Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp8148ybp; Thu, 3 Oct 2019 09:26:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqziBLi7pF6Or7kwb5GNhTy230E701rWUxu1b61iKE1ZZclxq4SH0V8SZVKT1MhUvc7QaPu5 X-Received: by 2002:a17:906:5847:: with SMTP id h7mr8526272ejs.218.1570119964610; Thu, 03 Oct 2019 09:26:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570119964; cv=none; d=google.com; s=arc-20160816; b=L6WHS+bIRuB01RFK/aHpUdKf4PeBAHu8KiRzLwvu8hvTBUcotwrZ6QijU9fUtayOpY TP9Vl9Boi/3hFlmmfYNPIufdIeRA+tG3phhb56O33nGGBl5OmlYTh/DGMAjC+wtA+fc1 gZAMCpIh0WRGBR2w/uk7QcwVf3LqCBa8+xIhavZFs4TA3AH801nSMwWQm0coQhSUuP+u oDVqVvD5dwxmdz/EUXEkYVatWDibGfNwX5mcETarXyfOTqtapJysvXxOHglYXQHQMm28 O7WHgWDOGEh6MRlyBnDn7ij24ffHeZfB3M1biIQfOFQvU4P0nineut1o7QxfTR8Rb3Bv QftA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=byymt9NXkB3CBjLMeq3RuQsJ/5Hra2NmctaKQWQ+xys=; b=QReVagXvM5CmIQ2iZxwH5bk9yOcpdFftw7sQkuDzK+baJjBMxbKJhK4zOcRraHB9pG 7CbDg302SrojHKNeuVmFTIDTr8J1FlogjY3L1mMMT3w0cIgtsrWbQjeypMH1tHG/N491 jDjG4l3DYD8BThn4ODykejtEyisceUV8IEwCksWcv8y4xjRwMa9xeilj0Vt63UPoqkwJ kYT4+sCYzdGC+RwILymQ3c3OBkTEaNtyMxS3AxU5UyVBUWN41pAbic6hBZR70d1VLucV YmHEikR6//RuSlap2HX6Ik5BatOrniUC1N5L8xLnHpOzxcBvzPwIoQGN/cftdZYwnBdC ksHQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Lb5OeEVG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i11si1533967eja.317.2019.10.03.09.25.39; Thu, 03 Oct 2019 09:26:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Lb5OeEVG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390686AbfJCQYG (ORCPT + 99 others); Thu, 3 Oct 2019 12:24:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:53496 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390676AbfJCQYC (ORCPT ); Thu, 3 Oct 2019 12:24:02 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D95A32054F; Thu, 3 Oct 2019 16:24:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570119842; bh=lELE6Vaxr+TvQ92RUsLjVgiZt9kg/dHVU7y/pulWhUw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Lb5OeEVGA3UN9lJ8pnf25MLp/mfb1guqjfnTS7kjrmq6Ud7IiEwhVkgXS5PR1TK9h J1sjtWQht69jbxyyqlAfNWKjnCahGvIhgafImc/V2WUKTxv0x4S9eSQSoh3bCc5Fu8 FhbmF2np4yRGcpcrHSyWmesJqhxxSFK2ny91PqnU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, NeilBrown , Song Liu Subject: [PATCH 4.19 197/211] md: dont report active array_state until after revalidate_disk() completes. Date: Thu, 3 Oct 2019 17:54:23 +0200 Message-Id: <20191003154529.329375988@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191003154447.010950442@linuxfoundation.org> References: <20191003154447.010950442@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: NeilBrown commit 9d4b45d6af442237560d0bb5502a012baa5234b7 upstream. Until revalidate_disk() has completed, the size of a new md array will appear to be zero. So we shouldn't report, through array_state, that the array is active until that time. udev rules check array_state to see if the array is ready. As soon as it appear to be zero, fsck can be run. If it find the size to be zero, it will fail. So add a new flag to provide an interlock between do_md_run() and array_state_show(). This flag is set while do_md_run() is active and it prevents array_state_show() from reporting that the array is active. Before do_md_run() is called, ->pers will be NULL so array is definitely not active. After do_md_run() is called, revalidate_disk() will have run and the array will be completely ready. We also move various sysfs_notify*() calls out of md_run() into do_md_run() after MD_NOT_READY is cleared. This ensure the information is ready before the notification is sent. Prior to v4.12, array_state_show() was called with the mddev->reconfig_mutex held, which provided exclusion with do_md_run(). Note that MD_NOT_READY cleared twice. This is deliberate to cover both success and error paths with minimal noise. Fixes: b7b17c9b67e5 ("md: remove mddev_lock() from md_attr_show()") Cc: stable@vger.kernel.org (v4.12++) Signed-off-by: NeilBrown Signed-off-by: Song Liu Signed-off-by: Greg Kroah-Hartman --- drivers/md/md.c | 11 +++++++---- drivers/md/md.h | 3 +++ 2 files changed, 10 insertions(+), 4 deletions(-) --- a/drivers/md/md.c +++ b/drivers/md/md.c @@ -4123,7 +4123,7 @@ array_state_show(struct mddev *mddev, ch { enum array_state st = inactive; - if (mddev->pers) + if (mddev->pers && !test_bit(MD_NOT_READY, &mddev->flags)) switch(mddev->ro) { case 1: st = readonly; @@ -5678,9 +5678,6 @@ int md_run(struct mddev *mddev) md_update_sb(mddev, 0); md_new_event(mddev); - sysfs_notify_dirent_safe(mddev->sysfs_state); - sysfs_notify_dirent_safe(mddev->sysfs_action); - sysfs_notify(&mddev->kobj, NULL, "degraded"); return 0; abort: @@ -5694,6 +5691,7 @@ static int do_md_run(struct mddev *mddev { int err; + set_bit(MD_NOT_READY, &mddev->flags); err = md_run(mddev); if (err) goto out; @@ -5714,9 +5712,14 @@ static int do_md_run(struct mddev *mddev set_capacity(mddev->gendisk, mddev->array_sectors); revalidate_disk(mddev->gendisk); + clear_bit(MD_NOT_READY, &mddev->flags); mddev->changed = 1; kobject_uevent(&disk_to_dev(mddev->gendisk)->kobj, KOBJ_CHANGE); + sysfs_notify_dirent_safe(mddev->sysfs_state); + sysfs_notify_dirent_safe(mddev->sysfs_action); + sysfs_notify(&mddev->kobj, NULL, "degraded"); out: + clear_bit(MD_NOT_READY, &mddev->flags); return err; } --- a/drivers/md/md.h +++ b/drivers/md/md.h @@ -243,6 +243,9 @@ enum mddev_flags { MD_UPDATING_SB, /* md_check_recovery is updating the metadata * without explicitly holding reconfig_mutex. */ + MD_NOT_READY, /* do_md_run() is active, so 'array_state' + * must not report that array is ready yet + */ }; enum mddev_sb_flags {