Ssphinx.addnodesdocument)}( rawsourcechildren]( translations LanguagesNode)}(hhh](h pending_xref)}(hhh]docutils.nodesTextChinese (Simplified)}parenthsba attributes}(ids]classes]names]dupnames]backrefs] refdomainstdreftypedoc reftarget$/translations/zh_CN/filesystems/f2fsmodnameN classnameN refexplicitutagnamehhh ubh)}(hhh]hChinese (Traditional)}hh2sbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget$/translations/zh_TW/filesystems/f2fsmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hItalian}hhFsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget$/translations/it_IT/filesystems/f2fsmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hJapanese}hhZsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget$/translations/ja_JP/filesystems/f2fsmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hKorean}hhnsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget$/translations/ko_KR/filesystems/f2fsmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hSpanish}hhsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget$/translations/sp_SP/filesystems/f2fsmodnameN classnameN refexplicituh1hhh ubeh}(h]h ]h"]h$]h&]current_languageEnglishuh1h hh _documenthsourceNlineNubhcomment)}(h SPDX-License-Identifier: GPL-2.0h]h SPDX-License-Identifier: GPL-2.0}hhsbah}(h]h ]h"]h$]h&] xml:spacepreserveuh1hhhhhh>/var/lib/git/docbuild/linux/Documentation/filesystems/f2fs.rsthKubhsection)}(hhh](htitle)}(h*WHAT IS Flash-Friendly File System (F2FS)?h]h*WHAT IS Flash-Friendly File System (F2FS)?}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhhhhhKubh paragraph)}(hXkNAND flash memory-based storage devices, such as SSD, eMMC, and SD cards, have been equipped on a variety systems ranging from mobile to server systems. Since they are known to have different characteristics from the conventional rotating disks, a file system, an upper layer to the storage device, should adapt to the changes from the sketch in the design level.h]hXkNAND flash memory-based storage devices, such as SSD, eMMC, and SD cards, have been equipped on a variety systems ranging from mobile to server systems. Since they are known to have different characteristics from the conventional rotating disks, a file system, an upper layer to the storage device, should adapt to the changes from the sketch in the design level.}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubh)}(hXF2FS is a file system exploiting NAND flash memory-based storage devices, which is based on Log-structured File System (LFS). The design has been focused on addressing the fundamental issues in LFS, which are snowball effect of wandering tree and high cleaning overhead.h]hXF2FS is a file system exploiting NAND flash memory-based storage devices, which is based on Log-structured File System (LFS). The design has been focused on addressing the fundamental issues in LFS, which are snowball effect of wandering tree and high cleaning overhead.}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK hhhhubh)}(hX1Since a NAND flash memory-based storage device shows different characteristic according to its internal geometry or flash memory management scheme, namely FTL, F2FS and its tools support various parameters not only for configuring on-disk layout, but also for selecting allocation and cleaning algorithms.h]hX1Since a NAND flash memory-based storage device shows different characteristic according to its internal geometry or flash memory management scheme, namely FTL, F2FS and its tools support various parameters not only for configuring on-disk layout, but also for selecting allocation and cleaning algorithms.}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubh)}(hThe following git tree provides the file system formatting tool (mkfs.f2fs), a consistency checking tool (fsck.f2fs), and a debugging tool (dump.f2fs).h]hThe following git tree provides the file system formatting tool (mkfs.f2fs), a consistency checking tool (fsck.f2fs), and a debugging tool (dump.f2fs).}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubh bullet_list)}(hhh]h list_item)}(hEgit://git.kernel.org/pub/scm/linux/kernel/git/jaegeuk/f2fs-tools.git h]h)}(hDgit://git.kernel.org/pub/scm/linux/kernel/git/jaegeuk/f2fs-tools.gith]hDgit://git.kernel.org/pub/scm/linux/kernel/git/jaegeuk/f2fs-tools.git}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubah}(h]h ]h"]h$]h&]bullet-uh1jhhhKhhhhubh)}(h;For sending patches, please use the following mailing list:h]h;For sending patches, please use the following mailing list:}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubj)}(hhh]j )}(h'linux-f2fs-devel@lists.sourceforge.net h]h)}(h&linux-f2fs-devel@lists.sourceforge.neth]h reference)}(hjAh]h&linux-f2fs-devel@lists.sourceforge.net}(hjEhhhNhNubah}(h]h ]h"]h$]h&]refuri-mailto:linux-f2fs-devel@lists.sourceforge.netuh1jChj?ubah}(h]h ]h"]h$]h&]uh1hhhhKhj;ubah}(h]h ]h"]h$]h&]uh1jhj8hhhhhNubah}(h]h ]h"]h$]h&]j(j)uh1jhhhKhhhhubh)}(hCFor reporting bugs, please use the following f2fs bug tracker link:h]hCFor reporting bugs, please use the following f2fs bug tracker link:}(hjfhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK hhhhubj)}(hhh]j )}(hOhttps://bugzilla.kernel.org/enter_bug.cgi?product=File%20System&component=f2fs h]h)}(hNhttps://bugzilla.kernel.org/enter_bug.cgi?product=File%20System&component=f2fsh]jD)}(hj}h]hNhttps://bugzilla.kernel.org/enter_bug.cgi?product=File%20System&component=f2fs}(hjhhhNhNubah}(h]h ]h"]h$]h&]refurij}uh1jChj{ubah}(h]h ]h"]h$]h&]uh1hhhhK"hjwubah}(h]h ]h"]h$]h&]uh1jhjthhhhhNubah}(h]h ]h"]h$]h&]j(j)uh1jhhhK"hhhhubh)}(hhh](h)}(hBackground and Design issuesh]hBackground and Design issues}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhK%ubh)}(hhh](h)}(h Log-structured File System (LFS)h]h Log-structured File System (LFS)}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhK(ubh)}(hX|"A log-structured file system writes all modifications to disk sequentially in a log-like structure, thereby speeding up both file writing and crash recovery. The log is the only structure on disk; it contains indexing information so that files can be read back from the log efficiently. In order to maintain large free areas on disk for fast writing, we divide the log into segments and use a segment cleaner to compress the live information from heavily fragmented segments." from Rosenblum, M. and Ousterhout, J. K., 1992, "The design and implementation of a log-structured file system", ACM Trans. Computer Systems 10, 1, 26–52.h]hX“A log-structured file system writes all modifications to disk sequentially in a log-like structure, thereby speeding up both file writing and crash recovery. The log is the only structure on disk; it contains indexing information so that files can be read back from the log efficiently. In order to maintain large free areas on disk for fast writing, we divide the log into segments and use a segment cleaner to compress the live information from heavily fragmented segments.” from Rosenblum, M. and Ousterhout, J. K., 1992, “The design and implementation of a log-structured file system”, ACM Trans. Computer Systems 10, 1, 26–52.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK)hjhhubeh}(h]log-structured-file-system-lfsah ]h"] log-structured file system (lfs)ah$]h&]uh1hhjhhhhhK(ubh)}(hhh](h)}(hWandering Tree Problemh]hWandering Tree Problem}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhK4ubh)}(hXIn LFS, when a file data is updated and written to the end of log, its direct pointer block is updated due to the changed location. Then the indirect pointer block is also updated due to the direct pointer block update. In this manner, the upper index structures such as inode, inode map, and checkpoint block are also updated recursively. This problem is called as wandering tree problem [1], and in order to enhance the performance, it should eliminate or relax the update propagation as much as possible.h]hXIn LFS, when a file data is updated and written to the end of log, its direct pointer block is updated due to the changed location. Then the indirect pointer block is also updated due to the direct pointer block update. In this manner, the upper index structures such as inode, inode map, and checkpoint block are also updated recursively. This problem is called as wandering tree problem [1], and in order to enhance the performance, it should eliminate or relax the update propagation as much as possible.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK5hjhhubh)}(hQ[1] Bityutskiy, A. 2005. JFFS3 design issues. http://www.linux-mtd.infradead.org/h](h.[1] Bityutskiy, A. 2005. JFFS3 design issues. }(hjhhhNhNubjD)}(h#http://www.linux-mtd.infradead.org/h]h#http://www.linux-mtd.infradead.org/}(hjhhhNhNubah}(h]h ]h"]h$]h&]refurijuh1jChjubeh}(h]h ]h"]h$]h&]uh1hhhhK=hjhhubeh}(h]wandering-tree-problemah ]h"]h$]wandering tree problemah&]uh1hhjhhhhhK4 referencedKubh)}(hhh](h)}(hCleaning Overheadh]hCleaning Overhead}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhK@ubh)}(hXSince LFS is based on out-of-place writes, it produces so many obsolete blocks scattered across the whole storage. In order to serve new empty log space, it needs to reclaim these obsolete blocks seamlessly to users. This job is called as a cleaning process.h]hXSince LFS is based on out-of-place writes, it produces so many obsolete blocks scattered across the whole storage. In order to serve new empty log space, it needs to reclaim these obsolete blocks seamlessly to users. This job is called as a cleaning process.}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKAhjhhubh)}(h4The process consists of three operations as follows.h]h4The process consists of three operations as follows.}(hj;hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKFhjhhubhenumerated_list)}(hhh](j )}(hEA victim segment is selected through referencing segment usage table.h]h)}(hjPh]hEA victim segment is selected through referencing segment usage table.}(hjRhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKHhjNubah}(h]h ]h"]h$]h&]uh1jhjKhhhhhNubj )}(hdIt loads parent index structures of all the data in the victim identified by segment summary blocks.h]h)}(hdIt loads parent index structures of all the data in the victim identified by segment summary blocks.h]hdIt loads parent index structures of all the data in the victim identified by segment summary blocks.}(hjihhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKIhjeubah}(h]h ]h"]h$]h&]uh1jhjKhhhhhNubj )}(hNIt checks the cross-reference between the data and its parent index structure.h]h)}(hjh]hNIt checks the cross-reference between the data and its parent index structure.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKKhj}ubah}(h]h ]h"]h$]h&]uh1jhjKhhhhhNubj )}(h!It moves valid data selectively. h]h)}(h It moves valid data selectively.h]h It moves valid data selectively.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKLhjubah}(h]h ]h"]h$]h&]uh1jhjKhhhhhNubeh}(h]h ]h"]h$]h&]enumtypearabicprefixhsuffix.uh1jIhjhhhhhKHubh)}(hThis cleaning job may cause unexpected long delays, so the most important goal is to hide the latencies to users. And also definitely, it should reduce the amount of valid data to be moved, and move them quickly as well.h]hThis cleaning job may cause unexpected long delays, so the most important goal is to hide the latencies to users. And also definitely, it should reduce the amount of valid data to be moved, and move them quickly as well.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKNhjhhubeh}(h]cleaning-overheadah ]h"]h$]cleaning overheadah&]uh1hhjhhhhhK@jKubeh}(h]background-and-design-issuesah ]h"]background and design issuesah$]h&]uh1hhhhhhhhK%ubh)}(hhh](h)}(h Key Featuresh]h Key Features}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKSubh)}(hhh](h)}(hFlash Awarenessh]hFlash Awareness}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKVubj)}(hhh](j )}(h[Enlarge the random write area for better performance, but provide the high spatial localityh]h)}(h[Enlarge the random write area for better performance, but provide the high spatial localityh]h[Enlarge the random write area for better performance, but provide the high spatial locality}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKWhjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubj )}(hIAlign FS data structures to the operational units in FTL as best efforts h]h)}(hHAlign FS data structures to the operational units in FTL as best effortsh]hHAlign FS data structures to the operational units in FTL as best efforts}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKYhjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubeh}(h]h ]h"]h$]h&]j(j)uh1jhhhKWhjhhubeh}(h]flash-awarenessah ]h"]flash awarenessah$]h&]uh1hhjhhhhhKVubh)}(hhh](h)}(hWandering Tree Problemh]hWandering Tree Problem}(hj;hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj8hhhhhK\ubj)}(hhh](j )}(hPUse a term, “node”, that represents inodes as well as various pointer blocksh]h)}(hjNh]hPUse a term, “node”, that represents inodes as well as various pointer blocks}(hjPhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK]hjLubah}(h]h ]h"]h$]h&]uh1jhjIhhhhhNubj )}(hIntroduce Node Address Table (NAT) containing the locations of all the “node” blocks; this will cut off the update propagation. h]h)}(hIntroduce Node Address Table (NAT) containing the locations of all the “node” blocks; this will cut off the update propagation.h]hIntroduce Node Address Table (NAT) containing the locations of all the “node” blocks; this will cut off the update propagation.}(hjghhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK^hjcubah}(h]h ]h"]h$]h&]uh1jhjIhhhhhNubeh}(h]h ]h"]h$]h&]j(j)uh1jhhhK]hj8hhubeh}(h]id1ah ]h"]h$]jah&]uh1hhjhhhhhK\jKubh)}(hhh](h)}(hCleaning Overheadh]hCleaning Overhead}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKbubj)}(hhh](j )}(h%Support a background cleaning processh]h)}(hjh]h%Support a background cleaning process}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKchjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubj )}(hHSupport greedy and cost-benefit algorithms for victim selection policiesh]h)}(hjh]hHSupport greedy and cost-benefit algorithms for victim selection policies}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKdhjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubj )}(hGSupport multi-head logs for static/dynamic hot and cold data separationh]h)}(hjh]hGSupport multi-head logs for static/dynamic hot and cold data separation}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKehjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubj )}(h:Introduce adaptive logging for efficient block allocation h]h)}(h9Introduce adaptive logging for efficient block allocationh]h9Introduce adaptive logging for efficient block allocation}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKfhjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubeh}(h]h ]h"]h$]h&]j(j)uh1jhhhKchjhhubeh}(h]id2ah ]h"]h$]jah&]uh1hhjhhhhhKbjKubeh}(h] key-featuresah ]h"] key featuresah$]h&]uh1hhhhhhhhKSubh)}(hhh](h)}(h Mount Optionsh]h Mount Options}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKiubhtable)}(hhh]htgroup)}(hhh](hcolspec)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1j)hj&ubj*)}(hhh]h}(h]h ]h"]h$]h&]colwidthKRuh1j)hj&ubhtbody)}(hhh](hrow)}(hhh](hentry)}(hhh]h)}(hbackground_gc=%sh]hbackground_gc=%s}(hjNhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKmhjKubah}(h]h ]h"]h$]h&]uh1jIhjFubjJ)}(hhh]h)}(hXTurn on/off cleaning operations, namely garbage collection, triggered in background when I/O subsystem is idle. If background_gc=on, it will turn on the garbage collection and if background_gc=off, garbage collection will be turned off. If background_gc=sync, it will turn on synchronous garbage collection running in background. Default value for this option is on. So garbage collection is on by default.h]hXTurn on/off cleaning operations, namely garbage collection, triggered in background when I/O subsystem is idle. If background_gc=on, it will turn on the garbage collection and if background_gc=off, garbage collection will be turned off. If background_gc=sync, it will turn on synchronous garbage collection running in background. Default value for this option is on. So garbage collection is on by default.}(hjehhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKmhjbubah}(h]h ]h"]h$]h&]uh1jIhjFubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hgc_mergeh]hgc_merge}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKuhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hXWhen background_gc is on, this option can be enabled to let background GC thread to handle foreground GC requests, it can eliminate the sluggish issue caused by slow foreground GC operation when GC is triggered from a process with limited I/O and CPU resources.h]hXWhen background_gc is on, this option can be enabled to let background GC thread to handle foreground GC requests, it can eliminate the sluggish issue caused by slow foreground GC operation when GC is triggered from a process with limited I/O and CPU resources.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKuhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h nogc_mergeh]h nogc_merge}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKzhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hDisable GC merge feature.h]hDisable GC merge feature.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKzhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hdisable_roll_forwardh]hdisable_roll_forward}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK{hjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(h)Disable the roll-forward recovery routineh]h)Disable the roll-forward recovery routine}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK{hjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h norecoveryh]h norecovery}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK|hj'ubah}(h]h ]h"]h$]h&]uh1jIhj$ubjJ)}(hhh]h)}(h`Disable the roll-forward recovery routine, mounted read- only (i.e., -o ro,disable_roll_forward)h]h`Disable the roll-forward recovery routine, mounted read- only (i.e., -o ro,disable_roll_forward)}(hjAhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK|hj>ubah}(h]h ]h"]h$]h&]uh1jIhj$ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hdiscard/nodiscardh]hdiscard/nodiscard}(hjahhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK~hj^ubah}(h]h ]h"]h$]h&]uh1jIhj[ubjJ)}(hhh]h)}(hEnable/disable real-time discard in f2fs, if discard is enabled, f2fs will issue discard/TRIM commands when a segment is cleaned.h]hEnable/disable real-time discard in f2fs, if discard is enabled, f2fs will issue discard/TRIM commands when a segment is cleaned.}(hjxhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK~hjuubah}(h]h ]h"]h$]h&]uh1jIhj[ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h heap/no_heaph]h heap/no_heap}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(h Deprecated.h]h Deprecated.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h nouser_xattrh]h nouser_xattr}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hhDisable Extended User Attributes. Note: xattr is enabled by default if CONFIG_F2FS_FS_XATTR is selected.h]hhDisable Extended User Attributes. Note: xattr is enabled by default if CONFIG_F2FS_FS_XATTR is selected.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hnoaclh]hnoacl}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hkDisable POSIX Access Control List. Note: acl is enabled by default if CONFIG_F2FS_FS_POSIX_ACL is selected.h]hkDisable POSIX Access Control List. Note: acl is enabled by default if CONFIG_F2FS_FS_POSIX_ACL is selected.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hactive_logs=%uh]hactive_logs=%u}(hj=hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj:ubah}(h]h ]h"]h$]h&]uh1jIhj7ubjJ)}(hhh]h)}(hSupport configuring the number of active logs. In the current design, f2fs supports only 2, 4, and 6 logs. Default number is 6.h]hSupport configuring the number of active logs. In the current design, f2fs supports only 2, 4, and 6 logs. Default number is 6.}(hjThhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjQubah}(h]h ]h"]h$]h&]uh1jIhj7ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hdisable_ext_identifyh]hdisable_ext_identify}(hjthhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjqubah}(h]h ]h"]h$]h&]uh1jIhjnubjJ)}(hhh]h)}(hfDisable the extension list configured by mkfs, so f2fs is not aware of cold files such as media files.h]hfDisable the extension list configured by mkfs, so f2fs is not aware of cold files such as media files.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjnubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h inline_xattrh]h inline_xattr}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(h!Enable the inline xattrs feature.h]h!Enable the inline xattrs feature.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hnoinline_xattrh]hnoinline_xattr}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(h"Disable the inline xattrs feature.h]h"Disable the inline xattrs feature.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hinline_xattr_size=%uh]hinline_xattr_size=%u}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hSSupport configuring inline xattr size, it depends on flexible inline xattr feature.h]hSSupport configuring inline xattr size, it depends on flexible inline xattr feature.}(hj0hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj-ubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h inline_datah]h inline_data}(hjPhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjMubah}(h]h ]h"]h$]h&]uh1jIhjJubjJ)}(hhh]h)}(hcEnable the inline data feature: Newly created small (<~3.4k) files can be written into inode block.h]hcEnable the inline data feature: Newly created small (<~3.4k) files can be written into inode block.}(hjghhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjdubah}(h]h ]h"]h$]h&]uh1jIhjJubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h inline_dentryh]h inline_dentry}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hEnable the inline dir feature: data in newly created directory entries can be written into inode block. The space of inode block which is used to store inline dentries is limited to ~3.4k.h]hEnable the inline dir feature: data in newly created directory entries can be written into inode block. The space of inode block which is used to store inline dentries is limited to ~3.4k.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hnoinline_dentryh]hnoinline_dentry}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(h"Disable the inline dentry feature.h]h"Disable the inline dentry feature.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h flush_mergeh]h flush_merge}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hMerge concurrent cache_flush commands as much as possible to eliminate redundant command issues. If the underlying device handles the cache_flush command relatively slowly, recommend to enable this option.h]hMerge concurrent cache_flush commands as much as possible to eliminate redundant command issues. If the underlying device handles the cache_flush command relatively slowly, recommend to enable this option.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h nobarrierh]h nobarrier}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj)ubah}(h]h ]h"]h$]h&]uh1jIhj&ubjJ)}(hhh]h)}(hThis option can be used if underlying storage guarantees its cached data should be written to the novolatile area. If this option is set, no cache_flush commands are issued but f2fs still guarantees the write ordering of all the data writes.h]hThis option can be used if underlying storage guarantees its cached data should be written to the novolatile area. If this option is set, no cache_flush commands are issued but f2fs still guarantees the write ordering of all the data writes.}(hjChhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj@ubah}(h]h ]h"]h$]h&]uh1jIhj&ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hbarrierh]hbarrier}(hjchhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj`ubah}(h]h ]h"]h$]h&]uh1jIhj]ubjJ)}(hhh]h)}(hEIf this option is set, cache_flush commands are allowed to be issued.h]hEIf this option is set, cache_flush commands are allowed to be issued.}(hjzhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjwubah}(h]h ]h"]h$]h&]uh1jIhj]ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hfastbooth]hfastboot}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hThis option is used when a system wants to reduce mount time as much as possible, even though normal performance can be sacrificed.h]hThis option is used when a system wants to reduce mount time as much as possible, even though normal performance can be sacrificed.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h extent_cacheh]h extent_cache}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hEnable an extent cache based on rb-tree, it can cache as many as extent which map between contiguous logical address and physical address per inode, resulting in increasing the cache hit ratio. Set by default.h]hEnable an extent cache based on rb-tree, it can cache as many as extent which map between contiguous logical address and physical address per inode, resulting in increasing the cache hit ratio. Set by default.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hnoextent_cacheh]hnoextent_cache}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubjJ)}(hhh]h)}(h]Disable an extent cache based on rb-tree explicitly, see the above extent_cache mount option.h]h]Disable an extent cache based on rb-tree explicitly, see the above extent_cache mount option.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h noinline_datah]h noinline_data}(hj? hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj< ubah}(h]h ]h"]h$]h&]uh1jIhj9 ubjJ)}(hhh]h)}(hKDisable the inline data feature, inline data feature is enabled by default.h]hKDisable the inline data feature, inline data feature is enabled by default.}(hjV hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjS ubah}(h]h ]h"]h$]h&]uh1jIhj9 ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h data_flushh]h data_flush}(hjv hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjs ubah}(h]h ]h"]h$]h&]uh1jIhjp ubjJ)}(hhh]h)}(hWEnable data flushing before checkpoint in order to persist data of regular and symlink.h]hWEnable data flushing before checkpoint in order to persist data of regular and symlink.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhjp ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hreserve_root=%dh]hreserve_root=%d}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubjJ)}(hhh]h)}(hSupport configuring reserved space which is used for allocation from a privileged user with specified uid or gid, unit: 4KB, the default limit is 0.2% of user blocks.h]hSupport configuring reserved space which is used for allocation from a privileged user with specified uid or gid, unit: 4KB, the default limit is 0.2% of user blocks.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h resuid=%dh]h resuid=%d}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubjJ)}(hhh]h)}(h.The user ID which may use the reserved blocks.h]h.The user ID which may use the reserved blocks.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h resgid=%dh]h resgid=%d}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubjJ)}(hhh]h)}(h/The group ID which may use the reserved blocks.h]h/The group ID which may use the reserved blocks.}(hj2 hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj/ ubah}(h]h ]h"]h$]h&]uh1jIhj ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hfault_injection=%dh]hfault_injection=%d}(hjR hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjO ubah}(h]h ]h"]h$]h&]uh1jIhjL ubjJ)}(hhh]h)}(hLEnable fault injection in all supported types with specified injection rate.h]hLEnable fault injection in all supported types with specified injection rate.}(hji hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjf ubah}(h]h ]h"]h$]h&]uh1jIhjL ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h fault_type=%dh]h fault_type=%d}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubjJ)}(hhh](h)}(hSupport configuring fault injection type, should be enabled with fault_injection option, fault type value is shown below, it supports single or combined type.h]hSupport configuring fault injection type, should be enabled with fault_injection option, fault type value is shown below, it supports single or combined type.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubj )}(hhh]j%)}(hhh](j*)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1j)hj ubj*)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1j)hj ubhthead)}(hhh]jE)}(hhh](jJ)}(hhh]h)}(h Type_Nameh]h Type_Name}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubjJ)}(hhh]h)}(h Type_Valueh]h Type_Value}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubeh}(h]h ]h"]h$]h&]uh1jDhj ubah}(h]h ]h"]h$]h&]uh1j hj ubj@)}(hhh](jE)}(hhh](jJ)}(hhh]h)}(h FAULT_KMALLOCh]h FAULT_KMALLOC}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubjJ)}(hhh]h)}(h 0x000000001h]h 0x000000001}(hj* hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj' ubah}(h]h ]h"]h$]h&]uh1jIhj ubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(hFAULT_KVMALLOCh]hFAULT_KVMALLOC}(hjJ hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjG ubah}(h]h ]h"]h$]h&]uh1jIhjD ubjJ)}(hhh]h)}(h 0x000000002h]h 0x000000002}(hja hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj^ ubah}(h]h ]h"]h$]h&]uh1jIhjD ubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(hFAULT_PAGE_ALLOCh]hFAULT_PAGE_ALLOC}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj~ ubah}(h]h ]h"]h$]h&]uh1jIhj{ ubjJ)}(hhh]h)}(h 0x000000004h]h 0x000000004}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj{ ubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(hFAULT_PAGE_GETh]hFAULT_PAGE_GET}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubjJ)}(hhh]h)}(h 0x000000008h]h 0x000000008}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(hFAULT_ALLOC_BIOh]hFAULT_ALLOC_BIO}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubjJ)}(hhh]h)}(h0x000000010 (obsolete)h]h0x000000010 (obsolete)}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(hFAULT_ALLOC_NIDh]hFAULT_ALLOC_NID}(hj& hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj# ubah}(h]h ]h"]h$]h&]uh1jIhj ubjJ)}(hhh]h)}(h 0x000000020h]h 0x000000020}(hj= hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj: ubah}(h]h ]h"]h$]h&]uh1jIhj ubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(h FAULT_ORPHANh]h FAULT_ORPHAN}(hj] hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjZ ubah}(h]h ]h"]h$]h&]uh1jIhjW ubjJ)}(hhh]h)}(h 0x000000040h]h 0x000000040}(hjt hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjq ubah}(h]h ]h"]h$]h&]uh1jIhjW ubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(h FAULT_BLOCKh]h FAULT_BLOCK}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubjJ)}(hhh]h)}(h 0x000000080h]h 0x000000080}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(hFAULT_DIR_DEPTHh]hFAULT_DIR_DEPTH}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubjJ)}(hhh]h)}(h 0x000000100h]h 0x000000100}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(hFAULT_EVICT_INODEh]hFAULT_EVICT_INODE}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubjJ)}(hhh]h)}(h 0x000000200h]h 0x000000200}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(hFAULT_TRUNCATEh]hFAULT_TRUNCATE}(hj9 hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj6 ubah}(h]h ]h"]h$]h&]uh1jIhj3 ubjJ)}(hhh]h)}(h 0x000000400h]h 0x000000400}(hjP hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjM ubah}(h]h ]h"]h$]h&]uh1jIhj3 ubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(h FAULT_READ_IOh]h FAULT_READ_IO}(hjp hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjm ubah}(h]h ]h"]h$]h&]uh1jIhjj ubjJ)}(hhh]h)}(h 0x000000800h]h 0x000000800}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhjj ubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(hFAULT_CHECKPOINTh]hFAULT_CHECKPOINT}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubjJ)}(hhh]h)}(h 0x000001000h]h 0x000001000}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(h FAULT_DISCARDh]h FAULT_DISCARD}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubjJ)}(hhh]h)}(h 0x000002000h]h 0x000002000}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhj ubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(hFAULT_WRITE_IOh]hFAULT_WRITE_IO}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(h 0x000004000h]h 0x000004000}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj)ubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(hFAULT_SLAB_ALLOCh]hFAULT_SLAB_ALLOC}(hjLhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjIubah}(h]h ]h"]h$]h&]uh1jIhjFubjJ)}(hhh]h)}(h 0x000008000h]h 0x000008000}(hjchhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj`ubah}(h]h ]h"]h$]h&]uh1jIhjFubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(hFAULT_DQUOT_INITh]hFAULT_DQUOT_INIT}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhj}ubjJ)}(hhh]h)}(h 0x000010000h]h 0x000010000}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhj}ubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(h FAULT_LOCK_OPh]h FAULT_LOCK_OP}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(h 0x000020000h]h 0x000020000}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(hFAULT_BLKADDR_VALIDITYh]hFAULT_BLKADDR_VALIDITY}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(h 0x000040000h]h 0x000040000}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(hFAULT_BLKADDR_CONSISTENCEh]hFAULT_BLKADDR_CONSISTENCE}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj%ubah}(h]h ]h"]h$]h&]uh1jIhj"ubjJ)}(hhh]h)}(h 0x000080000h]h 0x000080000}(hj?hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj<ubah}(h]h ]h"]h$]h&]uh1jIhj"ubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(hFAULT_NO_SEGMENTh]hFAULT_NO_SEGMENT}(hj_hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj\ubah}(h]h ]h"]h$]h&]uh1jIhjYubjJ)}(hhh]h)}(h 0x000100000h]h 0x000100000}(hjvhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjsubah}(h]h ]h"]h$]h&]uh1jIhjYubeh}(h]h ]h"]h$]h&]uh1jDhj ubjE)}(hhh](jJ)}(hhh]h)}(hFAULT_INCONSISTENT_FOOTERh]hFAULT_INCONSISTENT_FOOTER}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(h 0x000200000h]h 0x000200000}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhj ubeh}(h]h ]h"]h$]h&]uh1j?hj ubeh}(h]h ]h"]h$]h&]colsKuh1j$hj ubah}(h]h ]h"]h$]h&]uh1jhj ubeh}(h]h ]h"]h$]h&]uh1jIhj ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hmode=%sh]hmode=%s}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hXControl block allocation mode which supports "adaptive" and "lfs". In "lfs" mode, there should be no random writes towards main area. "fragment:segment" and "fragment:block" are newly added here. These are developer options for experiments to simulate filesystem fragmentation/after-GC situation itself. The developers use these modes to understand filesystem fragmentation/after-GC condition well, and eventually get some insights to handle them better. In "fragment:segment", f2fs allocates a new segment in ramdom position. With this, we can simulate the after-GC condition. In "fragment:block", we can scatter block allocation with "max_fragment_chunk" and "max_fragment_hole" sysfs nodes. We added some randomness to both chunk and hole size to make it close to realistic IO pattern. So, in this mode, f2fs will allocate 1.. blocks in a chunk and make a hole in the length of 1.. by turns. With this, the newly allocated blocks will be scattered throughout the whole partition. Note that "fragment:block" implicitly enables "fragment:segment" option for more randomness. Please, use these options for your experiments and we strongly recommend to re-format the filesystem after using these options.h]hXControl block allocation mode which supports “adaptive” and “lfs”. In “lfs” mode, there should be no random writes towards main area. “fragment:segment” and “fragment:block” are newly added here. These are developer options for experiments to simulate filesystem fragmentation/after-GC situation itself. The developers use these modes to understand filesystem fragmentation/after-GC condition well, and eventually get some insights to handle them better. In “fragment:segment”, f2fs allocates a new segment in ramdom position. With this, we can simulate the after-GC condition. In “fragment:block”, we can scatter block allocation with “max_fragment_chunk” and “max_fragment_hole” sysfs nodes. We added some randomness to both chunk and hole size to make it close to realistic IO pattern. So, in this mode, f2fs will allocate 1.. blocks in a chunk and make a hole in the length of 1.. by turns. With this, the newly allocated blocks will be scattered throughout the whole partition. Note that “fragment:block” implicitly enables “fragment:segment” option for more randomness. Please, use these options for your experiments and we strongly recommend to re-format the filesystem after using these options.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(husrquotah]husrquota}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(h(Enable plain user disk quota accounting.h]h(Enable plain user disk quota accounting.}(hj:hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj7ubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hgrpquotah]hgrpquota}(hjZhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjWubah}(h]h ]h"]h$]h&]uh1jIhjTubjJ)}(hhh]h)}(h)Enable plain group disk quota accounting.h]h)Enable plain group disk quota accounting.}(hjqhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjnubah}(h]h ]h"]h$]h&]uh1jIhjTubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hprjquotah]hprjquota}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(h&Enable plain project quota accounting.h]h&Enable plain project quota accounting.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(husrjquota=h]husrjquota=}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(h;Appoint specified file and type during mount, so that quotah]h;Appoint specified file and type during mount, so that quota}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hgrpjquota=h]hgrpjquota=}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(h9information can be properly updated during recovery flow,h]h9information can be properly updated during recovery flow,}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hprjjquota=h]hprjjquota=}(hj6hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj3ubah}(h]h ]h"]h$]h&]uh1jIhj0ubjJ)}(hhh]h)}(h(: must be in root directory;h]h(: must be in root directory;}(hjMhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjJubah}(h]h ]h"]h$]h&]uh1jIhj0ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hjqfmt=h]hjqfmt=}(hjmhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjjubah}(h]h ]h"]h$]h&]uh1jIhjgubjJ)}(hhh]h)}(h#: [vfsold,vfsv0,vfsv1].h]h#: [vfsold,vfsv0,vfsv1].}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjgubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h offusrjquotah]h offusrjquota}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hTurn off user journalled quota.h]hTurn off user journalled quota.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h offgrpjquotah]h offgrpjquota}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(h Turn off group journalled quota.h]h Turn off group journalled quota.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h offprjjquotah]h offprjjquota}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhj ubjJ)}(hhh]h)}(h"Turn off project journalled quota.h]h"Turn off project journalled quota.}(hj)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj&ubah}(h]h ]h"]h$]h&]uh1jIhj ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hquotah]hquota}(hjIhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjFubah}(h]h ]h"]h$]h&]uh1jIhjCubjJ)}(hhh]h)}(h(Enable plain user disk quota accounting.h]h(Enable plain user disk quota accounting.}(hj`hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj]ubah}(h]h ]h"]h$]h&]uh1jIhjCubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hnoquotah]hnoquota}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj}ubah}(h]h ]h"]h$]h&]uh1jIhjzubjJ)}(hhh]h)}(h$Disable all plain disk quota option.h]h$Disable all plain disk quota option.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjzubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h alloc_mode=%sh]h alloc_mode=%s}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hEAdjust block allocation policy, which supports "reuse" and "default".h]hMAdjust block allocation policy, which supports “reuse” and “default”.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h fsync_mode=%sh]h fsync_mode=%s}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hXControl the policy of fsync. Currently supports "posix", "strict", and "nobarrier". In "posix" mode, which is default, fsync will follow POSIX semantics and does a light operation to improve the filesystem performance. In "strict" mode, fsync will be heavy and behaves in line with xfs, ext4 and btrfs, where xfstest generic/342 will pass, but the performance will regress. "nobarrier" is based on "posix", but doesn't issue flush command for non-atomic files likewise "nobarrier" mount option.h]hXControl the policy of fsync. Currently supports “posix”, “strict”, and “nobarrier”. In “posix” mode, which is default, fsync will follow POSIX semantics and does a light operation to improve the filesystem performance. In “strict” mode, fsync will be heavy and behaves in line with xfs, ext4 and btrfs, where xfstest generic/342 will pass, but the performance will regress. “nobarrier” is based on “posix”, but doesn’t issue flush command for non-atomic files likewise “nobarrier” mount option.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(htest_dummy_encryptionh]htest_dummy_encryption}(hj%hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj"ubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(htest_dummy_encryption=%sh]htest_dummy_encryption=%s}(hjNhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjKubah}(h]h ]h"]h$]h&]uh1jIhjHubjJ)}(hhh]h)}(hEnable dummy encryption, which provides a fake fscrypt context. The fake fscrypt context is used by xfstests. The argument may be either "v1" or "v2", in order to select the corresponding fscrypt policy version.h]hEnable dummy encryption, which provides a fake fscrypt context. The fake fscrypt context is used by xfstests. The argument may be either “v1” or “v2”, in order to select the corresponding fscrypt policy version.}(hjehhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjbubah}(h]h ]h"]h$]h&]uh1jIhjHubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hcheckpoint=%s[:%u[%]]h]hcheckpoint=%s[:%u[%]]}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hXSet to "disable" to turn off checkpointing. Set to "enable" to reenable checkpointing. Is enabled by default. While disabled, any unmounting or unexpected shutdowns will cause the filesystem contents to appear as they did when the filesystem was mounted with that option. While mounting with checkpoint=disable, the filesystem must run garbage collection to ensure that all available space can be used. If this takes too much time, the mount may return EAGAIN. You may optionally add a value to indicate how much of the disk you would be willing to temporarily give up to avoid additional garbage collection. This can be given as a number of blocks, or as a percent. For instance, mounting with checkpoint=disable:100% would always succeed, but it may hide up to all remaining free space. The actual space that would be unusable can be viewed at /sys/fs/f2fs//unusable This space is reclaimed once checkpoint=enable.h]hXSet to “disable” to turn off checkpointing. Set to “enable” to reenable checkpointing. Is enabled by default. While disabled, any unmounting or unexpected shutdowns will cause the filesystem contents to appear as they did when the filesystem was mounted with that option. While mounting with checkpoint=disable, the filesystem must run garbage collection to ensure that all available space can be used. If this takes too much time, the mount may return EAGAIN. You may optionally add a value to indicate how much of the disk you would be willing to temporarily give up to avoid additional garbage collection. This can be given as a number of blocks, or as a percent. For instance, mounting with checkpoint=disable:100% would always succeed, but it may hide up to all remaining free space. The actual space that would be unusable can be viewed at /sys/fs/f2fs//unusable This space is reclaimed once checkpoint=enable.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hcheckpoint_mergeh]hcheckpoint_merge}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hXSWhen checkpoint is enabled, this can be used to create a kernel daemon and make it to merge concurrent checkpoint requests as much as possible to eliminate redundant checkpoint issues. Plus, we can eliminate the sluggish issue caused by slow checkpoint operation when the checkpoint is done in a process context in a cgroup having low i/o budget and cpu shares. To make this do better, we set the default i/o priority of the kernel daemon to "3", to give one higher priority than other kernel threads. This is the same way to give a I/O priority to the jbd2 journaling thread of ext4 filesystem.h]hXWWhen checkpoint is enabled, this can be used to create a kernel daemon and make it to merge concurrent checkpoint requests as much as possible to eliminate redundant checkpoint issues. Plus, we can eliminate the sluggish issue caused by slow checkpoint operation when the checkpoint is done in a process context in a cgroup having low i/o budget and cpu shares. To make this do better, we set the default i/o priority of the kernel daemon to “3”, to give one higher priority than other kernel threads. This is the same way to give a I/O priority to the jbd2 journaling thread of ext4 filesystem.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hnocheckpoint_mergeh]hnocheckpoint_merge}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(h!Disable checkpoint merge feature.h]h!Disable checkpoint merge feature.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hcompress_algorithm=%sh]hcompress_algorithm=%s}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj'ubah}(h]h ]h"]h$]h&]uh1jIhj$ubjJ)}(hhh]h)}(haControl compress algorithm, currently f2fs supports "lzo", "lz4", "zstd" and "lzo-rle" algorithm.h]hqControl compress algorithm, currently f2fs supports “lzo”, “lz4”, “zstd” and “lzo-rle” algorithm.}(hjAhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj>ubah}(h]h ]h"]h$]h&]uh1jIhj$ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hcompress_algorithm=%s:%dh]hcompress_algorithm=%s:%d}(hjahhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM"hj^ubah}(h]h ]h"]h$]h&]uh1jIhj[ubjJ)}(hhh]h)}(hControl compress algorithm and its compress level, now, only "lz4" and "zstd" support compress level config. algorithm level range lz4 3 - 16 zstd 1 - 22h]hControl compress algorithm and its compress level, now, only “lz4” and “zstd” support compress level config. algorithm level range lz4 3 - 16 zstd 1 - 22}(hjxhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM"hjuubah}(h]h ]h"]h$]h&]uh1jIhj[ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hcompress_log_size=%uh]hcompress_log_size=%u}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM'hjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(htSupport configuring compress cluster size. The size will be 4KB * (1 << %u). The default and minimum sizes are 16KB.h]htSupport configuring compress cluster size. The size will be 4KB * (1 << %u). The default and minimum sizes are 16KB.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM'hjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hcompress_extension=%sh]hcompress_extension=%s}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM)hjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hXSupport adding specified extension, so that f2fs can enable compression on those corresponding files, e.g. if all files with '.ext' has high compression rate, we can set the '.ext' on compression extension list and enable compression on these file by default rather than to enable it via ioctl. For other files, we can still enable compression via ioctl. Note that, there is one reserved special extension '*', it can be set to enable compression for all files.h]hXSupport adding specified extension, so that f2fs can enable compression on those corresponding files, e.g. if all files with ‘.ext’ has high compression rate, we can set the ‘.ext’ on compression extension list and enable compression on these file by default rather than to enable it via ioctl. For other files, we can still enable compression via ioctl. Note that, there is one reserved special extension ‘*’, it can be set to enable compression for all files.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM)hjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hnocompress_extension=%sh]hnocompress_extension=%s}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM1hjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hXSupport adding specified extension, so that f2fs can disable compression on those corresponding files, just contrary to compression extension. If you know exactly which files cannot be compressed, you can use this. The same extension name can't appear in both compress and nocompress extension at the same time. If the compress extension specifies all files, the types specified by the nocompress extension will be treated as special cases and will not be compressed. Don't allow use '*' to specifie all file in nocompress extension. After add nocompress_extension, the priority should be: dir_flag < comp_extention,nocompress_extension < comp_file_flag,no_comp_file_flag. See more in compression sections.h]hXSupport adding specified extension, so that f2fs can disable compression on those corresponding files, just contrary to compression extension. If you know exactly which files cannot be compressed, you can use this. The same extension name can’t appear in both compress and nocompress extension at the same time. If the compress extension specifies all files, the types specified by the nocompress extension will be treated as special cases and will not be compressed. Don’t allow use ‘*’ to specifie all file in nocompress extension. After add nocompress_extension, the priority should be: dir_flag < comp_extention,nocompress_extension < comp_file_flag,no_comp_file_flag. See more in compression sections.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM1hjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hcompress_chksumh]hcompress_chksum}(hj=hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM=hj:ubah}(h]h ]h"]h$]h&]uh1jIhj7ubjJ)}(hhh]h)}(h;Support verifying chksum of raw data in compressed cluster.h]h;Support verifying chksum of raw data in compressed cluster.}(hjThhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM=hjQubah}(h]h ]h"]h$]h&]uh1jIhj7ubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hcompress_mode=%sh]hcompress_mode=%s}(hjthhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM>hjqubah}(h]h ]h"]h$]h&]uh1jIhjnubjJ)}(hhh]h)}(hX~Control file compression mode. This supports "fs" and "user" modes. In "fs" mode (default), f2fs does automatic compression on the compression enabled files. In "user" mode, f2fs disables the automaic compression and gives the user discretion of choosing the target file and the timing. The user can do manual compression/decompression on the compression enabled files using ioctls.h]hXControl file compression mode. This supports “fs” and “user” modes. In “fs” mode (default), f2fs does automatic compression on the compression enabled files. In “user” mode, f2fs disables the automaic compression and gives the user discretion of choosing the target file and the timing. The user can do manual compression/decompression on the compression enabled files using ioctls.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM>hjubah}(h]h ]h"]h$]h&]uh1jIhjnubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hcompress_cacheh]hcompress_cache}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMEhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hSupport to use address space of a filesystem managed inode to cache compressed block, in order to improve cache hit ratio of random read.h]hSupport to use address space of a filesystem managed inode to cache compressed block, in order to improve cache hit ratio of random read.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMEhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h inlinecrypth]h inlinecrypt}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMHhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hXWhen possible, encrypt/decrypt the contents of encrypted files using the blk-crypto framework rather than filesystem-layer encryption. This allows the use of inline encryption hardware. The on-disk format is unaffected. For more details, see Documentation/block/inline-encryption.rst.h]hXWhen possible, encrypt/decrypt the contents of encrypted files using the blk-crypto framework rather than filesystem-layer encryption. This allows the use of inline encryption hardware. The on-disk format is unaffected. For more details, see Documentation/block/inline-encryption.rst.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMHhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hatgch]hatgc}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMNhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hhEnable age-threshold garbage collection, it provides high effectiveness and efficiency on background GC.h]hhEnable age-threshold garbage collection, it provides high effectiveness and efficiency on background GC.}(hj0hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMNhj-ubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hdiscard_unit=%sh]hdiscard_unit=%s}(hjPhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMPhjMubah}(h]h ]h"]h$]h&]uh1jIhjJubjJ)}(hhh]h)}(hXControl discard unit, the argument can be "block", "segment" and "section", issued discard command's offset/size will be aligned to the unit, by default, "discard_unit=block" is set, so that small discard functionality is enabled. For blkzoned device, "discard_unit=section" will be set by default, it is helpful for large sized SMR or ZNS devices to reduce memory cost by getting rid of fs metadata supports small discard.h]hXControl discard unit, the argument can be “block”, “segment” and “section”, issued discard command’s offset/size will be aligned to the unit, by default, “discard_unit=block” is set, so that small discard functionality is enabled. For blkzoned device, “discard_unit=section” will be set by default, it is helpful for large sized SMR or ZNS devices to reduce memory cost by getting rid of fs metadata supports small discard.}(hjghhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMPhjdubah}(h]h ]h"]h$]h&]uh1jIhjJubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h memory=%sh]h memory=%s}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMXhjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hX(Control memory mode. This supports "normal" and "low" modes. "low" mode is introduced to support low memory devices. Because of the nature of low memory devices, in this mode, f2fs will try to save memory sometimes by sacrificing performance. "normal" mode is the default mode and same as before.h]hX8Control memory mode. This supports “normal” and “low” modes. “low” mode is introduced to support low memory devices. Because of the nature of low memory devices, in this mode, f2fs will try to save memory sometimes by sacrificing performance. “normal” mode is the default mode and same as before.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMXhjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hage_extent_cacheh]hage_extent_cache}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM]hjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hEnable an age extent cache based on rb-tree. It records data block update frequency of the extent per inode, in order to provide better temperature hints for data block allocation.h]hEnable an age extent cache based on rb-tree. It records data block update frequency of the extent per inode, in order to provide better temperature hints for data block allocation.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM]hjubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(h errors=%sh]h errors=%s}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMahjubah}(h]h ]h"]h$]h&]uh1jIhjubjJ)}(hhh]h)}(hXSpecify f2fs behavior on critical errors. This supports modes: "panic", "continue" and "remount-ro", respectively, trigger panic immediately, continue without doing anything, and remount the partition in read-only mode. By default it uses "continue" mode. ====================== =============== =============== ======== mode continue remount-ro panic ====================== =============== =============== ======== access ops normal normal N/A syscall errors -EIO -EROFS N/A mount option rw ro N/A pending dir write keep keep N/A pending non-dir write drop keep N/A pending node write drop keep N/A pending meta write keep keep N/A ====================== =============== =============== ========h]hXSpecify f2fs behavior on critical errors. This supports modes: “panic”, “continue” and “remount-ro”, respectively, trigger panic immediately, continue without doing anything, and remount the partition in read-only mode. By default it uses “continue” mode. ====================== =============== =============== ======== mode continue remount-ro panic ====================== =============== =============== ======== access ops normal normal N/A syscall errors -EIO -EROFS N/A mount option rw ro N/A pending dir write keep keep N/A pending non-dir write drop keep N/A pending node write drop keep N/A pending meta write keep keep N/A ====================== =============== =============== ========}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMahj ubah}(h]h ]h"]h$]h&]uh1jIhjubeh}(h]h ]h"]h$]h&]uh1jDhjAubjE)}(hhh](jJ)}(hhh]h)}(hnat_bitsh]hnat_bits}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMqhj)ubah}(h]h ]h"]h$]h&]uh1jIhj&ubjJ)}(hhh]h)}(hZEnable nat_bits feature to enhance full/empty nat blocks access, by default it's disabled.h]h\Enable nat_bits feature to enhance full/empty nat blocks access, by default it’s disabled.}(hjChhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMqhj@ubah}(h]h ]h"]h$]h&]uh1jIhj&ubeh}(h]h ]h"]h$]h&]uh1jDhjAubeh}(h]h ]h"]h$]h&]uh1j?hj&ubeh}(h]h ]h"]h$]h&]colsKuh1j$hj!ubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubeh}(h] mount-optionsah ]h"] mount optionsah$]h&]uh1hhhhhhhhKiubh)}(hhh](h)}(hDebugfs Entriesh]hDebugfs Entries}(hj{hhhNhNubah}(h]h ]h"]h$]h&]uh1hhjxhhhhhMvubh)}(h/sys/kernel/debug/f2fs/ contains information about all the partitions mounted as f2fs. Each file shows the whole f2fs information.h]h/sys/kernel/debug/f2fs/ contains information about all the partitions mounted as f2fs. Each file shows the whole f2fs information.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMxhjxhhubh)}(h'/sys/kernel/debug/f2fs/status includes:h]h'/sys/kernel/debug/f2fs/status includes:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM{hjxhhubh block_quote)}(h- major file system information managed by f2fs currently - average SIT information about whole segments - current memory footprint consumed by f2fs. h]j)}(hhh](j )}(h7major file system information managed by f2fs currentlyh]h)}(hjh]h7major file system information managed by f2fs currently}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM}hjubah}(h]h ]h"]h$]h&]uh1jhjubj )}(h,average SIT information about whole segmentsh]h)}(hjh]h,average SIT information about whole segments}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM~hjubah}(h]h ]h"]h$]h&]uh1jhjubj )}(h+current memory footprint consumed by f2fs. h]h)}(h*current memory footprint consumed by f2fs.h]h*current memory footprint consumed by f2fs.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jhjubeh}(h]h ]h"]h$]h&]j(j)uh1jhhhM}hjubah}(h]h ]h"]h$]h&]uh1jhhhM}hjxhhubeh}(h]debugfs-entriesah ]h"]debugfs entriesah$]h&]uh1hhhhhhhhMvubh)}(hhh](h)}(h Sysfs Entriesh]h Sysfs Entries}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhMubh)}(hInformation about mounted f2fs file systems can be found in /sys/fs/f2fs. Each mounted filesystem will have a directory in /sys/fs/f2fs based on its device name (i.e., /sys/fs/f2fs/sda). The files in each per-device directory are shown in table below.h]hInformation about mounted f2fs file systems can be found in /sys/fs/f2fs. Each mounted filesystem will have a directory in /sys/fs/f2fs based on its device name (i.e., /sys/fs/f2fs/sda). The files in each per-device directory are shown in table below.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hRFiles in /sys/fs/f2fs/ (see also Documentation/ABI/testing/sysfs-fs-f2fs)h]hRFiles in /sys/fs/f2fs/ (see also Documentation/ABI/testing/sysfs-fs-f2fs)}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubeh}(h] sysfs-entriesah ]h"] sysfs entriesah$]h&]uh1hhhhhhhhMubh)}(hhh](h)}(hUsageh]hUsage}(hj@hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj=hhhhhMubjJ)}(hhh](j )}(h*Download userland tools and compile them. h]h)}(h)Download userland tools and compile them.h]h)Download userland tools and compile them.}(hjUhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjQubah}(h]h ]h"]h$]h&]uh1jhjNhhhhhNubj )}(hsSkip, if f2fs was compiled statically inside kernel. Otherwise, insert the f2fs.ko module:: # insmod f2fs.ko h](h)}(h[Skip, if f2fs was compiled statically inside kernel. Otherwise, insert the f2fs.ko module::h]hZSkip, if f2fs was compiled statically inside kernel. Otherwise, insert the f2fs.ko module:}(hjmhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjiubh literal_block)}(h# insmod f2fs.koh]h# insmod f2fs.ko}hj}sbah}(h]h ]h"]h$]h&]hhuh1j{hhhMhjiubeh}(h]h ]h"]h$]h&]uh1jhjNhhhhhNubj )}(hBCreate a directory to use when mounting:: # mkdir /mnt/f2fs h](h)}(h)Create a directory to use when mounting::h]h(Create a directory to use when mounting:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubj|)}(h# mkdir /mnt/f2fsh]h# mkdir /mnt/f2fs}hjsbah}(h]h ]h"]h$]h&]hhuh1j{hhhMhjubeh}(h]h ]h"]h$]h&]uh1jhjNhhhhhNubj )}(hFormat the block device, and then mount as f2fs:: # mkfs.f2fs -l label /dev/block_device # mount -t f2fs /dev/block_device /mnt/f2fs h](h)}(h1Format the block device, and then mount as f2fs::h]h0Format the block device, and then mount as f2fs:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubj|)}(hR# mkfs.f2fs -l label /dev/block_device # mount -t f2fs /dev/block_device /mnt/f2fsh]hR# mkfs.f2fs -l label /dev/block_device # mount -t f2fs /dev/block_device /mnt/f2fs}hjsbah}(h]h ]h"]h$]h&]hhuh1j{hhhMhjubeh}(h]h ]h"]h$]h&]uh1jhjNhhhhhNubeh}(h]h ]h"]h$]h&]jjjhjjuh1jIhj=hhhhhMubh)}(hhh](h)}(h mkfs.f2fsh]h mkfs.f2fs}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhMubh)}(hsThe mkfs.f2fs is for the use of formatting a partition as the f2fs filesystem, which builds a basic on-disk layout.h]hsThe mkfs.f2fs is for the use of formatting a partition as the f2fs filesystem, which builds a basic on-disk layout.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(hThe quick options consist of:h]hThe quick options consist of:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubj )}(hhh]j%)}(hhh](j*)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1j)hjubj*)}(hhh]h}(h]h ]h"]h$]h&]colwidthK align with the segment size _________________________________________________________________________ | | | Segment | Node | Segment | | | Superblock | Checkpoint | Info. | Address | Summary | Main | | (SB) | (CP) | Table (SIT) | Table (NAT) | Area (SSA) | | |____________|_____2______|______N______|______N______|______N_____|__N___| . . . . . . ._________________________________________. |_Segment_|_..._|_Segment_|_..._|_Segment_| . . ._________._________ |_section_|__...__|_ . . .________. |__zone__|h]hX align with the zone size <-| |-> align with the segment size _________________________________________________________________________ | | | Segment | Node | Segment | | | Superblock | Checkpoint | Info. | Address | Summary | Main | | (SB) | (CP) | Table (SIT) | Table (NAT) | Area (SSA) | | |____________|_____2______|______N______|______N______|______N_____|__N___| . . . . . . ._________________________________________. |_Segment_|_..._|_Segment_|_..._|_Segment_| . . ._________._________ |_section_|__...__|_ . . .________. |__zone__|}hjDsbah}(h]h ]h"]h$]h&]hhuh1j{hhhM hjhhubj)}(hhh](j )}(hSuperblock (SB) It is located at the beginning of the partition, and there exist two copies to avoid file system crash. It contains basic partition information and some default parameters of f2fs. h]hdefinition_list)}(hhh]hdefinition_list_item)}(hSuperblock (SB) It is located at the beginning of the partition, and there exist two copies to avoid file system crash. It contains basic partition information and some default parameters of f2fs. h](hterm)}(hSuperblock (SB)h]hSuperblock (SB)}(hjfhhhNhNubah}(h]h ]h"]h$]h&]uh1jdhhhM#hj`ubh definition)}(hhh]h)}(hIt is located at the beginning of the partition, and there exist two copies to avoid file system crash. It contains basic partition information and some default parameters of f2fs.h]hIt is located at the beginning of the partition, and there exist two copies to avoid file system crash. It contains basic partition information and some default parameters of f2fs.}(hjyhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM!hjvubah}(h]h ]h"]h$]h&]uh1jthj`ubeh}(h]h ]h"]h$]h&]uh1j^hhhM#hj[ubah}(h]h ]h"]h$]h&]uh1jYhjUubah}(h]h ]h"]h$]h&]uh1jhjRhhhNhNubj )}(hCheckpoint (CP) It contains file system information, bitmaps for valid NAT/SIT sets, orphan inode lists, and summary entries of current active segments. h]jZ)}(hhh]j_)}(hCheckpoint (CP) It contains file system information, bitmaps for valid NAT/SIT sets, orphan inode lists, and summary entries of current active segments. h](je)}(hCheckpoint (CP)h]hCheckpoint (CP)}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1jdhhhM'hjubju)}(hhh]h)}(hIt contains file system information, bitmaps for valid NAT/SIT sets, orphan inode lists, and summary entries of current active segments.h]hIt contains file system information, bitmaps for valid NAT/SIT sets, orphan inode lists, and summary entries of current active segments.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM&hjubah}(h]h ]h"]h$]h&]uh1jthjubeh}(h]h ]h"]h$]h&]uh1j^hhhM'hjubah}(h]h ]h"]h$]h&]uh1jYhjubah}(h]h ]h"]h$]h&]uh1jhjRhhhNhNubj )}(hSegment Information Table (SIT) It contains segment information such as valid block count and bitmap for the validity of all the blocks. h]jZ)}(hhh]j_)}(hSegment Information Table (SIT) It contains segment information such as valid block count and bitmap for the validity of all the blocks. h](je)}(hSegment Information Table (SIT)h]hSegment Information Table (SIT)}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1jdhhhM+hjubju)}(hhh]h)}(hhIt contains segment information such as valid block count and bitmap for the validity of all the blocks.h]hhIt contains segment information such as valid block count and bitmap for the validity of all the blocks.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM*hjubah}(h]h ]h"]h$]h&]uh1jthjubeh}(h]h ]h"]h$]h&]uh1j^hhhM+hjubah}(h]h ]h"]h$]h&]uh1jYhjubah}(h]h ]h"]h$]h&]uh1jhjRhhhNhNubj )}(hpNode Address Table (NAT) It is composed of a block address table for all the node blocks stored in Main area. h]jZ)}(hhh]j_)}(hnNode Address Table (NAT) It is composed of a block address table for all the node blocks stored in Main area. h](je)}(hNode Address Table (NAT)h]hNode Address Table (NAT)}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1jdhhhM/hj*ubju)}(hhh]h)}(hTIt is composed of a block address table for all the node blocks stored in Main area.h]hTIt is composed of a block address table for all the node blocks stored in Main area.}(hj?hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM.hj<ubah}(h]h ]h"]h$]h&]uh1jthj*ubeh}(h]h ]h"]h$]h&]uh1j^hhhM/hj'ubah}(h]h ]h"]h$]h&]uh1jYhj#ubah}(h]h ]h"]h$]h&]uh1jhjRhhhNhNubj )}(hSegment Summary Area (SSA) It contains summary entries which contains the owner information of all the data and node blocks stored in Main area. h]jZ)}(hhh]j_)}(hSegment Summary Area (SSA) It contains summary entries which contains the owner information of all the data and node blocks stored in Main area. h](je)}(hSegment Summary Area (SSA)h]hSegment Summary Area (SSA)}(hjphhhNhNubah}(h]h ]h"]h$]h&]uh1jdhhhM3hjlubju)}(hhh]h)}(huIt contains summary entries which contains the owner information of all the data and node blocks stored in Main area.h]huIt contains summary entries which contains the owner information of all the data and node blocks stored in Main area.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM2hj~ubah}(h]h ]h"]h$]h&]uh1jthjlubeh}(h]h ]h"]h$]h&]uh1j^hhhM3hjiubah}(h]h ]h"]h$]h&]uh1jYhjeubah}(h]h ]h"]h$]h&]uh1jhjRhhhNhNubj )}(hHMain Area It contains file and directory data including their indices. h]jZ)}(hhh]j_)}(hGMain Area It contains file and directory data including their indices. h](je)}(h Main Areah]h Main Area}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1jdhhhM6hjubju)}(hhh]h)}(h Dir <-------------- | | child child child - child [hole] - child child - child - child [hole] - [hole] - child Case 1: Case 2: Number of children = 6, Number of children = 3, File size = 7 File size = 7h]hX| --------------> Dir <-------------- | | child child child - child [hole] - child child - child - child [hole] - [hole] - child Case 1: Case 2: Number of children = 6, Number of children = 3, File size = 7 File size = 7}hj sbah}(h]h ]h"]h$]h&]hhuh1j{hhhMhjhhubeh}(h]directory-structureah ]h"]directory structureah$]h&]uh1hhjhhhhhMxubh)}(hhh](h)}(hDefault Block Allocationh]hDefault Block Allocation}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj hhhhhMubh)}(hgAt runtime, F2FS manages six active logs inside "Main" area: Hot/Warm/Cold node and Hot/Warm/Cold data.h]hkAt runtime, F2FS manages six active logs inside “Main” area: Hot/Warm/Cold node and Hot/Warm/Cold data.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj hhubj)}(hhh](j )}(h9Hot node contains direct node blocks of directories.h]h)}(hj h]h9Hot node contains direct node blocks of directories.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubah}(h]h ]h"]h$]h&]uh1jhj hhhhhNubj )}(hAWarm node contains direct node blocks except hot node blocks.h]h)}(hj !h]hAWarm node contains direct node blocks except hot node blocks.}(hj !hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj!ubah}(h]h ]h"]h$]h&]uh1jhj hhhhhNubj )}(h+Cold node contains indirect node blocksh]h)}(hj!!h]h+Cold node contains indirect node blocks}(hj#!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj!ubah}(h]h ]h"]h$]h&]uh1jhj hhhhhNubj )}(h$Hot data contains dentry blocksh]h)}(hj8!h]h$Hot data contains dentry blocks}(hj:!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj6!ubah}(h]h ]h"]h$]h&]uh1jhj hhhhhNubj )}(hBWarm data contains data blocks except hot and cold data blocksh]h)}(hjO!h]hBWarm data contains data blocks except hot and cold data blocks}(hjQ!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjM!ubah}(h]h ]h"]h$]h&]uh1jhj hhhhhNubj )}(h?Cold data contains multimedia data or migrated data blocks h]h)}(h>Cold data contains multimedia data or migrated data blocksh]h>Cold data contains multimedia data or migrated data blocks}(hjh!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjd!ubah}(h]h ]h"]h$]h&]uh1jhj hhhhhNubeh}(h]h ]h"]h$]h&]j(j)uh1jhhhMhj hhubh)}(hXLFS has two schemes for free space management: threaded log and copy-and-compac- tion. The copy-and-compaction scheme which is known as cleaning, is well-suited for devices showing very good sequential write performance, since free segments are served all the time for writing new data. However, it suffers from cleaning overhead under high utilization. Contrarily, the threaded log scheme suffers from random writes, but no cleaning process is needed. F2FS adopts a hybrid scheme where the copy-and-compaction scheme is adopted by default, but the policy is dynamically changed to the threaded log scheme according to the file system status.h]hXLFS has two schemes for free space management: threaded log and copy-and-compac- tion. The copy-and-compaction scheme which is known as cleaning, is well-suited for devices showing very good sequential write performance, since free segments are served all the time for writing new data. However, it suffers from cleaning overhead under high utilization. Contrarily, the threaded log scheme suffers from random writes, but no cleaning process is needed. F2FS adopts a hybrid scheme where the copy-and-compaction scheme is adopted by default, but the policy is dynamically changed to the threaded log scheme according to the file system status.}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj hhubh)}(hXIn order to align F2FS with underlying flash-based storage, F2FS allocates a segment in a unit of section. F2FS expects that the section size would be the same as the unit size of garbage collection in FTL. Furthermore, with respect to the mapping granularity in FTL, F2FS allocates each section of the active logs from different zones as much as possible, since FTL can write the data in the active logs into one allocation unit according to its mapping granularity.h]hXIn order to align F2FS with underlying flash-based storage, F2FS allocates a segment in a unit of section. F2FS expects that the section size would be the same as the unit size of garbage collection in FTL. Furthermore, with respect to the mapping granularity in FTL, F2FS allocates each section of the active logs from different zones as much as possible, since FTL can write the data in the active logs into one allocation unit according to its mapping granularity.}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj hhubeh}(h]default-block-allocationah ]h"]default block allocationah$]h&]uh1hhjhhhhhMubh)}(hhh](h)}(hCleaning processh]hCleaning process}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj!hhhhhMubh)}(hF2FS does cleaning both on demand and in the background. On-demand cleaning is triggered when there are not enough free segments to serve VFS calls. Background cleaner is operated by a kernel thread, and triggers the cleaning job when the system is idle.h]hF2FS does cleaning both on demand and in the background. On-demand cleaning is triggered when there are not enough free segments to serve VFS calls. Background cleaner is operated by a kernel thread, and triggers the cleaning job when the system is idle.}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj!hhubh)}(hXF2FS supports two victim selection policies: greedy and cost-benefit algorithms. In the greedy algorithm, F2FS selects a victim segment having the smallest number of valid blocks. In the cost-benefit algorithm, F2FS selects a victim segment according to the segment age and the number of valid blocks in order to address log block thrashing problem in the greedy algorithm. F2FS adopts the greedy algorithm for on-demand cleaner, while background cleaner adopts cost-benefit algorithm.h]hXF2FS supports two victim selection policies: greedy and cost-benefit algorithms. In the greedy algorithm, F2FS selects a victim segment having the smallest number of valid blocks. In the cost-benefit algorithm, F2FS selects a victim segment according to the segment age and the number of valid blocks in order to address log block thrashing problem in the greedy algorithm. F2FS adopts the greedy algorithm for on-demand cleaner, while background cleaner adopts cost-benefit algorithm.}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj!hhubh)}(hIn order to identify whether the data in the victim segment are valid or not, F2FS manages a bitmap. Each bit represents the validity of a block, and the bitmap is composed of a bit stream covering whole blocks in main area.h]hIn order to identify whether the data in the victim segment are valid or not, F2FS manages a bitmap. Each bit represents the validity of a block, and the bitmap is composed of a bit stream covering whole blocks in main area.}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj!hhubeh}(h]cleaning-processah ]h"]cleaning processah$]h&]uh1hhjhhhhhMubh)}(hhh](h)}(hWrite-hint Policyh]hWrite-hint Policy}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj!hhhhhM ubh)}(h7F2FS sets the whint all the time with the below policy.h]h7F2FS sets the whint all the time with the below policy.}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj!hhubj )}(hhh]j%)}(hhh](j*)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1j)hj "ubj*)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1j)hj "ubj*)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1j)hj "ubj )}(hhh]jE)}(hhh](jJ)}(hhh]h)}(hUserh]hUser}(hj5"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj2"ubah}(h]h ]h"]h$]h&]uh1jIhj/"ubjJ)}(hhh]h)}(hF2FSh]hF2FS}(hjL"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjI"ubah}(h]h ]h"]h$]h&]uh1jIhj/"ubjJ)}(hhh]h)}(hBlockh]hBlock}(hjc"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj`"ubah}(h]h ]h"]h$]h&]uh1jIhj/"ubeh}(h]h ]h"]h$]h&]uh1jDhj,"ubah}(h]h ]h"]h$]h&]uh1j hj "ubj@)}(hhh](jE)}(hhh](jJ)}(hhh]h)}(hN/Ah]hN/A}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj"ubah}(h]h ]h"]h$]h&]uh1jIhj"ubjJ)}(hhh]h)}(hMETAh]hMETA}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj"ubah}(h]h ]h"]h$]h&]uh1jIhj"ubjJ)}(hhh]h)}(hWRITE_LIFE_NONE|REQ_METAh]hWRITE_LIFE_NONE|REQ_META}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj"ubah}(h]h ]h"]h$]h&]uh1jIhj"ubeh}(h]h ]h"]h$]h&]uh1jDhj"ubjE)}(hhh](jJ)}(hhh]h)}(hN/Ah]hN/A}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj"ubah}(h]h ]h"]h$]h&]uh1jIhj"ubjJ)}(hhh]h)}(hHOT_NODEh]hHOT_NODE}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj"ubah}(h]h ]h"]h$]h&]uh1jIhj"ubjJ)}(hhh]h)}(hWRITE_LIFE_NONEh]hWRITE_LIFE_NONE}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj#ubah}(h]h ]h"]h$]h&]uh1jIhj"ubeh}(h]h ]h"]h$]h&]uh1jDhj"ubjE)}(hhh](jJ)}(hhh]h)}(hN/Ah]hN/A}(hj(#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj%#ubah}(h]h ]h"]h$]h&]uh1jIhj"#ubjJ)}(hhh]h)}(h WARM_NODEh]h WARM_NODE}(hj?#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj<#ubah}(h]h ]h"]h$]h&]uh1jIhj"#ubjJ)}(hhh]h)}(hWRITE_LIFE_MEDIUMh]hWRITE_LIFE_MEDIUM}(hjV#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjS#ubah}(h]h ]h"]h$]h&]uh1jIhj"#ubeh}(h]h ]h"]h$]h&]uh1jDhj"ubjE)}(hhh](jJ)}(hhh]h)}(hN/Ah]hN/A}(hjv#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjs#ubah}(h]h ]h"]h$]h&]uh1jIhjp#ubjJ)}(hhh]h)}(h COLD_NODEh]h COLD_NODE}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj#ubah}(h]h ]h"]h$]h&]uh1jIhjp#ubjJ)}(hhh]h)}(hWRITE_LIFE_LONGh]hWRITE_LIFE_LONG}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj#ubah}(h]h ]h"]h$]h&]uh1jIhjp#ubeh}(h]h ]h"]h$]h&]uh1jDhj"ubjE)}(hhh](jJ)}(hhh]h)}(h ioctl(COLD)h]h ioctl(COLD)}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj#ubah}(h]h ]h"]h$]h&]uh1jIhj#ubjJ)}(hhh]h)}(h COLD_DATAh]h COLD_DATA}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj#ubah}(h]h ]h"]h$]h&]uh1jIhj#ubjJ)}(hhh]h)}(hWRITE_LIFE_EXTREMEh]hWRITE_LIFE_EXTREME}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj#ubah}(h]h ]h"]h$]h&]uh1jIhj#ubeh}(h]h ]h"]h$]h&]uh1jDhj"ubjE)}(hhh](jJ)}(hhh]h)}(hextension listh]hextension list}(hj$hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj$ubah}(h]h ]h"]h$]h&]uh1jIhj $ubjJ)}(hhh]h)}(h"h]h“}(hj)$hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj&$ubah}(h]h ]h"]h$]h&]uh1jIhj $ubjJ)}(hhh]h)}(hj+$h]h“}(hj@$hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj=$ubah}(h]h ]h"]h$]h&]uh1jIhj $ubeh}(h]h ]h"]h$]h&]uh1jDhj"ubjE)}(hhh](jJ)}(hhh]h)}(h-- buffered ioh]h-- buffered io}(hj_$hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj\$ubah}(h]h ]h"]h$]h&]uh1jIhjY$ubjJ)}(hhh]h}(h]h ]h"]h$]h&]uh1jIhjY$ubjJ)}(hhh]h}(h]h ]h"]h$]h&]uh1jIhjY$ubeh}(h]h ]h"]h$]h&]uh1jDhj"ubjE)}(hhh](jJ)}(hhh]h)}(hN/Ah]hN/A}(hj$hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj$ubah}(h]h ]h"]h$]h&]uh1jIhj$ubjJ)}(hhh]h)}(h COLD_DATAh]h COLD_DATA}(hj$hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj$ubah}(h]h ]h"]h$]h&]uh1jIhj$ubjJ)}(hhh]h)}(hWRITE_LIFE_EXTREMEh]hWRITE_LIFE_EXTREME}(hj$hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj$ubah}(h]h ]h"]h$]h&]uh1jIhj$ubeh}(h]h ]h"]h$]h&]uh1jDhj"ubjE)}(hhh](jJ)}(hhh]h)}(hN/Ah]hN/A}(hj$hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj$ubah}(h]h ]h"]h$]h&]uh1jIhj$ubjJ)}(hhh]h)}(hHOT_DATAh]hHOT_DATA}(hj$hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj$ubah}(h]h ]h"]h$]h&]uh1jIhj$ubjJ)}(hhh]h)}(hWRITE_LIFE_SHORTh]hWRITE_LIFE_SHORT}(hj %hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj %ubah}(h]h ]h"]h$]h&]uh1jIhj$ubeh}(h]h ]h"]h$]h&]uh1jDhj"ubjE)}(hhh](jJ)}(hhh]h)}(hN/Ah]hN/A}(hj-%hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj*%ubah}(h]h ]h"]h$]h&]uh1jIhj'%ubjJ)}(hhh]h)}(h WARM_DATAh]h WARM_DATA}(hjD%hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjA%ubah}(h]h ]h"]h$]h&]uh1jIhj'%ubjJ)}(hhh]h)}(hWRITE_LIFE_NOT_SETh]hWRITE_LIFE_NOT_SET}(hj[%hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjX%ubah}(h]h ]h"]h$]h&]uh1jIhj'%ubeh}(h]h ]h"]h$]h&]uh1jDhj"ubjE)}(hhh](jJ)}(hhh]h)}(h -- direct ioh]h -- direct io}(hj{%hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjx%ubah}(h]h ]h"]h$]h&]uh1jIhju%ubjJ)}(hhh]h}(h]h ]h"]h$]h&]uh1jIhju%ubjJ)}(hhh]h}(h]h ]h"]h$]h&]uh1jIhju%ubeh}(h]h ]h"]h$]h&]uh1jDhj"ubjE)}(hhh](jJ)}(hhh]h)}(hWRITE_LIFE_EXTREMEh]hWRITE_LIFE_EXTREME}(hj%hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM!hj%ubah}(h]h ]h"]h$]h&]uh1jIhj%ubjJ)}(hhh]h)}(h COLD_DATAh]h COLD_DATA}(hj%hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM!hj%ubah}(h]h ]h"]h$]h&]uh1jIhj%ubjJ)}(hhh]h)}(hWRITE_LIFE_EXTREMEh]hWRITE_LIFE_EXTREME}(hj%hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM!hj%ubah}(h]h ]h"]h$]h&]uh1jIhj%ubeh}(h]h ]h"]h$]h&]uh1jDhj"ubjE)}(hhh](jJ)}(hhh]h)}(hWRITE_LIFE_SHORTh]hWRITE_LIFE_SHORT}(hj%hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM"hj%ubah}(h]h ]h"]h$]h&]uh1jIhj%ubjJ)}(hhh]h)}(hHOT_DATAh]hHOT_DATA}(hj&hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM"hj&ubah}(h]h ]h"]h$]h&]uh1jIhj%ubjJ)}(hhh]h)}(hWRITE_LIFE_SHORTh]hWRITE_LIFE_SHORT}(hj)&hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM"hj&&ubah}(h]h ]h"]h$]h&]uh1jIhj%ubeh}(h]h ]h"]h$]h&]uh1jDhj"ubjE)}(hhh](jJ)}(hhh]h)}(hWRITE_LIFE_NOT_SETh]hWRITE_LIFE_NOT_SET}(hjI&hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM#hjF&ubah}(h]h ]h"]h$]h&]uh1jIhjC&ubjJ)}(hhh]h)}(h WARM_DATAh]h WARM_DATA}(hj`&hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM#hj]&ubah}(h]h ]h"]h$]h&]uh1jIhjC&ubjJ)}(hhh]h)}(hWRITE_LIFE_NOT_SETh]hWRITE_LIFE_NOT_SET}(hjw&hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM#hjt&ubah}(h]h ]h"]h$]h&]uh1jIhjC&ubeh}(h]h ]h"]h$]h&]uh1jDhj"ubjE)}(hhh](jJ)}(hhh]h)}(hWRITE_LIFE_NONEh]hWRITE_LIFE_NONE}(hj&hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM$hj&ubah}(h]h ]h"]h$]h&]uh1jIhj&ubjJ)}(hhh]h)}(hj+$h]h“}(hj&hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM$hj&ubah}(h]h ]h"]h$]h&]uh1jIhj&ubjJ)}(hhh]h)}(hWRITE_LIFE_NONEh]hWRITE_LIFE_NONE}(hj&hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM$hj&ubah}(h]h ]h"]h$]h&]uh1jIhj&ubeh}(h]h ]h"]h$]h&]uh1jDhj"ubjE)}(hhh](jJ)}(hhh]h)}(hWRITE_LIFE_MEDIUMh]hWRITE_LIFE_MEDIUM}(hj&hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM%hj&ubah}(h]h ]h"]h$]h&]uh1jIhj&ubjJ)}(hhh]h)}(hj+$h]h“}(hj&hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM%hj&ubah}(h]h ]h"]h$]h&]uh1jIhj&ubjJ)}(hhh]h)}(hWRITE_LIFE_MEDIUMh]hWRITE_LIFE_MEDIUM}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM%hj'ubah}(h]h ]h"]h$]h&]uh1jIhj&ubeh}(h]h ]h"]h$]h&]uh1jDhj"ubjE)}(hhh](jJ)}(hhh]h)}(hWRITE_LIFE_LONGh]hWRITE_LIFE_LONG}(hj1'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM&hj.'ubah}(h]h ]h"]h$]h&]uh1jIhj+'ubjJ)}(hhh]h)}(hj+$h]h“}(hjH'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM&hjE'ubah}(h]h ]h"]h$]h&]uh1jIhj+'ubjJ)}(hhh]h)}(hWRITE_LIFE_LONGh]hWRITE_LIFE_LONG}(hj^'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM&hj['ubah}(h]h ]h"]h$]h&]uh1jIhj+'ubeh}(h]h ]h"]h$]h&]uh1jDhj"ubeh}(h]h ]h"]h$]h&]uh1j?hj "ubeh}(h]h ]h"]h$]h&]colsKuh1j$hj"ubah}(h]h ]h"]h$]h&]uh1jhj!hhhhhNubeh}(h]write-hint-policyah ]h"]write-hint policyah$]h&]uh1hhjhhhhhM ubh)}(hhh](h)}(hFallocate(2) Policyh]hFallocate(2) Policy}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj'hhhhhM*ubh)}(h0The default policy follows the below POSIX rule.h]h0The default policy follows the below POSIX rule.}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM,hj'hhubjZ)}(hhh]j_)}(hX&Allocating disk space The default operation (i.e., mode is zero) of fallocate() allocates the disk space within the range specified by offset and len. The file size (as reported by stat(2)) will be changed if offset+len is greater than the file size. Any subregion within the range specified by offset and len that did not contain data before the call will be initialized to zero. This default behavior closely resembles the behavior of the posix_fallocate(3) library function, and is intended as a method of optimally implementing that function. h](je)}(hAllocating disk spaceh]hAllocating disk space}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1jdhhhM6hj'ubju)}(hhh]h)}(hXThe default operation (i.e., mode is zero) of fallocate() allocates the disk space within the range specified by offset and len. The file size (as reported by stat(2)) will be changed if offset+len is greater than the file size. Any subregion within the range specified by offset and len that did not contain data before the call will be initialized to zero. This default behavior closely resembles the behavior of the posix_fallocate(3) library function, and is intended as a method of optimally implementing that function.h]hXThe default operation (i.e., mode is zero) of fallocate() allocates the disk space within the range specified by offset and len. The file size (as reported by stat(2)) will be changed if offset+len is greater than the file size. Any subregion within the range specified by offset and len that did not contain data before the call will be initialized to zero. This default behavior closely resembles the behavior of the posix_fallocate(3) library function, and is intended as a method of optimally implementing that function.}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM/hj'ubah}(h]h ]h"]h$]h&]uh1jthj'ubeh}(h]h ]h"]h$]h&]uh1j^hhhM6hj'ubah}(h]h ]h"]h$]h&]uh1jYhj'hhhhhNubh)}(hHowever, once F2FS receives ioctl(fd, F2FS_IOC_SET_PIN_FILE) in prior to fallocate(fd, DEFAULT_MODE), it allocates on-disk block addresses having zero or random data, which is useful to the below scenario where:h]hHowever, once F2FS receives ioctl(fd, F2FS_IOC_SET_PIN_FILE) in prior to fallocate(fd, DEFAULT_MODE), it allocates on-disk block addresses having zero or random data, which is useful to the below scenario where:}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM8hj'hhubj)}(h1. create(fd) 2. ioctl(fd, F2FS_IOC_SET_PIN_FILE) 3. fallocate(fd, 0, 0, size) 4. address = fibmap(fd, offset) 5. open(blkdev) 6. write(blkdev, address) h]jJ)}(hhh](j )}(h create(fd)h]h)}(hj(h]h create(fd)}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM<hj'ubah}(h]h ]h"]h$]h&]uh1jhj'ubj )}(h ioctl(fd, F2FS_IOC_SET_PIN_FILE)h]h)}(hj(h]h ioctl(fd, F2FS_IOC_SET_PIN_FILE)}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM=hj(ubah}(h]h ]h"]h$]h&]uh1jhj'ubj )}(hfallocate(fd, 0, 0, size)h]h)}(hj/(h]hfallocate(fd, 0, 0, size)}(hj1(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM>hj-(ubah}(h]h ]h"]h$]h&]uh1jhj'ubj )}(haddress = fibmap(fd, offset)h]h)}(hjF(h]haddress = fibmap(fd, offset)}(hjH(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM?hjD(ubah}(h]h ]h"]h$]h&]uh1jhj'ubj )}(h open(blkdev)h]h)}(hj](h]h open(blkdev)}(hj_(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM@hj[(ubah}(h]h ]h"]h$]h&]uh1jhj'ubj )}(hwrite(blkdev, address) h]h)}(hwrite(blkdev, address)h]hwrite(blkdev, address)}(hjv(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMAhjr(ubah}(h]h ]h"]h$]h&]uh1jhj'ubeh}(h]h ]h"]h$]h&]jjjhjjuh1jIhj'ubah}(h]h ]h"]h$]h&]uh1jhhhM<hj'hhubeh}(h]fallocate-2-policyah ]h"]fallocate(2) policyah$]h&]uh1hhjhhhhhM*ubh)}(hhh](h)}(hCompression implementationh]hCompression implementation}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj(hhhhhMDubj)}(hhh](j )}(hNew term named cluster is defined as basic unit of compression, file can be divided into multiple clusters logically. One cluster includes 4 << n (n >= 0) logical pages, compression size is also cluster size, each of cluster can be compressed or not. h]h)}(hNew term named cluster is defined as basic unit of compression, file can be divided into multiple clusters logically. One cluster includes 4 << n (n >= 0) logical pages, compression size is also cluster size, each of cluster can be compressed or not.h]hNew term named cluster is defined as basic unit of compression, file can be divided into multiple clusters logically. One cluster includes 4 << n (n >= 0) logical pages, compression size is also cluster size, each of cluster can be compressed or not.}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMFhj(ubah}(h]h ]h"]h$]h&]uh1jhj(hhhhhNubj )}(hXIn cluster metadata layout, one special block address is used to indicate a cluster is a compressed one or normal one; for compressed cluster, following metadata maps cluster to [1, 4 << n - 1] physical blocks, in where f2fs stores data including compress header and compressed data. h]h)}(hXIn cluster metadata layout, one special block address is used to indicate a cluster is a compressed one or normal one; for compressed cluster, following metadata maps cluster to [1, 4 << n - 1] physical blocks, in where f2fs stores data including compress header and compressed data.h]hXIn cluster metadata layout, one special block address is used to indicate a cluster is a compressed one or normal one; for compressed cluster, following metadata maps cluster to [1, 4 << n - 1] physical blocks, in where f2fs stores data including compress header and compressed data.}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMKhj(ubah}(h]h ]h"]h$]h&]uh1jhj(hhhhhNubj )}(hXIn order to eliminate write amplification during overwrite, F2FS only support compression on write-once file, data can be compressed only when all logical blocks in cluster contain valid data and compress ratio of cluster data is lower than specified threshold. h]h)}(hXIn order to eliminate write amplification during overwrite, F2FS only support compression on write-once file, data can be compressed only when all logical blocks in cluster contain valid data and compress ratio of cluster data is lower than specified threshold.h]hXIn order to eliminate write amplification during overwrite, F2FS only support compression on write-once file, data can be compressed only when all logical blocks in cluster contain valid data and compress ratio of cluster data is lower than specified threshold.}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMPhj(ubah}(h]h ]h"]h$]h&]uh1jhj(hhhhhNubj )}(hTo enable compression on regular inode, there are four ways: * chattr +c file * chattr +c dir; touch dir/file * mount w/ -o compress_extension=ext; touch file.ext * mount w/ -o compress_extension=*; touch any_file h](h)}(hh]h }(hj>+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj+hhubh)}(h# ls /dev/vd* /dev/vdb (32GB) /dev/vdc (32GB) # mkfs.ext4 /dev/vdc # mkfs.f2fs -c /dev/vdc@vdc.file /dev/vdb # mount /dev/vdb /mnt/f2fs # ls -l /mnt/f2fs vdc.file # df -h /dev/vdb 64G 33G 32G 52% /mnt/f2fsh](hR# ls /dev/vd* /dev/vdb (32GB) /dev/vdc (32GB) # mkfs.ext4 /dev/vdc # mkfs.f2fs -c }(hjL+hhhNhNubjD)}(h/dev/vdc@vdc.fileh]h/dev/vdc@vdc.file}(hjT+hhhNhNubah}(h]h ]h"]h$]h&]refurimailto:/dev/vdc@vdc.fileuh1jChjL+ubh /dev/vdb # mount /dev/vdb /mnt/f2fs # ls -l /mnt/f2fs vdc.file # df -h /dev/vdb 64G 33G 32G 52% /mnt/f2fs}(hjL+hhhNhNubeh}(h]h ]h"]h$]h&]uh1hhhhMhj+hhubh)}(h# mount -o loop /dev/vdc /mnt/ext4 # df -h /dev/vdb 64G 33G 32G 52% /mnt/f2fs /dev/loop7 32G 24K 30G 1% /mnt/ext4 # umount /mnt/ext4h]h# mount -o loop /dev/vdc /mnt/ext4 # df -h /dev/vdb 64G 33G 32G 52% /mnt/f2fs /dev/loop7 32G 24K 30G 1% /mnt/ext4 # umount /mnt/ext4}(hjn+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj+hhubh)}(hXh# f2fs_io getflags /mnt/f2fs/vdc.file get a flag on /mnt/f2fs/vdc.file ret=0, flags=nocow(pinned),immutable # f2fs_io setflags noimmutable /mnt/f2fs/vdc.file get a flag on noimmutable ret=0, flags=800010 set a flag on /mnt/f2fs/vdc.file ret=0, flags=noimmutable # rm /mnt/f2fs/vdc.file # df -h /dev/vdb 64G 753M 64G 2% /mnt/f2fsh]hXh# f2fs_io getflags /mnt/f2fs/vdc.file get a flag on /mnt/f2fs/vdc.file ret=0, flags=nocow(pinned),immutable # f2fs_io setflags noimmutable /mnt/f2fs/vdc.file get a flag on noimmutable ret=0, flags=800010 set a flag on /mnt/f2fs/vdc.file ret=0, flags=noimmutable # rm /mnt/f2fs/vdc.file # df -h /dev/vdb 64G 753M 64G 2% /mnt/f2fs}(hj|+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj+hhubh)}(hSo, the key idea is, user can do any file operations on /dev/vdc, and reclaim the space after the use, while the space is counted as /data. That doesn't require modifying partition size and filesystem format.h]hSo, the key idea is, user can do any file operations on /dev/vdc, and reclaim the space after the use, while the space is counted as /data. That doesn’t require modifying partition size and filesystem format.}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj+hhubeh}(h]device-aliasing-featureah ]h"]device aliasing featureah$]h&]uh1hhjhhhhhMubeh}(h]designah ]h"]designah$]h&]uh1hhhhhhhhMubeh}(h]'what-is-flash-friendly-file-system-f2fsah ]h"]*what is flash-friendly file system (f2fs)?ah$]h&]uh1hhhhhhhhKubeh}(h]h ]h"]h$]h&]sourcehuh1hcurrent_sourceN current_lineNsettingsdocutils.frontendValues)}(hN generatorN datestampN source_linkN source_urlN toc_backlinksjIfootnote_backlinksK sectnum_xformKstrip_commentsNstrip_elements_with_classesN strip_classesN report_levelK halt_levelKexit_status_levelKdebugNwarning_streamN tracebackinput_encoding utf-8-siginput_encoding_error_handlerstrictoutput_encodingutf-8output_encoding_error_handlerj+error_encodingutf-8error_encoding_error_handlerbackslashreplace language_codeenrecord_dependenciesNconfigN id_prefixhauto_id_prefixid dump_settingsNdump_internalsNdump_transformsNdump_pseudo_xmlNexpose_internalsNstrict_visitorN_disable_configN_sourceh _destinationN _config_files]7/var/lib/git/docbuild/linux/Documentation/docutils.confafile_insertion_enabled raw_enabledKline_length_limitM'pep_referencesN pep_base_urlhttps://peps.python.org/pep_file_url_templatepep-%04drfc_referencesN rfc_base_url&https://datatracker.ietf.org/doc/html/ tab_widthKtrim_footnote_reference_spacesyntax_highlightlong smart_quotessmartquotes_locales]character_level_inline_markupdoctitle_xform docinfo_xformKsectsubtitle_xform image_loadinglinkembed_stylesheetcloak_email_addressessection_self_linkenvNubreporterNindirect_targets]substitution_defs}substitution_names}refnames}refids}nameids}(j+j+jjjjwandering tree problemNcleaning overheadNj jj5j2jujrjjj:j7jjj[jXjjj'j$j\jYjjjjjjj+j+jjjbj_jjj j j!j!j!j!j'j'j(j(jY*jV*j*j*j+j +j+j+u nametypes}(j+jjj,j,j j5jujj:jj[jj'j\jjjj+jjbjj j!j!j'j(jY*j*j+j+uh}(j+hjjjjjjjjjjj2jjj8jjjrjjjxj7jjj=jXjjj^j$jjYj*jj_jjjjj+jjjj_j"jjej jj!j j!j!j'j!j(j'jV*j(j*j\*j +j*j+j+u footnote_refs} citation_refs} autofootnotes]autofootnote_refs]symbol_footnotes]symbol_footnote_refs] footnotes] citations]autofootnote_startKsymbol_footnote_startK id_counter collectionsCounter}j+KsRparse_messages](hsystem_message)}(hhh]h)}(h9Duplicate implicit target name: "wandering tree problem".h]h=Duplicate implicit target name: “wandering tree problem”.}(hj;,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj8,ubah}(h]h ]h"]h$]h&]jalevelKtypeINFOsourcehlineK\uh1j6,hj8hhhhhK\ubj7,)}(hhh]h)}(h4Duplicate implicit target name: "cleaning overhead".h]h8Duplicate implicit target name: “cleaning overhead”.}(hjW,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhjT,ubah}(h]h ]h"]h$]h&]jalevelKtypejQ,sourcehlineKbuh1j6,hjhhhhhKbubj7,)}(hhh]h)}(heUnexpected possible title overline or transition. Treating it as ordinary text because it's so short.h]hgUnexpected possible title overline or transition. Treating it as ordinary text because it’s so short.}(hjr,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhjo,ubah}(h]h ]h"]h$]h&]levelKtypejQ,lineMsourcehuh1j6,hj&$ubj7,)}(hhh]h)}(heUnexpected possible title overline or transition. Treating it as ordinary text because it's so short.h]hgUnexpected possible title overline or transition. Treating it as ordinary text because it’s so short.}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj,ubah}(h]h ]h"]h$]h&]levelKtypejQ,lineMsourcehuh1j6,hj=$ubj7,)}(hhh]h)}(heUnexpected possible title overline or transition. Treating it as ordinary text because it's so short.h]hgUnexpected possible title overline or transition. Treating it as ordinary text because it’s so short.}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj,ubah}(h]h ]h"]h$]h&]levelKtypejQ,lineM%sourcehuh1j6,hj&ubj7,)}(hhh]h)}(heUnexpected possible title overline or transition. Treating it as ordinary text because it's so short.h]hgUnexpected possible title overline or transition. Treating it as ordinary text because it’s so short.}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj,ubah}(h]h ]h"]h$]h&]levelKtypejQ,lineM&sourcehuh1j6,hj&ubj7,)}(hhh]h)}(heUnexpected possible title overline or transition. Treating it as ordinary text because it's so short.h]hgUnexpected possible title overline or transition. Treating it as ordinary text because it’s so short.}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj,ubah}(h]h ]h"]h$]h&]levelKtypejQ,lineM'sourcehuh1j6,hjE'ubetransform_messages] transformerN include_log] decorationNhhub.