Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2352848imm; Thu, 23 Aug 2018 20:10:59 -0700 (PDT) X-Google-Smtp-Source: ANB0Vdb4aZGQ4f2dAuZY5D8EOokXAjpBCJ2KgUYb/OqYJolSMBC9isYzdmfGKfl3fkNx3FuxCL/j X-Received: by 2002:a17:902:a413:: with SMTP id p19-v6mr5003645plq.220.1535080258950; Thu, 23 Aug 2018 20:10:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535080258; cv=none; d=google.com; s=arc-20160816; b=UCd09mCqEpRwQj2RNMPeIRCyy8A5RdpyG6Ou+BCLtrD38ojA5kqxrrBW9dk9s+eQ2l obvNkSbPYGydPvdMU6vlR+Nie3F+BB0I4sECCkLDMSV//Fm0W1ooG5Myv+7UmqpHdBh+ Ps3fL4hIfIn2VCGzbA7NvNr28MhQcOWQOEDIJ+cviDHmBlM396UnA7IIHRiTQO9UJNpT WVQf9eCqA625ZX7SyuK7xuD7Wx3rScXbEWpaRhS6+q1YeEl4SPDH2ubzUT4Ln5L/Zyt2 OByXv6AwNzmWiqmRq/Z4d7Ufkd8swjNEXnyHIW14MpycbdkzGBx2BtNJpfHPvoSZ869P e0uA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=LQWrw/m7+3uLXINxib+sSibybgzvHKW/2oqI6Ix9NuA=; b=Y+bnZYy5a1PR7zkLOyESY/wHgkWZLx/eJklmI+pHs3AKRe+73Lchr7VMYhXAF2nkH6 Pco8oLjfY6ZBUM/5+nm6YejHIbCcMezciqz9ervQ7/DMxgnAFTiUGabnMfRdeEcDL3fu oqaOBoHdjtE1Cdabmc84rW5lqefxW3ENuCSS2R5KLwnKfNxj0onCSr+ANYW3BdAeUEOC C+9SVaQm9OPKbxUCmPY8fERzS8jKaRpE1CXrVhkp2Z/ek40r7Fm7pun2FBvjKp2aQxs7 m2vbxCaCs+NlIsIhOwhNAboOytm8s1jqzkYJxlmJhixdlM69KXDMmCJxWbJU0OWkrRKR X2vA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m1-v6si5546366plb.348.2018.08.23.20.10.42; Thu, 23 Aug 2018 20:10:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726972AbeHXGmN (ORCPT + 99 others); Fri, 24 Aug 2018 02:42:13 -0400 Received: from mx2.suse.de ([195.135.220.15]:48244 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726140AbeHXGmN (ORCPT ); Fri, 24 Aug 2018 02:42:13 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 4AE85AF3A; Fri, 24 Aug 2018 03:09:34 +0000 (UTC) Date: Thu, 23 Aug 2018 20:09:20 -0700 From: Davidlohr Bueso To: kernel test robot Cc: Stephen Rothwell , Davidlohr Bueso , Manfred Spraul , Dmitry Vyukov , Herbert Xu , Kees Cook , Michael Kerrisk , Michal Hocko , Andrew Morton , LKML , lkp@01.org, ltp@lists.linux.it Subject: [PATCH] ipc/shm: properly return EIDRM in shm_lock() Message-ID: <20180824030920.GD3677@linux-r8p5> References: <20180823024051.GC13343@shao2-debian> <20180823041434.GC3677@linux-r8p5> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <20180823041434.GC3677@linux-r8p5> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When getting rid of the general ipc_lock(), this was missed furthermore, making the comment around the ipc object validity check bogus. Under EIDRM conditions, callers will in turn not see the error and continue with the operation. Fixes: 82061c57ce9 (ipc: drop ipc_lock()) Signed-off-by: Davidlohr Bueso --- ipc/shm.c | 1 + 1 file changed, 1 insertion(+) diff --git a/ipc/shm.c b/ipc/shm.c index b0eb3757ab89..4cd402e4cfeb 100644 --- a/ipc/shm.c +++ b/ipc/shm.c @@ -199,6 +199,7 @@ static inline struct shmid_kernel *shm_lock(struct ipc_namespace *ns, int id) } ipc_unlock_object(ipcp); + ipcp = ERR_PTR(-EIDRM); err: rcu_read_unlock(); /* -- 2.16.4