Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp518957yba; Mon, 1 Apr 2019 10:56:07 -0700 (PDT) X-Google-Smtp-Source: APXvYqxf0lmgZNe4nd2OZ8QsCg17K7xQ0NDs+zIEaZ93eXam4h2PwevTdgaLFKohqYkLw7YqQdMB X-Received: by 2002:a17:902:eb84:: with SMTP id cx4mr56939988plb.52.1554141367474; Mon, 01 Apr 2019 10:56:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554141367; cv=none; d=google.com; s=arc-20160816; b=gAG+PTgemVOfMhuwSsE1AaztVr2RkJV2K2QGoh8qAHyZzIf9+YnfaU8UleEjh5FOOV FfDOwiATy9YfaYf+DdPaXG93p6ZQvxnWiizoiINpjZ20MRwectJlZMqUCJD9Fc3ziFEo sS9r0u7UHdzhziQOOsfbLlx57tEAZICKotCMLMjkeoWxu8AXxceb5x0vtxAYZ4t/+tjM gOK2yyTQOqZ+dKOI2aO0z1gAEefyBFaRWABokeGJEQ+axGlDCvKxZAkzIdTmmaDAEGYX q9CbjdN4Gaqje8jxywLPkhJTMaGC2P31Cnlw6th5NS/Z1YpfrJvACf0JBXatgLy/N6eL VOwA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=SdilI/6/k9oPpLZHdZhHC31DWUtR//pI3spxyqzgawQ=; b=z+kO3nfByqFhhw9WvMldwtdYObeGYmDHyRpLS7Z5KtPflcY3K31ncLqduQ7Ogk434S lb5BzU5fF+xapk4rGGUT/Hu4p+Q95CKVCmv43hJY1sfHNldGQHOcP9CQTYXKLWOXEMvX hHxbkOFxYeBk50YRzcATrLjFS7klVyFfdI+bAYy91eTHBjA02nPsiMEz3mQPJrnQzVVo FZ0OUWbuNDTcUqghMj6+4xvBeeiXDAF0nVi6FkGlcsYqmHpZCm/x/QxhXgAdo5lwPtlP 1qfbhKlkV+orSkfzoSC/H32RAddJsAeAT/ZTWEMO0duHS+l71YlIAb73Xw6UbFKvVXCx YEbA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Ug6pB52A; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e1si9112343plt.79.2019.04.01.10.55.52; Mon, 01 Apr 2019 10:56:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Ug6pB52A; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731632AbfDARXM (ORCPT + 99 others); Mon, 1 Apr 2019 13:23:12 -0400 Received: from mail.kernel.org ([198.145.29.99]:52842 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728728AbfDARXJ (ORCPT ); Mon, 1 Apr 2019 13:23:09 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 950ED206C0; Mon, 1 Apr 2019 17:23:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554139389; bh=16E1iSjjBz9IP9jB7Rv7AOXbHiJ957bknwStVe2ke8U=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Ug6pB52AumqGbrmnCXp8eOLjEpgSF9YC3VAS7VfwgDlYMq8Mc3f5gqsvyXVcRVB7s Rir6E0V0BETnBER08JkTPPKN38Bsz04qO00GnDyaorKB9gzr7fcmQyWlk6/0pmAxzp d2CLvQyn50KevzammATE8FUhRp9aM+bXVBbZWlzU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Olga Kornievskaia , Trond Myklebust Subject: [PATCH 4.14 061/107] NFSv4.1 dont free interrupted slot on open Date: Mon, 1 Apr 2019 19:02:16 +0200 Message-Id: <20190401170051.262269728@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190401170045.246405031@linuxfoundation.org> References: <20190401170045.246405031@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Olga Kornievskaia commit 0cb98abb5bd13b9a636bde603d952d722688b428 upstream. Allow the async rpc task for finish and update the open state if needed, then free the slot. Otherwise, the async rpc unable to decode the reply. Signed-off-by: Olga Kornievskaia Fixes: ae55e59da0e4 ("pnfs: Don't release the sequence slot...") Cc: stable@vger.kernel.org # v4.18+ Signed-off-by: Trond Myklebust Signed-off-by: Greg Kroah-Hartman --- fs/nfs/nfs4proc.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/fs/nfs/nfs4proc.c +++ b/fs/nfs/nfs4proc.c @@ -2746,7 +2746,8 @@ static int _nfs4_open_and_get_state(stru nfs4_schedule_stateid_recovery(server, state); } out: - nfs4_sequence_free_slot(&opendata->o_res.seq_res); + if (!opendata->cancelled) + nfs4_sequence_free_slot(&opendata->o_res.seq_res); return ret; }