Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp695882imj; Wed, 13 Feb 2019 15:57:32 -0800 (PST) X-Google-Smtp-Source: AHgI3Iav/KiQLta4RMt3n/Nz4+KumSqO6lgsfyMaSrufvvU88if5v6rZ8KlyVTEDaq1rqjtVY4Tz X-Received: by 2002:a63:e915:: with SMTP id i21mr756744pgh.409.1550102252674; Wed, 13 Feb 2019 15:57:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550102252; cv=none; d=google.com; s=arc-20160816; b=kqZ5qRSEPZDorKqZDVmG/qlxYRgWKxOdJjY8pmf9SFsYoB7vGdTdxXeXb0y6RYoyLp Zc8uNp/RsPqXrkQ2foVO9PUggBQc1mpcrasLpUDGKEeuMlB3aRaAZF7fjdGatWYKY5CO DREeA5ZzSRAh+JZAoH/kl48YyimfU+3a+vriDCAn2U8owYXj9H9YSSmgc2Xtd24DM1Li hirk9LwNwWsSWq/5126BdKipI2HbwdjbP3WdxJgQOdzsnQxYKdUq5th9Y8rGcWwTL0YA W2z4FJROeXpROFPnUoCr8LIprTXBprbASG10dXfrItcgH7WT4Eb2ufwOCC5Z74d1YaId 9qyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JftTB8BGyhbqnO7JvKLfHut6FQytbwdrz4iReH6mPXw=; b=DTFDnafLiPFMoYrVkUNc9uhWLEt2vQ6fURJQDKLo03GZb1+uWYL7F7INxF9Y0W1LY4 pwckpJKTpDp5xdUv5QJ0bvu5P6PSNEl/PT3qrLJXH43xCnIcUHBQyQzl6o7YKUPEvm6+ TdjpXKSGGVMdv1sKY83w8f8Cu2/906KWznPyEcxbg7IbOb9yF7E3CPz3p7OIKKkbuKkh 1/0OEyrtkpUr/C41x4b4vITQXcW6W5+cV9sGzBgrfxPWPZELZvNnLIXmfde1bCY5mIoJ RP10NM3x++0MwS8/LZiZBsfFHwvBag0AYbrv6HNF2wcuYFdg1TmTznk9IzYbPWY9vXpi 9wew== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RwkpJOSV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y35si691768pgl.569.2019.02.13.15.57.16; Wed, 13 Feb 2019 15:57:32 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RwkpJOSV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2405572AbfBMSmE (ORCPT + 99 others); Wed, 13 Feb 2019 13:42:04 -0500 Received: from mail.kernel.org ([198.145.29.99]:40528 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2393914AbfBMSmC (ORCPT ); Wed, 13 Feb 2019 13:42:02 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 93862222D6; Wed, 13 Feb 2019 18:42:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550083322; bh=Y3k9zW6QjyRBWrBRWmAILogTdqbxRarzHfmmILCrG2M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RwkpJOSVUD4hVaHuQ8luwb5dJSQucS31bzR+KKTERdEFKjVn37sPBSISwn54Jh715 9GhBXigb0FvJiG01/ku6P8ECnMiHTJXBkMnzArzSr7ovAXxC5NPivte1SGH+jk6ieJ UcTbNVQGh7JtZncgI34dADFInkmU2CbwfddMGQgI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org, "stable@vger.kernel.org" Cc: Greg Kroah-Hartman , Xiubo Li , Hailong Liu , Jiang Biao , Tommi Rantala Subject: [PATCH 4.14 33/35] uio: fix wrong return value from uio_mmap() Date: Wed, 13 Feb 2019 19:38:28 +0100 Message-Id: <20190213183707.531196774@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190213183706.176685027@linuxfoundation.org> References: <20190213183706.176685027@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Hailong Liu commit e7de2590f18a272e63732b9d519250d1b522b2c4 upstream. uio_mmap has multiple fail paths to set return value to nonzero then goto out. However, it always returns *0* from the *out* at end, and this will mislead callers who check the return value of this function. Fixes: 57c5f4df0a5a0ee ("uio: fix crash after the device is unregistered") CC: Xiubo Li Signed-off-by: Hailong Liu Cc: stable Signed-off-by: Jiang Biao Signed-off-by: Greg Kroah-Hartman Signed-off-by: Tommi Rantala Signed-off-by: Greg Kroah-Hartman --- drivers/uio/uio.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/uio/uio.c +++ b/drivers/uio/uio.c @@ -816,7 +816,7 @@ static int uio_mmap(struct file *filep, out: mutex_unlock(&idev->info_lock); - return 0; + return ret; } static const struct file_operations uio_fops = {