Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp179267ybm; Tue, 26 May 2020 13:55:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxONF/E1RgE+E1hvfFprRJY/BQHi6vQqP70xse7CLB4P+I2MI04YPo1CvJVWHmAkJIeCnV9 X-Received: by 2002:a17:906:2799:: with SMTP id j25mr2692342ejc.369.1590526552575; Tue, 26 May 2020 13:55:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590526552; cv=none; d=google.com; s=arc-20160816; b=LxSTMXV2rr5TMg2ULMfEbG6h5Ueu6Re21Kqrya1jLnI9zvkn73CC4TWGr5P/jAVfkK gvXa0Mjl3KJ1HkYWjNmOcMigYd1gqRkU4+SRGTsOQRRHfQscMMYban19IbWwBLbCiKlu yVyqHtHYlajuIBl56KHpYZjDXs3UIuhAolQWoKo1HQT16PptSVMepfhQsS6nsp2TxMWU 3Xqe4IVBDv/Gh/wk73RvYofOMmMpc12plS9Qf9Rqh7fzXAqWhFgPxdwLDkSdwVuFZWR8 wIS8gaJwR22QUrlrQ/8z3uj2tD5byMJFU15Fy7LyhDkajZzxK3/JO9d6zkIMB0dYy2id zo5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=w9fMkUX2HssuGkfVa8ugwkfLJFeKdMjCXE4df9nmV64=; b=sNJHlvwcgUBE4qfBC5rLqR1xtQ7wd8QoctbalCWPXJn+NWJeIjvU1vpkT4pB0wsphz zuQleP2YrAvaOE0olof6LQygs0cQ7ow9/34/TEPeKQgNU24DC4kZxI0P9hN3k/7i0vgJ TJq6DPPru/4q1bMWDupawG59t66o5J6Z8gV6acskWVY3EdJhYzGhSxF6X7KuGph+JHqB AmminzEhG1XzoMQzd3s6PKqWPOP5UzAFUYw70YvftQFo5Lva5gHQYZEmsd6yCbD0Z0og E4WsZm8mtjS94wXGTUca+Q+ascyXwMpdBBxDFB4zQSv8wNwa1Ro+cIxqbD8Yp/PXeQtb 80EA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fBn0Ip0N; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m6si544083edv.283.2020.05.26.13.55.28; Tue, 26 May 2020 13:55:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fBn0Ip0N; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392331AbgEZTRo (ORCPT + 99 others); Tue, 26 May 2020 15:17:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:45140 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404352AbgEZTOU (ORCPT ); Tue, 26 May 2020 15:14:20 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8A407208B6; Tue, 26 May 2020 19:14:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1590520460; bh=6s0esmbuhORqW3ghCADkZDwb2rfkAM/yLBfDpUl9yg8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=fBn0Ip0NzVdauRNE2j5JULxu1W+4bIWT+5ocTxfMOnzZW73u8aV2pVAdzLDfD2lMN qDVarjyyP4c2MwL6koXeLX4EY5stjjoqvakL2Gf2DawgWWpfXmyHzXYnDA3uuLPws3 m/4j4e34pKYTZE9dTq45FuOxv41+1LHwXtLvrbWs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dan Carpenter , Masami Hiramatsu , "Steven Rostedt (VMware)" , Sasha Levin Subject: [PATCH 5.6 088/126] tools/bootconfig: Fix apply_xbc() to return zero on success Date: Tue, 26 May 2020 20:53:45 +0200 Message-Id: <20200526183945.367638554@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200526183937.471379031@linuxfoundation.org> References: <20200526183937.471379031@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Steven Rostedt (VMware) [ Upstream commit 9d82ccda2bc5c148060543d249d54f8703741bb4 ] The return of apply_xbc() returns the result of the last write() call, which is not what is expected. It should only return zero on success. Link: https://lore.kernel.org/r/20200508093059.GF9365@kadam Fixes: 8842604446d1 ("tools/bootconfig: Fix resource leak in apply_xbc()") Reported-by: Dan Carpenter Acked-by: Masami Hiramatsu Tested-by: Masami Hiramatsu Signed-off-by: Steven Rostedt (VMware) Signed-off-by: Sasha Levin --- tools/bootconfig/main.c | 1 + 1 file changed, 1 insertion(+) diff --git a/tools/bootconfig/main.c b/tools/bootconfig/main.c index 5dbe893cf00c..37fb2e85de12 100644 --- a/tools/bootconfig/main.c +++ b/tools/bootconfig/main.c @@ -310,6 +310,7 @@ int apply_xbc(const char *path, const char *xbc_path) pr_err("Failed to apply a boot config magic: %d\n", ret); goto out; } + ret = 0; out: close(fd); free(data); -- 2.25.1