Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp1213415rwb; Thu, 22 Sep 2022 11:39:34 -0700 (PDT) X-Google-Smtp-Source: AMsMyM40tkwuWHpfiw6VobtsLpfO/+/MvtFI3EbtTxWefYe79knThACykCuZT7ajkSj6efw5VOzR X-Received: by 2002:a05:6402:1345:b0:453:891e:763e with SMTP id y5-20020a056402134500b00453891e763emr4699434edw.139.1663871974414; Thu, 22 Sep 2022 11:39:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663871974; cv=none; d=google.com; s=arc-20160816; b=cAWH1dI01z4iaBXLQpxWWI2CUiWrMRTqtXy4PidwmdympZnt7r0iYl2OdWE0RQoWyQ yrNmS2KWNuMFxJnKIJymHp4KMwQqCQPlsjgkQQY+G9cR3IpPd3/fWoter9B3EqhwKyTJ ue5rxoMbrEL7gpaM8ggzTfz4OAKeqSSwoOrGG+B4WkaI2bxkhFRKE3KTwlNoZ9KdNOvO qkkBLuZDYj3D67nwseOKn+qBDPd5WFiKOOAOfAD/7+ciqMrwsXPlkNd8FJSNjoVdy/2j dgg/ADLWpjKxHI6LB5JQY5Eys5yiicYLxdEVpbmbHtStCNNchRtVQmKTlsA61iT0Bt9f Hqdg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=cKjZLcHExLpcetnlHCXfWLAJX5u5BLSMeEj4y1l9Xd4=; b=GCZiSSJvwm87hB/w1Gim+B5wwyNE3CWylR9iYc8n/DI/Q9qOpjCAbRNLp/+RJ8IgLZ GDmZoBDFQn9MCzD6neg5oDZCF5bPcosjxq4tXItvU6+nNZ+wlEJPEVDhHduKKiCcR5Tp 6MvIT4i4v/3kdfHAomGQ+vx+q4FBTPN83FSEQaygGmNZe/15Z4Aslyz7eQRgsZYvHodn UUa8nn95nlNNKlFO4KLvUKbvkmDrl0pGdr+ASHlTRuqiDX7GWTbN9gZA+jiVOdazvzIk kHFMfYmDTKewEWtdvO8yf80UG982rDaNbx4O17H/44YdglYnCjivh/TMtCEvRRF4usE9 pIsg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=gKnmkWkR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y15-20020a50eb8f000000b00454561e3b98si5471834edr.139.2022.09.22.11.39.08; Thu, 22 Sep 2022 11:39:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=gKnmkWkR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230444AbiIVSIv (ORCPT + 99 others); Thu, 22 Sep 2022 14:08:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43024 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232396AbiIVSIj (ORCPT ); Thu, 22 Sep 2022 14:08:39 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0D6FA10650D for ; Thu, 22 Sep 2022 11:08:37 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 2590FB839A3 for ; Thu, 22 Sep 2022 18:08:36 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B8D6CC433D6; Thu, 22 Sep 2022 18:08:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1663870114; bh=8YflYgGzeSL4oNIVZdVxWj8ALucnq8yffuvlMiR6Jb8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=gKnmkWkRYtoGvNFwPO1otm3qjPehtjNqI1NzY2NeBo4v/wZospEBo+uiOQgBJc5t5 IZ6adcITV/OsJe3RPPJXnGTrc+RF52P167WRwqYMgrS5iJRH+DY1rEh7BiU9c5Wsok MqgTh82lN/NQMQCd3ohuGHiuEUxA1NjEZbtx6fkiFwxEetsw3PSDft9D5TYKKFm9pC cIipw6JNWedVdTo5D8ikofmt3OQWzqp2qGYG+zIV2OqhrRZHdPNK956G71aY7YNAFJ OlWrCelt1MsCPQyBAreSS5+MywEb/yw1/qtWd1WXSkjwqhUwPZDkhSESE59NRAabRQ fTlIOKdg2EsOw== Date: Thu, 22 Sep 2022 11:08:33 -0700 From: Jaegeuk Kim To: Chao Yu Cc: linux-f2fs-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org Subject: Re: [RFC PATCH v2] f2fs: record need_fsck in super_block Message-ID: References: <20220913135919.2445544-1-chao@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09/20, Chao Yu wrote: > On 2022/9/20 8:56, Jaegeuk Kim wrote: > > On 09/13, Chao Yu wrote: > > > Once CP_ERROR_FLAG is set, checkpoint is disallowed to be triggered to > > > persist CP_FSCK_FLAG, fsck won't repair the image due to lack of > > > CP_FSCK_FLAG. > > > > > > This patch proposes to persist newly introduced SB_NEED_FSCK flag into > > > super block if CP_ERROR_FLAG and SBI_NEED_FSCK is set, later, once fsck > > > detect this flag, it can check and repair corrupted image in time. > > > > > > Signed-off-by: Chao Yu > > > --- > > > v2: > > > - remove unneeded codes. > > > fs/f2fs/checkpoint.c | 6 +++++- > > > fs/f2fs/f2fs.h | 1 + > > > fs/f2fs/super.c | 26 ++++++++++++++++++++++++++ > > > include/linux/f2fs_fs.h | 5 ++++- > > > 4 files changed, 36 insertions(+), 2 deletions(-) > > > > > > diff --git a/fs/f2fs/checkpoint.c b/fs/f2fs/checkpoint.c > > > index c3119e4c890c..0836fce40394 100644 > > > --- a/fs/f2fs/checkpoint.c > > > +++ b/fs/f2fs/checkpoint.c > > > @@ -30,8 +30,12 @@ void f2fs_stop_checkpoint(struct f2fs_sb_info *sbi, bool end_io) > > > { > > > f2fs_build_fault_attr(sbi, 0, 0); > > > set_ckpt_flags(sbi, CP_ERROR_FLAG); > > > - if (!end_io) > > > + if (!end_io) { > > > f2fs_flush_merged_writes(sbi); > > > + > > > + if (is_sbi_flag_set(sbi, SBI_NEED_FSCK)) > > > + f2fs_update_sb_flags(sbi, SB_NEED_FSCK); > > > > Let's think of putting some more context in superblock, if we want to overwrite > > it. E.g., a reason to stop checkpoint? > > Good idea, maybe: > Bit Value max number of type > [0] need fsck flag 1 > [1-5] reason to stop checkpoint 32 > [6-13] reason to fsck 256 How about just keeping the counters of the reasons? (e.g., EIO count which stopped checkpoint) #define MAX_CRASH_REASON 32 char array[MAX_CRASH_REASON]; > > Thanks > > > > > > + } > > > } > > > /* > > > diff --git a/fs/f2fs/f2fs.h b/fs/f2fs/f2fs.h > > > index dee7b67a17a6..1960a98c7555 100644 > > > --- a/fs/f2fs/f2fs.h > > > +++ b/fs/f2fs/f2fs.h > > > @@ -3556,6 +3556,7 @@ int f2fs_enable_quota_files(struct f2fs_sb_info *sbi, bool rdonly); > > > int f2fs_quota_sync(struct super_block *sb, int type); > > > loff_t max_file_blocks(struct inode *inode); > > > void f2fs_quota_off_umount(struct super_block *sb); > > > +void f2fs_update_sb_flags(struct f2fs_sb_info *sbi, unsigned int flag); > > > int f2fs_commit_super(struct f2fs_sb_info *sbi, bool recover); > > > int f2fs_sync_fs(struct super_block *sb, int sync); > > > int f2fs_sanity_check_ckpt(struct f2fs_sb_info *sbi); > > > diff --git a/fs/f2fs/super.c b/fs/f2fs/super.c > > > index b8e5fe244596..c99ba840593d 100644 > > > --- a/fs/f2fs/super.c > > > +++ b/fs/f2fs/super.c > > > @@ -3846,6 +3846,32 @@ int f2fs_commit_super(struct f2fs_sb_info *sbi, bool recover) > > > return err; > > > } > > > +void f2fs_update_sb_flags(struct f2fs_sb_info *sbi, unsigned int flag) > > > +{ > > > + unsigned short s_flags; > > > + int err; > > > + > > > + if (le16_to_cpu(F2FS_RAW_SUPER(sbi)->s_flags) & SB_NEED_FSCK) > > > + return; > > > + > > > + f2fs_down_write(&sbi->sb_lock); > > > + > > > + s_flags = le16_to_cpu(F2FS_RAW_SUPER(sbi)->s_flags); > > > + > > > + if (s_flags & SB_NEED_FSCK) > > > + goto out_unlock; > > > + > > > + F2FS_RAW_SUPER(sbi)->s_flags = cpu_to_le16(s_flags | SB_NEED_FSCK); > > > + > > > + err = f2fs_commit_super(sbi, false); > > > + if (err) { > > > + f2fs_warn(sbi, "f2fs_commit_super fails to persist flag: %u, err:%d", flag, err); > > > + F2FS_RAW_SUPER(sbi)->s_flags = s_flags; > > > + } > > > +out_unlock: > > > + f2fs_up_write(&sbi->sb_lock); > > > +} > > > + > > > static int f2fs_scan_devices(struct f2fs_sb_info *sbi) > > > { > > > struct f2fs_super_block *raw_super = F2FS_RAW_SUPER(sbi); > > > diff --git a/include/linux/f2fs_fs.h b/include/linux/f2fs_fs.h > > > index d445150c5350..124176e2a42c 100644 > > > --- a/include/linux/f2fs_fs.h > > > +++ b/include/linux/f2fs_fs.h > > > @@ -73,6 +73,8 @@ struct f2fs_device { > > > __le32 total_segments; > > > } __packed; > > > +#define SB_NEED_FSCK 0x00000001 /* need fsck */ > > > + > > > struct f2fs_super_block { > > > __le32 magic; /* Magic Number */ > > > __le16 major_ver; /* Major Version */ > > > @@ -116,7 +118,8 @@ struct f2fs_super_block { > > > __u8 hot_ext_count; /* # of hot file extension */ > > > __le16 s_encoding; /* Filename charset encoding */ > > > __le16 s_encoding_flags; /* Filename charset encoding flags */ > > > - __u8 reserved[306]; /* valid reserved region */ > > > + __le16 s_flags; /* super block flags */ > > > + __u8 reserved[304]; /* valid reserved region */ > > > __le32 crc; /* checksum of superblock */ > > > } __packed; > > > -- > > > 2.25.1