blob: 18876056e5e02af78d29f6c7a5ac24fc74c3b32c [file] [log] [blame]
Dave Chinner0b61f8a2018-06-05 19:42:14 -07001// SPDX-License-Identifier: GPL-2.0+
Darrick J. Wongdcb660f2017-10-17 21:37:36 -07002/*
3 * Copyright (C) 2017 Oracle. All Rights Reserved.
Darrick J. Wongdcb660f2017-10-17 21:37:36 -07004 * Author: Darrick J. Wong <darrick.wong@oracle.com>
Darrick J. Wongdcb660f2017-10-17 21:37:36 -07005 */
6#include "xfs.h"
7#include "xfs_fs.h"
8#include "xfs_shared.h"
9#include "xfs_format.h"
10#include "xfs_trans_resv.h"
11#include "xfs_mount.h"
Darrick J. Wongdcb660f2017-10-17 21:37:36 -070012#include "xfs_btree.h"
Darrick J. Wongdcb660f2017-10-17 21:37:36 -070013#include "xfs_log_format.h"
14#include "xfs_trans.h"
15#include "xfs_sb.h"
16#include "xfs_inode.h"
Darrick J. Wong80e4e122017-10-17 21:37:42 -070017#include "xfs_icache.h"
Darrick J. Wongdcb660f2017-10-17 21:37:36 -070018#include "xfs_alloc.h"
19#include "xfs_alloc_btree.h"
Darrick J. Wongdcb660f2017-10-17 21:37:36 -070020#include "xfs_ialloc.h"
21#include "xfs_ialloc_btree.h"
Darrick J. Wongdcb660f2017-10-17 21:37:36 -070022#include "xfs_refcount_btree.h"
23#include "xfs_rmap.h"
24#include "xfs_rmap_btree.h"
Darrick J. Wong3daa6642017-10-17 21:37:40 -070025#include "xfs_log.h"
26#include "xfs_trans_priv.h"
Darrick J. Wong87d9d602018-05-14 06:34:33 -070027#include "xfs_attr.h"
28#include "xfs_reflink.h"
Darrick J. Wongdcb660f2017-10-17 21:37:36 -070029#include "scrub/scrub.h"
30#include "scrub/common.h"
31#include "scrub/trace.h"
Darrick J. Wong0a9633f2018-05-29 22:18:08 -070032#include "scrub/repair.h"
Darrick J. Wong4fb79512019-04-16 08:22:01 -070033#include "scrub/health.h"
Darrick J. Wongdcb660f2017-10-17 21:37:36 -070034
35/* Common code for the metadata scrubbers. */
36
Darrick J. Wong4700d222017-10-17 21:37:36 -070037/*
38 * Handling operational errors.
39 *
40 * The *_process_error() family of functions are used to process error return
41 * codes from functions called as part of a scrub operation.
42 *
43 * If there's no error, we return true to tell the caller that it's ok
44 * to move on to the next check in its list.
45 *
46 * For non-verifier errors (e.g. ENOMEM) we return false to tell the
47 * caller that something bad happened, and we preserve *error so that
48 * the caller can return the *error up the stack to userspace.
49 *
50 * Verifier errors (EFSBADCRC/EFSCORRUPTED) are recorded by setting
51 * OFLAG_CORRUPT in sm_flags and the *error is cleared. In other words,
52 * we track verifier errors (and failed scrub checks) via OFLAG_CORRUPT,
53 * not via return codes. We return false to tell the caller that
54 * something bad happened. Since the error has been cleared, the caller
55 * will (presumably) return that zero and scrubbing will move on to
56 * whatever's next.
57 *
58 * ftrace can be used to record the precise metadata location and the
59 * approximate code location of the failed operation.
60 */
61
62/* Check for operational errors. */
Darrick J. Wong64b12562018-01-16 18:52:14 -080063static bool
Darrick J. Wongc517b3a2018-07-19 12:29:11 -070064__xchk_process_error(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -070065 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -070066 xfs_agnumber_t agno,
67 xfs_agblock_t bno,
68 int *error,
69 __u32 errflag,
70 void *ret_ip)
Darrick J. Wong64b12562018-01-16 18:52:14 -080071{
72 switch (*error) {
73 case 0:
74 return true;
75 case -EDEADLOCK:
76 /* Used to restart an op with deadlock avoidance. */
Darrick J. Wongc517b3a2018-07-19 12:29:11 -070077 trace_xchk_deadlock_retry(sc->ip, sc->sm, *error);
Darrick J. Wong64b12562018-01-16 18:52:14 -080078 break;
79 case -EFSBADCRC:
80 case -EFSCORRUPTED:
81 /* Note the badness but don't abort. */
82 sc->sm->sm_flags |= errflag;
83 *error = 0;
84 /* fall through */
85 default:
Darrick J. Wongc517b3a2018-07-19 12:29:11 -070086 trace_xchk_op_error(sc, agno, bno, *error,
Darrick J. Wong64b12562018-01-16 18:52:14 -080087 ret_ip);
88 break;
89 }
90 return false;
91}
92
Darrick J. Wong4700d222017-10-17 21:37:36 -070093bool
Darrick J. Wongc517b3a2018-07-19 12:29:11 -070094xchk_process_error(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -070095 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -070096 xfs_agnumber_t agno,
97 xfs_agblock_t bno,
98 int *error)
Darrick J. Wong4700d222017-10-17 21:37:36 -070099{
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700100 return __xchk_process_error(sc, agno, bno, error,
Darrick J. Wong64b12562018-01-16 18:52:14 -0800101 XFS_SCRUB_OFLAG_CORRUPT, __return_address);
102}
103
104bool
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700105xchk_xref_process_error(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700106 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700107 xfs_agnumber_t agno,
108 xfs_agblock_t bno,
109 int *error)
Darrick J. Wong64b12562018-01-16 18:52:14 -0800110{
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700111 return __xchk_process_error(sc, agno, bno, error,
Darrick J. Wong64b12562018-01-16 18:52:14 -0800112 XFS_SCRUB_OFLAG_XFAIL, __return_address);
Darrick J. Wong4700d222017-10-17 21:37:36 -0700113}
114
115/* Check for operational errors for a file offset. */
Darrick J. Wong64b12562018-01-16 18:52:14 -0800116static bool
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700117__xchk_fblock_process_error(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700118 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700119 int whichfork,
120 xfs_fileoff_t offset,
121 int *error,
122 __u32 errflag,
123 void *ret_ip)
Darrick J. Wong4700d222017-10-17 21:37:36 -0700124{
125 switch (*error) {
126 case 0:
127 return true;
128 case -EDEADLOCK:
129 /* Used to restart an op with deadlock avoidance. */
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700130 trace_xchk_deadlock_retry(sc->ip, sc->sm, *error);
Darrick J. Wong4700d222017-10-17 21:37:36 -0700131 break;
132 case -EFSBADCRC:
133 case -EFSCORRUPTED:
134 /* Note the badness but don't abort. */
Darrick J. Wong64b12562018-01-16 18:52:14 -0800135 sc->sm->sm_flags |= errflag;
Darrick J. Wong4700d222017-10-17 21:37:36 -0700136 *error = 0;
137 /* fall through */
138 default:
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700139 trace_xchk_file_op_error(sc, whichfork, offset, *error,
Darrick J. Wong64b12562018-01-16 18:52:14 -0800140 ret_ip);
Darrick J. Wong4700d222017-10-17 21:37:36 -0700141 break;
142 }
143 return false;
144}
145
Darrick J. Wong64b12562018-01-16 18:52:14 -0800146bool
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700147xchk_fblock_process_error(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700148 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700149 int whichfork,
150 xfs_fileoff_t offset,
151 int *error)
Darrick J. Wong64b12562018-01-16 18:52:14 -0800152{
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700153 return __xchk_fblock_process_error(sc, whichfork, offset, error,
Darrick J. Wong64b12562018-01-16 18:52:14 -0800154 XFS_SCRUB_OFLAG_CORRUPT, __return_address);
155}
156
157bool
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700158xchk_fblock_xref_process_error(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700159 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700160 int whichfork,
161 xfs_fileoff_t offset,
162 int *error)
Darrick J. Wong64b12562018-01-16 18:52:14 -0800163{
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700164 return __xchk_fblock_process_error(sc, whichfork, offset, error,
Darrick J. Wong64b12562018-01-16 18:52:14 -0800165 XFS_SCRUB_OFLAG_XFAIL, __return_address);
166}
167
Darrick J. Wong4700d222017-10-17 21:37:36 -0700168/*
169 * Handling scrub corruption/optimization/warning checks.
170 *
171 * The *_set_{corrupt,preen,warning}() family of functions are used to
172 * record the presence of metadata that is incorrect (corrupt), could be
173 * optimized somehow (preen), or should be flagged for administrative
174 * review but is not incorrect (warn).
175 *
176 * ftrace can be used to record the precise metadata location and
177 * approximate code location of the failed check.
178 */
179
180/* Record a block which could be optimized. */
181void
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700182xchk_block_set_preen(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700183 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700184 struct xfs_buf *bp)
Darrick J. Wong4700d222017-10-17 21:37:36 -0700185{
186 sc->sm->sm_flags |= XFS_SCRUB_OFLAG_PREEN;
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700187 trace_xchk_block_preen(sc, bp->b_bn, __return_address);
Darrick J. Wong4700d222017-10-17 21:37:36 -0700188}
189
190/*
191 * Record an inode which could be optimized. The trace data will
192 * include the block given by bp if bp is given; otherwise it will use
193 * the block location of the inode record itself.
194 */
195void
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700196xchk_ino_set_preen(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700197 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700198 xfs_ino_t ino)
Darrick J. Wong4700d222017-10-17 21:37:36 -0700199{
200 sc->sm->sm_flags |= XFS_SCRUB_OFLAG_PREEN;
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700201 trace_xchk_ino_preen(sc, ino, __return_address);
Darrick J. Wong4700d222017-10-17 21:37:36 -0700202}
203
Darrick J. Wong75efa572019-04-25 18:26:24 -0700204/* Record something being wrong with the filesystem primary superblock. */
205void
206xchk_set_corrupt(
207 struct xfs_scrub *sc)
208{
209 sc->sm->sm_flags |= XFS_SCRUB_OFLAG_CORRUPT;
210 trace_xchk_fs_error(sc, 0, __return_address);
211}
212
Darrick J. Wong4700d222017-10-17 21:37:36 -0700213/* Record a corrupt block. */
214void
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700215xchk_block_set_corrupt(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700216 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700217 struct xfs_buf *bp)
Darrick J. Wong4700d222017-10-17 21:37:36 -0700218{
219 sc->sm->sm_flags |= XFS_SCRUB_OFLAG_CORRUPT;
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700220 trace_xchk_block_error(sc, bp->b_bn, __return_address);
Darrick J. Wong4700d222017-10-17 21:37:36 -0700221}
222
Darrick J. Wong64b12562018-01-16 18:52:14 -0800223/* Record a corruption while cross-referencing. */
224void
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700225xchk_block_xref_set_corrupt(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700226 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700227 struct xfs_buf *bp)
Darrick J. Wong64b12562018-01-16 18:52:14 -0800228{
229 sc->sm->sm_flags |= XFS_SCRUB_OFLAG_XCORRUPT;
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700230 trace_xchk_block_error(sc, bp->b_bn, __return_address);
Darrick J. Wong64b12562018-01-16 18:52:14 -0800231}
232
Darrick J. Wong4700d222017-10-17 21:37:36 -0700233/*
234 * Record a corrupt inode. The trace data will include the block given
235 * by bp if bp is given; otherwise it will use the block location of the
236 * inode record itself.
237 */
238void
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700239xchk_ino_set_corrupt(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700240 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700241 xfs_ino_t ino)
Darrick J. Wong4700d222017-10-17 21:37:36 -0700242{
243 sc->sm->sm_flags |= XFS_SCRUB_OFLAG_CORRUPT;
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700244 trace_xchk_ino_error(sc, ino, __return_address);
Darrick J. Wong4700d222017-10-17 21:37:36 -0700245}
246
Darrick J. Wong64b12562018-01-16 18:52:14 -0800247/* Record a corruption while cross-referencing with an inode. */
248void
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700249xchk_ino_xref_set_corrupt(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700250 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700251 xfs_ino_t ino)
Darrick J. Wong64b12562018-01-16 18:52:14 -0800252{
253 sc->sm->sm_flags |= XFS_SCRUB_OFLAG_XCORRUPT;
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700254 trace_xchk_ino_error(sc, ino, __return_address);
Darrick J. Wong64b12562018-01-16 18:52:14 -0800255}
256
Darrick J. Wong4700d222017-10-17 21:37:36 -0700257/* Record corruption in a block indexed by a file fork. */
258void
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700259xchk_fblock_set_corrupt(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700260 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700261 int whichfork,
262 xfs_fileoff_t offset)
Darrick J. Wong4700d222017-10-17 21:37:36 -0700263{
264 sc->sm->sm_flags |= XFS_SCRUB_OFLAG_CORRUPT;
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700265 trace_xchk_fblock_error(sc, whichfork, offset, __return_address);
Darrick J. Wong4700d222017-10-17 21:37:36 -0700266}
267
Darrick J. Wong64b12562018-01-16 18:52:14 -0800268/* Record a corruption while cross-referencing a fork block. */
269void
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700270xchk_fblock_xref_set_corrupt(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700271 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700272 int whichfork,
273 xfs_fileoff_t offset)
Darrick J. Wong64b12562018-01-16 18:52:14 -0800274{
275 sc->sm->sm_flags |= XFS_SCRUB_OFLAG_XCORRUPT;
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700276 trace_xchk_fblock_error(sc, whichfork, offset, __return_address);
Darrick J. Wong64b12562018-01-16 18:52:14 -0800277}
278
Darrick J. Wong4700d222017-10-17 21:37:36 -0700279/*
280 * Warn about inodes that need administrative review but is not
281 * incorrect.
282 */
283void
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700284xchk_ino_set_warning(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700285 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700286 xfs_ino_t ino)
Darrick J. Wong4700d222017-10-17 21:37:36 -0700287{
288 sc->sm->sm_flags |= XFS_SCRUB_OFLAG_WARNING;
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700289 trace_xchk_ino_warning(sc, ino, __return_address);
Darrick J. Wong4700d222017-10-17 21:37:36 -0700290}
291
292/* Warn about a block indexed by a file fork that needs review. */
293void
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700294xchk_fblock_set_warning(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700295 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700296 int whichfork,
297 xfs_fileoff_t offset)
Darrick J. Wong4700d222017-10-17 21:37:36 -0700298{
299 sc->sm->sm_flags |= XFS_SCRUB_OFLAG_WARNING;
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700300 trace_xchk_fblock_warning(sc, whichfork, offset, __return_address);
Darrick J. Wong4700d222017-10-17 21:37:36 -0700301}
302
303/* Signal an incomplete scrub. */
304void
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700305xchk_set_incomplete(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700306 struct xfs_scrub *sc)
Darrick J. Wong4700d222017-10-17 21:37:36 -0700307{
308 sc->sm->sm_flags |= XFS_SCRUB_OFLAG_INCOMPLETE;
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700309 trace_xchk_incomplete(sc, __return_address);
Darrick J. Wong4700d222017-10-17 21:37:36 -0700310}
311
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700312/*
Darrick J. Wongd8526572018-01-16 18:53:08 -0800313 * rmap scrubbing -- compute the number of blocks with a given owner,
314 * at least according to the reverse mapping data.
315 */
316
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700317struct xchk_rmap_ownedby_info {
Darrick J. Wong66e32372018-12-12 08:46:23 -0800318 const struct xfs_owner_info *oinfo;
319 xfs_filblks_t *blocks;
Darrick J. Wongd8526572018-01-16 18:53:08 -0800320};
321
322STATIC int
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700323xchk_count_rmap_ownedby_irec(
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700324 struct xfs_btree_cur *cur,
325 struct xfs_rmap_irec *rec,
326 void *priv)
Darrick J. Wongd8526572018-01-16 18:53:08 -0800327{
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700328 struct xchk_rmap_ownedby_info *sroi = priv;
329 bool irec_attr;
330 bool oinfo_attr;
Darrick J. Wongd8526572018-01-16 18:53:08 -0800331
332 irec_attr = rec->rm_flags & XFS_RMAP_ATTR_FORK;
333 oinfo_attr = sroi->oinfo->oi_flags & XFS_OWNER_INFO_ATTR_FORK;
334
335 if (rec->rm_owner != sroi->oinfo->oi_owner)
336 return 0;
337
338 if (XFS_RMAP_NON_INODE_OWNER(rec->rm_owner) || irec_attr == oinfo_attr)
339 (*sroi->blocks) += rec->rm_blockcount;
340
341 return 0;
342}
343
344/*
345 * Calculate the number of blocks the rmap thinks are owned by something.
346 * The caller should pass us an rmapbt cursor.
347 */
348int
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700349xchk_count_rmap_ownedby_ag(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700350 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700351 struct xfs_btree_cur *cur,
Darrick J. Wong66e32372018-12-12 08:46:23 -0800352 const struct xfs_owner_info *oinfo,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700353 xfs_filblks_t *blocks)
Darrick J. Wongd8526572018-01-16 18:53:08 -0800354{
Darrick J. Wong66e32372018-12-12 08:46:23 -0800355 struct xchk_rmap_ownedby_info sroi = {
356 .oinfo = oinfo,
357 .blocks = blocks,
358 };
Darrick J. Wongd8526572018-01-16 18:53:08 -0800359
Darrick J. Wongd8526572018-01-16 18:53:08 -0800360 *blocks = 0;
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700361 return xfs_rmap_query_all(cur, xchk_count_rmap_ownedby_irec,
Darrick J. Wongd8526572018-01-16 18:53:08 -0800362 &sroi);
363}
364
365/*
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700366 * AG scrubbing
367 *
368 * These helpers facilitate locking an allocation group's header
369 * buffers, setting up cursors for all btrees that are present, and
370 * cleaning everything up once we're through.
371 */
372
Darrick J. Wongab9d5dc2017-10-17 21:37:39 -0700373/* Decide if we want to return an AG header read failure. */
374static inline bool
375want_ag_read_header_failure(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700376 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700377 unsigned int type)
Darrick J. Wongab9d5dc2017-10-17 21:37:39 -0700378{
379 /* Return all AG header read failures when scanning btrees. */
380 if (sc->sm->sm_type != XFS_SCRUB_TYPE_AGF &&
Darrick J. Wonga12890a2017-10-17 21:37:39 -0700381 sc->sm->sm_type != XFS_SCRUB_TYPE_AGFL &&
382 sc->sm->sm_type != XFS_SCRUB_TYPE_AGI)
Darrick J. Wongab9d5dc2017-10-17 21:37:39 -0700383 return true;
384 /*
385 * If we're scanning a given type of AG header, we only want to
386 * see read failures from that specific header. We'd like the
387 * other headers to cross-check them, but this isn't required.
388 */
389 if (sc->sm->sm_type == type)
390 return true;
391 return false;
392}
393
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700394/*
395 * Grab all the headers for an AG.
396 *
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700397 * The headers should be released by xchk_ag_free, but as a fail
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700398 * safe we attach all the buffers we grab to the scrub transaction so
399 * they'll all be freed when we cancel it.
400 */
401int
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700402xchk_ag_read_headers(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700403 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700404 xfs_agnumber_t agno,
405 struct xfs_buf **agi,
406 struct xfs_buf **agf,
407 struct xfs_buf **agfl)
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700408{
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700409 struct xfs_mount *mp = sc->mp;
410 int error;
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700411
412 error = xfs_ialloc_read_agi(mp, sc->tp, agno, agi);
Darrick J. Wonga12890a2017-10-17 21:37:39 -0700413 if (error && want_ag_read_header_failure(sc, XFS_SCRUB_TYPE_AGI))
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700414 goto out;
415
416 error = xfs_alloc_read_agf(mp, sc->tp, agno, 0, agf);
Darrick J. Wongab9d5dc2017-10-17 21:37:39 -0700417 if (error && want_ag_read_header_failure(sc, XFS_SCRUB_TYPE_AGF))
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700418 goto out;
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700419
420 error = xfs_alloc_read_agfl(mp, sc->tp, agno, agfl);
Darrick J. Wongab9d5dc2017-10-17 21:37:39 -0700421 if (error && want_ag_read_header_failure(sc, XFS_SCRUB_TYPE_AGFL))
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700422 goto out;
Darrick J. Wong5a0f4332018-01-08 10:49:02 -0800423 error = 0;
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700424out:
425 return error;
426}
427
428/* Release all the AG btree cursors. */
429void
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700430xchk_ag_btcur_free(
431 struct xchk_ag *sa)
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700432{
433 if (sa->refc_cur)
434 xfs_btree_del_cursor(sa->refc_cur, XFS_BTREE_ERROR);
435 if (sa->rmap_cur)
436 xfs_btree_del_cursor(sa->rmap_cur, XFS_BTREE_ERROR);
437 if (sa->fino_cur)
438 xfs_btree_del_cursor(sa->fino_cur, XFS_BTREE_ERROR);
439 if (sa->ino_cur)
440 xfs_btree_del_cursor(sa->ino_cur, XFS_BTREE_ERROR);
441 if (sa->cnt_cur)
442 xfs_btree_del_cursor(sa->cnt_cur, XFS_BTREE_ERROR);
443 if (sa->bno_cur)
444 xfs_btree_del_cursor(sa->bno_cur, XFS_BTREE_ERROR);
445
446 sa->refc_cur = NULL;
447 sa->rmap_cur = NULL;
448 sa->fino_cur = NULL;
449 sa->ino_cur = NULL;
450 sa->bno_cur = NULL;
451 sa->cnt_cur = NULL;
452}
453
454/* Initialize all the btree cursors for an AG. */
455int
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700456xchk_ag_btcur_init(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700457 struct xfs_scrub *sc,
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700458 struct xchk_ag *sa)
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700459{
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700460 struct xfs_mount *mp = sc->mp;
461 xfs_agnumber_t agno = sa->agno;
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700462
Darrick J. Wong4fb79512019-04-16 08:22:01 -0700463 xchk_perag_get(sc->mp, sa);
464 if (sa->agf_bp &&
465 xchk_ag_btree_healthy_enough(sc, sa->pag, XFS_BTNUM_BNO)) {
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700466 /* Set up a bnobt cursor for cross-referencing. */
467 sa->bno_cur = xfs_allocbt_init_cursor(mp, sc->tp, sa->agf_bp,
468 agno, XFS_BTNUM_BNO);
469 if (!sa->bno_cur)
470 goto err;
Darrick J. Wong4fb79512019-04-16 08:22:01 -0700471 }
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700472
Darrick J. Wong4fb79512019-04-16 08:22:01 -0700473 if (sa->agf_bp &&
474 xchk_ag_btree_healthy_enough(sc, sa->pag, XFS_BTNUM_CNT)) {
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700475 /* Set up a cntbt cursor for cross-referencing. */
476 sa->cnt_cur = xfs_allocbt_init_cursor(mp, sc->tp, sa->agf_bp,
477 agno, XFS_BTNUM_CNT);
478 if (!sa->cnt_cur)
479 goto err;
480 }
481
482 /* Set up a inobt cursor for cross-referencing. */
Darrick J. Wong4fb79512019-04-16 08:22:01 -0700483 if (sa->agi_bp &&
484 xchk_ag_btree_healthy_enough(sc, sa->pag, XFS_BTNUM_INO)) {
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700485 sa->ino_cur = xfs_inobt_init_cursor(mp, sc->tp, sa->agi_bp,
486 agno, XFS_BTNUM_INO);
487 if (!sa->ino_cur)
488 goto err;
489 }
490
491 /* Set up a finobt cursor for cross-referencing. */
Darrick J. Wong4fb79512019-04-16 08:22:01 -0700492 if (sa->agi_bp && xfs_sb_version_hasfinobt(&mp->m_sb) &&
493 xchk_ag_btree_healthy_enough(sc, sa->pag, XFS_BTNUM_FINO)) {
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700494 sa->fino_cur = xfs_inobt_init_cursor(mp, sc->tp, sa->agi_bp,
495 agno, XFS_BTNUM_FINO);
496 if (!sa->fino_cur)
497 goto err;
498 }
499
500 /* Set up a rmapbt cursor for cross-referencing. */
Darrick J. Wong4fb79512019-04-16 08:22:01 -0700501 if (sa->agf_bp && xfs_sb_version_hasrmapbt(&mp->m_sb) &&
502 xchk_ag_btree_healthy_enough(sc, sa->pag, XFS_BTNUM_RMAP)) {
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700503 sa->rmap_cur = xfs_rmapbt_init_cursor(mp, sc->tp, sa->agf_bp,
504 agno);
505 if (!sa->rmap_cur)
506 goto err;
507 }
508
509 /* Set up a refcountbt cursor for cross-referencing. */
Darrick J. Wong4fb79512019-04-16 08:22:01 -0700510 if (sa->agf_bp && xfs_sb_version_hasreflink(&mp->m_sb) &&
511 xchk_ag_btree_healthy_enough(sc, sa->pag, XFS_BTNUM_REFC)) {
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700512 sa->refc_cur = xfs_refcountbt_init_cursor(mp, sc->tp,
Brian Fostered7ef8e2018-07-11 22:26:17 -0700513 sa->agf_bp, agno);
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700514 if (!sa->refc_cur)
515 goto err;
516 }
517
518 return 0;
519err:
520 return -ENOMEM;
521}
522
523/* Release the AG header context and btree cursors. */
524void
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700525xchk_ag_free(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700526 struct xfs_scrub *sc,
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700527 struct xchk_ag *sa)
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700528{
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700529 xchk_ag_btcur_free(sa);
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700530 if (sa->agfl_bp) {
531 xfs_trans_brelse(sc->tp, sa->agfl_bp);
532 sa->agfl_bp = NULL;
533 }
534 if (sa->agf_bp) {
535 xfs_trans_brelse(sc->tp, sa->agf_bp);
536 sa->agf_bp = NULL;
537 }
538 if (sa->agi_bp) {
539 xfs_trans_brelse(sc->tp, sa->agi_bp);
540 sa->agi_bp = NULL;
541 }
Darrick J. Wong51863d72018-05-29 22:24:44 -0700542 if (sa->pag) {
543 xfs_perag_put(sa->pag);
544 sa->pag = NULL;
545 }
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700546 sa->agno = NULLAGNUMBER;
547}
548
549/*
550 * For scrub, grab the AGI and the AGF headers, in that order. Locking
551 * order requires us to get the AGI before the AGF. We use the
552 * transaction to avoid deadlocking on crosslinked metadata buffers;
553 * either the caller passes one in (bmap scrub) or we have to create a
554 * transaction ourselves.
555 */
556int
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700557xchk_ag_init(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700558 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700559 xfs_agnumber_t agno,
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700560 struct xchk_ag *sa)
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700561{
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700562 int error;
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700563
564 sa->agno = agno;
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700565 error = xchk_ag_read_headers(sc, agno, &sa->agi_bp,
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700566 &sa->agf_bp, &sa->agfl_bp);
567 if (error)
568 return error;
569
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700570 return xchk_ag_btcur_init(sc, sa);
Darrick J. Wongb6c1beb2017-10-17 21:37:38 -0700571}
572
Darrick J. Wong51863d72018-05-29 22:24:44 -0700573/*
574 * Grab the per-ag structure if we haven't already gotten it. Teardown of the
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700575 * xchk_ag will release it for us.
Darrick J. Wong51863d72018-05-29 22:24:44 -0700576 */
577void
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700578xchk_perag_get(
Darrick J. Wong51863d72018-05-29 22:24:44 -0700579 struct xfs_mount *mp,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700580 struct xchk_ag *sa)
Darrick J. Wong51863d72018-05-29 22:24:44 -0700581{
582 if (!sa->pag)
583 sa->pag = xfs_perag_get(mp, sa->agno);
584}
585
Darrick J. Wongdcb660f2017-10-17 21:37:36 -0700586/* Per-scrubber setup functions */
587
Darrick J. Wong9d9c9022018-05-09 10:02:01 -0700588/*
589 * Grab an empty transaction so that we can re-grab locked buffers if
590 * one of our btrees turns out to be cyclic.
Darrick J. Wong0a9633f2018-05-29 22:18:08 -0700591 *
592 * If we're going to repair something, we need to ask for the largest possible
593 * log reservation so that we can handle the worst case scenario for metadata
594 * updates while rebuilding a metadata item. We also need to reserve as many
595 * blocks in the head transaction as we think we're going to need to rebuild
596 * the metadata object.
Darrick J. Wong9d9c9022018-05-09 10:02:01 -0700597 */
598int
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700599xchk_trans_alloc(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700600 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700601 uint resblks)
Darrick J. Wong9d9c9022018-05-09 10:02:01 -0700602{
Darrick J. Wong0a9633f2018-05-29 22:18:08 -0700603 if (sc->sm->sm_flags & XFS_SCRUB_IFLAG_REPAIR)
604 return xfs_trans_alloc(sc->mp, &M_RES(sc->mp)->tr_itruncate,
605 resblks, 0, 0, &sc->tp);
606
Darrick J. Wong9d9c9022018-05-09 10:02:01 -0700607 return xfs_trans_alloc_empty(sc->mp, &sc->tp);
608}
609
Darrick J. Wongdcb660f2017-10-17 21:37:36 -0700610/* Set us up with a transaction and an empty context. */
611int
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700612xchk_setup_fs(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700613 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700614 struct xfs_inode *ip)
Darrick J. Wongdcb660f2017-10-17 21:37:36 -0700615{
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700616 uint resblks;
Darrick J. Wong0a9633f2018-05-29 22:18:08 -0700617
Darrick J. Wongb5e21962018-07-19 12:29:11 -0700618 resblks = xrep_calc_ag_resblks(sc);
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700619 return xchk_trans_alloc(sc, resblks);
Darrick J. Wongdcb660f2017-10-17 21:37:36 -0700620}
Darrick J. Wongefa7a992017-10-17 21:37:40 -0700621
622/* Set us up with AG headers and btree cursors. */
623int
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700624xchk_setup_ag_btree(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700625 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700626 struct xfs_inode *ip,
627 bool force_log)
Darrick J. Wongefa7a992017-10-17 21:37:40 -0700628{
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700629 struct xfs_mount *mp = sc->mp;
630 int error;
Darrick J. Wongefa7a992017-10-17 21:37:40 -0700631
Darrick J. Wong3daa6642017-10-17 21:37:40 -0700632 /*
633 * If the caller asks us to checkpont the log, do so. This
634 * expensive operation should be performed infrequently and only
635 * as a last resort. Any caller that sets force_log should
636 * document why they need to do so.
637 */
638 if (force_log) {
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700639 error = xchk_checkpoint_log(mp);
Darrick J. Wong3daa6642017-10-17 21:37:40 -0700640 if (error)
641 return error;
642 }
643
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700644 error = xchk_setup_fs(sc, ip);
Darrick J. Wongefa7a992017-10-17 21:37:40 -0700645 if (error)
646 return error;
647
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700648 return xchk_ag_init(sc, sc->sm->sm_agno, &sc->sa);
Darrick J. Wongefa7a992017-10-17 21:37:40 -0700649}
Darrick J. Wong3daa6642017-10-17 21:37:40 -0700650
651/* Push everything out of the log onto disk. */
652int
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700653xchk_checkpoint_log(
Darrick J. Wong3daa6642017-10-17 21:37:40 -0700654 struct xfs_mount *mp)
655{
656 int error;
657
Christoph Hellwig60e5bb72018-03-13 23:15:28 -0700658 error = xfs_log_force(mp, XFS_LOG_SYNC);
Darrick J. Wong3daa6642017-10-17 21:37:40 -0700659 if (error)
660 return error;
661 xfs_ail_push_all_sync(mp->m_ail);
662 return 0;
663}
Darrick J. Wong80e4e122017-10-17 21:37:42 -0700664
665/*
666 * Given an inode and the scrub control structure, grab either the
667 * inode referenced in the control structure or the inode passed in.
668 * The inode is not locked.
669 */
670int
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700671xchk_get_inode(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700672 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700673 struct xfs_inode *ip_in)
Darrick J. Wong80e4e122017-10-17 21:37:42 -0700674{
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700675 struct xfs_imap imap;
676 struct xfs_mount *mp = sc->mp;
677 struct xfs_inode *ip = NULL;
678 int error;
Darrick J. Wong80e4e122017-10-17 21:37:42 -0700679
Darrick J. Wong80e4e122017-10-17 21:37:42 -0700680 /* We want to scan the inode we already had opened. */
681 if (sc->sm->sm_ino == 0 || sc->sm->sm_ino == ip_in->i_ino) {
682 sc->ip = ip_in;
683 return 0;
684 }
685
686 /* Look up the inode, see if the generation number matches. */
687 if (xfs_internal_inum(mp, sc->sm->sm_ino))
688 return -ENOENT;
689 error = xfs_iget(mp, NULL, sc->sm->sm_ino,
690 XFS_IGET_UNTRUSTED | XFS_IGET_DONTCACHE, 0, &ip);
Darrick J. Wongd658e722018-01-08 10:49:04 -0800691 switch (error) {
692 case -ENOENT:
693 /* Inode doesn't exist, just bail out. */
694 return error;
695 case 0:
696 /* Got an inode, continue. */
697 break;
698 case -EINVAL:
699 /*
700 * -EINVAL with IGET_UNTRUSTED could mean one of several
701 * things: userspace gave us an inode number that doesn't
702 * correspond to fs space, or doesn't have an inobt entry;
703 * or it could simply mean that the inode buffer failed the
704 * read verifiers.
705 *
706 * Try just the inode mapping lookup -- if it succeeds, then
707 * the inode buffer verifier failed and something needs fixing.
708 * Otherwise, we really couldn't find it so tell userspace
709 * that it no longer exists.
710 */
711 error = xfs_imap(sc->mp, sc->tp, sc->sm->sm_ino, &imap,
712 XFS_IGET_UNTRUSTED | XFS_IGET_DONTCACHE);
713 if (error)
714 return -ENOENT;
715 error = -EFSCORRUPTED;
716 /* fall through */
717 default:
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700718 trace_xchk_op_error(sc,
Darrick J. Wong80e4e122017-10-17 21:37:42 -0700719 XFS_INO_TO_AGNO(mp, sc->sm->sm_ino),
720 XFS_INO_TO_AGBNO(mp, sc->sm->sm_ino),
721 error, __return_address);
722 return error;
723 }
724 if (VFS_I(ip)->i_generation != sc->sm->sm_gen) {
Darrick J. Wong44a87362018-07-25 12:52:32 -0700725 xfs_irele(ip);
Darrick J. Wong80e4e122017-10-17 21:37:42 -0700726 return -ENOENT;
727 }
728
729 sc->ip = ip;
730 return 0;
731}
Darrick J. Wonga5c46e52017-10-17 21:37:44 -0700732
733/* Set us up to scrub a file's contents. */
734int
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700735xchk_setup_inode_contents(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700736 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700737 struct xfs_inode *ip,
738 unsigned int resblks)
Darrick J. Wonga5c46e52017-10-17 21:37:44 -0700739{
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700740 int error;
Darrick J. Wonga5c46e52017-10-17 21:37:44 -0700741
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700742 error = xchk_get_inode(sc, ip);
Darrick J. Wonga5c46e52017-10-17 21:37:44 -0700743 if (error)
744 return error;
745
746 /* Got the inode, lock it and we're ready to go. */
747 sc->ilock_flags = XFS_IOLOCK_EXCL | XFS_MMAPLOCK_EXCL;
748 xfs_ilock(sc->ip, sc->ilock_flags);
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700749 error = xchk_trans_alloc(sc, resblks);
Darrick J. Wonga5c46e52017-10-17 21:37:44 -0700750 if (error)
751 goto out;
752 sc->ilock_flags |= XFS_ILOCK_EXCL;
753 xfs_ilock(sc->ip, XFS_ILOCK_EXCL);
754
755out:
756 /* scrub teardown will unlock and release the inode for us */
757 return error;
758}
Darrick J. Wong64b12562018-01-16 18:52:14 -0800759
760/*
761 * Predicate that decides if we need to evaluate the cross-reference check.
762 * If there was an error accessing the cross-reference btree, just delete
763 * the cursor and skip the check.
764 */
765bool
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700766xchk_should_check_xref(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700767 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700768 int *error,
769 struct xfs_btree_cur **curpp)
Darrick J. Wong64b12562018-01-16 18:52:14 -0800770{
Darrick J. Wong8389f3ff2018-05-14 06:34:31 -0700771 /* No point in xref if we already know we're corrupt. */
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700772 if (xchk_skip_xref(sc->sm))
Darrick J. Wong8389f3ff2018-05-14 06:34:31 -0700773 return false;
774
Darrick J. Wong64b12562018-01-16 18:52:14 -0800775 if (*error == 0)
776 return true;
777
778 if (curpp) {
779 /* If we've already given up on xref, just bail out. */
780 if (!*curpp)
781 return false;
782
783 /* xref error, delete cursor and bail out. */
784 xfs_btree_del_cursor(*curpp, XFS_BTREE_ERROR);
785 *curpp = NULL;
786 }
787
788 sc->sm->sm_flags |= XFS_SCRUB_OFLAG_XFAIL;
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700789 trace_xchk_xref_error(sc, *error, __return_address);
Darrick J. Wong64b12562018-01-16 18:52:14 -0800790
791 /*
792 * Errors encountered during cross-referencing with another
793 * data structure should not cause this scrubber to abort.
794 */
795 *error = 0;
796 return false;
797}
Darrick J. Wongcf1b0b82018-01-16 18:53:11 -0800798
799/* Run the structure verifiers on in-memory buffers to detect bad memory. */
800void
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700801xchk_buffer_recheck(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700802 struct xfs_scrub *sc,
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700803 struct xfs_buf *bp)
Darrick J. Wongcf1b0b82018-01-16 18:53:11 -0800804{
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700805 xfs_failaddr_t fa;
Darrick J. Wongcf1b0b82018-01-16 18:53:11 -0800806
807 if (bp->b_ops == NULL) {
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700808 xchk_block_set_corrupt(sc, bp);
Darrick J. Wongcf1b0b82018-01-16 18:53:11 -0800809 return;
810 }
811 if (bp->b_ops->verify_struct == NULL) {
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700812 xchk_set_incomplete(sc);
Darrick J. Wongcf1b0b82018-01-16 18:53:11 -0800813 return;
814 }
815 fa = bp->b_ops->verify_struct(bp);
816 if (!fa)
817 return;
818 sc->sm->sm_flags |= XFS_SCRUB_OFLAG_CORRUPT;
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700819 trace_xchk_block_error(sc, bp->b_bn, fa);
Darrick J. Wongcf1b0b82018-01-16 18:53:11 -0800820}
Darrick J. Wong87d9d602018-05-14 06:34:33 -0700821
822/*
823 * Scrub the attr/data forks of a metadata inode. The metadata inode must be
824 * pointed to by sc->ip and the ILOCK must be held.
825 */
826int
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700827xchk_metadata_inode_forks(
Darrick J. Wong1d8a7482018-07-19 12:29:12 -0700828 struct xfs_scrub *sc)
Darrick J. Wong87d9d602018-05-14 06:34:33 -0700829{
Darrick J. Wong032d91f2018-07-19 12:29:12 -0700830 __u32 smtype;
831 bool shared;
832 int error;
Darrick J. Wong87d9d602018-05-14 06:34:33 -0700833
834 if (sc->sm->sm_flags & XFS_SCRUB_OFLAG_CORRUPT)
835 return 0;
836
837 /* Metadata inodes don't live on the rt device. */
838 if (sc->ip->i_d.di_flags & XFS_DIFLAG_REALTIME) {
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700839 xchk_ino_set_corrupt(sc, sc->ip->i_ino);
Darrick J. Wong87d9d602018-05-14 06:34:33 -0700840 return 0;
841 }
842
843 /* They should never participate in reflink. */
844 if (xfs_is_reflink_inode(sc->ip)) {
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700845 xchk_ino_set_corrupt(sc, sc->ip->i_ino);
Darrick J. Wong87d9d602018-05-14 06:34:33 -0700846 return 0;
847 }
848
849 /* They also should never have extended attributes. */
850 if (xfs_inode_hasattr(sc->ip)) {
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700851 xchk_ino_set_corrupt(sc, sc->ip->i_ino);
Darrick J. Wong87d9d602018-05-14 06:34:33 -0700852 return 0;
853 }
854
855 /* Invoke the data fork scrubber. */
856 smtype = sc->sm->sm_type;
857 sc->sm->sm_type = XFS_SCRUB_TYPE_BMBTD;
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700858 error = xchk_bmap_data(sc);
Darrick J. Wong87d9d602018-05-14 06:34:33 -0700859 sc->sm->sm_type = smtype;
860 if (error || (sc->sm->sm_flags & XFS_SCRUB_OFLAG_CORRUPT))
861 return error;
862
863 /* Look for incorrect shared blocks. */
864 if (xfs_sb_version_hasreflink(&sc->mp->m_sb)) {
865 error = xfs_reflink_inode_has_shared_extents(sc->tp, sc->ip,
866 &shared);
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700867 if (!xchk_fblock_process_error(sc, XFS_DATA_FORK, 0,
Darrick J. Wong87d9d602018-05-14 06:34:33 -0700868 &error))
869 return error;
870 if (shared)
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700871 xchk_ino_set_corrupt(sc, sc->ip->i_ino);
Darrick J. Wong87d9d602018-05-14 06:34:33 -0700872 }
873
874 return error;
875}
Darrick J. Wongddd10c22018-05-14 06:34:34 -0700876
877/*
878 * Try to lock an inode in violation of the usual locking order rules. For
879 * example, trying to get the IOLOCK while in transaction context, or just
880 * plain breaking AG-order or inode-order inode locking rules. Either way,
881 * the only way to avoid an ABBA deadlock is to use trylock and back off if
882 * we can't.
883 */
884int
Darrick J. Wongc517b3a2018-07-19 12:29:11 -0700885xchk_ilock_inverted(
Darrick J. Wongddd10c22018-05-14 06:34:34 -0700886 struct xfs_inode *ip,
887 uint lock_mode)
888{
889 int i;
890
891 for (i = 0; i < 20; i++) {
892 if (xfs_ilock_nowait(ip, lock_mode))
893 return 0;
894 delay(1);
895 }
896 return -EDEADLOCK;
897}
Darrick J. Wong9a1f3042019-04-25 18:26:23 -0700898
899/* Pause background reaping of resources. */
900void
901xchk_stop_reaping(
902 struct xfs_scrub *sc)
903{
904 sc->flags |= XCHK_REAPING_DISABLED;
905 xfs_stop_block_reaping(sc->mp);
906}
907
908/* Restart background reaping of resources. */
909void
910xchk_start_reaping(
911 struct xfs_scrub *sc)
912{
913 xfs_start_block_reaping(sc->mp);
914 sc->flags &= ~XCHK_REAPING_DISABLED;
915}