xref: /openbmc/linux/fs/xfs/scrub/common.c (revision dd1431e5)
1 // SPDX-License-Identifier: GPL-2.0+
2 /*
3  * Copyright (C) 2017 Oracle.  All Rights Reserved.
4  * Author: Darrick J. Wong <darrick.wong@oracle.com>
5  */
6 #include "xfs.h"
7 #include "xfs_fs.h"
8 #include "xfs_shared.h"
9 #include "xfs_format.h"
10 #include "xfs_trans_resv.h"
11 #include "xfs_mount.h"
12 #include "xfs_btree.h"
13 #include "xfs_log_format.h"
14 #include "xfs_trans.h"
15 #include "xfs_sb.h"
16 #include "xfs_inode.h"
17 #include "xfs_icache.h"
18 #include "xfs_alloc.h"
19 #include "xfs_alloc_btree.h"
20 #include "xfs_ialloc.h"
21 #include "xfs_ialloc_btree.h"
22 #include "xfs_refcount_btree.h"
23 #include "xfs_rmap.h"
24 #include "xfs_rmap_btree.h"
25 #include "xfs_log.h"
26 #include "xfs_trans_priv.h"
27 #include "xfs_attr.h"
28 #include "xfs_reflink.h"
29 #include "scrub/scrub.h"
30 #include "scrub/common.h"
31 #include "scrub/trace.h"
32 #include "scrub/repair.h"
33 #include "scrub/health.h"
34 
35 /* Common code for the metadata scrubbers. */
36 
37 /*
38  * Handling operational errors.
39  *
40  * The *_process_error() family of functions are used to process error return
41  * codes from functions called as part of a scrub operation.
42  *
43  * If there's no error, we return true to tell the caller that it's ok
44  * to move on to the next check in its list.
45  *
46  * For non-verifier errors (e.g. ENOMEM) we return false to tell the
47  * caller that something bad happened, and we preserve *error so that
48  * the caller can return the *error up the stack to userspace.
49  *
50  * Verifier errors (EFSBADCRC/EFSCORRUPTED) are recorded by setting
51  * OFLAG_CORRUPT in sm_flags and the *error is cleared.  In other words,
52  * we track verifier errors (and failed scrub checks) via OFLAG_CORRUPT,
53  * not via return codes.  We return false to tell the caller that
54  * something bad happened.  Since the error has been cleared, the caller
55  * will (presumably) return that zero and scrubbing will move on to
56  * whatever's next.
57  *
58  * ftrace can be used to record the precise metadata location and the
59  * approximate code location of the failed operation.
60  */
61 
62 /* Check for operational errors. */
63 static bool
64 __xchk_process_error(
65 	struct xfs_scrub	*sc,
66 	xfs_agnumber_t		agno,
67 	xfs_agblock_t		bno,
68 	int			*error,
69 	__u32			errflag,
70 	void			*ret_ip)
71 {
72 	switch (*error) {
73 	case 0:
74 		return true;
75 	case -EDEADLOCK:
76 		/* Used to restart an op with deadlock avoidance. */
77 		trace_xchk_deadlock_retry(sc->ip, sc->sm, *error);
78 		break;
79 	case -EFSBADCRC:
80 	case -EFSCORRUPTED:
81 		/* Note the badness but don't abort. */
82 		sc->sm->sm_flags |= errflag;
83 		*error = 0;
84 		/* fall through */
85 	default:
86 		trace_xchk_op_error(sc, agno, bno, *error,
87 				ret_ip);
88 		break;
89 	}
90 	return false;
91 }
92 
93 bool
94 xchk_process_error(
95 	struct xfs_scrub	*sc,
96 	xfs_agnumber_t		agno,
97 	xfs_agblock_t		bno,
98 	int			*error)
99 {
100 	return __xchk_process_error(sc, agno, bno, error,
101 			XFS_SCRUB_OFLAG_CORRUPT, __return_address);
102 }
103 
104 bool
105 xchk_xref_process_error(
106 	struct xfs_scrub	*sc,
107 	xfs_agnumber_t		agno,
108 	xfs_agblock_t		bno,
109 	int			*error)
110 {
111 	return __xchk_process_error(sc, agno, bno, error,
112 			XFS_SCRUB_OFLAG_XFAIL, __return_address);
113 }
114 
115 /* Check for operational errors for a file offset. */
116 static bool
117 __xchk_fblock_process_error(
118 	struct xfs_scrub	*sc,
119 	int			whichfork,
120 	xfs_fileoff_t		offset,
121 	int			*error,
122 	__u32			errflag,
123 	void			*ret_ip)
124 {
125 	switch (*error) {
126 	case 0:
127 		return true;
128 	case -EDEADLOCK:
129 		/* Used to restart an op with deadlock avoidance. */
130 		trace_xchk_deadlock_retry(sc->ip, sc->sm, *error);
131 		break;
132 	case -EFSBADCRC:
133 	case -EFSCORRUPTED:
134 		/* Note the badness but don't abort. */
135 		sc->sm->sm_flags |= errflag;
136 		*error = 0;
137 		/* fall through */
138 	default:
139 		trace_xchk_file_op_error(sc, whichfork, offset, *error,
140 				ret_ip);
141 		break;
142 	}
143 	return false;
144 }
145 
146 bool
147 xchk_fblock_process_error(
148 	struct xfs_scrub	*sc,
149 	int			whichfork,
150 	xfs_fileoff_t		offset,
151 	int			*error)
152 {
153 	return __xchk_fblock_process_error(sc, whichfork, offset, error,
154 			XFS_SCRUB_OFLAG_CORRUPT, __return_address);
155 }
156 
157 bool
158 xchk_fblock_xref_process_error(
159 	struct xfs_scrub	*sc,
160 	int			whichfork,
161 	xfs_fileoff_t		offset,
162 	int			*error)
163 {
164 	return __xchk_fblock_process_error(sc, whichfork, offset, error,
165 			XFS_SCRUB_OFLAG_XFAIL, __return_address);
166 }
167 
168 /*
169  * Handling scrub corruption/optimization/warning checks.
170  *
171  * The *_set_{corrupt,preen,warning}() family of functions are used to
172  * record the presence of metadata that is incorrect (corrupt), could be
173  * optimized somehow (preen), or should be flagged for administrative
174  * review but is not incorrect (warn).
175  *
176  * ftrace can be used to record the precise metadata location and
177  * approximate code location of the failed check.
178  */
179 
180 /* Record a block which could be optimized. */
181 void
182 xchk_block_set_preen(
183 	struct xfs_scrub	*sc,
184 	struct xfs_buf		*bp)
185 {
186 	sc->sm->sm_flags |= XFS_SCRUB_OFLAG_PREEN;
187 	trace_xchk_block_preen(sc, bp->b_bn, __return_address);
188 }
189 
190 /*
191  * Record an inode which could be optimized.  The trace data will
192  * include the block given by bp if bp is given; otherwise it will use
193  * the block location of the inode record itself.
194  */
195 void
196 xchk_ino_set_preen(
197 	struct xfs_scrub	*sc,
198 	xfs_ino_t		ino)
199 {
200 	sc->sm->sm_flags |= XFS_SCRUB_OFLAG_PREEN;
201 	trace_xchk_ino_preen(sc, ino, __return_address);
202 }
203 
204 /* Record something being wrong with the filesystem primary superblock. */
205 void
206 xchk_set_corrupt(
207 	struct xfs_scrub	*sc)
208 {
209 	sc->sm->sm_flags |= XFS_SCRUB_OFLAG_CORRUPT;
210 	trace_xchk_fs_error(sc, 0, __return_address);
211 }
212 
213 /* Record a corrupt block. */
214 void
215 xchk_block_set_corrupt(
216 	struct xfs_scrub	*sc,
217 	struct xfs_buf		*bp)
218 {
219 	sc->sm->sm_flags |= XFS_SCRUB_OFLAG_CORRUPT;
220 	trace_xchk_block_error(sc, bp->b_bn, __return_address);
221 }
222 
223 /* Record a corruption while cross-referencing. */
224 void
225 xchk_block_xref_set_corrupt(
226 	struct xfs_scrub	*sc,
227 	struct xfs_buf		*bp)
228 {
229 	sc->sm->sm_flags |= XFS_SCRUB_OFLAG_XCORRUPT;
230 	trace_xchk_block_error(sc, bp->b_bn, __return_address);
231 }
232 
233 /*
234  * Record a corrupt inode.  The trace data will include the block given
235  * by bp if bp is given; otherwise it will use the block location of the
236  * inode record itself.
237  */
238 void
239 xchk_ino_set_corrupt(
240 	struct xfs_scrub	*sc,
241 	xfs_ino_t		ino)
242 {
243 	sc->sm->sm_flags |= XFS_SCRUB_OFLAG_CORRUPT;
244 	trace_xchk_ino_error(sc, ino, __return_address);
245 }
246 
247 /* Record a corruption while cross-referencing with an inode. */
248 void
249 xchk_ino_xref_set_corrupt(
250 	struct xfs_scrub	*sc,
251 	xfs_ino_t		ino)
252 {
253 	sc->sm->sm_flags |= XFS_SCRUB_OFLAG_XCORRUPT;
254 	trace_xchk_ino_error(sc, ino, __return_address);
255 }
256 
257 /* Record corruption in a block indexed by a file fork. */
258 void
259 xchk_fblock_set_corrupt(
260 	struct xfs_scrub	*sc,
261 	int			whichfork,
262 	xfs_fileoff_t		offset)
263 {
264 	sc->sm->sm_flags |= XFS_SCRUB_OFLAG_CORRUPT;
265 	trace_xchk_fblock_error(sc, whichfork, offset, __return_address);
266 }
267 
268 /* Record a corruption while cross-referencing a fork block. */
269 void
270 xchk_fblock_xref_set_corrupt(
271 	struct xfs_scrub	*sc,
272 	int			whichfork,
273 	xfs_fileoff_t		offset)
274 {
275 	sc->sm->sm_flags |= XFS_SCRUB_OFLAG_XCORRUPT;
276 	trace_xchk_fblock_error(sc, whichfork, offset, __return_address);
277 }
278 
279 /*
280  * Warn about inodes that need administrative review but is not
281  * incorrect.
282  */
283 void
284 xchk_ino_set_warning(
285 	struct xfs_scrub	*sc,
286 	xfs_ino_t		ino)
287 {
288 	sc->sm->sm_flags |= XFS_SCRUB_OFLAG_WARNING;
289 	trace_xchk_ino_warning(sc, ino, __return_address);
290 }
291 
292 /* Warn about a block indexed by a file fork that needs review. */
293 void
294 xchk_fblock_set_warning(
295 	struct xfs_scrub	*sc,
296 	int			whichfork,
297 	xfs_fileoff_t		offset)
298 {
299 	sc->sm->sm_flags |= XFS_SCRUB_OFLAG_WARNING;
300 	trace_xchk_fblock_warning(sc, whichfork, offset, __return_address);
301 }
302 
303 /* Signal an incomplete scrub. */
304 void
305 xchk_set_incomplete(
306 	struct xfs_scrub	*sc)
307 {
308 	sc->sm->sm_flags |= XFS_SCRUB_OFLAG_INCOMPLETE;
309 	trace_xchk_incomplete(sc, __return_address);
310 }
311 
312 /*
313  * rmap scrubbing -- compute the number of blocks with a given owner,
314  * at least according to the reverse mapping data.
315  */
316 
317 struct xchk_rmap_ownedby_info {
318 	const struct xfs_owner_info	*oinfo;
319 	xfs_filblks_t			*blocks;
320 };
321 
322 STATIC int
323 xchk_count_rmap_ownedby_irec(
324 	struct xfs_btree_cur		*cur,
325 	struct xfs_rmap_irec		*rec,
326 	void				*priv)
327 {
328 	struct xchk_rmap_ownedby_info	*sroi = priv;
329 	bool				irec_attr;
330 	bool				oinfo_attr;
331 
332 	irec_attr = rec->rm_flags & XFS_RMAP_ATTR_FORK;
333 	oinfo_attr = sroi->oinfo->oi_flags & XFS_OWNER_INFO_ATTR_FORK;
334 
335 	if (rec->rm_owner != sroi->oinfo->oi_owner)
336 		return 0;
337 
338 	if (XFS_RMAP_NON_INODE_OWNER(rec->rm_owner) || irec_attr == oinfo_attr)
339 		(*sroi->blocks) += rec->rm_blockcount;
340 
341 	return 0;
342 }
343 
344 /*
345  * Calculate the number of blocks the rmap thinks are owned by something.
346  * The caller should pass us an rmapbt cursor.
347  */
348 int
349 xchk_count_rmap_ownedby_ag(
350 	struct xfs_scrub		*sc,
351 	struct xfs_btree_cur		*cur,
352 	const struct xfs_owner_info	*oinfo,
353 	xfs_filblks_t			*blocks)
354 {
355 	struct xchk_rmap_ownedby_info	sroi = {
356 		.oinfo			= oinfo,
357 		.blocks			= blocks,
358 	};
359 
360 	*blocks = 0;
361 	return xfs_rmap_query_all(cur, xchk_count_rmap_ownedby_irec,
362 			&sroi);
363 }
364 
365 /*
366  * AG scrubbing
367  *
368  * These helpers facilitate locking an allocation group's header
369  * buffers, setting up cursors for all btrees that are present, and
370  * cleaning everything up once we're through.
371  */
372 
373 /* Decide if we want to return an AG header read failure. */
374 static inline bool
375 want_ag_read_header_failure(
376 	struct xfs_scrub	*sc,
377 	unsigned int		type)
378 {
379 	/* Return all AG header read failures when scanning btrees. */
380 	if (sc->sm->sm_type != XFS_SCRUB_TYPE_AGF &&
381 	    sc->sm->sm_type != XFS_SCRUB_TYPE_AGFL &&
382 	    sc->sm->sm_type != XFS_SCRUB_TYPE_AGI)
383 		return true;
384 	/*
385 	 * If we're scanning a given type of AG header, we only want to
386 	 * see read failures from that specific header.  We'd like the
387 	 * other headers to cross-check them, but this isn't required.
388 	 */
389 	if (sc->sm->sm_type == type)
390 		return true;
391 	return false;
392 }
393 
394 /*
395  * Grab all the headers for an AG.
396  *
397  * The headers should be released by xchk_ag_free, but as a fail
398  * safe we attach all the buffers we grab to the scrub transaction so
399  * they'll all be freed when we cancel it.
400  */
401 int
402 xchk_ag_read_headers(
403 	struct xfs_scrub	*sc,
404 	xfs_agnumber_t		agno,
405 	struct xchk_ag		*sa)
406 {
407 	struct xfs_mount	*mp = sc->mp;
408 	int			error;
409 
410 	sa->agno = agno;
411 
412 	error = xfs_ialloc_read_agi(mp, sc->tp, agno, &sa->agi_bp);
413 	if (error && want_ag_read_header_failure(sc, XFS_SCRUB_TYPE_AGI))
414 		goto out;
415 
416 	error = xfs_alloc_read_agf(mp, sc->tp, agno, 0, &sa->agf_bp);
417 	if (error && want_ag_read_header_failure(sc, XFS_SCRUB_TYPE_AGF))
418 		goto out;
419 
420 	error = xfs_alloc_read_agfl(mp, sc->tp, agno, &sa->agfl_bp);
421 	if (error && want_ag_read_header_failure(sc, XFS_SCRUB_TYPE_AGFL))
422 		goto out;
423 	error = 0;
424 out:
425 	return error;
426 }
427 
428 /* Release all the AG btree cursors. */
429 void
430 xchk_ag_btcur_free(
431 	struct xchk_ag		*sa)
432 {
433 	if (sa->refc_cur)
434 		xfs_btree_del_cursor(sa->refc_cur, XFS_BTREE_ERROR);
435 	if (sa->rmap_cur)
436 		xfs_btree_del_cursor(sa->rmap_cur, XFS_BTREE_ERROR);
437 	if (sa->fino_cur)
438 		xfs_btree_del_cursor(sa->fino_cur, XFS_BTREE_ERROR);
439 	if (sa->ino_cur)
440 		xfs_btree_del_cursor(sa->ino_cur, XFS_BTREE_ERROR);
441 	if (sa->cnt_cur)
442 		xfs_btree_del_cursor(sa->cnt_cur, XFS_BTREE_ERROR);
443 	if (sa->bno_cur)
444 		xfs_btree_del_cursor(sa->bno_cur, XFS_BTREE_ERROR);
445 
446 	sa->refc_cur = NULL;
447 	sa->rmap_cur = NULL;
448 	sa->fino_cur = NULL;
449 	sa->ino_cur = NULL;
450 	sa->bno_cur = NULL;
451 	sa->cnt_cur = NULL;
452 }
453 
454 /* Initialize all the btree cursors for an AG. */
455 void
456 xchk_ag_btcur_init(
457 	struct xfs_scrub	*sc,
458 	struct xchk_ag		*sa)
459 {
460 	struct xfs_mount	*mp = sc->mp;
461 	xfs_agnumber_t		agno = sa->agno;
462 
463 	xchk_perag_get(sc->mp, sa);
464 	if (sa->agf_bp &&
465 	    xchk_ag_btree_healthy_enough(sc, sa->pag, XFS_BTNUM_BNO)) {
466 		/* Set up a bnobt cursor for cross-referencing. */
467 		sa->bno_cur = xfs_allocbt_init_cursor(mp, sc->tp, sa->agf_bp,
468 				agno, XFS_BTNUM_BNO);
469 	}
470 
471 	if (sa->agf_bp &&
472 	    xchk_ag_btree_healthy_enough(sc, sa->pag, XFS_BTNUM_CNT)) {
473 		/* Set up a cntbt cursor for cross-referencing. */
474 		sa->cnt_cur = xfs_allocbt_init_cursor(mp, sc->tp, sa->agf_bp,
475 				agno, XFS_BTNUM_CNT);
476 	}
477 
478 	/* Set up a inobt cursor for cross-referencing. */
479 	if (sa->agi_bp &&
480 	    xchk_ag_btree_healthy_enough(sc, sa->pag, XFS_BTNUM_INO)) {
481 		sa->ino_cur = xfs_inobt_init_cursor(mp, sc->tp, sa->agi_bp,
482 					agno, XFS_BTNUM_INO);
483 	}
484 
485 	/* Set up a finobt cursor for cross-referencing. */
486 	if (sa->agi_bp && xfs_sb_version_hasfinobt(&mp->m_sb) &&
487 	    xchk_ag_btree_healthy_enough(sc, sa->pag, XFS_BTNUM_FINO)) {
488 		sa->fino_cur = xfs_inobt_init_cursor(mp, sc->tp, sa->agi_bp,
489 				agno, XFS_BTNUM_FINO);
490 	}
491 
492 	/* Set up a rmapbt cursor for cross-referencing. */
493 	if (sa->agf_bp && xfs_sb_version_hasrmapbt(&mp->m_sb) &&
494 	    xchk_ag_btree_healthy_enough(sc, sa->pag, XFS_BTNUM_RMAP)) {
495 		sa->rmap_cur = xfs_rmapbt_init_cursor(mp, sc->tp, sa->agf_bp,
496 				agno);
497 	}
498 
499 	/* Set up a refcountbt cursor for cross-referencing. */
500 	if (sa->agf_bp && xfs_sb_version_hasreflink(&mp->m_sb) &&
501 	    xchk_ag_btree_healthy_enough(sc, sa->pag, XFS_BTNUM_REFC)) {
502 		sa->refc_cur = xfs_refcountbt_init_cursor(mp, sc->tp,
503 				sa->agf_bp, agno);
504 	}
505 }
506 
507 /* Release the AG header context and btree cursors. */
508 void
509 xchk_ag_free(
510 	struct xfs_scrub	*sc,
511 	struct xchk_ag		*sa)
512 {
513 	xchk_ag_btcur_free(sa);
514 	if (sa->agfl_bp) {
515 		xfs_trans_brelse(sc->tp, sa->agfl_bp);
516 		sa->agfl_bp = NULL;
517 	}
518 	if (sa->agf_bp) {
519 		xfs_trans_brelse(sc->tp, sa->agf_bp);
520 		sa->agf_bp = NULL;
521 	}
522 	if (sa->agi_bp) {
523 		xfs_trans_brelse(sc->tp, sa->agi_bp);
524 		sa->agi_bp = NULL;
525 	}
526 	if (sa->pag) {
527 		xfs_perag_put(sa->pag);
528 		sa->pag = NULL;
529 	}
530 	sa->agno = NULLAGNUMBER;
531 }
532 
533 /*
534  * For scrub, grab the AGI and the AGF headers, in that order.  Locking
535  * order requires us to get the AGI before the AGF.  We use the
536  * transaction to avoid deadlocking on crosslinked metadata buffers;
537  * either the caller passes one in (bmap scrub) or we have to create a
538  * transaction ourselves.
539  */
540 int
541 xchk_ag_init(
542 	struct xfs_scrub	*sc,
543 	xfs_agnumber_t		agno,
544 	struct xchk_ag		*sa)
545 {
546 	int			error;
547 
548 	error = xchk_ag_read_headers(sc, agno, sa);
549 	if (error)
550 		return error;
551 
552 	xchk_ag_btcur_init(sc, sa);
553 	return 0;
554 }
555 
556 /*
557  * Grab the per-ag structure if we haven't already gotten it.  Teardown of the
558  * xchk_ag will release it for us.
559  */
560 void
561 xchk_perag_get(
562 	struct xfs_mount	*mp,
563 	struct xchk_ag		*sa)
564 {
565 	if (!sa->pag)
566 		sa->pag = xfs_perag_get(mp, sa->agno);
567 }
568 
569 /* Per-scrubber setup functions */
570 
571 /*
572  * Grab an empty transaction so that we can re-grab locked buffers if
573  * one of our btrees turns out to be cyclic.
574  *
575  * If we're going to repair something, we need to ask for the largest possible
576  * log reservation so that we can handle the worst case scenario for metadata
577  * updates while rebuilding a metadata item.  We also need to reserve as many
578  * blocks in the head transaction as we think we're going to need to rebuild
579  * the metadata object.
580  */
581 int
582 xchk_trans_alloc(
583 	struct xfs_scrub	*sc,
584 	uint			resblks)
585 {
586 	if (sc->sm->sm_flags & XFS_SCRUB_IFLAG_REPAIR)
587 		return xfs_trans_alloc(sc->mp, &M_RES(sc->mp)->tr_itruncate,
588 				resblks, 0, 0, &sc->tp);
589 
590 	return xfs_trans_alloc_empty(sc->mp, &sc->tp);
591 }
592 
593 /* Set us up with a transaction and an empty context. */
594 int
595 xchk_setup_fs(
596 	struct xfs_scrub	*sc)
597 {
598 	uint			resblks;
599 
600 	resblks = xrep_calc_ag_resblks(sc);
601 	return xchk_trans_alloc(sc, resblks);
602 }
603 
604 /* Set us up with AG headers and btree cursors. */
605 int
606 xchk_setup_ag_btree(
607 	struct xfs_scrub	*sc,
608 	bool			force_log)
609 {
610 	struct xfs_mount	*mp = sc->mp;
611 	int			error;
612 
613 	/*
614 	 * If the caller asks us to checkpont the log, do so.  This
615 	 * expensive operation should be performed infrequently and only
616 	 * as a last resort.  Any caller that sets force_log should
617 	 * document why they need to do so.
618 	 */
619 	if (force_log) {
620 		error = xchk_checkpoint_log(mp);
621 		if (error)
622 			return error;
623 	}
624 
625 	error = xchk_setup_fs(sc);
626 	if (error)
627 		return error;
628 
629 	return xchk_ag_init(sc, sc->sm->sm_agno, &sc->sa);
630 }
631 
632 /* Push everything out of the log onto disk. */
633 int
634 xchk_checkpoint_log(
635 	struct xfs_mount	*mp)
636 {
637 	int			error;
638 
639 	error = xfs_log_force(mp, XFS_LOG_SYNC);
640 	if (error)
641 		return error;
642 	xfs_ail_push_all_sync(mp->m_ail);
643 	return 0;
644 }
645 
646 /*
647  * Given an inode and the scrub control structure, grab either the
648  * inode referenced in the control structure or the inode passed in.
649  * The inode is not locked.
650  */
651 int
652 xchk_get_inode(
653 	struct xfs_scrub	*sc)
654 {
655 	struct xfs_imap		imap;
656 	struct xfs_mount	*mp = sc->mp;
657 	struct xfs_inode	*ip_in = XFS_I(file_inode(sc->file));
658 	struct xfs_inode	*ip = NULL;
659 	int			error;
660 
661 	/* We want to scan the inode we already had opened. */
662 	if (sc->sm->sm_ino == 0 || sc->sm->sm_ino == ip_in->i_ino) {
663 		sc->ip = ip_in;
664 		return 0;
665 	}
666 
667 	/* Look up the inode, see if the generation number matches. */
668 	if (xfs_internal_inum(mp, sc->sm->sm_ino))
669 		return -ENOENT;
670 	error = xfs_iget(mp, NULL, sc->sm->sm_ino,
671 			XFS_IGET_UNTRUSTED | XFS_IGET_DONTCACHE, 0, &ip);
672 	switch (error) {
673 	case -ENOENT:
674 		/* Inode doesn't exist, just bail out. */
675 		return error;
676 	case 0:
677 		/* Got an inode, continue. */
678 		break;
679 	case -EINVAL:
680 		/*
681 		 * -EINVAL with IGET_UNTRUSTED could mean one of several
682 		 * things: userspace gave us an inode number that doesn't
683 		 * correspond to fs space, or doesn't have an inobt entry;
684 		 * or it could simply mean that the inode buffer failed the
685 		 * read verifiers.
686 		 *
687 		 * Try just the inode mapping lookup -- if it succeeds, then
688 		 * the inode buffer verifier failed and something needs fixing.
689 		 * Otherwise, we really couldn't find it so tell userspace
690 		 * that it no longer exists.
691 		 */
692 		error = xfs_imap(sc->mp, sc->tp, sc->sm->sm_ino, &imap,
693 				XFS_IGET_UNTRUSTED | XFS_IGET_DONTCACHE);
694 		if (error)
695 			return -ENOENT;
696 		error = -EFSCORRUPTED;
697 		/* fall through */
698 	default:
699 		trace_xchk_op_error(sc,
700 				XFS_INO_TO_AGNO(mp, sc->sm->sm_ino),
701 				XFS_INO_TO_AGBNO(mp, sc->sm->sm_ino),
702 				error, __return_address);
703 		return error;
704 	}
705 	if (VFS_I(ip)->i_generation != sc->sm->sm_gen) {
706 		xfs_irele(ip);
707 		return -ENOENT;
708 	}
709 
710 	sc->ip = ip;
711 	return 0;
712 }
713 
714 /* Set us up to scrub a file's contents. */
715 int
716 xchk_setup_inode_contents(
717 	struct xfs_scrub	*sc,
718 	unsigned int		resblks)
719 {
720 	int			error;
721 
722 	error = xchk_get_inode(sc);
723 	if (error)
724 		return error;
725 
726 	/* Got the inode, lock it and we're ready to go. */
727 	sc->ilock_flags = XFS_IOLOCK_EXCL | XFS_MMAPLOCK_EXCL;
728 	xfs_ilock(sc->ip, sc->ilock_flags);
729 	error = xchk_trans_alloc(sc, resblks);
730 	if (error)
731 		goto out;
732 	sc->ilock_flags |= XFS_ILOCK_EXCL;
733 	xfs_ilock(sc->ip, XFS_ILOCK_EXCL);
734 
735 out:
736 	/* scrub teardown will unlock and release the inode for us */
737 	return error;
738 }
739 
740 /*
741  * Predicate that decides if we need to evaluate the cross-reference check.
742  * If there was an error accessing the cross-reference btree, just delete
743  * the cursor and skip the check.
744  */
745 bool
746 xchk_should_check_xref(
747 	struct xfs_scrub	*sc,
748 	int			*error,
749 	struct xfs_btree_cur	**curpp)
750 {
751 	/* No point in xref if we already know we're corrupt. */
752 	if (xchk_skip_xref(sc->sm))
753 		return false;
754 
755 	if (*error == 0)
756 		return true;
757 
758 	if (curpp) {
759 		/* If we've already given up on xref, just bail out. */
760 		if (!*curpp)
761 			return false;
762 
763 		/* xref error, delete cursor and bail out. */
764 		xfs_btree_del_cursor(*curpp, XFS_BTREE_ERROR);
765 		*curpp = NULL;
766 	}
767 
768 	sc->sm->sm_flags |= XFS_SCRUB_OFLAG_XFAIL;
769 	trace_xchk_xref_error(sc, *error, __return_address);
770 
771 	/*
772 	 * Errors encountered during cross-referencing with another
773 	 * data structure should not cause this scrubber to abort.
774 	 */
775 	*error = 0;
776 	return false;
777 }
778 
779 /* Run the structure verifiers on in-memory buffers to detect bad memory. */
780 void
781 xchk_buffer_recheck(
782 	struct xfs_scrub	*sc,
783 	struct xfs_buf		*bp)
784 {
785 	xfs_failaddr_t		fa;
786 
787 	if (bp->b_ops == NULL) {
788 		xchk_block_set_corrupt(sc, bp);
789 		return;
790 	}
791 	if (bp->b_ops->verify_struct == NULL) {
792 		xchk_set_incomplete(sc);
793 		return;
794 	}
795 	fa = bp->b_ops->verify_struct(bp);
796 	if (!fa)
797 		return;
798 	sc->sm->sm_flags |= XFS_SCRUB_OFLAG_CORRUPT;
799 	trace_xchk_block_error(sc, bp->b_bn, fa);
800 }
801 
802 /*
803  * Scrub the attr/data forks of a metadata inode.  The metadata inode must be
804  * pointed to by sc->ip and the ILOCK must be held.
805  */
806 int
807 xchk_metadata_inode_forks(
808 	struct xfs_scrub	*sc)
809 {
810 	__u32			smtype;
811 	bool			shared;
812 	int			error;
813 
814 	if (sc->sm->sm_flags & XFS_SCRUB_OFLAG_CORRUPT)
815 		return 0;
816 
817 	/* Metadata inodes don't live on the rt device. */
818 	if (sc->ip->i_diflags & XFS_DIFLAG_REALTIME) {
819 		xchk_ino_set_corrupt(sc, sc->ip->i_ino);
820 		return 0;
821 	}
822 
823 	/* They should never participate in reflink. */
824 	if (xfs_is_reflink_inode(sc->ip)) {
825 		xchk_ino_set_corrupt(sc, sc->ip->i_ino);
826 		return 0;
827 	}
828 
829 	/* They also should never have extended attributes. */
830 	if (xfs_inode_hasattr(sc->ip)) {
831 		xchk_ino_set_corrupt(sc, sc->ip->i_ino);
832 		return 0;
833 	}
834 
835 	/* Invoke the data fork scrubber. */
836 	smtype = sc->sm->sm_type;
837 	sc->sm->sm_type = XFS_SCRUB_TYPE_BMBTD;
838 	error = xchk_bmap_data(sc);
839 	sc->sm->sm_type = smtype;
840 	if (error || (sc->sm->sm_flags & XFS_SCRUB_OFLAG_CORRUPT))
841 		return error;
842 
843 	/* Look for incorrect shared blocks. */
844 	if (xfs_sb_version_hasreflink(&sc->mp->m_sb)) {
845 		error = xfs_reflink_inode_has_shared_extents(sc->tp, sc->ip,
846 				&shared);
847 		if (!xchk_fblock_process_error(sc, XFS_DATA_FORK, 0,
848 				&error))
849 			return error;
850 		if (shared)
851 			xchk_ino_set_corrupt(sc, sc->ip->i_ino);
852 	}
853 
854 	return error;
855 }
856 
857 /*
858  * Try to lock an inode in violation of the usual locking order rules.  For
859  * example, trying to get the IOLOCK while in transaction context, or just
860  * plain breaking AG-order or inode-order inode locking rules.  Either way,
861  * the only way to avoid an ABBA deadlock is to use trylock and back off if
862  * we can't.
863  */
864 int
865 xchk_ilock_inverted(
866 	struct xfs_inode	*ip,
867 	uint			lock_mode)
868 {
869 	int			i;
870 
871 	for (i = 0; i < 20; i++) {
872 		if (xfs_ilock_nowait(ip, lock_mode))
873 			return 0;
874 		delay(1);
875 	}
876 	return -EDEADLOCK;
877 }
878 
879 /* Pause background reaping of resources. */
880 void
881 xchk_stop_reaping(
882 	struct xfs_scrub	*sc)
883 {
884 	sc->flags |= XCHK_REAPING_DISABLED;
885 	xfs_blockgc_stop(sc->mp);
886 }
887 
888 /* Restart background reaping of resources. */
889 void
890 xchk_start_reaping(
891 	struct xfs_scrub	*sc)
892 {
893 	xfs_blockgc_start(sc->mp);
894 	sc->flags &= ~XCHK_REAPING_DISABLED;
895 }
896