Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1747976ybl; Sat, 11 Jan 2020 02:02:02 -0800 (PST) X-Google-Smtp-Source: APXvYqxmy5axTuXoy3w0XbDw2CBbm+6k+WK9TVC2mvw2Q6Pa4BZoOt4A57Kzx1MJ+yOImytkS5Ja X-Received: by 2002:a9d:1d02:: with SMTP id m2mr5831451otm.45.1578736922084; Sat, 11 Jan 2020 02:02:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578736922; cv=none; d=google.com; s=arc-20160816; b=o2YVx71viLU+jJUqKJMS9R+8X6kwCRJeOFOb+vApHJbciKxJaVTRIuBysF/AcUpCIF PQ4VNFHGveDUMlTOVczF7/3ohyUxnRzgsaD1qsUpXjFpEwz2B1O6ex55apc2Nw52lY2d MwEyjSDwP3KBt4jG0hdIUFI2Q3cuqKEM33Fae3o4JQfhf5imI84P+nUhLbRLXDHOWpVu fDlI7O3TFAvxUNcJI05vPqgs0v3QM5rrnhezogD0FuDJA3XFtMWDsM0b6juyOU2rfeFC Z5ak2pOws3AWR9Q4UcmQJEiN0iPNhv739qQ5SHxeR8KbSF3ydUM45kqBSFPqxyEYgKZp CvYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=eExz/f1+f6RLQ6Bq4/vfF7ZEjlHJOfO7YbX+ceDVpHw=; b=ACPIIeneucN07EB9SMd0JWjLZzBoqNoJ4zCwbIQd5wkE7I/bse+YMDKIKScKtMgCJq XkNTHOTJzgQlhAZ/mXC7c87i2KkDf1qAnpivLrs7IADuGT9rk8qF6TS4t66QYA5+7URe DYxoTmmfhMQ2wPxT8+0whgeikA0NhgACuZn+y2BWG14uN1OH9XwaMbTnmWF75WF0j+mg ek0l+M0jdvOqyBe4cXrJEo5eZDDVl/1zn0fl3VJX3sjTbqSTqSkUabtNPYIuZVaLxh4I FA2P+FwLbT0OvRmPYtMV147QZwNtCJqddTz1Kv3PxjqbsFQnDnkC2G0liyrXj9257vYo 1GMQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=i6xZS+3Z; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v124si2794306oib.173.2020.01.11.02.01.51; Sat, 11 Jan 2020 02:02:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=i6xZS+3Z; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729107AbgAKKBC (ORCPT + 99 others); Sat, 11 Jan 2020 05:01:02 -0500 Received: from mail.kernel.org ([198.145.29.99]:58030 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729064AbgAKKBB (ORCPT ); Sat, 11 Jan 2020 05:01:01 -0500 Received: from localhost (unknown [62.119.166.9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0D59C2082E; Sat, 11 Jan 2020 10:00:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578736860; bh=R4b/CKHP7JvZDV66qTaF7d//2d8ksi5dmX0LRaHr1z8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=i6xZS+3ZHK70M3t2t+TM0n1QnLVYxETSN+w5zv9KLzUfHwt/ccgfE/mVnQCr1l+KU e41/DfpCujqHdKml3I6s0lxpmWmaUzQVTw261ezLrsyuQ96NCsywRXYMiiLCDHQ37j jmv97sjG455jMJHXNIXWOph/kfPoCEJ5kcabUcaU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dan Carpenter , Marcel Holtmann Subject: [PATCH 4.9 38/91] Bluetooth: delete a stray unlock Date: Sat, 11 Jan 2020 10:49:31 +0100 Message-Id: <20200111094859.385467870@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200111094844.748507863@linuxfoundation.org> References: <20200111094844.748507863@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dan Carpenter commit df66499a1fab340c167250a5743931dc50d5f0fa upstream. We used to take a lock in amp_physical_cfm() but then we moved it to the caller function. Unfortunately the unlock on this error path was overlooked so it leads to a double unlock. Fixes: a514b17fab51 ("Bluetooth: Refactor locking in amp_physical_cfm") Signed-off-by: Dan Carpenter Signed-off-by: Marcel Holtmann Signed-off-by: Greg Kroah-Hartman --- net/bluetooth/l2cap_core.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) --- a/net/bluetooth/l2cap_core.c +++ b/net/bluetooth/l2cap_core.c @@ -4908,10 +4908,8 @@ void __l2cap_physical_cfm(struct l2cap_c BT_DBG("chan %p, result %d, local_amp_id %d, remote_amp_id %d", chan, result, local_amp_id, remote_amp_id); - if (chan->state == BT_DISCONN || chan->state == BT_CLOSED) { - l2cap_chan_unlock(chan); + if (chan->state == BT_DISCONN || chan->state == BT_CLOSED) return; - } if (chan->state != BT_CONNECTED) { l2cap_do_create(chan, result, local_amp_id, remote_amp_id);