Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp1213217pxf; Fri, 9 Apr 2021 02:58:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwiGfyjlZ8nBBN+S4huDrebIP0V16sgwqgHjQu9MrH47AMc6j/Tlu5/WEIHfH0L7JfJEtJZ X-Received: by 2002:a62:db43:0:b029:244:3c4c:6b90 with SMTP id f64-20020a62db430000b02902443c4c6b90mr7637748pfg.59.1617962316429; Fri, 09 Apr 2021 02:58:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617962316; cv=none; d=google.com; s=arc-20160816; b=buAZhRJ3u9dUcq9+Lu9AY6qiO4rX1EaMaTpB1gpFj1R8GEGZoIkTh7MuZoUbtjuUrV kvCZqid4tzy2Aq2TGDPlSnqnKwPMAYb1XPUSWaMCfGrA+qsENf/54IcBWn+84nNI2+NP rFEMAqyU6G6pBJQZA2IYanpOGxYAfM0Y5CjE3GQwGnPGNmjPGAKmdSKiPp/ltJ2+O70E 5KGC6cxLibzT0fLCm6AVG6wPOdoCjpCdhL7WlVjrhF2orMCT9Q7LoYw+lHsLzIMb+Gym JJs+veZYiz8Hh6TpAacA8TofUe2gzwV43ZSl76M1rKlp6zZ8j1HhoL5Uuw8wASNfiKe1 cbQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=HwvoA+yoFJ/pNAxgMpFUTFh1xcVSv8iDuYPuDsNuoJU=; b=aOB03LXAV0WANVHXZ1lb818ClJJc8cA6EukB5SKYNddk2Al5jgT38ybbuLm37NFahD fag9sehgYfGvpvnyMWLyiK6mz65zwBrRx8qy6P1/EAAyBgr40KCe19IceRtvKcLWzGq2 9/rG0ZuvQz4s0J4gihHACtzPDx7gLUNIKmg0tc8LeYzToSynQ6HFKIKesmBsvbM8sVSd tabehR8U7kw+DxrLbRah6vbPInljvSc/l7NwxM6KjBu1MGbYTBB80QR663NWvMIAiyqp s9SgFRdW22BMK6vO/S/JxVS3vrjeezqnNX9tNF1I14lALMHTojX5r3FVsjFiC7z5JJTF REIQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="sXHw6/Dt"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n15si2763774pgh.315.2021.04.09.02.58.22; Fri, 09 Apr 2021 02:58:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="sXHw6/Dt"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233332AbhDIJ4u (ORCPT + 99 others); Fri, 9 Apr 2021 05:56:50 -0400 Received: from mail.kernel.org ([198.145.29.99]:42520 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233367AbhDIJ4B (ORCPT ); Fri, 9 Apr 2021 05:56:01 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C47BA611C0; Fri, 9 Apr 2021 09:55:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1617962147; bh=llLN9xU9vdoxLzdQwQJM2fJmmSdqDdov5+bePIV0doo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=sXHw6/DtrL85sZESZSV8RhNzo0c+g2vWuO5I0pTOS2nJlxE3VAuvdDROUQL0txlMb 1jsXV1WQU0epaBBpHW1KDjBrF4Y2AStgvmoD6At39rVma36/Ch7HM507rQ5k/mZn6G 5KGIyPAYkkdTnkLnI43Yci2g8OjOZfd7DFOCQi1c= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ronnie Sahlberg , "Paulo Alcantara (SUSE)" , Steve French , Sasha Levin Subject: [PATCH 4.9 08/13] cifs: revalidate mapping when we open files for SMB1 POSIX Date: Fri, 9 Apr 2021 11:53:28 +0200 Message-Id: <20210409095259.890571984@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210409095259.624577828@linuxfoundation.org> References: <20210409095259.624577828@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ronnie Sahlberg [ Upstream commit cee8f4f6fcabfdf229542926128e9874d19016d5 ] RHBZ: 1933527 Under SMB1 + POSIX, if an inode is reused on a server after we have read and cached a part of a file, when we then open the new file with the re-cycled inode there is a chance that we may serve the old data out of cache to the application. This only happens for SMB1 (deprecated) and when posix are used. The simplest solution to avoid this race is to force a revalidate on smb1-posix open. Signed-off-by: Ronnie Sahlberg Reviewed-by: Paulo Alcantara (SUSE) Signed-off-by: Steve French Signed-off-by: Sasha Levin --- fs/cifs/file.c | 1 + 1 file changed, 1 insertion(+) diff --git a/fs/cifs/file.c b/fs/cifs/file.c index 24508b69e78b..e2ce90fc504e 100644 --- a/fs/cifs/file.c +++ b/fs/cifs/file.c @@ -163,6 +163,7 @@ int cifs_posix_open(char *full_path, struct inode **pinode, goto posix_open_ret; } } else { + cifs_revalidate_mapping(*pinode); cifs_fattr_to_inode(*pinode, &fattr); } -- 2.30.2