bcachefs-tools/c_src/cmd_list_journal.c
Kent Overstreet 78b1ccf5f1
Some checks failed
Nix Flake actions / nix-matrix (push) Has been cancelled
build / bcachefs-tools-deb (ubuntu-22.04) (push) Has been cancelled
build / bcachefs-tools-deb (ubuntu-24.04) (push) Has been cancelled
build / bcachefs-tools-rpm (push) Has been cancelled
build / bcachefs-tools-msrv (push) Has been cancelled
Nix Flake actions / ${{ matrix.name }} (${{ matrix.system }}) (push) Has been cancelled
cmd_list_journal: By default, print all contiguous entries
Previously, we defaulted to only printing dirty journal entries (which
means nothing would be printed after a clean shutdown) - this is usually
not what we want.

Now, we default to printing the biggest range that has no gaps or
missing entries.

-a, --all
  now means print all entries, not just contiguous entries

And we now have

-d, --dirty-only
  for the the previous default behaviour.

Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2025-07-02 15:33:07 -04:00

628 lines
16 KiB
C

#include <fcntl.h>
#include <getopt.h>
#include <string.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <unistd.h>
#include "cmds.h"
#include "libbcachefs.h"
#include "tools-util.h"
#include "libbcachefs/bcachefs.h"
#include "libbcachefs/btree_iter.h"
#include "libbcachefs/errcode.h"
#include "libbcachefs/error.h"
#include "libbcachefs/journal_io.h"
#include "libbcachefs/journal_seq_blacklist.h"
#include "libbcachefs/super.h"
#include <linux/fs_parser.h>
static const char *NORMAL = "\x1B[0m";
static const char *RED = "\x1B[31m";
static void star_start_of_lines(char *buf)
{
char *p = buf;
if (*p == ' ')
*p = '*';
while ((p = strstr(p, "\n ")))
p[1] = '*';
}
static inline bool entry_is_transaction_start(struct jset_entry *entry)
{
return entry->type == BCH_JSET_ENTRY_log && !entry->level;
}
static inline bool entry_is_log_msg(struct jset_entry *entry)
{
return entry->type == BCH_JSET_ENTRY_log && entry->level;
}
static inline bool entry_is_print_key(struct jset_entry *entry)
{
switch (entry->type) {
case BCH_JSET_ENTRY_btree_root:
case BCH_JSET_ENTRY_btree_keys:
case BCH_JSET_ENTRY_write_buffer_keys:
case BCH_JSET_ENTRY_overwrite:
return true;
default:
return false;
}
}
static inline bool entry_is_non_transaction(struct jset_entry *entry)
{
switch (entry->type) {
case BCH_JSET_ENTRY_btree_root:
case BCH_JSET_ENTRY_datetime:
case BCH_JSET_ENTRY_usage:
case BCH_JSET_ENTRY_clock:
return true;
default:
return false;
}
}
typedef struct {
int sign;
darray_str f;
} transaction_msg_filter;
typedef struct {
int sign;
DARRAY(struct bbpos_range) f;
} transaction_key_filter;
typedef struct {
bool blacklisted;
bool flush_only;
bool datetime_only;
bool log;
bool log_only;
bool print_offset;
bool filtering;
u64 btree_filter;
transaction_msg_filter transaction;
transaction_key_filter key;
bool bkey_val;
} journal_filter;
static int parse_sign(char **str)
{
if (**str == '+') {
(*str)++;
return 1;
}
if (**str == '-') {
(*str)++;
return -1;
}
return 0;
}
static bool entry_matches_btree_filter(journal_filter f, struct jset_entry *entry)
{
return f.btree_filter == ~0ULL ||
(entry->level == 0 &&
entry->type != BCH_JSET_ENTRY_btree_root &&
BIT_ULL(entry->btree_id) & f.btree_filter);
}
static bool transaction_matches_btree_filter(journal_filter f,
struct jset_entry *entry, struct jset_entry *end)
{
for (entry = vstruct_next(entry);
entry != end;
entry = vstruct_next(entry))
if (entry_is_print_key(entry) &&
entry_matches_btree_filter (f, entry))
return true;
return false;
}
static bool bkey_matches_filter(transaction_key_filter f,
struct jset_entry *entry,
struct bkey_i *k)
{
darray_for_each(f.f, i) {
struct bbpos k_start = BBPOS(entry->btree_id, bkey_start_pos(&k->k));
struct bbpos k_end = BBPOS(entry->btree_id, k->k.p);
if (!i->start.pos.snapshot &&
!i->end.pos.snapshot) {
k_start.pos.snapshot = 0;
k_end.pos.snapshot = 0;
}
if (!k->k.size) {
if (bbpos_cmp(k_start, i->start) >= 0 &&
bbpos_cmp(k_end, i->end) <= 0)
return true;
} else {
if (bbpos_cmp(i->start, k_end) <= 0 &&
bbpos_cmp(i->end, k_start) >= 0)
return true;
}
}
return false;
}
static bool entry_matches_transaction_filter(transaction_key_filter f,
struct jset_entry *entry)
{
if (!entry->level &&
(entry->type == BCH_JSET_ENTRY_btree_keys ||
entry->type == BCH_JSET_ENTRY_overwrite))
jset_entry_for_each_key(entry, k) {
if (!k->k.u64s)
break;
if (bkey_matches_filter(f, entry, k))
return true;
}
return false;
}
static bool transaction_matches_transaction_filter(transaction_key_filter f,
struct jset_entry *entry, struct jset_entry *end)
{
for (entry = vstruct_next(entry);
entry != end;
entry = vstruct_next(entry))
if (entry_matches_transaction_filter(f, entry))
return true;
return false;
}
static bool entry_matches_msg_filter(transaction_msg_filter f,
struct jset_entry *entry)
{
struct jset_entry_log *l = container_of(entry, struct jset_entry_log, entry);
unsigned b = jset_entry_log_msg_bytes(l);
darray_for_each(f.f, i)
if (!strncmp(*i, l->d, b))
return true;
return false;
}
static bool entry_is_log_only(struct jset_entry *entry, struct jset_entry *end)
{
bool have_log = false;
for (entry = vstruct_next(entry);
entry != end;
entry = vstruct_next(entry)) {
if (entry->u64s && !entry_is_log_msg(entry))
return false;
have_log = true;
}
return have_log;
}
static bool entry_has_log(struct jset_entry *entry, struct jset_entry *end)
{
for (entry = vstruct_next(entry);
entry != end;
entry = vstruct_next(entry))
if (entry_is_log_msg(entry))
return true;
return false;
}
static struct jset_entry *transaction_end(struct jset_entry *entry, struct jset_entry *end)
{
do
entry = vstruct_next(entry);
while (entry != end &&
!entry_is_transaction_start(entry) &&
!entry_is_non_transaction(entry));
return entry;
}
static bool should_print_transaction(journal_filter f,
struct jset_entry *entry, struct jset_entry *end)
{
BUG_ON(entry->type != BCH_JSET_ENTRY_log);
if (!f.filtering)
return true;
if (f.log && entry_is_log_only(entry, end))
return true;
if (f.log_only && !entry_has_log(entry, end))
return false;
if (f.btree_filter != ~0ULL &&
!transaction_matches_btree_filter(f, entry, end))
return false;
if (f.transaction.f.nr &&
entry_matches_msg_filter(f.transaction, entry) != (f.transaction.sign >= 0))
return false;
if (f.key.f.nr &&
transaction_matches_transaction_filter(f.key, entry, end) != (f.key.sign >= 0))
return false;
return true;
}
static void journal_entry_header_to_text(struct printbuf *out, struct bch_fs *c,
struct journal_replay *p,
bool blacklisted, bool *printed_header)
{
if (*printed_header)
return;
*printed_header = true;
prt_printf(out,
"\n%s"
"journal entry %llu\n"
" version %u\n"
" last seq %llu\n"
" flush %u\n"
" written at ",
blacklisted ? "blacklisted " : "",
le64_to_cpu(p->j.seq),
le32_to_cpu(p->j.version),
le64_to_cpu(p->j.last_seq),
!JSET_NO_FLUSH(&p->j));
bch2_journal_ptrs_to_text(out, c, p);
prt_newline(out);
}
static void bch2_journal_entry_keys_noval_to_text(struct printbuf *out, struct jset_entry *entry)
{
jset_entry_for_each_key(entry, k) {
/* We may be called on entries that haven't been validated: */
if (!k->k.u64s)
break;
bch2_prt_jset_entry_type(out, entry->type);
prt_str(out, ": ");
bch2_btree_id_level_to_text(out, entry->btree_id, entry->level);
prt_char(out, ' ');
bch2_bkey_to_text(out, &k->k);
prt_newline(out);
}
}
static unsigned journal_entry_indent(struct jset_entry *entry)
{
if (entry_is_transaction_start(entry) ||
entry->type == BCH_JSET_ENTRY_btree_root ||
entry->type == BCH_JSET_ENTRY_datetime ||
entry->type == BCH_JSET_ENTRY_usage)
return 2;
return 4;
}
static void print_one_entry(struct printbuf *out,
struct bch_fs *c,
journal_filter f,
struct journal_replay *p,
bool blacklisted,
bool *printed_header,
struct jset_entry *entry)
{
if (entry_is_print_key(entry) && !entry->u64s)
return;
if (entry_is_print_key(entry) && !entry_matches_btree_filter(f, entry))
return;
journal_entry_header_to_text(out, c, p, blacklisted, printed_header);
bool highlight = entry_matches_transaction_filter(f.key, entry);
if (highlight)
prt_str(out, RED);
unsigned indent = journal_entry_indent(entry);
printbuf_indent_add(out, indent);
if (f.print_offset)
prt_printf(out, "%4lu ", entry->_data - p->j._data);
if (!f.bkey_val && entry_is_print_key(entry))
bch2_journal_entry_keys_noval_to_text(out, entry);
else {
bch2_journal_entry_to_text(out, c, entry);
prt_newline(out);
}
printbuf_indent_sub(out, indent);
if (highlight)
prt_str(out, NORMAL);
}
static void journal_replay_print(struct bch_fs *c,
journal_filter f,
struct journal_replay *p)
{
struct printbuf buf = PRINTBUF;
bool blacklisted = p->ignore_blacklisted ||
bch2_journal_seq_is_blacklisted(c, le64_to_cpu(p->j.seq), false);
bool printed_header = false;
if (f.datetime_only) {
prt_printf(&buf,
"%s"
"journal entry %-8llu ",
blacklisted ? "blacklisted " : "",
le64_to_cpu(p->j.seq));
vstruct_for_each(&p->j, entry)
if (entry->type == BCH_JSET_ENTRY_datetime) {
bch2_journal_entry_to_text(&buf, c, entry);
break;
}
prt_newline(&buf);
goto print;
}
if (!f.filtering)
journal_entry_header_to_text(&buf, c, p, blacklisted, &printed_header);
struct jset_entry *entry = p->j.start;
struct jset_entry *end = vstruct_last(&p->j);
while (entry < end &&
vstruct_next(entry) <= end &&
!entry_is_transaction_start(entry)) {
if (!f.filtering)
print_one_entry(&buf, c, f, p, blacklisted, &printed_header, entry);
entry = vstruct_next(entry);
}
while (entry < end &&
vstruct_next(entry) <= end &&
entry_is_transaction_start(entry)) {
struct jset_entry *t_end = transaction_end(entry, end);
if (should_print_transaction(f, entry, t_end)) {
while (entry < t_end &&
vstruct_next(entry) <= t_end) {
print_one_entry(&buf, c, f, p, blacklisted, &printed_header, entry);
entry = vstruct_next(entry);
}
}
entry = t_end;
}
while (entry < end &&
vstruct_next(entry) <= end &&
!entry_is_transaction_start(entry)) {
if (!f.filtering)
print_one_entry(&buf, c, f, p, blacklisted, &printed_header, entry);
entry = vstruct_next(entry);
}
print:
if (buf.buf) {
if (blacklisted)
star_start_of_lines(buf.buf);
fwrite(buf.buf, 1, buf.pos, stdout);
}
printbuf_exit(&buf);
}
static void list_journal_usage(void)
{
puts("bcachefs list_journal - print contents of journal\n"
"Usage: bcachefs list_journal [OPTION]... <devices>\n"
"\n"
"Options:\n"
" -a, --all Read entire journal, not just contiguous entries\n"
" -d, --dirty-only Only read dirty entries\n"
" -B, --blacklisted Include blacklisted entries\n"
" -F, --flush-only Only print flush entries/commits\n"
" -D, --datetime Print datetime entries only\n"
" -l, --log When filtering, include log-only entries\n"
" -L, --log-only Only print transactions containing log messages\n"
" -o, --offset Print offset of each subentry\n"
" -n, --nr-entries=nr Number of journal entries to print, starting from the most recent\n"
" -b, --btree=(+|-)btree1,btree2 Filter keys matching or not updating btree(s)\n"
" -t, --transaction=(+|-)fn1,fn2 Filter transactions matching or not matching fn(s)\n"
" -k, --key=(+-1)bbpos1,bbpos2x Filter transactions updating bbpos\n"
" Or entries not matching the range bbpos-bbpos\n"
" -v, --verbose Verbose mode\n"
" -h, --help Display this help and exit\n"
"Report bugs to <linux-bcachefs@vger.kernel.org>");
}
int cmd_list_journal(int argc, char *argv[])
{
static const struct option longopts[] = {
{ "all", no_argument, NULL, 'a' },
{ "dirty-only", no_argument, NULL, 'd' },
{ "nr-entries", required_argument, NULL, 'n' },
{ "blacklisted", no_argument, NULL, 'B' },
{ "flush-only", no_argument, NULL, 'F' },
{ "datetime", no_argument, NULL, 'D' },
{ "log", no_argument, NULL, 'l' },
{ "log-only", no_argument, NULL, 'L' },
{ "offset", no_argument, NULL, 'o' },
{ "btree", required_argument, NULL, 'b' },
{ "transaction", required_argument, NULL, 't' },
{ "key", required_argument, NULL, 'k' },
{ "bkey-val", required_argument, NULL, 'V' },
{ "verbose", no_argument, NULL, 'v' },
{ "help", no_argument, NULL, 'h' },
{ NULL }
};
struct bch_opts opts = bch2_opts_empty();
u32 nr_entries = 0;
journal_filter f = { .btree_filter = ~0ULL, .bkey_val = true };
bool contiguous_only = true;
char *t;
int opt, ret;
opt_set(opts, noexcl, true);
opt_set(opts, nochanges, true);
opt_set(opts, norecovery, true);
opt_set(opts, read_only, true);
opt_set(opts, degraded, BCH_DEGRADED_very);
opt_set(opts, errors, BCH_ON_ERROR_continue);
opt_set(opts, fix_errors, FSCK_FIX_yes);
opt_set(opts, retain_recovery_info ,true);
opt_set(opts, read_journal_only,true);
opt_set(opts, read_entire_journal, true);
while ((opt = getopt_long(argc, argv, "adn:BFMDlLob:t:k:V:vh",
longopts, NULL)) != -1)
switch (opt) {
case 'a':
contiguous_only = false;
break;
case 'd':
opt_set(opts, read_entire_journal, false);
break;
case 'n':
if (kstrtouint(optarg, 10, &nr_entries))
die("error parsing nr_entries");
opt_set(opts, read_entire_journal, true);
break;
case 'B':
f.blacklisted = true;
break;
case 'F':
f.flush_only = true;
break;
case 'D':
f.datetime_only = true;
break;
case 'l':
f.log = true;
break;
case 'L':
f.log_only = true;
f.filtering = true;
break;
case 'o':
f.print_offset = true;
break;
case 'b':
ret = parse_sign(&optarg);
f.btree_filter =
read_flag_list_or_die(optarg, __bch2_btree_ids, "btree id");
if (ret < 0)
f.btree_filter = ~f.btree_filter;
f.filtering = true;
break;
case 't':
f.transaction.sign = parse_sign(&optarg);
while ((t = strsep(&optarg, ",")))
darray_push(&f.transaction.f, strdup(t));
f.filtering = true;
break;
case 'k':
f.key.sign = parse_sign(&optarg);
while ((t = strsep(&optarg, ",")))
darray_push(&f.key.f, bbpos_range_parse(t));
f.filtering = true;
break;
case 'V':
ret = lookup_constant(bool_names, optarg, -EINVAL);
if (ret < 0)
die("error parsing %s", optarg);
f.bkey_val = ret;
break;
case 'v':
opt_set(opts, verbose, true);
break;
case 'h':
list_journal_usage();
exit(EXIT_SUCCESS);
}
args_shift(optind);
if (!argc)
die("Please supply device(s) to open");
darray_const_str devs = get_or_split_cmdline_devs(argc, argv);
struct bch_fs *c = bch2_fs_open(&devs, &opts);
if (IS_ERR(c))
die("error opening %s: %s", argv[0], bch2_err_str(PTR_ERR(c)));
struct journal_replay *p, **_p;
struct genradix_iter iter;
u64 min_seq_to_print = 0;
if (contiguous_only) {
u64 seq = 0;
genradix_for_each(&c->journal_entries, iter, _p) {
p = *_p;
if (!p)
continue;
if (!seq)
seq = le64_to_cpu(p->j.seq);
struct u64_range missing;
while ((missing = bch2_journal_entry_missing_range(c, seq, le64_to_cpu(p->j.seq))).start)
seq = min_seq_to_print = missing.end;
seq = le64_to_cpu(p->j.seq) + 1;
}
}
if (nr_entries)
min_seq_to_print = max_t(s64, min_seq_to_print,
atomic64_read(&c->journal.seq) - nr_entries);
u64 seq = 0;
genradix_for_each(&c->journal_entries, iter, _p) {
p = *_p;
if (!p)
continue;
if (le64_to_cpu(p->j.seq) < min_seq_to_print)
continue;
if (!seq)
seq = le64_to_cpu(p->j.seq);
struct u64_range missing;
while ((missing = bch2_journal_entry_missing_range(c, seq, le64_to_cpu(p->j.seq))).start) {
printf("missing %llu entries at %llu-%llu%s\n",
missing.end - missing.start,
missing.start, missing.end - 1,
missing.end < c->journal.last_seq_ondisk ? " (not dirty)" : "");
seq = missing.end;
}
seq = le64_to_cpu(p->j.seq) + 1;
if (!f.blacklisted &&
(p->ignore_blacklisted ||
bch2_journal_seq_is_blacklisted(c, le64_to_cpu(p->j.seq), false)))
continue;
if (f.flush_only &&
JSET_NO_FLUSH(&p->j))
continue;
journal_replay_print(c, f, p);
}
bch2_fs_stop(c);
return 0;
}