From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.0 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9DF18C433DF for ; Mon, 10 Aug 2020 13:52:08 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 761562073A for ; Mon, 10 Aug 2020 13:52:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1597067528; bh=ky8q12nps6XR1CLk7mITGJzp58pN0JcVTRBo/U1W5HA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:List-ID:From; b=JOXMVMRnJhKH1XpWcwLW78illit04nkpHgYk4SotdPqhqeis6B5y0gyWz9jsIOPBE EbVZf1xPOE/bpX3aZkMW2EMB3zDPkp20FXITCDqB/jcmpoRdQt3VvKXkcWGPZU4MEB RgbcavxX5cZiuRzuawMCvRQlmLjH63/n5oOOpIsw= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726831AbgHJNwH (ORCPT ); Mon, 10 Aug 2020 09:52:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:51212 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726633AbgHJNwH (ORCPT ); Mon, 10 Aug 2020 09:52:07 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4EF6120734; Mon, 10 Aug 2020 13:52:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1597067526; bh=ky8q12nps6XR1CLk7mITGJzp58pN0JcVTRBo/U1W5HA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=CXtTV469HiDRgKLf7lCfrE861GdEHlCOGufh8AGEATb3DH7n9K720rbLh/jzDSWxR uCebORZ1l6VoNMaxq76myLR1CieaiCHSPjPc1eVzZYWvGh8+D/htMZ4DqG7ccuiuLQ vqQAIImR+HzHCmQHxQPdc2CYvOyY4odOyjQn3FRw= Date: Mon, 10 Aug 2020 15:52:18 +0200 From: Greg KH To: Chuck Lever , Timo Rothenpieler Cc: stable@vger.kernel.org Subject: Re: Backport request: nfsd: Fix NFSv4 READ on RDMA when using readv Message-ID: <20200810135218.GC3491228@kroah.com> References: <9cc28958-b715-5e51-e0c8-6f1821d2bfe0@rothenpieler.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <9cc28958-b715-5e51-e0c8-6f1821d2bfe0@rothenpieler.org> Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org On Tue, Aug 04, 2020 at 10:47:26PM +0200, Timo Rothenpieler wrote: > Sorry if this is not the right approach to this, but I'd like to request a > backport of 412055398b9e67e07347a936fc4a6adddabe9cf4, "nfsd: Fix NFSv4 READ > on RDMA when using readv" to Linux 5.4. > > The patch applies cleanly and fixes a rare but severe issue with NFS over > RDMA, which I just spent several days tracking down to that patch, with > major help from linux-nfs/rdma. > > I have right now manually applied it to my 5.4 Kernel and can confirm it > fixes the issue. It's good to cc: the developers/maintainers of the patch you are asking about, to see if they object or not. Chuck, any objection for the above patch being added to 5.4 and maybe 4.19? thanks, greg k-h