Stranded with ENODEV after mdadm --readonly
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
Medium
|
Joseph Salisbury | ||
Zesty |
Fix Released
|
Medium
|
Joseph Salisbury |
Bug Description
== SRU Justification ==
The bug reporter was trying to turn on the RAID journal. One of the steps
is to set the device readonly. This did not work as planned, or indeed at
all. After the first --readonly, all requests for the device report
"No such device or address" until a reboot, though /proc/mdstat says the
device is still there.
This bug is fixed by mainline commit 065e519e71b2c1f
which is in mainline as of 4.12-rc1. The commit was also cc'd to stable, but
upstream 4.10 is EOL, so that is the reason for the SRU request.
== Fix ==
commit 065e519e71b2c1f
Author: NeilBrown <email address hidden>
Date: Thu Apr 6 11:16:33 2017 +0800
md: MD_CLOSING needs to be cleared after called md_set_readonly or do_md_stop
== Regression Potential ==
This commit was also cc'd to stable and accepted, so additional upstream review
was performed.
== Test Case ==
A test kernel was built with this patch and tested by the original bug reporter.
The bug reporter states the test kernel resolved the bug.
Please backport upstream fix.
https:/
---
ApportVersion: 2.20.1-0ubuntu2.10
Architecture: amd64
AudioDevicesInUse:
USER PID ACCESS COMMAND
/dev/snd/pcmC0D0c: trent 10668 F...m pulseaudio
/dev/snd/pcmC0D0p: trent 10668 F...m pulseaudio
/dev/snd/
DistroRelease: Ubuntu 16.04
HibernationDevice: RESUME=
InstallationDate: Installed on 2014-12-23 (944 days ago)
InstallationMedia: Ubuntu-Server 14.04.1 LTS "Trusty Tahr" - Release amd64 (20140722.3)
IwConfig:
p11p1 no wireless extensions.
lo no wireless extensions.
Lsusb:
Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 001 Device 003: ID 046d:c52b Logitech, Inc. Unifying Receiver
Bus 001 Device 002: ID 1307:0163 Transcend Information, Inc. 256MB/512MB/1GB Flash Drive
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
MachineType: System manufacturer System Product Name
Package: linux (not installed)
ProcEnviron:
TERM=xterm-
PATH=(custom, no user)
XDG_RUNTIME_
LANG=en_US.UTF-8
SHELL=/bin/bash
ProcFB: 0 inteldrmfb
ProcKernelCmdLine: BOOT_IMAGE=
ProcVersionSign
RelatedPackageV
linux-
linux-
linux-firmware 1.157.11
RfKill:
Tags: xenial xenial
Uname: Linux 4.10.0-26-generic x86_64
UnreportableReason: The report belongs to a package that is not installed.
UpgradeStatus: Upgraded to xenial on 2017-07-01 (24 days ago)
UserGroups: adm audio cdrom dip glftpd lpadmin plugdev sambashare sudo
_MarkForUpload: False
dmi.bios.date: 06/16/2017
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: 0808
dmi.board.
dmi.board.name: PRIME B250M-A
dmi.board.vendor: ASUSTeK COMPUTER INC.
dmi.board.version: Rev X.0x
dmi.chassis.
dmi.chassis.type: 3
dmi.chassis.vendor: Default string
dmi.chassis.
dmi.modalias: dmi:bvnAmerican
dmi.product.name: System Product Name
dmi.product.
dmi.sys.vendor: System manufacturer
CVE References
Changed in linux (Ubuntu): | |
importance: | Undecided → Medium |
Changed in linux (Ubuntu): | |
assignee: | nobody → Joseph Salisbury (jsalisbury) |
status: | Confirmed → In Progress |
Changed in linux (Ubuntu Zesty): | |
assignee: | nobody → Joseph Salisbury (jsalisbury) |
importance: | Undecided → Medium |
status: | New → In Progress |
description: | updated |
description: | updated |
Changed in linux (Ubuntu Zesty): | |
status: | In Progress → Fix Committed |
Changed in linux (Ubuntu): | |
status: | In Progress → Fix Released |
This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window:
apport-collect 1706243
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.
This change has been made by an automated script, maintained by the Ubuntu Kernel Team.