Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp8124777imu; Tue, 4 Dec 2018 03:25:56 -0800 (PST) X-Google-Smtp-Source: AFSGD/VSOCSRms45gBNs65ivMeD9t4YDYi+z6lr4XlZl5o7P7+VwYhF5lchLvRRKS/ZF3HAfOmYN X-Received: by 2002:a65:6215:: with SMTP id d21mr16404445pgv.289.1543922756926; Tue, 04 Dec 2018 03:25:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543922756; cv=none; d=google.com; s=arc-20160816; b=q7y1DjMbhP8Q2/puaqwBX43qJpitJii/TIb+ARZCZBQGJYXM8HFYfSafHGZuVpmSwX zMB4eUJMtMjqYy3YXOgF3udmlro+P6Cq8Z3lq6dbs1Q2phEmbyyvG/AkYNUbqgR8UgAC sDiBxMaLD1J+UrXxE0DjubeQ3vq8o4Or6DKUMjS/ZDhtDnPT+m+kmSEUmwv1MnLWDFaw jM18PWEkaaf0mE995RcrnDOcx75aYmNqY+aVpS00U5e85QwdXc8Zy6pmoXM62IF0TVy5 wjD2D6PHQSzygROgK8DRMJGKpjbXdqGBbKPqSxDy0fUxlYMgzzGKQlXGlKn3c8crd8dg LLTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=PO2/liCNS2tyUnHViGfocvQ282ajjoUWn2g3xgjjFoI=; b=JId5AL6vB7oSC59EnUyFDaED+bn2knxmmmNtFxYHrhgLQI9JFc9a6vS2PvOjo8tHrl 1/njarq4xRO+rudlVCqNm8h5mHDgOiiQ/qgpsZB3DDmSD0iff4DexeEytQ5xEeiNjWwX Oe9CO/164452gGyRI39diMEA2GIGjYsi0CdzOLKSjkhuY3sbjaRH44cdesJjuR/0HPpp dLHql1QjdUcDbffm2Xg0U2568UApg1K1BV+ORQbh6jF7ZiLVZH5nyEL1DoxB1ppzyWJz t64B/exnfZ8fjMLDVmwOVSJbEPs5xAe3XEs2om8tQSy3JuK5jSG7uNoKxdG0eOd45Cfj GR0A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mW591jeX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g17si13636643pgi.578.2018.12.04.03.25.41; Tue, 04 Dec 2018 03:25:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mW591jeX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727380AbeLDLAv (ORCPT + 99 others); Tue, 4 Dec 2018 06:00:51 -0500 Received: from mail.kernel.org ([198.145.29.99]:46034 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726901AbeLDLAo (ORCPT ); Tue, 4 Dec 2018 06:00:44 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5BD6B2087F; Tue, 4 Dec 2018 11:00:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543921243; bh=YzD9QSP4BREwBC0Y5hdYlgDkWlNy+KzwW5fkm1LSo9I=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mW591jeXYkATROs0hmrLrz6aer+udjsiLaL6JBKJSg67zI8m5pZfxAFx/KnvCu4W6 StW+Bv7WEH5YNBBhn5uRCpaw9mweG/qt47uX637JTfO3nY2BvTtxHHs1mZXfCxFjXu rbAtCP8hV4lMqKRWqjxFIwRMNEdZXUwPoygKg7wc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Pavel Tikhomirov , Vasily Averin , Andrey Ryabinin , Jan Kara , Johannes Weiner , Mel Gorman , Matthew Wilcox , Andi Kleen , Andrew Morton , Linus Torvalds Subject: [PATCH 4.19 136/139] mm: cleancache: fix corruption on missed inode invalidation Date: Tue, 4 Dec 2018 11:50:17 +0100 Message-Id: <20181204103656.442578056@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181204103649.950154335@linuxfoundation.org> References: <20181204103649.950154335@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Pavel Tikhomirov commit 6ff38bd40230af35e446239396e5fc8ebd6a5248 upstream. If all pages are deleted from the mapping by memory reclaim and also moved to the cleancache: __delete_from_page_cache (no shadow case) unaccount_page_cache_page cleancache_put_page page_cache_delete mapping->nrpages -= nr (nrpages becomes 0) We don't clean the cleancache for an inode after final file truncation (removal). truncate_inode_pages_final check (nrpages || nrexceptional) is false no truncate_inode_pages no cleancache_invalidate_inode(mapping) These way when reading the new file created with same inode we may get these trash leftover pages from cleancache and see wrong data instead of the contents of the new file. Fix it by always doing truncate_inode_pages which is already ready for nrpages == 0 && nrexceptional == 0 case and just invalidates inode. [akpm@linux-foundation.org: add comment, per Jan] Link: http://lkml.kernel.org/r/20181112095734.17979-1-ptikhomirov@virtuozzo.com Fixes: commit 91b0abe36a7b ("mm + fs: store shadow entries in page cache") Signed-off-by: Pavel Tikhomirov Reviewed-by: Vasily Averin Reviewed-by: Andrey Ryabinin Reviewed-by: Jan Kara Cc: Johannes Weiner Cc: Mel Gorman Cc: Matthew Wilcox Cc: Andi Kleen Cc: Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- mm/truncate.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) --- a/mm/truncate.c +++ b/mm/truncate.c @@ -520,9 +520,13 @@ void truncate_inode_pages_final(struct a */ xa_lock_irq(&mapping->i_pages); xa_unlock_irq(&mapping->i_pages); - - truncate_inode_pages(mapping, 0); } + + /* + * Cleancache needs notification even if there are no pages or shadow + * entries. + */ + truncate_inode_pages(mapping, 0); } EXPORT_SYMBOL(truncate_inode_pages_final);