Merge git://git.kernel.org/pub/scm/linux/kernel/git/rw/uml
[linux-2.6-block.git] / fs / xfs / scrub / btree.c
CommitLineData
537964bc
DW
1/*
2 * Copyright (C) 2017 Oracle. All Rights Reserved.
3 *
4 * Author: Darrick J. Wong <darrick.wong@oracle.com>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version 2
9 * of the License, or (at your option) any later version.
10 *
11 * This program is distributed in the hope that it would be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write the Free Software Foundation,
18 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA.
19 */
20#include "xfs.h"
21#include "xfs_fs.h"
22#include "xfs_shared.h"
23#include "xfs_format.h"
24#include "xfs_trans_resv.h"
25#include "xfs_mount.h"
26#include "xfs_defer.h"
27#include "xfs_btree.h"
28#include "xfs_bit.h"
29#include "xfs_log_format.h"
30#include "xfs_trans.h"
31#include "xfs_sb.h"
32#include "xfs_inode.h"
33#include "xfs_alloc.h"
34#include "scrub/scrub.h"
35#include "scrub/common.h"
36#include "scrub/btree.h"
37#include "scrub/trace.h"
38
39/* btree scrubbing */
40
41/*
42 * Check for btree operation errors. See the section about handling
43 * operational errors in common.c.
44 */
64b12563
DW
45static bool
46__xfs_scrub_btree_process_error(
537964bc
DW
47 struct xfs_scrub_context *sc,
48 struct xfs_btree_cur *cur,
49 int level,
64b12563
DW
50 int *error,
51 __u32 errflag,
52 void *ret_ip)
537964bc
DW
53{
54 if (*error == 0)
55 return true;
56
57 switch (*error) {
58 case -EDEADLOCK:
59 /* Used to restart an op with deadlock avoidance. */
60 trace_xfs_scrub_deadlock_retry(sc->ip, sc->sm, *error);
61 break;
62 case -EFSBADCRC:
63 case -EFSCORRUPTED:
64 /* Note the badness but don't abort. */
64b12563 65 sc->sm->sm_flags |= errflag;
537964bc
DW
66 *error = 0;
67 /* fall through */
68 default:
69 if (cur->bc_flags & XFS_BTREE_ROOT_IN_INODE)
70 trace_xfs_scrub_ifork_btree_op_error(sc, cur, level,
64b12563 71 *error, ret_ip);
537964bc
DW
72 else
73 trace_xfs_scrub_btree_op_error(sc, cur, level,
64b12563 74 *error, ret_ip);
537964bc
DW
75 break;
76 }
77 return false;
78}
79
64b12563
DW
80bool
81xfs_scrub_btree_process_error(
82 struct xfs_scrub_context *sc,
83 struct xfs_btree_cur *cur,
84 int level,
85 int *error)
86{
87 return __xfs_scrub_btree_process_error(sc, cur, level, error,
88 XFS_SCRUB_OFLAG_CORRUPT, __return_address);
89}
90
91bool
92xfs_scrub_btree_xref_process_error(
93 struct xfs_scrub_context *sc,
94 struct xfs_btree_cur *cur,
95 int level,
96 int *error)
97{
98 return __xfs_scrub_btree_process_error(sc, cur, level, error,
99 XFS_SCRUB_OFLAG_XFAIL, __return_address);
100}
101
537964bc 102/* Record btree block corruption. */
64b12563
DW
103static void
104__xfs_scrub_btree_set_corrupt(
537964bc
DW
105 struct xfs_scrub_context *sc,
106 struct xfs_btree_cur *cur,
64b12563
DW
107 int level,
108 __u32 errflag,
109 void *ret_ip)
537964bc 110{
64b12563 111 sc->sm->sm_flags |= errflag;
537964bc
DW
112
113 if (cur->bc_flags & XFS_BTREE_ROOT_IN_INODE)
114 trace_xfs_scrub_ifork_btree_error(sc, cur, level,
64b12563 115 ret_ip);
537964bc
DW
116 else
117 trace_xfs_scrub_btree_error(sc, cur, level,
64b12563
DW
118 ret_ip);
119}
120
121void
122xfs_scrub_btree_set_corrupt(
123 struct xfs_scrub_context *sc,
124 struct xfs_btree_cur *cur,
125 int level)
126{
127 __xfs_scrub_btree_set_corrupt(sc, cur, level, XFS_SCRUB_OFLAG_CORRUPT,
128 __return_address);
129}
130
131void
132xfs_scrub_btree_xref_set_corrupt(
133 struct xfs_scrub_context *sc,
134 struct xfs_btree_cur *cur,
135 int level)
136{
137 __xfs_scrub_btree_set_corrupt(sc, cur, level, XFS_SCRUB_OFLAG_XCORRUPT,
138 __return_address);
537964bc
DW
139}
140
37f3fa7f
DW
141/*
142 * Make sure this record is in order and doesn't stray outside of the parent
143 * keys.
144 */
145STATIC void
146xfs_scrub_btree_rec(
147 struct xfs_scrub_btree *bs)
148{
149 struct xfs_btree_cur *cur = bs->cur;
150 union xfs_btree_rec *rec;
151 union xfs_btree_key key;
152 union xfs_btree_key hkey;
153 union xfs_btree_key *keyp;
154 struct xfs_btree_block *block;
155 struct xfs_btree_block *keyblock;
156 struct xfs_buf *bp;
157
158 block = xfs_btree_get_block(cur, 0, &bp);
159 rec = xfs_btree_rec_addr(cur, cur->bc_ptrs[0], block);
160
161 trace_xfs_scrub_btree_rec(bs->sc, cur, 0);
162
163 /* If this isn't the first record, are they in order? */
164 if (!bs->firstrec && !cur->bc_ops->recs_inorder(cur, &bs->lastrec, rec))
165 xfs_scrub_btree_set_corrupt(bs->sc, cur, 0);
166 bs->firstrec = false;
167 memcpy(&bs->lastrec, rec, cur->bc_ops->rec_len);
168
169 if (cur->bc_nlevels == 1)
170 return;
171
172 /* Is this at least as large as the parent low key? */
173 cur->bc_ops->init_key_from_rec(&key, rec);
174 keyblock = xfs_btree_get_block(cur, 1, &bp);
175 keyp = xfs_btree_key_addr(cur, cur->bc_ptrs[1], keyblock);
176 if (cur->bc_ops->diff_two_keys(cur, &key, keyp) < 0)
177 xfs_scrub_btree_set_corrupt(bs->sc, cur, 1);
178
179 if (!(cur->bc_flags & XFS_BTREE_OVERLAPPING))
180 return;
181
182 /* Is this no larger than the parent high key? */
183 cur->bc_ops->init_high_key_from_rec(&hkey, rec);
184 keyp = xfs_btree_high_key_addr(cur, cur->bc_ptrs[1], keyblock);
185 if (cur->bc_ops->diff_two_keys(cur, keyp, &hkey) < 0)
186 xfs_scrub_btree_set_corrupt(bs->sc, cur, 1);
187}
188
189/*
190 * Make sure this key is in order and doesn't stray outside of the parent
191 * keys.
192 */
193STATIC void
194xfs_scrub_btree_key(
195 struct xfs_scrub_btree *bs,
196 int level)
197{
198 struct xfs_btree_cur *cur = bs->cur;
199 union xfs_btree_key *key;
200 union xfs_btree_key *keyp;
201 struct xfs_btree_block *block;
202 struct xfs_btree_block *keyblock;
203 struct xfs_buf *bp;
204
205 block = xfs_btree_get_block(cur, level, &bp);
206 key = xfs_btree_key_addr(cur, cur->bc_ptrs[level], block);
207
208 trace_xfs_scrub_btree_key(bs->sc, cur, level);
209
210 /* If this isn't the first key, are they in order? */
211 if (!bs->firstkey[level] &&
212 !cur->bc_ops->keys_inorder(cur, &bs->lastkey[level], key))
213 xfs_scrub_btree_set_corrupt(bs->sc, cur, level);
214 bs->firstkey[level] = false;
215 memcpy(&bs->lastkey[level], key, cur->bc_ops->key_len);
216
217 if (level + 1 >= cur->bc_nlevels)
218 return;
219
220 /* Is this at least as large as the parent low key? */
221 keyblock = xfs_btree_get_block(cur, level + 1, &bp);
222 keyp = xfs_btree_key_addr(cur, cur->bc_ptrs[level + 1], keyblock);
223 if (cur->bc_ops->diff_two_keys(cur, key, keyp) < 0)
224 xfs_scrub_btree_set_corrupt(bs->sc, cur, level);
225
226 if (!(cur->bc_flags & XFS_BTREE_OVERLAPPING))
227 return;
228
229 /* Is this no larger than the parent high key? */
230 key = xfs_btree_high_key_addr(cur, cur->bc_ptrs[level], block);
231 keyp = xfs_btree_high_key_addr(cur, cur->bc_ptrs[level + 1], keyblock);
232 if (cur->bc_ops->diff_two_keys(cur, keyp, key) < 0)
233 xfs_scrub_btree_set_corrupt(bs->sc, cur, level);
234}
235
cc3e0948
DW
236/*
237 * Check a btree pointer. Returns true if it's ok to use this pointer.
238 * Callers do not need to set the corrupt flag.
239 */
240static bool
241xfs_scrub_btree_ptr_ok(
242 struct xfs_scrub_btree *bs,
243 int level,
244 union xfs_btree_ptr *ptr)
245{
246 bool res;
247
248 /* A btree rooted in an inode has no block pointer to the root. */
249 if ((bs->cur->bc_flags & XFS_BTREE_ROOT_IN_INODE) &&
250 level == bs->cur->bc_nlevels)
251 return true;
252
253 /* Otherwise, check the pointers. */
254 if (bs->cur->bc_flags & XFS_BTREE_LONG_PTRS)
255 res = xfs_btree_check_lptr(bs->cur, be64_to_cpu(ptr->l), level);
256 else
257 res = xfs_btree_check_sptr(bs->cur, be32_to_cpu(ptr->s), level);
258 if (!res)
259 xfs_scrub_btree_set_corrupt(bs->sc, bs->cur, level);
260
261 return res;
262}
263
264/* Check that a btree block's sibling matches what we expect it. */
265STATIC int
266xfs_scrub_btree_block_check_sibling(
267 struct xfs_scrub_btree *bs,
268 int level,
269 int direction,
270 union xfs_btree_ptr *sibling)
271{
272 struct xfs_btree_cur *cur = bs->cur;
273 struct xfs_btree_block *pblock;
274 struct xfs_buf *pbp;
275 struct xfs_btree_cur *ncur = NULL;
276 union xfs_btree_ptr *pp;
277 int success;
278 int error;
279
280 error = xfs_btree_dup_cursor(cur, &ncur);
281 if (!xfs_scrub_btree_process_error(bs->sc, cur, level + 1, &error) ||
282 !ncur)
283 return error;
284
285 /*
286 * If the pointer is null, we shouldn't be able to move the upper
287 * level pointer anywhere.
288 */
289 if (xfs_btree_ptr_is_null(cur, sibling)) {
290 if (direction > 0)
291 error = xfs_btree_increment(ncur, level + 1, &success);
292 else
293 error = xfs_btree_decrement(ncur, level + 1, &success);
294 if (error == 0 && success)
295 xfs_scrub_btree_set_corrupt(bs->sc, cur, level);
296 error = 0;
297 goto out;
298 }
299
300 /* Increment upper level pointer. */
301 if (direction > 0)
302 error = xfs_btree_increment(ncur, level + 1, &success);
303 else
304 error = xfs_btree_decrement(ncur, level + 1, &success);
305 if (!xfs_scrub_btree_process_error(bs->sc, cur, level + 1, &error))
306 goto out;
307 if (!success) {
308 xfs_scrub_btree_set_corrupt(bs->sc, cur, level + 1);
309 goto out;
310 }
311
312 /* Compare upper level pointer to sibling pointer. */
313 pblock = xfs_btree_get_block(ncur, level + 1, &pbp);
314 pp = xfs_btree_ptr_addr(ncur, ncur->bc_ptrs[level + 1], pblock);
315 if (!xfs_scrub_btree_ptr_ok(bs, level + 1, pp))
316 goto out;
cf1b0b8b
DW
317 if (pbp)
318 xfs_scrub_buffer_recheck(bs->sc, pbp);
cc3e0948
DW
319
320 if (xfs_btree_diff_two_ptrs(cur, pp, sibling))
321 xfs_scrub_btree_set_corrupt(bs->sc, cur, level);
322out:
323 xfs_btree_del_cursor(ncur, XFS_BTREE_ERROR);
324 return error;
325}
326
327/* Check the siblings of a btree block. */
328STATIC int
329xfs_scrub_btree_block_check_siblings(
330 struct xfs_scrub_btree *bs,
331 struct xfs_btree_block *block)
332{
333 struct xfs_btree_cur *cur = bs->cur;
334 union xfs_btree_ptr leftsib;
335 union xfs_btree_ptr rightsib;
336 int level;
337 int error = 0;
338
339 xfs_btree_get_sibling(cur, block, &leftsib, XFS_BB_LEFTSIB);
340 xfs_btree_get_sibling(cur, block, &rightsib, XFS_BB_RIGHTSIB);
341 level = xfs_btree_get_level(block);
342
343 /* Root block should never have siblings. */
344 if (level == cur->bc_nlevels - 1) {
345 if (!xfs_btree_ptr_is_null(cur, &leftsib) ||
346 !xfs_btree_ptr_is_null(cur, &rightsib))
347 xfs_scrub_btree_set_corrupt(bs->sc, cur, level);
348 goto out;
349 }
350
351 /*
352 * Does the left & right sibling pointers match the adjacent
353 * parent level pointers?
354 * (These function absorbs error codes for us.)
355 */
356 error = xfs_scrub_btree_block_check_sibling(bs, level, -1, &leftsib);
357 if (error)
358 return error;
359 error = xfs_scrub_btree_block_check_sibling(bs, level, 1, &rightsib);
360 if (error)
361 return error;
362out:
363 return error;
364}
365
858333dc
DW
366struct check_owner {
367 struct list_head list;
368 xfs_daddr_t daddr;
369 int level;
370};
371
372/*
373 * Make sure this btree block isn't in the free list and that there's
374 * an rmap record for it.
375 */
376STATIC int
377xfs_scrub_btree_check_block_owner(
378 struct xfs_scrub_btree *bs,
379 int level,
380 xfs_daddr_t daddr)
381{
382 xfs_agnumber_t agno;
52dc4b44
DW
383 xfs_agblock_t agbno;
384 xfs_btnum_t btnum;
858333dc
DW
385 bool init_sa;
386 int error = 0;
387
388 if (!bs->cur)
389 return 0;
390
52dc4b44 391 btnum = bs->cur->bc_btnum;
858333dc 392 agno = xfs_daddr_to_agno(bs->cur->bc_mp, daddr);
52dc4b44 393 agbno = xfs_daddr_to_agbno(bs->cur->bc_mp, daddr);
858333dc
DW
394
395 init_sa = bs->cur->bc_flags & XFS_BTREE_LONG_PTRS;
396 if (init_sa) {
397 error = xfs_scrub_ag_init(bs->sc, agno, &bs->sc->sa);
398 if (!xfs_scrub_btree_xref_process_error(bs->sc, bs->cur,
399 level, &error))
400 return error;
401 }
402
52dc4b44
DW
403 xfs_scrub_xref_is_used_space(bs->sc, agbno, 1);
404 /*
405 * The bnobt scrubber aliases bs->cur to bs->sc->sa.bno_cur, so we
406 * have to nullify it (to shut down further block owner checks) if
407 * self-xref encounters problems.
408 */
409 if (!bs->sc->sa.bno_cur && btnum == XFS_BTNUM_BNO)
410 bs->cur = NULL;
411
d852657c
DW
412 xfs_scrub_xref_is_owned_by(bs->sc, agbno, 1, bs->oinfo);
413 if (!bs->sc->sa.rmap_cur && btnum == XFS_BTNUM_RMAP)
414 bs->cur = NULL;
415
858333dc
DW
416 if (init_sa)
417 xfs_scrub_ag_free(bs->sc, &bs->sc->sa);
418
419 return error;
420}
421
422/* Check the owner of a btree block. */
423STATIC int
424xfs_scrub_btree_check_owner(
425 struct xfs_scrub_btree *bs,
426 int level,
427 struct xfs_buf *bp)
428{
429 struct xfs_btree_cur *cur = bs->cur;
430 struct check_owner *co;
431
432 if ((cur->bc_flags & XFS_BTREE_ROOT_IN_INODE) && bp == NULL)
433 return 0;
434
435 /*
436 * We want to cross-reference each btree block with the bnobt
437 * and the rmapbt. We cannot cross-reference the bnobt or
438 * rmapbt while scanning the bnobt or rmapbt, respectively,
439 * because we cannot alter the cursor and we'd prefer not to
440 * duplicate cursors. Therefore, save the buffer daddr for
441 * later scanning.
442 */
443 if (cur->bc_btnum == XFS_BTNUM_BNO || cur->bc_btnum == XFS_BTNUM_RMAP) {
444 co = kmem_alloc(sizeof(struct check_owner),
445 KM_MAYFAIL | KM_NOFS);
446 if (!co)
447 return -ENOMEM;
448 co->level = level;
449 co->daddr = XFS_BUF_ADDR(bp);
450 list_add_tail(&co->list, &bs->to_check);
451 return 0;
452 }
453
454 return xfs_scrub_btree_check_block_owner(bs, level, XFS_BUF_ADDR(bp));
455}
456
cc3e0948
DW
457/*
458 * Grab and scrub a btree block given a btree pointer. Returns block
459 * and buffer pointers (if applicable) if they're ok to use.
460 */
461STATIC int
462xfs_scrub_btree_get_block(
463 struct xfs_scrub_btree *bs,
464 int level,
465 union xfs_btree_ptr *pp,
466 struct xfs_btree_block **pblock,
467 struct xfs_buf **pbp)
468{
469 void *failed_at;
470 int error;
471
472 *pblock = NULL;
473 *pbp = NULL;
474
475 error = xfs_btree_lookup_get_block(bs->cur, level, pp, pblock);
476 if (!xfs_scrub_btree_process_error(bs->sc, bs->cur, level, &error) ||
a605e869 477 !*pblock)
cc3e0948
DW
478 return error;
479
480 xfs_btree_get_block(bs->cur, level, pbp);
481 if (bs->cur->bc_flags & XFS_BTREE_LONG_PTRS)
482 failed_at = __xfs_btree_check_lblock(bs->cur, *pblock,
483 level, *pbp);
484 else
485 failed_at = __xfs_btree_check_sblock(bs->cur, *pblock,
486 level, *pbp);
487 if (failed_at) {
488 xfs_scrub_btree_set_corrupt(bs->sc, bs->cur, level);
489 return 0;
490 }
cf1b0b8b
DW
491 if (*pbp)
492 xfs_scrub_buffer_recheck(bs->sc, *pbp);
cc3e0948 493
858333dc
DW
494 /*
495 * Check the block's owner; this function absorbs error codes
496 * for us.
497 */
498 error = xfs_scrub_btree_check_owner(bs, level, *pbp);
499 if (error)
500 return error;
501
cc3e0948
DW
502 /*
503 * Check the block's siblings; this function absorbs error codes
504 * for us.
505 */
506 return xfs_scrub_btree_block_check_siblings(bs, *pblock);
507}
508
2fdbec5c
DW
509/*
510 * Check that the low and high keys of this block match the keys stored
511 * in the parent block.
512 */
513STATIC void
514xfs_scrub_btree_block_keys(
515 struct xfs_scrub_btree *bs,
516 int level,
517 struct xfs_btree_block *block)
518{
519 union xfs_btree_key block_keys;
520 struct xfs_btree_cur *cur = bs->cur;
521 union xfs_btree_key *high_bk;
522 union xfs_btree_key *parent_keys;
523 union xfs_btree_key *high_pk;
524 struct xfs_btree_block *parent_block;
525 struct xfs_buf *bp;
526
527 if (level >= cur->bc_nlevels - 1)
528 return;
529
530 /* Calculate the keys for this block. */
531 xfs_btree_get_keys(cur, block, &block_keys);
532
533 /* Obtain the parent's copy of the keys for this block. */
534 parent_block = xfs_btree_get_block(cur, level + 1, &bp);
535 parent_keys = xfs_btree_key_addr(cur, cur->bc_ptrs[level + 1],
536 parent_block);
537
538 if (cur->bc_ops->diff_two_keys(cur, &block_keys, parent_keys) != 0)
539 xfs_scrub_btree_set_corrupt(bs->sc, cur, 1);
540
541 if (!(cur->bc_flags & XFS_BTREE_OVERLAPPING))
542 return;
543
544 /* Get high keys */
545 high_bk = xfs_btree_high_key_from_key(cur, &block_keys);
546 high_pk = xfs_btree_high_key_addr(cur, cur->bc_ptrs[level + 1],
547 parent_block);
548
549 if (cur->bc_ops->diff_two_keys(cur, high_bk, high_pk) != 0)
550 xfs_scrub_btree_set_corrupt(bs->sc, cur, 1);
551}
552
537964bc
DW
553/*
554 * Visit all nodes and leaves of a btree. Check that all pointers and
555 * records are in order, that the keys reflect the records, and use a callback
cc3e0948 556 * so that the caller can verify individual records.
537964bc
DW
557 */
558int
559xfs_scrub_btree(
560 struct xfs_scrub_context *sc,
561 struct xfs_btree_cur *cur,
562 xfs_scrub_btree_rec_fn scrub_fn,
563 struct xfs_owner_info *oinfo,
564 void *private)
565{
88aa5de4 566 struct xfs_scrub_btree bs = { NULL };
cc3e0948
DW
567 union xfs_btree_ptr ptr;
568 union xfs_btree_ptr *pp;
37f3fa7f 569 union xfs_btree_rec *recp;
cc3e0948
DW
570 struct xfs_btree_block *block;
571 int level;
572 struct xfs_buf *bp;
858333dc
DW
573 struct check_owner *co;
574 struct check_owner *n;
cc3e0948
DW
575 int i;
576 int error = 0;
577
578 /* Initialize scrub state */
579 bs.cur = cur;
580 bs.scrub_rec = scrub_fn;
581 bs.oinfo = oinfo;
582 bs.firstrec = true;
583 bs.private = private;
584 bs.sc = sc;
585 for (i = 0; i < XFS_BTREE_MAXLEVELS; i++)
586 bs.firstkey[i] = true;
587 INIT_LIST_HEAD(&bs.to_check);
588
589 /* Don't try to check a tree with a height we can't handle. */
590 if (cur->bc_nlevels > XFS_BTREE_MAXLEVELS) {
591 xfs_scrub_btree_set_corrupt(sc, cur, 0);
592 goto out;
593 }
594
595 /*
596 * Load the root of the btree. The helper function absorbs
597 * error codes for us.
598 */
599 level = cur->bc_nlevels - 1;
600 cur->bc_ops->init_ptr_from_cur(cur, &ptr);
601 if (!xfs_scrub_btree_ptr_ok(&bs, cur->bc_nlevels, &ptr))
602 goto out;
603 error = xfs_scrub_btree_get_block(&bs, level, &ptr, &block, &bp);
604 if (error || !block)
605 goto out;
606
607 cur->bc_ptrs[level] = 1;
608
609 while (level < cur->bc_nlevels) {
610 block = xfs_btree_get_block(cur, level, &bp);
611
612 if (level == 0) {
613 /* End of leaf, pop back towards the root. */
614 if (cur->bc_ptrs[level] >
615 be16_to_cpu(block->bb_numrecs)) {
2fdbec5c 616 xfs_scrub_btree_block_keys(&bs, level, block);
cc3e0948
DW
617 if (level < cur->bc_nlevels - 1)
618 cur->bc_ptrs[level + 1]++;
619 level++;
620 continue;
621 }
622
37f3fa7f
DW
623 /* Records in order for scrub? */
624 xfs_scrub_btree_rec(&bs);
625
626 /* Call out to the record checker. */
627 recp = xfs_btree_rec_addr(cur, cur->bc_ptrs[0], block);
628 error = bs.scrub_rec(&bs, recp);
629 if (error)
630 break;
631 if (xfs_scrub_should_terminate(sc, &error) ||
632 (sc->sm->sm_flags & XFS_SCRUB_OFLAG_CORRUPT))
cc3e0948
DW
633 break;
634
635 cur->bc_ptrs[level]++;
636 continue;
637 }
638
639 /* End of node, pop back towards the root. */
640 if (cur->bc_ptrs[level] > be16_to_cpu(block->bb_numrecs)) {
2fdbec5c 641 xfs_scrub_btree_block_keys(&bs, level, block);
cc3e0948
DW
642 if (level < cur->bc_nlevels - 1)
643 cur->bc_ptrs[level + 1]++;
644 level++;
645 continue;
646 }
647
37f3fa7f
DW
648 /* Keys in order for scrub? */
649 xfs_scrub_btree_key(&bs, level);
650
cc3e0948
DW
651 /* Drill another level deeper. */
652 pp = xfs_btree_ptr_addr(cur, cur->bc_ptrs[level], block);
653 if (!xfs_scrub_btree_ptr_ok(&bs, level, pp)) {
654 cur->bc_ptrs[level]++;
655 continue;
656 }
657 level--;
658 error = xfs_scrub_btree_get_block(&bs, level, pp, &block, &bp);
659 if (error || !block)
660 goto out;
661
662 cur->bc_ptrs[level] = 1;
663 }
537964bc 664
cc3e0948 665out:
858333dc
DW
666 /* Process deferred owner checks on btree blocks. */
667 list_for_each_entry_safe(co, n, &bs.to_check, list) {
668 if (!error && bs.cur)
669 error = xfs_scrub_btree_check_block_owner(&bs,
670 co->level, co->daddr);
671 list_del(&co->list);
672 kmem_free(co);
673 }
674
537964bc
DW
675 return error;
676}