sphinx.addnodesdocument)}( rawsourcechildren]( translations LanguagesNode)}(hhh](h pending_xref)}(hhh]docutils.nodesTextChinese (Simplified)}parenthsba attributes}(ids]classes]names]dupnames]backrefs] refdomainstdreftypedoc reftarget$/translations/zh_CN/filesystems/f2fsmodnameN classnameN refexplicitutagnamehhh ubh)}(hhh]hChinese (Traditional)}hh2sbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget$/translations/zh_TW/filesystems/f2fsmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hItalian}hhFsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget$/translations/it_IT/filesystems/f2fsmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hJapanese}hhZsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget$/translations/ja_JP/filesystems/f2fsmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hKorean}hhnsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget$/translations/ko_KR/filesystems/f2fsmodnameN classnameN refexplicituh1hhh ubh)}(hhh]hSpanish}hhsbah}(h]h ]h"]h$]h&] refdomainh)reftypeh+ reftarget$/translations/sp_SP/filesystems/f2fsmodnameN classnameN refexplicituh1hhh ubeh}(h]h ]h"]h$]h&]current_languageEnglishuh1h hh _documenthsourceNlineNubhcomment)}(h SPDX-License-Identifier: GPL-2.0h]h SPDX-License-Identifier: GPL-2.0}hhsbah}(h]h ]h"]h$]h&] xml:spacepreserveuh1hhhhhh>/var/lib/git/docbuild/linux/Documentation/filesystems/f2fs.rsthKubhsection)}(hhh](htitle)}(h!Flash-Friendly File System (F2FS)h]h!Flash-Friendly File System (F2FS)}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhhhhhKubh)}(hhh](h)}(hOverviewh]hOverview}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhhhhhKubh paragraph)}(hXkNAND flash memory-based storage devices, such as SSD, eMMC, and SD cards, have been equipped on a variety systems ranging from mobile to server systems. Since they are known to have different characteristics from the conventional rotating disks, a file system, an upper layer to the storage device, should adapt to the changes from the sketch in the design level.h]hXkNAND flash memory-based storage devices, such as SSD, eMMC, and SD cards, have been equipped on a variety systems ranging from mobile to server systems. Since they are known to have different characteristics from the conventional rotating disks, a file system, an upper layer to the storage device, should adapt to the changes from the sketch in the design level.}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK hhhhubh)}(hXF2FS is a file system exploiting NAND flash memory-based storage devices, which is based on Log-structured File System (LFS). The design has been focused on addressing the fundamental issues in LFS, which are snowball effect of wandering tree and high cleaning overhead.h]hXF2FS is a file system exploiting NAND flash memory-based storage devices, which is based on Log-structured File System (LFS). The design has been focused on addressing the fundamental issues in LFS, which are snowball effect of wandering tree and high cleaning overhead.}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubh)}(hX1Since a NAND flash memory-based storage device shows different characteristic according to its internal geometry or flash memory management scheme, namely FTL, F2FS and its tools support various parameters not only for configuring on-disk layout, but also for selecting allocation and cleaning algorithms.h]hX1Since a NAND flash memory-based storage device shows different characteristic according to its internal geometry or flash memory management scheme, namely FTL, F2FS and its tools support various parameters not only for configuring on-disk layout, but also for selecting allocation and cleaning algorithms.}(hhhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubh)}(hThe following git tree provides the file system formatting tool (mkfs.f2fs), a consistency checking tool (fsck.f2fs), and a debugging tool (dump.f2fs).h]hThe following git tree provides the file system formatting tool (mkfs.f2fs), a consistency checking tool (fsck.f2fs), and a debugging tool (dump.f2fs).}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubh bullet_list)}(hhh]h list_item)}(hEgit://git.kernel.org/pub/scm/linux/kernel/git/jaegeuk/f2fs-tools.git h]h)}(hDgit://git.kernel.org/pub/scm/linux/kernel/git/jaegeuk/f2fs-tools.gith]hDgit://git.kernel.org/pub/scm/linux/kernel/git/jaegeuk/f2fs-tools.git}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubah}(h]h ]h"]h$]h&]bullet-uh1jhhhKhhhhubh)}(h;For sending patches, please use the following mailing list:h]h;For sending patches, please use the following mailing list:}(hj;hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhhhubj)}(hhh]j)}(h'linux-f2fs-devel@lists.sourceforge.net h]h)}(h&linux-f2fs-devel@lists.sourceforge.neth]h reference)}(hjRh]h&linux-f2fs-devel@lists.sourceforge.net}(hjVhhhNhNubah}(h]h ]h"]h$]h&]refuri-mailto:linux-f2fs-devel@lists.sourceforge.netuh1jThjPubah}(h]h ]h"]h$]h&]uh1hhhhK!hjLubah}(h]h ]h"]h$]h&]uh1jhjIhhhhhNubah}(h]h ]h"]h$]h&]j9j:uh1jhhhK!hhhhubh)}(hCFor reporting bugs, please use the following f2fs bug tracker link:h]hCFor reporting bugs, please use the following f2fs bug tracker link:}(hjwhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK#hhhhubj)}(hhh]j)}(hOhttps://bugzilla.kernel.org/enter_bug.cgi?product=File%20System&component=f2fs h]h)}(hNhttps://bugzilla.kernel.org/enter_bug.cgi?product=File%20System&component=f2fsh]jU)}(hjh]hNhttps://bugzilla.kernel.org/enter_bug.cgi?product=File%20System&component=f2fs}(hjhhhNhNubah}(h]h ]h"]h$]h&]refurijuh1jThjubah}(h]h ]h"]h$]h&]uh1hhhhK%hjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubah}(h]h ]h"]h$]h&]j9j:uh1jhhhK%hhhhubeh}(h]overviewah ]h"]overviewah$]h&]uh1hhhhhhhhKubh)}(hhh](h)}(hBackground and Design issuesh]hBackground and Design issues}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhK(ubh)}(hhh](h)}(h Log-structured File System (LFS)h]h Log-structured File System (LFS)}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhK+ubh)}(hX|"A log-structured file system writes all modifications to disk sequentially in a log-like structure, thereby speeding up both file writing and crash recovery. The log is the only structure on disk; it contains indexing information so that files can be read back from the log efficiently. In order to maintain large free areas on disk for fast writing, we divide the log into segments and use a segment cleaner to compress the live information from heavily fragmented segments." from Rosenblum, M. and Ousterhout, J. K., 1992, "The design and implementation of a log-structured file system", ACM Trans. Computer Systems 10, 1, 26–52.h]hX“A log-structured file system writes all modifications to disk sequentially in a log-like structure, thereby speeding up both file writing and crash recovery. The log is the only structure on disk; it contains indexing information so that files can be read back from the log efficiently. In order to maintain large free areas on disk for fast writing, we divide the log into segments and use a segment cleaner to compress the live information from heavily fragmented segments.” from Rosenblum, M. and Ousterhout, J. K., 1992, “The design and implementation of a log-structured file system”, ACM Trans. Computer Systems 10, 1, 26–52.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK,hjhhubeh}(h]log-structured-file-system-lfsah ]h"] log-structured file system (lfs)ah$]h&]uh1hhjhhhhhK+ubh)}(hhh](h)}(hWandering Tree Problemh]hWandering Tree Problem}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhK7ubh)}(hXIn LFS, when a file data is updated and written to the end of log, its direct pointer block is updated due to the changed location. Then the indirect pointer block is also updated due to the direct pointer block update. In this manner, the upper index structures such as inode, inode map, and checkpoint block are also updated recursively. This problem is called as wandering tree problem [1], and in order to enhance the performance, it should eliminate or relax the update propagation as much as possible.h]hXIn LFS, when a file data is updated and written to the end of log, its direct pointer block is updated due to the changed location. Then the indirect pointer block is also updated due to the direct pointer block update. In this manner, the upper index structures such as inode, inode map, and checkpoint block are also updated recursively. This problem is called as wandering tree problem [1], and in order to enhance the performance, it should eliminate or relax the update propagation as much as possible.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK8hjhhubh)}(hQ[1] Bityutskiy, A. 2005. JFFS3 design issues. http://www.linux-mtd.infradead.org/h](h.[1] Bityutskiy, A. 2005. JFFS3 design issues. }(hjhhhNhNubjU)}(h#http://www.linux-mtd.infradead.org/h]h#http://www.linux-mtd.infradead.org/}(hjhhhNhNubah}(h]h ]h"]h$]h&]refurijuh1jThjubeh}(h]h ]h"]h$]h&]uh1hhhhK@hjhhubeh}(h]wandering-tree-problemah ]h"]h$]wandering tree problemah&]uh1hhjhhhhhK7 referencedKubh)}(hhh](h)}(hCleaning Overheadh]hCleaning Overhead}(hj8hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj5hhhhhKCubh)}(hXSince LFS is based on out-of-place writes, it produces so many obsolete blocks scattered across the whole storage. In order to serve new empty log space, it needs to reclaim these obsolete blocks seamlessly to users. This job is called as a cleaning process.h]hXSince LFS is based on out-of-place writes, it produces so many obsolete blocks scattered across the whole storage. In order to serve new empty log space, it needs to reclaim these obsolete blocks seamlessly to users. This job is called as a cleaning process.}(hjFhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKDhj5hhubh)}(h4The process consists of three operations as follows.h]h4The process consists of three operations as follows.}(hjThhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKIhj5hhubhenumerated_list)}(hhh](j)}(hEA victim segment is selected through referencing segment usage table.h]h)}(hjih]hEA victim segment is selected through referencing segment usage table.}(hjkhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKKhjgubah}(h]h ]h"]h$]h&]uh1jhjdhhhhhNubj)}(hdIt loads parent index structures of all the data in the victim identified by segment summary blocks.h]h)}(hdIt loads parent index structures of all the data in the victim identified by segment summary blocks.h]hdIt loads parent index structures of all the data in the victim identified by segment summary blocks.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKLhj~ubah}(h]h ]h"]h$]h&]uh1jhjdhhhhhNubj)}(hNIt checks the cross-reference between the data and its parent index structure.h]h)}(hjh]hNIt checks the cross-reference between the data and its parent index structure.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKNhjubah}(h]h ]h"]h$]h&]uh1jhjdhhhhhNubj)}(h!It moves valid data selectively. h]h)}(h It moves valid data selectively.h]h It moves valid data selectively.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKOhjubah}(h]h ]h"]h$]h&]uh1jhjdhhhhhNubeh}(h]h ]h"]h$]h&]enumtypearabicprefixhsuffix.uh1jbhj5hhhhhKKubh)}(hThis cleaning job may cause unexpected long delays, so the most important goal is to hide the latencies to users. And also definitely, it should reduce the amount of valid data to be moved, and move them quickly as well.h]hThis cleaning job may cause unexpected long delays, so the most important goal is to hide the latencies to users. And also definitely, it should reduce the amount of valid data to be moved, and move them quickly as well.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKQhj5hhubeh}(h]cleaning-overheadah ]h"]h$]cleaning overheadah&]uh1hhjhhhhhKCj4Kubeh}(h]background-and-design-issuesah ]h"]background and design issuesah$]h&]uh1hhhhhhhhK(ubh)}(hhh](h)}(h Key Featuresh]h Key Features}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKVubh)}(hhh](h)}(hFlash Awarenessh]hFlash Awareness}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKYubj)}(hhh](j)}(h[Enlarge the random write area for better performance, but provide the high spatial localityh]h)}(h[Enlarge the random write area for better performance, but provide the high spatial localityh]h[Enlarge the random write area for better performance, but provide the high spatial locality}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKZhjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubj)}(hIAlign FS data structures to the operational units in FTL as best efforts h]h)}(hHAlign FS data structures to the operational units in FTL as best effortsh]hHAlign FS data structures to the operational units in FTL as best efforts}(hj/hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK\hj+ubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubeh}(h]h ]h"]h$]h&]j9j:uh1jhhhKZhjhhubeh}(h]flash-awarenessah ]h"]flash awarenessah$]h&]uh1hhjhhhhhKYubh)}(hhh](h)}(hWandering Tree Problemh]hWandering Tree Problem}(hjThhhNhNubah}(h]h ]h"]h$]h&]uh1hhjQhhhhhK_ubj)}(hhh](j)}(hPUse a term, “node”, that represents inodes as well as various pointer blocksh]h)}(hjgh]hPUse a term, “node”, that represents inodes as well as various pointer blocks}(hjihhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK`hjeubah}(h]h ]h"]h$]h&]uh1jhjbhhhhhNubj)}(hIntroduce Node Address Table (NAT) containing the locations of all the “node” blocks; this will cut off the update propagation. h]h)}(hIntroduce Node Address Table (NAT) containing the locations of all the “node” blocks; this will cut off the update propagation.h]hIntroduce Node Address Table (NAT) containing the locations of all the “node” blocks; this will cut off the update propagation.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKahj|ubah}(h]h ]h"]h$]h&]uh1jhjbhhhhhNubeh}(h]h ]h"]h$]h&]j9j:uh1jhhhK`hjQhhubeh}(h]id1ah ]h"]h$]j2ah&]uh1hhjhhhhhK_j4Kubh)}(hhh](h)}(hCleaning Overheadh]hCleaning Overhead}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhKeubj)}(hhh](j)}(h%Support a background cleaning processh]h)}(hjh]h%Support a background cleaning process}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKfhjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubj)}(hHSupport greedy and cost-benefit algorithms for victim selection policiesh]h)}(hjh]hHSupport greedy and cost-benefit algorithms for victim selection policies}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKghjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubj)}(hGSupport multi-head logs for static/dynamic hot and cold data separationh]h)}(hjh]hGSupport multi-head logs for static/dynamic hot and cold data separation}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhhjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubj)}(h:Introduce adaptive logging for efficient block allocation h]h)}(h9Introduce adaptive logging for efficient block allocationh]h9Introduce adaptive logging for efficient block allocation}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKihjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubeh}(h]h ]h"]h$]h&]j9j:uh1jhhhKfhjhhubeh}(h]id2ah ]h"]h$]jah&]uh1hhjhhhhhKej4Kubeh}(h] key-featuresah ]h"] key featuresah$]h&]uh1hhhhhhhhKVubh)}(hhh](h)}(h Mount Optionsh]h Mount Options}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj'hhhhhKlubhtable)}(hhh]htgroup)}(hhh](hcolspec)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1jBhj?ubjC)}(hhh]h}(h]h ]h"]h$]h&]colwidthKRuh1jBhj?ubhtbody)}(hhh](hrow)}(hhh](hentry)}(hhh]h)}(hbackground_gc=%sh]hbackground_gc=%s}(hjghhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKphjdubah}(h]h ]h"]h$]h&]uh1jbhj_ubjc)}(hhh]h)}(hXTurn on/off cleaning operations, namely garbage collection, triggered in background when I/O subsystem is idle. If background_gc=on, it will turn on the garbage collection and if background_gc=off, garbage collection will be turned off. If background_gc=sync, it will turn on synchronous garbage collection running in background. Default value for this option is on. So garbage collection is on by default.h]hXTurn on/off cleaning operations, namely garbage collection, triggered in background when I/O subsystem is idle. If background_gc=on, it will turn on the garbage collection and if background_gc=off, garbage collection will be turned off. If background_gc=sync, it will turn on synchronous garbage collection running in background. Default value for this option is on. So garbage collection is on by default.}(hj~hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKphj{ubah}(h]h ]h"]h$]h&]uh1jbhj_ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hgc_mergeh]hgc_merge}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKxhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hXWhen background_gc is on, this option can be enabled to let background GC thread to handle foreground GC requests, it can eliminate the sluggish issue caused by slow foreground GC operation when GC is triggered from a process with limited I/O and CPU resources.h]hXWhen background_gc is on, this option can be enabled to let background GC thread to handle foreground GC requests, it can eliminate the sluggish issue caused by slow foreground GC operation when GC is triggered from a process with limited I/O and CPU resources.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKxhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h nogc_mergeh]h nogc_merge}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK}hjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hDisable GC merge feature.h]hDisable GC merge feature.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK}hjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hdisable_roll_forwardh]hdisable_roll_forward}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK~hj ubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h)Disable the roll-forward recovery routineh]h)Disable the roll-forward recovery routine}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhK~hj ubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h norecoveryh]h norecovery}(hjChhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj@ubah}(h]h ]h"]h$]h&]uh1jbhj=ubjc)}(hhh]h)}(h`Disable the roll-forward recovery routine, mounted read- only (i.e., -o ro,disable_roll_forward)h]h`Disable the roll-forward recovery routine, mounted read- only (i.e., -o ro,disable_roll_forward)}(hjZhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjWubah}(h]h ]h"]h$]h&]uh1jbhj=ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hdiscard/nodiscardh]hdiscard/nodiscard}(hjzhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjwubah}(h]h ]h"]h$]h&]uh1jbhjtubjc)}(hhh]h)}(hEnable/disable real-time discard in f2fs, if discard is enabled, f2fs will issue discard/TRIM commands when a segment is cleaned.h]hEnable/disable real-time discard in f2fs, if discard is enabled, f2fs will issue discard/TRIM commands when a segment is cleaned.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjtubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h heap/no_heaph]h heap/no_heap}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h Deprecated.h]h Deprecated.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h nouser_xattrh]h nouser_xattr}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hhDisable Extended User Attributes. Note: xattr is enabled by default if CONFIG_F2FS_FS_XATTR is selected.h]hhDisable Extended User Attributes. Note: xattr is enabled by default if CONFIG_F2FS_FS_XATTR is selected.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hnoaclh]hnoacl}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hkDisable POSIX Access Control List. Note: acl is enabled by default if CONFIG_F2FS_FS_POSIX_ACL is selected.h]hkDisable POSIX Access Control List. Note: acl is enabled by default if CONFIG_F2FS_FS_POSIX_ACL is selected.}(hj6hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj3ubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hactive_logs=%uh]hactive_logs=%u}(hjVhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjSubah}(h]h ]h"]h$]h&]uh1jbhjPubjc)}(hhh]h)}(hSupport configuring the number of active logs. In the current design, f2fs supports only 2, 4, and 6 logs. Default number is 6.h]hSupport configuring the number of active logs. In the current design, f2fs supports only 2, 4, and 6 logs. Default number is 6.}(hjmhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjjubah}(h]h ]h"]h$]h&]uh1jbhjPubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hdisable_ext_identifyh]hdisable_ext_identify}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hfDisable the extension list configured by mkfs, so f2fs is not aware of cold files such as media files.h]hfDisable the extension list configured by mkfs, so f2fs is not aware of cold files such as media files.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h inline_xattrh]h inline_xattr}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h!Enable the inline xattrs feature.h]h!Enable the inline xattrs feature.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hnoinline_xattrh]hnoinline_xattr}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h"Disable the inline xattrs feature.h]h"Disable the inline xattrs feature.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hinline_xattr_size=%uh]hinline_xattr_size=%u}(hj2hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj/ubah}(h]h ]h"]h$]h&]uh1jbhj,ubjc)}(hhh]h)}(hSSupport configuring inline xattr size, it depends on flexible inline xattr feature.h]hSSupport configuring inline xattr size, it depends on flexible inline xattr feature.}(hjIhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjFubah}(h]h ]h"]h$]h&]uh1jbhj,ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h inline_datah]h inline_data}(hjihhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjfubah}(h]h ]h"]h$]h&]uh1jbhjcubjc)}(hhh]h)}(hcEnable the inline data feature: Newly created small (<~3.4k) files can be written into inode block.h]hcEnable the inline data feature: Newly created small (<~3.4k) files can be written into inode block.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj}ubah}(h]h ]h"]h$]h&]uh1jbhjcubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h inline_dentryh]h inline_dentry}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hEnable the inline dir feature: data in newly created directory entries can be written into inode block. The space of inode block which is used to store inline dentries is limited to ~3.4k.h]hEnable the inline dir feature: data in newly created directory entries can be written into inode block. The space of inode block which is used to store inline dentries is limited to ~3.4k.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hnoinline_dentryh]hnoinline_dentry}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h"Disable the inline dentry feature.h]h"Disable the inline dentry feature.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h flush_mergeh]h flush_merge}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hMerge concurrent cache_flush commands as much as possible to eliminate redundant command issues. If the underlying device handles the cache_flush command relatively slowly, recommend to enable this option.h]hMerge concurrent cache_flush commands as much as possible to eliminate redundant command issues. If the underlying device handles the cache_flush command relatively slowly, recommend to enable this option.}(hj%hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj"ubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h nobarrierh]h nobarrier}(hjEhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjBubah}(h]h ]h"]h$]h&]uh1jbhj?ubjc)}(hhh]h)}(hThis option can be used if underlying storage guarantees its cached data should be written to the novolatile area. If this option is set, no cache_flush commands are issued but f2fs still guarantees the write ordering of all the data writes.h]hThis option can be used if underlying storage guarantees its cached data should be written to the novolatile area. If this option is set, no cache_flush commands are issued but f2fs still guarantees the write ordering of all the data writes.}(hj\hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjYubah}(h]h ]h"]h$]h&]uh1jbhj?ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hbarrierh]hbarrier}(hj|hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjyubah}(h]h ]h"]h$]h&]uh1jbhjvubjc)}(hhh]h)}(hEIf this option is set, cache_flush commands are allowed to be issued.h]hEIf this option is set, cache_flush commands are allowed to be issued.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjvubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hfastbooth]hfastboot}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hThis option is used when a system wants to reduce mount time as much as possible, even though normal performance can be sacrificed.h]hThis option is used when a system wants to reduce mount time as much as possible, even though normal performance can be sacrificed.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h extent_cacheh]h extent_cache}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hEnable an extent cache based on rb-tree, it can cache as many as extent which map between contiguous logical address and physical address per inode, resulting in increasing the cache hit ratio. Set by default.h]hEnable an extent cache based on rb-tree, it can cache as many as extent which map between contiguous logical address and physical address per inode, resulting in increasing the cache hit ratio. Set by default.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hnoextent_cacheh]hnoextent_cache}(hj! hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubjc)}(hhh]h)}(h]Disable an extent cache based on rb-tree explicitly, see the above extent_cache mount option.h]h]Disable an extent cache based on rb-tree explicitly, see the above extent_cache mount option.}(hj8 hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj5 ubah}(h]h ]h"]h$]h&]uh1jbhj ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h noinline_datah]h noinline_data}(hjX hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjU ubah}(h]h ]h"]h$]h&]uh1jbhjR ubjc)}(hhh]h)}(hKDisable the inline data feature, inline data feature is enabled by default.h]hKDisable the inline data feature, inline data feature is enabled by default.}(hjo hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjl ubah}(h]h ]h"]h$]h&]uh1jbhjR ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h data_flushh]h data_flush}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubjc)}(hhh]h)}(hWEnable data flushing before checkpoint in order to persist data of regular and symlink.h]hWEnable data flushing before checkpoint in order to persist data of regular and symlink.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hreserve_root=%dh]hreserve_root=%d}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubjc)}(hhh]h)}(hSupport configuring reserved space which is used for allocation from a privileged user with specified uid or gid, unit: 4KB, the default limit is 12.5% of user blocks.h]hSupport configuring reserved space which is used for allocation from a privileged user with specified uid or gid, unit: 4KB, the default limit is 12.5% of user blocks.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hreserve_node=%dh]hreserve_node=%d}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubjc)}(hhh]h)}(hSupport configuring reserved nodes which are used for allocation from a privileged user with specified uid or gid, the default limit is 12.5% of all nodes.h]hSupport configuring reserved nodes which are used for allocation from a privileged user with specified uid or gid, the default limit is 12.5% of all nodes.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h resuid=%dh]h resuid=%d}(hj4 hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj1 ubah}(h]h ]h"]h$]h&]uh1jbhj. ubjc)}(hhh]h)}(h8The user ID which may use the reserved blocks and nodes.h]h8The user ID which may use the reserved blocks and nodes.}(hjK hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjH ubah}(h]h ]h"]h$]h&]uh1jbhj. ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h resgid=%dh]h resgid=%d}(hjk hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjh ubah}(h]h ]h"]h$]h&]uh1jbhje ubjc)}(hhh]h)}(h9The group ID which may use the reserved blocks and nodes.h]h9The group ID which may use the reserved blocks and nodes.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhje ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hfault_injection=%dh]hfault_injection=%d}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubjc)}(hhh]h)}(hLEnable fault injection in all supported types with specified injection rate.h]hLEnable fault injection in all supported types with specified injection rate.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h fault_type=%dh]h fault_type=%d}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubjc)}(hhh](h)}(hSupport configuring fault injection type, should be enabled with fault_injection option, fault type value is shown below, it supports single or combined type.h]hSupport configuring fault injection type, should be enabled with fault_injection option, fault type value is shown below, it supports single or combined type.}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubj9)}(hhh]j>)}(hhh](jC)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1jBhj ubjC)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1jBhj ubhthead)}(hhh]j^)}(hhh](jc)}(hhh]h)}(h Type_Nameh]h Type_Name}(hj# hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubjc)}(hhh]h)}(h Type_Valueh]h Type_Value}(hj: hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj7 ubah}(h]h ]h"]h$]h&]uh1jbhj ubeh}(h]h ]h"]h$]h&]uh1j]hj ubah}(h]h ]h"]h$]h&]uh1j hj ubjY)}(hhh](j^)}(hhh](jc)}(hhh]h)}(h FAULT_KMALLOCh]h FAULT_KMALLOC}(hjc hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj` ubah}(h]h ]h"]h$]h&]uh1jbhj] ubjc)}(hhh]h)}(h 0x00000001h]h 0x00000001}(hjz hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjw ubah}(h]h ]h"]h$]h&]uh1jbhj] ubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(hFAULT_KVMALLOCh]hFAULT_KVMALLOC}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubjc)}(hhh]h)}(h 0x00000002h]h 0x00000002}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(hFAULT_PAGE_ALLOCh]hFAULT_PAGE_ALLOC}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubjc)}(hhh]h)}(h 0x00000004h]h 0x00000004}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(hFAULT_PAGE_GETh]hFAULT_PAGE_GET}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubjc)}(hhh]h)}(h 0x00000008h]h 0x00000008}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(hFAULT_ALLOC_BIOh]hFAULT_ALLOC_BIO}(hj? hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj< ubah}(h]h ]h"]h$]h&]uh1jbhj9 ubjc)}(hhh]h)}(h0x00000010 (obsolete)h]h0x00000010 (obsolete)}(hjV hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjS ubah}(h]h ]h"]h$]h&]uh1jbhj9 ubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(hFAULT_ALLOC_NIDh]hFAULT_ALLOC_NID}(hjv hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjs ubah}(h]h ]h"]h$]h&]uh1jbhjp ubjc)}(hhh]h)}(h 0x00000020h]h 0x00000020}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhjp ubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(h FAULT_ORPHANh]h FAULT_ORPHAN}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubjc)}(hhh]h)}(h 0x00000040h]h 0x00000040}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(h FAULT_BLOCKh]h FAULT_BLOCK}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubjc)}(hhh]h)}(h 0x00000080h]h 0x00000080}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(hFAULT_DIR_DEPTHh]hFAULT_DIR_DEPTH}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubjc)}(hhh]h)}(h 0x00000100h]h 0x00000100}(hj2 hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj/ ubah}(h]h ]h"]h$]h&]uh1jbhj ubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(hFAULT_EVICT_INODEh]hFAULT_EVICT_INODE}(hjR hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjO ubah}(h]h ]h"]h$]h&]uh1jbhjL ubjc)}(hhh]h)}(h 0x00000200h]h 0x00000200}(hji hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjf ubah}(h]h ]h"]h$]h&]uh1jbhjL ubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(hFAULT_TRUNCATEh]hFAULT_TRUNCATE}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubjc)}(hhh]h)}(h 0x00000400h]h 0x00000400}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(h FAULT_READ_IOh]h FAULT_READ_IO}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubjc)}(hhh]h)}(h 0x00000800h]h 0x00000800}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(hFAULT_CHECKPOINTh]hFAULT_CHECKPOINT}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubjc)}(hhh]h)}(h 0x00001000h]h 0x00001000}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(h FAULT_DISCARDh]h FAULT_DISCARD}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj+ubah}(h]h ]h"]h$]h&]uh1jbhj(ubjc)}(hhh]h)}(h 0x00002000h]h 0x00002000}(hjEhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjBubah}(h]h ]h"]h$]h&]uh1jbhj(ubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(hFAULT_WRITE_IOh]hFAULT_WRITE_IO}(hjehhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjbubah}(h]h ]h"]h$]h&]uh1jbhj_ubjc)}(hhh]h)}(h 0x00004000h]h 0x00004000}(hj|hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjyubah}(h]h ]h"]h$]h&]uh1jbhj_ubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(hFAULT_SLAB_ALLOCh]hFAULT_SLAB_ALLOC}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h 0x00008000h]h 0x00008000}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(hFAULT_DQUOT_INITh]hFAULT_DQUOT_INIT}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h 0x00010000h]h 0x00010000}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(h FAULT_LOCK_OPh]h FAULT_LOCK_OP}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h 0x00020000h]h 0x00020000}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(hFAULT_BLKADDR_VALIDITYh]hFAULT_BLKADDR_VALIDITY}(hjAhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj>ubah}(h]h ]h"]h$]h&]uh1jbhj;ubjc)}(hhh]h)}(h 0x00040000h]h 0x00040000}(hjXhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjUubah}(h]h ]h"]h$]h&]uh1jbhj;ubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(hFAULT_BLKADDR_CONSISTENCEh]hFAULT_BLKADDR_CONSISTENCE}(hjxhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjuubah}(h]h ]h"]h$]h&]uh1jbhjrubjc)}(hhh]h)}(h 0x00080000h]h 0x00080000}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjrubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(hFAULT_NO_SEGMENTh]hFAULT_NO_SEGMENT}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h 0x00100000h]h 0x00100000}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(hFAULT_INCONSISTENT_FOOTERh]hFAULT_INCONSISTENT_FOOTER}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h 0x00200000h]h 0x00200000}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(h FAULT_TIMEOUTh]h FAULT_TIMEOUT}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h0x00400000 (1000ms)h]h0x00400000 (1000ms)}(hj4hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj1ubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubj^)}(hhh](jc)}(hhh]h)}(h FAULT_VMALLOCh]h FAULT_VMALLOC}(hjThhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjQubah}(h]h ]h"]h$]h&]uh1jbhjNubjc)}(hhh]h)}(h 0x00800000h]h 0x00800000}(hjkhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjhubah}(h]h ]h"]h$]h&]uh1jbhjNubeh}(h]h ]h"]h$]h&]uh1j]hjZ ubeh}(h]h ]h"]h$]h&]uh1jXhj ubeh}(h]h ]h"]h$]h&]colsKuh1j=hj ubah}(h]h ]h"]h$]h&]uh1j8hj ubeh}(h]h ]h"]h$]h&]uh1jbhj ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hmode=%sh]hmode=%s}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hXControl block allocation mode which supports "adaptive" and "lfs". In "lfs" mode, there should be no random writes towards main area. "fragment:segment" and "fragment:block" are newly added here. These are developer options for experiments to simulate filesystem fragmentation/after-GC situation itself. The developers use these modes to understand filesystem fragmentation/after-GC condition well, and eventually get some insights to handle them better. In "fragment:segment", f2fs allocates a new segment in random position. With this, we can simulate the after-GC condition. In "fragment:block", we can scatter block allocation with "max_fragment_chunk" and "max_fragment_hole" sysfs nodes. We added some randomness to both chunk and hole size to make it close to realistic IO pattern. So, in this mode, f2fs will allocate 1.. blocks in a chunk and make a hole in the length of 1.. by turns. With this, the newly allocated blocks will be scattered throughout the whole partition. Note that "fragment:block" implicitly enables "fragment:segment" option for more randomness. Please, use these options for your experiments and we strongly recommend to re-format the filesystem after using these options.h]hXControl block allocation mode which supports “adaptive” and “lfs”. In “lfs” mode, there should be no random writes towards main area. “fragment:segment” and “fragment:block” are newly added here. These are developer options for experiments to simulate filesystem fragmentation/after-GC situation itself. The developers use these modes to understand filesystem fragmentation/after-GC condition well, and eventually get some insights to handle them better. In “fragment:segment”, f2fs allocates a new segment in random position. With this, we can simulate the after-GC condition. In “fragment:block”, we can scatter block allocation with “max_fragment_chunk” and “max_fragment_hole” sysfs nodes. We added some randomness to both chunk and hole size to make it close to realistic IO pattern. So, in this mode, f2fs will allocate 1.. blocks in a chunk and make a hole in the length of 1.. by turns. With this, the newly allocated blocks will be scattered throughout the whole partition. Note that “fragment:block” implicitly enables “fragment:segment” option for more randomness. Please, use these options for your experiments and we strongly recommend to re-format the filesystem after using these options.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(husrquotah]husrquota}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h(Enable plain user disk quota accounting.h]h(Enable plain user disk quota accounting.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hgrpquotah]hgrpquota}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h)Enable plain group disk quota accounting.h]h)Enable plain group disk quota accounting.}(hj/hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj,ubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hprjquotah]hprjquota}(hjOhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjLubah}(h]h ]h"]h$]h&]uh1jbhjIubjc)}(hhh]h)}(h&Enable plain project quota accounting.h]h&Enable plain project quota accounting.}(hjfhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjcubah}(h]h ]h"]h$]h&]uh1jbhjIubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(husrjquota=h]husrjquota=}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h;Appoint specified file and type during mount, so that quotah]h;Appoint specified file and type during mount, so that quota}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hgrpjquota=h]hgrpjquota=}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h9information can be properly updated during recovery flow,h]h9information can be properly updated during recovery flow,}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hprjjquota=h]hprjjquota=}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h(: must be in root directory;h]h(: must be in root directory;}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hjqfmt=h]hjqfmt=}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj(ubah}(h]h ]h"]h$]h&]uh1jbhj%ubjc)}(hhh]h)}(h#: [vfsold,vfsv0,vfsv1].h]h#: [vfsold,vfsv0,vfsv1].}(hjBhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj?ubah}(h]h ]h"]h$]h&]uh1jbhj%ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h usrjquota=h]h usrjquota=}(hjbhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj_ubah}(h]h ]h"]h$]h&]uh1jbhj\ubjc)}(hhh]h)}(hTurn off user journalled quota.h]hTurn off user journalled quota.}(hjyhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjvubah}(h]h ]h"]h$]h&]uh1jbhj\ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h grpjquota=h]h grpjquota=}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h Turn off group journalled quota.h]h Turn off group journalled quota.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h prjjquota=h]h prjjquota=}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h"Turn off project journalled quota.h]h"Turn off project journalled quota.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hquotah]hquota}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h(Enable plain user disk quota accounting.h]h(Enable plain user disk quota accounting.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hnoquotah]hnoquota}(hj>hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhj;ubah}(h]h ]h"]h$]h&]uh1jbhj8ubjc)}(hhh]h)}(h$Disable all plain disk quota option.h]h$Disable all plain disk quota option.}(hjUhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjRubah}(h]h ]h"]h$]h&]uh1jbhj8ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h alloc_mode=%sh]h alloc_mode=%s}(hjuhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjrubah}(h]h ]h"]h$]h&]uh1jbhjoubjc)}(hhh]h)}(hEAdjust block allocation policy, which supports "reuse" and "default".h]hMAdjust block allocation policy, which supports “reuse” and “default”.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjoubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h fsync_mode=%sh]h fsync_mode=%s}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hXControl the policy of fsync. Currently supports "posix", "strict", and "nobarrier". In "posix" mode, which is default, fsync will follow POSIX semantics and does a light operation to improve the filesystem performance. In "strict" mode, fsync will be heavy and behaves in line with xfs, ext4 and btrfs, where xfstest generic/342 will pass, but the performance will regress. "nobarrier" is based on "posix", but doesn't issue flush command for non-atomic files likewise "nobarrier" mount option.h]hXControl the policy of fsync. Currently supports “posix”, “strict”, and “nobarrier”. In “posix” mode, which is default, fsync will follow POSIX semantics and does a light operation to improve the filesystem performance. In “strict” mode, fsync will be heavy and behaves in line with xfs, ext4 and btrfs, where xfstest generic/342 will pass, but the performance will regress. “nobarrier” is based on “posix”, but doesn’t issue flush command for non-atomic files likewise “nobarrier” mount option.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhKhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(htest_dummy_encryptionh]htest_dummy_encryption}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(htest_dummy_encryption=%sh]htest_dummy_encryption=%s}(hj hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj ubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hEnable dummy encryption, which provides a fake fscrypt context. The fake fscrypt context is used by xfstests. The argument may be either "v1" or "v2", in order to select the corresponding fscrypt policy version.h]hEnable dummy encryption, which provides a fake fscrypt context. The fake fscrypt context is used by xfstests. The argument may be either “v1” or “v2”, in order to select the corresponding fscrypt policy version.}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj ubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hcheckpoint=%s[:%u[%]]h]hcheckpoint=%s[:%u[%]]}(hjChhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj@ubah}(h]h ]h"]h$]h&]uh1jbhj=ubjc)}(hhh]h)}(hXSet to "disable" to turn off checkpointing. Set to "enable" to re-enable checkpointing. Is enabled by default. While disabled, any unmounting or unexpected shutdowns will cause the filesystem contents to appear as they did when the filesystem was mounted with that option. While mounting with checkpoint=disable, the filesystem must run garbage collection to ensure that all available space can be used. If this takes too much time, the mount may return EAGAIN. You may optionally add a value to indicate how much of the disk you would be willing to temporarily give up to avoid additional garbage collection. This can be given as a number of blocks, or as a percent. For instance, mounting with checkpoint=disable:100% would always succeed, but it may hide up to all remaining free space. The actual space that would be unusable can be viewed at /sys/fs/f2fs//unusable This space is reclaimed once checkpoint=enable.h]hXSet to “disable” to turn off checkpointing. Set to “enable” to re-enable checkpointing. Is enabled by default. While disabled, any unmounting or unexpected shutdowns will cause the filesystem contents to appear as they did when the filesystem was mounted with that option. While mounting with checkpoint=disable, the filesystem must run garbage collection to ensure that all available space can be used. If this takes too much time, the mount may return EAGAIN. You may optionally add a value to indicate how much of the disk you would be willing to temporarily give up to avoid additional garbage collection. This can be given as a number of blocks, or as a percent. For instance, mounting with checkpoint=disable:100% would always succeed, but it may hide up to all remaining free space. The actual space that would be unusable can be viewed at /sys/fs/f2fs//unusable This space is reclaimed once checkpoint=enable.}(hjZhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hjWubah}(h]h ]h"]h$]h&]uh1jbhj=ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hcheckpoint_mergeh]hcheckpoint_merge}(hjzhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjwubah}(h]h ]h"]h$]h&]uh1jbhjtubjc)}(hhh]h)}(hXSWhen checkpoint is enabled, this can be used to create a kernel daemon and make it to merge concurrent checkpoint requests as much as possible to eliminate redundant checkpoint issues. Plus, we can eliminate the sluggish issue caused by slow checkpoint operation when the checkpoint is done in a process context in a cgroup having low i/o budget and cpu shares. To make this do better, we set the default i/o priority of the kernel daemon to "3", to give one higher priority than other kernel threads. This is the same way to give a I/O priority to the jbd2 journaling thread of ext4 filesystem.h]hXWWhen checkpoint is enabled, this can be used to create a kernel daemon and make it to merge concurrent checkpoint requests as much as possible to eliminate redundant checkpoint issues. Plus, we can eliminate the sluggish issue caused by slow checkpoint operation when the checkpoint is done in a process context in a cgroup having low i/o budget and cpu shares. To make this do better, we set the default i/o priority of the kernel daemon to “3”, to give one higher priority than other kernel threads. This is the same way to give a I/O priority to the jbd2 journaling thread of ext4 filesystem.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jbhjtubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hnocheckpoint_mergeh]hnocheckpoint_merge}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM'hjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h!Disable checkpoint merge feature.h]h!Disable checkpoint merge feature.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM'hjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hcompress_algorithm=%sh]hcompress_algorithm=%su}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM(hjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(haControl compress algorithm, currently f2fs supports "lzo", "lz4", "zstd" and "lzo-rle" algorithm.h]hqControl compress algorithm, currently f2fs supports “lzo”, “lz4”, “zstd” and “lzo-rle” algorithm.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM(hjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hcompress_algorithm=%s:%dh]hcompress_algorithm=%s:%d}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM*hjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh](h)}(hlControl compress algorithm and its compress level, now, only "lz4" and "zstd" support compress level config.h]htControl compress algorithm and its compress level, now, only “lz4” and “zstd” support compress level config.}(hj6hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM*hj3ubj9)}(hhh]j>)}(hhh](jC)}(hhh]h}(h]h ]h"]h$]h&]colwidthK uh1jBhjGubjC)}(hhh]h}(h]h ]h"]h$]h&]colwidthK uh1jBhjGubj )}(hhh]j^)}(hhh](jc)}(hhh]h)}(h algorithmh]h algorithm}(hjghhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM.hjdubah}(h]h ]h"]h$]h&]uh1jbhjaubjc)}(hhh]h)}(h level rangeh]h level range}(hj~hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM.hj{ubah}(h]h ]h"]h$]h&]uh1jbhjaubeh}(h]h ]h"]h$]h&]uh1j]hj^ubah}(h]h ]h"]h$]h&]uh1j hjGubjY)}(hhh](j^)}(hhh](jc)}(hhh]h)}(hlz4h]hlz4}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM0hjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h3 - 16h]h3 - 16}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM0hjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjubj^)}(hhh](jc)}(hhh]h)}(hzstdh]hzstd}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM1hjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h1 - 22h]h1 - 22}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM1hjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjubeh}(h]h ]h"]h$]h&]uh1jXhjGubeh}(h]h ]h"]h$]h&]colsKuh1j=hjDubah}(h]h ]h"]h$]h&]uh1j8hj3ubeh}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hcompress_log_size=%uh]hcompress_log_size=%u}(hj4hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM3hj1ubah}(h]h ]h"]h$]h&]uh1jbhj.ubjc)}(hhh]h)}(htSupport configuring compress cluster size. The size will be 4KB * (1 << %u). The default and minimum sizes are 16KB.h]htSupport configuring compress cluster size. The size will be 4KB * (1 << %u). The default and minimum sizes are 16KB.}(hjKhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM3hjHubah}(h]h ]h"]h$]h&]uh1jbhj.ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hcompress_extension=%sh]hcompress_extension=%s}(hjkhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM5hjhubah}(h]h ]h"]h$]h&]uh1jbhjeubjc)}(hhh]h)}(hXSupport adding specified extension, so that f2fs can enable compression on those corresponding files, e.g. if all files with '.ext' has high compression rate, we can set the '.ext' on compression extension list and enable compression on these file by default rather than to enable it via ioctl. For other files, we can still enable compression via ioctl. Note that, there is one reserved special extension '*', it can be set to enable compression for all files.h]hXSupport adding specified extension, so that f2fs can enable compression on those corresponding files, e.g. if all files with ‘.ext’ has high compression rate, we can set the ‘.ext’ on compression extension list and enable compression on these file by default rather than to enable it via ioctl. For other files, we can still enable compression via ioctl. Note that, there is one reserved special extension ‘*’, it can be set to enable compression for all files.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM5hjubah}(h]h ]h"]h$]h&]uh1jbhjeubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hnocompress_extension=%sh]hnocompress_extension=%s}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM=hjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hXSupport adding specified extension, so that f2fs can disable compression on those corresponding files, just contrary to compression extension. If you know exactly which files cannot be compressed, you can use this. The same extension name can't appear in both compress and nocompress extension at the same time. If the compress extension specifies all files, the types specified by the nocompress extension will be treated as special cases and will not be compressed. Don't allow use '*' to specifie all file in nocompress extension. After add nocompress_extension, the priority should be: dir_flag < comp_extention,nocompress_extension < comp_file_flag,no_comp_file_flag. See more in compression sections.h]hXSupport adding specified extension, so that f2fs can disable compression on those corresponding files, just contrary to compression extension. If you know exactly which files cannot be compressed, you can use this. The same extension name can’t appear in both compress and nocompress extension at the same time. If the compress extension specifies all files, the types specified by the nocompress extension will be treated as special cases and will not be compressed. Don’t allow use ‘*’ to specifie all file in nocompress extension. After add nocompress_extension, the priority should be: dir_flag < comp_extention,nocompress_extension < comp_file_flag,no_comp_file_flag. See more in compression sections.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM=hjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hcompress_chksumh]hcompress_chksum}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMIhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h;Support verifying chksum of raw data in compressed cluster.h]h;Support verifying chksum of raw data in compressed cluster.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMIhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hcompress_mode=%sh]hcompress_mode=%s}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMJhj ubah}(h]h ]h"]h$]h&]uh1jbhj ubjc)}(hhh]h)}(hX~Control file compression mode. This supports "fs" and "user" modes. In "fs" mode (default), f2fs does automatic compression on the compression enabled files. In "user" mode, f2fs disables the automaic compression and gives the user discretion of choosing the target file and the timing. The user can do manual compression/decompression on the compression enabled files using ioctls.h]hXControl file compression mode. This supports “fs” and “user” modes. In “fs” mode (default), f2fs does automatic compression on the compression enabled files. In “user” mode, f2fs disables the automaic compression and gives the user discretion of choosing the target file and the timing. The user can do manual compression/decompression on the compression enabled files using ioctls.}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMJhj$ubah}(h]h ]h"]h$]h&]uh1jbhj ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hcompress_cacheh]hcompress_cache}(hjGhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMQhjDubah}(h]h ]h"]h$]h&]uh1jbhjAubjc)}(hhh]h)}(hSupport to use address space of a filesystem managed inode to cache compressed block, in order to improve cache hit ratio of random read.h]hSupport to use address space of a filesystem managed inode to cache compressed block, in order to improve cache hit ratio of random read.}(hj^hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMQhj[ubah}(h]h ]h"]h$]h&]uh1jbhjAubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h inlinecrypth]h inlinecrypt}(hj~hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMThj{ubah}(h]h ]h"]h$]h&]uh1jbhjxubjc)}(hhh]h)}(hXWhen possible, encrypt/decrypt the contents of encrypted files using the blk-crypto framework rather than filesystem-layer encryption. This allows the use of inline encryption hardware. The on-disk format is unaffected. For more details, see Documentation/block/inline-encryption.rst.h]hXWhen possible, encrypt/decrypt the contents of encrypted files using the blk-crypto framework rather than filesystem-layer encryption. This allows the use of inline encryption hardware. The on-disk format is unaffected. For more details, see Documentation/block/inline-encryption.rst.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMThjubah}(h]h ]h"]h$]h&]uh1jbhjxubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hatgch]hatgc}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMZhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hhEnable age-threshold garbage collection, it provides high effectiveness and efficiency on background GC.h]hhEnable age-threshold garbage collection, it provides high effectiveness and efficiency on background GC.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMZhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hdiscard_unit=%sh]hdiscard_unit=%s}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM\hjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hXControl discard unit, the argument can be "block", "segment" and "section", issued discard command's offset/size will be aligned to the unit, by default, "discard_unit=block" is set, so that small discard functionality is enabled. For blkzoned device, "discard_unit=section" will be set by default, it is helpful for large sized SMR or ZNS devices to reduce memory cost by getting rid of fs metadata supports small discard.h]hXControl discard unit, the argument can be “block”, “segment” and “section”, issued discard command’s offset/size will be aligned to the unit, by default, “discard_unit=block” is set, so that small discard functionality is enabled. For blkzoned device, “discard_unit=section” will be set by default, it is helpful for large sized SMR or ZNS devices to reduce memory cost by getting rid of fs metadata supports small discard.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM\hjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h memory=%sh]h memory=%s}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMdhj ubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hX(Control memory mode. This supports "normal" and "low" modes. "low" mode is introduced to support low memory devices. Because of the nature of low memory devices, in this mode, f2fs will try to save memory sometimes by sacrificing performance. "normal" mode is the default mode and same as before.h]hX8Control memory mode. This supports “normal” and “low” modes. “low” mode is introduced to support low memory devices. Because of the nature of low memory devices, in this mode, f2fs will try to save memory sometimes by sacrificing performance. “normal” mode is the default mode and same as before.}(hj:hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMdhj7ubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hage_extent_cacheh]hage_extent_cache}(hjZhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMihjWubah}(h]h ]h"]h$]h&]uh1jbhjTubjc)}(hhh]h)}(hEnable an age extent cache based on rb-tree. It records data block update frequency of the extent per inode, in order to provide better temperature hints for data block allocation.h]hEnable an age extent cache based on rb-tree. It records data block update frequency of the extent per inode, in order to provide better temperature hints for data block allocation.}(hjqhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMihjnubah}(h]h ]h"]h$]h&]uh1jbhjTubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(h errors=%sh]h errors=%s}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMmhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh](h)}(hSpecify f2fs behavior on critical errors. This supports modes: "panic", "continue" and "remount-ro", respectively, trigger panic immediately, continue without doing anything, and remount the partition in read-only mode. By default it uses "continue" mode.h]hXSpecify f2fs behavior on critical errors. This supports modes: “panic”, “continue” and “remount-ro”, respectively, trigger panic immediately, continue without doing anything, and remount the partition in read-only mode. By default it uses “continue” mode.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMmhjubj9)}(hhh]j>)}(hhh](jC)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1jBhjubjC)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1jBhjubjC)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1jBhjubjC)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1jBhjubj )}(hhh]j^)}(hhh](jc)}(hhh]h)}(hmodeh]hmode}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMthjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hcontinueh]hcontinue}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMthjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h remount-roh]h remount-ro}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMthjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hpanich]hpanic}(hj2hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMthj/ubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjubah}(h]h ]h"]h$]h&]uh1j hjubjY)}(hhh](j^)}(hhh](jc)}(hhh]h)}(h access opsh]h access ops}(hj[hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMvhjXubah}(h]h ]h"]h$]h&]uh1jbhjUubjc)}(hhh]h)}(hnormalh]hnormal}(hjrhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMvhjoubah}(h]h ]h"]h$]h&]uh1jbhjUubjc)}(hhh]h)}(hnormalh]hnormal}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMvhjubah}(h]h ]h"]h$]h&]uh1jbhjUubjc)}(hhh]h)}(hN/Ah]hN/A}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMvhjubah}(h]h ]h"]h$]h&]uh1jbhjUubeh}(h]h ]h"]h$]h&]uh1j]hjRubj^)}(hhh](jc)}(hhh]h)}(hsyscall errorsh]hsyscall errors}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMwhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h-EIOh]h-EIO}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMwhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h-EROFSh]h-EROFS}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMwhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hN/Ah]hN/A}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMwhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjRubj^)}(hhh](jc)}(hhh]h)}(h mount optionh]h mount option}(hj%hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMxhj"ubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hrwh]hrw}(hj<hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMxhj9ubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hroh]hro}(hjShhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMxhjPubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hN/Ah]hN/A}(hjjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMxhjgubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjRubj^)}(hhh](jc)}(hhh]h)}(hpending dir writeh]hpending dir write}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMyhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hkeeph]hkeep}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMyhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hkeeph]hkeep}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMyhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hN/Ah]hN/A}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMyhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjRubj^)}(hhh](jc)}(hhh]h)}(hpending non-dir writeh]hpending non-dir write}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMzhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hdroph]hdrop}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMzhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hkeeph]hkeep}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMzhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hN/Ah]hN/A}(hj4hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMzhj1ubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjRubj^)}(hhh](jc)}(hhh]h)}(hpending node writeh]hpending node write}(hjThhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM{hjQubah}(h]h ]h"]h$]h&]uh1jbhjNubjc)}(hhh]h)}(hdroph]hdrop}(hjkhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM{hjhubah}(h]h ]h"]h$]h&]uh1jbhjNubjc)}(hhh]h)}(hkeeph]hkeep}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM{hjubah}(h]h ]h"]h$]h&]uh1jbhjNubjc)}(hhh]h)}(hN/Ah]hN/A}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM{hjubah}(h]h ]h"]h$]h&]uh1jbhjNubeh}(h]h ]h"]h$]h&]uh1j]hjRubj^)}(hhh](jc)}(hhh]h)}(hpending meta writeh]hpending meta write}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM|hjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hkeeph]hkeep}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM|hjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hkeeph]hkeep}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM|hjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hN/Ah]hN/A}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM|hjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjRubeh}(h]h ]h"]h$]h&]uh1jXhjubeh}(h]h ]h"]h$]h&]colsKuh1j=hjubah}(h]h ]h"]h$]h&]uh1j8hjubeh}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hnat_bitsh]hnat_bits}(hj=hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM~hj:ubah}(h]h ]h"]h$]h&]uh1jbhj7ubjc)}(hhh]h)}(hZEnable nat_bits feature to enhance full/empty nat blocks access, by default it's disabled.h]h\Enable nat_bits feature to enhance full/empty nat blocks access, by default it’s disabled.}(hjThhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM~hjQubah}(h]h ]h"]h$]h&]uh1jbhj7ubeh}(h]h ]h"]h$]h&]uh1j]hjZubj^)}(hhh](jc)}(hhh]h)}(hlookup_mode=%sh]hlookup_mode=%s}(hjthhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjqubah}(h]h ]h"]h$]h&]uh1jbhjnubjc)}(hhh](h)}(hControl the directory lookup behavior for casefolded directories. This option has no effect on directories that do not have the casefold feature enabled.h]hControl the directory lookup behavior for casefolded directories. This option has no effect on directories that do not have the casefold feature enabled.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubj9)}(hhh]j>)}(hhh](jC)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1jBhjubjC)}(hhh]h}(h]h ]h"]h$]h&]colwidthK(uh1jBhjubj )}(hhh]j^)}(hhh](jc)}(hhh]h)}(hValueh]hValue}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(h Descriptionh]h Description}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjubah}(h]h ]h"]h$]h&]uh1j hjubjY)}(hhh](j^)}(hhh](jc)}(hhh]h)}(hperfh]hperf}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jbhjubjc)}(hhh]h)}(hp(Default) Enforces a hash-only lookup. The linear search fallback is always disabled, ignoring the on-disk flag.h]hp(Default) Enforces a hash-only lookup. The linear search fallback is always disabled, ignoring the on-disk flag.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jbhjubeh}(h]h ]h"]h$]h&]uh1j]hjubj^)}(hhh](jc)}(hhh]h)}(hcompath]hcompat}(hj3hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj0ubah}(h]h ]h"]h$]h&]uh1jbhj-ubjc)}(hhh]h)}(hEnables the linear search fallback for compatibility with directory entries created by older kernel that used a different case-folding algorithm. This mode ignores the on-disk flag.h]hEnables the linear search fallback for compatibility with directory entries created by older kernel that used a different case-folding algorithm. This mode ignores the on-disk flag.}(hjJhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjGubah}(h]h ]h"]h$]h&]uh1jbhj-ubeh}(h]h ]h"]h$]h&]uh1j]hjubj^)}(hhh](jc)}(hhh]h)}(hautoh]hauto}(hjjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjgubah}(h]h ]h"]h$]h&]uh1jbhjdubjc)}(hhh]h)}(hRF2FS determines the mode based on the on-disk `SB_ENC_NO_COMPAT_FALLBACK_FL` flag.h](h.F2FS determines the mode based on the on-disk }(hjhhhNhNubhtitle_reference)}(h`SB_ENC_NO_COMPAT_FALLBACK_FL`h]hSB_ENC_NO_COMPAT_FALLBACK_FL}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1jhjubh flag.}(hjhhhNhNubeh}(h]h ]h"]h$]h&]uh1hhhhMhj~ubah}(h]h ]h"]h$]h&]uh1jbhjdubeh}(h]h ]h"]h$]h&]uh1j]hjubeh}(h]h ]h"]h$]h&]uh1jXhjubeh}(h]h ]h"]h$]h&]colsKuh1j=hjubah}(h]h ]h"]h$]h&]uh1j8hjubeh}(h]h ]h"]h$]h&]uh1jbhjnubeh}(h]h ]h"]h$]h&]uh1j]hjZubeh}(h]h ]h"]h$]h&]uh1jXhj?ubeh}(h]h ]h"]h$]h&]colsKuh1j=hj:ubah}(h]h ]h"]h$]h&]uh1j8hj'hhhhhNubeh}(h] mount-optionsah ]h"] mount optionsah$]h&]uh1hhhhhhhhKlubh)}(hhh](h)}(hDebugfs Entriesh]hDebugfs Entries}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhMubh)}(h/sys/kernel/debug/f2fs/ contains information about all the partitions mounted as f2fs. Each file shows the whole f2fs information.h]h/sys/kernel/debug/f2fs/ contains information about all the partitions mounted as f2fs. Each file shows the whole f2fs information.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh)}(h'/sys/kernel/debug/f2fs/status includes:h]h'/sys/kernel/debug/f2fs/status includes:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjhhubh block_quote)}(h- major file system information managed by f2fs currently - average SIT information about whole segments - current memory footprint consumed by f2fs. h]j)}(hhh](j)}(h7major file system information managed by f2fs currentlyh]h)}(hj!h]h7major file system information managed by f2fs currently}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jhjubj)}(h,average SIT information about whole segmentsh]h)}(hj8h]h,average SIT information about whole segments}(hj:hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj6ubah}(h]h ]h"]h$]h&]uh1jhjubj)}(h+current memory footprint consumed by f2fs. h]h)}(h*current memory footprint consumed by f2fs.h]h*current memory footprint consumed by f2fs.}(hjQhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjMubah}(h]h ]h"]h$]h&]uh1jhjubeh}(h]h ]h"]h$]h&]j9j:uh1jhhhMhjubah}(h]h ]h"]h$]h&]uh1jhhhMhjhhubeh}(h]debugfs-entriesah ]h"]debugfs entriesah$]h&]uh1hhhhhhhhMubh)}(hhh](h)}(h Sysfs Entriesh]h Sysfs Entries}(hj|hhhNhNubah}(h]h ]h"]h$]h&]uh1hhjyhhhhhMubh)}(hInformation about mounted f2fs file systems can be found in /sys/fs/f2fs. Each mounted filesystem will have a directory in /sys/fs/f2fs based on its device name (i.e., /sys/fs/f2fs/sda). The files in each per-device directory are shown in table below.h]hInformation about mounted f2fs file systems can be found in /sys/fs/f2fs. Each mounted filesystem will have a directory in /sys/fs/f2fs based on its device name (i.e., /sys/fs/f2fs/sda). The files in each per-device directory are shown in table below.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjyhhubh)}(hRFiles in /sys/fs/f2fs/ (see also Documentation/ABI/testing/sysfs-fs-f2fs)h]hRFiles in /sys/fs/f2fs/ (see also Documentation/ABI/testing/sysfs-fs-f2fs)}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjyhhubeh}(h] sysfs-entriesah ]h"] sysfs entriesah$]h&]uh1hhhhhhhhMubh)}(hhh](h)}(hUsageh]hUsage}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjhhhhhMubjc)}(hhh](j)}(h*Download userland tools and compile them. h]h)}(h)Download userland tools and compile them.h]h)Download userland tools and compile them.}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubah}(h]h ]h"]h$]h&]uh1jhjhhhhhNubj)}(hsSkip, if f2fs was compiled statically inside kernel. Otherwise, insert the f2fs.ko module:: # insmod f2fs.ko h](h)}(h[Skip, if f2fs was compiled statically inside kernel. Otherwise, insert the f2fs.ko module::h]hZSkip, if f2fs was compiled statically inside kernel. Otherwise, insert the f2fs.ko module:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubh literal_block)}(h# insmod f2fs.koh]h# insmod f2fs.ko}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjubeh}(h]h ]h"]h$]h&]uh1jhjhhhhhNubj)}(hBCreate a directory to use when mounting:: # mkdir /mnt/f2fs h](h)}(h)Create a directory to use when mounting::h]h(Create a directory to use when mounting:}(hjhhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjubj)}(h# mkdir /mnt/f2fsh]h# mkdir /mnt/f2fs}hjsbah}(h]h ]h"]h$]h&]hhuh1jhhhMhjubeh}(h]h ]h"]h$]h&]uh1jhjhhhhhNubj)}(hFormat the block device, and then mount as f2fs:: # mkfs.f2fs -l label /dev/block_device # mount -t f2fs /dev/block_device /mnt/f2fs h](h)}(h1Format the block device, and then mount as f2fs::h]h0Format the block device, and then mount as f2fs:}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj(ubj)}(hR# mkfs.f2fs -l label /dev/block_device # mount -t f2fs /dev/block_device /mnt/f2fsh]hR# mkfs.f2fs -l label /dev/block_device # mount -t f2fs /dev/block_device /mnt/f2fs}hj:sbah}(h]h ]h"]h$]h&]hhuh1jhhhMhj(ubeh}(h]h ]h"]h$]h&]uh1jhjhhhhhNubeh}(h]h ]h"]h$]h&]jjjhjjuh1jbhjhhhhhMubh)}(hhh](h)}(h mkfs.f2fsh]h mkfs.f2fs}(hjWhhhNhNubah}(h]h ]h"]h$]h&]uh1hhjThhhhhMubh)}(hsThe mkfs.f2fs is for the use of formatting a partition as the f2fs filesystem, which builds a basic on-disk layout.h]hsThe mkfs.f2fs is for the use of formatting a partition as the f2fs filesystem, which builds a basic on-disk layout.}(hjehhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjThhubh)}(hThe quick options consist of:h]hThe quick options consist of:}(hjshhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjThhubj9)}(hhh]j>)}(hhh](jC)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1jBhjubjC)}(hhh]h}(h]h ]h"]h$]h&]colwidthK!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj;!ubah}(h]h ]h"]h$]h&]uh1jbhj!ubeh}(h]h ]h"]h$]h&]uh1j]hjubj^)}(hhh](jc)}(hhh]h)}(h``-t [0 or 1]``h]j)}(hj`!h]h -t [0 or 1]}(hjb!hhhNhNubah}(h]h ]h"]h$]h&]uh1jhj^!ubah}(h]h ]h"]h$]h&]uh1hhhhMhj[!ubah}(h]h ]h"]h$]h&]uh1jbhjX!ubjc)}(hhh](h)}(hDisable discard command or not.h]hDisable discard command or not.}(hj~!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj{!ubh)}(h,1 is set by default, which conducts discard.h]h,1 is set by default, which conducts discard.}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj{!ubeh}(h]h ]h"]h$]h&]uh1jbhjX!ubeh}(h]h ]h"]h$]h&]uh1j]hjubeh}(h]h ]h"]h$]h&]uh1jXhjubeh}(h]h ]h"]h$]h&]colsKuh1j=hjubah}(h]h ]h"]h$]h&]uh1j8hjThhhhhNubh)}(hJNote: please refer to the manpage of mkfs.f2fs(8) to get full option list.h]hJNote: please refer to the manpage of mkfs.f2fs(8) to get full option list.}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjThhubeh}(h] mkfs-f2fsah ]h"] mkfs.f2fsah$]h&]uh1hhjhhhhhMubh)}(hhh](h)}(h fsck.f2fsh]h fsck.f2fs}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj!hhhhhMubh)}(hXThe fsck.f2fs is a tool to check the consistency of an f2fs-formatted partition, which examines whether the filesystem metadata and user-made data are cross-referenced correctly or not. Note that, initial version of the tool does not fix any inconsistency.h]hXThe fsck.f2fs is a tool to check the consistency of an f2fs-formatted partition, which examines whether the filesystem metadata and user-made data are cross-referenced correctly or not. Note that, initial version of the tool does not fix any inconsistency.}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj!hhubh)}(hThe quick options consist of::h]hThe quick options consist of:}(hj!hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj!hhubj)}(h-d debug level [default:0]h]h-d debug level [default:0]}hj!sbah}(h]h ]h"]h$]h&]hhuh1jhhhMhj!hhubh)}(hJNote: please refer to the manpage of fsck.f2fs(8) to get full option list.h]hJNote: please refer to the manpage of fsck.f2fs(8) to get full option list.}(hj "hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj!hhubeh}(h] fsck-f2fsah ]h"] fsck.f2fsah$]h&]uh1hhjhhhhhMubh)}(hhh](h)}(h dump.f2fsh]h dump.f2fs}(hj#"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj "hhhhhMubh)}(hxThe dump.f2fs shows the information of specific inode and dumps SSA and SIT to file. Each file is dump_ssa and dump_sit.h]hxThe dump.f2fs shows the information of specific inode and dumps SSA and SIT to file. Each file is dump_ssa and dump_sit.}(hj1"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj "hhubh)}(hXThe dump.f2fs is used to debug on-disk data structures of the f2fs filesystem. It shows on-disk inode information recognized by a given inode number, and is able to dump all the SSA and SIT entries into predefined files, ./dump_ssa and ./dump_sit respectively.h]hXThe dump.f2fs is used to debug on-disk data structures of the f2fs filesystem. It shows on-disk inode information recognized by a given inode number, and is able to dump all the SSA and SIT entries into predefined files, ./dump_ssa and ./dump_sit respectively.}(hj?"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj "hhubh)}(hThe options consist of::h]hThe options consist of:}(hjM"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj "hhubj)}(h-d debug level [default:0] -i inode no (hex) -s [SIT dump segno from #1~#2 (decimal), for all 0~-1] -a [SSA dump segno from #1~#2 (decimal), for all 0~-1]h]h-d debug level [default:0] -i inode no (hex) -s [SIT dump segno from #1~#2 (decimal), for all 0~-1] -a [SSA dump segno from #1~#2 (decimal), for all 0~-1]}hj["sbah}(h]h ]h"]h$]h&]hhuh1jhhhMhj "hhubh)}(h Examples::h]h Examples:}(hji"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj "hhubj)}(hm# dump.f2fs -i [ino] /dev/sdx # dump.f2fs -s 0~-1 /dev/sdx (SIT dump) # dump.f2fs -a 0~-1 /dev/sdx (SSA dump)h]hm# dump.f2fs -i [ino] /dev/sdx # dump.f2fs -s 0~-1 /dev/sdx (SIT dump) # dump.f2fs -a 0~-1 /dev/sdx (SSA dump)}hjw"sbah}(h]h ]h"]h$]h&]hhuh1jhhhMhj "hhubh)}(hJNote: please refer to the manpage of dump.f2fs(8) to get full option list.h]hJNote: please refer to the manpage of dump.f2fs(8) to get full option list.}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj "hhubeh}(h] dump-f2fsah ]h"] dump.f2fsah$]h&]uh1hhjhhhhhMubh)}(hhh](h)}(h sload.f2fsh]h sload.f2fs}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj"hhhhhMubh)}(hThe sload.f2fs gives a way to insert files and directories in the existing disk image. This tool is useful when building f2fs images given compiled files.h]hThe sload.f2fs gives a way to insert files and directories in the existing disk image. This tool is useful when building f2fs images given compiled files.}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj"hhubh)}(hKNote: please refer to the manpage of sload.f2fs(8) to get full option list.h]hKNote: please refer to the manpage of sload.f2fs(8) to get full option list.}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj"hhubeh}(h] sload-f2fsah ]h"] sload.f2fsah$]h&]uh1hhjhhhhhMubh)}(hhh](h)}(h resize.f2fsh]h resize.f2fs}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj"hhhhhM ubh)}(hThe resize.f2fs lets a user resize the f2fs-formatted disk image, while preserving all the files and directories stored in the image.h]hThe resize.f2fs lets a user resize the f2fs-formatted disk image, while preserving all the files and directories stored in the image.}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj"hhubh)}(hLNote: please refer to the manpage of resize.f2fs(8) to get full option list.h]hLNote: please refer to the manpage of resize.f2fs(8) to get full option list.}(hj"hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj"hhubeh}(h] resize-f2fsah ]h"] resize.f2fsah$]h&]uh1hhjhhhhhM ubh)}(hhh](h)}(h defrag.f2fsh]h defrag.f2fs}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj#hhhhhMubh)}(hThe defrag.f2fs can be used to defragment scattered written data as well as filesystem metadata across the disk. This can improve the write speed by giving more free consecutive space.h]hThe defrag.f2fs can be used to defragment scattered written data as well as filesystem metadata across the disk. This can improve the write speed by giving more free consecutive space.}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj#hhubh)}(hLNote: please refer to the manpage of defrag.f2fs(8) to get full option list.h]hLNote: please refer to the manpage of defrag.f2fs(8) to get full option list.}(hj$#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj#hhubeh}(h] defrag-f2fsah ]h"] defrag.f2fsah$]h&]uh1hhjhhhhhMubh)}(hhh](h)}(hf2fs_ioh]hf2fs_io}(hj=#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj:#hhhhhMubh)}(hThe f2fs_io is a simple tool to issue various filesystem APIs as well as f2fs-specific ones, which is very useful for QA tests.h]hThe f2fs_io is a simple tool to issue various filesystem APIs as well as f2fs-specific ones, which is very useful for QA tests.}(hjK#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj:#hhubh)}(hHNote: please refer to the manpage of f2fs_io(8) to get full option list.h]hHNote: please refer to the manpage of f2fs_io(8) to get full option list.}(hjY#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj:#hhubeh}(h]f2fs-ioah ]h"]f2fs_ioah$]h&]uh1hhjhhhhhMubeh}(h]usageah ]h"]usageah$]h&]uh1hhhhhhhhMubh)}(hhh](h)}(hDesignh]hDesign}(hjz#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhjw#hhhhhM ubh)}(hhh](h)}(hOn-disk Layouth]hOn-disk Layout}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj#hhhhhM#ubh)}(hX3F2FS divides the whole volume into a number of segments, each of which is fixed to 2MB in size. A section is composed of consecutive segments, and a zone consists of a set of sections. By default, section and zone sizes are set to one segment size identically, but users can easily modify the sizes by mkfs.h]hX3F2FS divides the whole volume into a number of segments, each of which is fixed to 2MB in size. A section is composed of consecutive segments, and a zone consists of a set of sections. By default, section and zone sizes are set to one segment size identically, but users can easily modify the sizes by mkfs.}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM%hj#hhubh)}(hF2FS splits the entire volume into six areas, and all the areas except superblock consist of multiple segments as described below::h]hF2FS splits the entire volume into six areas, and all the areas except superblock consist of multiple segments as described below:}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM*hj#hhubj)}(hX align with the zone size <-| |-> align with the segment size _________________________________________________________________________ | | | Segment | Node | Segment | | | Superblock | Checkpoint | Info. | Address | Summary | Main | | (SB) | (CP) | Table (SIT) | Table (NAT) | Area (SSA) | | |____________|_____2______|______N______|______N______|______N_____|__N___| . . . . . . ._________________________________________. |_Segment_|_..._|_Segment_|_..._|_Segment_| . . ._________._________ |_section_|__...__|_ . . .________. |__zone__|h]hX align with the zone size <-| |-> align with the segment size _________________________________________________________________________ | | | Segment | Node | Segment | | | Superblock | Checkpoint | Info. | Address | Summary | Main | | (SB) | (CP) | Table (SIT) | Table (NAT) | Area (SSA) | | |____________|_____2______|______N______|______N______|______N_____|__N___| . . . . . . ._________________________________________. |_Segment_|_..._|_Segment_|_..._|_Segment_| . . ._________._________ |_section_|__...__|_ . . .________. |__zone__|}hj#sbah}(h]h ]h"]h$]h&]hhuh1jhhhM-hj#hhubj)}(hhh](j)}(hSuperblock (SB) It is located at the beginning of the partition, and there exist two copies to avoid file system crash. It contains basic partition information and some default parameters of f2fs. h]hdefinition_list)}(hhh]hdefinition_list_item)}(hSuperblock (SB) It is located at the beginning of the partition, and there exist two copies to avoid file system crash. It contains basic partition information and some default parameters of f2fs. h](hterm)}(hSuperblock (SB)h]hSuperblock (SB)}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1j#hhhMChj#ubh definition)}(hhh]h)}(hIt is located at the beginning of the partition, and there exist two copies to avoid file system crash. It contains basic partition information and some default parameters of f2fs.h]hIt is located at the beginning of the partition, and there exist two copies to avoid file system crash. It contains basic partition information and some default parameters of f2fs.}(hj#hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMAhj#ubah}(h]h ]h"]h$]h&]uh1j#hj#ubeh}(h]h ]h"]h$]h&]uh1j#hhhMChj#ubah}(h]h ]h"]h$]h&]uh1j#hj#ubah}(h]h ]h"]h$]h&]uh1jhj#hhhNhNubj)}(hCheckpoint (CP) It contains file system information, bitmaps for valid NAT/SIT sets, orphan inode lists, and summary entries of current active segments. h]j#)}(hhh]j#)}(hCheckpoint (CP) It contains file system information, bitmaps for valid NAT/SIT sets, orphan inode lists, and summary entries of current active segments. h](j#)}(hCheckpoint (CP)h]hCheckpoint (CP)}(hj$hhhNhNubah}(h]h ]h"]h$]h&]uh1j#hhhMGhj$ubj#)}(hhh]h)}(hIt contains file system information, bitmaps for valid NAT/SIT sets, orphan inode lists, and summary entries of current active segments.h]hIt contains file system information, bitmaps for valid NAT/SIT sets, orphan inode lists, and summary entries of current active segments.}(hj,$hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMFhj)$ubah}(h]h ]h"]h$]h&]uh1j#hj$ubeh}(h]h ]h"]h$]h&]uh1j#hhhMGhj$ubah}(h]h ]h"]h$]h&]uh1j#hj$ubah}(h]h ]h"]h$]h&]uh1jhj#hhhNhNubj)}(hSegment Information Table (SIT) It contains segment information such as valid block count and bitmap for the validity of all the blocks. h]j#)}(hhh]j#)}(hSegment Information Table (SIT) It contains segment information such as valid block count and bitmap for the validity of all the blocks. h](j#)}(hSegment Information Table (SIT)h]hSegment Information Table (SIT)}(hj]$hhhNhNubah}(h]h ]h"]h$]h&]uh1j#hhhMKhjY$ubj#)}(hhh]h)}(hhIt contains segment information such as valid block count and bitmap for the validity of all the blocks.h]hhIt contains segment information such as valid block count and bitmap for the validity of all the blocks.}(hjn$hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMJhjk$ubah}(h]h ]h"]h$]h&]uh1j#hjY$ubeh}(h]h ]h"]h$]h&]uh1j#hhhMKhjV$ubah}(h]h ]h"]h$]h&]uh1j#hjR$ubah}(h]h ]h"]h$]h&]uh1jhj#hhhNhNubj)}(hpNode Address Table (NAT) It is composed of a block address table for all the node blocks stored in Main area. h]j#)}(hhh]j#)}(hnNode Address Table (NAT) It is composed of a block address table for all the node blocks stored in Main area. h](j#)}(hNode Address Table (NAT)h]hNode Address Table (NAT)}(hj$hhhNhNubah}(h]h ]h"]h$]h&]uh1j#hhhMOhj$ubj#)}(hhh]h)}(hTIt is composed of a block address table for all the node blocks stored in Main area.h]hTIt is composed of a block address table for all the node blocks stored in Main area.}(hj$hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMNhj$ubah}(h]h ]h"]h$]h&]uh1j#hj$ubeh}(h]h ]h"]h$]h&]uh1j#hhhMOhj$ubah}(h]h ]h"]h$]h&]uh1j#hj$ubah}(h]h ]h"]h$]h&]uh1jhj#hhhNhNubj)}(hSegment Summary Area (SSA) It contains summary entries which contains the owner information of all the data and node blocks stored in Main area. h]j#)}(hhh]j#)}(hSegment Summary Area (SSA) It contains summary entries which contains the owner information of all the data and node blocks stored in Main area. h](j#)}(hSegment Summary Area (SSA)h]hSegment Summary Area (SSA)}(hj$hhhNhNubah}(h]h ]h"]h$]h&]uh1j#hhhMShj$ubj#)}(hhh]h)}(huIt contains summary entries which contains the owner information of all the data and node blocks stored in Main area.h]huIt contains summary entries which contains the owner information of all the data and node blocks stored in Main area.}(hj$hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMRhj$ubah}(h]h ]h"]h$]h&]uh1j#hj$ubeh}(h]h ]h"]h$]h&]uh1j#hhhMShj$ubah}(h]h ]h"]h$]h&]uh1j#hj$ubah}(h]h ]h"]h$]h&]uh1jhj#hhhNhNubj)}(hHMain Area It contains file and directory data including their indices. h]j#)}(hhh]j#)}(hGMain Area It contains file and directory data including their indices. h](j#)}(h Main Areah]h Main Area}(hj#%hhhNhNubah}(h]h ]h"]h$]h&]uh1j#hhhMVhj%ubj#)}(hhh]h)}(h Dir <-------------- | | child child child - child [hole] - child child - child - child [hole] - [hole] - child Case 1: Case 2: Number of children = 6, Number of children = 3, File size = 7 File size = 7h]hX| --------------> Dir <-------------- | | child child child - child [hole] - child child - child - child [hole] - [hole] - child Case 1: Case 2: Number of children = 6, Number of children = 3, File size = 7 File size = 7}hj*'sbah}(h]h ]h"]h$]h&]hhuh1jhhhMhj&hhubeh}(h]directory-structureah ]h"]directory structureah$]h&]uh1hhjw#hhhhhMubh)}(hhh](h)}(hDefault Block Allocationh]hDefault Block Allocation}(hjC'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj@'hhhhhMubh)}(hgAt runtime, F2FS manages six active logs inside "Main" area: Hot/Warm/Cold node and Hot/Warm/Cold data.h]hkAt runtime, F2FS manages six active logs inside “Main” area: Hot/Warm/Cold node and Hot/Warm/Cold data.}(hjQ'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj@'hhubj)}(hhh](j)}(h9Hot node contains direct node blocks of directories.h]h)}(hjd'h]h9Hot node contains direct node blocks of directories.}(hjf'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjb'ubah}(h]h ]h"]h$]h&]uh1jhj_'hhhhhNubj)}(hAWarm node contains direct node blocks except hot node blocks.h]h)}(hj{'h]hAWarm node contains direct node blocks except hot node blocks.}(hj}'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhjy'ubah}(h]h ]h"]h$]h&]uh1jhj_'hhhhhNubj)}(h+Cold node contains indirect node blocksh]h)}(hj'h]h+Cold node contains indirect node blocks}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj'ubah}(h]h ]h"]h$]h&]uh1jhj_'hhhhhNubj)}(h$Hot data contains dentry blocksh]h)}(hj'h]h$Hot data contains dentry blocks}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj'ubah}(h]h ]h"]h$]h&]uh1jhj_'hhhhhNubj)}(hBWarm data contains data blocks except hot and cold data blocksh]h)}(hj'h]hBWarm data contains data blocks except hot and cold data blocks}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj'ubah}(h]h ]h"]h$]h&]uh1jhj_'hhhhhNubj)}(h?Cold data contains multimedia data or migrated data blocks h]h)}(h>Cold data contains multimedia data or migrated data blocksh]h>Cold data contains multimedia data or migrated data blocks}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj'ubah}(h]h ]h"]h$]h&]uh1jhj_'hhhhhNubeh}(h]h ]h"]h$]h&]j9j:uh1jhhhMhj@'hhubh)}(hXLFS has two schemes for free space management: threaded log and copy-and-compac- tion. The copy-and-compaction scheme which is known as cleaning, is well-suited for devices showing very good sequential write performance, since free segments are served all the time for writing new data. However, it suffers from cleaning overhead under high utilization. Contrarily, the threaded log scheme suffers from random writes, but no cleaning process is needed. F2FS adopts a hybrid scheme where the copy-and-compaction scheme is adopted by default, but the policy is dynamically changed to the threaded log scheme according to the file system status.h]hXLFS has two schemes for free space management: threaded log and copy-and-compac- tion. The copy-and-compaction scheme which is known as cleaning, is well-suited for devices showing very good sequential write performance, since free segments are served all the time for writing new data. However, it suffers from cleaning overhead under high utilization. Contrarily, the threaded log scheme suffers from random writes, but no cleaning process is needed. F2FS adopts a hybrid scheme where the copy-and-compaction scheme is adopted by default, but the policy is dynamically changed to the threaded log scheme according to the file system status.}(hj'hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj@'hhubh)}(hXIn order to align F2FS with underlying flash-based storage, F2FS allocates a segment in a unit of section. F2FS expects that the section size would be the same as the unit size of garbage collection in FTL. Furthermore, with respect to the mapping granularity in FTL, F2FS allocates each section of the active logs from different zones as much as possible, since FTL can write the data in the active logs into one allocation unit according to its mapping granularity.h]hXIn order to align F2FS with underlying flash-based storage, F2FS allocates a segment in a unit of section. F2FS expects that the section size would be the same as the unit size of garbage collection in FTL. Furthermore, with respect to the mapping granularity in FTL, F2FS allocates each section of the active logs from different zones as much as possible, since FTL can write the data in the active logs into one allocation unit according to its mapping granularity.}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj@'hhubeh}(h]default-block-allocationah ]h"]default block allocationah$]h&]uh1hhjw#hhhhhMubh)}(hhh](h)}(hCleaning processh]hCleaning process}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj(hhhhhMubh)}(hF2FS does cleaning both on demand and in the background. On-demand cleaning is triggered when there are not enough free segments to serve VFS calls. Background cleaner is operated by a kernel thread, and triggers the cleaning job when the system is idle.h]hF2FS does cleaning both on demand and in the background. On-demand cleaning is triggered when there are not enough free segments to serve VFS calls. Background cleaner is operated by a kernel thread, and triggers the cleaning job when the system is idle.}(hj((hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhj(hhubh)}(hXF2FS supports two victim selection policies: greedy and cost-benefit algorithms. In the greedy algorithm, F2FS selects a victim segment having the smallest number of valid blocks. In the cost-benefit algorithm, F2FS selects a victim segment according to the segment age and the number of valid blocks in order to address log block thrashing problem in the greedy algorithm. F2FS adopts the greedy algorithm for on-demand cleaner, while background cleaner adopts cost-benefit algorithm.h]hXF2FS supports two victim selection policies: greedy and cost-benefit algorithms. In the greedy algorithm, F2FS selects a victim segment having the smallest number of valid blocks. In the cost-benefit algorithm, F2FS selects a victim segment according to the segment age and the number of valid blocks in order to address log block thrashing problem in the greedy algorithm. F2FS adopts the greedy algorithm for on-demand cleaner, while background cleaner adopts cost-benefit algorithm.}(hj6(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM hj(hhubh)}(hIn order to identify whether the data in the victim segment are valid or not, F2FS manages a bitmap. Each bit represents the validity of a block, and the bitmap is composed of a bit stream covering whole blocks in main area.h]hIn order to identify whether the data in the victim segment are valid or not, F2FS manages a bitmap. Each bit represents the validity of a block, and the bitmap is composed of a bit stream covering whole blocks in main area.}(hjD(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM(hj(hhubeh}(h]cleaning-processah ]h"]cleaning processah$]h&]uh1hhjw#hhhhhMubh)}(hhh](h)}(hWrite-hint Policyh]hWrite-hint Policy}(hj](hhhNhNubah}(h]h ]h"]h$]h&]uh1hhjZ(hhhhhM-ubh)}(h7F2FS sets the whint all the time with the below policy.h]h7F2FS sets the whint all the time with the below policy.}(hjk(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM/hjZ(hhubj9)}(hhh]j>)}(hhh](jC)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1jBhj|(ubjC)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1jBhj|(ubjC)}(hhh]h}(h]h ]h"]h$]h&]colwidthKuh1jBhj|(ubj )}(hhh]j^)}(hhh](jc)}(hhh]h)}(hUserh]hUser}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM2hj(ubah}(h]h ]h"]h$]h&]uh1jbhj(ubjc)}(hhh]h)}(hF2FSh]hF2FS}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM2hj(ubah}(h]h ]h"]h$]h&]uh1jbhj(ubjc)}(hhh]h)}(hBlockh]hBlock}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM2hj(ubah}(h]h ]h"]h$]h&]uh1jbhj(ubeh}(h]h ]h"]h$]h&]uh1j]hj(ubah}(h]h ]h"]h$]h&]uh1j hj|(ubjY)}(hhh](j^)}(hhh](jc)}(hhh]h)}(hN/Ah]hN/A}(hj(hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM4hj(ubah}(h]h ]h"]h$]h&]uh1jbhj(ubjc)}(hhh]h)}(hMETAh]hMETA}(hj)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM4hj)ubah}(h]h ]h"]h$]h&]uh1jbhj(ubjc)}(hhh]h)}(hWRITE_LIFE_NONE|REQ_METAh]hWRITE_LIFE_NONE|REQ_META}(hj+)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM4hj()ubah}(h]h ]h"]h$]h&]uh1jbhj(ubeh}(h]h ]h"]h$]h&]uh1j]hj(ubj^)}(hhh](jc)}(hhh]h)}(hN/Ah]hN/A}(hjK)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM5hjH)ubah}(h]h ]h"]h$]h&]uh1jbhjE)ubjc)}(hhh]h)}(hHOT_NODEh]hHOT_NODE}(hjb)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM5hj_)ubah}(h]h ]h"]h$]h&]uh1jbhjE)ubjc)}(hhh]h)}(hWRITE_LIFE_NONEh]hWRITE_LIFE_NONE}(hjy)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM5hjv)ubah}(h]h ]h"]h$]h&]uh1jbhjE)ubeh}(h]h ]h"]h$]h&]uh1j]hj(ubj^)}(hhh](jc)}(hhh]h)}(hN/Ah]hN/A}(hj)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM6hj)ubah}(h]h ]h"]h$]h&]uh1jbhj)ubjc)}(hhh]h)}(h WARM_NODEh]h WARM_NODE}(hj)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM6hj)ubah}(h]h ]h"]h$]h&]uh1jbhj)ubjc)}(hhh]h)}(hWRITE_LIFE_MEDIUMh]hWRITE_LIFE_MEDIUM}(hj)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM6hj)ubah}(h]h ]h"]h$]h&]uh1jbhj)ubeh}(h]h ]h"]h$]h&]uh1j]hj(ubj^)}(hhh](jc)}(hhh]h)}(hN/Ah]hN/A}(hj)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM7hj)ubah}(h]h ]h"]h$]h&]uh1jbhj)ubjc)}(hhh]h)}(h COLD_NODEh]h COLD_NODE}(hj)hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM7hj)ubah}(h]h ]h"]h$]h&]uh1jbhj)ubjc)}(hhh]h)}(hWRITE_LIFE_LONGh]hWRITE_LIFE_LONG}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM7hj*ubah}(h]h ]h"]h$]h&]uh1jbhj)ubeh}(h]h ]h"]h$]h&]uh1j]hj(ubj^)}(hhh](jc)}(hhh]h)}(h ioctl(COLD)h]h ioctl(COLD)}(hj5*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM8hj2*ubah}(h]h ]h"]h$]h&]uh1jbhj/*ubjc)}(hhh]h)}(h COLD_DATAh]h COLD_DATA}(hjL*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM8hjI*ubah}(h]h ]h"]h$]h&]uh1jbhj/*ubjc)}(hhh]h)}(hWRITE_LIFE_EXTREMEh]hWRITE_LIFE_EXTREME}(hjc*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM8hj`*ubah}(h]h ]h"]h$]h&]uh1jbhj/*ubeh}(h]h ]h"]h$]h&]uh1j]hj(ubj^)}(hhh](jc)}(hhh]h)}(hextension listh]hextension list}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM9hj*ubah}(h]h ]h"]h$]h&]uh1jbhj}*ubjc)}(hhh]h)}(h"h]h“}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM9hj*ubah}(h]h ]h"]h$]h&]uh1jbhj}*ubjc)}(hhh]h)}(hj*h]h“}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM9hj*ubah}(h]h ]h"]h$]h&]uh1jbhj}*ubeh}(h]h ]h"]h$]h&]uh1j]hj(ubj^)}(hhh]jc)}(hhh]h)}(h-- buffered ioh]h-- buffered io}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM;hj*ubah}(h]h ]h"]h$]h&]morecolsKuh1jbhj*ubah}(h]h ]h"]h$]h&]uh1j]hj(ubj^)}(hhh](jc)}(hhh]h)}(hN/Ah]hN/A}(hj*hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM=hj*ubah}(h]h ]h"]h$]h&]uh1jbhj*ubjc)}(hhh]h)}(h COLD_DATAh]h COLD_DATA}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM=hj+ubah}(h]h ]h"]h$]h&]uh1jbhj*ubjc)}(hhh]h)}(hWRITE_LIFE_EXTREMEh]hWRITE_LIFE_EXTREME}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM=hj+ubah}(h]h ]h"]h$]h&]uh1jbhj*ubeh}(h]h ]h"]h$]h&]uh1j]hj(ubj^)}(hhh](jc)}(hhh]h)}(hN/Ah]hN/A}(hj?+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM>hj<+ubah}(h]h ]h"]h$]h&]uh1jbhj9+ubjc)}(hhh]h)}(hHOT_DATAh]hHOT_DATA}(hjV+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM>hjS+ubah}(h]h ]h"]h$]h&]uh1jbhj9+ubjc)}(hhh]h)}(hWRITE_LIFE_SHORTh]hWRITE_LIFE_SHORT}(hjm+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM>hjj+ubah}(h]h ]h"]h$]h&]uh1jbhj9+ubeh}(h]h ]h"]h$]h&]uh1j]hj(ubj^)}(hhh](jc)}(hhh]h)}(hN/Ah]hN/A}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM?hj+ubah}(h]h ]h"]h$]h&]uh1jbhj+ubjc)}(hhh]h)}(h WARM_DATAh]h WARM_DATA}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM?hj+ubah}(h]h ]h"]h$]h&]uh1jbhj+ubjc)}(hhh]h)}(hWRITE_LIFE_NOT_SETh]hWRITE_LIFE_NOT_SET}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM?hj+ubah}(h]h ]h"]h$]h&]uh1jbhj+ubeh}(h]h ]h"]h$]h&]uh1j]hj(ubj^)}(hhh]jc)}(hhh]h)}(h -- direct ioh]h -- direct io}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMAhj+ubah}(h]h ]h"]h$]h&]morecolsKuh1jbhj+ubah}(h]h ]h"]h$]h&]uh1j]hj(ubj^)}(hhh](jc)}(hhh]h)}(hWRITE_LIFE_EXTREMEh]hWRITE_LIFE_EXTREME}(hj+hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMChj+ubah}(h]h ]h"]h$]h&]uh1jbhj+ubjc)}(hhh]h)}(h COLD_DATAh]h COLD_DATA}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMChj,ubah}(h]h ]h"]h$]h&]uh1jbhj+ubjc)}(hhh]h)}(hWRITE_LIFE_EXTREMEh]hWRITE_LIFE_EXTREME}(hj*,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMChj',ubah}(h]h ]h"]h$]h&]uh1jbhj+ubeh}(h]h ]h"]h$]h&]uh1j]hj(ubj^)}(hhh](jc)}(hhh]h)}(hWRITE_LIFE_SHORTh]hWRITE_LIFE_SHORT}(hjJ,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMDhjG,ubah}(h]h ]h"]h$]h&]uh1jbhjD,ubjc)}(hhh]h)}(hHOT_DATAh]hHOT_DATA}(hja,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMDhj^,ubah}(h]h ]h"]h$]h&]uh1jbhjD,ubjc)}(hhh]h)}(hWRITE_LIFE_SHORTh]hWRITE_LIFE_SHORT}(hjx,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMDhju,ubah}(h]h ]h"]h$]h&]uh1jbhjD,ubeh}(h]h ]h"]h$]h&]uh1j]hj(ubj^)}(hhh](jc)}(hhh]h)}(hWRITE_LIFE_NOT_SETh]hWRITE_LIFE_NOT_SET}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMEhj,ubah}(h]h ]h"]h$]h&]uh1jbhj,ubjc)}(hhh]h)}(h WARM_DATAh]h WARM_DATA}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMEhj,ubah}(h]h ]h"]h$]h&]uh1jbhj,ubjc)}(hhh]h)}(hWRITE_LIFE_NOT_SETh]hWRITE_LIFE_NOT_SET}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMEhj,ubah}(h]h ]h"]h$]h&]uh1jbhj,ubeh}(h]h ]h"]h$]h&]uh1j]hj(ubj^)}(hhh](jc)}(hhh]h)}(hWRITE_LIFE_NONEh]hWRITE_LIFE_NONE}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMFhj,ubah}(h]h ]h"]h$]h&]uh1jbhj,ubjc)}(hhh]h)}(hj*h]h“}(hj,hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMFhj,ubah}(h]h ]h"]h$]h&]uh1jbhj,ubjc)}(hhh]h)}(hWRITE_LIFE_NONEh]hWRITE_LIFE_NONE}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMFhj-ubah}(h]h ]h"]h$]h&]uh1jbhj,ubeh}(h]h ]h"]h$]h&]uh1j]hj(ubj^)}(hhh](jc)}(hhh]h)}(hWRITE_LIFE_MEDIUMh]hWRITE_LIFE_MEDIUM}(hj3-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMGhj0-ubah}(h]h ]h"]h$]h&]uh1jbhj--ubjc)}(hhh]h)}(hj*h]h“}(hjJ-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMGhjG-ubah}(h]h ]h"]h$]h&]uh1jbhj--ubjc)}(hhh]h)}(hWRITE_LIFE_MEDIUMh]hWRITE_LIFE_MEDIUM}(hj`-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMGhj]-ubah}(h]h ]h"]h$]h&]uh1jbhj--ubeh}(h]h ]h"]h$]h&]uh1j]hj(ubj^)}(hhh](jc)}(hhh]h)}(hWRITE_LIFE_LONGh]hWRITE_LIFE_LONG}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMHhj}-ubah}(h]h ]h"]h$]h&]uh1jbhjz-ubjc)}(hhh]h)}(hj*h]h“}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMHhj-ubah}(h]h ]h"]h$]h&]uh1jbhjz-ubjc)}(hhh]h)}(hWRITE_LIFE_LONGh]hWRITE_LIFE_LONG}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMHhj-ubah}(h]h ]h"]h$]h&]uh1jbhjz-ubeh}(h]h ]h"]h$]h&]uh1j]hj(ubeh}(h]h ]h"]h$]h&]uh1jXhj|(ubeh}(h]h ]h"]h$]h&]colsKuh1j=hjy(ubah}(h]h ]h"]h$]h&]uh1j8hjZ(hhhhhNubeh}(h]write-hint-policyah ]h"]write-hint policyah$]h&]uh1hhjw#hhhhhM-ubh)}(hhh](h)}(hFallocate(2) Policyh]hFallocate(2) Policy}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj-hhhhhMLubh)}(h0The default policy follows the below POSIX rule.h]h0The default policy follows the below POSIX rule.}(hj-hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMNhj-hhubj#)}(hhh]j#)}(hX&Allocating disk space The default operation (i.e., mode is zero) of fallocate() allocates the disk space within the range specified by offset and len. The file size (as reported by stat(2)) will be changed if offset+len is greater than the file size. Any subregion within the range specified by offset and len that did not contain data before the call will be initialized to zero. This default behavior closely resembles the behavior of the posix_fallocate(3) library function, and is intended as a method of optimally implementing that function. h](j#)}(hAllocating disk spaceh]hAllocating disk space}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1j#hhhMXhj.ubj#)}(hhh]h)}(hXThe default operation (i.e., mode is zero) of fallocate() allocates the disk space within the range specified by offset and len. The file size (as reported by stat(2)) will be changed if offset+len is greater than the file size. Any subregion within the range specified by offset and len that did not contain data before the call will be initialized to zero. This default behavior closely resembles the behavior of the posix_fallocate(3) library function, and is intended as a method of optimally implementing that function.h]hXThe default operation (i.e., mode is zero) of fallocate() allocates the disk space within the range specified by offset and len. The file size (as reported by stat(2)) will be changed if offset+len is greater than the file size. Any subregion within the range specified by offset and len that did not contain data before the call will be initialized to zero. This default behavior closely resembles the behavior of the posix_fallocate(3) library function, and is intended as a method of optimally implementing that function.}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMQhj.ubah}(h]h ]h"]h$]h&]uh1j#hj.ubeh}(h]h ]h"]h$]h&]uh1j#hhhMXhj.ubah}(h]h ]h"]h$]h&]uh1j#hj-hhhhhNubh)}(hHowever, once F2FS receives ioctl(fd, F2FS_IOC_SET_PIN_FILE) in prior to fallocate(fd, DEFAULT_MODE), it allocates on-disk block addresses having zero or random data, which is useful to the below scenario where:h]hHowever, once F2FS receives ioctl(fd, F2FS_IOC_SET_PIN_FILE) in prior to fallocate(fd, DEFAULT_MODE), it allocates on-disk block addresses having zero or random data, which is useful to the below scenario where:}(hj9.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMZhj-hhubj)}(h1. create(fd) 2. ioctl(fd, F2FS_IOC_SET_PIN_FILE) 3. fallocate(fd, 0, 0, size) 4. address = fibmap(fd, offset) 5. open(blkdev) 6. write(blkdev, address) h]jc)}(hhh](j)}(h create(fd)h]h)}(hjP.h]h create(fd)}(hjR.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM^hjN.ubah}(h]h ]h"]h$]h&]uh1jhjK.ubj)}(h ioctl(fd, F2FS_IOC_SET_PIN_FILE)h]h)}(hjg.h]h ioctl(fd, F2FS_IOC_SET_PIN_FILE)}(hji.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM_hje.ubah}(h]h ]h"]h$]h&]uh1jhjK.ubj)}(hfallocate(fd, 0, 0, size)h]h)}(hj~.h]hfallocate(fd, 0, 0, size)}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhM`hj|.ubah}(h]h ]h"]h$]h&]uh1jhjK.ubj)}(haddress = fibmap(fd, offset)h]h)}(hj.h]haddress = fibmap(fd, offset)}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMahj.ubah}(h]h ]h"]h$]h&]uh1jhjK.ubj)}(h open(blkdev)h]h)}(hj.h]h open(blkdev)}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMbhj.ubah}(h]h ]h"]h$]h&]uh1jhjK.ubj)}(hwrite(blkdev, address) h]h)}(hwrite(blkdev, address)h]hwrite(blkdev, address)}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMchj.ubah}(h]h ]h"]h$]h&]uh1jhjK.ubeh}(h]h ]h"]h$]h&]jjjhjjuh1jbhjG.ubah}(h]h ]h"]h$]h&]uh1jhhhM^hj-hhubeh}(h]fallocate-2-policyah ]h"]fallocate(2) policyah$]h&]uh1hhjw#hhhhhMLubh)}(hhh](h)}(hCompression implementationh]hCompression implementation}(hj.hhhNhNubah}(h]h ]h"]h$]h&]uh1hhj.hhhhhMfubj)}(hhh](j)}(hNew term named cluster is defined as basic unit of compression, file can be divided into multiple clusters logically. One cluster includes 4 << n (n >= 0) logical pages, compression size is also cluster size, each of cluster can be compressed or not. h]h)}(hNew term named cluster is defined as basic unit of compression, file can be divided into multiple clusters logically. One cluster includes 4 << n (n >= 0) logical pages, compression size is also cluster size, each of cluster can be compressed or not.h]hNew term named cluster is defined as basic unit of compression, file can be divided into multiple clusters logically. One cluster includes 4 << n (n >= 0) logical pages, compression size is also cluster size, each of cluster can be compressed or not.}(hj/hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMhhj/ubah}(h]h ]h"]h$]h&]uh1jhj.hhhhhNubj)}(hXIn cluster metadata layout, one special block address is used to indicate a cluster is a compressed one or normal one; for compressed cluster, following metadata maps cluster to [1, 4 << n - 1] physical blocks, in where f2fs stores data including compress header and compressed data. h]h)}(hXIn cluster metadata layout, one special block address is used to indicate a cluster is a compressed one or normal one; for compressed cluster, following metadata maps cluster to [1, 4 << n - 1] physical blocks, in where f2fs stores data including compress header and compressed data.h]hXIn cluster metadata layout, one special block address is used to indicate a cluster is a compressed one or normal one; for compressed cluster, following metadata maps cluster to [1, 4 << n - 1] physical blocks, in where f2fs stores data including compress header and compressed data.}(hj/hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMmhj/ubah}(h]h ]h"]h$]h&]uh1jhj.hhhhhNubj)}(hXIn order to eliminate write amplification during overwrite, F2FS only support compression on write-once file, data can be compressed only when all logical blocks in cluster contain valid data and compress ratio of cluster data is lower than specified threshold. h]h)}(hXIn order to eliminate write amplification during overwrite, F2FS only support compression on write-once file, data can be compressed only when all logical blocks in cluster contain valid data and compress ratio of cluster data is lower than specified threshold.h]hXIn order to eliminate write amplification during overwrite, F2FS only support compression on write-once file, data can be compressed only when all logical blocks in cluster contain valid data and compress ratio of cluster data is lower than specified threshold.}(hj5/hhhNhNubah}(h]h ]h"]h$]h&]uh1hhhhMrhj1/ubah}(h]h ]h"]h$]h&]uh1jhj.hhhhhNubj)}(hTo enable compression on regular inode, there are four ways: * chattr +c file * chattr +c dir; touch dir/file * mount w/ -o compress_extension=ext; touch file.ext * mount w/ -o compress_extension=*; touch any_file h](h)}(h