Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp59833ybp; Thu, 3 Oct 2019 10:09:49 -0700 (PDT) X-Google-Smtp-Source: APXvYqwZeV1nLHGJwxjZAdxVt3SBq5BhV4fwiKdDU5dDurR6oin/kkE5IdZHYU+bcSPeViGpEaZj X-Received: by 2002:a05:6402:3d2:: with SMTP id t18mr10436211edw.136.1570122588900; Thu, 03 Oct 2019 10:09:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570122588; cv=none; d=google.com; s=arc-20160816; b=YOLtiAWxDve5NtfoexJ5DxIZor7avNYjijFEu1OLyzSajZyUVJCosFz/4tW5cnX6rg GMWaUyX9a1rfaMK+pcix9rsoC3X1LnG0eXYhGrvoFZrdwGAaPSL4LwScA08d7R1sk7US 9g3XM0G/lcUSab6Sr82ePi8hiqMe5hLnLXKymNK2pTQdCKMV1YN71uC8ON5Ue7OMhnAr nXKoABPrVMfwk6lu2mHVG4QCzNqEAZtIeHn4BxvwuM1nkr1MYS+eDqQgUYP/ZBaqp3+C /NMP525aGa/MijvyopFbMfI8wL6xVpA38CYBBfrz3/zHxApPm2bjDHU9r7t/3qaLg8A8 Owsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=WVOzfQD7h01UjLwTdc2f//me+ETBy9OICG0OhFTau9Y=; b=jh/MOxMzOLYdZgCkdTV8SBdqSJmYc0qYZYmz/VjGNNpA9bL3x9OEKeXjX+fJs9NH0T rES7uBTL61gApEvkyR++Y2+Y5rm6u3H93LRM4Dib+pZz2CMjEMm0OVnKue+xagyWylUL fJieeEM7EJ624Gm/fv619jJJ1ldhNHC4P7EYGBVN8ZBHAvuDAJXY0SfZg+SCTpeKgQqD m1iSeJJGi6UkP1wXr2oRGJbxSOCdq26eUGUk3EBarrhvibZd47yM8TpyAXCLZAkMcxOd 2uc7SIqFYQN/0xa34JfsGMUW/kfgEC6zoQx3kiezC10Pmwp1p6LVAaji1E6IvJeteyDk HJCQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kyrlwBxp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ox28si1502634ejb.130.2019.10.03.10.09.24; Thu, 03 Oct 2019 10:09:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kyrlwBxp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391956AbfJCQgk (ORCPT + 99 others); Thu, 3 Oct 2019 12:36:40 -0400 Received: from mail.kernel.org ([198.145.29.99]:45868 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404434AbfJCQgf (ORCPT ); Thu, 3 Oct 2019 12:36:35 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id ED6E22086A; Thu, 3 Oct 2019 16:36:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570120594; bh=aOmStEXpth9Ho7NutSuDgtWs7bvLiWs/8qUkr+s1Yvg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kyrlwBxpwMxKufYPe4mkpB78XlScWdwVymkRGRjEhHPAMFYk52ysXUCQwysVup6Zm yg36SdF7thoglDhvm1KBwtleUN5tT3niRwNoBQbI9DsbbkK9zWff+7qgucA/ZbztgG XHrMeWCvk15Si9jyMukKiNwT03nvxWKkOYzlcM2A= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Steve French , Pavel Shilovsky Subject: [PATCH 5.2 279/313] smb3: fix leak in "open on server" perf counter Date: Thu, 3 Oct 2019 17:54:17 +0200 Message-Id: <20191003154600.540731635@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191003154533.590915454@linuxfoundation.org> References: <20191003154533.590915454@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Steve French commit d2f15428d6a0ebfc0edc364094d7c4a2de7037ed upstream. We were not bumping up the "open on server" (num_remote_opens) counter (in some cases) on opens of the share root so could end up showing as a negative value. CC: Stable Signed-off-by: Steve French Reviewed-by: Pavel Shilovsky Signed-off-by: Greg Kroah-Hartman --- fs/cifs/smb2ops.c | 5 +++++ fs/cifs/smb2pdu.c | 1 + 2 files changed, 6 insertions(+) --- a/fs/cifs/smb2ops.c +++ b/fs/cifs/smb2ops.c @@ -743,6 +743,8 @@ int open_shroot(unsigned int xid, struct if (rc) goto oshr_exit; + atomic_inc(&tcon->num_remote_opens); + o_rsp = (struct smb2_create_rsp *)rsp_iov[0].iov_base; oparms.fid->persistent_fid = o_rsp->PersistentFileId; oparms.fid->volatile_fid = o_rsp->VolatileFileId; @@ -1167,6 +1169,7 @@ smb2_set_ea(const unsigned int xid, stru rc = compound_send_recv(xid, ses, flags, 3, rqst, resp_buftype, rsp_iov); + /* no need to bump num_remote_opens because handle immediately closed */ sea_exit: kfree(ea); @@ -1488,6 +1491,8 @@ smb2_ioctl_query_info(const unsigned int resp_buftype, rsp_iov); if (rc) goto iqinf_exit; + + /* No need to bump num_remote_opens since handle immediately closed */ if (qi.flags & PASSTHRU_FSCTL) { pqi = (struct smb_query_info __user *)arg; io_rsp = (struct smb2_ioctl_rsp *)rsp_iov[1].iov_base; --- a/fs/cifs/smb2pdu.c +++ b/fs/cifs/smb2pdu.c @@ -2263,6 +2263,7 @@ int smb311_posix_mkdir(const unsigned in rqst.rq_iov = iov; rqst.rq_nvec = n_iov; + /* no need to inc num_remote_opens because we close it just below */ trace_smb3_posix_mkdir_enter(xid, tcon->tid, ses->Suid, CREATE_NOT_FILE, FILE_WRITE_ATTRIBUTES); /* resource #4: response buffer */