Received: by 2002:a05:6358:795:b0:dc:4c66:fc3e with SMTP id n21csp21331rwj; Fri, 28 Oct 2022 21:47:51 -0700 (PDT) X-Google-Smtp-Source: AMsMyM7fCC/ciGf6NNMDoBFBFmdXwst9LpGaHoxRiAU7mnYFn8lNbnXJNLWbL41zlJgirSnrFThJ X-Received: by 2002:a17:907:3e0f:b0:791:9529:3674 with SMTP id hp15-20020a1709073e0f00b0079195293674mr2349034ejc.503.1667018871600; Fri, 28 Oct 2022 21:47:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1667018871; cv=none; d=google.com; s=arc-20160816; b=hpEP4+Kk2UP7eC/8J1s5wburxgvUprxnHVlWGDeWX+aMoWM4utlnKVevPjPvfHBsIB SPxM9ln9pObzbKhNdzvAeifKEMCYoJlOQs9JjA2ZTf9blcL+xdQId+7UyIdHL1ThYY0b HPiANtNKX3S8nKHqm3yQvBSS7aaBFT23UEipyWuTQeDOHyI7tpcsiW9G/WAH9kSHHOCQ DOdigeaqcDVFp9mSY+6LN7RmuBD0FTNEmsXe8q6vKDLtwk+pLcYrLCXBicK6B881VApY QwmEfti4QYDkehObA4WS9AJHzhg3VrdFC3g+oLL72OXW+62nf+Ch6j5zpYeiTb9+vTQm /6Ig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=z5N1e7/oP4LU7RQJL/sQG0qpTKAayHdvBjjGNJMs8u0=; b=hwshvDaokJ5rGXZQf0mxHGlGZBpHKAkpCz1GKm8qyT3mbqOxTDt5nemJ6VhwGu32tr eIGsntGqZ5E0yj1I+fd0k86vaUFRTL9BLGo71tlTeTUNZqt8TDYkdQtKUeHveRVp+G/U LTt4NctxQh/NGciimjztM78jGRiBkuZiRT4ovAVPXVf6RC6CYVrSRG0hDEPS7dIQBFyZ inCd9s7n00ewYhLUKXDRz+3OMaYxpbHP3jQbXe+cC0VCHSetyLPvPHOxdnFB+YDzaMmO Oc1yA9XvFhr0c9w8j9fq7xI7oeDZ9biFieX12ZGPszHI5LwkcdFJvUZ9dWkNWLbx+024 SEaQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="Y/SDIuRo"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ds15-20020a170907724f00b0078d1e610b3esi848430ejc.26.2022.10.28.21.47.26; Fri, 28 Oct 2022 21:47:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="Y/SDIuRo"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229510AbiJ2ESS (ORCPT + 99 others); Sat, 29 Oct 2022 00:18:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34952 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229379AbiJ2ESR (ORCPT ); Sat, 29 Oct 2022 00:18:17 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 528AF160ED9 for ; Fri, 28 Oct 2022 21:18:16 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 03B87B82C9E for ; Sat, 29 Oct 2022 04:18:15 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7964EC433C1; Sat, 29 Oct 2022 04:18:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1667017093; bh=bfmSe1xdl/TsRAPmZ7VtlLBP4R3hq8IJflIoAGQwlg4=; h=Date:Subject:To:Cc:References:From:In-Reply-To:From; b=Y/SDIuRoo7qMZgpwVx2nk+36jXpqXKjZoZuFJMSkNBhlfpYVPkl7770BuaOrjZlvu MpmXVB+BdddHZOxWo0il+ZRN2M/uZi0Y9O3QciuecUGf54lT+H6hECpOVE1Og28nv0 +MQfeoGMDsqsuBKw+qcMmtXJ+L7PrnEotJkd6ZgMFd5gCWi7lY8G7xINgWKnBykLFJ Ao7bzln3ghPbd1tnOBbaFFnQ5hggvb1D0bDb1bCMXDNonk6dKClw3c8/maPFV4N/yQ 6aSPYbfcTtBlZrr2HXKtdclzBT7UHdDIVlT7ojjKqIa32AC54X6BTVIPCTwco7TVQp 5zoBGLffShSug== Message-ID: <423b0738-e72a-7ae8-72dc-40f924d9fe0d@kernel.org> Date: Sat, 29 Oct 2022 12:18:12 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.4.0 Subject: Re: [f2fs-dev] [PATCH] f2fs: fix to set flush_merge opt and show noflush_merge Content-Language: en-US To: Yangtao Li , jaegeuk@kernel.org Cc: linux-kernel@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net References: <20221026130504.26312-1-frank.li@vivo.com> From: Chao Yu In-Reply-To: <20221026130504.26312-1-frank.li@vivo.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-7.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022/10/26 21:05, Yangtao Li via Linux-f2fs-devel wrote: > Some minor modifications to flush_merge and related parameters: > > 1.The FLUSH_MERGE opt is set by default only in non-ro mode. > 2.When ro and merge are set at the same time, an error is reported. > 3.Display noflush_merge mount opt. > > Signed-off-by: Yangtao Li > --- > fs/f2fs/super.c | 13 +++++++++++-- > 1 file changed, 11 insertions(+), 2 deletions(-) > > diff --git a/fs/f2fs/super.c b/fs/f2fs/super.c > index 3834ead04620..475fa10c6007 100644 > --- a/fs/f2fs/super.c > +++ b/fs/f2fs/super.c > @@ -1347,6 +1347,12 @@ static int parse_options(struct super_block *sb, char *options, bool is_remount) > return -EINVAL; > } > > + if ((f2fs_sb_has_readonly(sbi) || f2fs_readonly(sbi->sb)) > + && test_opt(sbi, FLUSH_MERGE)) { One more blank before &&. > + f2fs_err(sbi, "FLUSH_MERGE not compatible with readonly mode"); > + return -EINVAL; > + } > + > if (f2fs_sb_has_readonly(sbi) && !f2fs_readonly(sbi->sb)) { > f2fs_err(sbi, "Allow to mount readonly mode only"); > return -EROFS; > @@ -1935,8 +1941,10 @@ static int f2fs_show_options(struct seq_file *seq, struct dentry *root) > seq_puts(seq, ",inline_dentry"); > else > seq_puts(seq, ",noinline_dentry"); > - if (!f2fs_readonly(sbi->sb) && test_opt(sbi, FLUSH_MERGE)) > + if (test_opt(sbi, FLUSH_MERGE)) > seq_puts(seq, ",flush_merge"); > + else > + seq_puts(seq, ",noflush_merge"); > if (test_opt(sbi, NOBARRIER)) > seq_puts(seq, ",nobarrier"); > if (test_opt(sbi, FASTBOOT)) > @@ -2065,7 +2073,8 @@ static void default_options(struct f2fs_sb_info *sbi) > set_opt(sbi, MERGE_CHECKPOINT); > F2FS_OPTION(sbi).unusable_cap = 0; > sbi->sb->s_flags |= SB_LAZYTIME; > - set_opt(sbi, FLUSH_MERGE); > + if (!(f2fs_sb_has_readonly(sbi) || f2fs_readonly(sbi->sb))) How about using more explicit condition? if (!f2fs_sb_has_readonly(sbi) && !f2fs_readonly(sbi->sb))) > + set_opt(sbi, FLUSH_MERGE); > if (f2fs_hw_support_discard(sbi) || f2fs_hw_should_discard(sbi)) > set_opt(sbi, DISCARD); > if (f2fs_sb_has_blkzoned(sbi)) {