Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1597522ybv; Fri, 21 Feb 2020 00:01:14 -0800 (PST) X-Google-Smtp-Source: APXvYqwANM9r09iwHhMlQyQzlK2ILvmc48EaIe21z3thBkBxghn3JNu4j0rtX6pMhADQ16RiFSSL X-Received: by 2002:a9d:4f17:: with SMTP id d23mr27674560otl.170.1582272074182; Fri, 21 Feb 2020 00:01:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582272074; cv=none; d=google.com; s=arc-20160816; b=kXirBqufzCzzU+MoYDaI0jUkuZt592JOnA3VcA7BWBc8xNUZyGbeCSeueg554lEDGn f1OvxVI4INyJxOvcy3u6SJTynyKq92T9KLmQIepJwx3kjFozB4x/lhsh40agNgOcffzf Z0BSuh8/lllPDVUJzVMBr6WbZyu9sJ9z9sXq+ifRhS4EN4tRKiQIkq2UOpGIW1rSX8DL k+6UUmyoDdaNLF/g6FhNFEQlgeUqOgMKp8WJNxFjpgG/jkbwdVV2sbqRk1RXDHKoU0P4 9UBW8M0JIUXiW1W3ff7gUNwfhk+r6/F3GdrjF2sOBKk3GDFDfYI63BkftppfP0vP1A35 o6EA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ac2q+ucGALaIJcAIE8O2PVruj3ZhL2oYDn8p9z4b56c=; b=Jfoqa7H09mwZjxZmdxZt56OWGc6M7hFlvrgp05u6DIV8Zi4BvArSBgCD69wJ/JVT74 WPImc8yXxxMSdfuQ3d6rM1taDxZSkQxfTlAh6C17Xw3yPrdY/uAqZv0d1wRvji689R8u CKUwahwtxkHTIc7ICBG4fQ37vBDv8zWqbvJ57dadn0MJWkamcrhwr/Fbn1VqsW1BaFQD KwkkQQlKKTOmOTbdi5Li9Q3bauFpa07F1/bW+a3G5YjyTmqA7d6BO2bwFhyP+eydfq5k h4g4KUIMO85AhROuMS/alFWs5QVQN0ZjtmNsLD0E64u2D4Xgjlc3kM5GplvDNCFA1o9H UthA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cEiYJZ3W; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d14si1041699ote.195.2020.02.21.00.01.01; Fri, 21 Feb 2020 00:01:14 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cEiYJZ3W; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731132AbgBUIA5 (ORCPT + 99 others); Fri, 21 Feb 2020 03:00:57 -0500 Received: from mail.kernel.org ([198.145.29.99]:33094 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731124AbgBUIAw (ORCPT ); Fri, 21 Feb 2020 03:00:52 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DB3AD222C4; Fri, 21 Feb 2020 08:00:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582272051; bh=dkc3DcPnSfReoLTVZWTryE+VHvgOIvMyhzYaUJQ6280=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=cEiYJZ3WOZdkoA+IoMLN918codmGpjmeEECsvKecYVlJKMW8JAsOgBjcjvp/YdqIs laDaCq8oKSBmrl6qCuIwjelps8yxxNTYCaX22xBn5ktqIhuq7u88YJBdb8GmdZaH0q tPN3OS1lswUxqG1yJosJlh1jnTFYaL9rHX0eH6BY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Bharata B Rao , Kamalesh Babulal , Paul Mackerras , Sasha Levin Subject: [PATCH 5.5 360/399] KVM: PPC: Book3S HV: Release lock on page-out failure path Date: Fri, 21 Feb 2020 08:41:25 +0100 Message-Id: <20200221072435.741813944@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200221072402.315346745@linuxfoundation.org> References: <20200221072402.315346745@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Bharata B Rao [ Upstream commit e032e3b55b6f487e48c163c5dca74086f147a169 ] When migrate_vma_setup() fails in kvmppc_svm_page_out(), release kvm->arch.uvmem_lock before returning. Fixes: ca9f4942670 ("KVM: PPC: Book3S HV: Support for running secure guests") Signed-off-by: Bharata B Rao Reviewed-by: Kamalesh Babulal Signed-off-by: Paul Mackerras Signed-off-by: Sasha Levin --- arch/powerpc/kvm/book3s_hv_uvmem.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/powerpc/kvm/book3s_hv_uvmem.c b/arch/powerpc/kvm/book3s_hv_uvmem.c index 2de264fc31563..5914fbfa5e0a7 100644 --- a/arch/powerpc/kvm/book3s_hv_uvmem.c +++ b/arch/powerpc/kvm/book3s_hv_uvmem.c @@ -543,7 +543,7 @@ kvmppc_svm_page_out(struct vm_area_struct *vma, unsigned long start, ret = migrate_vma_setup(&mig); if (ret) - return ret; + goto out; spage = migrate_pfn_to_page(*mig.src); if (!spage || !(*mig.src & MIGRATE_PFN_MIGRATE)) -- 2.20.1