Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp641056ybi; Tue, 16 Jul 2019 03:05:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqwZwY2jJ8kVXrXrlcuOTYooRjOGWg6Y5OYuJXUrsRGNocP2C198viHKgTaNPLG19TGoufaT X-Received: by 2002:a17:90a:d791:: with SMTP id z17mr33320390pju.40.1563271511463; Tue, 16 Jul 2019 03:05:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563271511; cv=none; d=google.com; s=arc-20160816; b=0aurqAX8J/HsqBVURFryuOrs2h6NP6fyc1PtDBFINkEUktlmKJGY4z+WH1kCTsjKzr W8cLhAKCBHq4KCthGX8F62LfCM2F3tpZ9WjL7nIh05SA2pIOA8UsOiq6VPrJE7PgmN1E E5uPGp/2h9Cq00Eb+dXiHrUyiJdMxofNE1YqnjCj2/b+yku9t9g1ct46eb+z6pWHpGoi Ok9IVLQeG1nKcvToNX9y7A9ixXELNBhvL91E1Q7svVAqEN383O1vQyMldQFYGV3Qsb7W EAwTFgImkfVuE0RElP+scIM+qgBcaVIkrJeOz5N9uyXarmyHXQ5szQs1Axigw7sJ5ppn gjug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:references:cc:to:from:subject; bh=BSUY5qRxni8VHmSKhxtavKVobNaqXM0nNcFnMM0ZEGc=; b=pX8DVbVCBMAm2xXt9VO0MaStfJ4GqM1QRD5sCKZ9ucYnsa9lV5y1ESmTVMReeVl7CD geyDOnlhYA6KVAdr/9YxHGyIEnElXhh+xRIGQ+IUxfmLZoC1/qzoxvCdK/bR+xVr4GBC ZTOgKZC4aed7TceHhEXKDRX2PGvudYRGF0Qr1EeZRsyCptsvetHZX+4miavo6osdk2Jv FLQFuFRjACd9aXdV47rBOMgqBkaxuWKWDeJi6DsQYVmw5r0x0QNKZnikJUNPgPZwoVnj VoyfKX04f+maf2BvNpJmzoPXHiW6E+eKvmxD+4hvlbqwOfXz80EKFfTyoSiq4q5jgg1A gckA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i15si19377026pfd.259.2019.07.16.03.04.52; Tue, 16 Jul 2019 03:05:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732469AbfGPKC2 (ORCPT + 99 others); Tue, 16 Jul 2019 06:02:28 -0400 Received: from szxga07-in.huawei.com ([45.249.212.35]:44684 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727849AbfGPKC2 (ORCPT ); Tue, 16 Jul 2019 06:02:28 -0400 Received: from DGGEMS403-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id C042B4E321EA8CF8BCE8; Tue, 16 Jul 2019 18:02:26 +0800 (CST) Received: from [10.134.22.195] (10.134.22.195) by smtp.huawei.com (10.3.19.203) with Microsoft SMTP Server (TLS) id 14.3.439.0; Tue, 16 Jul 2019 18:02:23 +0800 Subject: Re: [f2fs-dev] [PATCH] f2fs: fix to do sanity with enabled features in image From: Chao Yu To: Jaegeuk Kim , Chao Yu CC: , References: <20190424094850.118323-1-yuchao0@huawei.com> <20190428133802.GB37346@jaegeuk-macbookpro.roam.corp.google.com> <373f4633-d331-5cf3-74b7-e982072bc4b4@kernel.org> <20190501032242.GA84420@jaegeuk-macbookpro.roam.corp.google.com> <3f170d86-e556-13ae-ce19-3bba3944f5fa@huawei.com> <192bae92-2193-570f-7b50-00334271bd2e@huawei.com> Message-ID: Date: Tue, 16 Jul 2019 18:02:21 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <192bae92-2193-570f-7b50-00334271bd2e@huawei.com> Content-Type: text/plain; charset="windows-1252" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.134.22.195] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Jaegeuk, On 2019/5/9 9:15, Chao Yu wrote: > On 2019/5/5 10:51, Chao Yu wrote: >> On 2019/5/1 11:22, Jaegeuk Kim wrote: >>> On 04/29, Chao Yu wrote: >>>> On 2019-4-28 21:38, Jaegeuk Kim wrote: >>>>> On 04/24, Chao Yu wrote: >>>>>> This patch fixes to do sanity with enabled features in image, if >>>>>> there are features kernel can not recognize, just fail the mount. >>>>> >>>>> We need to figure out per-feature-based rejection, since some of them can >>>>> be set without layout change. What about adding one field in superblock for compatible features in future? sb.feature(F2FS_FEATURE_LAST, max] stores uncompatible features sb.compatible_feature stores compatible features If we follow above rule when adding one feature, then, we can fail the mount if sb.feature(F2FS_FEATURE_LAST, max] is valid. Thanks, >>>> >>>> So any suggestion on how to implement this? >>> >>> Which features do we need to disallow? When we introduce new features, they >> >> I guess it should be the new features. >> >>> didn't hurt the previous flow by checking f2fs_sb_has_###(). >> >> Yes, but new features may use new disk layout, if old kernel handled it with old >> disk layout, there must be problematic. >> >> e.g. format image with -O extra_attr, and mount it with kernel who don't >> recognize new inode layout. > > Jaegeuk, > > Any thoughts? > > Thanks, > >> >> Thanks, >> >>> >>>> >>>> Maybe: >>>> >>>> if (LINUX_VERSION_CODE < KERNEL_VERSION(4, 14, 0)) >>>> check 4.14+ features >>>> else if (LINUX_VERSION_CODE < KERNEL_VERSION(4, 9, 0)) >>>> check 4.9+ features >>>> else if (LINUX_VERSION_CODE < KERNEL_VERSION(4, 4, 0)) >>>> check 4.4+ features >>>> >>>> Thanks, >>>> >>>>> >>>>>> >>>>>> Signed-off-by: Chao Yu >>>>>> --- >>>>>> fs/f2fs/f2fs.h | 13 +++++++++++++ >>>>>> fs/f2fs/super.c | 9 +++++++++ >>>>>> 2 files changed, 22 insertions(+) >>>>>> >>>>>> diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h >>>>>> index f5ffc09705eb..15b640967e12 100644 >>>>>> --- a/fs/f2fs/f2fs.h >>>>>> +++ b/fs/f2fs/f2fs.h >>>>>> @@ -151,6 +151,19 @@ struct f2fs_mount_info { >>>>>> #define F2FS_FEATURE_VERITY 0x0400 /* reserved */ >>>>>> #define F2FS_FEATURE_SB_CHKSUM 0x0800 >>>>>> >>>>>> +#define F2FS_ALL_FEATURES (F2FS_FEATURE_ENCRYPT | \ >>>>>> + F2FS_FEATURE_BLKZONED | \ >>>>>> + F2FS_FEATURE_ATOMIC_WRITE | \ >>>>>> + F2FS_FEATURE_EXTRA_ATTR | \ >>>>>> + F2FS_FEATURE_PRJQUOTA | \ >>>>>> + F2FS_FEATURE_INODE_CHKSUM | \ >>>>>> + F2FS_FEATURE_FLEXIBLE_INLINE_XATTR | \ >>>>>> + F2FS_FEATURE_QUOTA_INO | \ >>>>>> + F2FS_FEATURE_INODE_CRTIME | \ >>>>>> + F2FS_FEATURE_LOST_FOUND | \ >>>>>> + F2FS_FEATURE_VERITY | \ >>>>>> + F2FS_FEATURE_SB_CHKSUM) >>>>>> + >>>>>> #define __F2FS_HAS_FEATURE(raw_super, mask) \ >>>>>> ((raw_super->feature & cpu_to_le32(mask)) != 0) >>>>>> #define F2FS_HAS_FEATURE(sbi, mask) __F2FS_HAS_FEATURE(sbi->raw_super, mask) >>>>>> diff --git a/fs/f2fs/super.c b/fs/f2fs/super.c >>>>>> index 4f8e9ab48b26..57f2fc6d14ba 100644 >>>>>> --- a/fs/f2fs/super.c >>>>>> +++ b/fs/f2fs/super.c >>>>>> @@ -2573,6 +2573,15 @@ static int sanity_check_raw_super(struct f2fs_sb_info *sbi, >>>>>> return 1; >>>>>> } >>>>>> >>>>>> + /* check whether kernel supports all features */ >>>>>> + if (le32_to_cpu(raw_super->feature) & (~F2FS_ALL_FEATURES)) { >>>>>> + f2fs_msg(sb, KERN_INFO, >>>>>> + "Unsupported feature:%u: supported:%u", >>>>>> + le32_to_cpu(raw_super->feature), >>>>>> + F2FS_ALL_FEATURES); >>>>>> + return 1; >>>>>> + } >>>>>> + >>>>>> /* check CP/SIT/NAT/SSA/MAIN_AREA area boundary */ >>>>>> if (sanity_check_area_boundary(sbi, bh)) >>>>>> return 1; >>>>>> -- >>>>>> 2.18.0.rc1 >>> . >>> >> >> >> _______________________________________________ >> Linux-f2fs-devel mailing list >> Linux-f2fs-devel@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/linux-f2fs-devel >> . >> > > > _______________________________________________ > Linux-f2fs-devel mailing list > Linux-f2fs-devel@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/linux-f2fs-devel > . >