but didn't need to be split */
bch2_btree_set_root(as, trans, path, n1); bch2_btree_set_root(as, trans, trans->paths + path, n1);
} }
if (n3) { if (n3) {
@ -1588,13 +1588,13 @@ static int btree_split(struct btree_update *as, struct btree_trans *trans,
* node after another thread has locked and updated the new node, thus * node after another thread has locked and updated the new node, thus
* seeing stale data: * seeing stale data:
*/ */
bch2_btree_node_free_inmem(trans, path, b); bch2_btree_node_free_inmem(trans, trans->paths + path, b);
if (n3) if (n3)
bch2_trans_node_add(trans, n3); bch2_trans_node_add(trans, trans->paths + path, n3);
if (n2) if (n2)
bch2_trans_node_add(trans, n2); bch2_trans_node_add(trans, trans->paths + path2, n2);
bch2_trans_node_add(trans, n1); bch2_trans_node_add(trans, trans->paths + path1, n1);
if (n3) if (n3)
six_unlock_intent(&n3->c.lock); six_unlock_intent(&n3->c.lock);
@ -1603,11 +1603,11 @@ static int btree_split(struct btree_update *as, struct btree_trans *trans,
six_unlock_intent(&n1->c.lock); six_unlock_intent(&n1->c.lock);
out: out:
if (path2) { if (path2) {
__bch2_btree_path_unlock(trans, path2); __bch2_btree_path_unlock(trans, trans->paths + path2);
bch2_path_put(trans, path2, true); bch2_path_put(trans, path2, true);
} }
if (path1) { if (path1) {
__bch2_btree_path_unlock(trans, path1); __bch2_btree_path_unlock(trans, trans->paths + path1);
bch2_path_put(trans, path1, true); bch2_path_put(trans, path1, true);
} }
@ -1635,13 +1635,14 @@ bch2_btree_insert_keys_interior(struct btree_update *as,
struct keylist *keys) struct keylist *keys)
{ {
struct btree_path *linked; struct btree_path *linked;
unsigned i;
__bch2_btree_insert_keys_interior(as, trans, path, b, __bch2_btree_insert_keys_interior(as, trans, path, b,
path->l[b->c.level].iter, keys); path->l[b->c.level].iter, keys);
btree_update_updated_node(as, b); btree_update_updated_node(as, b);
trans_for_each_path_with_node(trans, b, linked) trans_for_each_path_with_node(trans, b, linked, i)
bch2_btree_node_iter_peek(&linked->l[b->c.level].iter, b); bch2_btree_node_iter_peek(&linked->l[b->c.level].iter, b);
bch2_trans_verify_paths(trans); bch2_trans_verify_paths(trans);
@ -1664,10 +1665,11 @@ bch2_btree_insert_keys_interior(struct btree_update *as,
* for leaf nodes -- inserts into interior nodes have to be atomic. * for leaf nodes -- inserts into interior nodes have to be atomic.
*/ */
static int bch2_btree_insert_node(struct btree_update *as, struct btree_trans *trans, static int bch2_btree_insert_node(struct btree_update *as, struct btree_trans *trans,
struct btree_path *path, struct btree *b, btree_path_idx_t path_idx, struct btree *b,
struct keylist *keys, unsigned flags) struct keylist *keys, unsigned flags)
{ {
struct bch_fs *c = as->c; struct bch_fs *c = as->c;
struct btree_path *path = trans->paths + path_idx;
int old_u64s = le16_to_cpu(btree_bset_last(b)->u64s); int old_u64s = le16_to_cpu(btree_bset_last(b)->u64s);
int old_live_u64s = b->nr.live_u64s; int old_live_u64s = b->nr.live_u64s;
int live_u64s_added, u64s_added; int live_u64s_added, u64s_added;
@ -1720,19 +1722,22 @@ split:
return btree_trans_restart(trans, BCH_ERR_transaction_restart_split_race); return btree_trans_restart(trans, BCH_ERR_transaction_restart_split_race);
} }
return btree_split(as, trans, path, b, keys, flags); return btree_split(as, trans, path_idx, b, keys, flags);
} }
int bch2_btree_split_leaf(struct btree_trans *trans, int bch2_btree_split_leaf(struct btree_trans *trans,
struct btree_path *path, btree_path_idx_t path,
unsigned flags) unsigned flags)
{ {
struct btree *b = path_l(path)->b; /* btree_split & merge may both cause paths array to be reallocated */
struct btree *b = path_l(trans->paths + path)->b;
struct btree_update *as; struct btree_update *as;
unsigned l; unsigned l;
int ret = 0; int ret = 0;
as = bch2_btree_update_start(trans, path, path->level, as = bch2_btree_update_start(trans, trans->paths + path,
trans->paths[path].level,
true, flags); true, flags);
if (IS_ERR(as)) if (IS_ERR(as))
return PTR_ERR(as); return PTR_ERR(as);
@ -1745,20 +1750,21 @@ int bch2_btree_split_leaf(struct btree_trans *trans,
bch2_btree_update_done(as, trans); bch2_btree_update_done(as, trans);
for (l = path->level + 1; btree_node_intent_locked(path, l) && !ret; l++) for (l = trans->paths[path].level + 1;
btree_node_intent_locked(&trans->paths[path], l) && !ret;
l++)
ret = bch2_foreground_maybe_merge(trans, path, l, flags); ret = bch2_foreground_maybe_merge(trans, path, l, flags);
return ret; return ret;
} }
int __bch2_foreground_maybe_merge(struct btree_trans *trans, int __bch2_foreground_maybe_merge(struct btree_trans *trans,
struct btree_path *path, btree_path_idx_t path,
unsigned level, unsigned level,
unsigned flags, unsigned flags,
enum btree_node_sibling sib) enum btree_node_sibling sib)
{ {
struct bch_fs *c = trans->c; struct bch_fs *c = trans->c;
struct btree_path *sib_path = NULL, *new_path = NULL;
struct btree_update *as; struct btree_update *as;
struct bkey_format_state new_s; struct bkey_format_state new_s;
struct bkey_format new_f; struct bkey_format new_f;
@ -1766,13 +1772,15 @@ int __bch2_foreground_maybe_merge(struct btree_trans *trans,
struct btree *b, *m, *n, *prev, *next, *parent; struct btree *b, *m, *n, *prev, *next, *parent;
struct bpos sib_pos; struct bpos sib_pos;
size_t sib_u64s; size_t sib_u64s;
enum btree_id btree = trans->paths[path].btree_id;
btree_path_idx_t sib_path = 0, new_path = 0;
u64 start_time = local_clock(); u64 start_time = local_clock();
int ret = 0; int ret = 0;
BUG_ON(!path->should_be_locked); BUG_ON(!trans->paths[path].should_be_locked);
BUG_ON(!btree_node_locked(path, level)); BUG_ON(!btree_node_locked(&trans->paths[path], level));
b = path->l[level].b; b = trans->paths[path].l[level].b;
if ((sib == btree_prev_sib && bpos_eq(b->data->min_key, POS_MIN)) || if ((sib == btree_prev_sib && bpos_eq(b->data->min_key, POS_MIN)) ||
(sib == btree_next_sib && bpos_eq(b->data->max_key, SPOS_MAX))) { (sib == btree_next_sib && bpos_eq(b->data->max_key, SPOS_MAX))) {
@ -1784,18 +1792,18 @@ int __bch2_foreground_maybe_merge(struct btree_trans *trans,
? bpos_predecessor(b->data->min_key) ? bpos_predecessor(b->data->min_key)
: bpos_successor(b->data->max_key); : bpos_successor(b->data->max_key);
sib_path = bch2_path_get(trans, path->btree_id, sib_pos, sib_path = bch2_path_get(trans, btree, sib_pos,
U8_MAX, level, BTREE_ITER_INTENT, _THIS_IP_); U8_MAX, level, BTREE_ITER_INTENT, _THIS_IP_);
ret = bch2_btree_path_traverse(trans, sib_path, false); ret = bch2_btree_path_traverse(trans, sib_path, false);
if (ret) if (ret)
goto err; goto err;
btree_path_set_should_be_locked(sib_path); btree_path_set_should_be_locked(trans->paths + sib_path);
m = sib_path->l[level].b; m = trans->paths[sib_path].l[level].b;
if (btree_node_parent(path, b) != if (btree_node_parent(trans->paths + path, b) !=
btree_node_parent(sib_path, m)) { btree_node_parent(trans->paths + sib_path, m)) {
b->sib_u64s[sib] = U16_MAX; b->sib_u64s[sib] = U16_MAX;
goto out; goto out;
} }
@ -1848,8 +1856,8 @@ int __bch2_foreground_maybe_merge(struct btree_trans *trans,
if (b->sib_u64s[sib] > c->btree_foreground_merge_threshold) if (b->sib_u64s[sib] > c->btree_foreground_merge_threshold)
goto out; goto out;
parent = btree_node_parent(path, b); parent = btree_node_parent(trans->paths + path, b);
as = bch2_btree_update_start(trans, path, level, false, as = bch2_btree_update_start(trans, trans->paths + path, level, false,
BCH_TRANS_COMMIT_no_enospc|flags); BCH_TRANS_COMMIT_no_enospc|flags);
ret = PTR_ERR_OR_ZERO(as); ret = PTR_ERR_OR_ZERO(as);
if (ret) if (ret)
@ -1879,10 +1887,10 @@ int __bch2_foreground_maybe_merge(struct btree_trans *trans,
bch2_btree_update_add_new_node(as, n); bch2_btree_update_add_new_node(as, n);
six_unlock_write(&n->c.lock); six_unlock_write(&n->c.lock);
new_path = get_unlocked_mut_path(trans, path->btree_id, n->c.level, n->key.k.p); new_path = get_unlocked_mut_path(trans, btree, n->c.level, n->key.k.p);
six_lock_increment(&n->c.lock, SIX_LOCK_intent); six_lock_increment(&n->c.lock, SIX_LOCK_intent);
mark_btree_node_locked(trans, new_path, n->c.level, BTREE_NODE_INTENT_LOCKED); mark_btree_node_locked(trans, trans->paths + new_path, n->c.level, BTREE_NODE_INTENT_LOCKED);
bch2_btree_path_level_init(trans, new_path, n); bch2_btree_path_level_init(trans, trans->paths + new_path, n);
bkey_init(&delete.k); bkey_init(&delete.k);
delete.k.p = prev->key.k.p; delete.k.p = prev->key.k.p;
@ -1900,10 +1908,10 @@ int __bch2_foreground_maybe_merge(struct btree_trans *trans,
bch2_btree_update_get_open_buckets(as, n); bch2_btree_update_get_open_buckets(as, n);
bch2_btree_node_write(c, n, SIX_LOCK_intent, 0); bch2_btree_node_write(c, n, SIX_LOCK_intent, 0);
bch2_btree_node_free_inmem(trans, path, b); bch2_btree_node_free_inmem(trans, trans->paths + path, b);
bch2_btree_node_free_inmem(trans, sib_path, m); bch2_btree_node_free_inmem(trans, trans->paths + sib_path, m);
bch2_trans_node_add(trans, n); bch2_trans_node_add(trans, trans->paths + path, n);
bch2_trans_verify_paths(trans); bch2_trans_verify_paths(trans);
@ -1931,16 +1939,16 @@ int bch2_btree_node_rewrite(struct btree_trans *trans,
unsigned flags) unsigned flags)
{ {
struct bch_fs *c = trans->c; struct bch_fs *c = trans->c;
struct btree_path *new_path = NULL;
struct btree *n, *parent; struct btree *n, *parent;
struct btree_update *as; struct btree_update *as;
btree_path_idx_t new_path = 0;
int ret; int ret;
flags |= BCH_TRANS_COMMIT_no_enospc; flags |= BCH_TRANS_COMMIT_no_enospc;
parent = btree_node_parent(iter->path, b); struct btree_path *path = btree_iter_path(trans, iter);
as = bch2_btree_update_start(trans, iter->path, b->c.level, parent = btree_node_parent(path, b);
false, flags); as = bch2_btree_update_start(trans, path, b->c.level, false, flags);
ret = PTR_ERR_OR_ZERO(as); ret = PTR_ERR_OR_ZERO(as);
if (ret) if (ret)
goto out; goto out;
@ -1955,27 +1963,27 @@ int bch2_btree_node_rewrite(struct btree_trans *trans,
new_path = get_unlocked_mut_path(trans, iter->btree_id, n->c.level, n->key.k.p); new_path = get_unlocked_mut_path(trans, iter->btree_id, n->c.level, n->key.k.p);
six_lock_increment(&n->c.lock, SIX_LOCK_intent); six_lock_increment(&n->c.lock, SIX_LOCK_intent);
mark_btree_node_locked(trans, new_path, n->c.level, BTREE_NODE_INTENT_LOCKED); mark_btree_node_locked(trans, trans->paths + new_path, n->c.level, BTREE_NODE_INTENT_LOCKED);
bch2_btree_path_level_init(trans, new_path, n); bch2_btree_path_level_init(trans, trans->paths + new_path, n);
trace_and_count(c, btree_node_rewrite, trans, b); trace_and_count(c, btree_node_rewrite, trans, b);
if (parent) { if (parent) {
bch2_keylist_add(&as->parent_keys, &n->key); bch2_keylist_add(&as->parent_keys, &n->key);
ret = bch2_btree_insert_node(as, trans, iter->path, parent, ret = bch2_btree_insert_node(as, trans, iter->path,
&as->parent_keys, flags); parent, &as->parent_keys, flags);
if (ret) if (ret)
goto err; goto err;
} else { } else {
bch2_btree_set_root(as, trans, iter->path, n); bch2_btree_set_root(as, trans, btree_iter_path(trans, iter), n);
} }
bch2_btree_update_get_open_buckets(as, n); bch2_btree_update_get_open_buckets(as, n);
bch2_btree_node_write(c, n, SIX_LOCK_intent, 0); bch2_btree_node_write(c, n, SIX_LOCK_intent, 0);
bch2_btree_node_free_inmem(trans, iter->path, b); bch2_btree_node_free_inmem(trans, btree_iter_path(trans, iter), b);
bch2_trans_node_add(trans, n); bch2_trans_node_add(trans, trans->paths + iter->path, n);
six_unlock_intent(&n->c.lock); six_unlock_intent(&n->c.lock);
bch2_btree_update_done(as, trans); bch2_btree_update_done(as, trans);
@ -2153,7 +2161,7 @@ static int __bch2_btree_node_update_key(struct btree_trans *trans,
BUG_ON(ret); BUG_ON(ret);
} }
parent = btree_node_parent(iter->path, b); parent = btree_node_parent(btree_iter_path(trans, iter), b);
if (parent) { if (parent) {
bch2_trans_copy_iter(&iter2, iter); bch2_trans_copy_iter(&iter2, iter);
@ -2161,10 +2169,11 @@ static int __bch2_btree_node_update_key(struct btree_trans *trans,
iter2.flags & BTREE_ITER_INTENT, iter2.flags & BTREE_ITER_INTENT,
_THIS_IP_); _THIS_IP_);
BUG_ON(iter2.path->level != b->c.level); struct btree_path *path2 = btree_iter_path(trans, &iter2);
BUG_ON(!bpos_eq(iter2.path->pos, new_key->k.p)); BUG_ON(path2->level != b->c.level);
BUG_ON(!bpos_eq(path2->pos, new_key->k.p));
btree_path_set_level_up(trans, iter2.path); btree_path_set_level_up(trans, path2);
trans->paths_sorted = false; trans->paths_sorted = false;
@ -2175,23 +2184,23 @@ static int __bch2_btree_node_update_key(struct btree_trans *trans,
} else { } else {
BUG_ON(btree_node_root(c, b) != b); BUG_ON(btree_node_root(c, b) != b);
ret = darray_make_room(&trans->extra_journal_entries, struct jset_entry *e = bch2_trans_jset_entry_alloc(trans,
jset_u64s(new_key->k.u64s)); jset_u64s(new_key->k.u64s));
ret = PTR_ERR_OR_ZERO(e);
if (ret) if (ret)
return ret; return ret;
journal_entry_set((void *) &darray_top(trans->extra_journal_entries), journal_entry_set(e,
BCH_JSET_ENTRY_btree_root, BCH_JSET_ENTRY_btree_root,
b->c.btree_id, b->c.level, b->c.btree_id, b->c.level,
new_key, new_key->k.u64s); new_key, new_key->k.u64s);
trans->extra_journal_entries.nr += jset_u64s(new_key->k.u64s);
} }
ret = bch2_trans_commit(trans, NULL, NULL, commit_flags); ret = bch2_trans_commit(trans, NULL, NULL, commit_flags);
if (ret) if (ret)
goto err; goto err;
bch2_btree_node_lock_write_nofail(trans, iter->path, &b->c); bch2_btree_node_lock_write_nofail(trans, btree_iter_path(trans, iter), &b->c);
if (new_hash) { if (new_hash) {
mutex_lock(&c->btree_cache.lock); mutex_lock(&c->btree_cache.lock);
@ -2206,7 +2215,7 @@ static int __bch2_btree_node_update_key(struct btree_trans *trans,
bkey_copy(&b->key, new_key); bkey_copy(&b->key, new_key);
} }
bch2_btree_node_unlock_write(trans, iter->path, b); bch2_btree_node_unlock_write(trans, btree_iter_path(trans, iter), b);
out: out:
bch2_trans_iter_exit(trans, &iter2); bch2_trans_iter_exit(trans, &iter2);
return ret; return ret;
@ -2225,7 +2234,7 @@ int bch2_btree_node_update_key(struct btree_trans *trans, struct btree_iter *ite
{ {
struct bch_fs *c = trans->c; struct bch_fs *c = trans->c;
struct btree *new_hash = NULL; struct btree *new_hash = NULL;
struct btree_path *path = iter->path; struct btree_path *path = btree_iter_path(trans, iter);
struct closure cl; struct closure cl;
int ret = 0; int ret = 0;
@ -2283,7 +2292,7 @@ int bch2_btree_node_update_key_get_iter(struct btree_trans *trans,
goto out; goto out;
/* has node been freed? */ /* has node been freed? */
if (iter.path->l[b->c.level].b != b) { if (btree_iter_path(trans, &iter)->l[b->c.level].b != b) {
/* node has been freed: */ /* node has been freed: */
BUG_ON(!btree_node_dying(b)); BUG_ON(!btree_node_dying(b));
goto out; goto out;

View File

@ -121,16 +121,17 @@ struct btree *__bch2_btree_node_alloc_replacement(struct btree_update *,
struct btree *, struct btree *,
struct bkey_format); struct bkey_format);
int bch2_btree_split_leaf(struct btree_trans *, struct btree_path *, unsigned); int bch2_btree_split_leaf(struct btree_trans *, btree_path_idx_t, unsigned);
int __bch2_foreground_maybe_merge(struct btree_trans *, struct btree_path *, int __bch2_foreground_maybe_merge(struct btree_trans *, btree_path_idx_t,
unsigned, unsigned, enum btree_node_sibling); unsigned, unsigned, enum btree_node_sibling);
static inline int bch2_foreground_maybe_merge_sibling(struct btree_trans *trans, static inline int bch2_foreground_maybe_merge_sibling(struct btree_trans *trans,
struct btree_path *path, btree_path_idx_t path_idx,
unsigned level, unsigned flags, unsigned level, unsigned flags,
enum btree_node_sibling sib) enum btree_node_sibling sib)
{ {
struct btree_path *path = trans->paths + path_idx;
struct btree *b; struct btree *b;
EBUG_ON(!btree_node_locked(path, level)); EBUG_ON(!btree_node_locked(path, level));
@ -139,11 +140,11 @@ static inline int bch2_foreground_maybe_merge_sibling(struct btree_trans *trans,
if (b->sib_u64s[sib] > trans->c->btree_foreground_merge_threshold) if (b->sib_u64s[sib] > trans->c->btree_foreground_merge_threshold)
return 0; return 0;
return __bch2_foreground_maybe_merge(trans, path, level, flags, sib); return __bch2_foreground_maybe_merge(trans, path_idx, level, flags, sib);
} }
static inline int bch2_foreground_maybe_merge(struct btree_trans *trans, static inline int bch2_foreground_maybe_merge(struct btree_trans *trans,
struct btree_path *path, btree_path_idx_t path,
unsigned level, unsigned level,
unsigned flags) unsigned flags)
{ {

View File

@ -7,37 +7,108 @@
#include "btree_write_buffer.h" #include "btree_write_buffer.h"
#include "error.h" #include "error.h"
#include "journal.h" #include "journal.h"
#include "journal_io.h"
#include "journal_reclaim.h" #include "journal_reclaim.h"
#include <linux/sort.h> #include <linux/prefetch.h>
static int bch2_btree_write_buffer_journal_flush(struct journal *, static int bch2_btree_write_buffer_journal_flush(struct journal *,
struct journal_entry_pin *, u64); struct journal_entry_pin *, u64);
static int btree_write_buffered_key_cmp(const void *_l, const void *_r) static int bch2_journal_keys_to_write_buffer(struct bch_fs *, struct journal_buf *);
{
const struct btree_write_buffered_key *l = _l;
const struct btree_write_buffered_key *r = _r;
return cmp_int(l->btree, r->btree) ?: static inline bool __wb_key_cmp(const struct wb_key_ref *l, const struct wb_key_ref *r)
bpos_cmp(l->k.k.p, r->k.k.p) ?: {
cmp_int(l->journal_seq, r->journal_seq) ?: return (cmp_int(l->hi, r->hi) ?:
cmp_int(l->journal_offset, r->journal_offset); cmp_int(l->mi, r->mi) ?:
cmp_int(l->lo, r->lo)) >= 0;
} }
static int btree_write_buffered_journal_cmp(const void *_l, const void *_r) static inline bool wb_key_cmp(const struct wb_key_ref *l, const struct wb_key_ref *r)
{ {
const struct btree_write_buffered_key *l = _l; #ifdef CONFIG_X86_64
const struct btree_write_buffered_key *r = _r; int cmp;
return cmp_int(l->journal_seq, r->journal_seq); asm("mov (%[l]), %%rax;"
"sub (%[r]), %%rax;"
"mov 8(%[l]), %%rax;"
"sbb 8(%[r]), %%rax;"
"mov 16(%[l]), %%rax;"
"sbb 16(%[r]), %%rax;"
: "=@ccae" (cmp)
: [l] "r" (l), [r] "r" (r)
: "rax", "cc");
EBUG_ON(cmp != __wb_key_cmp(l, r));
return cmp;
#else
return __wb_key_cmp(l, r);
#endif
}
/* Compare excluding idx, the low 24 bits: */
static inline bool wb_key_eq(const void *_l, const void *_r)
{
const struct wb_key_ref *l = _l;
const struct wb_key_ref *r = _r;
return !((l->hi ^ r->hi)|
(l->mi ^ r->mi)|
((l->lo >> 24) ^ (r->lo >> 24)));
}
static noinline void wb_sort(struct wb_key_ref *base, size_t num)
{
size_t n = num, a = num / 2;
if (!a) /* num < 2 || size == 0 */
return;
for (;;) {
size_t b, c, d;
if (a) /* Building heap: sift down --a */
--a;
else if (--n) /* Sorting: Extract root to --n */
swap(base[0], base[n]);
else /* Sort complete */
break;
/*
* Sift element at "a" down into heap. This is the
* "bottom-up" variant, which significantly reduces
* calls to cmp_func(): we find the sift-down path all
* the way to the leaves (one compare per level), then
* backtrack to find where to insert the target element.
*
* Because elements tend to sift down close to the leaves,
* this uses fewer compares than doing two per level
* on the way down. (A bit more than half as many on
* average, 3/4 worst-case.)
*/
for (b = a; c = 2*b + 1, (d = c + 1) < n;)
b = wb_key_cmp(base + c, base + d) ? c : d;
if (d == n) /* Special case last leaf with no sibling */
b = c;
/* Now backtrack from "b" to the correct location for "a" */
while (b != a && wb_key_cmp(base + a, base + b))
b = (b - 1) / 2;
c = b; /* Where "a" belongs */
while (b != a) { /* Shift it into place */
b = (b - 1) / 2;
swap(base[b], base[c]);
}
}
} }
static noinline int wb_flush_one_slowpath(struct btree_trans *trans, static noinline int wb_flush_one_slowpath(struct btree_trans *trans,
struct btree_iter *iter, struct btree_iter *iter,
struct btree_write_buffered_key *wb) struct btree_write_buffered_key *wb)
{ {
bch2_btree_node_unlock_write(trans, iter->path, iter->path->l[0].b); struct btree_path *path = btree_iter_path(trans, iter);
bch2_btree_node_unlock_write(trans, path, path->l[0].b);
trans->journal_res.seq = wb->journal_seq; trans->journal_res.seq = wb->journal_seq;
@ -59,6 +130,9 @@ static inline int wb_flush_one(struct btree_trans *trans, struct btree_iter *ite
int ret; int ret;
EBUG_ON(!wb->journal_seq); EBUG_ON(!wb->journal_seq);
EBUG_ON(!c->btree_write_buffer.flushing.pin.seq);
EBUG_ON(c->btree_write_buffer.flushing.pin.seq > wb->journal_seq);
ret = bch2_btree_iter_traverse(iter); ret = bch2_btree_iter_traverse(iter);
if (ret) if (ret)
return ret; return ret;
@ -67,10 +141,10 @@ static inline int wb_flush_one(struct btree_trans *trans, struct btree_iter *ite
* We can't clone a path that has write locks: unshare it now, before * We can't clone a path that has write locks: unshare it now, before
* set_pos and traverse(): * set_pos and traverse():
*/ */
if (iter->path->ref > 1) if (btree_iter_path(trans, iter)->ref > 1)
iter->path = __bch2_btree_path_make_mut(trans, iter->path, true, _THIS_IP_); iter->path = __bch2_btree_path_make_mut(trans, iter->path, true, _THIS_IP_);
path = iter->path; path = btree_iter_path(trans, iter);
if (!*write_locked) { if (!*write_locked) {
ret = bch2_btree_node_lock_write(trans, path, &path->l[0].b->c); ret = bch2_btree_node_lock_write(trans, path, &path->l[0].b->c);
@ -91,26 +165,6 @@ static inline int wb_flush_one(struct btree_trans *trans, struct btree_iter *ite
return 0; return 0;
} }
static union btree_write_buffer_state btree_write_buffer_switch(struct btree_write_buffer *wb)
{
union btree_write_buffer_state old, new;
u64 v = READ_ONCE(wb->state.v);
do {
old.v = new.v = v;
new.nr = 0;
new.idx++;
} while ((v = atomic64_cmpxchg_acquire(&wb->state.counter, old.v, new.v)) != old.v);
while (old.idx == 0 ? wb->state.ref0 : wb->state.ref1)
cpu_relax();
smp_mb();
return old;
}
/* /*
* Update a btree with a write buffered key using the journal seq of the * Update a btree with a write buffered key using the journal seq of the
* original write buffer insert. * original write buffer insert.
@ -140,28 +194,79 @@ btree_write_buffered_insert(struct btree_trans *trans,
return ret; return ret;
} }
int bch2_btree_write_buffer_flush_locked(struct btree_trans *trans) static void move_keys_from_inc_to_flushing(struct btree_write_buffer *wb)
{
struct bch_fs *c = container_of(wb, struct bch_fs, btree_write_buffer);
struct journal *j = &c->journal;
if (!wb->inc.keys.nr)
return;
bch2_journal_pin_add(j, wb->inc.keys.data[0].journal_seq, &wb->flushing.pin,
bch2_btree_write_buffer_journal_flush);
darray_resize(&wb->flushing.keys, min_t(size_t, 1U << 20, wb->flushing.keys.nr + wb->inc.keys.nr));
darray_resize(&wb->sorted, wb->flushing.keys.size);
if (!wb->flushing.keys.nr && wb->sorted.size >= wb->inc.keys.nr) {
swap(wb->flushing.keys, wb->inc.keys);
goto out;
}
size_t nr = min(darray_room(wb->flushing.keys),
wb->sorted.size - wb->flushing.keys.nr);
nr = min(nr, wb->inc.keys.nr);
memcpy(&darray_top(wb->flushing.keys),
wb->inc.keys.data,
sizeof(wb->inc.keys.data[0]) * nr);
memmove(wb->inc.keys.data,
wb->inc.keys.data + nr,
sizeof(wb->inc.keys.data[0]) * (wb->inc.keys.nr - nr));
wb->flushing.keys.nr += nr;
wb->inc.keys.nr -= nr;
out:
if (!wb->inc.keys.nr)
bch2_journal_pin_drop(j, &wb->inc.pin);
else
bch2_journal_pin_update(j, wb->inc.keys.data[0].journal_seq, &wb->inc.pin,
bch2_btree_write_buffer_journal_flush);
if (j->watermark) {
spin_lock(&j->lock);
bch2_journal_set_watermark(j);
spin_unlock(&j->lock);
}
BUG_ON(wb->sorted.size < wb->flushing.keys.nr);
}
static int bch2_btree_write_buffer_flush_locked(struct btree_trans *trans)
{ {
struct bch_fs *c = trans->c; struct bch_fs *c = trans->c;
struct journal *j = &c->journal; struct journal *j = &c->journal;
struct btree_write_buffer *wb = &c->btree_write_buffer; struct btree_write_buffer *wb = &c->btree_write_buffer;
struct journal_entry_pin pin; struct wb_key_ref *i;
struct btree_write_buffered_key *i, *keys;
struct btree_iter iter = { NULL }; struct btree_iter iter = { NULL };
size_t nr = 0, skipped = 0, fast = 0, slowpath = 0; size_t skipped = 0, fast = 0, slowpath = 0;
bool write_locked = false; bool write_locked = false;
union btree_write_buffer_state s;
int ret = 0; int ret = 0;
memset(&pin, 0, sizeof(pin)); bch2_trans_unlock(trans);
bch2_trans_begin(trans);
bch2_journal_pin_copy(j, &pin, &wb->journal_pin, mutex_lock(&wb->inc.lock);
bch2_btree_write_buffer_journal_flush); move_keys_from_inc_to_flushing(wb);
bch2_journal_pin_drop(j, &wb->journal_pin); mutex_unlock(&wb->inc.lock);
s = btree_write_buffer_switch(wb); for (size_t i = 0; i < wb->flushing.keys.nr; i++) {
keys = wb->keys[s.idx]; wb->sorted.data[i].idx = i;
nr = s.nr; wb->sorted.data[i].btree = wb->flushing.keys.data[i].btree;
memcpy(&wb->sorted.data[i].pos, &wb->flushing.keys.data[i].k.k.p, sizeof(struct bpos));
}
wb->sorted.nr = wb->flushing.keys.nr;
/* /*
* We first sort so that we can detect and skip redundant updates, and * We first sort so that we can detect and skip redundant updates, and
@ -177,33 +282,44 @@ int bch2_btree_write_buffer_flush_locked(struct btree_trans *trans)
* If that happens, simply skip the key so we can optimistically insert * If that happens, simply skip the key so we can optimistically insert
* as many keys as possible in the fast path. * as many keys as possible in the fast path.
*/ */
sort(keys, nr, sizeof(keys[0]), wb_sort(wb->sorted.data, wb->sorted.nr);
btree_write_buffered_key_cmp, NULL);
darray_for_each(wb->sorted, i) {
struct btree_write_buffered_key *k = &wb->flushing.keys.data[i->idx];
for (struct wb_key_ref *n = i + 1; n < min(i + 4, &darray_top(wb->sorted)); n++)
prefetch(&wb->flushing.keys.data[n->idx]);
BUG_ON(!k->journal_seq);
if (i + 1 < &darray_top(wb->sorted) &&
wb_key_eq(i, i + 1)) {
struct btree_write_buffered_key *n = &wb->flushing.keys.data[i[1].idx];
for (i = keys; i < keys + nr; i++) {
if (i + 1 < keys + nr &&
i[0].btree == i[1].btree &&
bpos_eq(i[0].k.k.p, i[1].k.k.p)) {
skipped++; skipped++;
i->journal_seq = 0; n->journal_seq = min_t(u64, n->journal_seq, k->journal_seq);
k->journal_seq = 0;
continue; continue;
} }
if (write_locked && if (write_locked) {
(iter.path->btree_id != i->btree || struct btree_path *path = btree_iter_path(trans, &iter);
bpos_gt(i->k.k.p, iter.path->l[0].b->key.k.p))) {
bch2_btree_node_unlock_write(trans, iter.path, iter.path->l[0].b); if (path->btree_id != i->btree ||
write_locked = false; bpos_gt(k->k.k.p, path->l[0].b->key.k.p)) {
bch2_btree_node_unlock_write(trans, path, path->l[0].b);
write_locked = false;
}
} }
if (!iter.path || iter.path->btree_id != i->btree) { if (!iter.path || iter.btree_id != k->btree) {
bch2_trans_iter_exit(trans, &iter); bch2_trans_iter_exit(trans, &iter);
bch2_trans_iter_init(trans, &iter, i->btree, i->k.k.p, bch2_trans_iter_init(trans, &iter, k->btree, k->k.k.p,
BTREE_ITER_INTENT|BTREE_ITER_ALL_SNAPSHOTS); BTREE_ITER_INTENT|BTREE_ITER_ALL_SNAPSHOTS);
} }
bch2_btree_iter_set_pos(&iter, i->k.k.p); bch2_btree_iter_set_pos(&iter, k->k.k.p);
iter.path->preserve = false; btree_iter_path(trans, &iter)->preserve = false;
do { do {
if (race_fault()) { if (race_fault()) {
@ -211,13 +327,13 @@ int bch2_btree_write_buffer_flush_locked(struct btree_trans *trans)
break; break;
} }
ret = wb_flush_one(trans, &iter, i, &write_locked, &fast); ret = wb_flush_one(trans, &iter, k, &write_locked, &fast);
if (!write_locked) if (!write_locked)
bch2_trans_begin(trans); bch2_trans_begin(trans);
} while (bch2_err_matches(ret, BCH_ERR_transaction_restart)); } while (bch2_err_matches(ret, BCH_ERR_transaction_restart));
if (!ret) { if (!ret) {
i->journal_seq = 0; k->journal_seq = 0;
} else if (ret == -BCH_ERR_journal_reclaim_would_deadlock) { } else if (ret == -BCH_ERR_journal_reclaim_would_deadlock) {
slowpath++; slowpath++;
ret = 0; ret = 0;
@ -225,8 +341,10 @@ int bch2_btree_write_buffer_flush_locked(struct btree_trans *trans)
break; break;
} }
if (write_locked) if (write_locked) {
bch2_btree_node_unlock_write(trans, iter.path, iter.path->l[0].b); struct btree_path *path = btree_iter_path(trans, &iter);
bch2_btree_node_unlock_write(trans, path, path->l[0].b);
}
bch2_trans_iter_exit(trans, &iter); bch2_trans_iter_exit(trans, &iter);
if (ret) if (ret)
@ -239,18 +357,17 @@ int bch2_btree_write_buffer_flush_locked(struct btree_trans *trans)
* The fastpath zapped the seq of keys that were successfully flushed so * The fastpath zapped the seq of keys that were successfully flushed so
* we can skip those here. * we can skip those here.
*/ */
trace_and_count(c, write_buffer_flush_slowpath, trans, slowpath, nr); trace_and_count(c, write_buffer_flush_slowpath, trans, slowpath, wb->flushing.keys.nr);
sort(keys, nr, sizeof(keys[0]), struct btree_write_buffered_key *i;
btree_write_buffered_journal_cmp, darray_for_each(wb->flushing.keys, i) {
NULL);
for (i = keys; i < keys + nr; i++) {
if (!i->journal_seq) if (!i->journal_seq)
continue; continue;
bch2_journal_pin_update(j, i->journal_seq, &pin, bch2_journal_pin_update(j, i->journal_seq, &wb->flushing.pin,
bch2_btree_write_buffer_journal_flush); bch2_btree_write_buffer_journal_flush);
bch2_trans_begin(trans);
ret = commit_do(trans, NULL, NULL, ret = commit_do(trans, NULL, NULL,
BCH_WATERMARK_reclaim| BCH_WATERMARK_reclaim|
@ -265,26 +382,67 @@ int bch2_btree_write_buffer_flush_locked(struct btree_trans *trans)
} }
err: err:
bch2_fs_fatal_err_on(ret, c, "%s: insert error %s", __func__, bch2_err_str(ret)); bch2_fs_fatal_err_on(ret, c, "%s: insert error %s", __func__, bch2_err_str(ret));
trace_write_buffer_flush(trans, nr, skipped, fast, wb->size); trace_write_buffer_flush(trans, wb->flushing.keys.nr, skipped, fast, 0);
bch2_journal_pin_drop(j, &pin); bch2_journal_pin_drop(j, &wb->flushing.pin);
wb->flushing.keys.nr = 0;
return ret; return ret;
} }
static int fetch_wb_keys_from_journal(struct bch_fs *c, u64 seq)
{
struct journal *j = &c->journal;
struct journal_buf *buf;
int ret = 0;
while (!ret && (buf = bch2_next_write_buffer_flush_journal_buf(j, seq))) {
ret = bch2_journal_keys_to_write_buffer(c, buf);
mutex_unlock(&j->buf_lock);
}
return ret;
}
static int btree_write_buffer_flush_seq(struct btree_trans *trans, u64 seq)
{
struct bch_fs *c = trans->c;
struct btree_write_buffer *wb = &c->btree_write_buffer;
int ret = 0, fetch_from_journal_err;
do {
bch2_trans_unlock(trans);
fetch_from_journal_err = fetch_wb_keys_from_journal(c, seq);
/*
* On memory allocation failure, bch2_btree_write_buffer_flush_locked()
* is not guaranteed to empty wb->inc:
*/
mutex_lock(&wb->flushing.lock);
ret = bch2_btree_write_buffer_flush_locked(trans);
mutex_unlock(&wb->flushing.lock);
} while (!ret &&
(fetch_from_journal_err ||
(wb->inc.pin.seq && wb->inc.pin.seq <= seq) ||
(wb->flushing.pin.seq && wb->flushing.pin.seq <= seq)));
return ret;
}
static int bch2_btree_write_buffer_journal_flush(struct journal *j,
struct journal_entry_pin *_pin, u64 seq)
{
struct bch_fs *c = container_of(j, struct bch_fs, journal);
return bch2_trans_run(c, btree_write_buffer_flush_seq(trans, seq));
}
int bch2_btree_write_buffer_flush_sync(struct btree_trans *trans) int bch2_btree_write_buffer_flush_sync(struct btree_trans *trans)
{ {
struct bch_fs *c = trans->c; struct bch_fs *c = trans->c;
if (!bch2_write_ref_tryget(c, BCH_WRITE_REF_btree_write_buffer))
return -BCH_ERR_erofs_no_writes;
trace_and_count(c, write_buffer_flush_sync, trans, _RET_IP_); trace_and_count(c, write_buffer_flush_sync, trans, _RET_IP_);
bch2_trans_unlock(trans); return btree_write_buffer_flush_seq(trans, journal_cur_seq(&c->journal));
mutex_lock(&c->btree_write_buffer.flush_lock);
int ret = bch2_btree_write_buffer_flush_locked(trans);
mutex_unlock(&c->btree_write_buffer.flush_lock);
bch2_write_ref_put(c, BCH_WRITE_REF_btree_write_buffer);
return ret;
} }
int bch2_btree_write_buffer_flush_nocheck_rw(struct btree_trans *trans) int bch2_btree_write_buffer_flush_nocheck_rw(struct btree_trans *trans)
@ -293,9 +451,9 @@ int bch2_btree_write_buffer_flush_nocheck_rw(struct btree_trans *trans)
struct btree_write_buffer *wb = &c->btree_write_buffer; struct btree_write_buffer *wb = &c->btree_write_buffer;
int ret = 0; int ret = 0;
if (mutex_trylock(&wb->flush_lock)) { if (mutex_trylock(&wb->flushing.lock)) {
ret = bch2_btree_write_buffer_flush_locked(trans); ret = bch2_btree_write_buffer_flush_locked(trans);
mutex_unlock(&wb->flush_lock); mutex_unlock(&wb->flushing.lock);
} }
return ret; return ret;
@ -313,90 +471,179 @@ int bch2_btree_write_buffer_tryflush(struct btree_trans *trans)
return ret; return ret;
} }
static int bch2_btree_write_buffer_journal_flush(struct journal *j, static void bch2_btree_write_buffer_flush_work(struct work_struct *work)
struct journal_entry_pin *_pin, u64 seq)
{ {
struct bch_fs *c = container_of(j, struct bch_fs, journal); struct bch_fs *c = container_of(work, struct bch_fs, btree_write_buffer.flush_work);
struct btree_write_buffer *wb = &c->btree_write_buffer; struct btree_write_buffer *wb = &c->btree_write_buffer;
int ret;
mutex_lock(&wb->flush_lock); mutex_lock(&wb->flushing.lock);
int ret = bch2_trans_run(c, bch2_btree_write_buffer_flush_locked(trans)); do {
mutex_unlock(&wb->flush_lock); ret = bch2_trans_run(c, bch2_btree_write_buffer_flush_locked(trans));
} while (!ret && bch2_btree_write_buffer_should_flush(c));
mutex_unlock(&wb->flushing.lock);
return ret; bch2_write_ref_put(c, BCH_WRITE_REF_btree_write_buffer);
} }
static inline u64 btree_write_buffer_ref(int idx) int __bch2_journal_key_to_wb(struct bch_fs *c,
struct journal_keys_to_wb *dst,
enum btree_id btree, struct bkey_i *k)
{ {
return ((union btree_write_buffer_state) {
.ref0 = idx == 0,
.ref1 = idx == 1,
}).v;
}
int bch2_btree_insert_keys_write_buffer(struct btree_trans *trans)
{
struct bch_fs *c = trans->c;
struct btree_write_buffer *wb = &c->btree_write_buffer; struct btree_write_buffer *wb = &c->btree_write_buffer;
struct btree_write_buffered_key *i; int ret;
union btree_write_buffer_state old, new; retry:
int ret = 0; ret = darray_make_room_gfp(&dst->wb->keys, 1, GFP_KERNEL);
u64 v; if (!ret && dst->wb == &wb->flushing)
ret = darray_resize(&wb->sorted, wb->flushing.keys.size);
trans_for_each_wb_update(trans, i) { if (unlikely(ret)) {
EBUG_ON(i->k.k.u64s > BTREE_WRITE_BUFERED_U64s_MAX); if (dst->wb == &c->btree_write_buffer.flushing) {
mutex_unlock(&dst->wb->lock);
dst->wb = &c->btree_write_buffer.inc;
bch2_journal_pin_add(&c->journal, dst->seq, &dst->wb->pin,
bch2_btree_write_buffer_journal_flush);
goto retry;
}
i->journal_seq = trans->journal_res.seq; return ret;
i->journal_offset = trans->journal_res.offset;
} }
preempt_disable(); dst->room = darray_room(dst->wb->keys);
v = READ_ONCE(wb->state.v); if (dst->wb == &wb->flushing)
do { dst->room = min(dst->room, wb->sorted.size - wb->flushing.keys.nr);
old.v = new.v = v; BUG_ON(!dst->room);
BUG_ON(!dst->seq);
new.v += btree_write_buffer_ref(new.idx); struct btree_write_buffered_key *wb_k = &darray_top(dst->wb->keys);
new.nr += trans->nr_wb_updates; wb_k->journal_seq = dst->seq;
if (new.nr > wb->size) { wb_k->btree = btree;
ret = -BCH_ERR_btree_insert_need_flush_buffer; bkey_copy(&wb_k->k, k);
goto out; dst->wb->keys.nr++;
dst->room--;
return 0;
}
void bch2_journal_keys_to_write_buffer_start(struct bch_fs *c, struct journal_keys_to_wb *dst, u64 seq)
{
struct btree_write_buffer *wb = &c->btree_write_buffer;
if (mutex_trylock(&wb->flushing.lock)) {
mutex_lock(&wb->inc.lock);
move_keys_from_inc_to_flushing(wb);
/*
* Attempt to skip wb->inc, and add keys directly to
* wb->flushing, saving us a copy later:
*/
if (!wb->inc.keys.nr) {
dst->wb = &wb->flushing;
} else {
mutex_unlock(&wb->flushing.lock);
dst->wb = &wb->inc;
} }
} while ((v = atomic64_cmpxchg_acquire(&wb->state.counter, old.v, new.v)) != old.v); } else {
mutex_lock(&wb->inc.lock);
dst->wb = &wb->inc;
}
memcpy(wb->keys[new.idx] + old.nr, dst->room = darray_room(dst->wb->keys);
trans->wb_updates, if (dst->wb == &wb->flushing)
sizeof(trans->wb_updates[0]) * trans->nr_wb_updates); dst->room = min(dst->room, wb->sorted.size - wb->flushing.keys.nr);
dst->seq = seq;
bch2_journal_pin_add(&c->journal, trans->journal_res.seq, &wb->journal_pin, bch2_journal_pin_add(&c->journal, seq, &dst->wb->pin,
bch2_btree_write_buffer_journal_flush); bch2_btree_write_buffer_journal_flush);
}
atomic64_sub_return_release(btree_write_buffer_ref(new.idx), &wb->state.counter); void bch2_journal_keys_to_write_buffer_end(struct bch_fs *c, struct journal_keys_to_wb *dst)
{
struct btree_write_buffer *wb = &c->btree_write_buffer;
if (!dst->wb->keys.nr)
bch2_journal_pin_drop(&c->journal, &dst->wb->pin);
if (bch2_btree_write_buffer_should_flush(c) &&
__bch2_write_ref_tryget(c, BCH_WRITE_REF_btree_write_buffer) &&
!queue_work(system_unbound_wq, &c->btree_write_buffer.flush_work))
bch2_write_ref_put(c, BCH_WRITE_REF_btree_write_buffer);
if (dst->wb == &wb->flushing)
mutex_unlock(&wb->flushing.lock);
mutex_unlock(&wb->inc.lock);
}
static int bch2_journal_keys_to_write_buffer(struct bch_fs *c, struct journal_buf *buf)
{
struct journal_keys_to_wb dst;
struct jset_entry *entry;
struct bkey_i *k;
int ret = 0;
bch2_journal_keys_to_write_buffer_start(c, &dst, le64_to_cpu(buf->data->seq));
for_each_jset_entry_type(entry, buf->data, BCH_JSET_ENTRY_write_buffer_keys) {
jset_entry_for_each_key(entry, k) {
ret = bch2_journal_key_to_wb(c, &dst, entry->btree_id, k);
if (ret)
goto out;
}
entry->type = BCH_JSET_ENTRY_btree_keys;
}
buf->need_flush_to_write_buffer = false;
out: out:
preempt_enable(); bch2_journal_keys_to_write_buffer_end(c, &dst);
return ret; return ret;
} }
static int wb_keys_resize(struct btree_write_buffer_keys *wb, size_t new_size)
{
if (wb->keys.size >= new_size)
return 0;
if (!mutex_trylock(&wb->lock))
return -EINTR;
int ret = darray_resize(&wb->keys, new_size);
mutex_unlock(&wb->lock);
return ret;
}
int bch2_btree_write_buffer_resize(struct bch_fs *c, size_t new_size)
{
struct btree_write_buffer *wb = &c->btree_write_buffer;
return wb_keys_resize(&wb->flushing, new_size) ?:
wb_keys_resize(&wb->inc, new_size);
}
void bch2_fs_btree_write_buffer_exit(struct bch_fs *c) void bch2_fs_btree_write_buffer_exit(struct bch_fs *c)
{ {
struct btree_write_buffer *wb = &c->btree_write_buffer; struct btree_write_buffer *wb = &c->btree_write_buffer;
BUG_ON(wb->state.nr && !bch2_journal_error(&c->journal)); BUG_ON((wb->inc.keys.nr || wb->flushing.keys.nr) &&
!bch2_journal_error(&c->journal));
kvfree(wb->keys[1]); darray_exit(&wb->sorted);
kvfree(wb->keys[0]); darray_exit(&wb->flushing.keys);
darray_exit(&wb->inc.keys);
} }
int bch2_fs_btree_write_buffer_init(struct bch_fs *c) int bch2_fs_btree_write_buffer_init(struct bch_fs *c)
{ {
struct btree_write_buffer *wb = &c->btree_write_buffer; struct btree_write_buffer *wb = &c->btree_write_buffer;
mutex_init(&wb->flush_lock); mutex_init(&wb->inc.lock);
wb->size = c->opts.btree_write_buffer_size; mutex_init(&wb->flushing.lock);
INIT_WORK(&wb->flush_work, bch2_btree_write_buffer_flush_work);
wb->keys[0] = kvmalloc_array(wb->size, sizeof(*wb->keys[0]), GFP_KERNEL); /* Will be resized by journal as needed: */
wb->keys[1] = kvmalloc_array(wb->size, sizeof(*wb->keys[1]), GFP_KERNEL); unsigned initial_size = 1 << 16;
if (!wb->keys[0] || !wb->keys[1])
return -BCH_ERR_ENOMEM_fs_btree_write_buffer_init;
return 0; return darray_make_room(&wb->inc.keys, initial_size) ?:
darray_make_room(&wb->flushing.keys, initial_size) ?:
darray_make_room(&wb->sorted, initial_size);
} }

View File

@ -2,13 +2,59 @@
#ifndef _BCACHEFS_BTREE_WRITE_BUFFER_H #ifndef _BCACHEFS_BTREE_WRITE_BUFFER_H
#define _BCACHEFS_BTREE_WRITE_BUFFER_H #define _BCACHEFS_BTREE_WRITE_BUFFER_H
int bch2_btree_write_buffer_flush_locked(struct btree_trans *); #include "bkey.h"
int bch2_btree_write_buffer_flush_nocheck_rw(struct btree_trans *);
static inline bool bch2_btree_write_buffer_should_flush(struct bch_fs *c)
{
struct btree_write_buffer *wb = &c->btree_write_buffer;
return wb->inc.keys.nr + wb->flushing.keys.nr > wb->inc.keys.size / 4;
}
static inline bool bch2_btree_write_buffer_must_wait(struct bch_fs *c)
{
struct btree_write_buffer *wb = &c->btree_write_buffer;
return wb->inc.keys.nr > wb->inc.keys.size * 3 / 4;
}
struct btree_trans;
int bch2_btree_write_buffer_flush_sync(struct btree_trans *); int bch2_btree_write_buffer_flush_sync(struct btree_trans *);
int bch2_btree_write_buffer_flush_nocheck_rw(struct btree_trans *);
int bch2_btree_write_buffer_tryflush(struct btree_trans *); int bch2_btree_write_buffer_tryflush(struct btree_trans *);
int bch2_btree_insert_keys_write_buffer(struct btree_trans *); struct journal_keys_to_wb {
struct btree_write_buffer_keys *wb;
size_t room;
u64 seq;
};
int __bch2_journal_key_to_wb(struct bch_fs *,
struct journal_keys_to_wb *,
enum btree_id, struct bkey_i *);
static inline int bch2_journal_key_to_wb(struct bch_fs *c,
struct journal_keys_to_wb *dst,
enum btree_id btree, struct bkey_i *k)
{
EBUG_ON(!dst->seq);
if (unlikely(!dst->room))
return __bch2_journal_key_to_wb(c, dst, btree, k);
struct btree_write_buffered_key *wb_k = &darray_top(dst->wb->keys);
wb_k->journal_seq = dst->seq;
wb_k->btree = btree;
bkey_copy(&wb_k->k, k);
dst->wb->keys.nr++;
dst->room--;
return 0;
}
void bch2_journal_keys_to_write_buffer_start(struct bch_fs *, struct journal_keys_to_wb *, u64);
void bch2_journal_keys_to_write_buffer_end(struct bch_fs *, struct journal_keys_to_wb *);
int bch2_btree_write_buffer_resize(struct bch_fs *, size_t);
void bch2_fs_btree_write_buffer_exit(struct bch_fs *); void bch2_fs_btree_write_buffer_exit(struct bch_fs *);
int bch2_fs_btree_write_buffer_init(struct bch_fs *); int bch2_fs_btree_write_buffer_init(struct bch_fs *);

View File

@ -2,43 +2,56 @@
#ifndef _BCACHEFS_BTREE_WRITE_BUFFER_TYPES_H #ifndef _BCACHEFS_BTREE_WRITE_BUFFER_TYPES_H
#define _BCACHEFS_BTREE_WRITE_BUFFER_TYPES_H #define _BCACHEFS_BTREE_WRITE_BUFFER_TYPES_H
#include "darray.h"
#include "journal_types.h" #include "journal_types.h"
#define BTREE_WRITE_BUFERED_VAL_U64s_MAX 4 #define BTREE_WRITE_BUFERED_VAL_U64s_MAX 4
#define BTREE_WRITE_BUFERED_U64s_MAX (BKEY_U64s + BTREE_WRITE_BUFERED_VAL_U64s_MAX) #define BTREE_WRITE_BUFERED_U64s_MAX (BKEY_U64s + BTREE_WRITE_BUFERED_VAL_U64s_MAX)
struct wb_key_ref {
union {
struct {
#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
unsigned idx:24;
u8 pos[sizeof(struct bpos)];
enum btree_id btree:8;
#else
enum btree_id btree:8;
u8 pos[sizeof(struct bpos)];
unsigned idx:24;
#endif
} __packed;
struct {
#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
u64 lo;
u64 mi;
u64 hi;
#else
u64 hi;
u64 mi;
u64 lo;
#endif
};
};
};
struct btree_write_buffered_key { struct btree_write_buffered_key {
u64 journal_seq; enum btree_id btree:8;
unsigned journal_offset; u64 journal_seq:56;
enum btree_id btree;
__BKEY_PADDED(k, BTREE_WRITE_BUFERED_VAL_U64s_MAX); __BKEY_PADDED(k, BTREE_WRITE_BUFERED_VAL_U64s_MAX);
}; };
union btree_write_buffer_state { struct btree_write_buffer_keys {
struct { DARRAY(struct btree_write_buffered_key) keys;
atomic64_t counter; struct journal_entry_pin pin;
}; struct mutex lock;
struct {
u64 v;
};
struct {
u64 nr:23;
u64 idx:1;
u64 ref0:20;
u64 ref1:20;
};
}; };
struct btree_write_buffer { struct btree_write_buffer {
struct mutex flush_lock; DARRAY(struct wb_key_ref) sorted;
struct journal_entry_pin journal_pin; struct btree_write_buffer_keys inc;
struct btree_write_buffer_keys flushing;
union btree_write_buffer_state state; struct work_struct flush_work;
size_t size;
struct btree_write_buffered_key *keys[2];
}; };
#endif /* _BCACHEFS_BTREE_WRITE_BUFFER_TYPES_H */ #endif /* _BCACHEFS_BTREE_WRITE_BUFFER_TYPES_H */

View File

@ -7,6 +7,7 @@
#include "chardev.h" #include "chardev.h"
#include "journal.h" #include "journal.h"
#include "move.h" #include "move.h"
#include "recovery.h"
#include "replicas.h" #include "replicas.h"
#include "super.h" #include "super.h"
#include "super-io.h" #include "super-io.h"
@ -19,6 +20,7 @@
#include <linux/ioctl.h> #include <linux/ioctl.h>
#include <linux/kthread.h> #include <linux/kthread.h>
#include <linux/major.h> #include <linux/major.h>
#include <linux/poll.h>
#include <linux/sched/task.h> #include <linux/sched/task.h>
#include <linux/slab.h> #include <linux/slab.h>
#include <linux/uaccess.h> #include <linux/uaccess.h>
@ -32,6 +34,7 @@ static int copy_to_user_errcode(void __user *to, const void *from, unsigned long
struct thread_with_file { struct thread_with_file {
struct task_struct *task; struct task_struct *task;
int ret; int ret;
bool done;
}; };
static void thread_with_file_exit(struct thread_with_file *thr) static void thread_with_file_exit(struct thread_with_file *thr)
@ -42,6 +45,7 @@ static void thread_with_file_exit(struct thread_with_file *thr)
} }
} }
__printf(4, 0)
static int run_thread_with_file(struct thread_with_file *thr, static int run_thread_with_file(struct thread_with_file *thr,
const struct file_operations *fops, const struct file_operations *fops,
int (*fn)(void *), const char *fmt, ...) int (*fn)(void *), const char *fmt, ...)
@ -227,6 +231,13 @@ static int bch2_fsck_thread_release(struct inode *inode, struct file *file)
return 0; return 0;
} }
static bool fsck_thread_ready(struct fsck_thread *thr)
{
return thr->output.buf.pos ||
thr->output2.nr ||
thr->thr.done;
}
static ssize_t bch2_fsck_thread_read(struct file *file, char __user *buf, static ssize_t bch2_fsck_thread_read(struct file *file, char __user *buf,
size_t len, loff_t *ppos) size_t len, loff_t *ppos)
{ {
@ -234,11 +245,18 @@ static ssize_t bch2_fsck_thread_read(struct file *file, char __user *buf,
size_t copied = 0, b; size_t copied = 0, b;
int ret = 0; int ret = 0;
if ((file->f_flags & O_NONBLOCK) &&
!fsck_thread_ready(thr))
return -EAGAIN;
ret = wait_event_interruptible(thr->output.wait, ret = wait_event_interruptible(thr->output.wait,
thr->output.buf.pos || thr->output2.nr); fsck_thread_ready(thr));
if (ret) if (ret)
return ret; return ret;
if (thr->thr.done)
return 0;
while (len) { while (len) {
ret = darray_make_room(&thr->output2, thr->output.buf.pos); ret = darray_make_room(&thr->output2, thr->output.buf.pos);
if (ret) if (ret)
@ -279,9 +297,21 @@ static ssize_t bch2_fsck_thread_read(struct file *file, char __user *buf,
return copied ?: ret; return copied ?: ret;
} }
static __poll_t bch2_fsck_thread_poll(struct file *file, struct poll_table_struct *wait)
{
struct fsck_thread *thr = container_of(file->private_data, struct fsck_thread, thr);
poll_wait(file, &thr->output.wait, wait);
return fsck_thread_ready(thr)
? EPOLLIN|EPOLLHUP
: 0;
}
static const struct file_operations fsck_thread_ops = { static const struct file_operations fsck_thread_ops = {
.release = bch2_fsck_thread_release, .release = bch2_fsck_thread_release,
.read = bch2_fsck_thread_read, .read = bch2_fsck_thread_read,
.poll = bch2_fsck_thread_poll,
.llseek = no_llseek, .llseek = no_llseek,
}; };
@ -293,6 +323,9 @@ static int bch2_fsck_offline_thread_fn(void *arg)
thr->thr.ret = PTR_ERR_OR_ZERO(c); thr->thr.ret = PTR_ERR_OR_ZERO(c);
if (!thr->thr.ret) if (!thr->thr.ret)
bch2_fs_stop(c); bch2_fs_stop(c);
thr->thr.done = true;
wake_up(&thr->output.wait);
return 0; return 0;
} }
@ -309,6 +342,9 @@ static long bch2_ioctl_fsck_offline(struct bch_ioctl_fsck_offline __user *user_a
if (arg.flags) if (arg.flags)
return -EINVAL; return -EINVAL;
if (!capable(CAP_SYS_ADMIN))
return -EPERM;
if (!(devs = kcalloc(arg.nr_devs, sizeof(*devs), GFP_KERNEL)) || if (!(devs = kcalloc(arg.nr_devs, sizeof(*devs), GFP_KERNEL)) ||
!(thr = kzalloc(sizeof(*thr), GFP_KERNEL)) || !(thr = kzalloc(sizeof(*thr), GFP_KERNEL)) ||
!(thr->devs = kcalloc(arg.nr_devs, sizeof(*thr->devs), GFP_KERNEL))) { !(thr->devs = kcalloc(arg.nr_devs, sizeof(*thr->devs), GFP_KERNEL))) {
@ -316,6 +352,7 @@ static long bch2_ioctl_fsck_offline(struct bch_ioctl_fsck_offline __user *user_a
goto err; goto err;
} }
thr->opts = bch2_opts_empty();
thr->nr_devs = arg.nr_devs; thr->nr_devs = arg.nr_devs;
thr->output.buf = PRINTBUF; thr->output.buf = PRINTBUF;
thr->output.buf.atomic++; thr->output.buf.atomic++;
@ -899,13 +936,28 @@ static int bch2_fsck_online_thread_fn(void *arg)
{ {
struct fsck_thread *thr = container_of(arg, struct fsck_thread, thr); struct fsck_thread *thr = container_of(arg, struct fsck_thread, thr);
struct bch_fs *c = thr->c; struct bch_fs *c = thr->c;
#if 0
struct bch_fs *c = bch2_fs_open(thr->devs, thr->nr_devs, thr->opts);
thr->thr.ret = PTR_ERR_OR_ZERO(c); c->output_filter = current;
if (!thr->thr.ret) c->output = &thr->output;
bch2_fs_stop(c);
#endif /*
* XXX: can we figure out a way to do this without mucking with c->opts?
*/
if (opt_defined(thr->opts, fix_errors))
c->opts.fix_errors = thr->opts.fix_errors;
c->opts.fsck = true;
c->curr_recovery_pass = BCH_RECOVERY_PASS_check_alloc_info;
bch2_run_online_recovery_passes(c);
c->output = NULL;
c->output_filter = NULL;
thr->thr.done = true;
wake_up(&thr->output.wait);
up(&c->online_fsck_mutex);
bch2_ro_ref_put(c);
return 0; return 0;
} }
@ -918,24 +970,54 @@ static long bch2_ioctl_fsck_online(struct bch_fs *c,
if (arg.flags) if (arg.flags)
return -EINVAL; return -EINVAL;
if (!capable(CAP_SYS_ADMIN))
return -EPERM;
if (!bch2_ro_ref_tryget(c))
return -EROFS;
if (down_trylock(&c->online_fsck_mutex)) {
bch2_ro_ref_put(c);
return -EAGAIN;
}
thr = kzalloc(sizeof(*thr), GFP_KERNEL); thr = kzalloc(sizeof(*thr), GFP_KERNEL);
if (!thr) if (!thr) {
return -ENOMEM; ret = -ENOMEM;
goto err;
}
thr->c = c; thr->c = c;
thr->opts = bch2_opts_empty();
thr->output.buf = PRINTBUF; thr->output.buf = PRINTBUF;
thr->output.buf.atomic++; thr->output.buf.atomic++;
spin_lock_init(&thr->output.lock); spin_lock_init(&thr->output.lock);
init_waitqueue_head(&thr->output.wait); init_waitqueue_head(&thr->output.wait);
darray_init(&thr->output2); darray_init(&thr->output2);
if (arg.opts) {
char *optstr = strndup_user((char __user *)(unsigned long) arg.opts, 1 << 16);
ret = PTR_ERR_OR_ZERO(optstr) ?:
bch2_parse_mount_opts(c, &thr->opts, optstr);
kfree(optstr);
if (ret)
goto err;
}
ret = run_thread_with_file(&thr->thr, ret = run_thread_with_file(&thr->thr,
&fsck_thread_ops, &fsck_thread_ops,
bch2_fsck_online_thread_fn, bch2_fsck_online_thread_fn,
"bch-fsck"); "bch-fsck");
bch_err_fn(c, ret); err:
if (ret < 0) if (ret < 0) {
bch2_fsck_thread_free(thr); bch_err_fn(c, ret);
if (thr)
bch2_fsck_thread_free(thr);
up(&c->online_fsck_mutex);
bch2_ro_ref_put(c);
}
return ret; return ret;
} }

View File

@ -95,6 +95,7 @@ void bch2_kthread_io_clock_wait(struct io_clock *clock,
unsigned long io_until, unsigned long io_until,
unsigned long cpu_timeout) unsigned long cpu_timeout)
{ {
bool kthread = (current->flags & PF_KTHREAD) != 0;
struct io_clock_wait wait; struct io_clock_wait wait;
wait.io_timer.expire = io_until; wait.io_timer.expire = io_until;
@ -110,7 +111,7 @@ void bch2_kthread_io_clock_wait(struct io_clock *clock,
while (1) { while (1) {
set_current_state(TASK_INTERRUPTIBLE); set_current_state(TASK_INTERRUPTIBLE);
if (kthread_should_stop()) if (kthread && kthread_should_stop())
break; break;
if (wait.expired) if (wait.expired)

View File

@ -574,7 +574,8 @@ int bch2_data_update_init(struct btree_trans *trans,
move_ctxt_wait_event(ctxt, move_ctxt_wait_event(ctxt,
(locked = bch2_bucket_nocow_trylock(&c->nocow_locks, (locked = bch2_bucket_nocow_trylock(&c->nocow_locks,
PTR_BUCKET_POS(c, &p.ptr), 0)) || PTR_BUCKET_POS(c, &p.ptr), 0)) ||
!atomic_read(&ctxt->read_sectors)); (!atomic_read(&ctxt->read_sectors) &&
!atomic_read(&ctxt->write_sectors)));
if (!locked) if (!locked)
bch2_bucket_nocow_lock(&c->nocow_locks, bch2_bucket_nocow_lock(&c->nocow_locks,

View File

@ -380,12 +380,13 @@ static ssize_t bch2_read_btree(struct file *file, char __user *buf,
return ret; return ret;
trans = bch2_trans_get(i->c); trans = bch2_trans_get(i->c);
ret = for_each_btree_key2(trans, iter, i->id, i->from, ret = for_each_btree_key(trans, iter, i->id, i->from,
BTREE_ITER_PREFETCH| BTREE_ITER_PREFETCH|
BTREE_ITER_ALL_SNAPSHOTS, k, ({ BTREE_ITER_ALL_SNAPSHOTS, k, ({
bch2_bkey_val_to_text(&i->buf, i->c, k); bch2_bkey_val_to_text(&i->buf, i->c, k);
prt_newline(&i->buf); prt_newline(&i->buf);
drop_locks_do(trans, flush_buf(i)); bch2_trans_unlock(trans);
flush_buf(i);
})); }));
i->from = iter.pos; i->from = iter.pos;
@ -477,10 +478,11 @@ static ssize_t bch2_read_bfloat_failed(struct file *file, char __user *buf,
trans = bch2_trans_get(i->c); trans = bch2_trans_get(i->c);
ret = for_each_btree_key2(trans, iter, i->id, i->from, ret = for_each_btree_key(trans, iter, i->id, i->from,
BTREE_ITER_PREFETCH| BTREE_ITER_PREFETCH|
BTREE_ITER_ALL_SNAPSHOTS, k, ({ BTREE_ITER_ALL_SNAPSHOTS, k, ({
struct btree_path_level *l = &iter.path->l[0]; struct btree_path_level *l =
&btree_iter_path(trans, &iter)->l[0];
struct bkey_packed *_k = struct bkey_packed *_k =
bch2_btree_node_iter_peek(&l->iter, l->b); bch2_btree_node_iter_peek(&l->iter, l->b);
@ -490,7 +492,8 @@ static ssize_t bch2_read_bfloat_failed(struct file *file, char __user *buf,
} }
bch2_bfloat_to_text(&i->buf, l->b, _k); bch2_bfloat_to_text(&i->buf, l->b, _k);
drop_locks_do(trans, flush_buf(i)); bch2_trans_unlock(trans);
flush_buf(i);
})); }));
i->from = iter.pos; i->from = iter.pos;
@ -616,7 +619,6 @@ static const struct file_operations cached_btree_nodes_ops = {
.read = bch2_cached_btree_nodes_read, .read = bch2_cached_btree_nodes_read,
}; };
#ifdef CONFIG_BCACHEFS_DEBUG_TRANSACTIONS
static ssize_t bch2_btree_transactions_read(struct file *file, char __user *buf, static ssize_t bch2_btree_transactions_read(struct file *file, char __user *buf,
size_t size, loff_t *ppos) size_t size, loff_t *ppos)
{ {
@ -632,7 +634,9 @@ static ssize_t bch2_btree_transactions_read(struct file *file, char __user *buf,
restart: restart:
seqmutex_lock(&c->btree_trans_lock); seqmutex_lock(&c->btree_trans_lock);
list_for_each_entry(trans, &c->btree_trans_list, list) { list_for_each_entry(trans, &c->btree_trans_list, list) {
if (trans->locking_wait.task->pid <= i->iter) struct task_struct *task = READ_ONCE(trans->locking_wait.task);
if (!task || task->pid <= i->iter)
continue; continue;
closure_get(&trans->ref); closure_get(&trans->ref);
@ -650,11 +654,11 @@ restart:
prt_printf(&i->buf, "backtrace:"); prt_printf(&i->buf, "backtrace:");
prt_newline(&i->buf); prt_newline(&i->buf);
printbuf_indent_add(&i->buf, 2); printbuf_indent_add(&i->buf, 2);
bch2_prt_task_backtrace(&i->buf, trans->locking_wait.task); bch2_prt_task_backtrace(&i->buf, task);
printbuf_indent_sub(&i->buf, 2); printbuf_indent_sub(&i->buf, 2);
prt_newline(&i->buf); prt_newline(&i->buf);
i->iter = trans->locking_wait.task->pid; i->iter = task->pid;
closure_put(&trans->ref); closure_put(&trans->ref);
@ -678,7 +682,6 @@ static const struct file_operations btree_transactions_ops = {
.release = bch2_dump_release, .release = bch2_dump_release,
.read = bch2_btree_transactions_read, .read = bch2_btree_transactions_read,
}; };
#endif /* CONFIG_BCACHEFS_DEBUG_TRANSACTIONS */
static ssize_t bch2_journal_pins_read(struct file *file, char __user *buf, static ssize_t bch2_journal_pins_read(struct file *file, char __user *buf,
size_t size, loff_t *ppos) size_t size, loff_t *ppos)
@ -835,7 +838,9 @@ static ssize_t bch2_btree_deadlock_read(struct file *file, char __user *buf,
restart: restart:
seqmutex_lock(&c->btree_trans_lock); seqmutex_lock(&c->btree_trans_lock);
list_for_each_entry(trans, &c->btree_trans_list, list) { list_for_each_entry(trans, &c->btree_trans_list, list) {
if (trans->locking_wait.task->pid <= i->iter) struct task_struct *task = READ_ONCE(trans->locking_wait.task);
if (!task || task->pid <= i->iter)
continue; continue;
closure_get(&trans->ref); closure_get(&trans->ref);
@ -850,7 +855,7 @@ restart:
bch2_check_for_deadlock(trans, &i->buf); bch2_check_for_deadlock(trans, &i->buf);
i->iter = trans->locking_wait.task->pid; i->iter = task->pid;
closure_put(&trans->ref); closure_put(&trans->ref);
@ -897,10 +902,8 @@ void bch2_fs_debug_init(struct bch_fs *c)
debugfs_create_file("cached_btree_nodes", 0400, c->fs_debug_dir, debugfs_create_file("cached_btree_nodes", 0400, c->fs_debug_dir,
c->btree_debug, &cached_btree_nodes_ops); c->btree_debug, &cached_btree_nodes_ops);
#ifdef CONFIG_BCACHEFS_DEBUG_TRANSACTIONS
debugfs_create_file("btree_transactions", 0400, c->fs_debug_dir, debugfs_create_file("btree_transactions", 0400, c->fs_debug_dir,
c->btree_debug, &btree_transactions_ops); c->btree_debug, &btree_transactions_ops);
#endif
debugfs_create_file("journal_pins", 0400, c->fs_debug_dir, debugfs_create_file("journal_pins", 0400, c->fs_debug_dir,
c->btree_debug, &journal_pins_ops); c->btree_debug, &journal_pins_ops);

View File

@ -486,20 +486,15 @@ retry:
return ret; return ret;
} }
int bch2_empty_dir_trans(struct btree_trans *trans, subvol_inum dir) int bch2_empty_dir_snapshot(struct btree_trans *trans, u64 dir, u32 snapshot)
{ {
struct btree_iter iter; struct btree_iter iter;
struct bkey_s_c k; struct bkey_s_c k;
u32 snapshot;
int ret; int ret;
ret = bch2_subvolume_get_snapshot(trans, dir.subvol, &snapshot);
if (ret)
return ret;
for_each_btree_key_upto_norestart(trans, iter, BTREE_ID_dirents, for_each_btree_key_upto_norestart(trans, iter, BTREE_ID_dirents,
SPOS(dir.inum, 0, snapshot), SPOS(dir, 0, snapshot),
POS(dir.inum, U64_MAX), 0, k, ret) POS(dir, U64_MAX), 0, k, ret)
if (k.k->type == KEY_TYPE_dirent) { if (k.k->type == KEY_TYPE_dirent) {
ret = -ENOTEMPTY; ret = -ENOTEMPTY;
break; break;
@ -509,6 +504,14 @@ int bch2_empty_dir_trans(struct btree_trans *trans, subvol_inum dir)
return ret; return ret;
} }
int bch2_empty_dir_trans(struct btree_trans *trans, subvol_inum dir)
{
u32 snapshot;
return bch2_subvolume_get_snapshot(trans, dir.subvol, &snapshot) ?:
bch2_empty_dir_snapshot(trans, dir.inum, snapshot);
}
int bch2_readdir(struct bch_fs *c, subvol_inum inum, struct dir_context *ctx) int bch2_readdir(struct bch_fs *c, subvol_inum inum, struct dir_context *ctx)
{ {
struct btree_trans *trans = bch2_trans_get(c); struct btree_trans *trans = bch2_trans_get(c);

View File

@ -65,6 +65,7 @@ u64 bch2_dirent_lookup(struct bch_fs *, subvol_inum,
const struct bch_hash_info *, const struct bch_hash_info *,
const struct qstr *, subvol_inum *); const struct qstr *, subvol_inum *);
int bch2_empty_dir_snapshot(struct btree_trans *, u64, u32);
int bch2_empty_dir_trans(struct btree_trans *, subvol_inum); int bch2_empty_dir_trans(struct btree_trans *, subvol_inum);
int bch2_readdir(struct bch_fs *, subvol_inum, struct dir_context *); int bch2_readdir(struct bch_fs *, subvol_inum, struct dir_context *);

View File

@ -1005,7 +1005,7 @@ static int ec_stripe_update_extents(struct bch_fs *c, struct ec_stripe_buf *s)
unsigned i, nr_data = v->nr_blocks - v->nr_redundant; unsigned i, nr_data = v->nr_blocks - v->nr_redundant;
int ret = 0; int ret = 0;
ret = bch2_btree_write_buffer_flush_nocheck_rw(trans); ret = bch2_btree_write_buffer_flush_sync(trans);
if (ret) if (ret)
goto err; goto err;
@ -1833,7 +1833,6 @@ void bch2_fs_ec_flush(struct bch_fs *c)
int bch2_stripes_read(struct bch_fs *c) int bch2_stripes_read(struct bch_fs *c)
{ {
struct btree_trans *trans = bch2_trans_get(c);
struct btree_iter iter; struct btree_iter iter;
struct bkey_s_c k; struct bkey_s_c k;
const struct bch_stripe *s; const struct bch_stripe *s;
@ -1841,36 +1840,33 @@ int bch2_stripes_read(struct bch_fs *c)
unsigned i; unsigned i;
int ret; int ret;
for_each_btree_key(trans, iter, BTREE_ID_stripes, POS_MIN, ret = bch2_trans_run(c,
BTREE_ITER_PREFETCH, k, ret) { for_each_btree_key(trans, iter, BTREE_ID_stripes, POS_MIN,
if (k.k->type != KEY_TYPE_stripe) BTREE_ITER_PREFETCH, k, ({
continue; if (k.k->type != KEY_TYPE_stripe)
continue;
ret = __ec_stripe_mem_alloc(c, k.k->p.offset, GFP_KERNEL); ret = __ec_stripe_mem_alloc(c, k.k->p.offset, GFP_KERNEL);
if (ret) if (ret)
break; break;
s = bkey_s_c_to_stripe(k).v; s = bkey_s_c_to_stripe(k).v;
m = genradix_ptr(&c->stripes, k.k->p.offset); m = genradix_ptr(&c->stripes, k.k->p.offset);
m->sectors = le16_to_cpu(s->sectors); m->sectors = le16_to_cpu(s->sectors);
m->algorithm = s->algorithm; m->algorithm = s->algorithm;
m->nr_blocks = s->nr_blocks; m->nr_blocks = s->nr_blocks;
m->nr_redundant = s->nr_redundant; m->nr_redundant = s->nr_redundant;
m->blocks_nonempty = 0; m->blocks_nonempty = 0;
for (i = 0; i < s->nr_blocks; i++) for (i = 0; i < s->nr_blocks; i++)
m->blocks_nonempty += !!stripe_blockcount_get(s, i); m->blocks_nonempty += !!stripe_blockcount_get(s, i);
bch2_stripes_heap_insert(c, m, k.k->p.offset); bch2_stripes_heap_insert(c, m, k.k->p.offset);
} 0;
bch2_trans_iter_exit(trans, &iter); })));
bch2_trans_put(trans);
if (ret)
bch_err_fn(c, ret);
bch_err_fn(c, ret);
return ret; return ret;
} }

View File

@ -150,7 +150,6 @@
x(BCH_ERR_btree_insert_fail, btree_insert_need_mark_replicas) \ x(BCH_ERR_btree_insert_fail, btree_insert_need_mark_replicas) \
x(BCH_ERR_btree_insert_fail, btree_insert_need_journal_res) \ x(BCH_ERR_btree_insert_fail, btree_insert_need_journal_res) \
x(BCH_ERR_btree_insert_fail, btree_insert_need_journal_reclaim) \ x(BCH_ERR_btree_insert_fail, btree_insert_need_journal_reclaim) \
x(BCH_ERR_btree_insert_fail, btree_insert_need_flush_buffer) \
x(0, backpointer_to_overwritten_btree_node) \ x(0, backpointer_to_overwritten_btree_node) \
x(0, lock_fail_root_changed) \ x(0, lock_fail_root_changed) \
x(0, journal_reclaim_would_deadlock) \ x(0, journal_reclaim_would_deadlock) \

View File

@ -157,6 +157,7 @@ void bch2_flush_fsck_errs(struct bch_fs *);
#define fsck_err_on(cond, c, _err_type, ...) \ #define fsck_err_on(cond, c, _err_type, ...) \
__fsck_err_on(cond, c, FSCK_CAN_FIX|FSCK_CAN_IGNORE, _err_type, __VA_ARGS__) __fsck_err_on(cond, c, FSCK_CAN_FIX|FSCK_CAN_IGNORE, _err_type, __VA_ARGS__)
__printf(4, 0)
static inline void bch2_bkey_fsck_err(struct bch_fs *c, static inline void bch2_bkey_fsck_err(struct bch_fs *c,
struct printbuf *err_msg, struct printbuf *err_msg,
enum bch_sb_error_id err_type, enum bch_sb_error_id err_type,
@ -167,7 +168,6 @@ static inline void bch2_bkey_fsck_err(struct bch_fs *c,
va_start(args, fmt); va_start(args, fmt);
prt_vprintf(err_msg, fmt, args); prt_vprintf(err_msg, fmt, args);
va_end(args); va_end(args);
} }
#define bkey_fsck_err(c, _err_msg, _err_type, ...) \ #define bkey_fsck_err(c, _err_msg, _err_type, ...) \

View File

@ -1294,7 +1294,8 @@ unsigned bch2_bkey_ptrs_need_rebalance(struct bch_fs *c, struct bkey_s_c k,
unsigned i = 0; unsigned i = 0;
bkey_for_each_ptr_decode(k.k, ptrs, p, entry) { bkey_for_each_ptr_decode(k.k, ptrs, p, entry) {
if (p.crc.compression_type == BCH_COMPRESSION_TYPE_incompressible) { if (p.crc.compression_type == BCH_COMPRESSION_TYPE_incompressible ||
p.ptr.unwritten) {
rewrite_ptrs = 0; rewrite_ptrs = 0;
goto incompressible; goto incompressible;
} }

View File

@ -192,13 +192,17 @@ int bch2_fsync(struct file *file, loff_t start, loff_t end, int datasync)
{ {
struct bch_inode_info *inode = file_bch_inode(file); struct bch_inode_info *inode = file_bch_inode(file);
struct bch_fs *c = inode->v.i_sb->s_fs_info; struct bch_fs *c = inode->v.i_sb->s_fs_info;
int ret, ret2, ret3; int ret;
ret = file_write_and_wait_range(file, start, end); ret = file_write_and_wait_range(file, start, end);
ret2 = sync_inode_metadata(&inode->v, 1); if (ret)
ret3 = bch2_flush_inode(c, inode); goto out;
ret = sync_inode_metadata(&inode->v, 1);
return bch2_err_class(ret ?: ret2 ?: ret3); if (ret)
goto out;
ret = bch2_flush_inode(c, inode);
out:
return bch2_err_class(ret);
} }
/* truncate: */ /* truncate: */

View File

@ -333,10 +333,6 @@ static long __bch2_ioctl_subvolume_create(struct bch_fs *c, struct file *filp,
(arg.flags & BCH_SUBVOL_SNAPSHOT_RO))) (arg.flags & BCH_SUBVOL_SNAPSHOT_RO)))
return -EINVAL; return -EINVAL;
if ((arg.flags & BCH_SUBVOL_SNAPSHOT_CREATE) &&
!arg.src_ptr)
return -EOPNOTSUPP;
if (arg.flags & BCH_SUBVOL_SNAPSHOT_CREATE) if (arg.flags & BCH_SUBVOL_SNAPSHOT_CREATE)
create_flags |= BCH_CREATE_SNAPSHOT; create_flags |= BCH_CREATE_SNAPSHOT;
@ -409,7 +405,7 @@ retry:
if ((arg.flags & BCH_SUBVOL_SNAPSHOT_CREATE) && if ((arg.flags & BCH_SUBVOL_SNAPSHOT_CREATE) &&
!arg.src_ptr) !arg.src_ptr)
snapshot_src.subvol = to_bch_ei(dir)->ei_inode.bi_subvol; snapshot_src.subvol = inode_inum(to_bch_ei(dir)).subvol;
inode = __bch2_create(file_mnt_idmap(filp), to_bch_ei(dir), inode = __bch2_create(file_mnt_idmap(filp), to_bch_ei(dir),
dst_dentry, arg.mode|S_IFDIR, dst_dentry, arg.mode|S_IFDIR,

View File

@ -1143,24 +1143,33 @@ static int bch2_encode_fh(struct inode *vinode, u32 *fh, int *len,
{ {
struct bch_inode_info *inode = to_bch_ei(vinode); struct bch_inode_info *inode = to_bch_ei(vinode);
struct bch_inode_info *dir = to_bch_ei(vdir); struct bch_inode_info *dir = to_bch_ei(vdir);
int min_len;
if (*len < sizeof(struct bcachefs_fid_with_parent) / sizeof(u32))
return FILEID_INVALID;
if (!S_ISDIR(inode->v.i_mode) && dir) { if (!S_ISDIR(inode->v.i_mode) && dir) {
struct bcachefs_fid_with_parent *fid = (void *) fh; struct bcachefs_fid_with_parent *fid = (void *) fh;
min_len = sizeof(*fid) / sizeof(u32);
if (*len < min_len) {
*len = min_len;
return FILEID_INVALID;
}
fid->fid = bch2_inode_to_fid(inode); fid->fid = bch2_inode_to_fid(inode);
fid->dir = bch2_inode_to_fid(dir); fid->dir = bch2_inode_to_fid(dir);
*len = sizeof(*fid) / sizeof(u32); *len = min_len;
return FILEID_BCACHEFS_WITH_PARENT; return FILEID_BCACHEFS_WITH_PARENT;
} else { } else {
struct bcachefs_fid *fid = (void *) fh; struct bcachefs_fid *fid = (void *) fh;
min_len = sizeof(*fid) / sizeof(u32);
if (*len < min_len) {
*len = min_len;
return FILEID_INVALID;
}
*fid = bch2_inode_to_fid(inode); *fid = bch2_inode_to_fid(inode);
*len = sizeof(*fid) / sizeof(u32); *len = min_len;
return FILEID_BCACHEFS_WITHOUT_PARENT; return FILEID_BCACHEFS_WITHOUT_PARENT;
} }
} }
@ -1733,6 +1742,9 @@ static int bch2_unfreeze(struct super_block *sb)
struct bch_fs *c = sb->s_fs_info; struct bch_fs *c = sb->s_fs_info;
int ret; int ret;
if (test_bit(BCH_FS_emergency_ro, &c->flags))
return 0;
down_write(&c->state_lock); down_write(&c->state_lock);
ret = bch2_fs_read_write(c); ret = bch2_fs_read_write(c);
up_write(&c->state_lock); up_write(&c->state_lock);

View File

@ -589,14 +589,13 @@ static int get_inodes_all_snapshots(struct btree_trans *trans,
struct bch_fs *c = trans->c; struct bch_fs *c = trans->c;
struct btree_iter iter; struct btree_iter iter;
struct bkey_s_c k; struct bkey_s_c k;
u32 restart_count = trans->restart_count;
int ret; int ret;
w->recalculate_sums = false; w->recalculate_sums = false;
w->inodes.nr = 0; w->inodes.nr = 0;
for_each_btree_key(trans, iter, BTREE_ID_inodes, POS(0, inum), for_each_btree_key_norestart(trans, iter, BTREE_ID_inodes, POS(0, inum),
BTREE_ITER_ALL_SNAPSHOTS, k, ret) { BTREE_ITER_ALL_SNAPSHOTS, k, ret) {
if (k.k->p.offset != inum) if (k.k->p.offset != inum)
break; break;
@ -609,8 +608,7 @@ static int get_inodes_all_snapshots(struct btree_trans *trans,
return ret; return ret;
w->first_this_inode = true; w->first_this_inode = true;
return 0;
return trans_was_restarted(trans, restart_count);
} }
static struct inode_walker_entry * static struct inode_walker_entry *
@ -1212,7 +1210,7 @@ static int overlapping_extents_found(struct btree_trans *trans,
swap(k1, k2); swap(k1, k2);
} }
trans->extra_journal_res += bch2_bkey_sectors_compressed(k2); trans->extra_disk_res += bch2_bkey_sectors_compressed(k2);
ret = bch2_trans_update_extent_overwrite(trans, old_iter, ret = bch2_trans_update_extent_overwrite(trans, old_iter,
BTREE_UPDATE_INTERNAL_SNAPSHOT_NODE, BTREE_UPDATE_INTERNAL_SNAPSHOT_NODE,
@ -1705,7 +1703,7 @@ static int check_dirent(struct btree_trans *trans, struct btree_iter *iter,
goto err; goto err;
} }
BUG_ON(!iter->path->should_be_locked); BUG_ON(!btree_iter_path(trans, iter)->should_be_locked);
i = walk_inode(trans, dir, equiv, k.k->type == KEY_TYPE_whiteout); i = walk_inode(trans, dir, equiv, k.k->type == KEY_TYPE_whiteout);
ret = PTR_ERR_OR_ZERO(i); ret = PTR_ERR_OR_ZERO(i);
@ -1952,14 +1950,10 @@ static int check_root_trans(struct btree_trans *trans)
root_subvol.v.flags = 0; root_subvol.v.flags = 0;
root_subvol.v.snapshot = cpu_to_le32(snapshot); root_subvol.v.snapshot = cpu_to_le32(snapshot);
root_subvol.v.inode = cpu_to_le64(inum); root_subvol.v.inode = cpu_to_le64(inum);
ret = commit_do(trans, NULL, NULL, ret = bch2_btree_insert_trans(trans, BTREE_ID_subvolumes, &root_subvol.k_i, 0);
BCH_TRANS_COMMIT_no_enospc,
bch2_btree_insert_trans(trans, BTREE_ID_subvolumes,
&root_subvol.k_i, 0));
bch_err_msg(c, ret, "writing root subvol"); bch_err_msg(c, ret, "writing root subvol");
if (ret) if (ret)
goto err; goto err;
} }
ret = __lookup_inode(trans, BCACHEFS_ROOT_INO, &root_inode, &snapshot); ret = __lookup_inode(trans, BCACHEFS_ROOT_INO, &root_inode, &snapshot);
@ -1986,9 +1980,7 @@ fsck_err:
/* Get root directory, create if it doesn't exist: */ /* Get root directory, create if it doesn't exist: */
int bch2_check_root(struct bch_fs *c) int bch2_check_root(struct bch_fs *c)
{ {
int ret; int ret = bch2_trans_do(c, NULL, NULL, BCH_TRANS_COMMIT_no_enospc,
ret = bch2_trans_do(c, NULL, NULL, BCH_TRANS_COMMIT_no_enospc,
check_root_trans(trans)); check_root_trans(trans));
bch_err_fn(c, ret); bch_err_fn(c, ret);
return ret; return ret;
@ -2146,19 +2138,14 @@ int bch2_check_directory_structure(struct bch_fs *c)
pathbuf path = { 0, }; pathbuf path = { 0, };
int ret; int ret;
for_each_btree_key(trans, iter, BTREE_ID_inodes, POS_MIN, for_each_btree_key_old(trans, iter, BTREE_ID_inodes, POS_MIN,
BTREE_ITER_INTENT| BTREE_ITER_INTENT|
BTREE_ITER_PREFETCH| BTREE_ITER_PREFETCH|
BTREE_ITER_ALL_SNAPSHOTS, k, ret) { BTREE_ITER_ALL_SNAPSHOTS, k, ret) {
if (!bkey_is_inode(k.k)) if (!bkey_is_inode(k.k))
continue; continue;
ret = bch2_inode_unpack(k, &u); BUG_ON(bch2_inode_unpack(k, &u));
if (ret) {
/* Should have been caught earlier in fsck: */
bch_err(c, "error unpacking inode %llu: %i", k.k->p.offset, ret);
break;
}
if (u.bi_flags & BCH_INODE_unlinked) if (u.bi_flags & BCH_INODE_unlinked)
continue; continue;
@ -2170,6 +2157,7 @@ int bch2_check_directory_structure(struct bch_fs *c)
bch2_trans_iter_exit(trans, &iter); bch2_trans_iter_exit(trans, &iter);
bch2_trans_put(trans); bch2_trans_put(trans);
darray_exit(&path); darray_exit(&path);
bch_err_fn(c, ret); bch_err_fn(c, ret);
return ret; return ret;
} }
@ -2255,47 +2243,42 @@ static int check_nlinks_find_hardlinks(struct bch_fs *c,
struct nlink_table *t, struct nlink_table *t,
u64 start, u64 *end) u64 start, u64 *end)
{ {
struct btree_trans *trans = bch2_trans_get(c);
struct btree_iter iter; struct btree_iter iter;
struct bkey_s_c k; struct bkey_s_c k;
struct bch_inode_unpacked u; struct bch_inode_unpacked u;
int ret = 0;
for_each_btree_key(trans, iter, BTREE_ID_inodes, int ret = bch2_trans_run(c,
POS(0, start), for_each_btree_key(trans, iter, BTREE_ID_inodes,
BTREE_ITER_INTENT| POS(0, start),
BTREE_ITER_PREFETCH| BTREE_ITER_INTENT|
BTREE_ITER_ALL_SNAPSHOTS, k, ret) { BTREE_ITER_PREFETCH|
if (!bkey_is_inode(k.k)) BTREE_ITER_ALL_SNAPSHOTS, k, ({
continue; if (!bkey_is_inode(k.k))
continue;
/* Should never fail, checked by bch2_inode_invalid: */ /* Should never fail, checked by bch2_inode_invalid: */
BUG_ON(bch2_inode_unpack(k, &u)); BUG_ON(bch2_inode_unpack(k, &u));
/* /*
* Backpointer and directory structure checks are sufficient for * Backpointer and directory structure checks are sufficient for
* directories, since they can't have hardlinks: * directories, since they can't have hardlinks:
*/ */
if (S_ISDIR(u.bi_mode)) if (S_ISDIR(u.bi_mode))
continue; continue;
if (!u.bi_nlink) if (!u.bi_nlink)
continue; continue;
ret = add_nlink(c, t, k.k->p.offset, k.k->p.snapshot); ret = add_nlink(c, t, k.k->p.offset, k.k->p.snapshot);
if (ret) { if (ret) {
*end = k.k->p.offset; *end = k.k->p.offset;
ret = 0; ret = 0;
break; break;
} }
0;
} })));
bch2_trans_iter_exit(trans, &iter);
bch2_trans_put(trans);
if (ret)
bch_err(c, "error in fsck: btree error %i while walking inodes", ret);
bch_err_fn(c, ret);
return ret; return ret;
} }
@ -2303,42 +2286,39 @@ noinline_for_stack
static int check_nlinks_walk_dirents(struct bch_fs *c, struct nlink_table *links, static int check_nlinks_walk_dirents(struct bch_fs *c, struct nlink_table *links,
u64 range_start, u64 range_end) u64 range_start, u64 range_end)
{ {
struct btree_trans *trans = bch2_trans_get(c);
struct snapshots_seen s; struct snapshots_seen s;
struct btree_iter iter; struct btree_iter iter;
struct bkey_s_c k; struct bkey_s_c k;
struct bkey_s_c_dirent d; struct bkey_s_c_dirent d;
int ret;
snapshots_seen_init(&s); snapshots_seen_init(&s);
for_each_btree_key(trans, iter, BTREE_ID_dirents, POS_MIN, int ret = bch2_trans_run(c,
BTREE_ITER_INTENT| for_each_btree_key(trans, iter, BTREE_ID_dirents, POS_MIN,
BTREE_ITER_PREFETCH| BTREE_ITER_INTENT|
BTREE_ITER_ALL_SNAPSHOTS, k, ret) { BTREE_ITER_PREFETCH|
ret = snapshots_seen_update(c, &s, iter.btree_id, k.k->p); BTREE_ITER_ALL_SNAPSHOTS, k, ({
if (ret) ret = snapshots_seen_update(c, &s, iter.btree_id, k.k->p);
break; if (ret)
break;
switch (k.k->type) { switch (k.k->type) {
case KEY_TYPE_dirent: case KEY_TYPE_dirent:
d = bkey_s_c_to_dirent(k); d = bkey_s_c_to_dirent(k);
if (d.v->d_type != DT_DIR && if (d.v->d_type != DT_DIR &&
d.v->d_type != DT_SUBVOL) d.v->d_type != DT_SUBVOL)
inc_link(c, &s, links, range_start, range_end, inc_link(c, &s, links, range_start, range_end,
le64_to_cpu(d.v->d_inum), le64_to_cpu(d.v->d_inum),
bch2_snapshot_equiv(c, d.k->p.snapshot)); bch2_snapshot_equiv(c, d.k->p.snapshot));
break; break;
} }
} 0;
bch2_trans_iter_exit(trans, &iter); })));
if (ret)
bch_err(c, "error in fsck: btree error %i while walking dirents", ret);
bch2_trans_put(trans);
snapshots_seen_exit(&s); snapshots_seen_exit(&s);
bch_err_fn(c, ret);
return ret; return ret;
} }

View File

@ -7,6 +7,7 @@
#include "btree_update.h" #include "btree_update.h"
#include "buckets.h" #include "buckets.h"
#include "compress.h" #include "compress.h"
#include "dirent.h"
#include "error.h" #include "error.h"
#include "extents.h" #include "extents.h"
#include "extent_update.h" #include "extent_update.h"
@ -1093,11 +1094,15 @@ static int may_delete_deleted_inode(struct btree_trans *trans,
if (ret) if (ret)
goto out; goto out;
if (fsck_err_on(S_ISDIR(inode.bi_mode), c, if (S_ISDIR(inode.bi_mode)) {
deleted_inode_is_dir, ret = bch2_empty_dir_snapshot(trans, pos.offset, pos.snapshot);
"directory %llu:%u in deleted_inodes btree", if (fsck_err_on(ret == -ENOTEMPTY, c, deleted_inode_is_dir,
pos.offset, pos.snapshot)) "non empty directory %llu:%u in deleted_inodes btree",
goto delete; pos.offset, pos.snapshot))
goto delete;
if (ret)
goto out;
}
if (fsck_err_on(!(inode.bi_flags & BCH_INODE_unlinked), c, if (fsck_err_on(!(inode.bi_flags & BCH_INODE_unlinked), c,
deleted_inode_not_unlinked, deleted_inode_not_unlinked,
@ -1163,29 +1168,29 @@ again:
* but we can't retry because the btree write buffer won't have been * but we can't retry because the btree write buffer won't have been
* flushed and we'd spin: * flushed and we'd spin:
*/ */
for_each_btree_key(trans, iter, BTREE_ID_deleted_inodes, POS_MIN, ret = for_each_btree_key_commit(trans, iter, BTREE_ID_deleted_inodes, POS_MIN,
BTREE_ITER_PREFETCH|BTREE_ITER_ALL_SNAPSHOTS, k, ret) { BTREE_ITER_PREFETCH|BTREE_ITER_ALL_SNAPSHOTS, k,
ret = commit_do(trans, NULL, NULL, NULL, NULL, BCH_TRANS_COMMIT_no_enospc, ({
BCH_TRANS_COMMIT_no_enospc| ret = may_delete_deleted_inode(trans, &iter, k.k->p, &need_another_pass);
BCH_TRANS_COMMIT_lazy_rw, if (ret > 0) {
may_delete_deleted_inode(trans, &iter, k.k->p, &need_another_pass));
if (ret < 0)
break;
if (ret) {
if (!test_bit(BCH_FS_rw, &c->flags)) {
bch2_trans_unlock(trans);
bch2_fs_lazy_rw(c);
}
bch_verbose(c, "deleting unlinked inode %llu:%u", k.k->p.offset, k.k->p.snapshot); bch_verbose(c, "deleting unlinked inode %llu:%u", k.k->p.offset, k.k->p.snapshot);
ret = bch2_inode_rm_snapshot(trans, k.k->p.offset, k.k->p.snapshot); ret = bch2_inode_rm_snapshot(trans, k.k->p.offset, k.k->p.snapshot);
if (ret && !bch2_err_matches(ret, BCH_ERR_transaction_restart)) /*
break; * We don't want to loop here: a transaction restart
* error here means we handled a transaction restart and
* we're actually done, but if we loop we'll retry the
* same key because the write buffer hasn't been flushed
* yet
*/
if (bch2_err_matches(ret, BCH_ERR_transaction_restart)) {
ret = 0;
continue;
}
} }
}
bch2_trans_iter_exit(trans, &iter); ret;
}));
if (!ret && need_another_pass) { if (!ret && need_another_pass) {
ret = bch2_btree_write_buffer_flush_sync(trans); ret = bch2_btree_write_buffer_flush_sync(trans);

View File

@ -10,6 +10,7 @@
#include "bkey_methods.h" #include "bkey_methods.h"
#include "btree_gc.h" #include "btree_gc.h"
#include "btree_update.h" #include "btree_update.h"
#include "btree_write_buffer.h"
#include "buckets.h" #include "buckets.h"
#include "error.h" #include "error.h"
#include "journal.h" #include "journal.h"
@ -251,7 +252,7 @@ static bool journal_entry_want_write(struct journal *j)
return ret; return ret;
} }
static bool journal_entry_close(struct journal *j) bool bch2_journal_entry_close(struct journal *j)
{ {
bool ret; bool ret;
@ -332,6 +333,7 @@ static int journal_entry_open(struct journal *j)
buf->must_flush = false; buf->must_flush = false;
buf->separate_flush = false; buf->separate_flush = false;
buf->flush_time = 0; buf->flush_time = 0;
buf->need_flush_to_write_buffer = true;
memset(buf->data, 0, sizeof(*buf->data)); memset(buf->data, 0, sizeof(*buf->data));
buf->data->seq = cpu_to_le64(journal_cur_seq(j)); buf->data->seq = cpu_to_le64(journal_cur_seq(j));
@ -380,7 +382,7 @@ static bool journal_quiesced(struct journal *j)
bool ret = atomic64_read(&j->seq) == j->seq_ondisk; bool ret = atomic64_read(&j->seq) == j->seq_ondisk;
if (!ret) if (!ret)
journal_entry_close(j); bch2_journal_entry_close(j);
return ret; return ret;
} }
@ -433,7 +435,7 @@ retry:
/* /*
* Recheck after taking the lock, so we don't race with another thread * Recheck after taking the lock, so we don't race with another thread
* that just did journal_entry_open() and call journal_entry_close() * that just did journal_entry_open() and call bch2_journal_entry_close()
* unnecessarily * unnecessarily
*/ */
if (journal_res_get_fast(j, res, flags)) { if (journal_res_get_fast(j, res, flags)) {
@ -768,6 +770,48 @@ void bch2_journal_block(struct journal *j)
journal_quiesce(j); journal_quiesce(j);
} }
static struct journal_buf *__bch2_next_write_buffer_flush_journal_buf(struct journal *j, u64 max_seq)
{
struct journal_buf *ret = NULL;
mutex_lock(&j->buf_lock);
spin_lock(&j->lock);
max_seq = min(max_seq, journal_cur_seq(j));
for (u64 seq = journal_last_unwritten_seq(j);
seq <= max_seq;
seq++) {
unsigned idx = seq & JOURNAL_BUF_MASK;
struct journal_buf *buf = j->buf + idx;
if (buf->need_flush_to_write_buffer) {
if (seq == journal_cur_seq(j))
__journal_entry_close(j, JOURNAL_ENTRY_CLOSED_VAL);
union journal_res_state s;
s.v = atomic64_read_acquire(&j->reservations.counter);
ret = journal_state_count(s, idx)
? ERR_PTR(-EAGAIN)
: buf;
break;
}
}
spin_unlock(&j->lock);
if (IS_ERR_OR_NULL(ret))
mutex_unlock(&j->buf_lock);
return ret;
}
struct journal_buf *bch2_next_write_buffer_flush_journal_buf(struct journal *j, u64 max_seq)
{
struct journal_buf *ret;
wait_event(j->wait, (ret = __bch2_next_write_buffer_flush_journal_buf(j, max_seq)) != ERR_PTR(-EAGAIN));
return ret;
}
/* allocate journal on a device: */ /* allocate journal on a device: */
static int __bch2_set_nr_journal_buckets(struct bch_dev *ca, unsigned nr, static int __bch2_set_nr_journal_buckets(struct bch_dev *ca, unsigned nr,
@ -1035,7 +1079,7 @@ void bch2_fs_journal_stop(struct journal *j)
bch2_journal_reclaim_stop(j); bch2_journal_reclaim_stop(j);
bch2_journal_flush_all_pins(j); bch2_journal_flush_all_pins(j);
wait_event(j->wait, journal_entry_close(j)); wait_event(j->wait, bch2_journal_entry_close(j));
/* /*
* Always write a new journal entry, to make sure the clock hands are up * Always write a new journal entry, to make sure the clock hands are up
@ -1219,6 +1263,7 @@ int bch2_fs_journal_init(struct journal *j)
static struct lock_class_key res_key; static struct lock_class_key res_key;
unsigned i; unsigned i;
mutex_init(&j->buf_lock);
spin_lock_init(&j->lock); spin_lock_init(&j->lock);
spin_lock_init(&j->err_lock); spin_lock_init(&j->err_lock);
init_waitqueue_head(&j->wait); init_waitqueue_head(&j->wait);

View File

@ -265,6 +265,7 @@ static inline union journal_res_state journal_state_buf_put(struct journal *j, u
return s; return s;
} }
bool bch2_journal_entry_close(struct journal *);
void bch2_journal_buf_put_final(struct journal *, u64, bool); void bch2_journal_buf_put_final(struct journal *, u64, bool);
static inline void __bch2_journal_buf_put(struct journal *j, unsigned idx, u64 seq) static inline void __bch2_journal_buf_put(struct journal *j, unsigned idx, u64 seq)
@ -424,6 +425,7 @@ static inline void bch2_journal_set_replay_done(struct journal *j)
void bch2_journal_unblock(struct journal *); void bch2_journal_unblock(struct journal *);
void bch2_journal_block(struct journal *); void bch2_journal_block(struct journal *);
struct journal_buf *bch2_next_write_buffer_flush_journal_buf(struct journal *j, u64 max_seq);
void __bch2_journal_debug_to_text(struct printbuf *, struct journal *); void __bch2_journal_debug_to_text(struct printbuf *, struct journal *);
void bch2_journal_debug_to_text(struct printbuf *, struct journal *); void bch2_journal_debug_to_text(struct printbuf *, struct journal *);

View File

@ -4,6 +4,7 @@
#include "alloc_foreground.h" #include "alloc_foreground.h"
#include "btree_io.h" #include "btree_io.h"
#include "btree_update_interior.h" #include "btree_update_interior.h"
#include "btree_write_buffer.h"
#include "buckets.h" #include "buckets.h"
#include "checksum.h" #include "checksum.h"
#include "disk_groups.h" #include "disk_groups.h"
@ -721,6 +722,22 @@ static void journal_entry_overwrite_to_text(struct printbuf *out, struct bch_fs
journal_entry_btree_keys_to_text(out, c, entry); journal_entry_btree_keys_to_text(out, c, entry);
} }
static int journal_entry_write_buffer_keys_validate(struct bch_fs *c,
struct jset *jset,
struct jset_entry *entry,
unsigned version, int big_endian,
enum bkey_invalid_flags flags)
{
return journal_entry_btree_keys_validate(c, jset, entry,
version, big_endian, READ);
}
static void journal_entry_write_buffer_keys_to_text(struct printbuf *out, struct bch_fs *c,
struct jset_entry *entry)
{
journal_entry_btree_keys_to_text(out, c, entry);
}
struct jset_entry_ops { struct jset_entry_ops {
int (*validate)(struct bch_fs *, struct jset *, int (*validate)(struct bch_fs *, struct jset *,
struct jset_entry *, unsigned, int, struct jset_entry *, unsigned, int,
@ -1501,6 +1518,8 @@ done:
static void journal_buf_realloc(struct journal *j, struct journal_buf *buf) static void journal_buf_realloc(struct journal *j, struct journal_buf *buf)
{ {
struct bch_fs *c = container_of(j, struct bch_fs, journal);
/* we aren't holding j->lock: */ /* we aren't holding j->lock: */
unsigned new_size = READ_ONCE(j->buf_size_want); unsigned new_size = READ_ONCE(j->buf_size_want);
void *new_buf; void *new_buf;
@ -1508,6 +1527,11 @@ static void journal_buf_realloc(struct journal *j, struct journal_buf *buf)
if (buf->buf_size >= new_size) if (buf->buf_size >= new_size)
return; return;
size_t btree_write_buffer_size = new_size / 64;
if (bch2_btree_write_buffer_resize(c, btree_write_buffer_size))
return;
new_buf = kvpmalloc(new_size, GFP_NOFS|__GFP_NOWARN); new_buf = kvpmalloc(new_size, GFP_NOFS|__GFP_NOWARN);
if (!new_buf) if (!new_buf)
return; return;
@ -1597,6 +1621,7 @@ static CLOSURE_CALLBACK(journal_write_done)
} while ((v = atomic64_cmpxchg(&j->reservations.counter, } while ((v = atomic64_cmpxchg(&j->reservations.counter,
old.v, new.v)) != old.v); old.v, new.v)) != old.v);
bch2_journal_reclaim_fast(j);
bch2_journal_space_available(j); bch2_journal_space_available(j);
track_event_change(&c->times[BCH_TIME_blocked_journal_max_in_flight], track_event_change(&c->times[BCH_TIME_blocked_journal_max_in_flight],
@ -1698,11 +1723,13 @@ static CLOSURE_CALLBACK(do_journal_write)
static int bch2_journal_write_prep(struct journal *j, struct journal_buf *w) static int bch2_journal_write_prep(struct journal *j, struct journal_buf *w)
{ {
struct bch_fs *c = container_of(j, struct bch_fs, journal); struct bch_fs *c = container_of(j, struct bch_fs, journal);
struct jset_entry *start, *end, *i, *next, *prev = NULL; struct jset_entry *start, *end, *i;
struct jset *jset = w->data; struct jset *jset = w->data;
struct journal_keys_to_wb wb = { NULL };
unsigned sectors, bytes, u64s; unsigned sectors, bytes, u64s;
bool validate_before_checksum = false;
unsigned long btree_roots_have = 0; unsigned long btree_roots_have = 0;
bool validate_before_checksum = false;
u64 seq = le64_to_cpu(jset->seq);
int ret; int ret;
/* /*
@ -1713,7 +1740,7 @@ static int bch2_journal_write_prep(struct journal *j, struct journal_buf *w)
* If we wanted to be really fancy here, we could sort all the keys in * If we wanted to be really fancy here, we could sort all the keys in
* the jset and drop keys that were overwritten - probably not worth it: * the jset and drop keys that were overwritten - probably not worth it:
*/ */
vstruct_for_each_safe(jset, i, next) { vstruct_for_each(jset, i) {
unsigned u64s = le16_to_cpu(i->u64s); unsigned u64s = le16_to_cpu(i->u64s);
/* Empty entry: */ /* Empty entry: */
@ -1730,40 +1757,40 @@ static int bch2_journal_write_prep(struct journal *j, struct journal_buf *w)
* to c->btree_roots we have to get any missing btree roots and * to c->btree_roots we have to get any missing btree roots and
* add them to this journal entry: * add them to this journal entry:
*/ */
if (i->type == BCH_JSET_ENTRY_btree_root) { switch (i->type) {
case BCH_JSET_ENTRY_btree_root:
bch2_journal_entry_to_btree_root(c, i); bch2_journal_entry_to_btree_root(c, i);
__set_bit(i->btree_id, &btree_roots_have); __set_bit(i->btree_id, &btree_roots_have);
} break;
case BCH_JSET_ENTRY_write_buffer_keys:
EBUG_ON(!w->need_flush_to_write_buffer);
/* Can we merge with previous entry? */ if (!wb.wb)
if (prev && bch2_journal_keys_to_write_buffer_start(c, &wb, seq);
i->btree_id == prev->btree_id &&
i->level == prev->level &&
i->type == prev->type &&
i->type == BCH_JSET_ENTRY_btree_keys &&
le16_to_cpu(prev->u64s) + u64s <= U16_MAX) {
memmove_u64s_down(vstruct_next(prev),
i->_data,
u64s);
le16_add_cpu(&prev->u64s, u64s);
continue;
}
/* Couldn't merge, move i into new position (after prev): */ struct bkey_i *k;
prev = prev ? vstruct_next(prev) : jset->start; jset_entry_for_each_key(i, k) {
if (i != prev) ret = bch2_journal_key_to_wb(c, &wb, i->btree_id, k);
memmove_u64s_down(prev, i, jset_u64s(u64s)); if (ret) {
bch2_fs_fatal_error(c, "-ENOMEM flushing journal keys to btree write buffer");
bch2_journal_keys_to_write_buffer_end(c, &wb);
return ret;
}
}
i->type = BCH_JSET_ENTRY_btree_keys;
break;
}
} }
prev = prev ? vstruct_next(prev) : jset->start; if (wb.wb)
jset->u64s = cpu_to_le32((u64 *) prev - jset->_data); bch2_journal_keys_to_write_buffer_end(c, &wb);
w->need_flush_to_write_buffer = false;
start = end = vstruct_last(jset); start = end = vstruct_last(jset);
end = bch2_btree_roots_to_journal_entries(c, end, btree_roots_have); end = bch2_btree_roots_to_journal_entries(c, end, btree_roots_have);
bch2_journal_super_entries_add_common(c, &end, bch2_journal_super_entries_add_common(c, &end, seq);
le64_to_cpu(jset->seq));
u64s = (u64 *) end - (u64 *) start; u64s = (u64 *) end - (u64 *) start;
BUG_ON(u64s > j->entry_u64s_reserved); BUG_ON(u64s > j->entry_u64s_reserved);
@ -1786,7 +1813,7 @@ static int bch2_journal_write_prep(struct journal *j, struct journal_buf *w)
SET_JSET_CSUM_TYPE(jset, bch2_meta_checksum_type(c)); SET_JSET_CSUM_TYPE(jset, bch2_meta_checksum_type(c));
if (!JSET_NO_FLUSH(jset) && journal_entry_empty(jset)) if (!JSET_NO_FLUSH(jset) && journal_entry_empty(jset))
j->last_empty_seq = le64_to_cpu(jset->seq); j->last_empty_seq = seq;
if (bch2_csum_type_is_encryption(JSET_CSUM_TYPE(jset))) if (bch2_csum_type_is_encryption(JSET_CSUM_TYPE(jset)))
validate_before_checksum = true; validate_before_checksum = true;
@ -1882,9 +1909,11 @@ CLOSURE_CALLBACK(bch2_journal_write)
if (ret) if (ret)
goto err; goto err;
mutex_lock(&j->buf_lock);
journal_buf_realloc(j, w); journal_buf_realloc(j, w);
ret = bch2_journal_write_prep(j, w); ret = bch2_journal_write_prep(j, w);
mutex_unlock(&j->buf_lock);
if (ret) if (ret)
goto err; goto err;

View File

@ -3,6 +3,7 @@
#include "bcachefs.h" #include "bcachefs.h"
#include "btree_key_cache.h" #include "btree_key_cache.h"
#include "btree_update.h" #include "btree_update.h"
#include "btree_write_buffer.h"
#include "buckets.h" #include "buckets.h"
#include "errcode.h" #include "errcode.h"
#include "error.h" #include "error.h"
@ -50,20 +51,23 @@ unsigned bch2_journal_dev_buckets_available(struct journal *j,
return available; return available;
} }
static inline void journal_set_watermark(struct journal *j) void bch2_journal_set_watermark(struct journal *j)
{ {
struct bch_fs *c = container_of(j, struct bch_fs, journal); struct bch_fs *c = container_of(j, struct bch_fs, journal);
bool low_on_space = j->space[journal_space_clean].total * 4 <= bool low_on_space = j->space[journal_space_clean].total * 4 <=
j->space[journal_space_total].total; j->space[journal_space_total].total;
bool low_on_pin = fifo_free(&j->pin) < j->pin.size / 4; bool low_on_pin = fifo_free(&j->pin) < j->pin.size / 4;
unsigned watermark = low_on_space || low_on_pin bool low_on_wb = bch2_btree_write_buffer_must_wait(c);
unsigned watermark = low_on_space || low_on_pin || low_on_wb
? BCH_WATERMARK_reclaim ? BCH_WATERMARK_reclaim
: BCH_WATERMARK_stripe; : BCH_WATERMARK_stripe;
if (track_event_change(&c->times[BCH_TIME_blocked_journal_low_on_space], if (track_event_change(&c->times[BCH_TIME_blocked_journal_low_on_space],
&j->low_on_space_start, low_on_space) || &j->low_on_space_start, low_on_space) ||
track_event_change(&c->times[BCH_TIME_blocked_journal_low_on_pin], track_event_change(&c->times[BCH_TIME_blocked_journal_low_on_pin],
&j->low_on_pin_start, low_on_pin)) &j->low_on_pin_start, low_on_pin) ||
track_event_change(&c->times[BCH_TIME_blocked_write_buffer_full],
&j->write_buffer_full_start, low_on_wb))
trace_and_count(c, journal_full, c); trace_and_count(c, journal_full, c);
swap(watermark, j->watermark); swap(watermark, j->watermark);
@ -230,7 +234,7 @@ void bch2_journal_space_available(struct journal *j)
else else
clear_bit(JOURNAL_MAY_SKIP_FLUSH, &j->flags); clear_bit(JOURNAL_MAY_SKIP_FLUSH, &j->flags);
journal_set_watermark(j); bch2_journal_set_watermark(j);
out: out:
j->cur_entry_sectors = !ret ? j->space[journal_space_discarded].next_entry : 0; j->cur_entry_sectors = !ret ? j->space[journal_space_discarded].next_entry : 0;
j->cur_entry_error = ret; j->cur_entry_error = ret;
@ -303,6 +307,7 @@ void bch2_journal_reclaim_fast(struct journal *j)
* all btree nodes got written out * all btree nodes got written out
*/ */
while (!fifo_empty(&j->pin) && while (!fifo_empty(&j->pin) &&
j->pin.front <= j->seq_ondisk &&
!atomic_read(&fifo_peek_front(&j->pin).count)) { !atomic_read(&fifo_peek_front(&j->pin).count)) {
j->pin.front++; j->pin.front++;
popped = true; popped = true;
@ -635,6 +640,7 @@ static u64 journal_seq_to_flush(struct journal *j)
static int __bch2_journal_reclaim(struct journal *j, bool direct, bool kicked) static int __bch2_journal_reclaim(struct journal *j, bool direct, bool kicked)
{ {
struct bch_fs *c = container_of(j, struct bch_fs, journal); struct bch_fs *c = container_of(j, struct bch_fs, journal);
bool kthread = (current->flags & PF_KTHREAD) != 0;
u64 seq_to_flush; u64 seq_to_flush;
size_t min_nr, min_key_cache, nr_flushed; size_t min_nr, min_key_cache, nr_flushed;
unsigned flags; unsigned flags;
@ -650,7 +656,7 @@ static int __bch2_journal_reclaim(struct journal *j, bool direct, bool kicked)
flags = memalloc_noreclaim_save(); flags = memalloc_noreclaim_save();
do { do {
if (kthread_should_stop()) if (kthread && kthread_should_stop())
break; break;
if (bch2_journal_error(j)) { if (bch2_journal_error(j)) {
@ -816,6 +822,9 @@ static int journal_flush_done(struct journal *j, u64 seq_to_flush,
(1U << JOURNAL_PIN_btree), 0, 0, 0)) (1U << JOURNAL_PIN_btree), 0, 0, 0))
*did_work = true; *did_work = true;
if (seq_to_flush > journal_cur_seq(j))
bch2_journal_entry_close(j);
spin_lock(&j->lock); spin_lock(&j->lock);
/* /*
* If journal replay hasn't completed, the unreplayed journal entries * If journal replay hasn't completed, the unreplayed journal entries

View File

@ -16,6 +16,7 @@ static inline void journal_reclaim_kick(struct journal *j)
unsigned bch2_journal_dev_buckets_available(struct journal *, unsigned bch2_journal_dev_buckets_available(struct journal *,
struct journal_device *, struct journal_device *,
enum journal_space_from); enum journal_space_from);
void bch2_journal_set_watermark(struct journal *);
void bch2_journal_space_available(struct journal *); void bch2_journal_space_available(struct journal *);
static inline bool journal_pin_active(struct journal_entry_pin *pin) static inline bool journal_pin_active(struct journal_entry_pin *pin)

View File

@ -36,6 +36,7 @@ struct journal_buf {
bool noflush; /* write has already been kicked off, and was noflush */ bool noflush; /* write has already been kicked off, and was noflush */
bool must_flush; /* something wants a flush */ bool must_flush; /* something wants a flush */
bool separate_flush; bool separate_flush;
bool need_flush_to_write_buffer;
}; };
/* /*
@ -181,6 +182,12 @@ struct journal {
*/ */
darray_u64 early_journal_entries; darray_u64 early_journal_entries;
/*
* Protects journal_buf->data, when accessing without a jorunal
* reservation: for synchronization between the btree write buffer code
* and the journal write path:
*/
struct mutex buf_lock;
/* /*
* Two journal entries -- one is currently open for new entries, the * Two journal entries -- one is currently open for new entries, the
* other is possibly being written out. * other is possibly being written out.
@ -270,6 +277,7 @@ struct journal {
u64 low_on_space_start; u64 low_on_space_start;
u64 low_on_pin_start; u64 low_on_pin_start;
u64 max_in_flight_start; u64 max_in_flight_start;
u64 write_buffer_full_start;
struct bch2_time_stats *flush_write_time; struct bch2_time_stats *flush_write_time;
struct bch2_time_stats *noflush_write_time; struct bch2_time_stats *noflush_write_time;

View File

@ -59,8 +59,9 @@ int bch2_resume_logged_ops(struct bch_fs *c)
int ret; int ret;
ret = bch2_trans_run(c, ret = bch2_trans_run(c,
for_each_btree_key2(trans, iter, for_each_btree_key(trans, iter,
BTREE_ID_logged_ops, POS_MIN, BTREE_ITER_PREFETCH, k, BTREE_ID_logged_ops, POS_MIN,
BTREE_ITER_PREFETCH, k,
resume_logged_op(trans, &iter, k))); resume_logged_op(trans, &iter, k)));
if (ret) if (ret)
bch_err_fn(c, ret); bch_err_fn(c, ret);

View File

@ -377,8 +377,8 @@ struct bch_io_opts *bch2_move_get_io_opts(struct btree_trans *trans,
io_opts->d.nr = 0; io_opts->d.nr = 0;
for_each_btree_key(trans, iter, BTREE_ID_inodes, POS(0, extent_k.k->p.inode), ret = for_each_btree_key(trans, iter, BTREE_ID_inodes, POS(0, extent_k.k->p.inode),
BTREE_ITER_ALL_SNAPSHOTS, k, ret) { BTREE_ITER_ALL_SNAPSHOTS, k, ({
if (k.k->p.offset != extent_k.k->p.inode) if (k.k->p.offset != extent_k.k->p.inode)
break; break;
@ -391,11 +391,8 @@ struct bch_io_opts *bch2_move_get_io_opts(struct btree_trans *trans,
struct snapshot_io_opts_entry e = { .snapshot = k.k->p.snapshot }; struct snapshot_io_opts_entry e = { .snapshot = k.k->p.snapshot };
bch2_inode_opts_get(&e.io_opts, trans->c, &inode); bch2_inode_opts_get(&e.io_opts, trans->c, &inode);
ret = darray_push(&io_opts->d, e); darray_push(&io_opts->d, e);
if (ret) }));
break;
}
bch2_trans_iter_exit(trans, &iter);
io_opts->cur_inum = extent_k.k->p.inode; io_opts->cur_inum = extent_k.k->p.inode;
} }
@ -449,25 +446,26 @@ int bch2_move_get_io_opts_one(struct btree_trans *trans,
int bch2_move_ratelimit(struct moving_context *ctxt) int bch2_move_ratelimit(struct moving_context *ctxt)
{ {
struct bch_fs *c = ctxt->trans->c; struct bch_fs *c = ctxt->trans->c;
bool is_kthread = current->flags & PF_KTHREAD;
u64 delay; u64 delay;
if (ctxt->wait_on_copygc && c->copygc_running) { if (ctxt->wait_on_copygc && c->copygc_running) {
bch2_moving_ctxt_flush_all(ctxt); bch2_moving_ctxt_flush_all(ctxt);
wait_event_killable(c->copygc_running_wq, wait_event_killable(c->copygc_running_wq,
!c->copygc_running || !c->copygc_running ||
kthread_should_stop()); (is_kthread && kthread_should_stop()));
} }
do { do {
delay = ctxt->rate ? bch2_ratelimit_delay(ctxt->rate) : 0; delay = ctxt->rate ? bch2_ratelimit_delay(ctxt->rate) : 0;
if (kthread_should_stop()) if (is_kthread && kthread_should_stop())
return 1; return 1;
if (delay) if (delay)
move_ctxt_wait_event_timeout(ctxt, move_ctxt_wait_event_timeout(ctxt,
freezing(current) || freezing(current) ||
kthread_should_stop(), (is_kthread && kthread_should_stop()),
delay); delay);
if (unlikely(freezing(current))) { if (unlikely(freezing(current))) {
@ -642,6 +640,7 @@ int bch2_evacuate_bucket(struct moving_context *ctxt,
{ {
struct btree_trans *trans = ctxt->trans; struct btree_trans *trans = ctxt->trans;
struct bch_fs *c = trans->c; struct bch_fs *c = trans->c;
bool is_kthread = current->flags & PF_KTHREAD;
struct bch_io_opts io_opts = bch2_opts_to_inode_opts(c->opts); struct bch_io_opts io_opts = bch2_opts_to_inode_opts(c->opts);
struct btree_iter iter; struct btree_iter iter;
struct bkey_buf sk; struct bkey_buf sk;
@ -686,7 +685,7 @@ int bch2_evacuate_bucket(struct moving_context *ctxt,
goto err; goto err;
while (!(ret = bch2_move_ratelimit(ctxt))) { while (!(ret = bch2_move_ratelimit(ctxt))) {
if (kthread_should_stop()) if (is_kthread && kthread_should_stop())
break; break;
bch2_trans_begin(trans); bch2_trans_begin(trans);
@ -804,6 +803,7 @@ static int bch2_move_btree(struct bch_fs *c,
move_btree_pred pred, void *arg, move_btree_pred pred, void *arg,
struct bch_move_stats *stats) struct bch_move_stats *stats)
{ {
bool kthread = (current->flags & PF_KTHREAD) != 0;
struct bch_io_opts io_opts = bch2_opts_to_inode_opts(c->opts); struct bch_io_opts io_opts = bch2_opts_to_inode_opts(c->opts);
struct moving_context ctxt; struct moving_context ctxt;
struct btree_trans *trans; struct btree_trans *trans;
@ -835,7 +835,7 @@ retry:
while (bch2_trans_begin(trans), while (bch2_trans_begin(trans),
(b = bch2_btree_iter_peek_node(&iter)) && (b = bch2_btree_iter_peek_node(&iter)) &&
!(ret = PTR_ERR_OR_ZERO(b))) { !(ret = PTR_ERR_OR_ZERO(b))) {
if (kthread_should_stop()) if (kthread && kthread_should_stop())
break; break;
if ((cmp_int(btree, end.btree) ?: if ((cmp_int(btree, end.btree) ?:
@ -860,7 +860,7 @@ next:
bch2_trans_iter_exit(trans, &iter); bch2_trans_iter_exit(trans, &iter);
if (kthread_should_stop()) if (kthread && kthread_should_stop())
break; break;
} }

View File

@ -233,11 +233,6 @@ enum fsck_err_opts {
OPT_BOOL(), \ OPT_BOOL(), \
BCH2_NO_SB_OPT, true, \ BCH2_NO_SB_OPT, true, \
NULL, "Stash pointer to in memory btree node in btree ptr")\ NULL, "Stash pointer to in memory btree node in btree ptr")\
x(btree_write_buffer_size, u32, \
OPT_FS|OPT_MOUNT, \
OPT_UINT(16, (1U << 20) - 1), \
BCH2_NO_SB_OPT, 1U << 13, \
NULL, "Number of btree write buffer entries") \
x(gc_reserve_percent, u8, \ x(gc_reserve_percent, u8, \
OPT_FS|OPT_FORMAT|OPT_MOUNT|OPT_RUNTIME, \ OPT_FS|OPT_FORMAT|OPT_MOUNT|OPT_RUNTIME, \
OPT_UINT(5, 21), \ OPT_UINT(5, 21), \
@ -423,7 +418,7 @@ enum fsck_err_opts {
0, \ 0, \
OPT_UINT(0, S64_MAX), \ OPT_UINT(0, S64_MAX), \
BCH2_NO_SB_OPT, false, \ BCH2_NO_SB_OPT, false, \
NULL, "Allocate the buckets_nouse bitmap") \ NULL, "Pointer to a struct log_output") \
x(project, u8, \ x(project, u8, \
OPT_INODE, \ OPT_INODE, \
OPT_BOOL(), \ OPT_BOOL(), \

View File

@ -617,11 +617,11 @@ int bch2_fs_quota_read(struct bch_fs *c)
trans = bch2_trans_get(c); trans = bch2_trans_get(c);
ret = for_each_btree_key2(trans, iter, BTREE_ID_quotas, ret = for_each_btree_key(trans, iter, BTREE_ID_quotas, POS_MIN,
POS_MIN, BTREE_ITER_PREFETCH, k, BTREE_ITER_PREFETCH, k,
__bch2_quota_set(c, k, NULL)) ?: __bch2_quota_set(c, k, NULL)) ?:
for_each_btree_key2(trans, iter, BTREE_ID_inodes, for_each_btree_key(trans, iter, BTREE_ID_inodes, POS_MIN,
POS_MIN, BTREE_ITER_PREFETCH|BTREE_ITER_ALL_SNAPSHOTS, k, BTREE_ITER_PREFETCH|BTREE_ITER_ALL_SNAPSHOTS, k,
bch2_fs_quota_read_inode(trans, &iter, k)); bch2_fs_quota_read_inode(trans, &iter, k));
bch2_trans_put(trans); bch2_trans_put(trans);

View File

@ -334,7 +334,7 @@ static int do_rebalance(struct moving_context *ctxt)
while (!bch2_move_ratelimit(ctxt)) { while (!bch2_move_ratelimit(ctxt)) {
if (!r->enabled) { if (!r->enabled) {
bch2_moving_ctxt_flush_all(ctxt); bch2_moving_ctxt_flush_all(ctxt);
kthread_wait_freezable(c->copy_gc_enabled || kthread_wait_freezable(r->enabled ||
kthread_should_stop()); kthread_should_stop());
} }

View File

@ -150,7 +150,7 @@ static int bch2_journal_replay(struct bch_fs *c)
u64 start_seq = c->journal_replay_seq_start; u64 start_seq = c->journal_replay_seq_start;
u64 end_seq = c->journal_replay_seq_start; u64 end_seq = c->journal_replay_seq_start;
struct btree_trans *trans = bch2_trans_get(c); struct btree_trans *trans = bch2_trans_get(c);
int ret; int ret = 0;
if (keys->nr) { if (keys->nr) {
ret = bch2_journal_log_msg(c, "Starting journal replay (%zu keys in entries %llu-%llu)", ret = bch2_journal_log_msg(c, "Starting journal replay (%zu keys in entries %llu-%llu)",
@ -533,7 +533,8 @@ static int bch2_set_may_go_rw(struct bch_fs *c)
keys->gap = keys->nr; keys->gap = keys->nr;
set_bit(BCH_FS_may_go_rw, &c->flags); set_bit(BCH_FS_may_go_rw, &c->flags);
if (keys->nr || c->opts.fsck)
if (keys->nr || c->opts.fsck || !c->sb.clean)
return bch2_fs_read_write_early(c); return bch2_fs_read_write_early(c);
return 0; return 0;
} }
@ -634,7 +635,7 @@ u64 bch2_fsck_recovery_passes(void)
static bool should_run_recovery_pass(struct bch_fs *c, enum bch_recovery_pass pass) static bool should_run_recovery_pass(struct bch_fs *c, enum bch_recovery_pass pass)
{ {
struct recovery_pass_fn *p = recovery_pass_fns + c->curr_recovery_pass; struct recovery_pass_fn *p = recovery_pass_fns + pass;
if (c->opts.norecovery && pass > BCH_RECOVERY_PASS_snapshots_read) if (c->opts.norecovery && pass > BCH_RECOVERY_PASS_snapshots_read)
return false; return false;
@ -651,24 +652,17 @@ static bool should_run_recovery_pass(struct bch_fs *c, enum bch_recovery_pass pa
static int bch2_run_recovery_pass(struct bch_fs *c, enum bch_recovery_pass pass) static int bch2_run_recovery_pass(struct bch_fs *c, enum bch_recovery_pass pass)
{ {
struct recovery_pass_fn *p = recovery_pass_fns + pass;
int ret; int ret;
c->curr_recovery_pass = pass; if (!(p->when & PASS_SILENT))
bch2_print(c, KERN_INFO bch2_log_msg(c, "%s..."),
if (should_run_recovery_pass(c, pass)) { bch2_recovery_passes[pass]);
struct recovery_pass_fn *p = recovery_pass_fns + pass; ret = p->fn(c);
if (ret)
if (!(p->when & PASS_SILENT)) return ret;
bch2_print(c, KERN_INFO bch2_log_msg(c, "%s..."), if (!(p->when & PASS_SILENT))
bch2_recovery_passes[pass]); bch2_print(c, KERN_CONT " done\n");
ret = p->fn(c);
if (ret)
return ret;
if (!(p->when & PASS_SILENT))
bch2_print(c, KERN_CONT " done\n");
c->recovery_passes_complete |= BIT_ULL(pass);
}
return 0; return 0;
} }
@ -678,12 +672,39 @@ static int bch2_run_recovery_passes(struct bch_fs *c)
int ret = 0; int ret = 0;
while (c->curr_recovery_pass < ARRAY_SIZE(recovery_pass_fns)) { while (c->curr_recovery_pass < ARRAY_SIZE(recovery_pass_fns)) {
ret = bch2_run_recovery_pass(c, c->curr_recovery_pass); if (should_run_recovery_pass(c, c->curr_recovery_pass)) {
if (bch2_err_matches(ret, BCH_ERR_restart_recovery)) ret = bch2_run_recovery_pass(c, c->curr_recovery_pass);
if (bch2_err_matches(ret, BCH_ERR_restart_recovery))
continue;
if (ret)
break;
c->recovery_passes_complete |= BIT_ULL(c->curr_recovery_pass);
}
c->curr_recovery_pass++;
c->recovery_pass_done = max(c->recovery_pass_done, c->curr_recovery_pass);
}
return ret;
}
int bch2_run_online_recovery_passes(struct bch_fs *c)
{
int ret = 0;
for (unsigned i = 0; i < ARRAY_SIZE(recovery_pass_fns); i++) {
struct recovery_pass_fn *p = recovery_pass_fns + i;
if (!(p->when & PASS_ONLINE))
continue; continue;
ret = bch2_run_recovery_pass(c, i);
if (bch2_err_matches(ret, BCH_ERR_restart_recovery)) {
i = c->curr_recovery_pass;
continue;
}
if (ret) if (ret)
break; break;
c->curr_recovery_pass++;
} }
return ret; return ret;

View File

@ -25,6 +25,7 @@ static inline int bch2_run_explicit_recovery_pass(struct bch_fs *c,
} }
} }
int bch2_run_online_recovery_passes(struct bch_fs *);
u64 bch2_fsck_recovery_passes(void); u64 bch2_fsck_recovery_passes(void);
int bch2_fs_recovery(struct bch_fs *); int bch2_fs_recovery(struct bch_fs *);

View File

@ -6,43 +6,44 @@
#define PASS_FSCK BIT(1) #define PASS_FSCK BIT(1)
#define PASS_UNCLEAN BIT(2) #define PASS_UNCLEAN BIT(2)
#define PASS_ALWAYS BIT(3) #define PASS_ALWAYS BIT(3)
#define PASS_ONLINE BIT(4)
#define BCH_RECOVERY_PASSES() \ #define BCH_RECOVERY_PASSES() \
x(alloc_read, PASS_ALWAYS) \ x(alloc_read, PASS_ALWAYS) \
x(stripes_read, PASS_ALWAYS) \ x(stripes_read, PASS_ALWAYS) \
x(initialize_subvolumes, 0) \ x(initialize_subvolumes, 0) \
x(snapshots_read, PASS_ALWAYS) \ x(snapshots_read, PASS_ALWAYS) \
x(check_topology, 0) \ x(check_topology, 0) \
x(check_allocations, PASS_FSCK) \ x(check_allocations, PASS_FSCK) \
x(trans_mark_dev_sbs, PASS_ALWAYS|PASS_SILENT) \ x(trans_mark_dev_sbs, PASS_ALWAYS|PASS_SILENT) \
x(fs_journal_alloc, PASS_ALWAYS|PASS_SILENT) \ x(fs_journal_alloc, PASS_ALWAYS|PASS_SILENT) \
x(set_may_go_rw, PASS_ALWAYS|PASS_SILENT) \ x(set_may_go_rw, PASS_ALWAYS|PASS_SILENT) \
x(journal_replay, PASS_ALWAYS) \ x(journal_replay, PASS_ALWAYS) \
x(check_alloc_info, PASS_FSCK) \ x(check_alloc_info, PASS_ONLINE|PASS_FSCK) \
x(check_lrus, PASS_FSCK) \ x(check_lrus, PASS_ONLINE|PASS_FSCK) \
x(check_btree_backpointers, PASS_FSCK) \ x(check_btree_backpointers, PASS_ONLINE|PASS_FSCK) \
x(check_backpointers_to_extents,PASS_FSCK) \ x(check_backpointers_to_extents, PASS_ONLINE|PASS_FSCK) \
x(check_extents_to_backpointers,PASS_FSCK) \ x(check_extents_to_backpointers, PASS_ONLINE|PASS_FSCK) \
x(check_alloc_to_lru_refs, PASS_FSCK) \ x(check_alloc_to_lru_refs, PASS_ONLINE|PASS_FSCK) \
x(fs_freespace_init, PASS_ALWAYS|PASS_SILENT) \ x(fs_freespace_init, PASS_ALWAYS|PASS_SILENT) \
x(bucket_gens_init, 0) \ x(bucket_gens_init, 0) \
x(check_snapshot_trees, PASS_FSCK) \ x(check_snapshot_trees, PASS_ONLINE|PASS_FSCK) \
x(check_snapshots, PASS_FSCK) \ x(check_snapshots, PASS_ONLINE|PASS_FSCK) \
x(check_subvols, PASS_FSCK) \ x(check_subvols, PASS_ONLINE|PASS_FSCK) \
x(delete_dead_snapshots, PASS_FSCK) \ x(delete_dead_snapshots, PASS_ONLINE|PASS_FSCK) \
x(fs_upgrade_for_subvolumes, 0) \ x(fs_upgrade_for_subvolumes, 0) \
x(resume_logged_ops, PASS_ALWAYS) \ x(resume_logged_ops, PASS_ALWAYS) \
x(check_inodes, PASS_FSCK) \ x(check_inodes, PASS_FSCK) \
x(check_extents, PASS_FSCK) \ x(check_extents, PASS_FSCK) \
x(check_indirect_extents, PASS_FSCK) \ x(check_indirect_extents, PASS_FSCK) \
x(check_dirents, PASS_FSCK) \ x(check_dirents, PASS_FSCK) \
x(check_xattrs, PASS_FSCK) \ x(check_xattrs, PASS_FSCK) \
x(check_root, PASS_FSCK) \ x(check_root, PASS_ONLINE|PASS_FSCK) \
x(check_directory_structure, PASS_FSCK) \ x(check_directory_structure, PASS_FSCK) \
x(check_nlinks, PASS_FSCK) \ x(check_nlinks, PASS_FSCK) \
x(delete_dead_inodes, PASS_FSCK|PASS_UNCLEAN) \ x(delete_dead_inodes, PASS_FSCK|PASS_UNCLEAN) \
x(fix_reflink_p, 0) \ x(fix_reflink_p, 0) \
x(set_fs_needs_rebalance, 0) \ x(set_fs_needs_rebalance, 0) \
enum bch_recovery_pass { enum bch_recovery_pass {
#define x(n, when) BCH_RECOVERY_PASS_##n, #define x(n, when) BCH_RECOVERY_PASS_##n,

View File

@ -65,7 +65,7 @@
x(btree_node_bkey_out_of_order, 57) \ x(btree_node_bkey_out_of_order, 57) \
x(btree_root_bkey_invalid, 58) \ x(btree_root_bkey_invalid, 58) \
x(btree_root_read_error, 59) \ x(btree_root_read_error, 59) \
x(btree_root_bad_min_key, 50) \ x(btree_root_bad_min_key, 60) \
x(btree_root_bad_max_key, 61) \ x(btree_root_bad_max_key, 61) \
x(btree_node_read_error, 62) \ x(btree_node_read_error, 62) \
x(btree_node_topology_bad_min_key, 63) \ x(btree_node_topology_bad_min_key, 63) \

View File

@ -15,7 +15,7 @@
* will have to take write locks for the full duration of the operation. * will have to take write locks for the full duration of the operation.
* *
* But by adding an intent state, which is exclusive with other intent locks but * But by adding an intent state, which is exclusive with other intent locks but
* not with readers, we can take intent locks at thte start of the operation, * not with readers, we can take intent locks at the start of the operation,
* and then take write locks only for the actual update to each individual * and then take write locks only for the actual update to each individual
* nodes, without deadlocking. * nodes, without deadlocking.
* *
@ -65,8 +65,8 @@
* *
* Reentrancy: * Reentrancy:
* *
* Six locks are not by themselves reentrent, but have counters for both the * Six locks are not by themselves reentrant, but have counters for both the
* read and intent states that can be used to provide reentrency by an upper * read and intent states that can be used to provide reentrancy by an upper
* layer that tracks held locks. If a lock is known to already be held in the * layer that tracks held locks. If a lock is known to already be held in the
* read or intent state, six_lock_increment() can be used to bump the "lock * read or intent state, six_lock_increment() can be used to bump the "lock
* held in this state" counter, increasing the number of unlock calls that * held in this state" counter, increasing the number of unlock calls that

View File

@ -123,7 +123,7 @@ bool __bch2_snapshot_is_ancestor(struct bch_fs *c, u32 id, u32 ancestor)
struct snapshot_table *t; struct snapshot_table *t;
bool ret; bool ret;
EBUG_ON(c->curr_recovery_pass <= BCH_RECOVERY_PASS_check_snapshots); EBUG_ON(c->recovery_pass_done <= BCH_RECOVERY_PASS_check_snapshots);
rcu_read_lock(); rcu_read_lock();
t = rcu_dereference(c->snapshots); t = rcu_dereference(c->snapshots);
@ -1402,27 +1402,24 @@ int bch2_delete_dead_snapshots(struct bch_fs *c)
goto err; goto err;
} }
ret = for_each_btree_key2(trans, iter, BTREE_ID_snapshots, ret = for_each_btree_key(trans, iter, BTREE_ID_snapshots,
POS_MIN, 0, k, POS_MIN, 0, k,
bch2_snapshot_set_equiv(trans, k)); bch2_snapshot_set_equiv(trans, k));
if (ret) { if (ret) {
bch_err_msg(c, ret, "in bch2_snapshots_set_equiv"); bch_err_msg(c, ret, "in bch2_snapshots_set_equiv");
goto err; goto err;
} }
for_each_btree_key(trans, iter, BTREE_ID_snapshots, ret = for_each_btree_key(trans, iter, BTREE_ID_snapshots,
POS_MIN, 0, k, ret) { POS_MIN, 0, k, ({
if (k.k->type != KEY_TYPE_snapshot) if (k.k->type != KEY_TYPE_snapshot)
continue; continue;
snap = bkey_s_c_to_snapshot(k); snap = bkey_s_c_to_snapshot(k);
if (BCH_SNAPSHOT_DELETED(snap.v)) { BCH_SNAPSHOT_DELETED(snap.v)
ret = snapshot_list_add(c, &deleted, k.k->p.offset); ? snapshot_list_add(c, &deleted, k.k->p.offset)
if (ret) : 0;
break; }));
}
}
bch2_trans_iter_exit(trans, &iter);
if (ret) { if (ret) {
bch_err_msg(c, ret, "walking snapshots"); bch_err_msg(c, ret, "walking snapshots");
@ -1469,18 +1466,20 @@ int bch2_delete_dead_snapshots(struct bch_fs *c)
bch2_trans_unlock(trans); bch2_trans_unlock(trans);
down_write(&c->snapshot_create_lock); down_write(&c->snapshot_create_lock);
for_each_btree_key(trans, iter, BTREE_ID_snapshots, ret = for_each_btree_key(trans, iter, BTREE_ID_snapshots,
POS_MIN, 0, k, ret) { POS_MIN, 0, k, ({
u32 snapshot = k.k->p.offset; u32 snapshot = k.k->p.offset;
u32 equiv = bch2_snapshot_equiv(c, snapshot); u32 equiv = bch2_snapshot_equiv(c, snapshot);
if (equiv != snapshot) equiv != snapshot
snapshot_list_add(c, &deleted_interior, snapshot); ? snapshot_list_add(c, &deleted_interior, snapshot)
} : 0;
bch2_trans_iter_exit(trans, &iter); }));
if (ret) if (ret) {
bch_err_msg(c, ret, "walking snapshots");
goto err_create_lock; goto err_create_lock;
}
/* /*
* Fixing children of deleted snapshots can't be done completely * Fixing children of deleted snapshots can't be done completely
@ -1694,13 +1693,13 @@ int bch2_snapshots_read(struct bch_fs *c)
int ret = 0; int ret = 0;
ret = bch2_trans_run(c, ret = bch2_trans_run(c,
for_each_btree_key2(trans, iter, BTREE_ID_snapshots, for_each_btree_key(trans, iter, BTREE_ID_snapshots,
POS_MIN, 0, k, POS_MIN, 0, k,
bch2_mark_snapshot(trans, BTREE_ID_snapshots, 0, bkey_s_c_null, k, 0) ?: bch2_mark_snapshot(trans, BTREE_ID_snapshots, 0, bkey_s_c_null, k, 0) ?:
bch2_snapshot_set_equiv(trans, k) ?: bch2_snapshot_set_equiv(trans, k) ?:
bch2_check_snapshot_needs_deletion(trans, k)) ?: bch2_check_snapshot_needs_deletion(trans, k)) ?:
for_each_btree_key2(trans, iter, BTREE_ID_snapshots, for_each_btree_key(trans, iter, BTREE_ID_snapshots,
POS_MIN, 0, k, POS_MIN, 0, k,
(set_is_ancestor_bitmap(c, k.k->p.offset), 0))); (set_is_ancestor_bitmap(c, k.k->p.offset), 0)));
if (ret) if (ret)
bch_err_fn(c, ret); bch_err_fn(c, ret);

View File

@ -72,6 +72,12 @@
MODULE_LICENSE("GPL"); MODULE_LICENSE("GPL");
MODULE_AUTHOR("Kent Overstreet <kent.overstreet@gmail.com>"); MODULE_AUTHOR("Kent Overstreet <kent.overstreet@gmail.com>");
MODULE_DESCRIPTION("bcachefs filesystem"); MODULE_DESCRIPTION("bcachefs filesystem");
MODULE_SOFTDEP("pre: crc32c");
MODULE_SOFTDEP("pre: crc64");
MODULE_SOFTDEP("pre: sha256");
MODULE_SOFTDEP("pre: chacha20");
MODULE_SOFTDEP("pre: poly1305");
MODULE_SOFTDEP("pre: xxhash");
const char * const bch2_fs_flag_strs[] = { const char * const bch2_fs_flag_strs[] = {
#define x(n) #n, #define x(n) #n,
@ -82,19 +88,26 @@ const char * const bch2_fs_flag_strs[] = {
void __bch2_print(struct bch_fs *c, const char *fmt, ...) void __bch2_print(struct bch_fs *c, const char *fmt, ...)
{ {
struct log_output *output = c->output;
va_list args; va_list args;
if (c->output_filter && c->output_filter != current)
output = NULL;
va_start(args, fmt); va_start(args, fmt);
if (likely(!c->output)) { if (likely(!output)) {
vprintk(fmt, args); vprintk(fmt, args);
} else { } else {
unsigned long flags; unsigned long flags;
spin_lock_irqsave(&c->output->lock, flags); if (fmt[0] == KERN_SOH[0])
prt_vprintf(&c->output->buf, fmt, args); fmt += 2;
spin_unlock_irqrestore(&c->output->lock, flags);
wake_up(&c->output->wait); spin_lock_irqsave(&output->lock, flags);
prt_vprintf(&output->buf, fmt, args);
spin_unlock_irqrestore(&output->lock, flags);
wake_up(&output->wait);
} }
va_end(args); va_end(args);
} }
@ -350,7 +363,8 @@ void bch2_fs_read_only(struct bch_fs *c)
BUG_ON(c->journal.last_empty_seq != journal_cur_seq(&c->journal)); BUG_ON(c->journal.last_empty_seq != journal_cur_seq(&c->journal));
BUG_ON(atomic_read(&c->btree_cache.dirty)); BUG_ON(atomic_read(&c->btree_cache.dirty));
BUG_ON(atomic_long_read(&c->btree_key_cache.nr_dirty)); BUG_ON(atomic_long_read(&c->btree_key_cache.nr_dirty));
BUG_ON(c->btree_write_buffer.state.nr); BUG_ON(c->btree_write_buffer.inc.keys.nr);
BUG_ON(c->btree_write_buffer.flushing.keys.nr);
bch_verbose(c, "marking filesystem clean"); bch_verbose(c, "marking filesystem clean");
bch2_fs_mark_clean(c); bch2_fs_mark_clean(c);
@ -612,6 +626,9 @@ void __bch2_fs_stop(struct bch_fs *c)
bch2_fs_debug_exit(c); bch2_fs_debug_exit(c);
bch2_fs_chardev_exit(c); bch2_fs_chardev_exit(c);
bch2_ro_ref_put(c);
wait_event(c->ro_ref_wait, !refcount_read(&c->ro_ref));
kobject_put(&c->counters_kobj); kobject_put(&c->counters_kobj);
kobject_put(&c->time_stats); kobject_put(&c->time_stats);
kobject_put(&c->opts_dir); kobject_put(&c->opts_dir);
@ -744,6 +761,10 @@ static struct bch_fs *bch2_fs_alloc(struct bch_sb *sb, struct bch_opts opts)
mutex_init(&c->btree_root_lock); mutex_init(&c->btree_root_lock);
INIT_WORK(&c->read_only_work, bch2_fs_read_only_work); INIT_WORK(&c->read_only_work, bch2_fs_read_only_work);
refcount_set(&c->ro_ref, 1);
init_waitqueue_head(&c->ro_ref_wait);
sema_init(&c->online_fsck_mutex, 1);
init_rwsem(&c->gc_lock); init_rwsem(&c->gc_lock);
mutex_init(&c->gc_gens_lock); mutex_init(&c->gc_gens_lock);
atomic_set(&c->journal_keys.ref, 1); atomic_set(&c->journal_keys.ref, 1);
@ -754,6 +775,7 @@ static struct bch_fs *bch2_fs_alloc(struct bch_sb *sb, struct bch_opts opts)
bch2_fs_copygc_init(c); bch2_fs_copygc_init(c);
bch2_fs_btree_key_cache_init_early(&c->btree_key_cache); bch2_fs_btree_key_cache_init_early(&c->btree_key_cache);
bch2_fs_btree_iter_init_early(c);
bch2_fs_btree_interior_update_init_early(c); bch2_fs_btree_interior_update_init_early(c);
bch2_fs_allocator_background_init(c); bch2_fs_allocator_background_init(c);
bch2_fs_allocator_foreground_init(c); bch2_fs_allocator_foreground_init(c);

View File

@ -278,8 +278,8 @@ static int bch2_compression_stats_to_text(struct printbuf *out, struct bch_fs *c
if (!btree_type_has_ptrs(id)) if (!btree_type_has_ptrs(id))
continue; continue;
ret = for_each_btree_key2(trans, iter, id, POS_MIN, ret = for_each_btree_key(trans, iter, id, POS_MIN,
BTREE_ITER_ALL_SNAPSHOTS, k, ({ BTREE_ITER_ALL_SNAPSHOTS, k, ({
struct bkey_ptrs_c ptrs = bch2_bkey_ptrs_c(k); struct bkey_ptrs_c ptrs = bch2_bkey_ptrs_c(k);
struct bch_extent_crc_unpacked crc; struct bch_extent_crc_unpacked crc;
const union bch_extent_entry *entry; const union bch_extent_entry *entry;

View File

@ -1145,8 +1145,6 @@ TRACE_EVENT(trans_restart_upgrade,
__field(u8, level ) __field(u8, level )
__field(u32, path_seq ) __field(u32, path_seq )
__field(u32, node_seq ) __field(u32, node_seq )
__field(u32, path_alloc_seq )
__field(u32, downgrade_seq)
TRACE_BPOS_entries(pos) TRACE_BPOS_entries(pos)
), ),
@ -1159,12 +1157,10 @@ TRACE_EVENT(trans_restart_upgrade,
__entry->level = f->l; __entry->level = f->l;
__entry->path_seq = path->l[f->l].lock_seq; __entry->path_seq = path->l[f->l].lock_seq;
__entry->node_seq = IS_ERR_OR_NULL(f->b) ? 0 : f->b->c.lock.seq; __entry->node_seq = IS_ERR_OR_NULL(f->b) ? 0 : f->b->c.lock.seq;
__entry->path_alloc_seq = path->alloc_seq;
__entry->downgrade_seq = path->downgrade_seq;
TRACE_BPOS_assign(pos, path->pos) TRACE_BPOS_assign(pos, path->pos)
), ),
TP_printk("%s %pS btree %s pos %llu:%llu:%u locks_want %u -> %u level %u path seq %u node seq %u alloc_seq %u downgrade_seq %u", TP_printk("%s %pS btree %s pos %llu:%llu:%u locks_want %u -> %u level %u path seq %u node seq %u",
__entry->trans_fn, __entry->trans_fn,
(void *) __entry->caller_ip, (void *) __entry->caller_ip,
bch2_btree_id_str(__entry->btree_id), bch2_btree_id_str(__entry->btree_id),
@ -1175,9 +1171,7 @@ TRACE_EVENT(trans_restart_upgrade,
__entry->new_locks_want, __entry->new_locks_want,
__entry->level, __entry->level,
__entry->path_seq, __entry->path_seq,
__entry->node_seq, __entry->node_seq)
__entry->path_alloc_seq,
__entry->downgrade_seq)
); );
DEFINE_EVENT(transaction_restart_iter, trans_restart_relock, DEFINE_EVENT(transaction_restart_iter, trans_restart_relock,