Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2732897imj; Mon, 11 Feb 2019 07:40:49 -0800 (PST) X-Google-Smtp-Source: AHgI3IbtT/+/5PrHgGpQTaDsAb+GXs1/2u2qQAEoEfu4Ja8wtcu1ywUDjarjasvYIp0ghh3Q8JHn X-Received: by 2002:a65:4383:: with SMTP id m3mr32164453pgp.96.1549899649880; Mon, 11 Feb 2019 07:40:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549899649; cv=none; d=google.com; s=arc-20160816; b=h7pcRtSLiJSO2HpcL4JV2z+tUcFOz6brEu4VzILs5wO35UgEnOjNxywKYRVhZcr/cM 0xuRlB55hYdHhY0WFSsN3AK8c6TnAPnXZpPXFGi9yqQ4JzUAhcLfAeaSus2Q5zAgSEOD 7SiK+o587Jxw+eb2QZsoh144DdW0gSqIKbq20dLcIEUhmiTiUoQWk1dpDlxyR9MYAvVV egMr0c7seqVjhJ66jv55s+vXQ6voN1Uts+4MSkdIxWJpMoskQcTuoAPl7vuoL4Ggr8ai vKXm4PHG+MhTvv9/mMX0nm3cDpIB3Gj6NUrXrnKNHH7XmFjNbxkXvKRdckpTcMJp5IEH V5/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=48PECmGJ5+BTzkaVI4vJAyH/Dv7IOr1uGvalRmRLQfA=; b=eHFK9ROw1uOA+TQMoy8NHmQECuCShykjC5GNZS23bW+xhFv5CTjLI3nkwziyx776xu PtbHDvjwpmkOJ33rQd4/oFIn09z7pvngbLDMB45dPPoX8jr+Hf3DjqtzcoColotI8/23 seNAED3ZSsjZWiY0/oiKud2XcQiaGw2tYRBjvcIlw+Ly+6jqFpiigTNq12DKlFjenVrZ pFz9FEwOcsNDUG9K2cd/zVeM4MPasWMWy5xqD2zIdNejKW8ile9bp+ud0bebp9GERQLR 2zkLx9h0tuFekTpEYkm5oXPfVWFFNXQJ9CDe7CSNDT/0w8+LIwZmIW9E71/FHxiiGocu VVrA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1DYCvC6D; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u20si3112006pgh.147.2019.02.11.07.40.34; Mon, 11 Feb 2019 07:40:49 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1DYCvC6D; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387715AbfBKPjp (ORCPT + 99 others); Mon, 11 Feb 2019 10:39:45 -0500 Received: from mail.kernel.org ([198.145.29.99]:34698 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387820AbfBKOtK (ORCPT ); Mon, 11 Feb 2019 09:49:10 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AE9A320855; Mon, 11 Feb 2019 14:49:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1549896550; bh=U9OOULiVYMifsBkIQgWzX857dD4hduMX3VskumbYgdM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=1DYCvC6Du1jWrLeMI2CpeOV/40ZyIb37mwiPBth0wPos6E69kwKkzz2w+fuCOCfe+ LC6FL6dXEoM3hF3EEZb6gclfUHBNFyJtLI+e3JS/NjqNzdL7rMzlnVVJujvmaL374e 0IXo1EYiJadTM/fvF5UzedbjXPkC0MiuidWZ6ovk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Lars Ellenberg , Jens Axboe , Sasha Levin Subject: [PATCH 4.19 191/313] drbd: disconnect, if the wrong UUIDs are attached on a connected peer Date: Mon, 11 Feb 2019 15:17:51 +0100 Message-Id: <20190211141906.022545214@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190211141852.749630980@linuxfoundation.org> References: <20190211141852.749630980@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit b17b59602b6dcf8f97a7dc7bc489a48388d7063a ] With "on-no-data-accessible suspend-io", DRBD requires the next attach or connect to be to the very same data generation uuid tag it lost last. If we first lost connection to the peer, then later lost connection to our own disk, we would usually refuse to re-connect to the peer, because it presents the wrong data set. However, if the peer first connects without a disk, and then attached its disk, we accepted that same wrong data set, which would be "unexpected" by any user of that DRBD and cause "undefined results" (read: very likely data corruption). The fix is to forcefully disconnect as soon as we notice that the peer attached to the "wrong" dataset. Signed-off-by: Lars Ellenberg Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin --- drivers/block/drbd/drbd_receiver.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/block/drbd/drbd_receiver.c b/drivers/block/drbd/drbd_receiver.c index 45ac5fe288e4..cb919b964066 100644 --- a/drivers/block/drbd/drbd_receiver.c +++ b/drivers/block/drbd/drbd_receiver.c @@ -4142,7 +4142,7 @@ static int receive_uuids(struct drbd_connection *connection, struct packet_info kfree(device->p_uuid); device->p_uuid = p_uuid; - if (device->state.conn < C_CONNECTED && + if ((device->state.conn < C_CONNECTED || device->state.pdsk == D_DISKLESS) && device->state.disk < D_INCONSISTENT && device->state.role == R_PRIMARY && (device->ed_uuid & ~((u64)1)) != (p_uuid[UI_CURRENT] & ~((u64)1))) { -- 2.19.1