2018-06-06 10:42:14 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0+
|
2017-10-18 12:37:38 +08:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2017 Oracle. All Rights Reserved.
|
|
|
|
* Author: Darrick J. Wong <darrick.wong@oracle.com>
|
|
|
|
*/
|
|
|
|
#include "xfs.h"
|
|
|
|
#include "xfs_fs.h"
|
|
|
|
#include "xfs_shared.h"
|
|
|
|
#include "xfs_format.h"
|
|
|
|
#include "xfs_trans_resv.h"
|
|
|
|
#include "xfs_mount.h"
|
|
|
|
#include "xfs_btree.h"
|
|
|
|
#include "xfs_sb.h"
|
2017-10-18 12:37:39 +08:00
|
|
|
#include "xfs_alloc.h"
|
2017-10-18 12:37:39 +08:00
|
|
|
#include "xfs_ialloc.h"
|
2018-01-17 10:53:08 +08:00
|
|
|
#include "xfs_rmap.h"
|
2021-06-02 08:48:24 +08:00
|
|
|
#include "xfs_ag.h"
|
2017-10-18 12:37:38 +08:00
|
|
|
#include "scrub/scrub.h"
|
|
|
|
#include "scrub/common.h"
|
|
|
|
|
|
|
|
/* Superblock */
|
|
|
|
|
2018-01-17 10:53:05 +08:00
|
|
|
/* Cross-reference with the other btrees. */
|
|
|
|
STATIC void
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_superblock_xref(
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_scrub *sc,
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_buf *bp)
|
2018-01-17 10:53:05 +08:00
|
|
|
{
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_mount *mp = sc->mp;
|
|
|
|
xfs_agnumber_t agno = sc->sm->sm_agno;
|
|
|
|
xfs_agblock_t agbno;
|
|
|
|
int error;
|
2018-01-17 10:53:06 +08:00
|
|
|
|
2018-01-17 10:53:05 +08:00
|
|
|
if (sc->sm->sm_flags & XFS_SCRUB_OFLAG_CORRUPT)
|
|
|
|
return;
|
2018-01-17 10:53:06 +08:00
|
|
|
|
|
|
|
agbno = XFS_SB_BLOCK(mp);
|
|
|
|
|
2018-07-20 03:29:11 +08:00
|
|
|
error = xchk_ag_init(sc, agno, &sc->sa);
|
|
|
|
if (!xchk_xref_process_error(sc, agno, agbno, &error))
|
2018-01-17 10:53:06 +08:00
|
|
|
return;
|
|
|
|
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_xref_is_used_space(sc, agbno, 1);
|
|
|
|
xchk_xref_is_not_inode_chunk(sc, agbno, 1);
|
2018-12-13 00:46:23 +08:00
|
|
|
xchk_xref_is_owned_by(sc, agbno, 1, &XFS_RMAP_OINFO_FS);
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_xref_is_not_shared(sc, agbno, 1);
|
2018-01-17 10:53:06 +08:00
|
|
|
|
|
|
|
/* scrub teardown will take care of sc->sa for us */
|
2018-01-17 10:53:05 +08:00
|
|
|
}
|
|
|
|
|
2017-10-18 12:37:38 +08:00
|
|
|
/*
|
|
|
|
* Scrub the filesystem superblock.
|
|
|
|
*
|
|
|
|
* Note: We do /not/ attempt to check AG 0's superblock. Mount is
|
|
|
|
* responsible for validating all the geometry information in sb 0, so
|
|
|
|
* if the filesystem is capable of initiating online scrub, then clearly
|
|
|
|
* sb 0 is ok and we can use its information to check everything else.
|
|
|
|
*/
|
|
|
|
int
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_superblock(
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_scrub *sc)
|
2017-10-18 12:37:38 +08:00
|
|
|
{
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_mount *mp = sc->mp;
|
|
|
|
struct xfs_buf *bp;
|
|
|
|
struct xfs_dsb *sb;
|
|
|
|
xfs_agnumber_t agno;
|
|
|
|
uint32_t v2_ok;
|
|
|
|
__be32 features_mask;
|
|
|
|
int error;
|
|
|
|
__be16 vernum_mask;
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
agno = sc->sm->sm_agno;
|
|
|
|
if (agno == 0)
|
|
|
|
return 0;
|
|
|
|
|
2018-05-14 21:34:31 +08:00
|
|
|
error = xfs_sb_read_secondary(mp, sc->tp, agno, &bp);
|
2018-01-09 02:49:02 +08:00
|
|
|
/*
|
|
|
|
* The superblock verifier can return several different error codes
|
|
|
|
* if it thinks the superblock doesn't look right. For a mount these
|
|
|
|
* would all get bounced back to userspace, but if we're here then the
|
|
|
|
* fs mounted successfully, which means that this secondary superblock
|
|
|
|
* is simply incorrect. Treat all these codes the same way we treat
|
|
|
|
* any corruption.
|
|
|
|
*/
|
|
|
|
switch (error) {
|
|
|
|
case -EINVAL: /* also -EWRONGFS */
|
|
|
|
case -ENOSYS:
|
|
|
|
case -EFBIG:
|
|
|
|
error = -EFSCORRUPTED;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2018-07-20 03:29:11 +08:00
|
|
|
if (!xchk_process_error(sc, agno, XFS_SB_BLOCK(mp), &error))
|
2017-10-18 12:37:38 +08:00
|
|
|
return error;
|
|
|
|
|
2020-03-10 23:57:30 +08:00
|
|
|
sb = bp->b_addr;
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Verify the geometries match. Fields that are permanently
|
|
|
|
* set by mkfs are checked; fields that can be updated later
|
|
|
|
* (and are not propagated to backup superblocks) are preen
|
|
|
|
* checked.
|
|
|
|
*/
|
|
|
|
if (sb->sb_blocksize != cpu_to_be32(mp->m_sb.sb_blocksize))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_dblocks != cpu_to_be64(mp->m_sb.sb_dblocks))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_rblocks != cpu_to_be64(mp->m_sb.sb_rblocks))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_rextents != cpu_to_be64(mp->m_sb.sb_rextents))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (!uuid_equal(&sb->sb_uuid, &mp->m_sb.sb_uuid))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_preen(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_logstart != cpu_to_be64(mp->m_sb.sb_logstart))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_rootino != cpu_to_be64(mp->m_sb.sb_rootino))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_preen(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_rbmino != cpu_to_be64(mp->m_sb.sb_rbmino))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_preen(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_rsumino != cpu_to_be64(mp->m_sb.sb_rsumino))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_preen(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_rextsize != cpu_to_be32(mp->m_sb.sb_rextsize))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_agblocks != cpu_to_be32(mp->m_sb.sb_agblocks))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_agcount != cpu_to_be32(mp->m_sb.sb_agcount))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_rbmblocks != cpu_to_be32(mp->m_sb.sb_rbmblocks))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_logblocks != cpu_to_be32(mp->m_sb.sb_logblocks))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
/* Check sb_versionnum bits that are set at mkfs time. */
|
|
|
|
vernum_mask = cpu_to_be16(~XFS_SB_VERSION_OKBITS |
|
|
|
|
XFS_SB_VERSION_NUMBITS |
|
|
|
|
XFS_SB_VERSION_ALIGNBIT |
|
|
|
|
XFS_SB_VERSION_DALIGNBIT |
|
|
|
|
XFS_SB_VERSION_SHAREDBIT |
|
|
|
|
XFS_SB_VERSION_LOGV2BIT |
|
|
|
|
XFS_SB_VERSION_SECTORBIT |
|
|
|
|
XFS_SB_VERSION_EXTFLGBIT |
|
|
|
|
XFS_SB_VERSION_DIRV2BIT);
|
|
|
|
if ((sb->sb_versionnum & vernum_mask) !=
|
|
|
|
(cpu_to_be16(mp->m_sb.sb_versionnum) & vernum_mask))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
/* Check sb_versionnum bits that can be set after mkfs time. */
|
|
|
|
vernum_mask = cpu_to_be16(XFS_SB_VERSION_ATTRBIT |
|
|
|
|
XFS_SB_VERSION_NLINKBIT |
|
|
|
|
XFS_SB_VERSION_QUOTABIT);
|
|
|
|
if ((sb->sb_versionnum & vernum_mask) !=
|
|
|
|
(cpu_to_be16(mp->m_sb.sb_versionnum) & vernum_mask))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_preen(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_sectsize != cpu_to_be16(mp->m_sb.sb_sectsize))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_inodesize != cpu_to_be16(mp->m_sb.sb_inodesize))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_inopblock != cpu_to_be16(mp->m_sb.sb_inopblock))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (memcmp(sb->sb_fname, mp->m_sb.sb_fname, sizeof(sb->sb_fname)))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_preen(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_blocklog != mp->m_sb.sb_blocklog)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_sectlog != mp->m_sb.sb_sectlog)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_inodelog != mp->m_sb.sb_inodelog)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_inopblog != mp->m_sb.sb_inopblog)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_agblklog != mp->m_sb.sb_agblklog)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_rextslog != mp->m_sb.sb_rextslog)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_imax_pct != mp->m_sb.sb_imax_pct)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_preen(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Skip the summary counters since we track them in memory anyway.
|
|
|
|
* sb_icount, sb_ifree, sb_fdblocks, sb_frexents
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (sb->sb_uquotino != cpu_to_be64(mp->m_sb.sb_uquotino))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_preen(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_gquotino != cpu_to_be64(mp->m_sb.sb_gquotino))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_preen(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Skip the quota flags since repair will force quotacheck.
|
|
|
|
* sb_qflags
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (sb->sb_flags != mp->m_sb.sb_flags)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_shared_vn != mp->m_sb.sb_shared_vn)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_inoalignmt != cpu_to_be32(mp->m_sb.sb_inoalignmt))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_unit != cpu_to_be32(mp->m_sb.sb_unit))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_preen(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_width != cpu_to_be32(mp->m_sb.sb_width))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_preen(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_dirblklog != mp->m_sb.sb_dirblklog)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_logsectlog != mp->m_sb.sb_logsectlog)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_logsectsize != cpu_to_be16(mp->m_sb.sb_logsectsize))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_logsunit != cpu_to_be32(mp->m_sb.sb_logsunit))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
/* Do we see any invalid bits in sb_features2? */
|
|
|
|
if (!xfs_sb_version_hasmorebits(&mp->m_sb)) {
|
|
|
|
if (sb->sb_features2 != 0)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
} else {
|
|
|
|
v2_ok = XFS_SB_VERSION2_OKBITS;
|
|
|
|
if (XFS_SB_VERSION_NUM(&mp->m_sb) >= XFS_SB_VERSION_5)
|
|
|
|
v2_ok |= XFS_SB_VERSION2_CRCBIT;
|
|
|
|
|
|
|
|
if (!!(sb->sb_features2 & cpu_to_be32(~v2_ok)))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_features2 != sb->sb_bad_features2)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_preen(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Check sb_features2 flags that are set at mkfs time. */
|
|
|
|
features_mask = cpu_to_be32(XFS_SB_VERSION2_LAZYSBCOUNTBIT |
|
|
|
|
XFS_SB_VERSION2_PROJID32BIT |
|
|
|
|
XFS_SB_VERSION2_CRCBIT |
|
|
|
|
XFS_SB_VERSION2_FTYPE);
|
|
|
|
if ((sb->sb_features2 & features_mask) !=
|
|
|
|
(cpu_to_be32(mp->m_sb.sb_features2) & features_mask))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
/* Check sb_features2 flags that can be set after mkfs time. */
|
|
|
|
features_mask = cpu_to_be32(XFS_SB_VERSION2_ATTR2BIT);
|
|
|
|
if ((sb->sb_features2 & features_mask) !=
|
|
|
|
(cpu_to_be32(mp->m_sb.sb_features2) & features_mask))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (!xfs_sb_version_hascrc(&mp->m_sb)) {
|
|
|
|
/* all v5 fields must be zero */
|
|
|
|
if (memchr_inv(&sb->sb_features_compat, 0,
|
|
|
|
sizeof(struct xfs_dsb) -
|
|
|
|
offsetof(struct xfs_dsb, sb_features_compat)))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
} else {
|
|
|
|
/* Check compat flags; all are set at mkfs time. */
|
|
|
|
features_mask = cpu_to_be32(XFS_SB_FEAT_COMPAT_UNKNOWN);
|
|
|
|
if ((sb->sb_features_compat & features_mask) !=
|
|
|
|
(cpu_to_be32(mp->m_sb.sb_features_compat) & features_mask))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
/* Check ro compat flags; all are set at mkfs time. */
|
|
|
|
features_mask = cpu_to_be32(XFS_SB_FEAT_RO_COMPAT_UNKNOWN |
|
|
|
|
XFS_SB_FEAT_RO_COMPAT_FINOBT |
|
|
|
|
XFS_SB_FEAT_RO_COMPAT_RMAPBT |
|
|
|
|
XFS_SB_FEAT_RO_COMPAT_REFLINK);
|
|
|
|
if ((sb->sb_features_ro_compat & features_mask) !=
|
|
|
|
(cpu_to_be32(mp->m_sb.sb_features_ro_compat) &
|
|
|
|
features_mask))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
/* Check incompat flags; all are set at mkfs time. */
|
|
|
|
features_mask = cpu_to_be32(XFS_SB_FEAT_INCOMPAT_UNKNOWN |
|
|
|
|
XFS_SB_FEAT_INCOMPAT_FTYPE |
|
|
|
|
XFS_SB_FEAT_INCOMPAT_SPINODES |
|
|
|
|
XFS_SB_FEAT_INCOMPAT_META_UUID);
|
|
|
|
if ((sb->sb_features_incompat & features_mask) !=
|
|
|
|
(cpu_to_be32(mp->m_sb.sb_features_incompat) &
|
|
|
|
features_mask))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
/* Check log incompat flags; all are set at mkfs time. */
|
|
|
|
features_mask = cpu_to_be32(XFS_SB_FEAT_INCOMPAT_LOG_UNKNOWN);
|
|
|
|
if ((sb->sb_features_log_incompat & features_mask) !=
|
|
|
|
(cpu_to_be32(mp->m_sb.sb_features_log_incompat) &
|
|
|
|
features_mask))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
/* Don't care about sb_crc */
|
|
|
|
|
|
|
|
if (sb->sb_spino_align != cpu_to_be32(mp->m_sb.sb_spino_align))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
if (sb->sb_pquotino != cpu_to_be64(mp->m_sb.sb_pquotino))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_preen(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
|
|
|
/* Don't care about sb_lsn */
|
|
|
|
}
|
|
|
|
|
|
|
|
if (xfs_sb_version_hasmetauuid(&mp->m_sb)) {
|
|
|
|
/* The metadata UUID must be the same for all supers */
|
|
|
|
if (!uuid_equal(&sb->sb_meta_uuid, &mp->m_sb.sb_meta_uuid))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Everything else must be zero. */
|
|
|
|
if (memchr_inv(sb + 1, 0,
|
|
|
|
BBTOB(bp->b_length) - sizeof(struct xfs_dsb)))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, bp);
|
2017-10-18 12:37:38 +08:00
|
|
|
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_superblock_xref(sc, bp);
|
2018-01-17 10:53:05 +08:00
|
|
|
|
2017-10-18 12:37:38 +08:00
|
|
|
return error;
|
|
|
|
}
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
/* AGF */
|
|
|
|
|
2018-01-17 10:53:06 +08:00
|
|
|
/* Tally freespace record lengths. */
|
|
|
|
STATIC int
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agf_record_bno_lengths(
|
2018-01-17 10:53:06 +08:00
|
|
|
struct xfs_btree_cur *cur,
|
|
|
|
struct xfs_alloc_rec_incore *rec,
|
|
|
|
void *priv)
|
|
|
|
{
|
|
|
|
xfs_extlen_t *blocks = priv;
|
|
|
|
|
|
|
|
(*blocks) += rec->ar_blockcount;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check agf_freeblks */
|
|
|
|
static inline void
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agf_xref_freeblks(
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_scrub *sc)
|
2018-01-17 10:53:06 +08:00
|
|
|
{
|
2020-03-10 23:57:29 +08:00
|
|
|
struct xfs_agf *agf = sc->sa.agf_bp->b_addr;
|
2018-07-20 03:29:12 +08:00
|
|
|
xfs_extlen_t blocks = 0;
|
|
|
|
int error;
|
2018-01-17 10:53:06 +08:00
|
|
|
|
|
|
|
if (!sc->sa.bno_cur)
|
|
|
|
return;
|
|
|
|
|
|
|
|
error = xfs_alloc_query_all(sc->sa.bno_cur,
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agf_record_bno_lengths, &blocks);
|
|
|
|
if (!xchk_should_check_xref(sc, &error, &sc->sa.bno_cur))
|
2018-01-17 10:53:06 +08:00
|
|
|
return;
|
|
|
|
if (blocks != be32_to_cpu(agf->agf_freeblks))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_xref_set_corrupt(sc, sc->sa.agf_bp);
|
2018-01-17 10:53:06 +08:00
|
|
|
}
|
|
|
|
|
2018-01-17 10:53:07 +08:00
|
|
|
/* Cross reference the AGF with the cntbt (freespace by length btree) */
|
|
|
|
static inline void
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agf_xref_cntbt(
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_scrub *sc)
|
2018-01-17 10:53:07 +08:00
|
|
|
{
|
2020-03-10 23:57:29 +08:00
|
|
|
struct xfs_agf *agf = sc->sa.agf_bp->b_addr;
|
2018-07-20 03:29:12 +08:00
|
|
|
xfs_agblock_t agbno;
|
|
|
|
xfs_extlen_t blocks;
|
|
|
|
int have;
|
|
|
|
int error;
|
2018-01-17 10:53:07 +08:00
|
|
|
|
|
|
|
if (!sc->sa.cnt_cur)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* Any freespace at all? */
|
|
|
|
error = xfs_alloc_lookup_le(sc->sa.cnt_cur, 0, -1U, &have);
|
2018-07-20 03:29:11 +08:00
|
|
|
if (!xchk_should_check_xref(sc, &error, &sc->sa.cnt_cur))
|
2018-01-17 10:53:07 +08:00
|
|
|
return;
|
|
|
|
if (!have) {
|
2019-02-26 01:36:36 +08:00
|
|
|
if (agf->agf_freeblks != cpu_to_be32(0))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_xref_set_corrupt(sc, sc->sa.agf_bp);
|
2018-01-17 10:53:07 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Check agf_longest */
|
|
|
|
error = xfs_alloc_get_rec(sc->sa.cnt_cur, &agbno, &blocks, &have);
|
2018-07-20 03:29:11 +08:00
|
|
|
if (!xchk_should_check_xref(sc, &error, &sc->sa.cnt_cur))
|
2018-01-17 10:53:07 +08:00
|
|
|
return;
|
|
|
|
if (!have || blocks != be32_to_cpu(agf->agf_longest))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_xref_set_corrupt(sc, sc->sa.agf_bp);
|
2018-01-17 10:53:07 +08:00
|
|
|
}
|
|
|
|
|
2018-01-17 10:53:08 +08:00
|
|
|
/* Check the btree block counts in the AGF against the btrees. */
|
|
|
|
STATIC void
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agf_xref_btreeblks(
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_scrub *sc)
|
2018-01-17 10:53:08 +08:00
|
|
|
{
|
2020-03-10 23:57:29 +08:00
|
|
|
struct xfs_agf *agf = sc->sa.agf_bp->b_addr;
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_mount *mp = sc->mp;
|
|
|
|
xfs_agblock_t blocks;
|
|
|
|
xfs_agblock_t btreeblks;
|
|
|
|
int error;
|
2018-01-17 10:53:08 +08:00
|
|
|
|
2021-04-24 07:02:01 +08:00
|
|
|
/* agf_btreeblks didn't exist before lazysbcount */
|
|
|
|
if (!xfs_sb_version_haslazysbcount(&sc->mp->m_sb))
|
|
|
|
return;
|
|
|
|
|
2018-01-17 10:53:08 +08:00
|
|
|
/* Check agf_rmap_blocks; set up for agf_btreeblks check */
|
|
|
|
if (sc->sa.rmap_cur) {
|
|
|
|
error = xfs_btree_count_blocks(sc->sa.rmap_cur, &blocks);
|
2018-07-20 03:29:11 +08:00
|
|
|
if (!xchk_should_check_xref(sc, &error, &sc->sa.rmap_cur))
|
2018-01-17 10:53:08 +08:00
|
|
|
return;
|
|
|
|
btreeblks = blocks - 1;
|
|
|
|
if (blocks != be32_to_cpu(agf->agf_rmap_blocks))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_xref_set_corrupt(sc, sc->sa.agf_bp);
|
2018-01-17 10:53:08 +08:00
|
|
|
} else {
|
|
|
|
btreeblks = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* No rmap cursor; we can't xref if we have the rmapbt feature.
|
|
|
|
* We also can't do it if we're missing the free space btree cursors.
|
|
|
|
*/
|
|
|
|
if ((xfs_sb_version_hasrmapbt(&mp->m_sb) && !sc->sa.rmap_cur) ||
|
|
|
|
!sc->sa.bno_cur || !sc->sa.cnt_cur)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* Check agf_btreeblks */
|
|
|
|
error = xfs_btree_count_blocks(sc->sa.bno_cur, &blocks);
|
2018-07-20 03:29:11 +08:00
|
|
|
if (!xchk_should_check_xref(sc, &error, &sc->sa.bno_cur))
|
2018-01-17 10:53:08 +08:00
|
|
|
return;
|
|
|
|
btreeblks += blocks - 1;
|
|
|
|
|
|
|
|
error = xfs_btree_count_blocks(sc->sa.cnt_cur, &blocks);
|
2018-07-20 03:29:11 +08:00
|
|
|
if (!xchk_should_check_xref(sc, &error, &sc->sa.cnt_cur))
|
2018-01-17 10:53:08 +08:00
|
|
|
return;
|
|
|
|
btreeblks += blocks - 1;
|
|
|
|
|
|
|
|
if (btreeblks != be32_to_cpu(agf->agf_btreeblks))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_xref_set_corrupt(sc, sc->sa.agf_bp);
|
2018-01-17 10:53:08 +08:00
|
|
|
}
|
|
|
|
|
2018-01-17 10:53:09 +08:00
|
|
|
/* Check agf_refcount_blocks against tree size */
|
|
|
|
static inline void
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agf_xref_refcblks(
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_scrub *sc)
|
2018-01-17 10:53:09 +08:00
|
|
|
{
|
2020-03-10 23:57:29 +08:00
|
|
|
struct xfs_agf *agf = sc->sa.agf_bp->b_addr;
|
2018-07-20 03:29:12 +08:00
|
|
|
xfs_agblock_t blocks;
|
|
|
|
int error;
|
2018-01-17 10:53:09 +08:00
|
|
|
|
|
|
|
if (!sc->sa.refc_cur)
|
|
|
|
return;
|
|
|
|
|
|
|
|
error = xfs_btree_count_blocks(sc->sa.refc_cur, &blocks);
|
2018-07-20 03:29:11 +08:00
|
|
|
if (!xchk_should_check_xref(sc, &error, &sc->sa.refc_cur))
|
2018-01-17 10:53:09 +08:00
|
|
|
return;
|
|
|
|
if (blocks != be32_to_cpu(agf->agf_refcount_blocks))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_xref_set_corrupt(sc, sc->sa.agf_bp);
|
2018-01-17 10:53:09 +08:00
|
|
|
}
|
|
|
|
|
2018-01-17 10:53:05 +08:00
|
|
|
/* Cross-reference with the other btrees. */
|
|
|
|
STATIC void
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agf_xref(
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_scrub *sc)
|
2018-01-17 10:53:05 +08:00
|
|
|
{
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_mount *mp = sc->mp;
|
|
|
|
xfs_agblock_t agbno;
|
2018-01-17 10:53:06 +08:00
|
|
|
|
2018-01-17 10:53:05 +08:00
|
|
|
if (sc->sm->sm_flags & XFS_SCRUB_OFLAG_CORRUPT)
|
|
|
|
return;
|
2018-01-17 10:53:06 +08:00
|
|
|
|
|
|
|
agbno = XFS_AGF_BLOCK(mp);
|
|
|
|
|
2021-03-23 00:51:53 +08:00
|
|
|
xchk_ag_btcur_init(sc, &sc->sa);
|
2018-01-17 10:53:06 +08:00
|
|
|
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_xref_is_used_space(sc, agbno, 1);
|
|
|
|
xchk_agf_xref_freeblks(sc);
|
|
|
|
xchk_agf_xref_cntbt(sc);
|
|
|
|
xchk_xref_is_not_inode_chunk(sc, agbno, 1);
|
2018-12-13 00:46:23 +08:00
|
|
|
xchk_xref_is_owned_by(sc, agbno, 1, &XFS_RMAP_OINFO_FS);
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agf_xref_btreeblks(sc);
|
|
|
|
xchk_xref_is_not_shared(sc, agbno, 1);
|
|
|
|
xchk_agf_xref_refcblks(sc);
|
2018-01-17 10:53:06 +08:00
|
|
|
|
|
|
|
/* scrub teardown will take care of sc->sa for us */
|
2018-01-17 10:53:05 +08:00
|
|
|
}
|
|
|
|
|
2017-10-18 12:37:39 +08:00
|
|
|
/* Scrub the AGF. */
|
|
|
|
int
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agf(
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_scrub *sc)
|
2017-10-18 12:37:39 +08:00
|
|
|
{
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_mount *mp = sc->mp;
|
|
|
|
struct xfs_agf *agf;
|
2019-04-26 09:26:23 +08:00
|
|
|
struct xfs_perag *pag;
|
2021-03-23 00:51:53 +08:00
|
|
|
xfs_agnumber_t agno = sc->sm->sm_agno;
|
2018-07-20 03:29:12 +08:00
|
|
|
xfs_agblock_t agbno;
|
|
|
|
xfs_agblock_t eoag;
|
|
|
|
xfs_agblock_t agfl_first;
|
|
|
|
xfs_agblock_t agfl_last;
|
|
|
|
xfs_agblock_t agfl_count;
|
|
|
|
xfs_agblock_t fl_count;
|
|
|
|
int level;
|
|
|
|
int error = 0;
|
2017-10-18 12:37:39 +08:00
|
|
|
|
2021-03-23 00:51:53 +08:00
|
|
|
error = xchk_ag_read_headers(sc, agno, &sc->sa);
|
2018-07-20 03:29:11 +08:00
|
|
|
if (!xchk_process_error(sc, agno, XFS_AGF_BLOCK(sc->mp), &error))
|
2017-10-18 12:37:39 +08:00
|
|
|
goto out;
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_buffer_recheck(sc, sc->sa.agf_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
2020-03-10 23:57:29 +08:00
|
|
|
agf = sc->sa.agf_bp->b_addr;
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
/* Check the AG length */
|
|
|
|
eoag = be32_to_cpu(agf->agf_length);
|
|
|
|
if (eoag != xfs_ag_block_count(mp, agno))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agf_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
/* Check the AGF btree roots and levels */
|
|
|
|
agbno = be32_to_cpu(agf->agf_roots[XFS_BTNUM_BNO]);
|
|
|
|
if (!xfs_verify_agbno(mp, agno, agbno))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agf_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
agbno = be32_to_cpu(agf->agf_roots[XFS_BTNUM_CNT]);
|
|
|
|
if (!xfs_verify_agbno(mp, agno, agbno))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agf_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
level = be32_to_cpu(agf->agf_levels[XFS_BTNUM_BNO]);
|
|
|
|
if (level <= 0 || level > XFS_BTREE_MAXLEVELS)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agf_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
level = be32_to_cpu(agf->agf_levels[XFS_BTNUM_CNT]);
|
|
|
|
if (level <= 0 || level > XFS_BTREE_MAXLEVELS)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agf_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
if (xfs_sb_version_hasrmapbt(&mp->m_sb)) {
|
|
|
|
agbno = be32_to_cpu(agf->agf_roots[XFS_BTNUM_RMAP]);
|
|
|
|
if (!xfs_verify_agbno(mp, agno, agbno))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agf_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
level = be32_to_cpu(agf->agf_levels[XFS_BTNUM_RMAP]);
|
|
|
|
if (level <= 0 || level > XFS_BTREE_MAXLEVELS)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agf_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (xfs_sb_version_hasreflink(&mp->m_sb)) {
|
|
|
|
agbno = be32_to_cpu(agf->agf_refcount_root);
|
|
|
|
if (!xfs_verify_agbno(mp, agno, agbno))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agf_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
level = be32_to_cpu(agf->agf_refcount_level);
|
|
|
|
if (level <= 0 || level > XFS_BTREE_MAXLEVELS)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agf_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Check the AGFL counters */
|
|
|
|
agfl_first = be32_to_cpu(agf->agf_flfirst);
|
|
|
|
agfl_last = be32_to_cpu(agf->agf_fllast);
|
|
|
|
agfl_count = be32_to_cpu(agf->agf_flcount);
|
|
|
|
if (agfl_last > agfl_first)
|
|
|
|
fl_count = agfl_last - agfl_first + 1;
|
|
|
|
else
|
2018-03-07 09:08:32 +08:00
|
|
|
fl_count = xfs_agfl_size(mp) - agfl_first + agfl_last + 1;
|
2017-10-18 12:37:39 +08:00
|
|
|
if (agfl_count != 0 && fl_count != agfl_count)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agf_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
2019-04-26 09:26:23 +08:00
|
|
|
/* Do the incore counters match? */
|
|
|
|
pag = xfs_perag_get(mp, agno);
|
|
|
|
if (pag->pagf_freeblks != be32_to_cpu(agf->agf_freeblks))
|
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agf_bp);
|
|
|
|
if (pag->pagf_flcount != be32_to_cpu(agf->agf_flcount))
|
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agf_bp);
|
2021-04-24 07:02:01 +08:00
|
|
|
if (xfs_sb_version_haslazysbcount(&sc->mp->m_sb) &&
|
|
|
|
pag->pagf_btreeblks != be32_to_cpu(agf->agf_btreeblks))
|
2019-04-26 09:26:23 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agf_bp);
|
|
|
|
xfs_perag_put(pag);
|
|
|
|
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agf_xref(sc);
|
2017-10-18 12:37:39 +08:00
|
|
|
out:
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* AGFL */
|
|
|
|
|
2018-07-20 03:29:11 +08:00
|
|
|
struct xchk_agfl_info {
|
2018-07-20 03:29:12 +08:00
|
|
|
unsigned int sz_entries;
|
|
|
|
unsigned int nr_entries;
|
|
|
|
xfs_agblock_t *entries;
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_scrub *sc;
|
2017-11-03 06:58:36 +08:00
|
|
|
};
|
|
|
|
|
2018-01-17 10:53:05 +08:00
|
|
|
/* Cross-reference with the other btrees. */
|
|
|
|
STATIC void
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agfl_block_xref(
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_scrub *sc,
|
2018-12-13 00:46:23 +08:00
|
|
|
xfs_agblock_t agbno)
|
2018-01-17 10:53:05 +08:00
|
|
|
{
|
|
|
|
if (sc->sm->sm_flags & XFS_SCRUB_OFLAG_CORRUPT)
|
|
|
|
return;
|
2018-01-17 10:53:06 +08:00
|
|
|
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_xref_is_used_space(sc, agbno, 1);
|
|
|
|
xchk_xref_is_not_inode_chunk(sc, agbno, 1);
|
2018-12-13 00:46:23 +08:00
|
|
|
xchk_xref_is_owned_by(sc, agbno, 1, &XFS_RMAP_OINFO_AG);
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_xref_is_not_shared(sc, agbno, 1);
|
2018-01-17 10:53:05 +08:00
|
|
|
}
|
|
|
|
|
2017-10-18 12:37:39 +08:00
|
|
|
/* Scrub an AGFL block. */
|
|
|
|
STATIC int
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agfl_block(
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_mount *mp,
|
|
|
|
xfs_agblock_t agbno,
|
|
|
|
void *priv)
|
2017-10-18 12:37:39 +08:00
|
|
|
{
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xchk_agfl_info *sai = priv;
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_scrub *sc = sai->sc;
|
2018-07-20 03:29:12 +08:00
|
|
|
xfs_agnumber_t agno = sc->sa.agno;
|
2017-10-18 12:37:39 +08:00
|
|
|
|
2017-11-03 06:58:36 +08:00
|
|
|
if (xfs_verify_agbno(mp, agno, agbno) &&
|
|
|
|
sai->nr_entries < sai->sz_entries)
|
|
|
|
sai->entries[sai->nr_entries++] = agbno;
|
|
|
|
else
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agfl_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
2018-12-13 00:46:23 +08:00
|
|
|
xchk_agfl_block_xref(sc, agbno);
|
2018-01-17 10:53:05 +08:00
|
|
|
|
2018-05-14 21:34:34 +08:00
|
|
|
if (sc->sm->sm_flags & XFS_SCRUB_OFLAG_CORRUPT)
|
2019-08-29 05:37:57 +08:00
|
|
|
return -ECANCELED;
|
2018-05-14 21:34:34 +08:00
|
|
|
|
2017-10-18 12:37:39 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-11-03 06:58:36 +08:00
|
|
|
static int
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agblock_cmp(
|
2017-11-03 06:58:36 +08:00
|
|
|
const void *pa,
|
|
|
|
const void *pb)
|
|
|
|
{
|
|
|
|
const xfs_agblock_t *a = pa;
|
|
|
|
const xfs_agblock_t *b = pb;
|
|
|
|
|
|
|
|
return (int)*a - (int)*b;
|
|
|
|
}
|
|
|
|
|
2018-01-17 10:53:05 +08:00
|
|
|
/* Cross-reference with the other btrees. */
|
|
|
|
STATIC void
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agfl_xref(
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_scrub *sc)
|
2018-01-17 10:53:05 +08:00
|
|
|
{
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_mount *mp = sc->mp;
|
|
|
|
xfs_agblock_t agbno;
|
2018-01-17 10:53:06 +08:00
|
|
|
|
2018-01-17 10:53:05 +08:00
|
|
|
if (sc->sm->sm_flags & XFS_SCRUB_OFLAG_CORRUPT)
|
|
|
|
return;
|
2018-01-17 10:53:06 +08:00
|
|
|
|
|
|
|
agbno = XFS_AGFL_BLOCK(mp);
|
|
|
|
|
2021-03-23 00:51:53 +08:00
|
|
|
xchk_ag_btcur_init(sc, &sc->sa);
|
2018-01-17 10:53:06 +08:00
|
|
|
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_xref_is_used_space(sc, agbno, 1);
|
|
|
|
xchk_xref_is_not_inode_chunk(sc, agbno, 1);
|
2018-12-13 00:46:23 +08:00
|
|
|
xchk_xref_is_owned_by(sc, agbno, 1, &XFS_RMAP_OINFO_FS);
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_xref_is_not_shared(sc, agbno, 1);
|
2018-01-17 10:53:06 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Scrub teardown will take care of sc->sa for us. Leave sc->sa
|
|
|
|
* active so that the agfl block xref can use it too.
|
|
|
|
*/
|
2018-01-17 10:53:05 +08:00
|
|
|
}
|
|
|
|
|
2017-10-18 12:37:39 +08:00
|
|
|
/* Scrub the AGFL. */
|
|
|
|
int
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agfl(
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_scrub *sc)
|
2017-10-18 12:37:39 +08:00
|
|
|
{
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xchk_agfl_info sai;
|
|
|
|
struct xfs_agf *agf;
|
2021-03-23 00:51:53 +08:00
|
|
|
xfs_agnumber_t agno = sc->sm->sm_agno;
|
2018-07-20 03:29:12 +08:00
|
|
|
unsigned int agflcount;
|
|
|
|
unsigned int i;
|
|
|
|
int error;
|
2017-10-18 12:37:39 +08:00
|
|
|
|
2021-03-23 00:51:53 +08:00
|
|
|
error = xchk_ag_read_headers(sc, agno, &sc->sa);
|
2018-07-20 03:29:11 +08:00
|
|
|
if (!xchk_process_error(sc, agno, XFS_AGFL_BLOCK(sc->mp), &error))
|
2017-10-18 12:37:39 +08:00
|
|
|
goto out;
|
|
|
|
if (!sc->sa.agf_bp)
|
|
|
|
return -EFSCORRUPTED;
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_buffer_recheck(sc, sc->sa.agfl_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agfl_xref(sc);
|
2018-01-17 10:53:05 +08:00
|
|
|
|
|
|
|
if (sc->sm->sm_flags & XFS_SCRUB_OFLAG_CORRUPT)
|
|
|
|
goto out;
|
|
|
|
|
2017-11-03 06:58:36 +08:00
|
|
|
/* Allocate buffer to ensure uniqueness of AGFL entries. */
|
2020-03-10 23:57:29 +08:00
|
|
|
agf = sc->sa.agf_bp->b_addr;
|
2017-11-03 06:58:36 +08:00
|
|
|
agflcount = be32_to_cpu(agf->agf_flcount);
|
2018-03-07 09:08:32 +08:00
|
|
|
if (agflcount > xfs_agfl_size(sc->mp)) {
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agf_bp);
|
2017-11-03 06:58:36 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2018-02-23 06:41:25 +08:00
|
|
|
memset(&sai, 0, sizeof(sai));
|
2018-05-14 21:34:34 +08:00
|
|
|
sai.sc = sc;
|
2017-11-03 06:58:36 +08:00
|
|
|
sai.sz_entries = agflcount;
|
2018-05-10 01:02:00 +08:00
|
|
|
sai.entries = kmem_zalloc(sizeof(xfs_agblock_t) * agflcount,
|
|
|
|
KM_MAYFAIL);
|
2017-11-03 06:58:36 +08:00
|
|
|
if (!sai.entries) {
|
|
|
|
error = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2017-10-18 12:37:39 +08:00
|
|
|
/* Check the blocks in the AGFL. */
|
2020-03-10 23:57:29 +08:00
|
|
|
error = xfs_agfl_walk(sc->mp, sc->sa.agf_bp->b_addr,
|
2018-07-20 03:29:11 +08:00
|
|
|
sc->sa.agfl_bp, xchk_agfl_block, &sai);
|
2019-08-29 05:37:57 +08:00
|
|
|
if (error == -ECANCELED) {
|
2018-05-14 21:34:34 +08:00
|
|
|
error = 0;
|
|
|
|
goto out_free;
|
|
|
|
}
|
2017-11-03 06:58:36 +08:00
|
|
|
if (error)
|
|
|
|
goto out_free;
|
|
|
|
|
|
|
|
if (agflcount != sai.nr_entries) {
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agf_bp);
|
2017-11-03 06:58:36 +08:00
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Sort entries, check for duplicates. */
|
|
|
|
sort(sai.entries, sai.nr_entries, sizeof(sai.entries[0]),
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agblock_cmp, NULL);
|
2017-11-03 06:58:36 +08:00
|
|
|
for (i = 1; i < sai.nr_entries; i++) {
|
|
|
|
if (sai.entries[i] == sai.entries[i - 1]) {
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agf_bp);
|
2017-11-03 06:58:36 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
out_free:
|
|
|
|
kmem_free(sai.entries);
|
2017-10-18 12:37:39 +08:00
|
|
|
out:
|
|
|
|
return error;
|
|
|
|
}
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
/* AGI */
|
|
|
|
|
2018-01-17 10:53:07 +08:00
|
|
|
/* Check agi_count/agi_freecount */
|
|
|
|
static inline void
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agi_xref_icounts(
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_scrub *sc)
|
2018-01-17 10:53:07 +08:00
|
|
|
{
|
2020-03-10 23:57:29 +08:00
|
|
|
struct xfs_agi *agi = sc->sa.agi_bp->b_addr;
|
2018-07-20 03:29:12 +08:00
|
|
|
xfs_agino_t icount;
|
|
|
|
xfs_agino_t freecount;
|
|
|
|
int error;
|
2018-01-17 10:53:07 +08:00
|
|
|
|
|
|
|
if (!sc->sa.ino_cur)
|
|
|
|
return;
|
|
|
|
|
|
|
|
error = xfs_ialloc_count_inodes(sc->sa.ino_cur, &icount, &freecount);
|
2018-07-20 03:29:11 +08:00
|
|
|
if (!xchk_should_check_xref(sc, &error, &sc->sa.ino_cur))
|
2018-01-17 10:53:07 +08:00
|
|
|
return;
|
|
|
|
if (be32_to_cpu(agi->agi_count) != icount ||
|
|
|
|
be32_to_cpu(agi->agi_freecount) != freecount)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_xref_set_corrupt(sc, sc->sa.agi_bp);
|
2018-01-17 10:53:07 +08:00
|
|
|
}
|
|
|
|
|
2020-08-27 01:48:50 +08:00
|
|
|
/* Check agi_[fi]blocks against tree size */
|
|
|
|
static inline void
|
|
|
|
xchk_agi_xref_fiblocks(
|
|
|
|
struct xfs_scrub *sc)
|
|
|
|
{
|
|
|
|
struct xfs_agi *agi = sc->sa.agi_bp->b_addr;
|
|
|
|
xfs_agblock_t blocks;
|
|
|
|
int error = 0;
|
|
|
|
|
|
|
|
if (!xfs_sb_version_hasinobtcounts(&sc->mp->m_sb))
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (sc->sa.ino_cur) {
|
|
|
|
error = xfs_btree_count_blocks(sc->sa.ino_cur, &blocks);
|
|
|
|
if (!xchk_should_check_xref(sc, &error, &sc->sa.ino_cur))
|
|
|
|
return;
|
|
|
|
if (blocks != be32_to_cpu(agi->agi_iblocks))
|
|
|
|
xchk_block_xref_set_corrupt(sc, sc->sa.agi_bp);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sc->sa.fino_cur) {
|
|
|
|
error = xfs_btree_count_blocks(sc->sa.fino_cur, &blocks);
|
|
|
|
if (!xchk_should_check_xref(sc, &error, &sc->sa.fino_cur))
|
|
|
|
return;
|
|
|
|
if (blocks != be32_to_cpu(agi->agi_fblocks))
|
|
|
|
xchk_block_xref_set_corrupt(sc, sc->sa.agi_bp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-17 10:53:05 +08:00
|
|
|
/* Cross-reference with the other btrees. */
|
|
|
|
STATIC void
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agi_xref(
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_scrub *sc)
|
2018-01-17 10:53:05 +08:00
|
|
|
{
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_mount *mp = sc->mp;
|
|
|
|
xfs_agblock_t agbno;
|
2018-01-17 10:53:06 +08:00
|
|
|
|
2018-01-17 10:53:05 +08:00
|
|
|
if (sc->sm->sm_flags & XFS_SCRUB_OFLAG_CORRUPT)
|
|
|
|
return;
|
2018-01-17 10:53:06 +08:00
|
|
|
|
|
|
|
agbno = XFS_AGI_BLOCK(mp);
|
|
|
|
|
2021-03-23 00:51:53 +08:00
|
|
|
xchk_ag_btcur_init(sc, &sc->sa);
|
2018-01-17 10:53:06 +08:00
|
|
|
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_xref_is_used_space(sc, agbno, 1);
|
|
|
|
xchk_xref_is_not_inode_chunk(sc, agbno, 1);
|
|
|
|
xchk_agi_xref_icounts(sc);
|
2018-12-13 00:46:23 +08:00
|
|
|
xchk_xref_is_owned_by(sc, agbno, 1, &XFS_RMAP_OINFO_FS);
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_xref_is_not_shared(sc, agbno, 1);
|
2020-08-27 01:48:50 +08:00
|
|
|
xchk_agi_xref_fiblocks(sc);
|
2018-01-17 10:53:06 +08:00
|
|
|
|
|
|
|
/* scrub teardown will take care of sc->sa for us */
|
2018-01-17 10:53:05 +08:00
|
|
|
}
|
|
|
|
|
2017-10-18 12:37:39 +08:00
|
|
|
/* Scrub the AGI. */
|
|
|
|
int
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agi(
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_scrub *sc)
|
2017-10-18 12:37:39 +08:00
|
|
|
{
|
2018-07-20 03:29:12 +08:00
|
|
|
struct xfs_mount *mp = sc->mp;
|
|
|
|
struct xfs_agi *agi;
|
2019-04-26 09:26:23 +08:00
|
|
|
struct xfs_perag *pag;
|
2021-03-23 00:51:53 +08:00
|
|
|
xfs_agnumber_t agno = sc->sm->sm_agno;
|
2018-07-20 03:29:12 +08:00
|
|
|
xfs_agblock_t agbno;
|
|
|
|
xfs_agblock_t eoag;
|
|
|
|
xfs_agino_t agino;
|
|
|
|
xfs_agino_t first_agino;
|
|
|
|
xfs_agino_t last_agino;
|
|
|
|
xfs_agino_t icount;
|
|
|
|
int i;
|
|
|
|
int level;
|
|
|
|
int error = 0;
|
2017-10-18 12:37:39 +08:00
|
|
|
|
2021-03-23 00:51:53 +08:00
|
|
|
error = xchk_ag_read_headers(sc, agno, &sc->sa);
|
2018-07-20 03:29:11 +08:00
|
|
|
if (!xchk_process_error(sc, agno, XFS_AGI_BLOCK(sc->mp), &error))
|
2017-10-18 12:37:39 +08:00
|
|
|
goto out;
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_buffer_recheck(sc, sc->sa.agi_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
2020-03-10 23:57:29 +08:00
|
|
|
agi = sc->sa.agi_bp->b_addr;
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
/* Check the AG length */
|
|
|
|
eoag = be32_to_cpu(agi->agi_length);
|
|
|
|
if (eoag != xfs_ag_block_count(mp, agno))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agi_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
/* Check btree roots and levels */
|
|
|
|
agbno = be32_to_cpu(agi->agi_root);
|
|
|
|
if (!xfs_verify_agbno(mp, agno, agbno))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agi_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
level = be32_to_cpu(agi->agi_level);
|
|
|
|
if (level <= 0 || level > XFS_BTREE_MAXLEVELS)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agi_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
if (xfs_sb_version_hasfinobt(&mp->m_sb)) {
|
|
|
|
agbno = be32_to_cpu(agi->agi_free_root);
|
|
|
|
if (!xfs_verify_agbno(mp, agno, agbno))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agi_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
level = be32_to_cpu(agi->agi_free_level);
|
|
|
|
if (level <= 0 || level > XFS_BTREE_MAXLEVELS)
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agi_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Check inode counters */
|
2018-06-07 22:53:33 +08:00
|
|
|
xfs_agino_range(mp, agno, &first_agino, &last_agino);
|
2017-10-18 12:37:39 +08:00
|
|
|
icount = be32_to_cpu(agi->agi_count);
|
|
|
|
if (icount > last_agino - first_agino + 1 ||
|
|
|
|
icount < be32_to_cpu(agi->agi_freecount))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agi_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
/* Check inode pointers */
|
|
|
|
agino = be32_to_cpu(agi->agi_newino);
|
2019-02-08 02:37:13 +08:00
|
|
|
if (!xfs_verify_agino_or_null(mp, agno, agino))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agi_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
agino = be32_to_cpu(agi->agi_dirino);
|
2019-02-08 02:37:13 +08:00
|
|
|
if (!xfs_verify_agino_or_null(mp, agno, agino))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agi_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
|
|
|
/* Check unlinked inode buckets */
|
|
|
|
for (i = 0; i < XFS_AGI_UNLINKED_BUCKETS; i++) {
|
|
|
|
agino = be32_to_cpu(agi->agi_unlinked[i]);
|
2019-02-08 02:37:13 +08:00
|
|
|
if (!xfs_verify_agino_or_null(mp, agno, agino))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agi_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (agi->agi_pad32 != cpu_to_be32(0))
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agi_bp);
|
2017-10-18 12:37:39 +08:00
|
|
|
|
2019-04-26 09:26:23 +08:00
|
|
|
/* Do the incore counters match? */
|
|
|
|
pag = xfs_perag_get(mp, agno);
|
|
|
|
if (pag->pagi_count != be32_to_cpu(agi->agi_count))
|
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agi_bp);
|
|
|
|
if (pag->pagi_freecount != be32_to_cpu(agi->agi_freecount))
|
|
|
|
xchk_block_set_corrupt(sc, sc->sa.agi_bp);
|
|
|
|
xfs_perag_put(pag);
|
|
|
|
|
2018-07-20 03:29:11 +08:00
|
|
|
xchk_agi_xref(sc);
|
2017-10-18 12:37:39 +08:00
|
|
|
out:
|
|
|
|
return error;
|
|
|
|
}
|