Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp89973imm; Thu, 2 Aug 2018 14:34:00 -0700 (PDT) X-Google-Smtp-Source: AAOMgpeCXYAcs8p3/VuwoT1rPzHI3YlTV6XgMeXVW1j95OKYNXyILBC/96Eyg+iZ7CrLUeJU3+5W X-Received: by 2002:a63:f18:: with SMTP id e24-v6mr1069684pgl.320.1533245640354; Thu, 02 Aug 2018 14:34:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1533245640; cv=none; d=google.com; s=arc-20160816; b=Jr86yZWh3Igi0yK7fuqs13L21PHIuMd48vInhVXZeAFbRoaP7wK9fivfPkJgvkW9cf ovqHzzGwrF/6zYm9/eqjnn5aIA6L8TdNCvaHF4b3DMMDeTuWsKamFKyKqV98rAO3bUT4 H7xKlGrqBIeJqvqNXu3Z+7QnSIyqC9vA9TTFPPpXY7buv0jLSkfPU3EJzDXFfqSYgaLI wL+SrUDh6yu1wUgq8NLggmn4rb+Xy0Q5Lj8Bb5gyXaRA+iyZVIN42zGL5yafMm5YiLm8 e+/Stvjki2MUpBJIRNCAmzCm9KWuXtbIYWjfOB+VpnTyUUgNACj0bgicFPSlBJ7U77CJ tAMQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:openpgp:from:references:cc:to:subject :arc-authentication-results; bh=T1VFqoML+wbsJhB5n6HQibDuzdwck5w3uezmskyWIUg=; b=zJ4JD9b/BIR3XfehBgpZ8YnAHdYpLVLHoEQxxvH/klBYqHRGgbYBAD1CPzVBOoLnET kbVEaHVE5TE9BK7jvuefvzpYYUH0UQAh9cpXd0ezcVW31479r85SCT4MufYxOXXum2/c KVaJ9SCpSmwuFpOxccDDaBtwXf1AW5j7dbTIYCd/cct60BRViacbKopFtiYR8cXwKfdr XWzkled3t/Xtuwi4tU7S1inpo20WeaJPs97fNc0krVBWv9TeNGvWLU34mtySInUOSUsQ Z6bEKhI29e7q/DGbks5J7X9HO+ex82WQ0PY6HHe1ubWjjQsoAaULi1F5ydI1+ql3ba/m udJw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u10-v6si2134668plu.506.2018.08.02.14.33.45; Thu, 02 Aug 2018 14:34:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732177AbeHBXZX (ORCPT + 99 others); Thu, 2 Aug 2018 19:25:23 -0400 Received: from forward105j.mail.yandex.net ([5.45.198.248]:50565 "EHLO forward105j.mail.yandex.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731946AbeHBXZW (ORCPT ); Thu, 2 Aug 2018 19:25:22 -0400 Received: from mxback13g.mail.yandex.net (mxback13g.mail.yandex.net [IPv6:2a02:6b8:0:1472:2741:0:8b7:92]) by forward105j.mail.yandex.net (Yandex) with ESMTP id 588D1186079; Fri, 3 Aug 2018 00:32:22 +0300 (MSK) Received: from smtp4p.mail.yandex.net (smtp4p.mail.yandex.net [2a02:6b8:0:1402::15:6]) by mxback13g.mail.yandex.net (nwsmtp/Yandex) with ESMTP id cJsTVhmsOi-WL1SrXlm; Fri, 03 Aug 2018 00:32:22 +0300 Received: by smtp4p.mail.yandex.net (nwsmtp/Yandex) with ESMTPSA id F6RQvjLbN1-WLOaOZJt; Fri, 03 Aug 2018 00:32:21 +0300 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client certificate not present) Subject: Re: LVM snapshot broke between 4.14 and 4.16 To: Linus Torvalds , Ilya Dryomov Cc: Jens Axboe , linux-block , Linux Kernel Mailing List , Sagi Grimberg , Mike Snitzer , dm-devel@redhat.com References: <226835ba-2197-b850-6e5b-8ba14f7fd016@torlan.ru> <93bff248-6897-4867-841b-2dace11597de@torlan.ru> From: WGH Openpgp: preference=signencrypt Message-ID: Date: Fri, 3 Aug 2018 00:32:21 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit Content-Language: en-US Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 08/02/2018 09:32 PM, Linus Torvalds wrote: > WGH (sorry, no idea what your real name is) - what's the source of the > script that broke? Was it some system script you got from outside and > likely to affect others too? > > Or was it just some local thing you wrote yourself and was > unintentionally buggy and nobody else is likely to hit this? > > Because if the latter, if you can work around it and you're the only > user this hits, we might just be able to ignore it. The script in question is written by me and contains literally two lines:     lvcreate --size 5G --snapshot --name snap0 --permission r /dev/mapper/vg0-lvol_rootfs     mount /dev/mapper/vg0-snap0 /mnt/rootfs_snapshot The script is not buggy (I think), it was written under simple assumption that --permission r works. And it does - unless you happen to have combination of kernel >=4.16 and lvm2 <2.02.178. The commit in question appeared only in 4.16, and this kernel version is not widespread yet. You have to be running both recent kernel and not-so-recent lvm2 to be bitten by this. This probably explains why no one else reported this problem. Workaround certainly exists: I can just create read-write snapshot, but mount it read-only. The reason why I didn't discover the workaround earlier is that after unsuccessful read-only snapshot creation system ends up in some weird state where read-write snapshots are also failing with the same error (until reboot). So I got a wrong impression that read-write snapshots were broken as well.