Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp2740539ybh; Fri, 24 Jul 2020 23:37:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwPHzWqBAH8vcVzUZ/FUfMNBxp0mdNMAEJwVhxrTuMeujpB6/cXXOMZ/iljiRs2R1SDsEuW X-Received: by 2002:a17:906:1e83:: with SMTP id e3mr12725899ejj.7.1595659055276; Fri, 24 Jul 2020 23:37:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595659055; cv=none; d=google.com; s=arc-20160816; b=rxF7N5FteVQWPE8pGuPpL/5vTAJDIr9qm5pz/QozBGQsTxNPwC0FiDb8rnUIhTP+6t MCTbeCCZK5v4wdjuYkdqm/BVg0+9MglwdwzO0Q55qaBDUC8NADQp/S4rW+vTlQ/Xy9YU HaoiyO1YeY3EbwK9tGXghP+m3TBECngTbMTG6oz8U1Y7xiFu0REmNhr4ANaKRANvDNXE ph5iQAG9oMRC0dzMwLiB3aoyu+vgaotg0Yx7GsdTDTGNSwwGkyBLXNlEKjUUsRkp3iOl Oxn8//KIm60DNsz3jfAYq5H79JMkpFkOlqcD/gnfC6uOENSWs1pVB/yMLoN19Z+SGqRE bAtg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=+ysh4ckOSK2O2FHI06VuoTZLlJkPG/+o16SYxx8hfM4=; b=pkEEaH87aA9kq1Jd8Ml8LVQsD8UkxX2TwVUodPJHy1p/ql9I0hWje48g38zC4/Uy3r zxIWbKsPRouNqQiW7RBfihBBWMB1cCLwxSfrcjmCBNWgF1npq0RmvM3SjZcrxzVlIv0a 3ewqczcHwgBMgt0rwOUfxrlD8orY/Sbv51iDeTeWYRqGHGF4V3dDETSlP0D/BOSANX4D h59Y57hhEn/a1IC0Tjse8O22BktwZw8XVxLZSqhMO7ZEvBQeGhcqdPbjn4qVMdDbIoxb Qv4OKGeqrHIxxmI8Fl1et1zz1UrHKsDEP0/sWyHqp+rbaTPJjR6JVP8Hrrcz+KeA6gNZ 0Zow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=itgm4Lpp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q19si1868600eji.315.2020.07.24.23.37.12; Fri, 24 Jul 2020 23:37:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=itgm4Lpp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726963AbgGYGhC (ORCPT + 99 others); Sat, 25 Jul 2020 02:37:02 -0400 Received: from mail.kernel.org ([198.145.29.99]:41688 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725941AbgGYGhB (ORCPT ); Sat, 25 Jul 2020 02:37:01 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C2F812070E; Sat, 25 Jul 2020 06:37:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1595659021; bh=TqBid881gbTdHYWUqMo1o1X4MNRMshLRJeGzN4al/UU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=itgm4LppO2guNmU4POTZuG0/5SrzYDgkpKnsojwJbWKL13TF4trwhVTzHL4dK4H2t u1VlQ6Ruhosttf2w2vRaksx89173u1V9PZqyhPR9wlYaghf58p6UN/6hc0yJySZsaf PFrQuP4Wn818Gk4flt289c+few8n9VH7cA/WNK1Q= Date: Sat, 25 Jul 2020 08:37:01 +0200 From: Greg Kroah-Hartman To: Wei Yongjun Cc: Miquel Raynal , Richard Weinberger , Vignesh Raghavendra , linux-mtd@lists.infradead.org, linux-kernel@vger.kernel.org, kernel-janitors@vger.kernel.org, Hulk Robot Subject: Re: [PATCH -next] mtd: fix missing unlock on error in mtdchar_compat_ioctl() Message-ID: <20200725063701.GA1058480@kroah.com> References: <20200725063416.172037-1-weiyongjun1@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200725063416.172037-1-weiyongjun1@huawei.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Jul 25, 2020 at 06:34:16AM +0000, Wei Yongjun wrote: > Add the missing unlock before return from function mtdchar_compat_ioctl() > in the error handling case. > > Fixes: 210bec567936 ("mtd: properly check all write ioctls for permissions") > Reported-by: Hulk Robot > Signed-off-by: Wei Yongjun > --- > drivers/mtd/mtdchar.c | 6 ++++-- > 1 file changed, 4 insertions(+), 2 deletions(-) > > diff --git a/drivers/mtd/mtdchar.c b/drivers/mtd/mtdchar.c > index 52c120f9fb0d..b40f46a43fc6 100644 > --- a/drivers/mtd/mtdchar.c > +++ b/drivers/mtd/mtdchar.c > @@ -1064,8 +1064,10 @@ static long mtdchar_compat_ioctl(struct file *file, unsigned int cmd, > struct mtd_oob_buf32 buf; > struct mtd_oob_buf32 __user *buf_user = argp; > > - if (!(file->f_mode & FMODE_WRITE)) > - return -EPERM; > + if (!(file->f_mode & FMODE_WRITE)) { > + ret = -EPERM; > + break; > + } > > if (copy_from_user(&buf, argp, sizeof(buf))) > ret = -EFAULT; > > > I think Richard already resolved this in his tree, but I could be wrong. And nice detection by your bot, that's good to see. thanks, greg k-h