Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp2268464imc; Tue, 12 Mar 2019 10:15:16 -0700 (PDT) X-Google-Smtp-Source: APXvYqyf7PowUbSDA1Ajs3BEdeudwMmr+Nzg04T3bhLmRVCL0ob7GCyQGsVDg61Xak35VPku8JIf X-Received: by 2002:aa7:928d:: with SMTP id j13mr40059042pfa.112.1552410916541; Tue, 12 Mar 2019 10:15:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552410916; cv=none; d=google.com; s=arc-20160816; b=AXM5Zk0h52FSXC6EJYpWC8zeYIIByolb0UU+Bx+Df8tPJu2SKqRRwdCIny1ao60JtV 1AZxSoRe4eXDeUQSDFMW1jLf0tMkuAuExn0zrw1LrullciEa/oqxjYMO9QUW9jwhmhho jTy5er0TFCxju8MqkTBENw59sTpSv2zss3aX1Ghi9M2x9h4jGsEavIXv+2LxxLFR1nnS gjPfpIR96LNkdA2EUFqGBy3rDSIeJumWf3EaxppqtTrAhfdDfPmt1R39K0eqQbpOJZ1z Vtj9JrwTGed5k9TUqBrvNMc4a5AaQUKlP8fq/3DcFVS/yXx6BxYip5zxgQ41WfUmoaZd +Q9w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=bqxlpq0cJ8Brc+a2qQjTWKlUuFdO7VjleAIMbZw2/R4=; b=MTqJJVymI5fiLGcIsdu2ObGRanf29sn6/17dBZfYoDiqC6hWGdGJ/PT+w0O0/uL9HA Pzabf5o9aqEN51FeI330WpElndy1CBRbotBOHINuJ6uc5OiNQIB1EVLbIcOr/VLsYBSM NFmzwz7Os3pS5w42wefVQVRfjhP5+oqhenyG9NQu/VPLjxCYmcLiHBWRppo6b7CXx5+H OKO/N0mwpWd9H2PnLT0tmfG7b6JoUIUdnjsqL7XBIz+fzkXdFuEOBEIHvUXlH7+MV9bF 24FztQ1BvzYFJ89L5LdCVA5nZ0h2EeLgXTtAugjQ8GI6CHhqimmrRU1/P/LkKNQAOtyM Qp1Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=smbBQP1o; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id be11si8247687plb.355.2019.03.12.10.15.00; Tue, 12 Mar 2019 10:15:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=smbBQP1o; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728139AbfCLRNx (ORCPT + 99 others); Tue, 12 Mar 2019 13:13:53 -0400 Received: from mail.kernel.org ([198.145.29.99]:49744 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727887AbfCLRNU (ORCPT ); Tue, 12 Mar 2019 13:13:20 -0400 Received: from localhost (unknown [104.133.8.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B338C2173C; Tue, 12 Mar 2019 17:13:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552410799; bh=drPhLWY8XODTa1u9ahcQ1ouw7yyabgEGkJ8EXc9enns=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=smbBQP1oQlqvsvL9HzLuit2/2StCpodBof41YSRN0U4EuiGvb5HmBI7Jr1QCAKMud okEniJQQnTcls5EzH9W9mhQWNN5SybqgbLUYb7Uue1VI6MG2JZL4IOapCONoj0zDd0 FR9T/euDGwU89HcNW67VbJhWQQwzz2aTcHmEkYG8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Keith Busch , Christoph Hellwig , Sasha Levin Subject: [PATCH 4.20 146/171] nvme-pci: add missing unlock for reset error Date: Tue, 12 Mar 2019 10:08:46 -0700 Message-Id: <20190312170400.169268829@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190312170347.868927101@linuxfoundation.org> References: <20190312170347.868927101@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 4726bcf30fad37cc555cd9dcd6c73f2b2668c879 ] The reset work holds a mutex to prevent races with removal modifying the same resources, but was unlocking only on success. Unlock on failure too. Fixes: 5c959d73dba64 ("nvme-pci: fix rapid add remove sequence") Signed-off-by: Keith Busch Signed-off-by: Christoph Hellwig Signed-off-by: Sasha Levin --- drivers/nvme/host/pci.c | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/drivers/nvme/host/pci.c b/drivers/nvme/host/pci.c index 439b9f4eb246..5c58e0ffa3ac 100644 --- a/drivers/nvme/host/pci.c +++ b/drivers/nvme/host/pci.c @@ -2283,15 +2283,15 @@ static void nvme_reset_work(struct work_struct *work) mutex_lock(&dev->shutdown_lock); result = nvme_pci_enable(dev); if (result) - goto out; + goto out_unlock; result = nvme_pci_configure_admin_queue(dev); if (result) - goto out; + goto out_unlock; result = nvme_alloc_admin_tags(dev); if (result) - goto out; + goto out_unlock; /* * Limit the max command size to prevent iod->sg allocations going @@ -2374,6 +2374,8 @@ static void nvme_reset_work(struct work_struct *work) nvme_start_ctrl(&dev->ctrl); return; + out_unlock: + mutex_unlock(&dev->shutdown_lock); out: nvme_remove_dead_ctrl(dev, result); } -- 2.19.1