Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2615954ybl; Thu, 19 Dec 2019 17:13:23 -0800 (PST) X-Google-Smtp-Source: APXvYqy9+9Q5tvoQgJTsLLZSWRTO7PLT7pwQcLnURQ8aq+20CGcIVs11F8+AHOVhND9TeZpWCuwS X-Received: by 2002:a05:6830:110a:: with SMTP id w10mr12269144otq.300.1576804403694; Thu, 19 Dec 2019 17:13:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576804403; cv=none; d=google.com; s=arc-20160816; b=dNjBRuE+Wj1eS5fQd2Q3hni77azUhhTaWUewxRxFKiBPgjJGzjG7wYWM3hHpWMSnF0 trPtBouzb+C7sgMYX6d4DbT/xLmM0HB50AqTFx6zTorTuyFNM20N76LSNiQA+qZU4ZVm INME3hxBHmXnJCpFP3Ngq6HO9ZFWmO63ucL+SjtZ+scyYWTcW2Uc48Iz8+/v/Va7yZcK YikmUWojmBr9zXJwPNS/gqUDEcOC/t69ml4j/NS40u/tZp0TDMVg+IbX2PhaVVedPfaa TLSlDV0t1Df9Z053ZyldrrD9aUQtyJM7LDcYHJ3GurbuYL78bfoFAQmov3EOEaWmGGR5 qz+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=X5HNT42QisQduKehbSs8UQJ10eWyM33I3GFLqBLcDxM=; b=rhMZS0gXPjAgpQ2ZsMWYZS3AdmFcBGlCPgqZOTSH7Qdzf4daABU8WNxH4DdeeyIC47 UjsUtAcUhQ1LuhOIljn0Y3k5DwHQW2tOg0ZmpCcO3aqlT3ZrqzSvChjkxfHm+WF9iY15 LtjeytaAJm3T9XZLVEcj/L2UCYOyt2cB/rlE/DqZFHd8aGudo8cLL2Qt0Fp5iZ/fA8m1 xDpLiMp1gjnKL6yCKH4ZzmUPQldQ7B+NmwBwFx6s0mAF8pVVGjs7TkBkrwNVk6P4j4wZ CuLGePJvI37ydX5tg2zU+xYZhIhJIp/E162Rsjkc3gGQ+1EFs51aHimflAq3qLA2j/HI LXGQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w4si4268727otq.144.2019.12.19.17.13.11; Thu, 19 Dec 2019 17:13:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727190AbfLTBLz (ORCPT + 99 others); Thu, 19 Dec 2019 20:11:55 -0500 Received: from out30-57.freemail.mail.aliyun.com ([115.124.30.57]:49436 "EHLO out30-57.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726992AbfLTBLz (ORCPT ); Thu, 19 Dec 2019 20:11:55 -0500 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R851e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04420;MF=joseph.qi@linux.alibaba.com;NM=1;PH=DS;RN=7;SR=0;TI=SMTPD_---0TlNroLM_1576804311; Received: from JosephdeMacBook-Pro.local(mailfrom:joseph.qi@linux.alibaba.com fp:SMTPD_---0TlNroLM_1576804311) by smtp.aliyun-inc.com(127.0.0.1); Fri, 20 Dec 2019 09:11:51 +0800 Subject: Re: [Ocfs2-devel] [PATCH v3] ocfs2: call journal flush to mark journal as empty after journal recovery when mount To: piaojun , Kai Li , mark@fasheh.com, jlbec@evilplan.org, chge@linux.alibaba.com Cc: linux-kernel@vger.kernel.org, ocfs2-devel@oss.oracle.com References: <20191217020140.2197-1-li.kai4@h3c.com> <5DFB860A.6020501@huawei.com> From: Joseph Qi Message-ID: <05cf7457-31f2-0698-14ae-21a9e7b659cb@linux.alibaba.com> Date: Fri, 20 Dec 2019 09:11:50 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.11; rv:60.0) Gecko/20100101 Thunderbird/60.9.1 MIME-Version: 1.0 In-Reply-To: <5DFB860A.6020501@huawei.com> Content-Type: text/plain; charset=windows-1252 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 19/12/19 22:15, piaojun wrote: > > > On 2019/12/17 10:01, Kai Li wrote: >> If journal is dirty when mount, it will be replayed but jbd2 sb >> log tail cannot be updated to mark a new start because >> journal->j_flag has already been set with JBD2_ABORT first >> in journal_init_common. When a new transaction is committed, it >> will be recored in block 1 first(journal->j_tail is set to 1 in >> journal_reset).If emergency restart happens again before journal >> super block is updated unfortunately, the new recorded trans will >> not be replayed in the next mount. >> >> The following steps describe this procedure in detail. >> 1. mount and touch some files >> 2. these transactions are committed to journal area but not checkpointed >> 3. emergency restart >> 4. mount again and its journals are replayed >> 5. journal super block's first s_start is 1, but its s_seq is not updated >> 6. touch a new file and its trans is committed but not checkpointed >> 7. emergency restart again >> 8. mount and journal is dirty, but trans committed in 6 will not be >> replayed. >> >> This exception happens easily when this lun is used by only one node. If it >> is used by multi-nodes, other node will replay its journal and its >> journal super block will be updated after recovery like what this patch >> does. >> >> ocfs2_recover_node->ocfs2_replay_journal. >> >> The following jbd2 journal can be generated by touching a new file after >> journal is replayed, and seq 15 is the first valid commit, but first seq >> is 13 in journal super block. >> logdump: >> Block 0: Journal Superblock >> Seq: 0 Type: 4 (JBD2_SUPERBLOCK_V2) >> Blocksize: 4096 Total Blocks: 32768 First Block: 1 >> First Commit ID: 13 Start Log Blknum: 1 >> Error: 0 >> Feature Compat: 0 >> Feature Incompat: 2 block64 >> Feature RO compat: 0 >> Journal UUID: 4ED3822C54294467A4F8E87D2BA4BC36 >> FS Share Cnt: 1 Dynamic Superblk Blknum: 0 >> Per Txn Block Limit Journal: 0 Data: 0 >> >> Block 1: Journal Commit Block >> Seq: 14 Type: 2 (JBD2_COMMIT_BLOCK) >> >> Block 2: Journal Descriptor >> Seq: 15 Type: 1 (JBD2_DESCRIPTOR_BLOCK) >> No. Blocknum Flags >> 0. 587 none >> UUID: 00000000000000000000000000000000 >> 1. 8257792 JBD2_FLAG_SAME_UUID >> 2. 619 JBD2_FLAG_SAME_UUID >> 3. 24772864 JBD2_FLAG_SAME_UUID >> 4. 8257802 JBD2_FLAG_SAME_UUID >> 5. 513 JBD2_FLAG_SAME_UUID JBD2_FLAG_LAST_TAG >> ... >> Block 7: Inode >> Inode: 8257802 Mode: 0640 Generation: 57157641 (0x3682809) >> FS Generation: 2839773110 (0xa9437fb6) >> CRC32: 00000000 ECC: 0000 >> Type: Regular Attr: 0x0 Flags: Valid >> Dynamic Features: (0x1) InlineData >> User: 0 (root) Group: 0 (root) Size: 7 >> Links: 1 Clusters: 0 >> ctime: 0x5de5d870 0x11104c61 -- Tue Dec 3 11:37:20.286280801 2019 >> atime: 0x5de5d870 0x113181a1 -- Tue Dec 3 11:37:20.288457121 2019 >> mtime: 0x5de5d870 0x11104c61 -- Tue Dec 3 11:37:20.286280801 2019 >> dtime: 0x0 -- Thu Jan 1 08:00:00 1970 >> ... >> Block 9: Journal Commit Block >> Seq: 15 Type: 2 (JBD2_COMMIT_BLOCK) >> >> The following is jouranl recovery log when recovering the upper jbd2 >> journal when mount again. >> syslog: >> [ 2265.648622] ocfs2: File system on device (252,1) was not unmounted cleanly, recovering it. >> [ 2265.649695] fs/jbd2/recovery.c:(do_one_pass, 449): Starting recovery pass 0 >> [ 2265.650407] fs/jbd2/recovery.c:(do_one_pass, 449): Starting recovery pass 1 >> [ 2265.650409] fs/jbd2/recovery.c:(do_one_pass, 449): Starting recovery pass 2 >> [ 2265.650410] fs/jbd2/recovery.c:(jbd2_journal_recover, 278): JBD2: recovery, exit status 0, recovered transactions 13 to 13 >> >> Due to first commit seq 13 recorded in journal super is not consistent >> with the value recorded in block 1(seq is 14), journal recovery will be >> terminated before seq 15 even though it is an unbroken commit, inode >> 8257802 is a new file and it will be lost. >> >> Signed-off-by: Kai Li >> --- >> fs/ocfs2/journal.c | 8 ++++++++ >> 1 file changed, 8 insertions(+) >> >> diff --git a/fs/ocfs2/journal.c b/fs/ocfs2/journal.c >> index 1afe57f425a0..68ba354cf361 100644 >> --- a/fs/ocfs2/journal.c >> +++ b/fs/ocfs2/journal.c >> @@ -1066,6 +1066,14 @@ int ocfs2_journal_load(struct ocfs2_journal *journal, int local, int replayed) >> >> ocfs2_clear_journal_error(osb->sb, journal->j_journal, osb->slot_num); >> >> + if (replayed) { >> + jbd2_journal_lock_updates(journal->j_journal); >> + status = jbd2_journal_flush(journal->j_journal); > > What if jbd2_journal_flush gets failed? The 's_sequence' and 's_start' > won't be reset, and I wonder if the problem still remains. > Yes, but we don't want this to fail the mount process, instead we just log an error and system administrator should know the result. Thanks, Joseph