diff options
author | Peng Sun <sironhide0null@gmail.com> | 2019-02-27 22:36:25 +0800 |
---|---|---|
committer | Daniel Borkmann <daniel@iogearbox.net> | 2019-03-01 16:04:29 +0100 |
commit | 352d20d611414715353ee65fc206ee57ab1a6984 (patch) | |
tree | c856f1153a8c8551c974aa908088bdd1fe6499ac /kernel/bpf | |
parent | 781e62823cb81b972dc8652c1827205cda2ac9ac (diff) | |
download | linux-stable-352d20d611414715353ee65fc206ee57ab1a6984.tar.gz linux-stable-352d20d611414715353ee65fc206ee57ab1a6984.tar.bz2 linux-stable-352d20d611414715353ee65fc206ee57ab1a6984.zip |
bpf: drop refcount if bpf_map_new_fd() fails in map_create()
In bpf/syscall.c, map_create() first set map->usercnt to 1, a file
descriptor is supposed to return to userspace. When bpf_map_new_fd()
fails, drop the refcount.
Fixes: bd5f5f4ecb78 ("bpf: Add BPF_MAP_GET_FD_BY_ID")
Signed-off-by: Peng Sun <sironhide0null@gmail.com>
Acked-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Diffstat (limited to 'kernel/bpf')
-rw-r--r-- | kernel/bpf/syscall.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c index f98328abe8fa..84470d1480aa 100644 --- a/kernel/bpf/syscall.c +++ b/kernel/bpf/syscall.c @@ -559,12 +559,12 @@ static int map_create(union bpf_attr *attr) err = bpf_map_new_fd(map, f_flags); if (err < 0) { /* failed to allocate fd. - * bpf_map_put() is needed because the above + * bpf_map_put_with_uref() is needed because the above * bpf_map_alloc_id() has published the map * to the userspace and the userspace may * have refcnt-ed it through BPF_MAP_GET_FD_BY_ID. */ - bpf_map_put(map); + bpf_map_put_with_uref(map); return err; } |