Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp907800ybl; Fri, 24 Jan 2020 11:44:53 -0800 (PST) X-Google-Smtp-Source: APXvYqz76bJ15ovj+uY9gZYLgDnTCSdDenVq9ifr8JtHGErkTBqRkoiWZswqCkbOLrrvbPHkSwWG X-Received: by 2002:a54:4895:: with SMTP id r21mr306458oic.107.1579895093147; Fri, 24 Jan 2020 11:44:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579895093; cv=none; d=google.com; s=arc-20160816; b=uNpWKlUqIH5EqC1WZdGKeCXBWeirgZv/cI1vTXtKogLwn/4ET/NT2BiUvWhAr96Ie7 30kmb3BliSKTGx+9EaV3NyksPD9Xhafy/yMfjVGzrxbAmRzVwWCkPULZXjr/fLoGqQ+j 5e0LxYy8mhj39wPgMwMBJXaZiUp5/n3rumdmISk7ycUeGAC+xrhTjg9x6yrrI9ojAwRt DzRkCs5XNk+mv/f1nbp3KpyWZRIUIQxuPgl5xgiyNsUAX9Dz9QproPUsycpMWDwCByqI Wl8od7znpMDTIuSumO3eam9Pi0zS6MlklpnaHZP05vC8JGp+RrSYvlNq/o0xqUHeXhpY HebA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=A2/SVeiCtAg4vxJkbxMGpYe2aWrAjghz0ESo7UxFn1A=; b=oL1C4uJy1QzhoD9YzD2zZu6p5pD6R9v1BKQZwXwaXmEIUWNf38BMJvmo0ET8zszqB6 xzHIre10gy1aIw1XSjpEoYsrItk2D7jXYZV6VMl6sMFS0keG+tesSwg6ChbGQj2Km0qJ q4CMGAJq/cnPG/FDkAjWGPegL3IqR7M8gRG4jTGC1ji1aZZixEjduRIi+lhQTtOAVmvo w+UzDluvW4NOi1iLcsoxDAOgmf0hjIz1PReEiPp3ytNZvNGaTz7x9DpSs6Ak3YWSQnCd ezefg/MlS3DqgAeUSyFaxPnDJdwoD5V6SDClugNFahqjHQ0iVXtyWfsjWqbjXS5zPN2E a8JQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hmBAQRnz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f21si3351485otp.56.2020.01.24.11.44.39; Fri, 24 Jan 2020 11:44:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hmBAQRnz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404506AbgAXLfY (ORCPT + 99 others); Fri, 24 Jan 2020 06:35:24 -0500 Received: from mail.kernel.org ([198.145.29.99]:55374 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404580AbgAXLfW (ORCPT ); Fri, 24 Jan 2020 06:35:22 -0500 Received: from localhost (ip-213-127-102-57.ip.prioritytelecom.net [213.127.102.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 96E98222D9; Fri, 24 Jan 2020 11:35:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1579865722; bh=GAGFq6L4ACu09icvD+WmqG9Paps4qEGo+Ta0x9IQa4M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=hmBAQRnzHKgIsJ6V3SZ12LJapl0wjOG4X5Z6hqRYAxAbjqpoTR5ifCoyhF4Oq9la2 GwIXAht5GssCatk+fC/JJVEf4Um3buMnVc37gKwqKjw5F4QX1f1QGa/sMGF75jT83i ZKKCFZbmMC9OMzvT8sMOajWBeMunozCKwfBTPzFE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dan Carpenter , Daniel Borkmann , Jakub Kicinski , Sasha Levin Subject: [PATCH 4.19 612/639] bpf, offload: Unlock on error in bpf_offload_dev_create() Date: Fri, 24 Jan 2020 10:33:02 +0100 Message-Id: <20200124093206.126283044@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200124093047.008739095@linuxfoundation.org> References: <20200124093047.008739095@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dan Carpenter [ Upstream commit d0fbb51dfaa612f960519b798387be436e8f83c5 ] We need to drop the bpf_devs_lock on error before returning. Fixes: 9fd7c5559165 ("bpf: offload: aggregate offloads per-device") Signed-off-by: Dan Carpenter Signed-off-by: Daniel Borkmann Acked-by: Jakub Kicinski Link: https://lore.kernel.org/bpf/20191104091536.GB31509@mwanda Signed-off-by: Sasha Levin --- kernel/bpf/offload.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/kernel/bpf/offload.c b/kernel/bpf/offload.c index 177a524363942..86477f3894e52 100644 --- a/kernel/bpf/offload.c +++ b/kernel/bpf/offload.c @@ -645,8 +645,10 @@ struct bpf_offload_dev *bpf_offload_dev_create(void) down_write(&bpf_devs_lock); if (!offdevs_inited) { err = rhashtable_init(&offdevs, &offdevs_params); - if (err) + if (err) { + up_write(&bpf_devs_lock); return ERR_PTR(err); + } offdevs_inited = true; } up_write(&bpf_devs_lock); -- 2.20.1