From: Alexey Fisher <bug-track@fisher-privat.net>
To: Eric Sandeen <sandeen@redhat.com>
Cc: Greg Freemyer <greg.freemyer@gmail.com>,
Ted Augustine <taugustine@techpathways.com>,
linux-ext4@vger.kernel.org
Subject: Re: xt4 - True Readonly mount [WAS - Re: [Bug 14354] Bad corruption with 2.6.32-rc1 and upwards]
Date: Fri, 30 Oct 2009 16:31:21 +0100 [thread overview]
Message-ID: <1256916681.3145.8.camel@mini> (raw)
In-Reply-To: <4AEB02F0.5040309@redhat.com>
Am Freitag, den 30.10.2009, 10:14 -0500 schrieb Eric Sandeen:
> Greg Freemyer wrote:
> > On Fri, Oct 30, 2009 at 4:22 AM, <bugzilla-daemon@bugzilla.kernel.org> wrote:
> >> http://bugzilla.kernel.org/show_bug.cgi?id=14354
> >>
> >> --- Comment #152 from Alexey Fisher <bug-track@fisher-privat.net> 2009-10-30 08:22:10 ---
> >> Ted,
> >> Thank you for explanation :)
> >> Notice: i learning computer forensic, and was trained to mount all evidence
> >> systems with "-o ro" to not contaminate it. It seems like ext4 break this
> >> tradition, so many forensics will surprised why md5sum do not match.
> >
> > Ted, (Alexey there is a response to further down).
> >
> > I have not followed this thread ultra-closely but Alexey's comment got
> > my attention.
> >
> > Ignoring computer forensics, with LVM snapshots, hardware raid array
> > snapshots, etc. even in the presence of a dirty log, we need to be
> > able to mount a drive in true read-only fashion fro many backup
> > operations to function correctly.
> >
> > XFS added an extra mount flag for that 5 or so years ago.
> > I hope ext4 either has or will add a true read-only mount option.
> > Maybe Eric Sandeen remembers the actual drivers for adding that
> > feature to XFS.
> >
>
> After a little brief digging I'm not sure when the xfs mount option went
> in or why...
>
> But for both
>
> xfs: mount -o ro,norecovery
>
> and
>
> ext[34]: mount -o ro,noload
>
> I don't think either one should touch the disk.
>
> Also, both should skip journal replay if you set the block device
> readonly prior to mount (hdparm -r can do this).
Interesting tip, thank you.
But there is some problems:
1. "hdparm -r" will set complete drive to ro mode. This is bad if i
use /dev/sda1 for root and /dev/sda5 need to be forced readonly.
2. the fact xfs and ext[3,4] use different options for true_ro make
things complicated.
3. the definition of ro is broken.
4. many frustrated admins who mounted part of raid1 only with "-o ro"
Regards,
Alexey
next prev parent reply other threads:[~2009-10-30 15:31 UTC|newest]
Thread overview: 15+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-10-30 14:20 xt4 - True Readonly mount [WAS - Re: [Bug 14354] Bad corruption with 2.6.32-rc1 and upwards] Greg Freemyer
2009-10-30 15:14 ` Eric Sandeen
2009-10-30 15:31 ` Alexey Fisher [this message]
2009-10-30 16:14 ` Eric Sandeen
2009-10-30 16:52 ` Alexey Fisher
2009-10-30 17:13 ` Eric Sandeen
2009-10-30 17:43 ` Duane Griffin
2009-10-30 15:47 ` Alexey Fisher
2009-11-01 5:45 ` Theodore Tso
2009-11-02 21:59 ` Greg Freemyer
2009-11-02 22:53 ` Andreas Dilger
2009-11-02 23:02 ` Eric Sandeen
2009-11-04 8:05 ` Andreas Dilger
2009-11-04 16:20 ` Eric Sandeen
2009-11-03 13:52 ` Theodore Tso
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1256916681.3145.8.camel@mini \
--to=bug-track@fisher-privat.net \
--cc=greg.freemyer@gmail.com \
--cc=linux-ext4@vger.kernel.org \
--cc=sandeen@redhat.com \
--cc=taugustine@techpathways.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox