Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp609073img; Fri, 22 Mar 2019 05:06:02 -0700 (PDT) X-Google-Smtp-Source: APXvYqxSHWIigkW6MxS+6pSXdUqzaVEBYVHsyRuxH+KpINF3VE5jMQjlIbt0J5xD04a3Xrtbrrvm X-Received: by 2002:a63:d5f:: with SMTP id 31mr8513069pgn.274.1553256361733; Fri, 22 Mar 2019 05:06:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553256361; cv=none; d=google.com; s=arc-20160816; b=UM/gYTZwGSyvxLfKG/nwEzQq7LhQSR6xliBqO+bvaDTyE5XVtE3rRaPSCbMgmmqiO6 2Mi+uw+lLU0WSStKifN0eCLPsg7pvIxL3jlr6OZVzeUN3h3DucvvT2PPQdZReSpI9Xsp RTNEROC2AANDLi8s6YNRd6fhC02ljZ6tZZnUG1uM0RxQA5RByDhICYZ628oDgomT/Glj l/8c8+G1NY4MdVsTpVoR+hWULYKzzHZydiK3Sq0bi/uKMKJdW8uamfNmRxIAaWYVTiXA oN2bILXhIT61GkPGbnXrqCWvLR5vhJo+c4ZebGrg2Vtyt0pzTLZ4ux9oMq44pFEUNeNW xgPw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=3cY6dEICwsjWrY3/v/fN9YgVku6zi6ujCAsBbLmzDcc=; b=J+nItuVKLpMy8lzO889nluf9F969hiVxJMatyn8wAajt1w7NnuYICN3bS0tb9GziU1 80j97UMgeTCpp/PLV9zFbE6+Z/2eFRSd0IW8WG/9G6L0LhlKbxIRwq1PfEjRHK28yptl A/6lJd/pvEsFc2bhTgs28qwvftzUuVpp25+8OzBhFaGZwC2XnFbRMxcv7RLu9nLOX4jP Ru1ZIBhlYh1rbOZPyDA+90Gv3ADQVjvWLgzB5L+z5KHTOWB+82yAodsSrx98BXOh1bwy qBzynerTP27ZJDBmjCZD/dT63xahMDicAy2lzNWMYfhppdlCyG4A1AazNSDjtpZxxyGM V/sw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VIjxdS3v; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r4si6570921plo.416.2019.03.22.05.05.46; Fri, 22 Mar 2019 05:06:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VIjxdS3v; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388086AbfCVMDT (ORCPT + 99 others); Fri, 22 Mar 2019 08:03:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:41618 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732400AbfCVMDQ (ORCPT ); Fri, 22 Mar 2019 08:03:16 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 17C53204FD; Fri, 22 Mar 2019 12:03:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553256195; bh=/hgtlxIL7Tjm2kkcAyezXCdQMPGcN9xd8Q1WmaQzXcQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=VIjxdS3vixIye7jM65RHEcGVnWBX+bcIlXVZeFnrmxVQJtbHzrcaiXyytlaP3VSiZ xMpBjV3cM6JAW1/hK1xo7yELoHs5kBOf9mWM3Zb16ziuYvIptpVg5Rbyp0FsobiEX+ FSpP8CPGjFiQmsrpW8BP/aGR6DwPb2XQZPwzgfVY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Pavel Shilovsky , Steve French Subject: [PATCH 4.19 137/280] CIFS: Do not reset lease state to NONE on lease break Date: Fri, 22 Mar 2019 12:14:50 +0100 Message-Id: <20190322111317.645510503@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190322111306.356185024@linuxfoundation.org> References: <20190322111306.356185024@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Pavel Shilovsky commit 7b9b9edb49ad377b1e06abf14354c227e9ac4b06 upstream. Currently on lease break the client sets a caching level twice: when oplock is detected and when oplock is processed. While the 1st attempt sets the level to the value provided by the server, the 2nd one resets the level to None unconditionally. This happens because the oplock/lease processing code was changed to avoid races between page cache flushes and oplock breaks. The commit c11f1df5003d534 ("cifs: Wait for writebacks to complete before attempting write.") fixed the races for oplocks but didn't apply the same changes for leases resulting in overwriting the server granted value to None. Fix this by properly processing lease breaks. Signed-off-by: Pavel Shilovsky Signed-off-by: Steve French CC: Stable Signed-off-by: Greg Kroah-Hartman --- fs/cifs/smb2misc.c | 17 ++++++++++++++--- fs/cifs/smb2ops.c | 15 ++++++++++++--- 2 files changed, 26 insertions(+), 6 deletions(-) --- a/fs/cifs/smb2misc.c +++ b/fs/cifs/smb2misc.c @@ -517,7 +517,6 @@ smb2_tcon_has_lease(struct cifs_tcon *tc __u8 lease_state; struct list_head *tmp; struct cifsFileInfo *cfile; - struct TCP_Server_Info *server = tcon->ses->server; struct cifs_pending_open *open; struct cifsInodeInfo *cinode; int ack_req = le32_to_cpu(rsp->Flags & @@ -537,13 +536,25 @@ smb2_tcon_has_lease(struct cifs_tcon *tc cifs_dbg(FYI, "lease key match, lease break 0x%x\n", le32_to_cpu(rsp->NewLeaseState)); - server->ops->set_oplock_level(cinode, lease_state, 0, NULL); - if (ack_req) cfile->oplock_break_cancelled = false; else cfile->oplock_break_cancelled = true; + set_bit(CIFS_INODE_PENDING_OPLOCK_BREAK, &cinode->flags); + + /* + * Set or clear flags depending on the lease state being READ. + * HANDLE caching flag should be added when the client starts + * to defer closing remote file handles with HANDLE leases. + */ + if (lease_state & SMB2_LEASE_READ_CACHING_HE) + set_bit(CIFS_INODE_DOWNGRADE_OPLOCK_TO_L2, + &cinode->flags); + else + clear_bit(CIFS_INODE_DOWNGRADE_OPLOCK_TO_L2, + &cinode->flags); + queue_work(cifsoplockd_wq, &cfile->oplock_break); kfree(lw); return true; --- a/fs/cifs/smb2ops.c +++ b/fs/cifs/smb2ops.c @@ -2301,6 +2301,15 @@ smb2_downgrade_oplock(struct TCP_Server_ } static void +smb21_downgrade_oplock(struct TCP_Server_Info *server, + struct cifsInodeInfo *cinode, bool set_level2) +{ + server->ops->set_oplock_level(cinode, + set_level2 ? SMB2_LEASE_READ_CACHING_HE : + 0, 0, NULL); +} + +static void smb2_set_oplock_level(struct cifsInodeInfo *cinode, __u32 oplock, unsigned int epoch, bool *purge_cache) { @@ -3351,7 +3360,7 @@ struct smb_version_operations smb21_oper .print_stats = smb2_print_stats, .is_oplock_break = smb2_is_valid_oplock_break, .handle_cancelled_mid = smb2_handle_cancelled_mid, - .downgrade_oplock = smb2_downgrade_oplock, + .downgrade_oplock = smb21_downgrade_oplock, .need_neg = smb2_need_neg, .negotiate = smb2_negotiate, .negotiate_wsize = smb2_negotiate_wsize, @@ -3447,7 +3456,7 @@ struct smb_version_operations smb30_oper .dump_share_caps = smb2_dump_share_caps, .is_oplock_break = smb2_is_valid_oplock_break, .handle_cancelled_mid = smb2_handle_cancelled_mid, - .downgrade_oplock = smb2_downgrade_oplock, + .downgrade_oplock = smb21_downgrade_oplock, .need_neg = smb2_need_neg, .negotiate = smb2_negotiate, .negotiate_wsize = smb2_negotiate_wsize, @@ -3551,7 +3560,7 @@ struct smb_version_operations smb311_ope .dump_share_caps = smb2_dump_share_caps, .is_oplock_break = smb2_is_valid_oplock_break, .handle_cancelled_mid = smb2_handle_cancelled_mid, - .downgrade_oplock = smb2_downgrade_oplock, + .downgrade_oplock = smb21_downgrade_oplock, .need_neg = smb2_need_neg, .negotiate = smb2_negotiate, .negotiate_wsize = smb2_negotiate_wsize,