Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp1213380pxf; Fri, 9 Apr 2021 02:58:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzc4BK7LxWFnoy0dVDZj6/hAHaTE9aN6RAKcuZOWYGkyXSM1AaxghOyShcu4/Dsj5I17wrJ X-Received: by 2002:a62:1bd5:0:b029:1f9:2f83:2e82 with SMTP id b204-20020a621bd50000b02901f92f832e82mr11589746pfb.1.1617962335820; Fri, 09 Apr 2021 02:58:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617962335; cv=none; d=google.com; s=arc-20160816; b=R9yeK/PAzlf0y7ZEyhyv/1Hhf+u6n/hUgS/fcoCpmNCP7ghSjSgHc4k0a3VCLNHg8B O1gM4xf5h+9UqefWjJX1KZa28fybP3+LlnTEeKpR/c3bhIKxDwObDugtMYjQNyM0O9LO 1TGKEm3JZVUjeN6Yfb++QWuPK3e1Qosk1WLSdgu5DsukANlLvz8ZcfFskwy//wfAyWaG seoi8TLxaUwhBRdWZinvkyVlhilmOQOWPsxtT6ZFnWqlM6WccffzcdJBpny3kh9vbMs9 dZpanZyuUjvaWzBZ1Pvx6hKFQxxfZrXhxgVMUhVR8D+BEaKoKiQ2WScA52jvTJOm+CqX Cgxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=jTbLKYLPEMtFhcrAfO33SRqVp3NdnrQf3JGozvttT6Y=; b=dw4NesIb3ulB1njoxOd71cN9oH5q2MKS7Hc+4lCSNLXTm2ea949a4eydZO1OOCOrVg wl0ysU7oWqZpenbM0vnmL9oKzIBsqjXDC3zHnetp0qzsPYS4s7yAfCrdvJgO7yjek1OE L9dtku5BxjVjw+VP/VM4QpgRcM2Phk3d48ve3ZL8wT+MZ4IQJvPWUc/J1hu+5SHczzMB jf8BPvRJywv57K93xvCG7OZEP++QbaSGV85SUsuML+XMmqStO7/1hZQ8veuX7f8lIRNs u325ydfc8EIobUMo7zshMppNqc0PuEPp5vjDFL0zC81gOUG3lWZxNr8r0o226gOwRfav Kbig== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="dUnKn/Qc"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s10si2227995pgn.507.2021.04.09.02.58.43; Fri, 09 Apr 2021 02:58:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="dUnKn/Qc"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233752AbhDIJ5I (ORCPT + 99 others); Fri, 9 Apr 2021 05:57:08 -0400 Received: from mail.kernel.org ([198.145.29.99]:44208 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233607AbhDIJ4K (ORCPT ); Fri, 9 Apr 2021 05:56:10 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id F025361182; Fri, 9 Apr 2021 09:55:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1617962157; bh=G05ai1iCMpiL7TwATNWK4zM55eH5vJL+xFkYtTLg+F4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=dUnKn/QcM1pFJZfZWXuj3UNGjNYkrOL72tEKCU8Yo0Zbb66lxru/mX52fkGndXQLa RKI2GgHW0HYVyBnCnYm6ioEu/W3tl3yfbvgvm1TE09x5wZ7eb0pwio7SoWf7OETH3s YytKxNj23ELUxvAO+0Mvc9vdMFBAjtxYzrOnPgJg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ronnie Sahlberg , "Paulo Alcantara (SUSE)" , Steve French , Sasha Levin Subject: [PATCH 4.14 10/14] cifs: revalidate mapping when we open files for SMB1 POSIX Date: Fri, 9 Apr 2021 11:53:35 +0200 Message-Id: <20210409095300.728298239@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210409095300.391558233@linuxfoundation.org> References: <20210409095300.391558233@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ronnie Sahlberg [ Upstream commit cee8f4f6fcabfdf229542926128e9874d19016d5 ] RHBZ: 1933527 Under SMB1 + POSIX, if an inode is reused on a server after we have read and cached a part of a file, when we then open the new file with the re-cycled inode there is a chance that we may serve the old data out of cache to the application. This only happens for SMB1 (deprecated) and when posix are used. The simplest solution to avoid this race is to force a revalidate on smb1-posix open. Signed-off-by: Ronnie Sahlberg Reviewed-by: Paulo Alcantara (SUSE) Signed-off-by: Steve French Signed-off-by: Sasha Levin --- fs/cifs/file.c | 1 + 1 file changed, 1 insertion(+) diff --git a/fs/cifs/file.c b/fs/cifs/file.c index 6c77a96437e6..46e8e9324b58 100644 --- a/fs/cifs/file.c +++ b/fs/cifs/file.c @@ -163,6 +163,7 @@ int cifs_posix_open(char *full_path, struct inode **pinode, goto posix_open_ret; } } else { + cifs_revalidate_mapping(*pinode); cifs_fattr_to_inode(*pinode, &fattr); } -- 2.30.2