]> git.ipfire.org Git - thirdparty/xfsprogs-dev.git/blame - scrub/phase6.c
xfs_scrub: remove moveon from vfs directory tree iteration
[thirdparty/xfsprogs-dev.git] / scrub / phase6.c
CommitLineData
959ef981 1// SPDX-License-Identifier: GPL-2.0+
b364a9c0
DW
2/*
3 * Copyright (C) 2018 Oracle. All Rights Reserved.
b364a9c0 4 * Author: Darrick J. Wong <darrick.wong@oracle.com>
b364a9c0 5 */
a440f877 6#include "xfs.h"
b364a9c0 7#include <stdint.h>
b364a9c0
DW
8#include <dirent.h>
9#include <sys/statvfs.h>
b364a9c0 10#include "handle.h"
42b4c8e8 11#include "libfrog/paths.h"
56598728 12#include "libfrog/workqueue.h"
b364a9c0
DW
13#include "xfs_scrub.h"
14#include "common.h"
a58400ed 15#include "libfrog/bitmap.h"
b364a9c0
DW
16#include "disk.h"
17#include "filemap.h"
ed60d210 18#include "fscounters.h"
b364a9c0
DW
19#include "inodes.h"
20#include "read_verify.h"
21#include "spacemap.h"
22#include "vfs.h"
23
24/*
25 * Phase 6: Verify data file integrity.
26 *
27 * Identify potential data block extents with GETFSMAP, then feed those
28 * extents to the read-verify pool to get the verify commands batched,
29 * issued, and (if there are problems) reported back to us. If there
30 * are errors, we'll record the bad regions and (if available) use rmap
31 * to tell us if metadata are now corrupt. Otherwise, we'll scan the
32 * whole directory tree looking for files that overlap the bad regions
33 * and report the paths of the now corrupt files.
34 */
35
f1bb1696
DW
36/* Verify disk blocks with GETFSMAP */
37
557f98d7 38struct media_verify_state {
f1bb1696
DW
39 struct read_verify_pool *rvp_data;
40 struct read_verify_pool *rvp_log;
41 struct read_verify_pool *rvp_realtime;
42 struct bitmap *d_bad; /* bytes */
43 struct bitmap *r_bad; /* bytes */
44};
45
b364a9c0 46/* Find the fd for a given device identifier. */
f1bb1696
DW
47static struct read_verify_pool *
48xfs_dev_to_pool(
49 struct scrub_ctx *ctx,
557f98d7 50 struct media_verify_state *vs,
f1bb1696 51 dev_t dev)
b364a9c0
DW
52{
53 if (dev == ctx->fsinfo.fs_datadev)
557f98d7 54 return vs->rvp_data;
b364a9c0 55 else if (dev == ctx->fsinfo.fs_logdev)
557f98d7 56 return vs->rvp_log;
b364a9c0 57 else if (dev == ctx->fsinfo.fs_rtdev)
557f98d7 58 return vs->rvp_realtime;
b364a9c0
DW
59 abort();
60}
61
62/* Find the device major/minor for a given file descriptor. */
63static dev_t
64xfs_disk_to_dev(
65 struct scrub_ctx *ctx,
66 struct disk *disk)
67{
68 if (disk == ctx->datadev)
69 return ctx->fsinfo.fs_datadev;
70 else if (disk == ctx->logdev)
71 return ctx->fsinfo.fs_logdev;
72 else if (disk == ctx->rtdev)
73 return ctx->fsinfo.fs_rtdev;
74 abort();
75}
76
c9b349bd
DW
77/* Find the incore bad blocks bitmap for a given disk. */
78static struct bitmap *
79bitmap_for_disk(
80 struct scrub_ctx *ctx,
81 struct disk *disk,
82 struct media_verify_state *vs)
83{
84 dev_t dev = xfs_disk_to_dev(ctx, disk);
85
86 if (dev == ctx->fsinfo.fs_datadev)
87 return vs->d_bad;
88 else if (dev == ctx->fsinfo.fs_rtdev)
89 return vs->r_bad;
90 return NULL;
91}
92
93struct disk_ioerr_report {
94 struct scrub_ctx *ctx;
95 struct disk *disk;
96};
97
b364a9c0
DW
98struct owner_decode {
99 uint64_t owner;
100 const char *descr;
101};
102
103static const struct owner_decode special_owners[] = {
104 {XFS_FMR_OWN_FREE, "free space"},
105 {XFS_FMR_OWN_UNKNOWN, "unknown owner"},
106 {XFS_FMR_OWN_FS, "static FS metadata"},
107 {XFS_FMR_OWN_LOG, "journalling log"},
108 {XFS_FMR_OWN_AG, "per-AG metadata"},
109 {XFS_FMR_OWN_INOBT, "inode btree blocks"},
110 {XFS_FMR_OWN_INODES, "inodes"},
111 {XFS_FMR_OWN_REFC, "refcount btree"},
112 {XFS_FMR_OWN_COW, "CoW staging"},
113 {XFS_FMR_OWN_DEFECTIVE, "bad blocks"},
114 {0, NULL},
115};
116
117/* Decode a special owner. */
118static const char *
119xfs_decode_special_owner(
120 uint64_t owner)
121{
122 const struct owner_decode *od = special_owners;
123
124 while (od->descr) {
125 if (od->owner == owner)
126 return od->descr;
127 od++;
128 }
129
130 return NULL;
131}
132
133/* Routines to translate bad physical extents into file paths and offsets. */
134
ed953d26 135struct badfile_report {
73ce9669
DW
136 struct scrub_ctx *ctx;
137 const char *descr;
138 struct media_verify_state *vs;
139 struct file_bmap *bmap;
ed953d26
DW
140};
141
142/* Report on bad extents found during a media scan. */
143static int
144report_badfile(
145 uint64_t start,
146 uint64_t length,
147 void *arg)
148{
149 struct badfile_report *br = arg;
150 unsigned long long bad_offset;
151 unsigned long long bad_length;
152
153 /* Clamp the bad region to the file mapping. */
154 if (start < br->bmap->bm_physical) {
155 length -= br->bmap->bm_physical - start;
156 start = br->bmap->bm_physical;
157 }
158 length = min(length, br->bmap->bm_length);
159
160 /* Figure out how far into the bmap is the bad mapping and report it. */
161 bad_offset = start - br->bmap->bm_physical;
162 bad_length = min(start + length,
163 br->bmap->bm_physical + br->bmap->bm_length) - start;
164
49e05cb0 165 str_unfixable_error(br->ctx, br->descr,
ed953d26
DW
166_("media error at data offset %llu length %llu."),
167 br->bmap->bm_offset + bad_offset, bad_length);
168 return 0;
169}
170
b364a9c0 171/* Report if this extent overlaps a bad region. */
73ce9669 172static int
663e02a0 173report_data_loss(
b364a9c0 174 struct scrub_ctx *ctx,
b364a9c0
DW
175 int fd,
176 int whichfork,
177 struct fsxattr *fsx,
73ce9669 178 struct file_bmap *bmap,
b364a9c0
DW
179 void *arg)
180{
73ce9669
DW
181 struct badfile_report *br = arg;
182 struct media_verify_state *vs = br->vs;
b364a9c0 183 struct bitmap *bmp;
73ce9669
DW
184
185 br->bmap = bmap;
b364a9c0
DW
186
187 /* Only report errors for real extents. */
188 if (bmap->bm_flags & (BMV_OF_PREALLOC | BMV_OF_DELALLOC))
73ce9669 189 return 0;
b364a9c0
DW
190
191 if (fsx->fsx_xflags & FS_XFLAG_REALTIME)
ed5f9cc7 192 bmp = vs->r_bad;
b364a9c0 193 else
ed5f9cc7 194 bmp = vs->d_bad;
b364a9c0 195
73ce9669
DW
196 return bitmap_iterate_range(bmp, bmap->bm_physical, bmap->bm_length,
197 report_badfile, br);
b364a9c0
DW
198}
199
663e02a0 200/* Report if the extended attribute data overlaps a bad region. */
73ce9669 201static int
663e02a0
DW
202report_attr_loss(
203 struct scrub_ctx *ctx,
663e02a0
DW
204 int fd,
205 int whichfork,
206 struct fsxattr *fsx,
73ce9669 207 struct file_bmap *bmap,
663e02a0
DW
208 void *arg)
209{
73ce9669
DW
210 struct badfile_report *br = arg;
211 struct media_verify_state *vs = br->vs;
663e02a0
DW
212 struct bitmap *bmp = vs->d_bad;
213
214 /* Complain about attr fork extents that don't look right. */
215 if (bmap->bm_flags & (BMV_OF_PREALLOC | BMV_OF_DELALLOC)) {
73ce9669 216 str_info(ctx, br->descr,
663e02a0 217_("found unexpected unwritten/delalloc attr fork extent."));
73ce9669 218 return 0;
663e02a0
DW
219 }
220
221 if (fsx->fsx_xflags & FS_XFLAG_REALTIME) {
73ce9669 222 str_info(ctx, br->descr,
663e02a0 223_("found unexpected realtime attr fork extent."));
73ce9669 224 return 0;
663e02a0
DW
225 }
226
227 if (bitmap_test(bmp, bmap->bm_physical, bmap->bm_length))
73ce9669 228 str_corrupt(ctx, br->descr,
663e02a0
DW
229_("media error in extended attribute data."));
230
73ce9669 231 return 0;
663e02a0
DW
232}
233
b364a9c0
DW
234/* Iterate the extent mappings of a file to report errors. */
235static bool
236xfs_report_verify_fd(
237 struct scrub_ctx *ctx,
238 const char *descr,
239 int fd,
240 void *arg)
241{
73ce9669
DW
242 struct badfile_report br = {
243 .ctx = ctx,
244 .vs = arg,
245 .descr = descr,
246 };
247 struct file_bmap key = {0};
248 int ret;
b364a9c0
DW
249
250 /* data fork */
73ce9669
DW
251 ret = scrub_iterate_filemaps(ctx, fd, XFS_DATA_FORK, &key,
252 report_data_loss, &br);
253 if (ret) {
254 str_liberror(ctx, ret, descr);
b364a9c0 255 return false;
73ce9669 256 }
b364a9c0
DW
257
258 /* attr fork */
73ce9669
DW
259 ret = scrub_iterate_filemaps(ctx, fd, XFS_ATTR_FORK, &key,
260 report_attr_loss, &br);
261 if (ret) {
262 str_liberror(ctx, ret, descr);
263 return false;
264 }
265 return true;
b364a9c0
DW
266}
267
268/* Report read verify errors in unlinked (but still open) files. */
269static int
270xfs_report_verify_inode(
271 struct scrub_ctx *ctx,
272 struct xfs_handle *handle,
4cca629d 273 struct xfs_bulkstat *bstat,
b364a9c0
DW
274 void *arg)
275{
276 char descr[DESCR_BUFSZ];
b364a9c0
DW
277 bool moveon;
278 int fd;
279 int error;
280
b364a9c0
DW
281 /* Ignore linked files and things we can't open. */
282 if (bstat->bs_nlink != 0)
283 return 0;
284 if (!S_ISREG(bstat->bs_mode) && !S_ISDIR(bstat->bs_mode))
285 return 0;
286
15589f0a
DW
287 scrub_render_ino_descr(ctx, descr, DESCR_BUFSZ,
288 bstat->bs_ino, bstat->bs_gen, _("(unlinked)"));
289
b364a9c0 290 /* Try to open the inode. */
59f79e0a 291 fd = scrub_open_handle(handle);
b364a9c0
DW
292 if (fd < 0) {
293 error = errno;
294 if (error == ESTALE)
295 return error;
296
bb5dbd06
DW
297 str_info(ctx, descr,
298_("Disappeared during read error reporting."));
b364a9c0
DW
299 return error;
300 }
301
302 /* Go find the badness. */
303 moveon = xfs_report_verify_fd(ctx, descr, fd, arg);
6c05cc5d
DW
304 error = close(fd);
305 if (error)
306 str_errno(ctx, descr);
b364a9c0
DW
307
308 return moveon ? 0 : XFS_ITERATE_INODES_ABORT;
309}
310
311/* Scan a directory for matches in the read verify error list. */
f544ec31 312static int
b364a9c0
DW
313xfs_report_verify_dir(
314 struct scrub_ctx *ctx,
315 const char *path,
316 int dir_fd,
317 void *arg)
318{
f544ec31
DW
319 bool moveon;
320
321 moveon = xfs_report_verify_fd(ctx, path, dir_fd, arg);
322 return moveon ? 0 : -1;
b364a9c0
DW
323}
324
325/*
326 * Scan the inode associated with a directory entry for matches with
327 * the read verify error list.
328 */
f544ec31 329static int
b364a9c0
DW
330xfs_report_verify_dirent(
331 struct scrub_ctx *ctx,
332 const char *path,
333 int dir_fd,
334 struct dirent *dirent,
335 struct stat *sb,
336 void *arg)
337{
338 bool moveon;
339 int fd;
6c05cc5d 340 int error;
b364a9c0
DW
341
342 /* Ignore things we can't open. */
343 if (!S_ISREG(sb->st_mode) && !S_ISDIR(sb->st_mode))
f544ec31 344 return 0;
b364a9c0
DW
345
346 /* Ignore . and .. */
347 if (!strcmp(".", dirent->d_name) || !strcmp("..", dirent->d_name))
f544ec31 348 return 0;
b364a9c0
DW
349
350 /*
351 * If we were given a dirent, open the associated file under
352 * dir_fd for badblocks scanning. If dirent is NULL, then it's
353 * the directory itself we want to scan.
354 */
355 fd = openat(dir_fd, dirent->d_name,
356 O_RDONLY | O_NOATIME | O_NOFOLLOW | O_NOCTTY);
f544ec31
DW
357 if (fd < 0) {
358 if (errno == ENOENT)
359 return 0;
360 str_errno(ctx, path);
361 return errno;
362 }
b364a9c0
DW
363
364 /* Go find the badness. */
365 moveon = xfs_report_verify_fd(ctx, path, fd, arg);
366 if (moveon)
367 goto out;
368
369out:
6c05cc5d
DW
370 error = close(fd);
371 if (error)
372 str_errno(ctx, path);
f544ec31 373 return moveon ? 0 : -1;
b364a9c0
DW
374}
375
c9b349bd 376/* Use a fsmap to report metadata lost to a media error. */
b364a9c0 377static bool
c9b349bd 378report_ioerr_fsmap(
b364a9c0
DW
379 struct scrub_ctx *ctx,
380 const char *descr,
381 struct fsmap *map,
382 void *arg)
383{
384 const char *type;
f1f5fd3a 385 char buf[DESCR_BUFSZ];
b364a9c0
DW
386 uint64_t err_physical = *(uint64_t *)arg;
387 uint64_t err_off;
388
909c6a54
DW
389 /* Don't care about unwritten extents. */
390 if (map->fmr_flags & FMR_OF_PREALLOC)
391 return true;
392
b364a9c0
DW
393 if (err_physical > map->fmr_physical)
394 err_off = err_physical - map->fmr_physical;
395 else
396 err_off = 0;
397
f1f5fd3a 398 /* Report special owners */
b364a9c0 399 if (map->fmr_flags & FMR_OF_SPECIAL_OWNER) {
f1f5fd3a
DW
400 snprintf(buf, DESCR_BUFSZ, _("disk offset %"PRIu64),
401 (uint64_t)map->fmr_physical + err_off);
b364a9c0 402 type = xfs_decode_special_owner(map->fmr_owner);
abc2e70d 403 str_corrupt(ctx, buf, _("media error in %s."), type);
b364a9c0
DW
404 }
405
02d0069e
DW
406 /* Report extent maps */
407 if (map->fmr_flags & FMR_OF_EXTENT_MAP) {
408 bool attr = (map->fmr_flags & FMR_OF_ATTR_FORK);
409
410 scrub_render_ino_descr(ctx, buf, DESCR_BUFSZ,
411 map->fmr_owner, 0, " %s",
412 attr ? _("extended attribute") :
413 _("file data"));
abc2e70d 414 str_corrupt(ctx, buf, _("media error in extent map"));
02d0069e
DW
415 }
416
b364a9c0
DW
417 /*
418 * XXX: If we had a getparent() call we could report IO errors
419 * efficiently. Until then, we'll have to scan the dir tree
420 * to find the bad file's pathname.
421 */
422
423 return true;
424}
425
426/*
c9b349bd
DW
427 * For a range of bad blocks, visit each space mapping that overlaps the bad
428 * range so that we can report lost metadata.
b364a9c0 429 */
c9b349bd
DW
430static int
431report_ioerr(
b364a9c0
DW
432 uint64_t start,
433 uint64_t length,
b364a9c0
DW
434 void *arg)
435{
436 struct fsmap keys[2];
437 char descr[DESCR_BUFSZ];
c9b349bd 438 struct disk_ioerr_report *dioerr = arg;
b364a9c0 439 dev_t dev;
b364a9c0 440
c9b349bd 441 dev = xfs_disk_to_dev(dioerr->ctx, dioerr->disk);
b364a9c0 442
c9b349bd
DW
443 snprintf(descr, DESCR_BUFSZ,
444_("dev %d:%d ioerr @ %"PRIu64":%"PRIu64" "),
b364a9c0
DW
445 major(dev), minor(dev), start, length);
446
447 /* Go figure out which blocks are bad from the fsmap. */
448 memset(keys, 0, sizeof(struct fsmap) * 2);
449 keys->fmr_device = dev;
450 keys->fmr_physical = start;
451 (keys + 1)->fmr_device = dev;
452 (keys + 1)->fmr_physical = start + length - 1;
453 (keys + 1)->fmr_owner = ULLONG_MAX;
454 (keys + 1)->fmr_offset = ULLONG_MAX;
455 (keys + 1)->fmr_flags = UINT_MAX;
c9b349bd 456 xfs_iterate_fsmap(dioerr->ctx, descr, keys, report_ioerr_fsmap,
b364a9c0 457 &start);
c9b349bd
DW
458 return 0;
459}
460
461/* Report all the media errors found on a disk. */
462static int
463report_disk_ioerrs(
464 struct scrub_ctx *ctx,
465 struct disk *disk,
466 struct media_verify_state *vs)
467{
468 struct disk_ioerr_report dioerr = {
469 .ctx = ctx,
470 .disk = disk,
471 };
472 struct bitmap *tree;
473
474 if (!disk)
475 return 0;
476 tree = bitmap_for_disk(ctx, disk, vs);
477 if (!tree)
478 return 0;
479 return bitmap_iterate(tree, report_ioerr, &dioerr);
480}
481
482/* Given bad extent lists for the data & rtdev, find bad files. */
483static bool
484report_all_media_errors(
485 struct scrub_ctx *ctx,
486 struct media_verify_state *vs)
487{
c9b349bd
DW
488 int ret;
489
490 ret = report_disk_ioerrs(ctx, ctx->datadev, vs);
491 if (ret) {
492 str_liberror(ctx, ret, _("walking datadev io errors"));
493 return false;
494 }
495
496 ret = report_disk_ioerrs(ctx, ctx->rtdev, vs);
497 if (ret) {
498 str_liberror(ctx, ret, _("walking rtdev io errors"));
499 return false;
500 }
501
502 /* Scan the directory tree to get file paths. */
f544ec31 503 ret = scan_fs_tree(ctx, xfs_report_verify_dir,
c9b349bd 504 xfs_report_verify_dirent, vs);
f544ec31 505 if (ret)
c9b349bd
DW
506 return false;
507
508 /* Scan for unlinked files. */
59f79e0a
DW
509 ret = scrub_scan_all_inodes(ctx, xfs_report_verify_inode, vs);
510 return ret == 0;
b364a9c0
DW
511}
512
513/* Schedule a read-verify of a (data block) extent. */
514static bool
515xfs_check_rmap(
516 struct scrub_ctx *ctx,
517 const char *descr,
518 struct fsmap *map,
519 void *arg)
520{
557f98d7 521 struct media_verify_state *vs = arg;
f1bb1696 522 struct read_verify_pool *rvp;
8cab77d3 523 int ret;
f1bb1696 524
557f98d7 525 rvp = xfs_dev_to_pool(ctx, vs, map->fmr_device);
b364a9c0
DW
526
527 dbg_printf("rmap dev %d:%d phys %"PRIu64" owner %"PRId64
528 " offset %"PRIu64" len %"PRIu64" flags 0x%x\n",
529 major(map->fmr_device), minor(map->fmr_device),
530 (uint64_t)map->fmr_physical, (int64_t)map->fmr_owner,
531 (uint64_t)map->fmr_offset, (uint64_t)map->fmr_length,
532 map->fmr_flags);
533
534 /* "Unknown" extents should be verified; they could be data. */
535 if ((map->fmr_flags & FMR_OF_SPECIAL_OWNER) &&
536 map->fmr_owner == XFS_FMR_OWN_UNKNOWN)
537 map->fmr_flags &= ~FMR_OF_SPECIAL_OWNER;
538
539 /*
540 * We only care about read-verifying data extents that have been
541 * written to disk. This means we can skip "special" owners
542 * (metadata), xattr blocks, unwritten extents, and extent maps.
543 * These should all get checked elsewhere in the scrubber.
544 */
545 if (map->fmr_flags & (FMR_OF_PREALLOC | FMR_OF_ATTR_FORK |
546 FMR_OF_EXTENT_MAP | FMR_OF_SPECIAL_OWNER))
22d658ec 547 return true;
b364a9c0
DW
548
549 /* XXX: Filter out directory data blocks. */
550
551 /* Schedule the read verify command for (eventual) running. */
8cab77d3
DW
552 ret = read_verify_schedule_io(rvp, map->fmr_physical, map->fmr_length,
553 vs);
554 if (ret) {
555 str_liberror(ctx, ret, descr);
556 return false;
557 }
b364a9c0 558
b364a9c0
DW
559 return true;
560}
561
f1bb1696 562/* Wait for read/verify actions to finish, then return # bytes checked. */
8cab77d3 563static int
f1bb1696 564clean_pool(
8cab77d3
DW
565 struct read_verify_pool *rvp,
566 unsigned long long *bytes_checked)
f1bb1696 567{
8cab77d3
DW
568 uint64_t pool_checked;
569 int ret;
f1bb1696
DW
570
571 if (!rvp)
572 return 0;
573
22d658ec
DW
574 ret = read_verify_force_io(rvp);
575 if (ret)
576 return ret;
577
8cab77d3
DW
578 ret = read_verify_pool_flush(rvp);
579 if (ret)
580 goto out_destroy;
581
582 ret = read_verify_bytes(rvp, &pool_checked);
583 if (ret)
584 goto out_destroy;
585
586 *bytes_checked += pool_checked;
587out_destroy:
f1bb1696
DW
588 read_verify_pool_destroy(rvp);
589 return ret;
590}
591
c9b349bd
DW
592/* Remember a media error for later. */
593static void
594remember_ioerr(
595 struct scrub_ctx *ctx,
596 struct disk *disk,
597 uint64_t start,
598 uint64_t length,
599 int error,
600 void *arg)
601{
602 struct media_verify_state *vs = arg;
603 struct bitmap *tree;
604 int ret;
605
606 tree = bitmap_for_disk(ctx, disk, vs);
607 if (!tree) {
608 str_liberror(ctx, ENOENT, _("finding bad block bitmap"));
609 return;
610 }
611
612 ret = bitmap_set(tree, start, length);
613 if (ret)
614 str_liberror(ctx, ret, _("setting bad block bitmap"));
615}
616
b364a9c0
DW
617/*
618 * Read verify all the file data blocks in a filesystem. Since XFS doesn't
619 * do data checksums, we trust that the underlying storage will pass back
620 * an IO error if it can't retrieve whatever we previously stored there.
621 * If we hit an IO error, we'll record the bad blocks in a bitmap and then
622 * scan the extent maps of the entire fs tree to figure (and the unlinked
623 * inodes) out which files are now broken.
624 */
625bool
626xfs_scan_blocks(
627 struct scrub_ctx *ctx)
628{
557f98d7 629 struct media_verify_state vs = { NULL };
93ab49dd 630 bool moveon = false;
233fabee 631 int ret;
b364a9c0 632
233fabee
DW
633 ret = bitmap_alloc(&vs.d_bad);
634 if (ret) {
635 str_liberror(ctx, ret, _("creating datadev badblock bitmap"));
41c08606 636 goto out;
b364a9c0
DW
637 }
638
233fabee
DW
639 ret = bitmap_alloc(&vs.r_bad);
640 if (ret) {
641 str_liberror(ctx, ret, _("creating realtime badblock bitmap"));
b364a9c0
DW
642 goto out_dbad;
643 }
644
8cab77d3 645 ret = read_verify_pool_alloc(ctx, ctx->datadev,
c9b349bd 646 ctx->mnt.fsgeom.blocksize, remember_ioerr,
8cab77d3
DW
647 scrub_nproc(ctx), &vs.rvp_data);
648 if (ret) {
649 str_liberror(ctx, ret, _("creating datadev media verifier"));
b364a9c0
DW
650 goto out_rbad;
651 }
f1bb1696 652 if (ctx->logdev) {
8cab77d3 653 ret = read_verify_pool_alloc(ctx, ctx->logdev,
c9b349bd 654 ctx->mnt.fsgeom.blocksize, remember_ioerr,
8cab77d3
DW
655 scrub_nproc(ctx), &vs.rvp_log);
656 if (ret) {
657 str_liberror(ctx, ret,
658 _("creating logdev media verifier"));
f1bb1696
DW
659 goto out_datapool;
660 }
661 }
662 if (ctx->rtdev) {
8cab77d3 663 ret = read_verify_pool_alloc(ctx, ctx->rtdev,
c9b349bd 664 ctx->mnt.fsgeom.blocksize, remember_ioerr,
8cab77d3
DW
665 scrub_nproc(ctx), &vs.rvp_realtime);
666 if (ret) {
667 str_liberror(ctx, ret,
668 _("creating rtdev media verifier"));
f1bb1696
DW
669 goto out_logpool;
670 }
671 }
557f98d7 672 moveon = xfs_scan_all_spacemaps(ctx, xfs_check_rmap, &vs);
b364a9c0 673 if (!moveon)
f1bb1696 674 goto out_rtpool;
8cab77d3
DW
675
676 ret = clean_pool(vs.rvp_data, &ctx->bytes_checked);
677 if (ret) {
678 str_liberror(ctx, ret, _("flushing datadev verify pool"));
679 moveon = false;
680 }
681
682 ret = clean_pool(vs.rvp_log, &ctx->bytes_checked);
683 if (ret) {
684 str_liberror(ctx, ret, _("flushing logdev verify pool"));
685 moveon = false;
686 }
687
688 ret = clean_pool(vs.rvp_realtime, &ctx->bytes_checked);
689 if (ret) {
690 str_liberror(ctx, ret, _("flushing rtdev verify pool"));
691 moveon = false;
692 }
b364a9c0
DW
693
694 /* Scan the whole dir tree to see what matches the bad extents. */
8cab77d3 695 if (moveon && (!bitmap_empty(vs.d_bad) || !bitmap_empty(vs.r_bad)))
c9b349bd 696 moveon = report_all_media_errors(ctx, &vs);
b364a9c0 697
557f98d7
DW
698 bitmap_free(&vs.r_bad);
699 bitmap_free(&vs.d_bad);
b364a9c0
DW
700 return moveon;
701
f1bb1696 702out_rtpool:
7668d01d 703 if (vs.rvp_realtime) {
4cd869e5 704 read_verify_pool_abort(vs.rvp_realtime);
557f98d7 705 read_verify_pool_destroy(vs.rvp_realtime);
7668d01d 706 }
f1bb1696 707out_logpool:
7668d01d 708 if (vs.rvp_log) {
4cd869e5 709 read_verify_pool_abort(vs.rvp_log);
557f98d7 710 read_verify_pool_destroy(vs.rvp_log);
7668d01d 711 }
f1bb1696 712out_datapool:
4cd869e5 713 read_verify_pool_abort(vs.rvp_data);
557f98d7 714 read_verify_pool_destroy(vs.rvp_data);
b364a9c0 715out_rbad:
557f98d7 716 bitmap_free(&vs.r_bad);
b364a9c0 717out_dbad:
557f98d7 718 bitmap_free(&vs.d_bad);
41c08606 719out:
b364a9c0
DW
720 return moveon;
721}
ed60d210
DW
722
723/* Estimate how much work we're going to do. */
724bool
725xfs_estimate_verify_work(
726 struct scrub_ctx *ctx,
727 uint64_t *items,
728 unsigned int *nr_threads,
729 int *rshift)
730{
731 unsigned long long d_blocks;
732 unsigned long long d_bfree;
733 unsigned long long r_blocks;
734 unsigned long long r_bfree;
735 unsigned long long f_files;
736 unsigned long long f_free;
934d8d3a 737 int ret;
ed60d210 738
934d8d3a 739 ret = scrub_scan_estimate_blocks(ctx, &d_blocks, &d_bfree,
ed60d210 740 &r_blocks, &r_bfree, &f_files, &f_free);
934d8d3a
DW
741 if (ret) {
742 str_liberror(ctx, ret, _("estimating verify work"));
743 return false;
744 }
ed60d210 745
a749451c
DW
746 *items = cvt_off_fsb_to_b(&ctx->mnt,
747 (d_blocks - d_bfree) + (r_blocks - r_bfree));
ed60d210
DW
748 *nr_threads = disk_heads(ctx->datadev);
749 *rshift = 20;
934d8d3a 750 return true;
ed60d210 751}