Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp840326imm; Fri, 3 Aug 2018 12:31:43 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcWoyeTl90RHNXb1xOBf/EgItmy4nGEfaXPveBz5FYxAN75iqqkayIPjUwYRijBE5ww/kmy X-Received: by 2002:aa7:850b:: with SMTP id v11-v6mr5881476pfn.165.1533324703562; Fri, 03 Aug 2018 12:31:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1533324703; cv=none; d=google.com; s=arc-20160816; b=MQorSnNHFdORDdrjd4TFRst8QhCsBiO7hUhVP6soWiCgNTveMGcfwS+MX6T4sR5lyx ra6+7iqihW7tH32fjssytsZqqNZmpmygah/edORJxC0sN5hV9KiR2En2xK+CRmLtXTNC m/TVtb3BABIxuaAEShpLoToPIKk6vTVtZzg0ixYX1YgeNHlsXhpiY5KZ2HZ1hoF36HQb O91YVMJJkcyn8ZX7FbvGuyKDv/dVCmfkioF2bm/o/e0XIt0dI5rLACTm3X3iRFEb6yVL qZdSwhZQDNGxzj8GrPbVfpCZyEAp4TWkCjerxKfT5OWzUT4uf3LKIMaFK1h5CR9agINX RoEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=uuSJuUqEAqikMV59KXYcLwcsjD97XUMWKkTpgZkcHsw=; b=VnnpC98buQ8u8fuavOKQpoVSSv+UKdKYcz/ah64rI8ISmMKRufdwNqVbkKfDiB/xCd W7/p3zTEJu1TThxzEQAl6A+cgvHVP0Lv26sAAIuaqkUeJSIGnPn6YzTsLLWdXT2nYTCl Rk7C2NomkrviJSlsRn30lrFqkKhINkJVn/yqnwGQaqK8IBJxTKNgQcrTPYK3YSSaIKRe 4rzmCx40rBNIn9ehF7EeTB8FOEgjqoXtU55Yd5gvIiXYsEoNUtHyujgyTQr4KnGV0LGK jGaW2T7o6zdJI6ZR8plQXmpiMq0qLrigry6pT8eebzuPHI/vmggJEpOdvexSt8/Hkg2R ax6g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l192-v6si5505239pge.81.2018.08.03.12.31.28; Fri, 03 Aug 2018 12:31:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729778AbeHCV2R (ORCPT + 99 others); Fri, 3 Aug 2018 17:28:17 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:38036 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728139AbeHCV2R (ORCPT ); Fri, 3 Aug 2018 17:28:17 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id D89B4BB428; Fri, 3 Aug 2018 19:30:37 +0000 (UTC) Received: from localhost (unknown [10.18.25.149]) by smtp.corp.redhat.com (Postfix) with ESMTPS id B6D402026D65; Fri, 3 Aug 2018 19:30:37 +0000 (UTC) Date: Fri, 3 Aug 2018 15:30:37 -0400 From: Mike Snitzer To: Linus Torvalds Cc: Zdenek Kabelac , wgh@torlan.ru, Ilya Dryomov , Jens Axboe , linux-block , Linux Kernel Mailing List , Sagi Grimberg , dm-devel@redhat.com Subject: Re: LVM snapshot broke between 4.14 and 4.16 Message-ID: <20180803193037.GA4581@redhat.com> References: <1ec0a220-d5b0-1c27-e63b-c4d3f4ce9d77@torlan.ru> <20180803185431.GB3258@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Fri, 03 Aug 2018 19:30:37 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Fri, 03 Aug 2018 19:30:37 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'msnitzer@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Aug 03 2018 at 3:09pm -0400, Linus Torvalds wrote: > On Fri, Aug 3, 2018 at 11:54 AM Mike Snitzer wrote: > > > > > > As I explained to Ted in my previous reply to this thread: using an lvm2 > > that is of the same vintage of the kernel is generally going to provide > > a more robust user experience > > You said that yes. > > And it is completely irrelevant. > > The fact is, if you use an older lvm2, then a newer kernel still needs > to work. Your "more robust experience" argument has nothing > what-so-ever to do with that. > > Will you get new features from newer user land tools? Sure, usually. > And entirely immaterial to a kernel regression. I was merely giving context for the suggestion of keeping lvm2 updated. Not saying it was relevant for this regression. > Will newer user land tools hopefully fix other issues? You'd hope so, > but again - immaterial. > > So why are you bringing up a complete red herring? It's entirely > immaterial to the actual issue at hand. I was trying to give context for the "best to update lvm2 anyway" disclaimer that was used. Yeah, it was specious. And Zdenek exposed way more surface area for you to attack with his reply to this thread. My initial response to this thread was far more understated but was effectively: read-only dm-snapshot is rare, I'm inclined to just let this be. And yeah, that isn't a good excuse to ignore it but: dm-snapshot is a steaming pile as compared to dm thin-provisioning so dm-snapshot users who then go off the beaten path are already masochistic. SO the 2 users who noticed can cope.. But that too is a cop-out. > I would _hope_ that other projects hjave the same "no regressions" > rule that the kernel has, but I know many don't. But whatever other > projects are out there, and whatever other rules _they_ have for their > development is also entirely immaterial to the kernel. > > The kernel has a simple rule: no user regressions. > > Yes, we've had to break that rule very occasionally - when the > semantics are a huge honking security issue and cannot possibly be > hidden any other way, then we obviously have to break them. > > So it has happened. It's happily quite rare. > > But in this case, the issue is that the block layer now enforces the > read-only protection more. And it seems to be the case that the lvm > tools set the read-only flag even when they then depended on being > able to write to them, because we didn't use to. > > So just judging from that description, I do suspect that "we can't > depend on the lvm read-only flag", so a patch like > > "let's not turn DM_READONLY_FLAG into actually set_disk_ro(dm_disk(md), 1)" > > makes sense. > > Obviously, if we can limit that more, that would be lovely. > > But dammit, NOBODY gets to say "oh, you should just update user land tools". I'll have a closer look at all this. Could be DM in general is lacking for read-only permissions when you have complex stacking involved. > Because when they do, I will explode. And I'm 1000% serious that I > will refuse to work with people who continue to say that or continue > to make excuses. > > And user land developers should damn well know about this. The fact > that they are apparently not clued in about kernel rules is what > allowed this bug to go undiscovered and unreported for much too long. > Apparently the lvm2 user land developers *did* notice the breakage, > but instead of reporting it as a kernel bug, they worked around it. Yeap, they did.. I was unaware myself. > So user land developers should actually know that if the kernel stops > working for them, they should *not* work around it. Sure, fix your > program, but let the kernel people know. Agreed. > And kernel people should know that "oh, the user land people already > changed their behavior" is *not* a "I don't need to care about it". > Unless the user land fix was so long ago that nobody cares any more. I never didn't care. I just didn't care much. Because "dm-snapshot". Mike