Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp267330ybi; Wed, 29 May 2019 21:01:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqy7aYvowO+dXrk+YcOslCUL4T9i3amIPS3j9jFZzXLAbE4AHuq7ev8382/mcoutBGzuiKcB X-Received: by 2002:a17:90a:71cb:: with SMTP id m11mr1717326pjs.40.1559188887137; Wed, 29 May 2019 21:01:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559188887; cv=none; d=google.com; s=arc-20160816; b=nxI3Xxz4tcBSp/YfcKo7bH3mIHBYylDG2cjCqAC+SDS4gD2SeBbgiwwITLLjU+KFt9 rAnKsQGzQh4ubJeAqonmwrID/InRC5MJY2N/pXWDr351e8TTz5FFo0amQiNRwdaS84C6 CD6ASfLNVA7nATQDgphbu33IlRW7VgqU0gUrmtc5rt4pMISjMDdoV8cz6B3q4/QF34gF EJnjX1jpNJc0k+CAFn8OG4b9s7wbLRxwOry/9TDjB0h4E4/bxHpM4g+9d/aNU5muBeaC H5aAg5at0+TfRuZAefo+qPDDr+fPwiUMx3iuJouFSBm7Rtmq5a0rMVX1Qt0tznoNHcOA z0qg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=uAyvvKtLcGbLeblXYHJ6ObFGOEJqlWJ2SPtJ4FGPwEc=; b=HKZHksvioH4sRboU4eP3F+F9vCO4KBdFDdiM6Pq58rUSdr7x9/nPQ0EuVVZQd5pzIK tdtYK9KMDPDHDxIQ7EHCaXrInB0VmU0Mo2lJwnkmihwXv5N29QimJtHwi+i9Rd4e0XyW +3nz6U3hxFyktcuhowSJVHoop0SImFZWkriI/f0Xu6ZeTBcYw8cZO+8fNTpeo3AWodXt v6Kc8CwiL037NIfgCzXM+LAITXfRN2Mpo6z6K9dMvLGPuTHPZKEdsU8j+UD5TKDK7Cys zKGfA5zqn5wxqTmiaEFB22uvwJJXn7Hj/aTQHL5SF6eZXRxj0n4sMvw9JFzBTCFu5vzf eP0Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nexOqOp1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z16si1915384pgg.91.2019.05.29.21.01.09; Wed, 29 May 2019 21:01:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nexOqOp1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726031AbfE3EAD (ORCPT + 99 others); Thu, 30 May 2019 00:00:03 -0400 Received: from mail.kernel.org ([198.145.29.99]:51474 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727838AbfE3DS3 (ORCPT ); Wed, 29 May 2019 23:18:29 -0400 Received: from localhost (ip67-88-213-2.z213-88-67.customer.algx.net [67.88.213.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 48D272474D; Thu, 30 May 2019 03:18:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1559186309; bh=q4GEWxI8zFJV+i2pxijjdsUKmJrEI9Khc/QMjifhyWg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=nexOqOp1JoiymgRlfP8mtw+7Kibcaa7XhNr76WG+PYY1LqGW5aoJ3OP9uiKtTfoMg FDPWCCtzAsUcn0ZUpE1jnYDTlIpsVZ0GZm993CtrDpQSLMjHdH48jiD4W4AWkf2Jjq laUCtc6E5+FGM/iG4UM7jQYIYOwHLHD4Sj+21Vh0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+228a82b263b5da91883d@syzkaller.appspotmail.com, Benjamin Coddington , Anna Schumaker , Sasha Levin Subject: [PATCH 4.19 276/276] NFS: Fix a double unlock from nfs_match,get_client Date: Wed, 29 May 2019 20:07:14 -0700 Message-Id: <20190530030542.445869259@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190530030523.133519668@linuxfoundation.org> References: <20190530030523.133519668@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit c260121a97a3e4df6536edbc2f26e166eff370ce ] Now that nfs_match_client drops the nfs_client_lock, we should be careful to always return it in the same condition: locked. Fixes: 950a578c6128 ("NFS: make nfs_match_client killable") Reported-by: syzbot+228a82b263b5da91883d@syzkaller.appspotmail.com Signed-off-by: Benjamin Coddington Signed-off-by: Anna Schumaker Signed-off-by: Sasha Levin --- fs/nfs/client.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/nfs/client.c b/fs/nfs/client.c index 846d45cb1a3c8..c092661147b30 100644 --- a/fs/nfs/client.c +++ b/fs/nfs/client.c @@ -305,9 +305,9 @@ static struct nfs_client *nfs_match_client(const struct nfs_client_initdata *dat spin_unlock(&nn->nfs_client_lock); error = nfs_wait_client_init_complete(clp); nfs_put_client(clp); + spin_lock(&nn->nfs_client_lock); if (error < 0) return ERR_PTR(error); - spin_lock(&nn->nfs_client_lock); goto again; } -- 2.20.1