[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <202301050409.DGc5CuDh-lkp@intel.com>
Date: Thu, 5 Jan 2023 07:27:59 +0300
From: Dan Carpenter <error27@...il.com>
To: oe-kbuild@...ts.linux.dev, Vasily Averin <vvs@...tuozzo.com>
Cc: lkp@...el.com, oe-kbuild-all@...ts.linux.dev,
linux-kernel@...r.kernel.org, Chuck Lever <chuck.lever@...cle.com>,
Jeff Layton <jlayton@...nel.org>
Subject: fs/nfsd/nfs4state.c:7045 nfsd4_lock() error: double free of 'nbl'
tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head: 69b41ac87e4a664de78a395ff97166f0b2943210
commit: 47446d74f1707049067fee038507cdffda805631 nfsd4: add refcount for nfsd4_blocked_lock
config: i386-randconfig-m021-20230102
compiler: gcc-11 (Debian 11.3.0-8) 11.3.0
If you fix the issue, kindly add following tag where applicable
| Reported-by: kernel test robot <lkp@...el.com>
| Reported-by: Dan Carpenter <error27@...il.com>
New smatch warnings:
fs/nfsd/nfs4state.c:7045 nfsd4_lock() error: double free of 'nbl'
Old smatch warnings:
fs/nfsd/nfs4state.c:6744 init_lock_stateid() warn: inconsistent returns '&stp->st_mutex'.
vim +/nbl +7045 fs/nfsd/nfs4state.c
b37ad28bcaa7c4 Al Viro 2006-10-19 6843 __be32
ca3643171bc6e0 J.Bruce Fields 2006-12-13 6844 nfsd4_lock(struct svc_rqst *rqstp, struct nfsd4_compound_state *cstate,
eb69853da94592 Christoph Hellwig 2017-05-08 6845 union nfsd4_op_u *u)
^1da177e4c3f41 Linus Torvalds 2005-04-16 6846 {
eb69853da94592 Christoph Hellwig 2017-05-08 6847 struct nfsd4_lock *lock = &u->lock;
fe0750e5c43189 J. Bruce Fields 2011-07-30 6848 struct nfs4_openowner *open_sop = NULL;
fe0750e5c43189 J. Bruce Fields 2011-07-30 6849 struct nfs4_lockowner *lock_sop = NULL;
3d0fabd5a48fbf Trond Myklebust 2014-07-29 6850 struct nfs4_ol_stateid *lock_stp = NULL;
0667b1e9d8a7c0 Trond Myklebust 2014-07-29 6851 struct nfs4_ol_stateid *open_stp = NULL;
7214e8600eee14 Jeff Layton 2014-07-10 6852 struct nfs4_file *fp;
eb82dd39374410 Jeff Layton 2019-08-18 6853 struct nfsd_file *nf = NULL;
76d348fadff52e Jeff Layton 2016-09-16 6854 struct nfsd4_blocked_lock *nbl = NULL;
21179d81f1de37 Jeff Layton 2012-08-21 6855 struct file_lock *file_lock = NULL;
21179d81f1de37 Jeff Layton 2012-08-21 6856 struct file_lock *conflock = NULL;
b37ad28bcaa7c4 Al Viro 2006-10-19 6857 __be32 status = 0;
b34f27aa5da75b J. Bruce Fields 2011-08-22 6858 int lkflg;
b8dd7b9ab194d9 Al Viro 2006-10-19 6859 int err;
5db1c03feb00a7 Jeff Layton 2014-07-29 6860 bool new = false;
76d348fadff52e Jeff Layton 2016-09-16 6861 unsigned char fl_type;
76d348fadff52e Jeff Layton 2016-09-16 6862 unsigned int fl_flags = FL_POSIX;
3320fef19b542b Stanislav Kinsbursky 2012-11-14 6863 struct net *net = SVC_NET(rqstp);
3320fef19b542b Stanislav Kinsbursky 2012-11-14 6864 struct nfsd_net *nn = net_generic(net, nfsd_net_id);
^1da177e4c3f41 Linus Torvalds 2005-04-16 6865
^1da177e4c3f41 Linus Torvalds 2005-04-16 6866 dprintk("NFSD: nfsd4_lock: start=%Ld length=%Ld\n",
^1da177e4c3f41 Linus Torvalds 2005-04-16 6867 (long long) lock->lk_offset,
^1da177e4c3f41 Linus Torvalds 2005-04-16 6868 (long long) lock->lk_length);
^1da177e4c3f41 Linus Torvalds 2005-04-16 6869
^1da177e4c3f41 Linus Torvalds 2005-04-16 6870 if (check_lock_length(lock->lk_offset, lock->lk_length))
^1da177e4c3f41 Linus Torvalds 2005-04-16 6871 return nfserr_inval;
^1da177e4c3f41 Linus Torvalds 2005-04-16 6872
ca3643171bc6e0 J.Bruce Fields 2006-12-13 6873 if ((status = fh_verify(rqstp, &cstate->current_fh,
8837abcab3d166 Miklos Szeredi 2008-06-16 6874 S_IFREG, NFSD_MAY_LOCK))) {
a6f6ef2f1d7329 Andy Adamson 2006-01-18 6875 dprintk("NFSD: nfsd4_lock: permission denied!\n");
a6f6ef2f1d7329 Andy Adamson 2006-01-18 6876 return status;
a6f6ef2f1d7329 Andy Adamson 2006-01-18 6877 }
a6f6ef2f1d7329 Andy Adamson 2006-01-18 6878
^1da177e4c3f41 Linus Torvalds 2005-04-16 6879 if (lock->lk_is_new) {
684e563858018d J. Bruce Fields 2011-11-04 6880 if (nfsd4_has_session(cstate))
684e563858018d J. Bruce Fields 2011-11-04 6881 /* See rfc 5661 18.10.3: given clientid is ignored: */
76f6c9e176dda6 Kinglong Mee 2015-07-13 6882 memcpy(&lock->lk_new_clientid,
ec59659b4972ec J. Bruce Fields 2021-01-21 6883 &cstate->clp->cl_clientid,
684e563858018d J. Bruce Fields 2011-11-04 6884 sizeof(clientid_t));
684e563858018d J. Bruce Fields 2011-11-04 6885
^1da177e4c3f41 Linus Torvalds 2005-04-16 6886 /* validate and update open stateid and open seqid */
c0a5d93efbbb79 J. Bruce Fields 2011-09-06 6887 status = nfs4_preprocess_confirmed_seqid_op(cstate,
^1da177e4c3f41 Linus Torvalds 2005-04-16 6888 lock->lk_new_open_seqid,
^1da177e4c3f41 Linus Torvalds 2005-04-16 6889 &lock->lk_new_open_stateid,
3320fef19b542b Stanislav Kinsbursky 2012-11-14 6890 &open_stp, nn);
375151773125f5 NeilBrown 2005-07-07 6891 if (status)
^1da177e4c3f41 Linus Torvalds 2005-04-16 6892 goto out;
feb9dad5209280 Oleg Drokin 2016-06-14 6893 mutex_unlock(&open_stp->st_mutex);
fe0750e5c43189 J. Bruce Fields 2011-07-30 6894 open_sop = openowner(open_stp->st_stateowner);
b34f27aa5da75b J. Bruce Fields 2011-08-22 6895 status = nfserr_bad_stateid;
684e563858018d J. Bruce Fields 2011-11-04 6896 if (!same_clid(&open_sop->oo_owner.so_client->cl_clientid,
76f6c9e176dda6 Kinglong Mee 2015-07-13 6897 &lock->lk_new_clientid))
b34f27aa5da75b J. Bruce Fields 2011-08-22 6898 goto out;
64a284d07c7d84 J. Bruce Fields 2011-10-20 6899 status = lookup_or_create_lock_state(cstate, open_stp, lock,
5db1c03feb00a7 Jeff Layton 2014-07-29 6900 &lock_stp, &new);
3d0fabd5a48fbf Trond Myklebust 2014-07-29 6901 } else {
dd453dfd70538c Benny Halevy 2009-04-03 6902 status = nfs4_preprocess_seqid_op(cstate,
^1da177e4c3f41 Linus Torvalds 2005-04-16 6903 lock->lk_old_lock_seqid,
^1da177e4c3f41 Linus Torvalds 2005-04-16 6904 &lock->lk_old_lock_stateid,
3320fef19b542b Stanislav Kinsbursky 2012-11-14 6905 NFS4_LOCK_STID, &lock_stp, nn);
3d0fabd5a48fbf Trond Myklebust 2014-07-29 6906 }
^1da177e4c3f41 Linus Torvalds 2005-04-16 6907 if (status)
^1da177e4c3f41 Linus Torvalds 2005-04-16 6908 goto out;
fe0750e5c43189 J. Bruce Fields 2011-07-30 6909 lock_sop = lockowner(lock_stp->st_stateowner);
^1da177e4c3f41 Linus Torvalds 2005-04-16 6910
b34f27aa5da75b J. Bruce Fields 2011-08-22 6911 lkflg = setlkflg(lock->lk_type);
b34f27aa5da75b J. Bruce Fields 2011-08-22 6912 status = nfs4_check_openmode(lock_stp, lkflg);
b34f27aa5da75b J. Bruce Fields 2011-08-22 6913 if (status)
b34f27aa5da75b J. Bruce Fields 2011-08-22 6914 goto out;
b34f27aa5da75b J. Bruce Fields 2011-08-22 6915
0dd395dc76071a NeilBrown 2005-07-07 6916 status = nfserr_grace;
3320fef19b542b Stanislav Kinsbursky 2012-11-14 6917 if (locks_in_grace(net) && !lock->lk_reclaim)
0dd395dc76071a NeilBrown 2005-07-07 6918 goto out;
0dd395dc76071a NeilBrown 2005-07-07 6919 status = nfserr_no_grace;
3320fef19b542b Stanislav Kinsbursky 2012-11-14 6920 if (!locks_in_grace(net) && lock->lk_reclaim)
0dd395dc76071a NeilBrown 2005-07-07 6921 goto out;
0dd395dc76071a NeilBrown 2005-07-07 6922
bb0a55bb7148a4 J. Bruce Fields 2021-08-20 6923 if (lock->lk_reclaim)
bb0a55bb7148a4 J. Bruce Fields 2021-08-20 6924 fl_flags |= FL_RECLAIM;
bb0a55bb7148a4 J. Bruce Fields 2021-08-20 6925
11b9164adad7cd Trond Myklebust 2014-07-29 6926 fp = lock_stp->st_stid.sc_file;
^1da177e4c3f41 Linus Torvalds 2005-04-16 6927 switch (lock->lk_type) {
^1da177e4c3f41 Linus Torvalds 2005-04-16 6928 case NFS4_READW_LT:
40595cdc93edf4 J. Bruce Fields 2021-12-16 6929 if (nfsd4_has_session(cstate))
76d348fadff52e Jeff Layton 2016-09-16 6930 fl_flags |= FL_SLEEP;
df561f6688fef7 Gustavo A. R. Silva 2020-08-23 6931 fallthrough;
76d348fadff52e Jeff Layton 2016-09-16 6932 case NFS4_READ_LT:
7214e8600eee14 Jeff Layton 2014-07-10 6933 spin_lock(&fp->fi_lock);
eb82dd39374410 Jeff Layton 2019-08-18 6934 nf = find_readable_file_locked(fp);
eb82dd39374410 Jeff Layton 2019-08-18 6935 if (nf)
0997b173609b92 J. Bruce Fields 2011-03-02 6936 get_lock_access(lock_stp, NFS4_SHARE_ACCESS_READ);
7214e8600eee14 Jeff Layton 2014-07-10 6937 spin_unlock(&fp->fi_lock);
76d348fadff52e Jeff Layton 2016-09-16 6938 fl_type = F_RDLCK;
^1da177e4c3f41 Linus Torvalds 2005-04-16 6939 break;
^1da177e4c3f41 Linus Torvalds 2005-04-16 6940 case NFS4_WRITEW_LT:
40595cdc93edf4 J. Bruce Fields 2021-12-16 6941 if (nfsd4_has_session(cstate))
76d348fadff52e Jeff Layton 2016-09-16 6942 fl_flags |= FL_SLEEP;
df561f6688fef7 Gustavo A. R. Silva 2020-08-23 6943 fallthrough;
76d348fadff52e Jeff Layton 2016-09-16 6944 case NFS4_WRITE_LT:
7214e8600eee14 Jeff Layton 2014-07-10 6945 spin_lock(&fp->fi_lock);
eb82dd39374410 Jeff Layton 2019-08-18 6946 nf = find_writeable_file_locked(fp);
eb82dd39374410 Jeff Layton 2019-08-18 6947 if (nf)
0997b173609b92 J. Bruce Fields 2011-03-02 6948 get_lock_access(lock_stp, NFS4_SHARE_ACCESS_WRITE);
7214e8600eee14 Jeff Layton 2014-07-10 6949 spin_unlock(&fp->fi_lock);
76d348fadff52e Jeff Layton 2016-09-16 6950 fl_type = F_WRLCK;
^1da177e4c3f41 Linus Torvalds 2005-04-16 6951 break;
^1da177e4c3f41 Linus Torvalds 2005-04-16 6952 default:
^1da177e4c3f41 Linus Torvalds 2005-04-16 6953 status = nfserr_inval;
^1da177e4c3f41 Linus Torvalds 2005-04-16 6954 goto out;
^1da177e4c3f41 Linus Torvalds 2005-04-16 6955 }
76d348fadff52e Jeff Layton 2016-09-16 6956
eb82dd39374410 Jeff Layton 2019-08-18 6957 if (!nf) {
f9d7562fdb9dc0 J. Bruce Fields 2010-07-08 6958 status = nfserr_openmode;
f9d7562fdb9dc0 J. Bruce Fields 2010-07-08 6959 goto out;
f9d7562fdb9dc0 J. Bruce Fields 2010-07-08 6960 }
aef9583b234a4e Kinglong Mee 2014-08-22 6961
40595cdc93edf4 J. Bruce Fields 2021-12-16 6962 /*
40595cdc93edf4 J. Bruce Fields 2021-12-16 6963 * Most filesystems with their own ->lock operations will block
40595cdc93edf4 J. Bruce Fields 2021-12-16 6964 * the nfsd thread waiting to acquire the lock. That leads to
40595cdc93edf4 J. Bruce Fields 2021-12-16 6965 * deadlocks (we don't want every nfsd thread tied up waiting
40595cdc93edf4 J. Bruce Fields 2021-12-16 6966 * for file locks), so don't attempt blocking lock notifications
40595cdc93edf4 J. Bruce Fields 2021-12-16 6967 * on those filesystems:
40595cdc93edf4 J. Bruce Fields 2021-12-16 6968 */
40595cdc93edf4 J. Bruce Fields 2021-12-16 6969 if (nf->nf_file->f_op->lock)
40595cdc93edf4 J. Bruce Fields 2021-12-16 6970 fl_flags &= ~FL_SLEEP;
40595cdc93edf4 J. Bruce Fields 2021-12-16 6971
76d348fadff52e Jeff Layton 2016-09-16 6972 nbl = find_or_allocate_block(lock_sop, &fp->fi_fhandle, nn);
76d348fadff52e Jeff Layton 2016-09-16 6973 if (!nbl) {
76d348fadff52e Jeff Layton 2016-09-16 6974 dprintk("NFSD: %s: unable to allocate block!\n", __func__);
76d348fadff52e Jeff Layton 2016-09-16 6975 status = nfserr_jukebox;
76d348fadff52e Jeff Layton 2016-09-16 6976 goto out;
76d348fadff52e Jeff Layton 2016-09-16 6977 }
76d348fadff52e Jeff Layton 2016-09-16 6978
76d348fadff52e Jeff Layton 2016-09-16 6979 file_lock = &nbl->nbl_lock;
76d348fadff52e Jeff Layton 2016-09-16 6980 file_lock->fl_type = fl_type;
aef9583b234a4e Kinglong Mee 2014-08-22 6981 file_lock->fl_owner = (fl_owner_t)lockowner(nfs4_get_stateowner(&lock_sop->lo_owner));
21179d81f1de37 Jeff Layton 2012-08-21 6982 file_lock->fl_pid = current->tgid;
eb82dd39374410 Jeff Layton 2019-08-18 6983 file_lock->fl_file = nf->nf_file;
76d348fadff52e Jeff Layton 2016-09-16 6984 file_lock->fl_flags = fl_flags;
21179d81f1de37 Jeff Layton 2012-08-21 6985 file_lock->fl_lmops = &nfsd_posix_mng_ops;
21179d81f1de37 Jeff Layton 2012-08-21 6986 file_lock->fl_start = lock->lk_offset;
21179d81f1de37 Jeff Layton 2012-08-21 6987 file_lock->fl_end = last_byte_offset(lock->lk_offset, lock->lk_length);
21179d81f1de37 Jeff Layton 2012-08-21 6988 nfs4_transform_lock_offset(file_lock);
21179d81f1de37 Jeff Layton 2012-08-21 6989
21179d81f1de37 Jeff Layton 2012-08-21 6990 conflock = locks_alloc_lock();
21179d81f1de37 Jeff Layton 2012-08-21 6991 if (!conflock) {
21179d81f1de37 Jeff Layton 2012-08-21 6992 dprintk("NFSD: %s: unable to allocate lock!\n", __func__);
21179d81f1de37 Jeff Layton 2012-08-21 6993 status = nfserr_jukebox;
21179d81f1de37 Jeff Layton 2012-08-21 6994 goto out;
21179d81f1de37 Jeff Layton 2012-08-21 6995 }
^1da177e4c3f41 Linus Torvalds 2005-04-16 6996
76d348fadff52e Jeff Layton 2016-09-16 6997 if (fl_flags & FL_SLEEP) {
20b7d86f29d39e Arnd Bergmann 2019-11-04 6998 nbl->nbl_time = ktime_get_boottime_seconds();
0cc11a61b80a1a Jeff Layton 2016-10-20 6999 spin_lock(&nn->blocked_locks_lock);
76d348fadff52e Jeff Layton 2016-09-16 7000 list_add_tail(&nbl->nbl_list, &lock_sop->lo_blocked);
7919d0a27f1e7c Jeff Layton 2016-09-16 7001 list_add_tail(&nbl->nbl_lru, &nn->blocked_locks_lru);
47446d74f17070 Vasily Averin 2021-12-17 7002 kref_get(&nbl->nbl_kref);
0cc11a61b80a1a Jeff Layton 2016-10-20 7003 spin_unlock(&nn->blocked_locks_lock);
76d348fadff52e Jeff Layton 2016-09-16 7004 }
76d348fadff52e Jeff Layton 2016-09-16 7005
eb82dd39374410 Jeff Layton 2019-08-18 7006 err = vfs_lock_file(nf->nf_file, F_SETLK, file_lock, conflock);
76d348fadff52e Jeff Layton 2016-09-16 7007 switch (err) {
^1da177e4c3f41 Linus Torvalds 2005-04-16 7008 case 0: /* success! */
9767feb2c64b29 Jeff Layton 2015-10-01 7009 nfs4_inc_and_copy_stateid(&lock->lk_resp_stateid, &lock_stp->st_stid);
b8dd7b9ab194d9 Al Viro 2006-10-19 7010 status = 0;
03f318ca652889 J. Bruce Fields 2018-06-08 7011 if (lock->lk_reclaim)
03f318ca652889 J. Bruce Fields 2018-06-08 7012 nn->somebody_reclaimed = true;
eb76b3fda1f7c2 Andy Adamson 2006-03-26 7013 break;
76d348fadff52e Jeff Layton 2016-09-16 7014 case FILE_LOCK_DEFERRED:
47446d74f17070 Vasily Averin 2021-12-17 7015 kref_put(&nbl->nbl_kref, free_nbl);
76d348fadff52e Jeff Layton 2016-09-16 7016 nbl = NULL;
df561f6688fef7 Gustavo A. R. Silva 2020-08-23 7017 fallthrough;
76d348fadff52e Jeff Layton 2016-09-16 7018 case -EAGAIN: /* conflock holds conflicting lock */
eb76b3fda1f7c2 Andy Adamson 2006-03-26 7019 status = nfserr_denied;
eb76b3fda1f7c2 Andy Adamson 2006-03-26 7020 dprintk("NFSD: nfsd4_lock: conflicting lock found!\n");
21179d81f1de37 Jeff Layton 2012-08-21 7021 nfs4_set_lock_denied(conflock, &lock->lk_denied);
eb76b3fda1f7c2 Andy Adamson 2006-03-26 7022 break;
76d348fadff52e Jeff Layton 2016-09-16 7023 case -EDEADLK:
^1da177e4c3f41 Linus Torvalds 2005-04-16 7024 status = nfserr_deadlock;
eb76b3fda1f7c2 Andy Adamson 2006-03-26 7025 break;
^1da177e4c3f41 Linus Torvalds 2005-04-16 7026 default:
fd85b8170dabbf Marc Eshel 2006-11-28 7027 dprintk("NFSD: nfsd4_lock: vfs_lock_file() failed! status %d\n",err);
3e77246393c0a4 J. Bruce Fields 2011-08-10 7028 status = nfserrno(err);
eb76b3fda1f7c2 Andy Adamson 2006-03-26 7029 break;
^1da177e4c3f41 Linus Torvalds 2005-04-16 7030 }
^1da177e4c3f41 Linus Torvalds 2005-04-16 7031 out:
76d348fadff52e Jeff Layton 2016-09-16 7032 if (nbl) {
76d348fadff52e Jeff Layton 2016-09-16 7033 /* dequeue it if we queued it before */
76d348fadff52e Jeff Layton 2016-09-16 7034 if (fl_flags & FL_SLEEP) {
0cc11a61b80a1a Jeff Layton 2016-10-20 7035 spin_lock(&nn->blocked_locks_lock);
47446d74f17070 Vasily Averin 2021-12-17 7036 if (!list_empty(&nbl->nbl_list) &&
47446d74f17070 Vasily Averin 2021-12-17 7037 !list_empty(&nbl->nbl_lru)) {
76d348fadff52e Jeff Layton 2016-09-16 7038 list_del_init(&nbl->nbl_list);
7919d0a27f1e7c Jeff Layton 2016-09-16 7039 list_del_init(&nbl->nbl_lru);
47446d74f17070 Vasily Averin 2021-12-17 7040 kref_put(&nbl->nbl_kref, free_nbl);
This looks like a free? The test tries to take refcounting into
consideration but I've also advocated for a NOP kref function if
we know that free_nbl() cannot be called here.
47446d74f17070 Vasily Averin 2021-12-17 7041 }
47446d74f17070 Vasily Averin 2021-12-17 7042 /* nbl can use one of lists to be linked to reaplist */
0cc11a61b80a1a Jeff Layton 2016-10-20 7043 spin_unlock(&nn->blocked_locks_lock);
76d348fadff52e Jeff Layton 2016-09-16 7044 }
76d348fadff52e Jeff Layton 2016-09-16 @7045 free_blocked_lock(nbl);
Double free.
76d348fadff52e Jeff Layton 2016-09-16 7046 }
eb82dd39374410 Jeff Layton 2019-08-18 7047 if (nf)
eb82dd39374410 Jeff Layton 2019-08-18 7048 nfsd_file_put(nf);
5db1c03feb00a7 Jeff Layton 2014-07-29 7049 if (lock_stp) {
5db1c03feb00a7 Jeff Layton 2014-07-29 7050 /* Bump seqid manually if the 4.0 replay owner is openowner */
5db1c03feb00a7 Jeff Layton 2014-07-29 7051 if (cstate->replay_owner &&
5db1c03feb00a7 Jeff Layton 2014-07-29 7052 cstate->replay_owner != &lock_sop->lo_owner &&
5db1c03feb00a7 Jeff Layton 2014-07-29 7053 seqid_mutating_err(ntohl(status)))
5db1c03feb00a7 Jeff Layton 2014-07-29 7054 lock_sop->lo_owner.so_seqid++;
5db1c03feb00a7 Jeff Layton 2014-07-29 7055
5db1c03feb00a7 Jeff Layton 2014-07-29 7056 /*
5db1c03feb00a7 Jeff Layton 2014-07-29 7057 * If this is a new, never-before-used stateid, and we are
5db1c03feb00a7 Jeff Layton 2014-07-29 7058 * returning an error, then just go ahead and release it.
5db1c03feb00a7 Jeff Layton 2014-07-29 7059 */
2502072058b35e J. Bruce Fields 2018-01-17 7060 if (status && new)
5db1c03feb00a7 Jeff Layton 2014-07-29 7061 release_lock_stateid(lock_stp);
beeca19cf1249a Trond Myklebust 2017-11-03 7062
beeca19cf1249a Trond Myklebust 2017-11-03 7063 mutex_unlock(&lock_stp->st_mutex);
5db1c03feb00a7 Jeff Layton 2014-07-29 7064
3d0fabd5a48fbf Trond Myklebust 2014-07-29 7065 nfs4_put_stid(&lock_stp->st_stid);
5db1c03feb00a7 Jeff Layton 2014-07-29 7066 }
0667b1e9d8a7c0 Trond Myklebust 2014-07-29 7067 if (open_stp)
0667b1e9d8a7c0 Trond Myklebust 2014-07-29 7068 nfs4_put_stid(&open_stp->st_stid);
9411b1d4c7df26 J. Bruce Fields 2013-04-01 7069 nfsd4_bump_seqid(cstate, status);
21179d81f1de37 Jeff Layton 2012-08-21 7070 if (conflock)
21179d81f1de37 Jeff Layton 2012-08-21 7071 locks_free_lock(conflock);
^1da177e4c3f41 Linus Torvalds 2005-04-16 7072 return status;
^1da177e4c3f41 Linus Torvalds 2005-04-16 7073 }
--
0-DAY CI Kernel Test Service
https://01.org/lkp
Powered by blists - more mailing lists