Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2689267imj; Mon, 11 Feb 2019 07:04:10 -0800 (PST) X-Google-Smtp-Source: AHgI3IbSNqo5TRIUiRNHAVy6UlnPuwhi2GVEvnRCws+m2e+SP0d7xH9IIx6FQ3MlGTZNAcOcJmrz X-Received: by 2002:a62:57dd:: with SMTP id i90mr1124878pfj.154.1549897450609; Mon, 11 Feb 2019 07:04:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549897450; cv=none; d=google.com; s=arc-20160816; b=Beg8n8oCex4xoBkzykQMv61Fo4sj2/tHJzxODjQqyWJq8Gfo/xL68IjRcE13Gvy4Fu ZOSurmNTvngSKH8LT6htQuLh1Bp9Lqq+SMQCdyIkvs59kEdYDDAm7WI2mDfN3xv8CDl7 1wsSidsNh9CCCVfHf6PBNtWcY4CWMOF9fQZzh9zmF9MU+YGBcFkTpgJnvSOLwid8MqoW ZCy4REWn3Txr1SxVyLEHM5wYUjeeT254NsfZ0M7cAPoj8ATr2V9wEyjsRKbYUld+3awS TYkdNXuvRe4vfXyQaw0uRidsuxgKYRnpZroeaA7YD5ngxZ5qwqJm99cUCr5Pbnbgz6o4 VLcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=gMaBaBinmsIyrZFqH+HsfQVLHhuGKs0+qwfwVnZvPBY=; b=Yoyulc9E31ey62paL4Ef3DNFs2wNutk+guCngzn7iPzPJceUUYBl81zdqIJhu/Owv3 4+LIe4QcSdQFgJeJrvI7msqacY30jTQGQRp2p0zvbcruJK5THiGBUTlVyxpxOvA5iOpJ 83SrgixUX17azI39oZl8HY7yqdoBOOQon4ErTpK0DMCjrB5a0UfehiFqbf1GjWvBG64l BMm5VpaoqFRZnQqWXuYtQDUHsAokjzlQb6P7KZsFz+RZUqKjGCfVD2mIt47Be6qpJxuW zUnspboaVZvk5Y9r3TifWANjyOhF5R2mPzmSn4svsHM105LloInBEnXbk6O3TRtSRQgd kjmg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kvExjd7D; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g8si10443003pgo.166.2019.02.11.07.03.43; Mon, 11 Feb 2019 07:04:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kvExjd7D; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389729AbfBKPBW (ORCPT + 99 others); Mon, 11 Feb 2019 10:01:22 -0500 Received: from mail.kernel.org ([198.145.29.99]:49380 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390165AbfBKPBV (ORCPT ); Mon, 11 Feb 2019 10:01:21 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5F417222A4; Mon, 11 Feb 2019 15:01:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1549897280; bh=cuz82Qwb0jd/Dh4dP1ZdMKaUS6rPhXaE2U8JHWfRIAs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kvExjd7DUfDSO/c2Mbqvt/RwEJDKfK4sTgTu9XVB2sLC7WMJomdwLSLtTqVQ1N0b5 yZ1JUob/7tO/zjPd3HcrpscHWeHSNIwh6BhkYilDbfiDl96ZADmMcVvwZ+QSvmWCkj NC8K6qJcYU0OmCaq3HkoalxjLsqGFTprlz97rNoU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Junxiao Bi , Changwei Ge , Yiwen Jiang , Joel Becker , Joseph Qi , Jun Piao , Mark Fasheh , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 4.14 148/205] ocfs2: dont clear bh uptodate for block read Date: Mon, 11 Feb 2019 15:19:06 +0100 Message-Id: <20190211141838.028436889@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190211141827.214852402@linuxfoundation.org> References: <20190211141827.214852402@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 70306d9dce75abde855cefaf32b3f71eed8602a3 ] For sync io read in ocfs2_read_blocks_sync(), first clear bh uptodate flag and submit the io, second wait io done, last check whether bh uptodate, if not return io error. If two sync io for the same bh were issued, it could be the first io done and set uptodate flag, but just before check that flag, the second io came in and cleared uptodate, then ocfs2_read_blocks_sync() for the first io will return IO error. Indeed it's not necessary to clear uptodate flag, as the io end handler end_buffer_read_sync() will set or clear it based on io succeed or failed. The following message was found from a nfs server but the underlying storage returned no error. [4106438.567376] (nfsd,7146,3):ocfs2_get_suballoc_slot_bit:2780 ERROR: read block 1238823695 failed -5 [4106438.567569] (nfsd,7146,3):ocfs2_get_suballoc_slot_bit:2812 ERROR: status = -5 [4106438.567611] (nfsd,7146,3):ocfs2_test_inode_bit:2894 ERROR: get alloc slot and bit failed -5 [4106438.567643] (nfsd,7146,3):ocfs2_test_inode_bit:2932 ERROR: status = -5 [4106438.567675] (nfsd,7146,3):ocfs2_get_dentry:94 ERROR: test inode bit failed -5 Same issue in non sync read ocfs2_read_blocks(), fixed it as well. Link: http://lkml.kernel.org/r/20181121020023.3034-4-junxiao.bi@oracle.com Signed-off-by: Junxiao Bi Reviewed-by: Changwei Ge Reviewed-by: Yiwen Jiang Cc: Joel Becker Cc: Joseph Qi Cc: Jun Piao Cc: Mark Fasheh Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- fs/ocfs2/buffer_head_io.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/fs/ocfs2/buffer_head_io.c b/fs/ocfs2/buffer_head_io.c index 1d098c3c00e0..9f8250df99f1 100644 --- a/fs/ocfs2/buffer_head_io.c +++ b/fs/ocfs2/buffer_head_io.c @@ -152,7 +152,6 @@ int ocfs2_read_blocks_sync(struct ocfs2_super *osb, u64 block, #endif } - clear_buffer_uptodate(bh); get_bh(bh); /* for end_buffer_read_sync() */ bh->b_end_io = end_buffer_read_sync; submit_bh(REQ_OP_READ, 0, bh); @@ -306,7 +305,6 @@ int ocfs2_read_blocks(struct ocfs2_caching_info *ci, u64 block, int nr, continue; } - clear_buffer_uptodate(bh); get_bh(bh); /* for end_buffer_read_sync() */ if (validate) set_buffer_needs_validate(bh); -- 2.19.1