lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 13 Apr 2010 15:22:57 -0400
From:	tytso@....edu
To:	Larkin Lowrey <llowrey@...learwinter.com>
Cc:	linux-ext4@...r.kernel.org
Subject: Re: Q wrt LVM snapshot of ext4 w/ external journal

On Tue, Apr 13, 2010 at 01:22:35PM -0500, Larkin Lowrey wrote:
> Is it safe to mount an LVM2 snapshot of an ext4 fs that has an external
> journal?
> 
> My googling has revealed only that the snapshot procedure will cause the
> fs to checkpoint the journal (if that's the right term) but also that
> the fs will want to replay the journal when mounted, even if -o ro. If
> my journal is on an external device (NVRAM device in my case) I don't
> want the snapshot instance to interfere with the main on-line fs's use
> of the journal.

It's safe to mount the LVM2 snapshot only if you use the mount option
noload.  This will prevent it from using the journal, which is good,
since the journal is in use by the original file system.  :-)

> Is there any documentation, other than code, that describes this scenario?

No, it's not documented.  It probably should be.

Hopefully, mounting the snapshot without using noload _should_ fail,
since the journal is already in use, but I'm not sure we have that
check in place, so I don't recommend trying it on a production file
system.

						- Ted
--
To unsubscribe from this list: send the line "unsubscribe linux-ext4" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ