Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp236202ybg; Thu, 17 Oct 2019 22:07:47 -0700 (PDT) X-Google-Smtp-Source: APXvYqwoo0qLF5jDrAIbwl2HiCPwzefesScgeFDMttPLQkuAlKqZvxzcad20SQj5xoAvzIiCdFBF X-Received: by 2002:a17:906:3e41:: with SMTP id t1mr7085288eji.103.1571375266950; Thu, 17 Oct 2019 22:07:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571375266; cv=none; d=google.com; s=arc-20160816; b=UjAiUbw29GOrraPMCsD6GP+a2e5MSrJhKKaTUsNlVqK3dPIrls9KO137r0XJhMaYWc TY6LrVo2s6wiZsGiDtNNTJ9CekKmNbJ9OJ5kJW/odBwvzZQBhAvPaJyIaSv7++GO7BZA pDwYyE/X8+zWXdqRanlAhq/MoJ7WOOp9A+16Oq3EQajv3r0awOkCLCFFcYIhq1uoguDP ZZDynVjlLFWq7CgN8qVocBICJeTjYrCa/4Rax2UvGehEzSwBCZ30A4xyhRsZ9AmrqMrg 7IKu7L3/WDOK12vOKulgmnuV4OkR80CYSxLvYm2gCJWWQbnUBD1SahNvqFxzsMzKOmLo 6ZrA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ncsZKFuJ+Hs7vjW0mgbAMcSzYAJ7WnIsYxhkEcOusHY=; b=jkQVrkjBMAhzIHarijusXunk+RRAyti5GLnwMghPC9OcVUM1q9qrMvLR4/T3GBZz/V Z4D0DaAzjpdxtCv68WQ4o5nb26jG3+4/NV/uktUyad+gPfSUWLfFuxLd1rKlpz7GkN7U JAFh4dHK/xdsSI/9zmXaMG9lHYUSQ5uw69IIniRaHR6wmQPvpwfd5kxSp6AIBwtnUOlN Yd+JjAT+TWPMPH/b9kS9lQ/AnZ8XNRcWVAyLUoxI2Bk5vIob9SnkuSSJAndf2Zt2ocxM FWsv7n5Gi/K2sIiVJW4QOY+CI+9rwzPpY+6xj5QA0EIc5XSMQSX1vOzr6g3DdHgZeref WrGA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ADQGG74r; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g23si2586358ejm.398.2019.10.17.22.07.23; Thu, 17 Oct 2019 22:07:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ADQGG74r; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2407671AbfJPWXV (ORCPT + 99 others); Wed, 16 Oct 2019 18:23:21 -0400 Received: from mail.kernel.org ([198.145.29.99]:41442 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2437094AbfJPVw6 (ORCPT ); Wed, 16 Oct 2019 17:52:58 -0400 Received: from localhost (unknown [192.55.54.58]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1701520872; Wed, 16 Oct 2019 21:52:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1571262778; bh=x5Dh/lsFvWpy8PJRDAS+pIIwjaN0mNYgFOUG/aDqDhc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ADQGG74rwagV0B+Qob24NDzkPVMlCPYj4wz8xm4DlxooPzw0loX860VOOSIIn4QhC nOzrburxQ3qoLnCi/LWfzbHT59D2ZwUs61aOxS6vDdr6uJ9/Mzem5ii0CgXG72jpZy G+oeKdCtM7d7veAJmisZl42OK5dEJo4FR88v37zA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Hulk Robot , zhengbin , Miklos Szeredi , Sasha Levin Subject: [PATCH 4.4 19/79] fuse: fix memleak in cuse_channel_open Date: Wed, 16 Oct 2019 14:49:54 -0700 Message-Id: <20191016214747.875720830@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191016214729.758892904@linuxfoundation.org> References: <20191016214729.758892904@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: zhengbin [ Upstream commit 9ad09b1976c562061636ff1e01bfc3a57aebe56b ] If cuse_send_init fails, need to fuse_conn_put cc->fc. cuse_channel_open->fuse_conn_init->refcount_set(&fc->count, 1) ->fuse_dev_alloc->fuse_conn_get ->fuse_dev_free->fuse_conn_put Fixes: cc080e9e9be1 ("fuse: introduce per-instance fuse_dev structure") Reported-by: Hulk Robot Signed-off-by: zhengbin Signed-off-by: Miklos Szeredi Signed-off-by: Sasha Levin --- fs/fuse/cuse.c | 1 + 1 file changed, 1 insertion(+) diff --git a/fs/fuse/cuse.c b/fs/fuse/cuse.c index c5b6b71654893..d9aba97007267 100644 --- a/fs/fuse/cuse.c +++ b/fs/fuse/cuse.c @@ -513,6 +513,7 @@ static int cuse_channel_open(struct inode *inode, struct file *file) rc = cuse_send_init(cc); if (rc) { fuse_dev_free(fud); + fuse_conn_put(&cc->fc); return rc; } file->private_data = fud; -- 2.20.1