Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp525508yba; Mon, 1 Apr 2019 11:04:09 -0700 (PDT) X-Google-Smtp-Source: APXvYqw+3wfswl1bsxeIBMx96TOG4I4LuRD6WMOnZtsB8k18n3oOpY7rQEINEns5yGhGYEZJZRy8 X-Received: by 2002:a62:1881:: with SMTP id 123mr63305981pfy.25.1554141849253; Mon, 01 Apr 2019 11:04:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554141849; cv=none; d=google.com; s=arc-20160816; b=tAAwcfxC4OYUec+ZjkOwhrZWq7DoKkb2VzSUk0u+yjrEhIH5vCseQUUScP5yrjdW8J /lCaplLaDdI0AX/rPWaTTRCO9QOF7L5ee4mHwX1vy8a0q1rkPVzy7LAI3J8YOxd+kaw1 0X8FS3npvc3roS+AseAkFiTKluV8/lkGxQwCnSkZ7ERcqe5z1u+OsPrroSByG5oXU6ly feWyOlbpmeDKlex1TClCX3qeFsZex/FAkoiuGknzatLH32Sl+i/t9FouZMGUqo8PmmCw n09hPGRgC3n3mAJrWjv77lpZYfeTJxQSIkZQAWMP++veZZekSucLlbuhqqUbFvtcs3eR HQPA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=2sFhOIr/n93L0FKUEM81/3HVOJ6RE7uWPqEDdv9QaXA=; b=kTBJy0rKbSsk+LzMUqJ0iuBjtPsR85cioALz8Jbr9/Q7avnP0qBVX0AATN1zor+2VW FwrEuh9iKQJBmpGwoeSaVjx4TX2GNyWPp8c/RwIhWnOs6O39eI3qZZOPE37Hnff78GMR h0D9YAlkeLyhMLYsFdPXCAecMUBupvGl+kJs9SFFZ1a2dGlIBlo/SwJycOH3dD5NlKWN y/dGKUdlCPMiabxoZsop7nk+twVMWeU6G9vQwPp+tGpPmtPHHFTlb3sW/FqiZ/S8Drdb maftoq7K76sOJrvWNUhGU+ECyC4uFAfIEclLvZPKCX3nFo62LMEZegKg7WC6p3EeyA7B nueg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="hHX1/ZMZ"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l10si9113969pfb.283.2019.04.01.11.03.53; Mon, 01 Apr 2019 11:04:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="hHX1/ZMZ"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730858AbfDARPJ (ORCPT + 99 others); Mon, 1 Apr 2019 13:15:09 -0400 Received: from mail.kernel.org ([198.145.29.99]:38968 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730338AbfDARPG (ORCPT ); Mon, 1 Apr 2019 13:15:06 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5C5A62133D; Mon, 1 Apr 2019 17:15:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554138905; bh=Bs7DGrdFYxjIPnTxbrXZn3BYH7IPmZaU1ZaxO0iYO+E=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=hHX1/ZMZ7nuskCZH6DhVHC9NNiGtU28AqzTQ7BfRXJ38XHD0v8LL8H9/OwTZo2pQN 6MGOlMRRcpnquWxKgEdlRS2V+iHddQWdGhNcOY1/CvBg9qqafHViN6jdmursSABx34 FuagwL/3F31+dsmdm0psaFAMhOAcaWOV+WtLlwsg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Olga Kornievskaia , Trond Myklebust Subject: [PATCH 4.19 055/134] NFSv4.1 dont free interrupted slot on open Date: Mon, 1 Apr 2019 19:01:31 +0200 Message-Id: <20190401170049.658711304@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190401170044.243719205@linuxfoundation.org> References: <20190401170044.243719205@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Olga Kornievskaia commit 0cb98abb5bd13b9a636bde603d952d722688b428 upstream. Allow the async rpc task for finish and update the open state if needed, then free the slot. Otherwise, the async rpc unable to decode the reply. Signed-off-by: Olga Kornievskaia Fixes: ae55e59da0e4 ("pnfs: Don't release the sequence slot...") Cc: stable@vger.kernel.org # v4.18+ Signed-off-by: Trond Myklebust Signed-off-by: Greg Kroah-Hartman --- fs/nfs/nfs4proc.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/fs/nfs/nfs4proc.c +++ b/fs/nfs/nfs4proc.c @@ -2909,7 +2909,8 @@ static int _nfs4_open_and_get_state(stru } out: - nfs4_sequence_free_slot(&opendata->o_res.seq_res); + if (!opendata->cancelled) + nfs4_sequence_free_slot(&opendata->o_res.seq_res); return ret; }