Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp5443640imm; Tue, 16 Oct 2018 10:18:07 -0700 (PDT) X-Google-Smtp-Source: ACcGV618baJ8d7UMMapB+iW2ne33kWy7fKMXpREOw9nZmgS4A1ycT6ZSH/uH/kNQa+R/KmVoKji1 X-Received: by 2002:a62:f58a:: with SMTP id b10-v6mr23179317pfm.253.1539710287838; Tue, 16 Oct 2018 10:18:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539710287; cv=none; d=google.com; s=arc-20160816; b=V/af58r+fR4fLM2FDkDAOtqt9RL3SZh2TGgeMy5pePgI2IpsNwQP9odYB1a9lCZQ1X ZJwbNTCi7t9ESTizFqEyk8C5u47otuq0u/iCX1zYPAzRlW5G9+o26gx49/rucUdM7bE4 aKs/LepTgQGolts6cUavc8z8nGdHHbYvkUXjxEG+nhJeBZb4az3q3G+mNPBJOSCNnOtK pxTRmwIJr1LfA2HgNZxMnw82q3Rej0An3LrB0oobaXpwcNTIe848j+JKqiyGrbHsYfmu OXrTkuewvFlA5e1okekw+BDMX99rs8LPFhpbOfp1XbjBc34dUWPLcF+smACe6TxPyiMC G1bQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=9vg6u3o1p9jWWj6/UwNBvRAqOXtdMqB8p48OuFgx84M=; b=inLf+2/mRmZKSutCqMjTA8Lpk3Pd2wNsjinzIQp+jb7BQdJTOJP4wMRFTHk5Ur9Opq mxddnGeihiYs2vXTDJWTWqbfQMuG0nL0Zea4QOLfYEBuNb5M9EsZX5UIW4w+rOTij+au 35rRJkMAwWafy8UYzq4an7elXQlDa4/zG2SsRJZCKBlGM54W5ETpPmQTies0FDCD+xar I2uY4A8FnaV5gOR5u820iYP9tl/x39w7/8dDPTpIIEAy48Gsgr0Z8fpKsQVX7ZQ5TDX8 y9G/Bzqp95WI7z6cszANv1r/+l2BBnz0jXoYcgdA8pY3cRMDu/YBpF1ekKRjkKErRDdc dRqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TeOW4m+h; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j19-v6si14407411pgh.198.2018.10.16.10.17.51; Tue, 16 Oct 2018 10:18:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TeOW4m+h; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729416AbeJQBGz (ORCPT + 99 others); Tue, 16 Oct 2018 21:06:55 -0400 Received: from mail.kernel.org ([198.145.29.99]:51068 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727182AbeJQBGy (ORCPT ); Tue, 16 Oct 2018 21:06:54 -0400 Received: from localhost (ip-213-127-77-176.ip.prioritytelecom.net [213.127.77.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 819C42089E; Tue, 16 Oct 2018 17:15:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1539710131; bh=kSZxGx7/yXedssIiKxUQIX3kGGH2//1v4jWTCT94EAg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TeOW4m+h3BcHGyg6X05qUkW2OM42MLljjiIpkGyK4drGYeVv8eF44L0TCw2+sObji fLJ5knNHVKmN2MwkCkLJWnyF4/rbZ/v5ykK0QJuMmBoFtMLIiRTXPYiMwfbs9l9rFh R2JruhhFOrxWEIQxuz8yF2XQizU4dqxG8tyT5UXg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, David Howells Subject: [PATCH 4.18 111/135] afs: Fix afs_server struct leak Date: Tue, 16 Oct 2018 19:05:41 +0200 Message-Id: <20181016170523.002988446@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181016170515.447235311@linuxfoundation.org> References: <20181016170515.447235311@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: David Howells commit f014ffb025c159fd51d19af8af0022a991aaa4f8 upstream. Fix a leak of afs_server structs. The routine that installs them in the various lookup lists and trees gets a ref on leaving the function, whether it added the server or a server already exists. It shouldn't increment the refcount if it added the server. The effect of this that "rmmod kafs" will hang waiting for the leaked server to become unused. Fixes: d2ddc776a458 ("afs: Overhaul volume and server record caching and fileserver rotation") Signed-off-by: David Howells Signed-off-by: Greg Kroah-Hartman --- fs/afs/server.c | 2 ++ 1 file changed, 2 insertions(+) --- a/fs/afs/server.c +++ b/fs/afs/server.c @@ -199,9 +199,11 @@ static struct afs_server *afs_install_se write_sequnlock(&net->fs_addr_lock); ret = 0; + goto out; exists: afs_get_server(server); +out: write_sequnlock(&net->fs_lock); return server; }