diff options
author | Luo Meng <luomeng12@huawei.com> | 2020-11-18 14:49:31 +0100 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2020-11-19 20:58:16 +0100 |
commit | 2801a5da5b25b7af9dd2addd19b2315c02d17b64 (patch) | |
tree | dbabe546198f7e2d4386a36345730541e747ab58 /net/mac802154 | |
parent | Merge branch 'Fix bpf_probe_read_user_str() overcopying' (diff) | |
download | linux-2801a5da5b25b7af9dd2addd19b2315c02d17b64.tar.xz linux-2801a5da5b25b7af9dd2addd19b2315c02d17b64.zip |
fail_function: Remove a redundant mutex unlock
Fix a mutex_unlock() issue where before copy_from_user() is
not called mutex_locked.
Fixes: 4b1a29a7f542 ("error-injection: Support fault injection framework")
Reported-by: Hulk Robot <hulkci@huawei.com>
Signed-off-by: Luo Meng <luomeng12@huawei.com>
Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Masami Hiramatsu <mhiramat@kernel.org>
Link: https://lore.kernel.org/bpf/160570737118.263807.8358435412898356284.stgit@devnote2
Diffstat (limited to 'net/mac802154')
0 files changed, 0 insertions, 0 deletions