Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp345292pxb; Wed, 13 Apr 2022 02:21:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzwh+4ceeL4SBFE/MI0ZOrWrOj17wSRGq8qG9RmQPTpChPEBSzzFxJrddKJQLUHYjTDwY0Z X-Received: by 2002:a17:90a:de87:b0:1cb:b207:a729 with SMTP id n7-20020a17090ade8700b001cbb207a729mr9672215pjv.144.1649841682518; Wed, 13 Apr 2022 02:21:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649841682; cv=none; d=google.com; s=arc-20160816; b=ddRo8k/enmv3oZqDYobrs1X7cJCm7ClnWQ7rjLT3y4fu7xUjs0Gi1kfconJIqXzncQ ZHio1ZapSWfK/482b51gGOyKfPKU8rhL4IrG1FxsZ3n3jAsMS5zcF5JoxxGW/CUM1MD0 +JcPBaLP/AE7xtSeL/1pJNwmT7FYzbeFJBNFrZgGc0JNUYIVmJx4ikd0DJsSlx46Fh8j 2da1wzk5eJDq9uQrD0IMxv2iGt4fhMNDb5naxlm4bHtmdA1SSc0xSs+bHHOXN89gZkDk M4V2SMLJTc0PhZvfc+BKVtEgFKka/4cO1wOVp/9Lc4x6zaIQmI2baBHsPSv5pg/ZJdqw 45Tw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=3+H7ywmKzAvKt4jT7ZyhnTETEWVb+i58qU+xW7Iy+Jw=; b=B47kOqnPdHd/KKICWwARkEd/nZR6xyLs0bl+YS6Uwc4C/vdWgiq8m0NRCGHlaU1BvL eiwNP21DQ1u6LFLm/z9YKjAOzdntNpfcBHWv3ngpcplKV94QFXrv4y2P4ptAAjYLkSjJ F3tDpz3f44ZGzdtQ4XLjfn/P2MUyJ4bud5reaqkpjvtPAWkqmdvkxHicq9UJDq5bUNV7 u67U1NbpIOZfWc7xTvRcQozCj9Wl0MjtM2RFBt1IsfDSrb0tWeRLf2QoESvBbvToTCzD zCYl+8IX69GzY7PHZw+I0vqXUR1t6CZvgUV91vRgCeLwuxInB8eyGkiixBK3stb2/tPk Yjrg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y10-20020a63de4a000000b003816043eef5si4537193pgi.234.2022.04.13.02.20.36; Wed, 13 Apr 2022 02:21:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229469AbiDMCZy (ORCPT + 99 others); Tue, 12 Apr 2022 22:25:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45496 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229455AbiDMCZx (ORCPT ); Tue, 12 Apr 2022 22:25:53 -0400 Received: from szxga08-in.huawei.com (szxga08-in.huawei.com [45.249.212.255]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DE0CC2529E for ; Tue, 12 Apr 2022 19:23:33 -0700 (PDT) Received: from canpemm500005.china.huawei.com (unknown [172.30.72.53]) by szxga08-in.huawei.com (SkyGuard) with ESMTP id 4KdRFr6PHLz1HBrY; Wed, 13 Apr 2022 10:22:56 +0800 (CST) Received: from [10.174.178.134] (10.174.178.134) by canpemm500005.china.huawei.com (7.192.104.229) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Wed, 13 Apr 2022 10:23:31 +0800 Subject: Re: [RFC PATCH] ext4: add unmount filesystem message To: Theodore Ts'o , Gabriel Krisman Bertazi CC: , , , , , , References: <20220412145320.2669897-1-yi.zhang@huawei.com> <87pmlmcmu6.fsf@collabora.com> From: Zhang Yi Message-ID: Date: Wed, 13 Apr 2022 10:23:31 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.12.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.174.178.134] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To canpemm500005.china.huawei.com (7.192.104.229) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-5.3 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On 2022/4/13 9:35, Theodore Ts'o wrote: > On Tue, Apr 12, 2022 at 12:01:37PM -0400, Gabriel Krisman Bertazi wrote: >> Zhang Yi writes: >> >>> Now that we have kernel message at mount time, system administrator > > "Now that we have...." is a bit misleading, since (at least to an > English speaker) that this is something that was recently added, and > that's not the case. > >>> could acquire the mount time, device and options easily. But we don't >>> have corresponding unmounting message at umount time, so we cannot know >>> if someone umount a filesystem easily. Some of the modern filesystems >>> (e.g. xfs) have the umounting kernel message, so add one for ext4 >>> filesystem for convenience. >>> >>> EXT4-fs (sdb): mounted filesystem with ordered data mode. Quota mode: none. >>> EXT4-fs (sdb): unmounting filesystem. >> >> I don't think sysadmins should be relying on the kernel log for this, >> since the information can easily be overwritten by new messages there. >> Is there a reason why you can't just monitor /proc/self/mountinfo? > > You're right that it can be dangerous for sysadmins to be relying on > the kernel log for mount and umount notifications --- but it depends > on what they think it means, and the potential pitfalls are there for > both the mount and unmount messages. The problem of course, is that > bind mounts, and mount name spaces, so if the question is whether a > file system is available at a particular mount point, then using the > kernel log is definitely not going to be reliable. > > But if the goal is to determine whether a particular device is safe to > run fsck or otherwise access directly, or for the purposes of > debugging the kernel and looking at the logs to understand when the > device is being accessed by the kernel and when the file system is > done with the device, I can see how it might be useful. > Yes, I understand that the kernel log is not reliable, and /proc/self/mountinfo neither. Our goal is simple, As Ted said, just add a method to help sysadmins to know whether a particular ext4 device is really doing unmount procedure, it could be helpful for us to debug kernel and locate kernel bug. Thanks, Yi.