Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1761884AbZFPT1K (ORCPT ); Tue, 16 Jun 2009 15:27:10 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1755101AbZFPT1C (ORCPT ); Tue, 16 Jun 2009 15:27:02 -0400 Received: from mail-bw0-f213.google.com ([209.85.218.213]:54319 "EHLO mail-bw0-f213.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752850AbZFPT1A (ORCPT ); Tue, 16 Jun 2009 15:27:00 -0400 DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; b=f7626o5Obn5UxPJCHWXAmON2LQ6cOUnfdMAT2iDeqJHY7hlrFrUwwj60HVSCT+OEJu MGzQ07coGUam0FzYemdyPx1hCDoCH8vP7o4tcp7fz2Z4arGmVf4w2m0EJkV5Gmj6ozjE LYrTxeqygxjFboI6m1nhLPYhibKN+91zfA2lU= Message-ID: <4A37EF4A.1080006@gmail.com> Date: Tue, 16 Jun 2009 21:15:22 +0200 From: Marco User-Agent: Thunderbird 2.0.0.19 (X11/20081227) MIME-Version: 1.0 To: Jamie Lokier CC: Linux Embedded , Linux Kernel , Linux FS Devel , Daniel Walker Subject: Re: [PATCH 00/14] Pramfs: Persistent and protected ram filesystem References: <4A33A7A2.1050608@gmail.com> <20090613155957.GA16220@shareable.org> <4A34A394.5040509@gmail.com> <20090614114613.GC9514@shareable.org> <4A351FA9.1090808@gmail.com> <20090616150750.GF29040@shareable.org> In-Reply-To: <20090616150750.GF29040@shareable.org> Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3923 Lines: 86 Jamie Lokier wrote: > Marco wrote: >> There's the checksum, but the most important feature of this fs is the >> write protection. The page table entries that map the >> backing-store RAM are normally marked read-only. Write operations into >> the filesystem temporarily mark the affected pages as writeable, the >> write operation is carried out with locks held, and then the pte is >> marked read-only again. This feature provides protection against >> filesystem corruption caused by errant writes into the RAM due to >> kernel bugs for instance. I provided a test module for this. When the >> module is loaded tries to do a dirty write in the superblock, at this >> point you should see an error on the write. > > Ok. Random question: does it work with NOMMU? :-) (I'm biased, my > devices are NOMMU). > I have to say no. Or at least you can use it but you should select the option to disable the write protection. Of course, from this point of view there are some archs that they couldn't have this feature. I had to disable when I worked with a board with avr32. > Second question: what happens if the system crashing _during_ a write > to a file. Does it mean that file will fail it's checksum when it's > read at the next boot? > > Maybe files aren't so important. What about when you write a file, > and then rename it over an existing file to replace it. (E.g. a > config file), and the system crashes _during_ the rename? At the next > boot, is it guaranteed to see either the old or the new file, or can > the directory be corrupt / fail it's checksum? First of all I have to explain better the current policy: the checksum works at inode and superblock level and currently there isn't a recovery function as the journaling. About the superblock it's easy to use a redundant policy to be more robust. About the inode, at the moment when the checksum doesn't match the inode it's marked as bad calling the function make_bad_inode(). >>> As you say PRAMFS can work with special SRAMs needing memory >>> protection (and maybe cache coherence?), if you mmap() a file does it >>> need to use the page cache then? If so, do you have issues with >>> coherency between mmap() and direct read/write? >> See my response above about my concept of protection. However the mmap >> it's a similar approach. I can "mmap" the SRAM and I can write into it >> my data, but I think the possibility to have a fs it's great. We can use >> the device as normal disk, i.e. we can use cp, mv and so on. > > I meant when you mmap() a file on the filesystem, like you do when > running an executable, for example. Does mmap() on a file work or is > it forbidden? Just curious, I'd guess it's forbidden, and you > wouldn't want _direct_ mappings to the backing SRAM anyway so you can > keep those checksums up to date. > Because pramfs attempts to avoid filesystem corruption caused by kernel bugs, dirty pages in the page cache are not allowed to be written back to the backing-store RAM. This means that only private file mappings are supported. This way, an errant write into the page cache will not get written back to the filesystem. >>>> On this point I'd like to hear other embedded guys. >>> As one, I'd like to say if it can checksum the RAM at boot as well, >>> then I might like to use a small one in ordinary SRAM (at a fixed >>> reserved address) for those occasions when a reboot happens >>> (intentional or not) and I'd like to pass a little data to the next >>> running kernel about why the reboot happened, without touching flash >>> every time. >>> >>> -- Jamie >> Yeah Jamie, the goal of this fs is exactly that! > > Great :-) > > -- Jamie > Marco -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/