Received: by 2002:a05:6520:1682:b0:147:d1a0:b502 with SMTP id ck2csp5595056lkb; Mon, 11 Oct 2021 09:37:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy2wxskoOikVFKmMTrbhUbItOxQaCsrsWcPFeF23V4AeZ2HGonBhEyOg+L1i6tWAE5mijNs X-Received: by 2002:a17:902:e883:b0:13f:1393:d185 with SMTP id w3-20020a170902e88300b0013f1393d185mr20375909plg.64.1633970237967; Mon, 11 Oct 2021 09:37:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633970237; cv=none; d=google.com; s=arc-20160816; b=yjdx9LiD3ZIBNWrdFrpI8mQlcBPpxrhcjOMkDeu2d+llwwNnc5f/j01nEyTnA6Sk2D l7Nolwk3cKCBH0TG9UWk+nqHSQbs13+U9pkBvkDsSnwOsQ/atIUKTuYLu84DPUsQioGP RBxXB9jve+kkFMobNAG9w75I3dBdzk2ZvHKT584/C3F6GpVJsBKCdY4hN8mG4CsAPLRz zwLwUx9nI0ItqudGMzrNTU+CvY5YNxmHwifx4F+PWhlc0aMS3MlcZt+Gx/SCqbUtdiOO AaE1eu7M9AgQakZogXd0bkCrlryssDYA8eHYUBRoGiIlrJjZH063S7JqJg9Ci/ystdOn v0KQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=IYLgVlWjZPNd/YlGnoWBkEl1+OXxzOTMBtZ2jB31nQI=; b=JzTrqc3OhjTUxnw66my1Az0kWyYpEcc6p8d945YXySAcQie0Y8nMFk44PgCiPtiLnV pQwa4L+uuVCQCaV1TsE+D/oumqABkyUj2roOgrlk3jBUtd/ux0zKMtcJNmx3GRFXgoim 7YVHfUryfhRe1DXm4hsfzCstFrWi6dwmhZj3IyitLLQeBPfuxM3r9IEkOxK2am+KEb+2 m4ryoE3Rb4ZLFpLgeJnu3Fdn7TaIsMGVUxWWBD/bq4IfCG6LDDRdC5u3CpcApCKD7ikH 1ZzEECLelaDDtXqU4Vd6KihCWxsTFrF5cVsuw2islP36wOyc5ONfyttfbrQDLryCrRpe NxBg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=oHlkyDkm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y72si11482304pgd.63.2021.10.11.09.37.05; Mon, 11 Oct 2021 09:37:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=oHlkyDkm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238398AbhJKOPQ (ORCPT + 99 others); Mon, 11 Oct 2021 10:15:16 -0400 Received: from mail.kernel.org ([198.145.29.99]:35128 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239831AbhJKOM5 (ORCPT ); Mon, 11 Oct 2021 10:12:57 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 1C4B360F21; Mon, 11 Oct 2021 14:03:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1633961036; bh=Sa7aI8yrea0RsQR0jfcq3Sd19V1UsA6qiIfmHushLHY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=oHlkyDkmZ230AAFFCJJflBk7zZ6H1f+ofK6byszcne0DAtI0kcRJNyliMwULKtZUQ iiqh9dhOOig1q/D6f8dcwp+F5mEkhG75bh3XabUsI/4UFzeBj9c+oLjKMgQpwVOJPf Sv9Gnzeap6gylGyhclaK+66wJjMt+h0JWz2AS3FM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dan Carpenter , Stefan Assmann , Tony Nguyen , Sasha Levin Subject: [PATCH 5.14 116/151] iavf: fix double unlock of crit_lock Date: Mon, 11 Oct 2021 15:46:28 +0200 Message-Id: <20211011134521.564466672@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20211011134517.833565002@linuxfoundation.org> References: <20211011134517.833565002@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Stefan Assmann [ Upstream commit 54ee39439acd9f8b161703c6ad4f4e1835585277 ] The crit_lock mutex could be unlocked twice as reported here https://lists.osuosl.org/pipermail/intel-wired-lan/Week-of-Mon-20210823/025525.html Remove the superfluous unlock. Technically the problem was already present before 5ac49f3c2702 as that commit only replaced the locking primitive, but no functional change. Reported-by: Dan Carpenter Fixes: 5ac49f3c2702 ("iavf: use mutexes for locking of critical sections") Fixes: bac8486116b0 ("iavf: Refactor the watchdog state machine") Signed-off-by: Stefan Assmann Signed-off-by: Tony Nguyen Signed-off-by: Sasha Levin --- drivers/net/ethernet/intel/iavf/iavf_main.c | 1 - 1 file changed, 1 deletion(-) diff --git a/drivers/net/ethernet/intel/iavf/iavf_main.c b/drivers/net/ethernet/intel/iavf/iavf_main.c index 23762a7ef740..cada4e0e40b4 100644 --- a/drivers/net/ethernet/intel/iavf/iavf_main.c +++ b/drivers/net/ethernet/intel/iavf/iavf_main.c @@ -1965,7 +1965,6 @@ static void iavf_watchdog_task(struct work_struct *work) } adapter->aq_required = 0; adapter->current_op = VIRTCHNL_OP_UNKNOWN; - mutex_unlock(&adapter->crit_lock); queue_delayed_work(iavf_wq, &adapter->watchdog_task, msecs_to_jiffies(10)); -- 2.33.0