Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp215473pxf; Wed, 24 Mar 2021 03:27:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwWvard+lyRuLZf2fMSKa8LRgQ2kYXpPnSNdvB64cGth4mD8jYXcK/0KHBYwJBhDYXpGxLw X-Received: by 2002:aa7:cd16:: with SMTP id b22mr2659652edw.357.1616581632688; Wed, 24 Mar 2021 03:27:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616581632; cv=none; d=google.com; s=arc-20160816; b=gbc7PAV2XvpAi3mSu3otSXMP3vTZWfGXeSVAtAETCihcmdAHXjpM1RR13gOS0Xo/u/ PwmMViydbxyxpeQz+UWwUB3ObxrnkusmAGBR8b3cMb3Cim8Fju4u6tIBgkgFIbm0EhL0 FylDw+cywSxaPxwXg0uJ2dsxWVyfq4WRKbNYfh/5YZxTfTRNSFnsrsGDo2Xg1lgL1xvx DbXPszjmbHqpu+V8II5KFNUgC+8ZjRyuHithDdhPL88xtbv+rb0OfXjWjiAYfLzYfWRU gnSCiyc42ETjUeyI2N9Adq6ZXE0iAtCufHXrISY9rHU38T91EQE9qZnADp5B4zKGW0UV BBjg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=REk9Ow+oumM9ig0pGqRRwd6bqXzR3Q7BHD/Dg15xPxk=; b=O6rFfDZfdc9w17fiyc9q/itu4pGo8Iys2atS/kqpUS9OrGovDtWY77zyrn8ftjRzrr HhEYUW53M0rNm5dUU0ImYsz05rNE6ic8DHNkKNuLV33N3TkmrA9tRKfj9T8ntkkgMDUc y1zlMCtTcS4IXS2nC/HvotfiVnusX979p6e95LYv2T+CnUBO5hqCKcjMfasDX/hu4n1b N9Zw/1ImCGgcdPO4go08tbm2pWBaes4KUb1eiv58njb1QKiSbS98oB7QYS15M+Vnqgmo pNoNFpxo3bAdXuK5EmlEkXxaWDc9tJDKsVEOUpEufdiSsLoUjeK9wgeP7vBvaq+tLtTq aJNQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cf5si1374872ejb.346.2021.03.24.03.26.50; Wed, 24 Mar 2021 03:27:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232802AbhCXHta (ORCPT + 99 others); Wed, 24 Mar 2021 03:49:30 -0400 Received: from szxga04-in.huawei.com ([45.249.212.190]:13676 "EHLO szxga04-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232265AbhCXHtC (ORCPT ); Wed, 24 Mar 2021 03:49:02 -0400 Received: from DGGEMS412-HUB.china.huawei.com (unknown [172.30.72.59]) by szxga04-in.huawei.com (SkyGuard) with ESMTP id 4F50fn3nyNznV4Q; Wed, 24 Mar 2021 15:46:25 +0800 (CST) Received: from [10.136.110.154] (10.136.110.154) by smtp.huawei.com (10.3.19.212) with Microsoft SMTP Server (TLS) id 14.3.498.0; Wed, 24 Mar 2021 15:48:51 +0800 Subject: Re: [PATCH] Revert "f2fs: give a warning only for readonly partition" To: Jaegeuk Kim CC: , , References: <20210323064155.12582-1-yuchao0@huawei.com> <107e671d-68ea-1a74-521e-ab2b6fe36416@huawei.com> From: Chao Yu Message-ID: Date: Wed, 24 Mar 2021 15:48:51 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="windows-1252"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.136.110.154] X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021/3/24 12:22, Jaegeuk Kim wrote: > On 03/24, Chao Yu wrote: >> On 2021/3/24 2:39, Jaegeuk Kim wrote: >>> On 03/23, Chao Yu wrote: >>>> This reverts commit 938a184265d75ea474f1c6fe1da96a5196163789. >>>> >>>> Because that commit fails generic/050 testcase which expect failure >>>> during mount a recoverable readonly partition. >>> >>> I think we need to change generic/050, since f2fs can recover this partition, >> >> Well, not sure we can change that testcase, since it restricts all generic >> filesystems behavior. At least, ext4's behavior makes sense to me: >> >> journal_dev_ro = bdev_read_only(journal->j_dev); >> really_read_only = bdev_read_only(sb->s_bdev) | journal_dev_ro; >> >> if (journal_dev_ro && !sb_rdonly(sb)) { >> ext4_msg(sb, KERN_ERR, >> "journal device read-only, try mounting with '-o ro'"); >> err = -EROFS; >> goto err_out; >> } >> >> if (ext4_has_feature_journal_needs_recovery(sb)) { >> if (sb_rdonly(sb)) { >> ext4_msg(sb, KERN_INFO, "INFO: recovery " >> "required on readonly filesystem"); >> if (really_read_only) { >> ext4_msg(sb, KERN_ERR, "write access " >> "unavailable, cannot proceed " >> "(try mounting with noload)"); >> err = -EROFS; >> goto err_out; >> } >> ext4_msg(sb, KERN_INFO, "write access will " >> "be enabled during recovery"); >> } >> } >> >>> even though using it as readonly. And, valid checkpoint can allow for user to >>> read all the data without problem. >> >>>> if (f2fs_hw_is_readonly(sbi)) { >> >> Since device is readonly now, all write to the device will fail, checkpoint can >> not persist recovered data, after page cache is expired, user can see stale data. > > My point is, after mount with ro, there'll be no data write which preserves the > current status. So, in the next time, we can recover fsync'ed data later, if > user succeeds to mount as rw. Another point is, with the current checkpoint, we > should not have any corrupted metadata. So, why not giving a chance to show what > data remained to user? I think this can be doable only with CoW filesystems. I guess we're talking about the different things... Let me declare two different readonly status: 1. filesystem readonly: file system is mount with ro mount option, and app from userspace can not modify any thing of filesystem, but filesystem itself can modify data on device since device may be writable. 2. device readonly: device is set to readonly status via 'blockdev --setro' command, and then filesystem should never issue any write IO to the device. So, what I mean is, *when device is readonly*, rather than f2fs mountpoint is readonly (f2fs_hw_is_readonly() returns true as below code, instead of f2fs_readonly() returns true), in this condition, we should not issue any write IO to device anyway, because, AFAIK, write IO will fail due to bio_check_ro() check. if (f2fs_hw_is_readonly(sbi)) { - if (!is_set_ckpt_flags(sbi, CP_UMOUNT_FLAG)) { - err = -EROFS; + if (!is_set_ckpt_flags(sbi, CP_UMOUNT_FLAG)) f2fs_err(sbi, "Need to recover fsync data, but write access unavailable"); - goto free_meta; - } - f2fs_info(sbi, "write access unavailable, skipping recovery"); + else + f2fs_info(sbi, "write access unavailable, skipping recovery"); goto reset_checkpoint; } For the case of filesystem is readonly and device is writable, it's fine to do recovery in order to let user to see fsynced data. Thanks, > >> >> Am I missing something? >> >> Thanks, >> >>> >>>> >>>> Fixes: 938a184265d7 ("f2fs: give a warning only for readonly partition") >>>> Signed-off-by: Chao Yu >>>> --- >>>> fs/f2fs/super.c | 8 +++++--- >>>> 1 file changed, 5 insertions(+), 3 deletions(-) >>>> >>>> diff --git a/fs/f2fs/super.c b/fs/f2fs/super.c >>>> index b48281642e98..2b78ee11f093 100644 >>>> --- a/fs/f2fs/super.c >>>> +++ b/fs/f2fs/super.c >>>> @@ -3952,10 +3952,12 @@ static int f2fs_fill_super(struct super_block *sb, void *data, int silent) >>>> * previous checkpoint was not done by clean system shutdown. >>>> */ >>>> if (f2fs_hw_is_readonly(sbi)) { >>>> - if (!is_set_ckpt_flags(sbi, CP_UMOUNT_FLAG)) >>>> + if (!is_set_ckpt_flags(sbi, CP_UMOUNT_FLAG)) { >>>> + err = -EROFS; >>>> f2fs_err(sbi, "Need to recover fsync data, but write access unavailable"); >>>> - else >>>> - f2fs_info(sbi, "write access unavailable, skipping recovery"); >>>> + goto free_meta; >>>> + } >>>> + f2fs_info(sbi, "write access unavailable, skipping recovery"); >>>> goto reset_checkpoint; >>>> } >>>> -- >>>> 2.29.2 >>> . >>> > . >