Received: by 10.223.185.116 with SMTP id b49csp2948333wrg; Sun, 18 Feb 2018 10:13:13 -0800 (PST) X-Google-Smtp-Source: AH8x226n3i/+ZYA0RCc8zBRGCvS2/Tl+q7e/YeY3JyMLv1cPIyixqaCAiON5+zOudZWWjZy9mLP8 X-Received: by 10.98.209.93 with SMTP id t29mr12123237pfl.233.1518977593837; Sun, 18 Feb 2018 10:13:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518977593; cv=none; d=google.com; s=arc-20160816; b=iNVrJzdptyRcd0NKWsI7A4JYwK1j9AA7YSWvidBqQrpsbRW/qrvonxZ6ueLRE9CghH YbnIaDYoOCCA1TdUjJAb1hTLzPuQKYklOAHorX/xZLpE1s/hAks6q4AbfSIJdgwi0z1+ A5p33/dv9P6AomDB/yy9gsbAI7HIO0cFded3YY0xkVIu4L4foK+9o4jx4k7JVLwwZqoy WcC5H4LAVisRwh2JiybT6ae/mNl22d+Vy6El5ikRmoXDEflk0tVY4SFbUMt+0CLLEudK 14097UThd3ZNsQjW5bkznFaA5Q8syPGkqQMm5s+dfWI6G98NsCOxzRf2Mf2UPoxEnlVr Vbkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dmarc-filter:arc-authentication-results; bh=2A1orXZK8XotllwgVS9TU0rMltPVEhtSNzFDBzjgNmE=; b=tbsJbLzCbRcoTGkP994PhGgd1Ep6WnQCuZqdqyUwiZxvnhhYfHjWsDUucwW5xR6A/G /Dyc+F/uGy211lkVpRuHpVpF6P2ve3RlUdxStDwOQMQPTC0u0B89i5/Flb0XdBSIyy7b Km/oLmj3PIeJMurjp+O7JF4cBqz+KQemovuUJuAR19QD6oK7CUakjZmMYSTrMonNuhXX HBb6pw7SgGX10Q9Q9tJxUts/b7H3OAK+VOZXR4O1MQH8ahbJFehuumXbwxkvjbe57xxP eJQat6om/Wahm7QIX4n7TfdYnKQ9V+13KsF2COUJo9ZCSU4PxeHGCGTvDrioQya/KuVp w3Kw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id bc1-v6si4255972plb.250.2018.02.18.10.12.59; Sun, 18 Feb 2018 10:13:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751659AbeBRSMY (ORCPT + 99 others); Sun, 18 Feb 2018 13:12:24 -0500 Received: from mail.kernel.org ([198.145.29.99]:57162 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751532AbeBRSMX (ORCPT ); Sun, 18 Feb 2018 13:12:23 -0500 Received: from kernel.org (unknown [24.6.201.58]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7947E2171F; Sun, 18 Feb 2018 18:12:22 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 7947E2171F Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=shli@kernel.org Date: Sun, 18 Feb 2018 10:12:21 -0800 From: Shaohua Li To: Heinz Mauelshagen Cc: dm-devel@redhat.com, linux-kernel@vger.kernel.org, linux-raid@vger.kernel.org Subject: Re: [PATCH] md: fix md_write_start() deadlock w/o metadata devices Message-ID: <20180218181221.a5l5nzgav7s6smor@kernel.org> References: <054eff295e0cd2df2b11a3f9ba3b3d66e89beb47.1517609290.git.heinzm@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <054eff295e0cd2df2b11a3f9ba3b3d66e89beb47.1517609290.git.heinzm@redhat.com> User-Agent: NeoMutt/20170609 (1.8.3) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Feb 02, 2018 at 11:13:19PM +0100, Heinz Mauelshagen wrote: > If no metadata devices are configured on raid1/4/5/6/10 > (e.g. via dm-raid), md_write_start() unconditionally waits > for superblocks to be written thus deadlocking. > > Fix introduces mddev->has_superblocks bool, defines it in md_run() > and checks for it in md_write_start() to conditionally avoid waiting. > > Once on it, check for non-existing superblocks in md_super_write(). > > Link: https://bugzilla.kernel.org/show_bug.cgi?id=198647 > Fixes: cc27b0c78c796 ("md: fix deadlock between mddev_suspend() and md_write_start()") Applied, thanks! > Signed-off-by: Heinz Mauelshagen > --- > drivers/md/md.c | 10 ++++++++++ > drivers/md/md.h | 2 ++ > 2 files changed, 12 insertions(+) > > diff --git a/drivers/md/md.c b/drivers/md/md.c > index 0081ace39a64..8a7e7034962c 100644 > --- a/drivers/md/md.c > +++ b/drivers/md/md.c > @@ -801,6 +801,9 @@ void md_super_write(struct mddev *mddev, struct md_rdev *rdev, > struct bio *bio; > int ff = 0; > > + if (!page) > + return; > + > if (test_bit(Faulty, &rdev->flags)) > return; > > @@ -5452,6 +5455,7 @@ int md_run(struct mddev *mddev) > * the only valid external interface is through the md > * device. > */ > + mddev->has_superblocks = false; > rdev_for_each(rdev, mddev) { > if (test_bit(Faulty, &rdev->flags)) > continue; > @@ -5465,6 +5469,9 @@ int md_run(struct mddev *mddev) > set_disk_ro(mddev->gendisk, 1); > } > > + if (rdev->sb_page) > + mddev->has_superblocks = true; > + > /* perform some consistency tests on the device. > * We don't want the data to overlap the metadata, > * Internal Bitmap issues have been handled elsewhere. > @@ -8049,6 +8056,7 @@ EXPORT_SYMBOL(md_done_sync); > bool md_write_start(struct mddev *mddev, struct bio *bi) > { > int did_change = 0; > + > if (bio_data_dir(bi) != WRITE) > return true; > > @@ -8081,6 +8089,8 @@ bool md_write_start(struct mddev *mddev, struct bio *bi) > rcu_read_unlock(); > if (did_change) > sysfs_notify_dirent_safe(mddev->sysfs_state); > + if (!mddev->has_superblocks) > + return true; > wait_event(mddev->sb_wait, > !test_bit(MD_SB_CHANGE_PENDING, &mddev->sb_flags) || > mddev->suspended); > diff --git a/drivers/md/md.h b/drivers/md/md.h > index 58cd20a5e85e..fbc925cce810 100644 > --- a/drivers/md/md.h > +++ b/drivers/md/md.h > @@ -468,6 +468,8 @@ struct mddev { > void (*sync_super)(struct mddev *mddev, struct md_rdev *rdev); > struct md_cluster_info *cluster_info; > unsigned int good_device_nr; /* good device num within cluster raid */ > + > + bool has_superblocks:1; > }; > > enum recovery_flags { > -- > 2.14.3 >