summaryrefslogtreecommitdiff
path: root/libbcachefs/super.c
diff options
context:
space:
mode:
authorKent Overstreet <kent.overstreet@gmail.com>2017-03-19 15:56:34 -0800
committerKent Overstreet <kent.overstreet@gmail.com>2017-03-19 17:31:47 -0800
commit5ec39af8eaba49aee7bafa44c661da39e2f40dc3 (patch)
tree1fb1a981602cbf22c7d2b2dba1168c715d7cecb5 /libbcachefs/super.c
parentbb1941de5378a7b8122d3575dcbc7d0aeb6326f0 (diff)
Rename from bcache-tools to bcachefs-tools
Diffstat (limited to 'libbcachefs/super.c')
-rw-r--r--libbcachefs/super.c1832
1 files changed, 1832 insertions, 0 deletions
diff --git a/libbcachefs/super.c b/libbcachefs/super.c
new file mode 100644
index 00000000..8aa5cc00
--- /dev/null
+++ b/libbcachefs/super.c
@@ -0,0 +1,1832 @@
+/*
+ * bcachefs setup/teardown code, and some metadata io - read a superblock and
+ * figure out what to do with it.
+ *
+ * Copyright 2010, 2011 Kent Overstreet <kent.overstreet@gmail.com>
+ * Copyright 2012 Google, Inc.
+ */
+
+#include "bcachefs.h"
+#include "alloc.h"
+#include "btree_cache.h"
+#include "btree_gc.h"
+#include "btree_update.h"
+#include "btree_io.h"
+#include "chardev.h"
+#include "checksum.h"
+#include "clock.h"
+#include "compress.h"
+#include "debug.h"
+#include "error.h"
+#include "fs.h"
+#include "fs-gc.h"
+#include "inode.h"
+#include "io.h"
+#include "journal.h"
+#include "keylist.h"
+#include "move.h"
+#include "migrate.h"
+#include "movinggc.h"
+#include "super.h"
+#include "super-io.h"
+#include "tier.h"
+
+#include <linux/backing-dev.h>
+#include <linux/blkdev.h>
+#include <linux/debugfs.h>
+#include <linux/device.h>
+#include <linux/genhd.h>
+#include <linux/idr.h>
+#include <linux/kthread.h>
+#include <linux/module.h>
+#include <linux/percpu.h>
+#include <linux/random.h>
+#include <linux/sysfs.h>
+#include <crypto/hash.h>
+
+#include <trace/events/bcachefs.h>
+
+MODULE_LICENSE("GPL");
+MODULE_AUTHOR("Kent Overstreet <kent.overstreet@gmail.com>");
+
+static const uuid_le invalid_uuid = {
+ .b = {
+ 0xa0, 0x3e, 0xf8, 0xed, 0x3e, 0xe1, 0xb8, 0x78,
+ 0xc8, 0x50, 0xfc, 0x5e, 0xcb, 0x16, 0xcd, 0x99
+ }
+};
+
+static struct kset *bcachefs_kset;
+static LIST_HEAD(bch_fs_list);
+static DEFINE_MUTEX(bch_fs_list_lock);
+
+static DECLARE_WAIT_QUEUE_HEAD(bch_read_only_wait);
+
+static void bch2_dev_free(struct bch_dev *);
+static int bch2_dev_alloc(struct bch_fs *, unsigned);
+static int bch2_dev_sysfs_online(struct bch_dev *);
+static void __bch2_dev_read_only(struct bch_fs *, struct bch_dev *);
+
+struct bch_fs *bch2_bdev_to_fs(struct block_device *bdev)
+{
+ struct bch_fs *c;
+ struct bch_dev *ca;
+ unsigned i;
+
+ mutex_lock(&bch_fs_list_lock);
+ rcu_read_lock();
+
+ list_for_each_entry(c, &bch_fs_list, list)
+ for_each_member_device_rcu(ca, c, i)
+ if (ca->disk_sb.bdev == bdev) {
+ closure_get(&c->cl);
+ goto found;
+ }
+ c = NULL;
+found:
+ rcu_read_unlock();
+ mutex_unlock(&bch_fs_list_lock);
+
+ return c;
+}
+
+static struct bch_fs *__bch2_uuid_to_fs(uuid_le uuid)
+{
+ struct bch_fs *c;
+
+ lockdep_assert_held(&bch_fs_list_lock);
+
+ list_for_each_entry(c, &bch_fs_list, list)
+ if (!memcmp(&c->disk_sb->uuid, &uuid, sizeof(uuid_le)))
+ return c;
+
+ return NULL;
+}
+
+struct bch_fs *bch2_uuid_to_fs(uuid_le uuid)
+{
+ struct bch_fs *c;
+
+ mutex_lock(&bch_fs_list_lock);
+ c = __bch2_uuid_to_fs(uuid);
+ if (c)
+ closure_get(&c->cl);
+ mutex_unlock(&bch_fs_list_lock);
+
+ return c;
+}
+
+int bch2_congested(struct bch_fs *c, int bdi_bits)
+{
+ struct backing_dev_info *bdi;
+ struct bch_dev *ca;
+ unsigned i;
+ int ret = 0;
+
+ if (bdi_bits & (1 << WB_sync_congested)) {
+ /* Reads - check all devices: */
+ for_each_readable_member(ca, c, i) {
+ bdi = blk_get_backing_dev_info(ca->disk_sb.bdev);
+
+ if (bdi_congested(bdi, bdi_bits)) {
+ ret = 1;
+ break;
+ }
+ }
+ } else {
+ /* Writes prefer fastest tier: */
+ struct bch_tier *tier = READ_ONCE(c->fastest_tier);
+ struct dev_group *grp = tier ? &tier->devs : &c->all_devs;
+
+ rcu_read_lock();
+ group_for_each_dev(ca, grp, i) {
+ bdi = blk_get_backing_dev_info(ca->disk_sb.bdev);
+
+ if (bdi_congested(bdi, bdi_bits)) {
+ ret = 1;
+ break;
+ }
+ }
+ rcu_read_unlock();
+ }
+
+ return ret;
+}
+
+static int bch2_congested_fn(void *data, int bdi_bits)
+{
+ struct bch_fs *c = data;
+
+ return bch2_congested(c, bdi_bits);
+}
+
+/* Filesystem RO/RW: */
+
+/*
+ * For startup/shutdown of RW stuff, the dependencies are:
+ *
+ * - foreground writes depend on copygc and tiering (to free up space)
+ *
+ * - copygc and tiering depend on mark and sweep gc (they actually probably
+ * don't because they either reserve ahead of time or don't block if
+ * allocations fail, but allocations can require mark and sweep gc to run
+ * because of generation number wraparound)
+ *
+ * - all of the above depends on the allocator threads
+ *
+ * - allocator depends on the journal (when it rewrites prios and gens)
+ */
+
+static void __bch2_fs_read_only(struct bch_fs *c)
+{
+ struct bch_dev *ca;
+ unsigned i;
+
+ bch2_tiering_stop(c);
+
+ for_each_member_device(ca, c, i)
+ bch2_moving_gc_stop(ca);
+
+ bch2_gc_thread_stop(c);
+
+ bch2_btree_flush(c);
+
+ for_each_member_device(ca, c, i)
+ bch2_dev_allocator_stop(ca);
+
+ bch2_fs_journal_stop(&c->journal);
+}
+
+static void bch2_writes_disabled(struct percpu_ref *writes)
+{
+ struct bch_fs *c = container_of(writes, struct bch_fs, writes);
+
+ set_bit(BCH_FS_WRITE_DISABLE_COMPLETE, &c->flags);
+ wake_up(&bch_read_only_wait);
+}
+
+void bch2_fs_read_only(struct bch_fs *c)
+{
+ mutex_lock(&c->state_lock);
+ if (c->state != BCH_FS_STARTING &&
+ c->state != BCH_FS_RW)
+ goto out;
+
+ if (test_bit(BCH_FS_ERROR, &c->flags))
+ goto out;
+
+ /*
+ * Block new foreground-end write operations from starting - any new
+ * writes will return -EROFS:
+ *
+ * (This is really blocking new _allocations_, writes to previously
+ * allocated space can still happen until stopping the allocator in
+ * bch2_dev_allocator_stop()).
+ */
+ percpu_ref_kill(&c->writes);
+
+ del_timer(&c->foreground_write_wakeup);
+ cancel_delayed_work(&c->pd_controllers_update);
+
+ c->foreground_write_pd.rate.rate = UINT_MAX;
+ bch2_wake_delayed_writes((unsigned long) c);
+
+ /*
+ * If we're not doing an emergency shutdown, we want to wait on
+ * outstanding writes to complete so they don't see spurious errors due
+ * to shutting down the allocator:
+ *
+ * If we are doing an emergency shutdown outstanding writes may
+ * hang until we shutdown the allocator so we don't want to wait
+ * on outstanding writes before shutting everything down - but
+ * we do need to wait on them before returning and signalling
+ * that going RO is complete:
+ */
+ wait_event(bch_read_only_wait,
+ test_bit(BCH_FS_WRITE_DISABLE_COMPLETE, &c->flags) ||
+ test_bit(BCH_FS_EMERGENCY_RO, &c->flags));
+
+ __bch2_fs_read_only(c);
+
+ wait_event(bch_read_only_wait,
+ test_bit(BCH_FS_WRITE_DISABLE_COMPLETE, &c->flags));
+
+ clear_bit(BCH_FS_WRITE_DISABLE_COMPLETE, &c->flags);
+
+ if (!bch2_journal_error(&c->journal) &&
+ !test_bit(BCH_FS_ERROR, &c->flags)) {
+ mutex_lock(&c->sb_lock);
+ SET_BCH_SB_CLEAN(c->disk_sb, true);
+ bch2_write_super(c);
+ mutex_unlock(&c->sb_lock);
+ }
+
+ c->state = BCH_FS_RO;
+out:
+ mutex_unlock(&c->state_lock);
+}
+
+static void bch2_fs_read_only_work(struct work_struct *work)
+{
+ struct bch_fs *c =
+ container_of(work, struct bch_fs, read_only_work);
+
+ bch2_fs_read_only(c);
+}
+
+static void bch2_fs_read_only_async(struct bch_fs *c)
+{
+ queue_work(system_long_wq, &c->read_only_work);
+}
+
+bool bch2_fs_emergency_read_only(struct bch_fs *c)
+{
+ bool ret = !test_and_set_bit(BCH_FS_EMERGENCY_RO, &c->flags);
+
+ bch2_fs_read_only_async(c);
+ bch2_journal_halt(&c->journal);
+
+ wake_up(&bch_read_only_wait);
+ return ret;
+}
+
+const char *bch2_fs_read_write(struct bch_fs *c)
+{
+ struct bch_dev *ca;
+ const char *err = NULL;
+ unsigned i;
+
+ mutex_lock(&c->state_lock);
+ if (c->state != BCH_FS_STARTING &&
+ c->state != BCH_FS_RO)
+ goto out;
+
+ err = "error starting allocator thread";
+ for_each_rw_member(ca, c, i)
+ if (bch2_dev_allocator_start(ca)) {
+ percpu_ref_put(&ca->io_ref);
+ goto err;
+ }
+
+ err = "error starting btree GC thread";
+ if (bch2_gc_thread_start(c))
+ goto err;
+
+ err = "error starting moving GC thread";
+ for_each_rw_member(ca, c, i)
+ if (bch2_moving_gc_start(ca)) {
+ percpu_ref_put(&ca->io_ref);
+ goto err;
+ }
+
+ err = "error starting tiering thread";
+ if (bch2_tiering_start(c))
+ goto err;
+
+ schedule_delayed_work(&c->pd_controllers_update, 5 * HZ);
+
+ if (c->state != BCH_FS_STARTING)
+ percpu_ref_reinit(&c->writes);
+
+ c->state = BCH_FS_RW;
+ err = NULL;
+out:
+ mutex_unlock(&c->state_lock);
+ return err;
+err:
+ __bch2_fs_read_only(c);
+ goto out;
+}
+
+/* Filesystem startup/shutdown: */
+
+static void bch2_fs_free(struct bch_fs *c)
+{
+ bch2_fs_encryption_exit(c);
+ bch2_fs_btree_exit(c);
+ bch2_fs_journal_exit(&c->journal);
+ bch2_io_clock_exit(&c->io_clock[WRITE]);
+ bch2_io_clock_exit(&c->io_clock[READ]);
+ bch2_fs_compress_exit(c);
+ bdi_destroy(&c->bdi);
+ lg_lock_free(&c->usage_lock);
+ free_percpu(c->usage_percpu);
+ mempool_exit(&c->btree_bounce_pool);
+ mempool_exit(&c->bio_bounce_pages);
+ bioset_exit(&c->bio_write);
+ bioset_exit(&c->bio_read_split);
+ bioset_exit(&c->bio_read);
+ bioset_exit(&c->btree_read_bio);
+ mempool_exit(&c->btree_interior_update_pool);
+ mempool_exit(&c->btree_reserve_pool);
+ mempool_exit(&c->fill_iter);
+ percpu_ref_exit(&c->writes);
+
+ if (c->copygc_wq)
+ destroy_workqueue(c->copygc_wq);
+ if (c->wq)
+ destroy_workqueue(c->wq);
+
+ free_pages((unsigned long) c->disk_sb, c->disk_sb_order);
+ kfree(c);
+ module_put(THIS_MODULE);
+}
+
+static void bch2_fs_exit(struct bch_fs *c)
+{
+ unsigned i;
+
+ del_timer_sync(&c->foreground_write_wakeup);
+ cancel_delayed_work_sync(&c->pd_controllers_update);
+ cancel_work_sync(&c->read_only_work);
+ cancel_work_sync(&c->read_retry_work);
+
+ for (i = 0; i < c->sb.nr_devices; i++)
+ if (c->devs[i])
+ bch2_dev_free(c->devs[i]);
+
+ closure_debug_destroy(&c->cl);
+ kobject_put(&c->kobj);
+}
+
+static void bch2_fs_offline(struct bch_fs *c)
+{
+ struct bch_dev *ca;
+ unsigned i;
+
+ mutex_lock(&bch_fs_list_lock);
+ list_del(&c->list);
+ mutex_unlock(&bch_fs_list_lock);
+
+ for_each_member_device(ca, c, i)
+ if (ca->kobj.state_in_sysfs &&
+ ca->disk_sb.bdev)
+ sysfs_remove_link(&part_to_dev(ca->disk_sb.bdev->bd_part)->kobj,
+ "bcachefs");
+
+ if (c->kobj.state_in_sysfs)
+ kobject_del(&c->kobj);
+
+ bch2_fs_debug_exit(c);
+ bch2_fs_chardev_exit(c);
+
+ kobject_put(&c->time_stats);
+ kobject_put(&c->opts_dir);
+ kobject_put(&c->internal);
+
+ __bch2_fs_read_only(c);
+}
+
+void bch2_fs_release(struct kobject *kobj)
+{
+ struct bch_fs *c = container_of(kobj, struct bch_fs, kobj);
+
+ bch2_fs_free(c);
+}
+
+void bch2_fs_stop(struct bch_fs *c)
+{
+ mutex_lock(&c->state_lock);
+ BUG_ON(c->state == BCH_FS_STOPPING);
+ c->state = BCH_FS_STOPPING;
+ mutex_unlock(&c->state_lock);
+
+ bch2_fs_offline(c);
+
+ closure_sync(&c->cl);
+
+ bch2_fs_exit(c);
+}
+
+#define alloc_bucket_pages(gfp, ca) \
+ ((void *) __get_free_pages(__GFP_ZERO|gfp, ilog2(bucket_pages(ca))))
+
+static struct bch_fs *bch2_fs_alloc(struct bch_sb *sb, struct bch_opts opts)
+{
+ struct bch_sb_field_members *mi;
+ struct bch_fs *c;
+ unsigned i, iter_size, journal_entry_bytes;
+
+ c = kzalloc(sizeof(struct bch_fs), GFP_KERNEL);
+ if (!c)
+ return NULL;
+
+ __module_get(THIS_MODULE);
+
+ c->minor = -1;
+
+ mutex_init(&c->state_lock);
+ mutex_init(&c->sb_lock);
+ mutex_init(&c->btree_cache_lock);
+ mutex_init(&c->bucket_lock);
+ mutex_init(&c->btree_root_lock);
+ INIT_WORK(&c->read_only_work, bch2_fs_read_only_work);
+
+ init_rwsem(&c->gc_lock);
+
+#define BCH_TIME_STAT(name, frequency_units, duration_units) \
+ spin_lock_init(&c->name##_time.lock);
+ BCH_TIME_STATS()
+#undef BCH_TIME_STAT
+
+ bch2_fs_allocator_init(c);
+ bch2_fs_tiering_init(c);
+
+ INIT_LIST_HEAD(&c->list);
+ INIT_LIST_HEAD(&c->btree_cache);
+ INIT_LIST_HEAD(&c->btree_cache_freeable);
+ INIT_LIST_HEAD(&c->btree_cache_freed);
+
+ INIT_LIST_HEAD(&c->btree_interior_update_list);
+ mutex_init(&c->btree_reserve_cache_lock);
+ mutex_init(&c->btree_interior_update_lock);
+
+ mutex_init(&c->bio_bounce_pages_lock);
+ bio_list_init(&c->read_retry_list);
+ spin_lock_init(&c->read_retry_lock);
+ INIT_WORK(&c->read_retry_work, bch2_read_retry_work);
+ mutex_init(&c->zlib_workspace_lock);
+
+ seqcount_init(&c->gc_pos_lock);
+
+ c->prio_clock[READ].hand = 1;
+ c->prio_clock[READ].min_prio = 0;
+ c->prio_clock[WRITE].hand = 1;
+ c->prio_clock[WRITE].min_prio = 0;
+
+ init_waitqueue_head(&c->writeback_wait);
+ c->writeback_pages_max = (256 << 10) / PAGE_SIZE;
+
+ c->copy_gc_enabled = 1;
+ c->tiering_enabled = 1;
+ c->tiering_percent = 10;
+
+ c->foreground_target_percent = 20;
+
+ c->journal.write_time = &c->journal_write_time;
+ c->journal.delay_time = &c->journal_delay_time;
+ c->journal.blocked_time = &c->journal_blocked_time;
+ c->journal.flush_seq_time = &c->journal_flush_seq_time;
+
+ mutex_lock(&c->sb_lock);
+
+ if (bch2_sb_to_fs(c, sb)) {
+ mutex_unlock(&c->sb_lock);
+ goto err;
+ }
+
+ mutex_unlock(&c->sb_lock);
+
+ scnprintf(c->name, sizeof(c->name), "%pU", &c->sb.user_uuid);
+
+ bch2_opts_apply(&c->opts, bch2_sb_opts(sb));
+ bch2_opts_apply(&c->opts, opts);
+
+ c->opts.nochanges |= c->opts.noreplay;
+ c->opts.read_only |= c->opts.nochanges;
+
+ c->block_bits = ilog2(c->sb.block_size);
+
+ if (bch2_fs_init_fault("fs_alloc"))
+ goto err;
+
+ iter_size = (btree_blocks(c) + 1) * 2 *
+ sizeof(struct btree_node_iter_set);
+
+ journal_entry_bytes = 512U << BCH_SB_JOURNAL_ENTRY_SIZE(sb);
+
+ if (!(c->wq = alloc_workqueue("bcachefs",
+ WQ_FREEZABLE|WQ_MEM_RECLAIM|WQ_HIGHPRI, 1)) ||
+ !(c->copygc_wq = alloc_workqueue("bcache_copygc",
+ WQ_FREEZABLE|WQ_MEM_RECLAIM|WQ_HIGHPRI, 1)) ||
+ percpu_ref_init(&c->writes, bch2_writes_disabled, 0, GFP_KERNEL) ||
+ mempool_init_kmalloc_pool(&c->btree_reserve_pool, 1,
+ sizeof(struct btree_reserve)) ||
+ mempool_init_kmalloc_pool(&c->btree_interior_update_pool, 1,
+ sizeof(struct btree_interior_update)) ||
+ mempool_init_kmalloc_pool(&c->fill_iter, 1, iter_size) ||
+ bioset_init(&c->btree_read_bio, 1, 0) ||
+ bioset_init(&c->bio_read, 1, offsetof(struct bch_read_bio, bio)) ||
+ bioset_init(&c->bio_read_split, 1, offsetof(struct bch_read_bio, bio)) ||
+ bioset_init(&c->bio_write, 1, offsetof(struct bch_write_bio, bio)) ||
+ mempool_init_page_pool(&c->bio_bounce_pages,
+ max_t(unsigned,
+ c->sb.btree_node_size,
+ BCH_ENCODED_EXTENT_MAX) /
+ PAGE_SECTORS, 0) ||
+ !(c->usage_percpu = alloc_percpu(struct bch_fs_usage)) ||
+ lg_lock_init(&c->usage_lock) ||
+ mempool_init_page_pool(&c->btree_bounce_pool, 1,
+ ilog2(btree_pages(c))) ||
+ bdi_setup_and_register(&c->bdi, "bcachefs") ||
+ bch2_io_clock_init(&c->io_clock[READ]) ||
+ bch2_io_clock_init(&c->io_clock[WRITE]) ||
+ bch2_fs_journal_init(&c->journal, journal_entry_bytes) ||
+ bch2_fs_btree_init(c) ||
+ bch2_fs_encryption_init(c) ||
+ bch2_fs_compress_init(c) ||
+ bch2_check_set_has_compressed_data(c, c->opts.compression))
+ goto err;
+
+ c->bdi.ra_pages = VM_MAX_READAHEAD * 1024 / PAGE_SIZE;
+ c->bdi.congested_fn = bch2_congested_fn;
+ c->bdi.congested_data = c;
+
+ mi = bch2_sb_get_members(c->disk_sb);
+ for (i = 0; i < c->sb.nr_devices; i++)
+ if (!bch2_is_zero(mi->members[i].uuid.b, sizeof(uuid_le)) &&
+ bch2_dev_alloc(c, i))
+ goto err;
+
+ /*
+ * Now that all allocations have succeeded, init various refcounty
+ * things that let us shutdown:
+ */
+ closure_init(&c->cl, NULL);
+
+ c->kobj.kset = bcachefs_kset;
+ kobject_init(&c->kobj, &bch2_fs_ktype);
+ kobject_init(&c->internal, &bch2_fs_internal_ktype);
+ kobject_init(&c->opts_dir, &bch2_fs_opts_dir_ktype);
+ kobject_init(&c->time_stats, &bch2_fs_time_stats_ktype);
+ return c;
+err:
+ bch2_fs_free(c);
+ return NULL;
+}
+
+static const char *__bch2_fs_online(struct bch_fs *c)
+{
+ struct bch_dev *ca;
+ const char *err = NULL;
+ unsigned i;
+ int ret;
+
+ lockdep_assert_held(&bch_fs_list_lock);
+
+ if (!list_empty(&c->list))
+ return NULL;
+
+ if (__bch2_uuid_to_fs(c->sb.uuid))
+ return "filesystem UUID already open";
+
+ ret = bch2_fs_chardev_init(c);
+ if (ret)
+ return "error creating character device";
+
+ bch2_fs_debug_init(c);
+
+ if (kobject_add(&c->kobj, NULL, "%pU", c->sb.user_uuid.b) ||
+ kobject_add(&c->internal, &c->kobj, "internal") ||
+ kobject_add(&c->opts_dir, &c->kobj, "options") ||
+ kobject_add(&c->time_stats, &c->kobj, "time_stats"))
+ return "error creating sysfs objects";
+
+ mutex_lock(&c->state_lock);
+
+ err = "error creating sysfs objects";
+ __for_each_member_device(ca, c, i)
+ if (bch2_dev_sysfs_online(ca))
+ goto err;
+
+ list_add(&c->list, &bch_fs_list);
+ err = NULL;
+err:
+ mutex_unlock(&c->state_lock);
+ return err;
+}
+
+static const char *bch2_fs_online(struct bch_fs *c)
+{
+ const char *err;
+
+ mutex_lock(&bch_fs_list_lock);
+ err = __bch2_fs_online(c);
+ mutex_unlock(&bch_fs_list_lock);
+
+ return err;
+}
+
+static const char *__bch2_fs_start(struct bch_fs *c)
+{
+ const char *err = "cannot allocate memory";
+ struct bch_sb_field_members *mi;
+ struct bch_dev *ca;
+ unsigned i, id;
+ time64_t now;
+ LIST_HEAD(journal);
+ struct jset *j;
+ int ret = -EINVAL;
+
+ BUG_ON(c->state != BCH_FS_STARTING);
+
+ mutex_lock(&c->sb_lock);
+ for_each_online_member(ca, c, i)
+ bch2_sb_from_fs(c, ca);
+ mutex_unlock(&c->sb_lock);
+
+ if (BCH_SB_INITIALIZED(c->disk_sb)) {
+ ret = bch2_journal_read(c, &journal);
+ if (ret)
+ goto err;
+
+ j = &list_entry(journal.prev, struct journal_replay, list)->j;
+
+ c->prio_clock[READ].hand = le16_to_cpu(j->read_clock);
+ c->prio_clock[WRITE].hand = le16_to_cpu(j->write_clock);
+
+ err = "error reading priorities";
+ for_each_readable_member(ca, c, i) {
+ ret = bch2_prio_read(ca);
+ if (ret) {
+ percpu_ref_put(&ca->io_ref);
+ goto err;
+ }
+ }
+
+ for (id = 0; id < BTREE_ID_NR; id++) {
+ unsigned level;
+ struct bkey_i *k;
+
+ err = "bad btree root";
+ k = bch2_journal_find_btree_root(c, j, id, &level);
+ if (!k && id == BTREE_ID_EXTENTS)
+ goto err;
+ if (!k) {
+ pr_debug("missing btree root: %d", id);
+ continue;
+ }
+
+ err = "error reading btree root";
+ if (bch2_btree_root_read(c, id, k, level))
+ goto err;
+ }
+
+ bch_verbose(c, "starting mark and sweep:");
+
+ err = "error in recovery";
+ if (bch2_initial_gc(c, &journal))
+ goto err;
+
+ if (c->opts.noreplay)
+ goto recovery_done;
+
+ bch_verbose(c, "mark and sweep done");
+
+ /*
+ * bch2_journal_start() can't happen sooner, or btree_gc_finish()
+ * will give spurious errors about oldest_gen > bucket_gen -
+ * this is a hack but oh well.
+ */
+ bch2_journal_start(c);
+
+ err = "error starting allocator thread";
+ for_each_rw_member(ca, c, i)
+ if (bch2_dev_allocator_start(ca)) {
+ percpu_ref_put(&ca->io_ref);
+ goto err;
+ }
+
+ bch_verbose(c, "starting journal replay:");
+
+ err = "journal replay failed";
+ ret = bch2_journal_replay(c, &journal);
+ if (ret)
+ goto err;
+
+ bch_verbose(c, "journal replay done");
+
+ if (c->opts.norecovery)
+ goto recovery_done;
+
+ bch_verbose(c, "starting fsck:");
+ err = "error in fsck";
+ ret = bch2_fsck(c, !c->opts.nofsck);
+ if (ret)
+ goto err;
+
+ bch_verbose(c, "fsck done");
+ } else {
+ struct bch_inode_unpacked inode;
+ struct bkey_inode_buf packed_inode;
+ struct closure cl;
+
+ closure_init_stack(&cl);
+
+ bch_notice(c, "initializing new filesystem");
+
+ bch2_initial_gc(c, NULL);
+
+ err = "unable to allocate journal buckets";
+ for_each_rw_member(ca, c, i)
+ if (bch2_dev_journal_alloc(ca)) {
+ percpu_ref_put(&ca->io_ref);
+ goto err;
+ }
+
+ /*
+ * journal_res_get() will crash if called before this has
+ * set up the journal.pin FIFO and journal.cur pointer:
+ */
+ bch2_journal_start(c);
+ bch2_journal_set_replay_done(&c->journal);
+
+ err = "error starting allocator thread";
+ for_each_rw_member(ca, c, i)
+ if (bch2_dev_allocator_start(ca)) {
+ percpu_ref_put(&ca->io_ref);
+ goto err;
+ }
+
+ err = "cannot allocate new btree root";
+ for (id = 0; id < BTREE_ID_NR; id++)
+ if (bch2_btree_root_alloc(c, id, &cl)) {
+ closure_sync(&cl);
+ goto err;
+ }
+
+ /* Wait for new btree roots to be written: */
+ closure_sync(&cl);
+
+ bch2_inode_init(c, &inode, 0, 0,
+ S_IFDIR|S_IRWXU|S_IRUGO|S_IXUGO, 0);
+ inode.inum = BCACHE_ROOT_INO;
+
+ bch2_inode_pack(&packed_inode, &inode);
+
+ err = "error creating root directory";
+ if (bch2_btree_insert(c, BTREE_ID_INODES,
+ &packed_inode.inode.k_i,
+ NULL, NULL, NULL, 0))
+ goto err;
+
+ err = "error writing first journal entry";
+ if (bch2_journal_meta(&c->journal))
+ goto err;
+ }
+recovery_done:
+ err = "dynamic fault";
+ if (bch2_fs_init_fault("fs_start"))
+ goto err;
+
+ if (c->opts.read_only) {
+ bch2_fs_read_only(c);
+ } else {
+ err = bch2_fs_read_write(c);
+ if (err)
+ goto err;
+ }
+
+ mutex_lock(&c->sb_lock);
+ mi = bch2_sb_get_members(c->disk_sb);
+ now = ktime_get_seconds();
+
+ for_each_member_device(ca, c, i)
+ mi->members[ca->dev_idx].last_mount = cpu_to_le64(now);
+
+ SET_BCH_SB_INITIALIZED(c->disk_sb, true);
+ SET_BCH_SB_CLEAN(c->disk_sb, false);
+ c->disk_sb->version = BCACHE_SB_VERSION_CDEV;
+
+ bch2_write_super(c);
+ mutex_unlock(&c->sb_lock);
+
+ err = NULL;
+out:
+ bch2_journal_entries_free(&journal);
+ return err;
+err:
+ switch (ret) {
+ case BCH_FSCK_ERRORS_NOT_FIXED:
+ bch_err(c, "filesystem contains errors: please report this to the developers");
+ pr_cont("mount with -o fix_errors to repair");
+ err = "fsck error";
+ break;
+ case BCH_FSCK_REPAIR_UNIMPLEMENTED:
+ bch_err(c, "filesystem contains errors: please report this to the developers");
+ pr_cont("repair unimplemented: inform the developers so that it can be added");
+ err = "fsck error";
+ break;
+ case BCH_FSCK_REPAIR_IMPOSSIBLE:
+ bch_err(c, "filesystem contains errors, but repair impossible");
+ err = "fsck error";
+ break;
+ case BCH_FSCK_UNKNOWN_VERSION:
+ err = "unknown metadata version";;
+ break;
+ case -ENOMEM:
+ err = "cannot allocate memory";
+ break;
+ case -EIO:
+ err = "IO error";
+ break;
+ }
+
+ BUG_ON(!err);
+ set_bit(BCH_FS_ERROR, &c->flags);
+ goto out;
+}
+
+const char *bch2_fs_start(struct bch_fs *c)
+{
+ return __bch2_fs_start(c) ?: bch2_fs_online(c);
+}
+
+static const char *bch2_dev_may_add(struct bch_sb *sb, struct bch_fs *c)
+{
+ struct bch_sb_field_members *sb_mi;
+
+ sb_mi = bch2_sb_get_members(sb);
+ if (!sb_mi)
+ return "Invalid superblock: member info area missing";
+
+ if (le16_to_cpu(sb->block_size) != c->sb.block_size)
+ return "mismatched block size";
+
+ if (le16_to_cpu(sb_mi->members[sb->dev_idx].bucket_size) <
+ BCH_SB_BTREE_NODE_SIZE(c->disk_sb))
+ return "new cache bucket size is too small";
+
+ return NULL;
+}
+
+static const char *bch2_dev_in_fs(struct bch_sb *fs, struct bch_sb *sb)
+{
+ struct bch_sb *newest =
+ le64_to_cpu(fs->seq) > le64_to_cpu(sb->seq) ? fs : sb;
+ struct bch_sb_field_members *mi = bch2_sb_get_members(newest);
+
+ if (uuid_le_cmp(fs->uuid, sb->uuid))
+ return "device not a member of filesystem";
+
+ if (sb->dev_idx >= newest->nr_devices)
+ return "device has invalid dev_idx";
+
+ if (bch2_is_zero(mi->members[sb->dev_idx].uuid.b, sizeof(uuid_le)))
+ return "device has been removed";
+
+ if (fs->block_size != sb->block_size)
+ return "mismatched block size";
+
+ return NULL;
+}
+
+/* Device startup/shutdown: */
+
+void bch2_dev_release(struct kobject *kobj)
+{
+ struct bch_dev *ca = container_of(kobj, struct bch_dev, kobj);
+
+ kfree(ca);
+}
+
+static void bch2_dev_free(struct bch_dev *ca)
+{
+ unsigned i;
+
+ cancel_work_sync(&ca->io_error_work);
+
+ if (ca->kobj.state_in_sysfs &&
+ ca->disk_sb.bdev)
+ sysfs_remove_link(&part_to_dev(ca->disk_sb.bdev->bd_part)->kobj,
+ "bcachefs");
+
+ if (ca->kobj.state_in_sysfs)
+ kobject_del(&ca->kobj);
+
+ bch2_free_super(&ca->disk_sb);
+ bch2_dev_journal_exit(ca);
+
+ free_percpu(ca->sectors_written);
+ bioset_exit(&ca->replica_set);
+ free_percpu(ca->usage_percpu);
+ free_pages((unsigned long) ca->disk_buckets, ilog2(bucket_pages(ca)));
+ kfree(ca->prio_buckets);
+ kfree(ca->bio_prio);
+ vfree(ca->buckets);
+ vfree(ca->oldest_gens);
+ free_heap(&ca->heap);
+ free_fifo(&ca->free_inc);
+
+ for (i = 0; i < RESERVE_NR; i++)
+ free_fifo(&ca->free[i]);
+
+ percpu_ref_exit(&ca->io_ref);
+ percpu_ref_exit(&ca->ref);
+ kobject_put(&ca->kobj);
+}
+
+static void bch2_dev_io_ref_release(struct percpu_ref *ref)
+{
+ struct bch_dev *ca = container_of(ref, struct bch_dev, io_ref);
+
+ complete(&ca->offline_complete);
+}
+
+static void __bch2_dev_offline(struct bch_dev *ca)
+{
+ struct bch_fs *c = ca->fs;
+
+ lockdep_assert_held(&c->state_lock);
+
+ __bch2_dev_read_only(ca->fs, ca);
+
+ reinit_completion(&ca->offline_complete);
+ percpu_ref_kill(&ca->io_ref);
+ wait_for_completion(&ca->offline_complete);
+
+ if (ca->kobj.state_in_sysfs) {
+ struct kobject *block =
+ &part_to_dev(ca->disk_sb.bdev->bd_part)->kobj;
+
+ sysfs_remove_link(block, "bcachefs");
+ sysfs_remove_link(&ca->kobj, "block");
+ }
+
+ bch2_free_super(&ca->disk_sb);
+ bch2_dev_journal_exit(ca);
+}
+
+static void bch2_dev_ref_release(struct percpu_ref *ref)
+{
+ struct bch_dev *ca = container_of(ref, struct bch_dev, ref);
+
+ complete(&ca->stop_complete);
+}
+
+static void bch2_dev_stop(struct bch_dev *ca)
+{
+ struct bch_fs *c = ca->fs;
+
+ lockdep_assert_held(&c->state_lock);
+
+ BUG_ON(rcu_access_pointer(c->devs[ca->dev_idx]) != ca);
+ rcu_assign_pointer(c->devs[ca->dev_idx], NULL);
+
+ synchronize_rcu();
+
+ reinit_completion(&ca->stop_complete);
+ percpu_ref_kill(&ca->ref);
+ wait_for_completion(&ca->stop_complete);
+}
+
+static int bch2_dev_sysfs_online(struct bch_dev *ca)
+{
+ struct bch_fs *c = ca->fs;
+ int ret;
+
+ if (!c->kobj.state_in_sysfs)
+ return 0;
+
+ if (!ca->kobj.state_in_sysfs) {
+ ret = kobject_add(&ca->kobj, &ca->fs->kobj,
+ "dev-%u", ca->dev_idx);
+ if (ret)
+ return ret;
+ }
+
+ if (ca->disk_sb.bdev) {
+ struct kobject *block =
+ &part_to_dev(ca->disk_sb.bdev->bd_part)->kobj;
+
+ ret = sysfs_create_link(block, &ca->kobj, "bcachefs");
+ if (ret)
+ return ret;
+ ret = sysfs_create_link(&ca->kobj, block, "block");
+ if (ret)
+ return ret;
+ }
+
+ return 0;
+}
+
+static int bch2_dev_alloc(struct bch_fs *c, unsigned dev_idx)
+{
+ struct bch_member *member;
+ size_t reserve_none, movinggc_reserve, free_inc_reserve, total_reserve;
+ size_t heap_size;
+ unsigned i;
+ struct bch_dev *ca;
+
+ if (bch2_fs_init_fault("dev_alloc"))
+ return -ENOMEM;
+
+ ca = kzalloc(sizeof(*ca), GFP_KERNEL);
+ if (!ca)
+ return -ENOMEM;
+
+ kobject_init(&ca->kobj, &bch2_dev_ktype);
+ init_completion(&ca->stop_complete);
+ init_completion(&ca->offline_complete);
+
+ spin_lock_init(&ca->self.lock);
+ ca->self.nr = 1;
+ rcu_assign_pointer(ca->self.d[0].dev, ca);
+ ca->dev_idx = dev_idx;
+
+ spin_lock_init(&ca->freelist_lock);
+ spin_lock_init(&ca->prio_buckets_lock);
+ mutex_init(&ca->heap_lock);
+ bch2_dev_moving_gc_init(ca);
+
+ INIT_WORK(&ca->io_error_work, bch2_nonfatal_io_error_work);
+
+ if (bch2_fs_init_fault("dev_alloc"))
+ goto err;
+
+ member = bch2_sb_get_members(c->disk_sb)->members + dev_idx;
+
+ ca->mi = bch2_mi_to_cpu(member);
+ ca->uuid = member->uuid;
+ ca->bucket_bits = ilog2(ca->mi.bucket_size);
+ scnprintf(ca->name, sizeof(ca->name), "dev-%u", dev_idx);
+
+ /* XXX: tune these */
+ movinggc_reserve = max_t(size_t, 16, ca->mi.nbuckets >> 7);
+ reserve_none = max_t(size_t, 4, ca->mi.nbuckets >> 9);
+ /*
+ * free_inc must be smaller than the copygc reserve: if it was bigger,
+ * one copygc iteration might not make enough buckets available to fill
+ * up free_inc and allow the allocator to make forward progress
+ */
+ free_inc_reserve = movinggc_reserve / 2;
+ heap_size = movinggc_reserve * 8;
+
+ if (percpu_ref_init(&ca->ref, bch2_dev_ref_release,
+ 0, GFP_KERNEL) ||
+ percpu_ref_init(&ca->io_ref, bch2_dev_io_ref_release,
+ PERCPU_REF_INIT_DEAD, GFP_KERNEL) ||
+ !init_fifo(&ca->free[RESERVE_PRIO], prio_buckets(ca), GFP_KERNEL) ||
+ !init_fifo(&ca->free[RESERVE_BTREE], BTREE_NODE_RESERVE, GFP_KERNEL) ||
+ !init_fifo(&ca->free[RESERVE_MOVINGGC],
+ movinggc_reserve, GFP_KERNEL) ||
+ !init_fifo(&ca->free[RESERVE_NONE], reserve_none, GFP_KERNEL) ||
+ !init_fifo(&ca->free_inc, free_inc_reserve, GFP_KERNEL) ||
+ !init_heap(&ca->heap, heap_size, GFP_KERNEL) ||
+ !(ca->oldest_gens = vzalloc(sizeof(u8) *
+ ca->mi.nbuckets)) ||
+ !(ca->buckets = vzalloc(sizeof(struct bucket) *
+ ca->mi.nbuckets)) ||
+ !(ca->prio_buckets = kzalloc(sizeof(u64) * prio_buckets(ca) *
+ 2, GFP_KERNEL)) ||
+ !(ca->disk_buckets = alloc_bucket_pages(GFP_KERNEL, ca)) ||
+ !(ca->usage_percpu = alloc_percpu(struct bch_dev_usage)) ||
+ !(ca->bio_prio = bio_kmalloc(GFP_NOIO, bucket_pages(ca))) ||
+ bioset_init(&ca->replica_set, 4,
+ offsetof(struct bch_write_bio, bio)) ||
+ !(ca->sectors_written = alloc_percpu(*ca->sectors_written)))
+ goto err;
+
+ ca->prio_last_buckets = ca->prio_buckets + prio_buckets(ca);
+
+ total_reserve = ca->free_inc.size;
+ for (i = 0; i < RESERVE_NR; i++)
+ total_reserve += ca->free[i].size;
+
+ ca->copygc_write_point.group = &ca->self;
+ ca->tiering_write_point.group = &ca->self;
+
+ ca->fs = c;
+ rcu_assign_pointer(c->devs[ca->dev_idx], ca);
+
+ if (bch2_dev_sysfs_online(ca))
+ pr_warn("error creating sysfs objects");
+
+ return 0;
+err:
+ bch2_dev_free(ca);
+ return -ENOMEM;
+}
+
+static int __bch2_dev_online(struct bch_fs *c, struct bcache_superblock *sb)
+{
+ struct bch_dev *ca;
+ int ret;
+
+ lockdep_assert_held(&c->sb_lock);
+
+ if (le64_to_cpu(sb->sb->seq) >
+ le64_to_cpu(c->disk_sb->seq))
+ bch2_sb_to_fs(c, sb->sb);
+
+ BUG_ON(sb->sb->dev_idx >= c->sb.nr_devices ||
+ !c->devs[sb->sb->dev_idx]);
+
+ ca = c->devs[sb->sb->dev_idx];
+ if (ca->disk_sb.bdev) {
+ bch_err(c, "already have device online in slot %u",
+ sb->sb->dev_idx);
+ return -EINVAL;
+ }
+
+ ret = bch2_dev_journal_init(ca, sb->sb);
+ if (ret)
+ return ret;
+
+ /*
+ * Increase journal write timeout if flushes to this device are
+ * expensive:
+ */
+ if (!blk_queue_nonrot(bdev_get_queue(sb->bdev)) &&
+ journal_flushes_device(ca))
+ c->journal.write_delay_ms =
+ max(c->journal.write_delay_ms, 1000U);
+
+ /* Commit: */
+ ca->disk_sb = *sb;
+ if (sb->mode & FMODE_EXCL)
+ ca->disk_sb.bdev->bd_holder = ca;
+ memset(sb, 0, sizeof(*sb));
+
+ if (c->sb.nr_devices == 1)
+ bdevname(ca->disk_sb.bdev, c->name);
+ bdevname(ca->disk_sb.bdev, ca->name);
+
+ if (bch2_dev_sysfs_online(ca))
+ pr_warn("error creating sysfs objects");
+
+ lg_local_lock(&c->usage_lock);
+ if (!gc_will_visit(c, gc_phase(GC_PHASE_SB_METADATA)))
+ bch2_mark_dev_metadata(ca->fs, ca);
+ lg_local_unlock(&c->usage_lock);
+
+ percpu_ref_reinit(&ca->io_ref);
+ return 0;
+}
+
+/* Device management: */
+
+bool bch2_fs_may_start(struct bch_fs *c, int flags)
+{
+ struct bch_sb_field_members *mi;
+ unsigned meta_missing = 0;
+ unsigned data_missing = 0;
+ bool degraded = false;
+ unsigned i;
+
+ mutex_lock(&c->sb_lock);
+ mi = bch2_sb_get_members(c->disk_sb);
+
+ for (i = 0; i < c->disk_sb->nr_devices; i++)
+ if (!c->devs[i] &&
+ !bch2_is_zero(mi->members[i].uuid.b, sizeof(uuid_le))) {
+ degraded = true;
+ if (BCH_MEMBER_HAS_METADATA(&mi->members[i]))
+ meta_missing++;
+ if (BCH_MEMBER_HAS_DATA(&mi->members[i]))
+ data_missing++;
+ }
+ mutex_unlock(&c->sb_lock);
+
+ if (degraded &&
+ !(flags & BCH_FORCE_IF_DEGRADED))
+ return false;
+
+ if (meta_missing &&
+ !(flags & BCH_FORCE_IF_METADATA_DEGRADED))
+ return false;
+
+ if (meta_missing >= BCH_SB_META_REPLICAS_HAVE(c->disk_sb) &&
+ !(flags & BCH_FORCE_IF_METADATA_LOST))
+ return false;
+
+ if (data_missing && !(flags & BCH_FORCE_IF_DATA_DEGRADED))
+ return false;
+
+ if (data_missing >= BCH_SB_DATA_REPLICAS_HAVE(c->disk_sb) &&
+ !(flags & BCH_FORCE_IF_DATA_LOST))
+ return false;
+
+ return true;
+}
+
+bool bch2_dev_state_allowed(struct bch_fs *c, struct bch_dev *ca,
+ enum bch_member_state new_state, int flags)
+{
+ lockdep_assert_held(&c->state_lock);
+
+ if (new_state == BCH_MEMBER_STATE_RW)
+ return true;
+
+ if (ca->mi.has_data &&
+ !(flags & BCH_FORCE_IF_DATA_DEGRADED))
+ return false;
+
+ if (ca->mi.has_data &&
+ c->sb.data_replicas_have <= 1 &&
+ !(flags & BCH_FORCE_IF_DATA_LOST))
+ return false;
+
+ if (ca->mi.has_metadata &&
+ !(flags & BCH_FORCE_IF_METADATA_DEGRADED))
+ return false;
+
+ if (ca->mi.has_metadata &&
+ c->sb.meta_replicas_have <= 1 &&
+ !(flags & BCH_FORCE_IF_METADATA_LOST))
+ return false;
+
+ return true;
+}
+
+static void __bch2_dev_read_only(struct bch_fs *c, struct bch_dev *ca)
+{
+ bch2_moving_gc_stop(ca);
+
+ /*
+ * This stops new data writes (e.g. to existing open data
+ * buckets) and then waits for all existing writes to
+ * complete.
+ */
+ bch2_dev_allocator_stop(ca);
+
+ bch2_dev_group_remove(&c->journal.devs, ca);
+}
+
+static const char *__bch2_dev_read_write(struct bch_fs *c, struct bch_dev *ca)
+{
+ lockdep_assert_held(&c->state_lock);
+
+ BUG_ON(ca->mi.state != BCH_MEMBER_STATE_RW);
+
+ if (bch2_dev_allocator_start(ca))
+ return "error starting allocator thread";
+
+ if (bch2_moving_gc_start(ca))
+ return "error starting moving GC thread";
+
+ if (bch2_tiering_start(c))
+ return "error starting tiering thread";
+
+ return NULL;
+}
+
+int __bch2_dev_set_state(struct bch_fs *c, struct bch_dev *ca,
+ enum bch_member_state new_state, int flags)
+{
+ struct bch_sb_field_members *mi;
+
+ if (ca->mi.state == new_state)
+ return 0;
+
+ if (!bch2_dev_state_allowed(c, ca, new_state, flags))
+ return -EINVAL;
+
+ if (new_state == BCH_MEMBER_STATE_RW) {
+ if (__bch2_dev_read_write(c, ca))
+ return -ENOMEM;
+ } else {
+ __bch2_dev_read_only(c, ca);
+ }
+
+ bch_notice(ca, "%s", bch2_dev_state[new_state]);
+
+ mutex_lock(&c->sb_lock);
+ mi = bch2_sb_get_members(c->disk_sb);
+ SET_BCH_MEMBER_STATE(&mi->members[ca->dev_idx], new_state);
+ bch2_write_super(c);
+ mutex_unlock(&c->sb_lock);
+
+ return 0;
+}
+
+int bch2_dev_set_state(struct bch_fs *c, struct bch_dev *ca,
+ enum bch_member_state new_state, int flags)
+{
+ int ret;
+
+ mutex_lock(&c->state_lock);
+ ret = __bch2_dev_set_state(c, ca, new_state, flags);
+ mutex_unlock(&c->state_lock);
+
+ return ret;
+}
+
+/* Device add/removal: */
+
+int bch2_dev_remove(struct bch_fs *c, struct bch_dev *ca, int flags)
+{
+ struct bch_sb_field_members *mi;
+ unsigned dev_idx = ca->dev_idx;
+ int ret = -EINVAL;
+
+ mutex_lock(&c->state_lock);
+
+ percpu_ref_put(&ca->ref); /* XXX */
+
+ if (ca->mi.state == BCH_MEMBER_STATE_RW) {
+ bch_err(ca, "Cannot remove RW device");
+ goto err;
+ }
+
+ if (!bch2_dev_state_allowed(c, ca, BCH_MEMBER_STATE_FAILED, flags)) {
+ bch_err(ca, "Cannot remove without losing data");
+ goto err;
+ }
+
+ /*
+ * XXX: verify that dev_idx is really not in use anymore, anywhere
+ *
+ * flag_data_bad() does not check btree pointers
+ */
+ ret = bch2_flag_data_bad(ca);
+ if (ret) {
+ bch_err(ca, "Remove failed");
+ goto err;
+ }
+
+ if (ca->mi.has_data || ca->mi.has_metadata) {
+ bch_err(ca, "Remove failed, still has data");
+ goto err;
+ }
+
+ /*
+ * Ok, really doing the remove:
+ * Drop device's prio pointer before removing it from superblock:
+ */
+ spin_lock(&c->journal.lock);
+ c->journal.prio_buckets[dev_idx] = 0;
+ spin_unlock(&c->journal.lock);
+
+ bch2_journal_meta(&c->journal);
+
+ __bch2_dev_offline(ca);
+ bch2_dev_stop(ca);
+ bch2_dev_free(ca);
+
+ /*
+ * Free this device's slot in the bch_member array - all pointers to
+ * this device must be gone:
+ */
+ mutex_lock(&c->sb_lock);
+ mi = bch2_sb_get_members(c->disk_sb);
+ memset(&mi->members[dev_idx].uuid, 0, sizeof(mi->members[dev_idx].uuid));
+
+ bch2_write_super(c);
+
+ mutex_unlock(&c->sb_lock);
+ mutex_unlock(&c->state_lock);
+ return 0;
+err:
+ mutex_unlock(&c->state_lock);
+ return ret;
+}
+
+int bch2_dev_add(struct bch_fs *c, const char *path)
+{
+ struct bcache_superblock sb;
+ const char *err;
+ struct bch_dev *ca = NULL;
+ struct bch_sb_field_members *mi, *dev_mi;
+ struct bch_member saved_mi;
+ unsigned dev_idx, nr_devices, u64s;
+ int ret = -EINVAL;
+
+ err = bch2_read_super(&sb, bch2_opts_empty(), path);
+ if (err)
+ return -EINVAL;
+
+ err = bch2_validate_cache_super(&sb);
+ if (err)
+ return -EINVAL;
+
+ err = bch2_dev_may_add(sb.sb, c);
+ if (err)
+ return -EINVAL;
+
+ mutex_lock(&c->state_lock);
+ mutex_lock(&c->sb_lock);
+
+ /*
+ * Preserve the old cache member information (esp. tier)
+ * before we start bashing the disk stuff.
+ */
+ dev_mi = bch2_sb_get_members(sb.sb);
+ saved_mi = dev_mi->members[sb.sb->dev_idx];
+ saved_mi.last_mount = cpu_to_le64(ktime_get_seconds());
+
+ if (dynamic_fault("bcachefs:add:no_slot"))
+ goto no_slot;
+
+ mi = bch2_sb_get_members(c->disk_sb);
+ for (dev_idx = 0; dev_idx < BCH_SB_MEMBERS_MAX; dev_idx++)
+ if (dev_idx >= c->sb.nr_devices ||
+ bch2_is_zero(mi->members[dev_idx].uuid.b,
+ sizeof(uuid_le)))
+ goto have_slot;
+no_slot:
+ err = "no slots available in superblock";
+ ret = -ENOSPC;
+ goto err_unlock;
+
+have_slot:
+ nr_devices = max_t(unsigned, dev_idx + 1, c->sb.nr_devices);
+ u64s = (sizeof(struct bch_sb_field_members) +
+ sizeof(struct bch_member) * nr_devices) / sizeof(u64);
+ err = "no space in superblock for member info";
+
+ mi = bch2_fs_sb_resize_members(c, u64s);
+ if (!mi)
+ goto err_unlock;
+
+ dev_mi = bch2_sb_resize_members(&sb, u64s);
+ if (!dev_mi)
+ goto err_unlock;
+
+ memcpy(dev_mi, mi, u64s * sizeof(u64));
+ dev_mi->members[dev_idx] = saved_mi;
+
+ sb.sb->uuid = c->disk_sb->uuid;
+ sb.sb->dev_idx = dev_idx;
+ sb.sb->nr_devices = nr_devices;
+
+ /* commit new member info */
+ memcpy(mi, dev_mi, u64s * sizeof(u64));
+ c->disk_sb->nr_devices = nr_devices;
+ c->sb.nr_devices = nr_devices;
+
+ if (bch2_dev_alloc(c, dev_idx)) {
+ err = "cannot allocate memory";
+ ret = -ENOMEM;
+ goto err_unlock;
+ }
+
+ if (__bch2_dev_online(c, &sb)) {
+ err = "bch2_dev_online() error";
+ ret = -ENOMEM;
+ goto err_unlock;
+ }
+
+ bch2_write_super(c);
+ mutex_unlock(&c->sb_lock);
+
+ ca = c->devs[dev_idx];
+ if (ca->mi.state == BCH_MEMBER_STATE_RW) {
+ err = "journal alloc failed";
+ if (bch2_dev_journal_alloc(ca))
+ goto err;
+
+ err = __bch2_dev_read_write(c, ca);
+ if (err)
+ goto err;
+ }
+
+ mutex_unlock(&c->state_lock);
+ return 0;
+err_unlock:
+ mutex_unlock(&c->sb_lock);
+err:
+ mutex_unlock(&c->state_lock);
+ bch2_free_super(&sb);
+
+ bch_err(c, "Unable to add device: %s", err);
+ return ret ?: -EINVAL;
+}
+
+int bch2_dev_online(struct bch_fs *c, const char *path)
+{
+ struct bcache_superblock sb = { 0 };
+ struct bch_dev *ca;
+ unsigned dev_idx;
+ const char *err;
+
+ mutex_lock(&c->state_lock);
+
+ err = bch2_read_super(&sb, bch2_opts_empty(), path);
+ if (err)
+ goto err;
+
+ dev_idx = sb.sb->dev_idx;
+
+ err = bch2_dev_in_fs(c->disk_sb, sb.sb);
+ if (err)
+ goto err;
+
+ mutex_lock(&c->sb_lock);
+ if (__bch2_dev_online(c, &sb)) {
+ err = "__bch2_dev_online() error";
+ mutex_unlock(&c->sb_lock);
+ goto err;
+ }
+ mutex_unlock(&c->sb_lock);
+
+ ca = c->devs[dev_idx];
+ if (ca->mi.state == BCH_MEMBER_STATE_RW) {
+ err = __bch2_dev_read_write(c, ca);
+ if (err)
+ goto err;
+ }
+
+ mutex_unlock(&c->state_lock);
+ return 0;
+err:
+ mutex_unlock(&c->state_lock);
+ bch2_free_super(&sb);
+ bch_err(c, "error bringing %s online: %s", path, err);
+ return -EINVAL;
+}
+
+int bch2_dev_offline(struct bch_fs *c, struct bch_dev *ca, int flags)
+{
+ mutex_lock(&c->state_lock);
+
+ if (!bch2_dev_state_allowed(c, ca, BCH_MEMBER_STATE_FAILED, flags)) {
+ bch_err(ca, "Cannot offline required disk");
+ mutex_unlock(&c->state_lock);
+ return -EINVAL;
+ }
+
+ __bch2_dev_read_only(c, ca);
+ __bch2_dev_offline(ca);
+
+ mutex_unlock(&c->state_lock);
+ return 0;
+}
+
+int bch2_dev_evacuate(struct bch_fs *c, struct bch_dev *ca)
+{
+ int ret;
+
+ mutex_lock(&c->state_lock);
+
+ if (ca->mi.state == BCH_MEMBER_STATE_RW) {
+ bch_err(ca, "Cannot migrate data off RW device");
+ mutex_unlock(&c->state_lock);
+ return -EINVAL;
+ }
+
+ mutex_unlock(&c->state_lock);
+
+ ret = bch2_move_data_off_device(ca);
+ if (ret) {
+ bch_err(ca, "Error migrating data: %i", ret);
+ return ret;
+ }
+
+ ret = bch2_move_metadata_off_device(ca);
+ if (ret) {
+ bch_err(ca, "Error migrating metadata: %i", ret);
+ return ret;
+ }
+
+ if (ca->mi.has_data || ca->mi.has_metadata) {
+ bch_err(ca, "Migrate error: data still present");
+ return -EINVAL;
+ }
+
+ return 0;
+}
+
+/* Filesystem open: */
+
+const char *bch2_fs_open(char * const *devices, unsigned nr_devices,
+ struct bch_opts opts, struct bch_fs **ret)
+{
+ const char *err;
+ struct bch_fs *c = NULL;
+ struct bcache_superblock *sb;
+ unsigned i, best_sb = 0;
+
+ if (!nr_devices)
+ return "need at least one device";
+
+ if (!try_module_get(THIS_MODULE))
+ return "module unloading";
+
+ err = "cannot allocate memory";
+ sb = kcalloc(nr_devices, sizeof(*sb), GFP_KERNEL);
+ if (!sb)
+ goto err;
+
+ for (i = 0; i < nr_devices; i++) {
+ err = bch2_read_super(&sb[i], opts, devices[i]);
+ if (err)
+ goto err;
+
+ err = "attempting to register backing device";
+ if (__SB_IS_BDEV(le64_to_cpu(sb[i].sb->version)))
+ goto err;
+
+ err = bch2_validate_cache_super(&sb[i]);
+ if (err)
+ goto err;
+ }
+
+ for (i = 1; i < nr_devices; i++)
+ if (le64_to_cpu(sb[i].sb->seq) >
+ le64_to_cpu(sb[best_sb].sb->seq))
+ best_sb = i;
+
+ for (i = 0; i < nr_devices; i++) {
+ err = bch2_dev_in_fs(sb[best_sb].sb, sb[i].sb);
+ if (err)
+ goto err;
+ }
+
+ err = "cannot allocate memory";
+ c = bch2_fs_alloc(sb[best_sb].sb, opts);
+ if (!c)
+ goto err;
+
+ err = "bch2_dev_online() error";
+ mutex_lock(&c->sb_lock);
+ for (i = 0; i < nr_devices; i++)
+ if (__bch2_dev_online(c, &sb[i])) {
+ mutex_unlock(&c->sb_lock);
+ goto err;
+ }
+ mutex_unlock(&c->sb_lock);
+
+ err = "insufficient devices";
+ if (!bch2_fs_may_start(c, 0))
+ goto err;
+
+ if (!c->opts.nostart) {
+ err = __bch2_fs_start(c);
+ if (err)
+ goto err;
+ }
+
+ err = bch2_fs_online(c);
+ if (err)
+ goto err;
+
+ if (ret)
+ *ret = c;
+ else
+ closure_put(&c->cl);
+
+ err = NULL;
+out:
+ kfree(sb);
+ module_put(THIS_MODULE);
+ if (err)
+ c = NULL;
+ return err;
+err:
+ if (c)
+ bch2_fs_stop(c);
+
+ for (i = 0; i < nr_devices; i++)
+ bch2_free_super(&sb[i]);
+ goto out;
+}
+
+static const char *__bch2_fs_open_incremental(struct bcache_superblock *sb,
+ struct bch_opts opts)
+{
+ const char *err;
+ struct bch_fs *c;
+ bool allocated_fs = false;
+
+ err = bch2_validate_cache_super(sb);
+ if (err)
+ return err;
+
+ mutex_lock(&bch_fs_list_lock);
+ c = __bch2_uuid_to_fs(sb->sb->uuid);
+ if (c) {
+ closure_get(&c->cl);
+
+ err = bch2_dev_in_fs(c->disk_sb, sb->sb);
+ if (err)
+ goto err;
+ } else {
+ c = bch2_fs_alloc(sb->sb, opts);
+ err = "cannot allocate memory";
+ if (!c)
+ goto err;
+
+ allocated_fs = true;
+ }
+
+ err = "bch2_dev_online() error";
+
+ mutex_lock(&c->sb_lock);
+ if (__bch2_dev_online(c, sb)) {
+ mutex_unlock(&c->sb_lock);
+ goto err;
+ }
+ mutex_unlock(&c->sb_lock);
+
+ if (!c->opts.nostart && bch2_fs_may_start(c, 0)) {
+ err = __bch2_fs_start(c);
+ if (err)
+ goto err;
+ }
+
+ err = __bch2_fs_online(c);
+ if (err)
+ goto err;
+
+ closure_put(&c->cl);
+ mutex_unlock(&bch_fs_list_lock);
+
+ return NULL;
+err:
+ mutex_unlock(&bch_fs_list_lock);
+
+ if (allocated_fs)
+ bch2_fs_stop(c);
+ else if (c)
+ closure_put(&c->cl);
+
+ return err;
+}
+
+const char *bch2_fs_open_incremental(const char *path)
+{
+ struct bcache_superblock sb;
+ struct bch_opts opts = bch2_opts_empty();
+ const char *err;
+
+ err = bch2_read_super(&sb, opts, path);
+ if (err)
+ return err;
+
+ if (!__SB_IS_BDEV(le64_to_cpu(sb.sb->version)))
+ err = __bch2_fs_open_incremental(&sb, opts);
+ else
+ err = "not a bcachefs superblock";
+
+ bch2_free_super(&sb);
+
+ return err;
+}
+
+/* Global interfaces/init */
+
+static void bcachefs_exit(void)
+{
+ bch2_debug_exit();
+ bch2_vfs_exit();
+ bch2_chardev_exit();
+ if (bcachefs_kset)
+ kset_unregister(bcachefs_kset);
+}
+
+static int __init bcachefs_init(void)
+{
+ bch2_bkey_pack_test();
+
+ if (!(bcachefs_kset = kset_create_and_add("bcachefs", NULL, fs_kobj)) ||
+ bch2_chardev_init() ||
+ bch2_vfs_init() ||
+ bch2_debug_init())
+ goto err;
+
+ return 0;
+err:
+ bcachefs_exit();
+ return -ENOMEM;
+}
+
+#define BCH_DEBUG_PARAM(name, description) \
+ bool bch2_##name; \
+ module_param_named(name, bch2_##name, bool, 0644); \
+ MODULE_PARM_DESC(name, description);
+BCH_DEBUG_PARAMS()
+#undef BCH_DEBUG_PARAM
+
+module_exit(bcachefs_exit);
+module_init(bcachefs_init);