Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp619411img; Fri, 22 Mar 2019 05:17:19 -0700 (PDT) X-Google-Smtp-Source: APXvYqxU7Gfc1d+Ca3sXNiF0B6ODfkzfGV3lwl/BRRUwexB75gP2vKQHfqWhiKMON7+d2Y72WUJ1 X-Received: by 2002:a63:5054:: with SMTP id q20mr8605335pgl.414.1553257039769; Fri, 22 Mar 2019 05:17:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553257039; cv=none; d=google.com; s=arc-20160816; b=CQfa+jyYkBBJnm+Ro8naOvUl/ZHYG8lRilyfekE/8tdWCmasIcOcB1powJ2uPFdsaL k+nqaibi7lbpmMeIWKr2bfGgBK8txSx7wep3OvEm+/97DnPUg94klFvu3wAXMuVerxTD bP7/yRYQfndKR6JuJKqfN4d0wVBZ0bN2pEFzvchFFab9yIjGSru7aSa0udGw1sCgQfpF Q57oIc8CEVApvcajHsGhK7wqIyBLfNhufLeuBNry2fsxSrs2Pl2CEUBND4Q+r8hFGlxF VqwU1wseTfjZ9pEWZAOgglZCShvyob8K1CoGX4fit15H5Iu0cF9SSosFlN1q3vamnj43 wwsA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=KR649IDCyN9t0JQEZlibElU3B4Gw5dcQWUXUnDI8GEo=; b=aWr87C1TDfn3fDhV2z0H9tKTA2FEfdhN+Z0B9bfB7lALMrLW4cKt93MxPNL5uofu4T eGlzBbNB9G+DZcmDB9FA1xHRtNKSUuIT9eY32x5e1ndXxp2u22VBUw+1uOG0U2cQgvCj VtwZ/eD/V92rgR3Xru5a8PQNyVJFl8N33aDjwegVBnAARGHAWd6aOimS45k7iFMZmVu1 X/7Dq748ByHvVwOLGq9n88SxOfZJVZnGeZcCZ8kFJUHG1w/e7LdX+aYRoPLj1jOsaPYm yOi5kfyUmGpnC4VqXeAPs2jPr7Lb8GYQ+amXSSo1wI3IO7NwyBQu8TUcjWFJmHwHHhEy fX5w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mDGAPu0c; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q13si6578277pfi.208.2019.03.22.05.17.04; Fri, 22 Mar 2019 05:17:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mDGAPu0c; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390201AbfCVMQU (ORCPT + 99 others); Fri, 22 Mar 2019 08:16:20 -0400 Received: from mail.kernel.org ([198.145.29.99]:54992 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390194AbfCVMQT (ORCPT ); Fri, 22 Mar 2019 08:16:19 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E2DFE218A1; Fri, 22 Mar 2019 12:16:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553256979; bh=GUoyvyreUkniVtkVtswuAzRLWm/FT2zvhYM5bSKlCtg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mDGAPu0cGvd/bOkN4Nw4oZSVSVCrZPSY6Zd2xoai8lL36tXec5g5UE41uYJI7A2y0 tRybUfKphpWdgkFmfJzxdGlhgIVApHZbbegPf1KGUmwsqXtL55Z8nv8PxXn3VhSsiO 4omYCjmh/mgYR6OoD5fCZAWnXbE2K8QN4VMfBCOo= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Pavel Shilovsky , Steve French , Ronnie Sahlberg Subject: [PATCH 5.0 054/238] CIFS: Fix read after write for files with read caching Date: Fri, 22 Mar 2019 12:14:33 +0100 Message-Id: <20190322111301.636372988@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190322111258.383569278@linuxfoundation.org> References: <20190322111258.383569278@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 5.0-stable review patch. If anyone has any objections, please let me know. ------------------ From: Pavel Shilovsky commit 6dfbd84684700cb58b34e8602c01c12f3d2595c8 upstream. When we have a READ lease for a file and have just issued a write operation to the server we need to purge the cache and set oplock/lease level to NONE to avoid reading stale data. Currently we do that only if a write operation succedeed thus not covering cases when a request was sent to the server but a negative error code was returned later for some other reasons (e.g. -EIOCBQUEUED or -EINTR). Fix this by turning off caching regardless of the error code being returned. The patches fixes generic tests 075 and 112 from the xfs-tests. Cc: Signed-off-by: Pavel Shilovsky Signed-off-by: Steve French Reviewed-by: Ronnie Sahlberg Signed-off-by: Greg Kroah-Hartman --- fs/cifs/file.c | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) --- a/fs/cifs/file.c +++ b/fs/cifs/file.c @@ -3028,14 +3028,16 @@ cifs_strict_writev(struct kiocb *iocb, s * these pages but not on the region from pos to ppos+len-1. */ written = cifs_user_writev(iocb, from); - if (written > 0 && CIFS_CACHE_READ(cinode)) { + if (CIFS_CACHE_READ(cinode)) { /* - * Windows 7 server can delay breaking level2 oplock if a write - * request comes - break it on the client to prevent reading - * an old data. + * We have read level caching and we have just sent a write + * request to the server thus making data in the cache stale. + * Zap the cache and set oplock/lease level to NONE to avoid + * reading stale data from the cache. All subsequent read + * operations will read new data from the server. */ cifs_zap_mapping(inode); - cifs_dbg(FYI, "Set no oplock for inode=%p after a write operation\n", + cifs_dbg(FYI, "Set Oplock/Lease to NONE for inode=%p after write\n", inode); cinode->oplock = 0; }