Received: by 2002:ac8:4f8f:0:b0:429:955e:b7c6 with SMTP id j15csp1240qtw; Tue, 16 Jan 2024 12:53:49 -0800 (PST) X-Google-Smtp-Source: AGHT+IEGEe3YlXxmtLfBogfNRl6dbE4T4NQdQDPUleGrGu4cmGBtiqOX+Ql9GxTxbT7LHVtFXzyo X-Received: by 2002:a17:902:c405:b0:1d5:b87e:eaec with SMTP id k5-20020a170902c40500b001d5b87eeaecmr7375865plk.97.1705438429331; Tue, 16 Jan 2024 12:53:49 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1705438429; cv=pass; d=google.com; s=arc-20160816; b=zLzjlRbH7ZznmaZbwB+B9YLo8dfFg3xacgk7KpnuOJ66LUtWOTHAEa7q+4wjITM6vF 1LwRmQWEXzRvIvXXQzHd2p4WCHDz912T0r2eH9cylt/0YKbf4Rq8cmJqh8+oNEJrcd5j J9Ze5IUD+aHAXPN3tKgWDTjgDTwkw+Q6PAG0Ca3OvcxAxeLaIViLn1bM7Z93H/Lqy0ck 1VOCnuXAQ/BDYhdxZTISF5JLUnDah1CyU/v09B8FcUo+/YajxIybcEYw98Vp8wHDNZra ZYnh6MVbJv7s6EUHvVyaErjd1H1KERKrO3aX2bXjLJNJMFe+4NyfEiEIYQzkNDXk+Flp TvvA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=M3vlR7GFrMyK96OZi53uI/PucZ5iiqYLYhnpkndg+6A=; fh=9EoZ/7r9SqpL9V+T5hzCl0jtaj45F7ylPQ3ZnSTtitk=; b=RUiWjcVLOQfFWkeHnRR2c/+jLWpOfCBgOVaiGGbgH1JKxJpMHoUrDxqJrUTE5/5xLE pji8L0CyQTS8AFbE57LklrMFCxmngX5PydswubTGZaTMnazYk1Ykt3uvxUXqu2mmsnhJ dC9rcgRu06vprM5ejCn1Bo5E8+I7LQw8k79CmvkjjieObJtXsXWpkf+BpusYuuFaqynd o1RZ2psAWkY9l1TOoE15fjx3YSrbj86Z9qtq3YgNgsJdNlnfGbdMqamS6A2VMzxGy7SE sO+PaHLhAwBaoQP2SoDwvYbxyXbuJ63kiKsuA9GM6pFct2bsbz/ZEkKyl47mbNiTDSBy k6sg== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=unUMoSN0; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-27992-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-27992-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id z3-20020a170902ee0300b001d51f3c3181si11658948plb.40.2024.01.16.12.53.49 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 Jan 2024 12:53:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-27992-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=unUMoSN0; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-27992-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-27992-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 3D55C289A36 for ; Tue, 16 Jan 2024 20:52:48 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id C0186139183; Tue, 16 Jan 2024 19:53:13 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="unUMoSN0" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id ABC32139164; Tue, 16 Jan 2024 19:53:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705434792; cv=none; b=r4WjB+Ipp3ASKWjjmPqSv4c70Y4i0GDmai92Cmm/pNCd5YSSJiI6f4gUmSdphZN377jCHTvMDfhgG5NTri4RtnBauz8nICrgDY31S0ptU8lxNfjfI4bFIquzY7dyOBlFAFyEDrW6R0f+t4Y6BrQPyA1PJML1mo0uztgF7j3h6UE= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705434792; c=relaxed/simple; bh=7mBFf0SS4RTNJKlUTWaTdQo4thG88fiBhzHYmpBJ4oo=; h=Received:DKIM-Signature:From:To:Cc:Subject:Date:Message-ID: X-Mailer:In-Reply-To:References:MIME-Version:X-stable: X-Patchwork-Hint:X-stable-base:Content-Transfer-Encoding; b=DqsD+2jWqYCmfyVe7L2e4RRxQdewSS3zN6ivwRX4oOQmHHtxNRo1vejM4qstqTLzb9PF4R9PPLDcOPyAffRiOKa9udsGIDIl7419MRisK5F4WJ5UdiNXnlKvzDWvYvZrN/0CzUCwCHGbV3SrdYLY10l9somdXbbfBgwWjr9DWcs= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=unUMoSN0; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id BF171C433F1; Tue, 16 Jan 2024 19:53:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1705434792; bh=7mBFf0SS4RTNJKlUTWaTdQo4thG88fiBhzHYmpBJ4oo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=unUMoSN0wpLxH8v9+RuCxuCXbNaVrTk22gPg+TzAbZc20QmYzCMmAlgmjfT+0MRNk xfLdDagzhi6GXUzQy2Vb/BlYO5Rm0Q+mShtbBuqDCccAZatHVac6F9mUIpk/9aeNHx cz4F2Ikd9mtQRVGLTuGh4Bl/fkeokR28u6YHAi2eA69jEpw3CchCzsRi6SMLGK+I19 huOIAxfqynJoJiA9Yj987mP0yzcK7+5jyWopI05TKVgbHxQFYBtVXmz3sgELDj7Pi5 3V0scvdcDwHmh8YLxSyEV9w1yNYhPmPEU1xVrszcFMNwINWSClvzdJqR7R5H1b+Mmh 8PcZIdM/OD1vg== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Alex Lyakas , Song Liu , Sasha Levin , linux-raid@vger.kernel.org Subject: [PATCH AUTOSEL 6.6 080/104] md: Whenassemble the array, consult the superblock of the freshest device Date: Tue, 16 Jan 2024 14:46:46 -0500 Message-ID: <20240116194908.253437-80-sashal@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240116194908.253437-1-sashal@kernel.org> References: <20240116194908.253437-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore X-stable-base: Linux 6.6.12 Content-Transfer-Encoding: 8bit From: Alex Lyakas [ Upstream commit dc1cc22ed58f11d58d8553c5ec5f11cbfc3e3039 ] Upon assembling the array, both kernel and mdadm allow the devices to have event counter difference of 1, and still consider them as up-to-date. However, a device whose event count is behind by 1, may in fact not be up-to-date, and array resync with such a device may cause data corruption. To avoid this, consult the superblock of the freshest device about the status of a device, whose event counter is behind by 1. Signed-off-by: Alex Lyakas Signed-off-by: Song Liu Link: https://lore.kernel.org/r/1702470271-16073-1-git-send-email-alex.lyakas@zadara.com Signed-off-by: Sasha Levin --- drivers/md/md.c | 54 ++++++++++++++++++++++++++++++++++++++++--------- 1 file changed, 44 insertions(+), 10 deletions(-) diff --git a/drivers/md/md.c b/drivers/md/md.c index b2ef6af8376a..0f52e6505a7b 100644 --- a/drivers/md/md.c +++ b/drivers/md/md.c @@ -1112,6 +1112,7 @@ struct super_type { struct md_rdev *refdev, int minor_version); int (*validate_super)(struct mddev *mddev, + struct md_rdev *freshest, struct md_rdev *rdev); void (*sync_super)(struct mddev *mddev, struct md_rdev *rdev); @@ -1249,8 +1250,9 @@ static int super_90_load(struct md_rdev *rdev, struct md_rdev *refdev, int minor /* * validate_super for 0.90.0 + * note: we are not using "freshest" for 0.9 superblock */ -static int super_90_validate(struct mddev *mddev, struct md_rdev *rdev) +static int super_90_validate(struct mddev *mddev, struct md_rdev *freshest, struct md_rdev *rdev) { mdp_disk_t *desc; mdp_super_t *sb = page_address(rdev->sb_page); @@ -1762,7 +1764,7 @@ static int super_1_load(struct md_rdev *rdev, struct md_rdev *refdev, int minor_ return ret; } -static int super_1_validate(struct mddev *mddev, struct md_rdev *rdev) +static int super_1_validate(struct mddev *mddev, struct md_rdev *freshest, struct md_rdev *rdev) { struct mdp_superblock_1 *sb = page_address(rdev->sb_page); __u64 ev1 = le64_to_cpu(sb->events); @@ -1858,13 +1860,15 @@ static int super_1_validate(struct mddev *mddev, struct md_rdev *rdev) } } else if (mddev->pers == NULL) { /* Insist of good event counter while assembling, except for - * spares (which don't need an event count) */ - ++ev1; + * spares (which don't need an event count). + * Similar to mdadm, we allow event counter difference of 1 + * from the freshest device. + */ if (rdev->desc_nr >= 0 && rdev->desc_nr < le32_to_cpu(sb->max_dev) && (le16_to_cpu(sb->dev_roles[rdev->desc_nr]) < MD_DISK_ROLE_MAX || le16_to_cpu(sb->dev_roles[rdev->desc_nr]) == MD_DISK_ROLE_JOURNAL)) - if (ev1 < mddev->events) + if (ev1 + 1 < mddev->events) return -EINVAL; } else if (mddev->bitmap) { /* If adding to array with a bitmap, then we can accept an @@ -1885,8 +1889,38 @@ static int super_1_validate(struct mddev *mddev, struct md_rdev *rdev) rdev->desc_nr >= le32_to_cpu(sb->max_dev)) { role = MD_DISK_ROLE_SPARE; rdev->desc_nr = -1; - } else + } else if (mddev->pers == NULL && freshest && ev1 < mddev->events) { + /* + * If we are assembling, and our event counter is smaller than the + * highest event counter, we cannot trust our superblock about the role. + * It could happen that our rdev was marked as Faulty, and all other + * superblocks were updated with +1 event counter. + * Then, before the next superblock update, which typically happens when + * remove_and_add_spares() removes the device from the array, there was + * a crash or reboot. + * If we allow current rdev without consulting the freshest superblock, + * we could cause data corruption. + * Note that in this case our event counter is smaller by 1 than the + * highest, otherwise, this rdev would not be allowed into array; + * both kernel and mdadm allow event counter difference of 1. + */ + struct mdp_superblock_1 *freshest_sb = page_address(freshest->sb_page); + u32 freshest_max_dev = le32_to_cpu(freshest_sb->max_dev); + + if (rdev->desc_nr >= freshest_max_dev) { + /* this is unexpected, better not proceed */ + pr_warn("md: %s: rdev[%pg]: desc_nr(%d) >= freshest(%pg)->sb->max_dev(%u)\n", + mdname(mddev), rdev->bdev, rdev->desc_nr, + freshest->bdev, freshest_max_dev); + return -EUCLEAN; + } + + role = le16_to_cpu(freshest_sb->dev_roles[rdev->desc_nr]); + pr_debug("md: %s: rdev[%pg]: role=%d(0x%x) according to freshest %pg\n", + mdname(mddev), rdev->bdev, role, role, freshest->bdev); + } else { role = le16_to_cpu(sb->dev_roles[rdev->desc_nr]); + } switch(role) { case MD_DISK_ROLE_SPARE: /* spare */ break; @@ -2794,7 +2828,7 @@ static int add_bound_rdev(struct md_rdev *rdev) * and should be added immediately. */ super_types[mddev->major_version]. - validate_super(mddev, rdev); + validate_super(mddev, NULL/*freshest*/, rdev); if (add_journal) mddev_suspend(mddev); err = mddev->pers->hot_add_disk(mddev, rdev); @@ -3732,7 +3766,7 @@ static int analyze_sbs(struct mddev *mddev) } super_types[mddev->major_version]. - validate_super(mddev, freshest); + validate_super(mddev, NULL/*freshest*/, freshest); i = 0; rdev_for_each_safe(rdev, tmp, mddev) { @@ -3747,7 +3781,7 @@ static int analyze_sbs(struct mddev *mddev) } if (rdev != freshest) { if (super_types[mddev->major_version]. - validate_super(mddev, rdev)) { + validate_super(mddev, freshest, rdev)) { pr_warn("md: kicking non-fresh %pg from array!\n", rdev->bdev); md_kick_rdev_from_array(rdev); @@ -6799,7 +6833,7 @@ int md_add_new_disk(struct mddev *mddev, struct mdu_disk_info_s *info) rdev->saved_raid_disk = rdev->raid_disk; } else super_types[mddev->major_version]. - validate_super(mddev, rdev); + validate_super(mddev, NULL/*freshest*/, rdev); if ((info->state & (1<raid_disk != info->raid_disk) { /* This was a hot-add request, but events doesn't -- 2.43.0