Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2666837imj; Mon, 11 Feb 2019 06:43:57 -0800 (PST) X-Google-Smtp-Source: AHgI3Ibb5PGcgjxXBGMEIcWQA0deEheSncQAGTpZbjO06o3pUcAVdtD88zu4LUwL2EgVlxOPHF1v X-Received: by 2002:a63:d842:: with SMTP id k2mr28139381pgj.8.1549896237649; Mon, 11 Feb 2019 06:43:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549896237; cv=none; d=google.com; s=arc-20160816; b=HkXDQULHnhxvi3mw5LdHpbuoEyBVbVGFRrJTS1rpJyX8J7xgaCJ9rWI50GufipgVxR NHKo6YALva9SnElHA81e4Xmd3w5+0vag60gBaJwr+/0uiVUMCJo4/9OEtWADVHJqi+XP VHt+Z7dP6f4hMFM0siOXEm9wZr9wphxP56/VvClTh0nti+RRb7wEy0HghBCHZdQDqRcx OySajuO/tSMVsE5nxUU3Hd3YrnHSubC56QlDflWkhlzI6PBjIYrA8lAdNNYpdmAv9KEY PvybEaBffZEpxyFoAvohIyZMQgAiH4bd50VBXUZx16YHh6VQsFBjFVj9ryJRmpR9u5LM bXYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=I7xr1M9h5wXwdOUR1mL+2Mr2edbzcFDfezQ5idGrC+Q=; b=JwLs2EJ3aVCTauxBi+R9S9GNSAfxbvD3d++6OiC7QAjUEbS+SwyrYL29r5KHG1/FyA bIU02RxfDhChfKQWh8D1wsUFubgntuJ8HhqcTz1mnxLgiGiSfWzGl0j8Y/3sT5fOo7pk 41bsJeFW+hswbo2v0O+TFP9voH2zXXX4tOI0CHlMXZoXVzsYKtFaiAKCveMVwMhEq+5B 9jFfsDoJ7KsUIoXXYIo4m/UuslZfHMWM0uYFHbOYNSbpzQsRo7QNRIcMpj0EE22RCPSy e0im+EjeRRibDMsaDtcdrqnQYNyE818EO8fG8QXdyjNdJI95EnOsaTBEJbAIlWIEWY3f vRQg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ex1xANE0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j14si7802786pgg.44.2019.02.11.06.43.40; Mon, 11 Feb 2019 06:43:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ex1xANE0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732255AbfBKOlc (ORCPT + 99 others); Mon, 11 Feb 2019 09:41:32 -0500 Received: from mail.kernel.org ([198.145.29.99]:52786 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732222AbfBKOlb (ORCPT ); Mon, 11 Feb 2019 09:41:31 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BF07320700; Mon, 11 Feb 2019 14:41:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1549896090; bh=Bb1NEyrgA5loNil8p1yXdNyS5pz97RQTEmH9kLDHW/k=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ex1xANE0OtpL0OXc7MUpbnHrgmoiUVNCSTQ5XrHjCzgyMhR06dR0RHecaSJGqwdbC 1Tcz2jRFZxAMeOtferQAADjfbO0PKJISFg8BrmJaVh5IyRWF0fa2saZYRpJv30sTdq cC4s7ZpcVg1py85riMUjWkvatsNp6de5OEa9hyrk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tiezhu Yang , Chao Yu , Jaegeuk Kim , Sasha Levin Subject: [PATCH 4.19 070/313] f2fs: fix wrong return value of f2fs_acl_create Date: Mon, 11 Feb 2019 15:15:50 +0100 Message-Id: <20190211141858.538745575@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190211141852.749630980@linuxfoundation.org> References: <20190211141852.749630980@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit f6176473a0c7472380eef72ebeb330cf9485bf0a ] When call f2fs_acl_create_masq() failed, the caller f2fs_acl_create() should return -EIO instead of -ENOMEM, this patch makes it consistent with posix_acl_create() which has been fixed in commit beaf226b863a ("posix_acl: don't ignore return value of posix_acl_create_masq()"). Fixes: 83dfe53c185e ("f2fs: fix reference leaks in f2fs_acl_create") Signed-off-by: Tiezhu Yang Reviewed-by: Chao Yu Signed-off-by: Jaegeuk Kim Signed-off-by: Sasha Levin --- fs/f2fs/acl.c | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/fs/f2fs/acl.c b/fs/f2fs/acl.c index 111824199a88..b9fe937a3c70 100644 --- a/fs/f2fs/acl.c +++ b/fs/f2fs/acl.c @@ -352,12 +352,14 @@ static int f2fs_acl_create(struct inode *dir, umode_t *mode, return PTR_ERR(p); clone = f2fs_acl_clone(p, GFP_NOFS); - if (!clone) - goto no_mem; + if (!clone) { + ret = -ENOMEM; + goto release_acl; + } ret = f2fs_acl_create_masq(clone, mode); if (ret < 0) - goto no_mem_clone; + goto release_clone; if (ret == 0) posix_acl_release(clone); @@ -371,11 +373,11 @@ static int f2fs_acl_create(struct inode *dir, umode_t *mode, return 0; -no_mem_clone: +release_clone: posix_acl_release(clone); -no_mem: +release_acl: posix_acl_release(p); - return -ENOMEM; + return ret; } int f2fs_init_acl(struct inode *inode, struct inode *dir, struct page *ipage, -- 2.19.1