Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2731864imj; Mon, 11 Feb 2019 07:39:51 -0800 (PST) X-Google-Smtp-Source: AHgI3IakBkSwfLXNUTTpAOQCYMcfRI8kt+c+kSZCWgqdmtvEmtVUmb0uk1MCrEY3gJPuUcQQxYYZ X-Received: by 2002:a17:902:4681:: with SMTP id p1mr39045717pld.184.1549899591744; Mon, 11 Feb 2019 07:39:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549899591; cv=none; d=google.com; s=arc-20160816; b=lyOhuFdosh31GL9l0aUafUV7X4CaPJKMq1rBzwmoyTf0N8X+uVYRBrEDSOp2ItTg1c jtPXaTmw6RPpr+oWqVDuZp/flcMximhQOBwJDqxdm3QZUNzsle91sGz7WKa9kfts/FHz MhgMOy6y1eNZfnQ5eDQHDCsCeDibZoMVKXjjnSy5z13mIhVRllryPGYJeZbilRECsgDe a60RcCIlQQUd6GvD6dckvZH3Z3aXDI4r7ItGTj2UK78HVqk+pUdicjRJs6BSXY0qjiY6 /Ra9+Bx3kDxL9Rm2zn+R6CS/vC/Bo7AnqQqP06S8ULqxw6CRMVJBBg1zJWJ3KLvYPJjY xrAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=EHivkOY1VE3Uzyl66C0IuQYW4oKTApOpl9aTubzXOXg=; b=rIOePXwbt898/Z+cS60lbe+TTF9+Bb44GK/ak0fcssNBFTtZ3gmg7hLdb4Xzom2doK ZlmsKmuHIcwPJq8XZJiSj/uANS1zlvFyiPE6EN3oyl5HgxwUhjw0Y7vvcvdsXbJ1GYeN +DwcPBKptzZ+dRuchUqD+kN18TqT/fgHuHgQ6o3hGAEiB2NbhYeMFqB6IFw6hOs6ZVnL Xr12/66goSSmF21KJbCU6/S0rdjOtw5nblDbE3E+3f51N0gQ+e4VOtavflhI4h+4n4st JYbvbhvUdCceWLZpjK0Nvv6ys8F4Vcm20LFUeZrrUXfwkGTqyGPbgEYdUg983itleS8y n+1Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2AU9tIJI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p66si10667476pfp.144.2019.02.11.07.39.35; Mon, 11 Feb 2019 07:39:51 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2AU9tIJI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388193AbfBKOvD (ORCPT + 99 others); Mon, 11 Feb 2019 09:51:03 -0500 Received: from mail.kernel.org ([198.145.29.99]:36976 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387775AbfBKOu6 (ORCPT ); Mon, 11 Feb 2019 09:50:58 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6DCC22081B; Mon, 11 Feb 2019 14:50:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1549896657; bh=hhDSW1lFIIPVssCJeMVCjgY2Dcajb/kRSLhGisWVbtU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2AU9tIJIQocJetrRMoxSHU+Qh1er2SUkP26P+0boDZSY493uinzipL5BjknsNTtAB DqWsu4krDjDyEf/aI6ZbWBBfCnn+1pTVT97z0JyHWO1FBjxFApTFhJ7tpEnaKqgG3V s5Pawx2RdQvS2YmvcdUW3zDyEFbug0PX4B1O+JyE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Christophe JAILLET , Christoph Hellwig , "Darrick J. Wong" , Luis Chamberlain , Sasha Levin Subject: [PATCH 4.19 250/313] xfs: Fix error code in xfs_ioc_getbmap() Date: Mon, 11 Feb 2019 15:18:50 +0100 Message-Id: <20190211141910.046563451@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190211141852.749630980@linuxfoundation.org> References: <20190211141852.749630980@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ commit 132bf6723749f7219c399831eeb286dbbb985429 upstream. In this function, once 'buf' has been allocated, we unconditionally return 0. However, 'error' is set to some error codes in several error handling paths. Before commit 232b51948b99 ("xfs: simplify the xfs_getbmap interface") this was not an issue because all error paths were returning directly, but now that some cleanup at the end may be needed, we must propagate the error code. Fixes: 232b51948b99 ("xfs: simplify the xfs_getbmap interface") Signed-off-by: Christophe JAILLET Reviewed-by: Christoph Hellwig Reviewed-by: Darrick J. Wong Signed-off-by: Darrick J. Wong Signed-off-by: Luis Chamberlain Signed-off-by: Sasha Levin --- fs/xfs/xfs_ioctl.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/fs/xfs/xfs_ioctl.c b/fs/xfs/xfs_ioctl.c index 0ef5ece5634c..bad90479ade2 100644 --- a/fs/xfs/xfs_ioctl.c +++ b/fs/xfs/xfs_ioctl.c @@ -1616,7 +1616,7 @@ xfs_ioc_getbmap( error = 0; out_free_buf: kmem_free(buf); - return 0; + return error; } struct getfsmap_info { -- 2.19.1