Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2731119imj; Mon, 11 Feb 2019 07:39:07 -0800 (PST) X-Google-Smtp-Source: AHgI3IZBVLV0H01FByC07BhIs9G7bXtW/IRE/CQyFriXKZwS4ffxct2I22d1OtCWRoUQwYgc1DQ2 X-Received: by 2002:a63:29c3:: with SMTP id p186mr1143542pgp.24.1549899547683; Mon, 11 Feb 2019 07:39:07 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549899547; cv=none; d=google.com; s=arc-20160816; b=bYgMADnRgcMg9kcHy216yVykqkmlp2+4zPdX1fp7S4cvLKDR2/mcNTYB6jtHCIgflr 8o51D5Mvtj+kl9CAIpB2NDLLoj6fW0igyLo6nc2NIpppOoAPdvwXRYHiCPymDaVsFiX5 2lheEdD3HCkuNnu+nSI6cBl52olvbz4dzGbI0fsv3/3Nm1CVCiIO910mKKLTsrjfG1h+ rwgVXFUxoc6B22qLPGypmrzIubVceQQ9Zo7h+27VglA/UgzzDOOKoWrXcwGrNEOk+eRN y4pDlKQ6JA32xNtbVkY3NQKjx8O2zDPGJbp86g8CMbc4eGfLB2tCKF9bpi9JFmWuD1R9 FLEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=MupWbysjgzUZFfffzujqm59sLo93eqEQgbR4QR/2mQI=; b=KvDnhk99eRAoqg2utRsZAAmt4v5JgN7rNiFEs1/uD8OZF/VFEPFs5JF0bHdBS4LOr3 rrfXr6jhwZrAc8+B/cbWFU7c0XThAtC39Yxktrihre7j3JLO6dCv/bUoR+13ffuqlYGk uy1YMha8xwYtNzwAaJDcD109PNtz31Er2ZQhi+ue0VRfkVlj/nYZn7LFXUJpgiPOTcKY dB85oN3qOc5Vc9OEdngxmljhe941tTRYLwBGHAzeEQf3ZN51jaBbBvPIYGEn+ZYBt+Fp 3m7nug48As+PrykPaYERxeHb2Cq5Zr+WB+/J04cf2hLUTu1Mu7ozwACcXvl0sxiRk2Mt aDcA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="yzx/BYYy"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v22si9501001plo.129.2019.02.11.07.38.50; Mon, 11 Feb 2019 07:39:07 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="yzx/BYYy"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388973AbfBKPhz (ORCPT + 99 others); Mon, 11 Feb 2019 10:37:55 -0500 Received: from mail.kernel.org ([198.145.29.99]:36734 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388156AbfBKOur (ORCPT ); Mon, 11 Feb 2019 09:50:47 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 217072081B; Mon, 11 Feb 2019 14:50:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1549896645; bh=uO1QIxzPb1MOP6fmvJgQVvB2VNbUQrjzid8/NdAvC0w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=yzx/BYYyrGQB5q2QchB8FgbgbmyDKuiYAyOuuKb8GMn/RUfQb504stXv/pSA7r8LS 7+MPdsXpuXTRX7YDb5TQ/MSeToQhwE2TO/nW3X3VTy9kl/EvzFLl89V+pwsHQV1itU tWg9xiRG+oHqyBy+qR9UBbvUMKYTBqJeFJXvxmMA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Junxiao Bi , Changwei Ge , Yiwen Jiang , Joel Becker , Joseph Qi , Jun Piao , Mark Fasheh , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 4.19 226/313] ocfs2: dont clear bh uptodate for block read Date: Mon, 11 Feb 2019 15:18:26 +0100 Message-Id: <20190211141908.458897168@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190211141852.749630980@linuxfoundation.org> References: <20190211141852.749630980@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 70306d9dce75abde855cefaf32b3f71eed8602a3 ] For sync io read in ocfs2_read_blocks_sync(), first clear bh uptodate flag and submit the io, second wait io done, last check whether bh uptodate, if not return io error. If two sync io for the same bh were issued, it could be the first io done and set uptodate flag, but just before check that flag, the second io came in and cleared uptodate, then ocfs2_read_blocks_sync() for the first io will return IO error. Indeed it's not necessary to clear uptodate flag, as the io end handler end_buffer_read_sync() will set or clear it based on io succeed or failed. The following message was found from a nfs server but the underlying storage returned no error. [4106438.567376] (nfsd,7146,3):ocfs2_get_suballoc_slot_bit:2780 ERROR: read block 1238823695 failed -5 [4106438.567569] (nfsd,7146,3):ocfs2_get_suballoc_slot_bit:2812 ERROR: status = -5 [4106438.567611] (nfsd,7146,3):ocfs2_test_inode_bit:2894 ERROR: get alloc slot and bit failed -5 [4106438.567643] (nfsd,7146,3):ocfs2_test_inode_bit:2932 ERROR: status = -5 [4106438.567675] (nfsd,7146,3):ocfs2_get_dentry:94 ERROR: test inode bit failed -5 Same issue in non sync read ocfs2_read_blocks(), fixed it as well. Link: http://lkml.kernel.org/r/20181121020023.3034-4-junxiao.bi@oracle.com Signed-off-by: Junxiao Bi Reviewed-by: Changwei Ge Reviewed-by: Yiwen Jiang Cc: Joel Becker Cc: Joseph Qi Cc: Jun Piao Cc: Mark Fasheh Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- fs/ocfs2/buffer_head_io.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/fs/ocfs2/buffer_head_io.c b/fs/ocfs2/buffer_head_io.c index 1d098c3c00e0..9f8250df99f1 100644 --- a/fs/ocfs2/buffer_head_io.c +++ b/fs/ocfs2/buffer_head_io.c @@ -152,7 +152,6 @@ int ocfs2_read_blocks_sync(struct ocfs2_super *osb, u64 block, #endif } - clear_buffer_uptodate(bh); get_bh(bh); /* for end_buffer_read_sync() */ bh->b_end_io = end_buffer_read_sync; submit_bh(REQ_OP_READ, 0, bh); @@ -306,7 +305,6 @@ int ocfs2_read_blocks(struct ocfs2_caching_info *ci, u64 block, int nr, continue; } - clear_buffer_uptodate(bh); get_bh(bh); /* for end_buffer_read_sync() */ if (validate) set_buffer_needs_validate(bh); -- 2.19.1