Received: by 2002:a25:86ce:0:0:0:0:0 with SMTP id y14csp2185233ybm; Thu, 23 May 2019 12:46:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqzUOYdID4qWK8jf/zPuYTkUvjyZk6v0IBcUJMofOiFFmNbNy4QOhSj8VTWIR6TWtuG4NMWw X-Received: by 2002:a63:ed03:: with SMTP id d3mr99492724pgi.7.1558640764382; Thu, 23 May 2019 12:46:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558640764; cv=none; d=google.com; s=arc-20160816; b=m2su/Wlw7u6YpE9r4kSlktlLJhe0xzg0z7mD4DccoTLyA1X0y8Zx4QSJpg+1lEXBki jVPRuWn9xfwl8tHT4oWw29FBWqk77gd4wosNugA0FcVDYBSVf+wUxf175u6z6+2vx8sE 0wSuC3oRICf+zzLLPsh6bP7qromZAnK8vIRZY1rUKUn1Pa1x2VQFwOUc6ix9PavV5+VM Wz+MAeJgc3+4901HrGfG5hQZL1gugHoXjz6VbQYyay0YZrb1kTeGeC1Jx3plMn+ri6Ub ScXOIDChyG9PCLn6ZX9NbUCfcCBy9fJNa7rcd+NbHhT6UBGaFgpKH5I+o2PjTs4dwGNE nang== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=BVi8uvo8lmkrothnUX5ay8LGfS/uZzWlU1YSCJvUmdI=; b=bhKj7EeDFMEKwXgH6pL9hKC85q9MBSWHJbXjbjGWLiofeoPymUf1y2Ua+Uz4QHdGgV E6BQZfhrSkETnC7hd3XwdgxoW2QBgGb7lSeyjpa8dqrCxXcLUdLvToYVHINu2p1kjlre XasmXjtI2vK78xSuj6d0e0k4nN3JEKAJMa0kNMW76U4PzEQoBQMUI6aC13WNbpWjD4Hr xHvm75Okel7yvYmB42GfiLHREVYSKnDNjeYX+PUKujDsQ1Zfk/mpiOf4O4d98nPi9gv6 AsENFRDBeKH+oUBEKXXTLpCLGJ0yO8F8WUX5Q7IxiLCjjg2G/XX2BRiEnJ0xMBgHYQHy SmnA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gP1+K59T; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h15si314454pfn.96.2019.05.23.12.45.49; Thu, 23 May 2019 12:46:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gP1+K59T; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389327AbfEWTRF (ORCPT + 99 others); Thu, 23 May 2019 15:17:05 -0400 Received: from mail.kernel.org ([198.145.29.99]:51986 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387581AbfEWTRC (ORCPT ); Thu, 23 May 2019 15:17:02 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 704C62184E; Thu, 23 May 2019 19:17:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1558639021; bh=CkhJWWovJv915sm3zeYlhRMA9YJ4VBZWiythXchG4HE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gP1+K59Ti4CosxkzQ3uviWrrCk9UQBUIIvI4wpZVfm/vJL98iCSMT1a239Az+xMKL 6nvLYGWXedauZKdlgTiVm1oENQQFjK4cbWtlWwI/Wrsmhc56jefmc6oh09NCCt/GEA gwnyoGZZ9PT/eHAdmFk3kyR6vn62t8RV7AGtBlzU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jeff Layton , "Yan, Zheng" , Ilya Dryomov Subject: [PATCH 4.19 050/114] ceph: flush dirty inodes before proceeding with remount Date: Thu, 23 May 2019 21:05:49 +0200 Message-Id: <20190523181736.234861972@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190523181731.372074275@linuxfoundation.org> References: <20190523181731.372074275@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jeff Layton commit 00abf69dd24f4444d185982379c5cc3bb7b6d1fc upstream. xfstest generic/452 was triggering a "Busy inodes after umount" warning. ceph was allowing the mount to go read-only without first flushing out dirty inodes in the cache. Ensure we sync out the filesystem before allowing a remount to proceed. Cc: stable@vger.kernel.org Link: http://tracker.ceph.com/issues/39571 Signed-off-by: Jeff Layton Reviewed-by: "Yan, Zheng" Signed-off-by: Ilya Dryomov Signed-off-by: Greg Kroah-Hartman --- fs/ceph/super.c | 7 +++++++ 1 file changed, 7 insertions(+) --- a/fs/ceph/super.c +++ b/fs/ceph/super.c @@ -819,6 +819,12 @@ static void ceph_umount_begin(struct sup return; } +static int ceph_remount(struct super_block *sb, int *flags, char *data) +{ + sync_filesystem(sb); + return 0; +} + static const struct super_operations ceph_super_ops = { .alloc_inode = ceph_alloc_inode, .destroy_inode = ceph_destroy_inode, @@ -826,6 +832,7 @@ static const struct super_operations cep .drop_inode = ceph_drop_inode, .sync_fs = ceph_sync_fs, .put_super = ceph_put_super, + .remount_fs = ceph_remount, .show_options = ceph_show_options, .statfs = ceph_statfs, .umount_begin = ceph_umount_begin,