Received: by 2002:a25:86ce:0:0:0:0:0 with SMTP id y14csp2151129ybm; Thu, 23 May 2019 12:12:10 -0700 (PDT) X-Google-Smtp-Source: APXvYqxQMx0HYgsojuSilcPs0TS/80Z4hleangqONALYYDb2qO/yTFcNJqpVkHeGyL7mpPm9fa1N X-Received: by 2002:a62:ac0c:: with SMTP id v12mr24350864pfe.59.1558638729984; Thu, 23 May 2019 12:12:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558638729; cv=none; d=google.com; s=arc-20160816; b=haIiUeZJPQaQgyHopir//mp6NPK+sDquKrfuW5DJT7TXsp0tFlJ+vGPff5dh4ogwU3 APpGO837U27y/v99jfkQi5Fgck7d1bsTVIiRBlC/ZNKNGUs7UVlRAyCkNQAK2zeerQhP S2DG2OckhsABUhXnzgXbwZmLaV/JNNRFzdc6YrMJIic6dHrMIXegwowKK5UWeZ51We+O 07rt31eN9Z9lzewYuRdgLPHCtFovH9mrUGrxNkaB6NyXzOBxsX/xh7AXKNn75gXlMf89 BjZdEYvW1qus+0Btb997d6YoiDbspk4CNuliT1o9TNvK1DUIZwYF820llMaluX0zJphn mjlw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ePSK8knsk7S9pCDKMMVtCjRm4t7zOMR/2IRUMj5FUAA=; b=DRCUbVbZG74DHdlyW12oRphIHj5n1WesFUywoXEGNtQYazEpZ2u+2orAfgLiHb6JYv WdIsijnsPExa73YUIEQmnh7OK+Pcy1c7K5c6Td9s1u9Z3qwjzQjApFfEV+LJSeMdpIzM SCE6v8A/JbD2YJ4N5XyXLVkMyvRt/FfmdirU8C2pMbdS7etM31ytM62b2NRKnQUI2TFf 9Tn0UGIejUpR3mnYtaZNmjN9tAX/cH/nsCyWhwSCnEXdmfpqNtFZFrLYJz+2C/qjcZti TynZbSCXu8RA358EloNS1HBGu1gs8XWJIdtbabXNtXP4BJ3sCNZX2eAUm0Cw/O/8rjwy C9lQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=m9Q+hA4+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d23si502920pgv.513.2019.05.23.12.11.53; Thu, 23 May 2019 12:12:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=m9Q+hA4+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387666AbfEWTKE (ORCPT + 99 others); Thu, 23 May 2019 15:10:04 -0400 Received: from mail.kernel.org ([198.145.29.99]:43346 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387650AbfEWTKD (ORCPT ); Thu, 23 May 2019 15:10:03 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4AA3F217D7; Thu, 23 May 2019 19:10:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1558638602; bh=5J9r7WqGNFJ/CSado9t/MekUwvyPZF1ABsZJ4qFD3k0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=m9Q+hA4+8WomfXkNyotfwFJiVYwExZhQPlQiBSr9SZm6RhlXxHRkrPi8x9VgWoZAC 72JdkohjTjyEA7PQFRJ9CyG8oUejuIBppoO44hZ7qv8nmtR6FN8vp5QgW4F/nNzZu6 EjkWk31u6BDywuzJzHWoy/8F2vwytR22P9FA89Zg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jeff Layton , "Yan, Zheng" , Ilya Dryomov Subject: [PATCH 4.9 23/53] ceph: flush dirty inodes before proceeding with remount Date: Thu, 23 May 2019 21:05:47 +0200 Message-Id: <20190523181714.509534943@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190523181710.981455400@linuxfoundation.org> References: <20190523181710.981455400@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jeff Layton commit 00abf69dd24f4444d185982379c5cc3bb7b6d1fc upstream. xfstest generic/452 was triggering a "Busy inodes after umount" warning. ceph was allowing the mount to go read-only without first flushing out dirty inodes in the cache. Ensure we sync out the filesystem before allowing a remount to proceed. Cc: stable@vger.kernel.org Link: http://tracker.ceph.com/issues/39571 Signed-off-by: Jeff Layton Reviewed-by: "Yan, Zheng" Signed-off-by: Ilya Dryomov Signed-off-by: Greg Kroah-Hartman --- fs/ceph/super.c | 7 +++++++ 1 file changed, 7 insertions(+) --- a/fs/ceph/super.c +++ b/fs/ceph/super.c @@ -742,6 +742,12 @@ static void ceph_umount_begin(struct sup return; } +static int ceph_remount(struct super_block *sb, int *flags, char *data) +{ + sync_filesystem(sb); + return 0; +} + static const struct super_operations ceph_super_ops = { .alloc_inode = ceph_alloc_inode, .destroy_inode = ceph_destroy_inode, @@ -750,6 +756,7 @@ static const struct super_operations cep .evict_inode = ceph_evict_inode, .sync_fs = ceph_sync_fs, .put_super = ceph_put_super, + .remount_fs = ceph_remount, .show_options = ceph_show_options, .statfs = ceph_statfs, .umount_begin = ceph_umount_begin,