From patchwork Mon Apr 18 11:31:32 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Anand Jain X-Patchwork-Id: 8871401 Return-Path: X-Original-To: patchwork-linux-btrfs@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork1.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork1.web.kernel.org (Postfix) with ESMTP id 041449F441 for ; Mon, 18 Apr 2016 11:32:21 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 1FBB120268 for ; Mon, 18 Apr 2016 11:32:20 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 12D4D20222 for ; Mon, 18 Apr 2016 11:32:19 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752436AbcDRLcP (ORCPT ); Mon, 18 Apr 2016 07:32:15 -0400 Received: from userp1040.oracle.com ([156.151.31.81]:24910 "EHLO userp1040.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752424AbcDRLcO (ORCPT ); Mon, 18 Apr 2016 07:32:14 -0400 Received: from userv0021.oracle.com (userv0021.oracle.com [156.151.31.71]) by userp1040.oracle.com (Sentrion-MTA-4.3.2/Sentrion-MTA-4.3.2) with ESMTP id u3IBW82w005712 (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 18 Apr 2016 11:32:08 GMT Received: from userv0122.oracle.com (userv0122.oracle.com [156.151.31.75]) by userv0021.oracle.com (8.13.8/8.13.8) with ESMTP id u3IBW8Pj024755 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 18 Apr 2016 11:32:08 GMT Received: from abhmp0018.oracle.com (abhmp0018.oracle.com [141.146.116.24]) by userv0122.oracle.com (8.14.4/8.14.4) with ESMTP id u3IBW7ls028177; Mon, 18 Apr 2016 11:32:07 GMT Received: from arch2.sg.oracle.com (/10.186.101.65) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 18 Apr 2016 04:32:07 -0700 From: Anand Jain To: linux-btrfs@vger.kernel.org Cc: dsterba@suse.cz, yauhen.kharuzhy@zavadatar.com Subject: [PATCH 01/13] btrfs: Introduce a new function to check if all chunks a OK for degraded mount Date: Mon, 18 Apr 2016 19:31:32 +0800 Message-Id: <1460979104-27497-2-git-send-email-anand.jain@oracle.com> X-Mailer: git-send-email 2.7.0 In-Reply-To: <1460979104-27497-1-git-send-email-anand.jain@oracle.com> References: <1460979104-27497-1-git-send-email-anand.jain@oracle.com> X-Source-IP: userv0021.oracle.com [156.151.31.71] Sender: linux-btrfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-btrfs@vger.kernel.org X-Spam-Status: No, score=-7.9 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_HI, RP_MATCHES_RCVD, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP From: Qu Wenruo Introduce a new function, btrfs_check_degradable(), to judge if all chunks in btrfs is OK for degraded mount. It provides the new basis for accurate btrfs mount/remount and even runtime degraded mount check other than old one-size-fit-all method. Signed-off-by: Qu Wenruo --- fs/btrfs/volumes.c | 67 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ fs/btrfs/volumes.h | 1 + 2 files changed, 68 insertions(+) diff --git a/fs/btrfs/volumes.c b/fs/btrfs/volumes.c index 4ff716d9b16c..f5fa5f88263c 100644 --- a/fs/btrfs/volumes.c +++ b/fs/btrfs/volumes.c @@ -7065,3 +7065,70 @@ static void btrfs_close_one_device(struct btrfs_device *device) call_rcu(&device->rcu, free_device); } + +/* + * Check if all chunks in the fs is OK for degraded mount + * Caller itself should do extra check if DEGRADED mount option is given + * for >0 return value. + * + * Return 0 if all chunks are OK. + * Return >0 if all chunks are degradable but not all OK. + * Return <0 if any chunk is not degradable or other bug. + */ +int btrfs_check_degradable(struct btrfs_fs_info *fs_info, unsigned flags) +{ + struct btrfs_mapping_tree *map_tree = &fs_info->mapping_tree; + struct extent_map *em; + u64 next_start = 0; + int ret = 0; + + if (flags & MS_RDONLY) + return 0; + + read_lock(&map_tree->map_tree.lock); + em = lookup_extent_mapping(&map_tree->map_tree, 0, (u64)(-1)); + read_unlock(&map_tree->map_tree.lock); + /* No any chunk? Should be a huge bug */ + if (!em) { + ret = -ENOENT; + goto out; + } + + while (em) { + struct map_lookup *map; + int missing = 0; + int max_tolerated; + int i; + + map = (struct map_lookup *) em->bdev; + max_tolerated = + btrfs_get_num_tolerated_disk_barrier_failures( + map->type); + for (i = 0; i < map->num_stripes; i++) { + if (map->stripes[i].dev->missing) + missing++; + } + if (missing > max_tolerated) { + ret = -EIO; + btrfs_warn(fs_info, + "missing devices(%d) exceeds the limit(%d), writeable mount is not allowed", + missing, max_tolerated); + goto out; + } else if (missing) + ret = 1; + next_start = extent_map_end(em); + + /* + * Alwasy search range [next_start, (u64)-1) to find the next + * chunk map + */ + free_extent_map(em); + read_lock(&map_tree->map_tree.lock); + em = lookup_extent_mapping(&map_tree->map_tree, next_start, + (u64)(-1) - next_start); + read_unlock(&map_tree->map_tree.lock); + } +out: + free_extent_map(em); + return ret; +} diff --git a/fs/btrfs/volumes.h b/fs/btrfs/volumes.h index 93e0a2560366..ae9d552c93bf 100644 --- a/fs/btrfs/volumes.h +++ b/fs/btrfs/volumes.h @@ -568,5 +568,6 @@ static inline void unlock_chunks(struct btrfs_root *root) struct list_head *btrfs_get_fs_uuids(void); void btrfs_set_fs_info_ptr(struct btrfs_fs_info *fs_info); void btrfs_reset_fs_info_ptr(struct btrfs_fs_info *fs_info); +int btrfs_check_degradable(struct btrfs_fs_info *fs_info, unsigned flags); #endif