2021-11-28 18:42:05 +00:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0 */
|
|
|
|
#ifndef _BCACHEFS_ERRCODE_H
|
|
|
|
#define _BCACHEFS_ERRCODE_H
|
|
|
|
|
2022-09-18 21:10:33 +00:00
|
|
|
#define BCH_ERRCODES() \
|
2023-11-03 15:40:32 +00:00
|
|
|
x(ERANGE, ERANGE_option_too_small) \
|
|
|
|
x(ERANGE, ERANGE_option_too_big) \
|
2024-02-19 12:24:32 +00:00
|
|
|
x(EINVAL, mount_option) \
|
|
|
|
x(BCH_ERR_mount_option, option_name) \
|
|
|
|
x(BCH_ERR_mount_option, option_value) \
|
2024-03-01 06:38:33 +00:00
|
|
|
x(BCH_ERR_mount_option, option_not_bool) \
|
2023-03-05 07:52:40 +00:00
|
|
|
x(ENOMEM, ENOMEM_stripe_buf) \
|
2023-03-14 19:35:57 +00:00
|
|
|
x(ENOMEM, ENOMEM_replicas_table) \
|
|
|
|
x(ENOMEM, ENOMEM_cpu_replicas) \
|
|
|
|
x(ENOMEM, ENOMEM_replicas_gc) \
|
|
|
|
x(ENOMEM, ENOMEM_disk_groups_validate) \
|
|
|
|
x(ENOMEM, ENOMEM_disk_groups_to_cpu) \
|
|
|
|
x(ENOMEM, ENOMEM_mark_snapshot) \
|
|
|
|
x(ENOMEM, ENOMEM_mark_stripe) \
|
|
|
|
x(ENOMEM, ENOMEM_mark_stripe_ptr) \
|
|
|
|
x(ENOMEM, ENOMEM_btree_key_cache_create) \
|
|
|
|
x(ENOMEM, ENOMEM_btree_key_cache_fill) \
|
|
|
|
x(ENOMEM, ENOMEM_btree_key_cache_insert) \
|
|
|
|
x(ENOMEM, ENOMEM_trans_kmalloc) \
|
|
|
|
x(ENOMEM, ENOMEM_trans_log_msg) \
|
|
|
|
x(ENOMEM, ENOMEM_do_encrypt) \
|
|
|
|
x(ENOMEM, ENOMEM_ec_read_extent) \
|
|
|
|
x(ENOMEM, ENOMEM_ec_stripe_mem_alloc) \
|
|
|
|
x(ENOMEM, ENOMEM_ec_new_stripe_alloc) \
|
|
|
|
x(ENOMEM, ENOMEM_fs_btree_cache_init) \
|
|
|
|
x(ENOMEM, ENOMEM_fs_btree_key_cache_init) \
|
|
|
|
x(ENOMEM, ENOMEM_fs_counters_init) \
|
|
|
|
x(ENOMEM, ENOMEM_fs_btree_write_buffer_init) \
|
|
|
|
x(ENOMEM, ENOMEM_io_clock_init) \
|
|
|
|
x(ENOMEM, ENOMEM_blacklist_table_init) \
|
|
|
|
x(ENOMEM, ENOMEM_sb_realloc_injected) \
|
|
|
|
x(ENOMEM, ENOMEM_sb_bio_realloc) \
|
|
|
|
x(ENOMEM, ENOMEM_sb_buf_realloc) \
|
|
|
|
x(ENOMEM, ENOMEM_sb_journal_validate) \
|
|
|
|
x(ENOMEM, ENOMEM_sb_journal_v2_validate) \
|
|
|
|
x(ENOMEM, ENOMEM_journal_entry_add) \
|
|
|
|
x(ENOMEM, ENOMEM_journal_read_buf_realloc) \
|
|
|
|
x(ENOMEM, ENOMEM_btree_interior_update_worker_init)\
|
|
|
|
x(ENOMEM, ENOMEM_btree_interior_update_pool_init) \
|
|
|
|
x(ENOMEM, ENOMEM_bio_read_init) \
|
|
|
|
x(ENOMEM, ENOMEM_bio_read_split_init) \
|
|
|
|
x(ENOMEM, ENOMEM_bio_write_init) \
|
|
|
|
x(ENOMEM, ENOMEM_bio_bounce_pages_init) \
|
|
|
|
x(ENOMEM, ENOMEM_writepage_bioset_init) \
|
|
|
|
x(ENOMEM, ENOMEM_dio_read_bioset_init) \
|
|
|
|
x(ENOMEM, ENOMEM_dio_write_bioset_init) \
|
|
|
|
x(ENOMEM, ENOMEM_nocow_flush_bioset_init) \
|
|
|
|
x(ENOMEM, ENOMEM_promote_table_init) \
|
|
|
|
x(ENOMEM, ENOMEM_compression_bounce_read_init) \
|
|
|
|
x(ENOMEM, ENOMEM_compression_bounce_write_init) \
|
|
|
|
x(ENOMEM, ENOMEM_compression_workspace_init) \
|
|
|
|
x(ENOMEM, ENOMEM_decompression_workspace_init) \
|
|
|
|
x(ENOMEM, ENOMEM_bucket_gens) \
|
|
|
|
x(ENOMEM, ENOMEM_buckets_nouse) \
|
|
|
|
x(ENOMEM, ENOMEM_usage_init) \
|
|
|
|
x(ENOMEM, ENOMEM_btree_node_read_all_replicas) \
|
|
|
|
x(ENOMEM, ENOMEM_btree_node_reclaim) \
|
|
|
|
x(ENOMEM, ENOMEM_btree_node_mem_alloc) \
|
|
|
|
x(ENOMEM, ENOMEM_btree_cache_cannibalize_lock) \
|
|
|
|
x(ENOMEM, ENOMEM_buckets_waiting_for_journal_init)\
|
|
|
|
x(ENOMEM, ENOMEM_buckets_waiting_for_journal_set) \
|
|
|
|
x(ENOMEM, ENOMEM_set_nr_journal_buckets) \
|
|
|
|
x(ENOMEM, ENOMEM_dev_journal_init) \
|
|
|
|
x(ENOMEM, ENOMEM_journal_pin_fifo) \
|
|
|
|
x(ENOMEM, ENOMEM_journal_buf) \
|
|
|
|
x(ENOMEM, ENOMEM_gc_start) \
|
|
|
|
x(ENOMEM, ENOMEM_gc_alloc_start) \
|
|
|
|
x(ENOMEM, ENOMEM_gc_reflink_start) \
|
|
|
|
x(ENOMEM, ENOMEM_gc_gens) \
|
|
|
|
x(ENOMEM, ENOMEM_gc_repair_key) \
|
|
|
|
x(ENOMEM, ENOMEM_fsck_extent_ends_at) \
|
|
|
|
x(ENOMEM, ENOMEM_fsck_add_nlink) \
|
|
|
|
x(ENOMEM, ENOMEM_journal_key_insert) \
|
|
|
|
x(ENOMEM, ENOMEM_journal_keys_sort) \
|
|
|
|
x(ENOMEM, ENOMEM_read_superblock_clean) \
|
|
|
|
x(ENOMEM, ENOMEM_fs_alloc) \
|
|
|
|
x(ENOMEM, ENOMEM_fs_name_alloc) \
|
|
|
|
x(ENOMEM, ENOMEM_fs_other_alloc) \
|
|
|
|
x(ENOMEM, ENOMEM_dev_alloc) \
|
2024-02-22 03:10:09 +00:00
|
|
|
x(ENOMEM, ENOMEM_disk_accounting) \
|
2022-09-18 21:10:33 +00:00
|
|
|
x(ENOSPC, ENOSPC_disk_reservation) \
|
|
|
|
x(ENOSPC, ENOSPC_bucket_alloc) \
|
|
|
|
x(ENOSPC, ENOSPC_disk_label_add) \
|
|
|
|
x(ENOSPC, ENOSPC_stripe_create) \
|
|
|
|
x(ENOSPC, ENOSPC_inode_create) \
|
|
|
|
x(ENOSPC, ENOSPC_str_hash_create) \
|
|
|
|
x(ENOSPC, ENOSPC_snapshot_create) \
|
|
|
|
x(ENOSPC, ENOSPC_subvolume_create) \
|
|
|
|
x(ENOSPC, ENOSPC_sb) \
|
|
|
|
x(ENOSPC, ENOSPC_sb_journal) \
|
2023-03-14 19:35:57 +00:00
|
|
|
x(ENOSPC, ENOSPC_sb_journal_seq_blacklist) \
|
2022-09-18 21:10:33 +00:00
|
|
|
x(ENOSPC, ENOSPC_sb_quota) \
|
|
|
|
x(ENOSPC, ENOSPC_sb_replicas) \
|
|
|
|
x(ENOSPC, ENOSPC_sb_members) \
|
2023-09-25 04:02:56 +00:00
|
|
|
x(ENOSPC, ENOSPC_sb_members_v2) \
|
2023-03-14 19:35:57 +00:00
|
|
|
x(ENOSPC, ENOSPC_sb_crypt) \
|
2023-12-29 20:25:07 +00:00
|
|
|
x(ENOSPC, ENOSPC_sb_downgrade) \
|
2023-04-28 03:20:18 +00:00
|
|
|
x(ENOSPC, ENOSPC_btree_slot) \
|
2023-03-29 15:18:52 +00:00
|
|
|
x(ENOSPC, ENOSPC_snapshot_tree) \
|
2023-05-27 23:59:59 +00:00
|
|
|
x(ENOENT, ENOENT_bkey_type_mismatch) \
|
|
|
|
x(ENOENT, ENOENT_str_hash_lookup) \
|
|
|
|
x(ENOENT, ENOENT_str_hash_set_must_replace) \
|
|
|
|
x(ENOENT, ENOENT_inode) \
|
|
|
|
x(ENOENT, ENOENT_not_subvol) \
|
2023-09-20 05:32:20 +00:00
|
|
|
x(ENOENT, ENOENT_not_directory) \
|
2023-05-27 23:59:59 +00:00
|
|
|
x(ENOENT, ENOENT_directory_dead) \
|
|
|
|
x(ENOENT, ENOENT_subvolume) \
|
|
|
|
x(ENOENT, ENOENT_snapshot_tree) \
|
|
|
|
x(ENOENT, ENOENT_dirent_doesnt_match_inode) \
|
|
|
|
x(ENOENT, ENOENT_dev_not_found) \
|
|
|
|
x(ENOENT, ENOENT_dev_idx_not_found) \
|
2024-02-10 02:01:04 +00:00
|
|
|
x(ENOTEMPTY, ENOTEMPTY_dir_not_empty) \
|
|
|
|
x(ENOTEMPTY, ENOTEMPTY_subvol_not_empty) \
|
2022-09-18 19:43:50 +00:00
|
|
|
x(0, open_buckets_empty) \
|
|
|
|
x(0, freelist_empty) \
|
|
|
|
x(BCH_ERR_freelist_empty, no_buckets_found) \
|
|
|
|
x(0, transaction_restart) \
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_fault_inject) \
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_relock) \
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_relock_path) \
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_relock_path_intent) \
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_relock_after_fill) \
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_too_many_iters) \
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_lock_node_reused) \
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_fill_relock) \
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_fill_mem_alloc_fail)\
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_mem_realloced) \
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_in_traverse_all) \
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_would_deadlock) \
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_would_deadlock_write)\
|
bcachefs: Deadlock cycle detector
We've outgrown our own deadlock avoidance strategy.
The btree iterator API provides an interface where the user doesn't need
to concern themselves with lock ordering - different btree iterators can
be traversed in any order. Without special care, this will lead to
deadlocks.
Our previous strategy was to define a lock ordering internally, and
whenever we attempt to take a lock and trylock() fails, we'd check if
the current btree transaction is holding any locks that cause a lock
ordering violation. If so, we'd issue a transaction restart, and then
bch2_trans_begin() would re-traverse all previously used iterators, but
in the correct order.
That approach had some issues, though.
- Sometimes we'd issue transaction restarts unnecessarily, when no
deadlock would have actually occured. Lock ordering restarts have
become our primary cause of transaction restarts, on some workloads
totally 20% of actual transaction commits.
- To avoid deadlock or livelock, we'd often have to take intent locks
when we only wanted a read lock: with the lock ordering approach, it
is actually illegal to hold _any_ read lock while blocking on an intent
lock, and this has been causing us unnecessary lock contention.
- It was getting fragile - the various lock ordering rules are not
trivial, and we'd been seeing occasional livelock issues related to
this machinery.
So, since bcachefs is already a relational database masquerading as a
filesystem, we're stealing the next traditional database technique and
switching to a cycle detector for avoiding deadlocks.
When we block taking a btree lock, after adding ourself to the waitlist
but before sleeping, we do a DFS of btree transactions waiting on other
btree transactions, starting with the current transaction and walking
our held locks, and transactions blocking on our held locks.
If we find a cycle, we emit a transaction restart. Occasionally (e.g.
the btree split path) we can not allow the lock() operation to fail, so
if necessary we'll tell another transaction that it has to fail.
Result: trans_restart_would_deadlock events are reduced by a factor of
10 to 100, and we'll be able to delete a whole bunch of grotty, fragile
code.
Signed-off-by: Kent Overstreet <kent.overstreet@gmail.com>
2022-08-22 17:23:47 +00:00
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_deadlock_recursion_limit)\
|
2022-09-18 19:43:50 +00:00
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_upgrade) \
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_key_cache_upgrade) \
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_key_cache_fill) \
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_key_cache_raced) \
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_key_cache_realloced)\
|
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_journal_preres_get) \
|
2022-10-02 02:15:30 +00:00
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_split_race) \
|
bcachefs: Btree write buffer
This adds a new method of doing btree updates - a straight write buffer,
implemented as a flat fixed size array.
This is only useful when we don't need to read from the btree in order
to do the update, and when reading is infrequent - perfect for the LRU
btree.
This will make LRU btree updates fast enough that we'll be able to use
it for persistently indexing buckets by fragmentation, which will be a
massive boost to copygc performance.
Changes:
- A new btree_insert_type enum, for btree_insert_entries. Specifies
btree, btree key cache, or btree write buffer.
- bch2_trans_update_buffered(): updates via the btree write buffer
don't need a btree path, so we need a new update path.
- Transaction commit path changes:
The update to the btree write buffer both mutates global, and can
fail if there isn't currently room. Therefore we do all write buffer
updates in the transaction all at once, and also if it fails we have
to revert filesystem usage counter changes.
If there isn't room we flush the write buffer in the transaction
commit error path and retry.
- A new persistent option, for specifying the number of entries in the
write buffer.
Signed-off-by: Kent Overstreet <kent.overstreet@linux.dev>
2023-01-04 05:00:50 +00:00
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_write_buffer_flush) \
|
2022-09-18 19:43:50 +00:00
|
|
|
x(BCH_ERR_transaction_restart, transaction_restart_nested) \
|
|
|
|
x(0, no_btree_node) \
|
|
|
|
x(BCH_ERR_no_btree_node, no_btree_node_relock) \
|
|
|
|
x(BCH_ERR_no_btree_node, no_btree_node_upgrade) \
|
|
|
|
x(BCH_ERR_no_btree_node, no_btree_node_drop) \
|
|
|
|
x(BCH_ERR_no_btree_node, no_btree_node_lock_root) \
|
|
|
|
x(BCH_ERR_no_btree_node, no_btree_node_up) \
|
|
|
|
x(BCH_ERR_no_btree_node, no_btree_node_down) \
|
|
|
|
x(BCH_ERR_no_btree_node, no_btree_node_init) \
|
|
|
|
x(BCH_ERR_no_btree_node, no_btree_node_cached) \
|
2022-12-16 02:44:32 +00:00
|
|
|
x(BCH_ERR_no_btree_node, no_btree_node_srcu_reset) \
|
2022-12-07 16:39:34 +00:00
|
|
|
x(0, btree_insert_fail) \
|
|
|
|
x(BCH_ERR_btree_insert_fail, btree_insert_btree_node_full) \
|
|
|
|
x(BCH_ERR_btree_insert_fail, btree_insert_need_mark_replicas) \
|
|
|
|
x(BCH_ERR_btree_insert_fail, btree_insert_need_journal_res) \
|
|
|
|
x(BCH_ERR_btree_insert_fail, btree_insert_need_journal_reclaim) \
|
2022-03-18 00:51:27 +00:00
|
|
|
x(0, backpointer_to_overwritten_btree_node) \
|
2022-09-18 19:43:50 +00:00
|
|
|
x(0, lock_fail_root_changed) \
|
|
|
|
x(0, journal_reclaim_would_deadlock) \
|
2023-06-24 19:59:03 +00:00
|
|
|
x(EINVAL, fsck) \
|
2022-09-18 19:43:50 +00:00
|
|
|
x(BCH_ERR_fsck, fsck_fix) \
|
|
|
|
x(BCH_ERR_fsck, fsck_ignore) \
|
|
|
|
x(BCH_ERR_fsck, fsck_errors_not_fixed) \
|
|
|
|
x(BCH_ERR_fsck, fsck_repair_unimplemented) \
|
|
|
|
x(BCH_ERR_fsck, fsck_repair_impossible) \
|
2023-07-17 03:21:17 +00:00
|
|
|
x(0, restart_recovery) \
|
2023-11-25 02:51:45 +00:00
|
|
|
x(0, data_update_done) \
|
2022-11-20 03:39:08 +00:00
|
|
|
x(EINVAL, device_state_not_allowed) \
|
|
|
|
x(EINVAL, member_info_missing) \
|
|
|
|
x(EINVAL, mismatched_block_size) \
|
|
|
|
x(EINVAL, block_size_too_small) \
|
|
|
|
x(EINVAL, bucket_size_too_small) \
|
|
|
|
x(EINVAL, device_size_too_small) \
|
2024-05-04 17:26:37 +00:00
|
|
|
x(EINVAL, device_size_too_big) \
|
2022-11-20 03:39:08 +00:00
|
|
|
x(EINVAL, device_not_a_member_of_filesystem) \
|
|
|
|
x(EINVAL, device_has_been_removed) \
|
2023-06-28 01:02:27 +00:00
|
|
|
x(EINVAL, device_splitbrain) \
|
2022-11-20 03:39:08 +00:00
|
|
|
x(EINVAL, device_already_online) \
|
|
|
|
x(EINVAL, insufficient_devices_to_start) \
|
|
|
|
x(EINVAL, invalid) \
|
2023-07-13 07:11:16 +00:00
|
|
|
x(EINVAL, internal_fsck_err) \
|
2023-12-04 18:03:24 +00:00
|
|
|
x(EINVAL, opt_parse_error) \
|
2024-02-06 02:44:23 +00:00
|
|
|
x(EINVAL, remove_with_metadata_missing_unimplemented)\
|
|
|
|
x(EINVAL, remove_would_lose_data) \
|
2024-02-06 22:24:18 +00:00
|
|
|
x(EINVAL, btree_iter_with_journal_not_supported) \
|
2022-12-12 01:37:11 +00:00
|
|
|
x(EROFS, erofs_trans_commit) \
|
|
|
|
x(EROFS, erofs_no_writes) \
|
|
|
|
x(EROFS, erofs_journal_err) \
|
|
|
|
x(EROFS, erofs_sb_err) \
|
2023-07-07 21:09:26 +00:00
|
|
|
x(EROFS, erofs_unfixed_errors) \
|
|
|
|
x(EROFS, erofs_norecovery) \
|
|
|
|
x(EROFS, erofs_nochanges) \
|
2022-12-12 01:37:11 +00:00
|
|
|
x(EROFS, insufficient_devices) \
|
2022-12-13 20:17:40 +00:00
|
|
|
x(0, operation_blocked) \
|
|
|
|
x(BCH_ERR_operation_blocked, btree_cache_cannibalize_lock_blocked) \
|
|
|
|
x(BCH_ERR_operation_blocked, journal_res_get_blocked) \
|
|
|
|
x(BCH_ERR_operation_blocked, journal_preres_get_blocked) \
|
|
|
|
x(BCH_ERR_operation_blocked, bucket_alloc_blocked) \
|
2023-03-02 06:54:17 +00:00
|
|
|
x(BCH_ERR_operation_blocked, stripe_alloc_blocked) \
|
2022-11-20 03:39:08 +00:00
|
|
|
x(BCH_ERR_invalid, invalid_sb) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_magic) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_version) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_features) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_too_big) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_csum_type) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_csum) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_block_size) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_uuid) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_too_many_members) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_dev_idx) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_time_precision) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_field_size) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_layout) \
|
|
|
|
x(BCH_ERR_invalid_sb_layout, invalid_sb_layout_type) \
|
|
|
|
x(BCH_ERR_invalid_sb_layout, invalid_sb_layout_nr_superblocks) \
|
|
|
|
x(BCH_ERR_invalid_sb_layout, invalid_sb_layout_superblocks_overlap) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_members_missing) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_members) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_disk_groups) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_replicas) \
|
2023-11-26 02:42:08 +00:00
|
|
|
x(BCH_ERR_invalid_sb, invalid_replicas_entry) \
|
2022-11-20 03:39:08 +00:00
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_journal) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_journal_seq_blacklist) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_crypt) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_clean) \
|
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_quota) \
|
2023-10-25 19:51:16 +00:00
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_errors) \
|
2023-10-22 22:29:54 +00:00
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_opt_compression) \
|
2023-12-29 20:15:14 +00:00
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_ext) \
|
2023-12-29 20:25:07 +00:00
|
|
|
x(BCH_ERR_invalid_sb, invalid_sb_downgrade) \
|
2022-11-20 03:39:08 +00:00
|
|
|
x(BCH_ERR_invalid, invalid_bkey) \
|
2023-01-06 08:11:07 +00:00
|
|
|
x(BCH_ERR_operation_blocked, nocow_lock_blocked) \
|
2023-08-03 23:36:28 +00:00
|
|
|
x(EIO, btree_node_read_err) \
|
2023-12-23 02:58:43 +00:00
|
|
|
x(EIO, sb_not_downgraded) \
|
2024-02-06 22:24:18 +00:00
|
|
|
x(EIO, btree_node_write_all_failed) \
|
|
|
|
x(EIO, btree_node_read_error) \
|
|
|
|
x(EIO, btree_node_read_validate_error) \
|
|
|
|
x(EIO, btree_need_topology_repair) \
|
2023-08-03 23:36:28 +00:00
|
|
|
x(BCH_ERR_btree_node_read_err, btree_node_read_err_fixable) \
|
|
|
|
x(BCH_ERR_btree_node_read_err, btree_node_read_err_want_retry) \
|
|
|
|
x(BCH_ERR_btree_node_read_err, btree_node_read_err_must_retry) \
|
|
|
|
x(BCH_ERR_btree_node_read_err, btree_node_read_err_bad_node) \
|
2023-09-12 00:44:33 +00:00
|
|
|
x(BCH_ERR_btree_node_read_err, btree_node_read_err_incompatible) \
|
|
|
|
x(0, nopromote) \
|
|
|
|
x(BCH_ERR_nopromote, nopromote_may_not) \
|
|
|
|
x(BCH_ERR_nopromote, nopromote_already_promoted) \
|
|
|
|
x(BCH_ERR_nopromote, nopromote_unwritten) \
|
|
|
|
x(BCH_ERR_nopromote, nopromote_congested) \
|
|
|
|
x(BCH_ERR_nopromote, nopromote_in_flight) \
|
2023-12-20 21:49:43 +00:00
|
|
|
x(BCH_ERR_nopromote, nopromote_no_writes) \
|
2024-02-28 23:30:22 +00:00
|
|
|
x(BCH_ERR_nopromote, nopromote_enomem) \
|
2024-03-22 20:29:23 +00:00
|
|
|
x(0, need_inode_lock) \
|
|
|
|
x(0, invalid_snapshot_node)
|
2022-07-18 02:31:21 +00:00
|
|
|
|
|
|
|
enum bch_errcode {
|
|
|
|
BCH_ERR_START = 2048,
|
|
|
|
#define x(class, err) BCH_ERR_##err,
|
|
|
|
BCH_ERRCODES()
|
|
|
|
#undef x
|
|
|
|
BCH_ERR_MAX
|
2021-11-28 18:42:05 +00:00
|
|
|
};
|
|
|
|
|
2022-07-18 02:31:21 +00:00
|
|
|
const char *bch2_err_str(int);
|
|
|
|
bool __bch2_err_matches(int, int);
|
|
|
|
|
|
|
|
static inline bool _bch2_err_matches(int err, int class)
|
|
|
|
{
|
2023-06-21 10:44:44 +00:00
|
|
|
return err < 0 && __bch2_err_matches(err, class);
|
2022-07-18 02:31:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#define bch2_err_matches(_err, _class) \
|
|
|
|
({ \
|
|
|
|
BUILD_BUG_ON(!__builtin_constant_p(_class)); \
|
2023-05-29 20:27:11 +00:00
|
|
|
unlikely(_bch2_err_matches(_err, _class)); \
|
2022-07-18 02:31:21 +00:00
|
|
|
})
|
|
|
|
|
2022-09-18 19:43:50 +00:00
|
|
|
int __bch2_err_class(int);
|
|
|
|
|
|
|
|
static inline long bch2_err_class(long err)
|
|
|
|
{
|
|
|
|
return err < 0 ? __bch2_err_class(err) : err;
|
|
|
|
}
|
|
|
|
|
2023-09-10 22:05:17 +00:00
|
|
|
#define BLK_STS_REMOVED ((__force blk_status_t)128)
|
|
|
|
|
|
|
|
const char *bch2_blk_status_to_str(blk_status_t);
|
|
|
|
|
2021-11-28 18:42:05 +00:00
|
|
|
#endif /* _BCACHFES_ERRCODE_H */
|