Received: by 2002:ac0:a591:0:0:0:0:0 with SMTP id m17-v6csp600881imm; Sat, 7 Jul 2018 04:26:50 -0700 (PDT) X-Google-Smtp-Source: AAOMgpfyoB+cayhABpi+L3YhqmTqm4hNHaQL+4fNE/CwUXgc12yG/z2TJj7XTDMOxmbIn6H4uhic X-Received: by 2002:a62:1358:: with SMTP id b85-v6mr14086181pfj.238.1530962810378; Sat, 07 Jul 2018 04:26:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530962810; cv=none; d=google.com; s=arc-20160816; b=GfKLI1Zg2Nc9DH3pz1T48ClHUWkiwx3OV0qhZkr1+LrsbZQ2LSCcwuWmsw5uV/err2 S3KXkNGCrvT1MW/OHSWlTOKh9GgybDRP9bdsozHMqs0t1FFFzYkg9WzXI5/y5+SM/7D7 EkVogALxs25wJNWNXWxW+o794Q55cNSKrs+T6s5uovRO+asyWYZdbfrLG3IualVca/h/ AzXKk8R8gcnrRZBi/WpCXj2B2QZeEHuGQ5r6litz+ybCqXHzSAb+Qgcj/n6IF0F8nNzv JcFF3wv6CPhhqYEcyFF4TQSTfOKgb8kRxFDIPjoLPIny3GGdEX+7MKu7WEfcr+xEVcs1 XboQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:from:subject:cc:to:message-id:date :arc-authentication-results; bh=5lebaEiwkN96d+6vbmEXBJgdn2JBaP/kX2Ywc+ajjsA=; b=dYMuIpcxzVjE7GfdLNMOT5flip6hZnUKtohofRNHYbKGsU8RhG8vPzqWo4KrAfzgfZ BUTCdLS3FLW88qensaVxGrT11OO17BJ0Oxsv0be2tYm7YEnzCQBzouFxHH8RzYC0DIOy wRXTfqcvBr5c0TdFkwSamm7BFQJbqXb/+ccDCDHBpJAUyiunUjdScKojX/DDpvpjDmmQ mizzuZBfnuzHIbhKGs5+WwkIbUuBa1+tlxZw7/3rAzDA45+reVgMdlsmjdzXcDhSAogS 8TE6v1RiarCZpXQ76DrLEAtue0oGH12Sg0/n0Ne9rQnaQFYmmoySIlh9qEwqzAVi1GEB tkkQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u6-v6si10197844pld.74.2018.07.07.04.26.36; Sat, 07 Jul 2018 04:26:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754048AbeGGLZ7 (ORCPT + 99 others); Sat, 7 Jul 2018 07:25:59 -0400 Received: from shards.monkeyblade.net ([23.128.96.9]:51670 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753358AbeGGLZ6 (ORCPT ); Sat, 7 Jul 2018 07:25:58 -0400 Received: from localhost (unknown [211.196.191.92]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client did not present a certificate) (Authenticated sender: davem-davemloft) by shards.monkeyblade.net (Postfix) with ESMTPSA id 16CB212107104; Sat, 7 Jul 2018 04:25:55 -0700 (PDT) Date: Sat, 07 Jul 2018 20:25:54 +0900 (KST) Message-Id: <20180707.202554.176954772644288123.davem@davemloft.net> To: ubraun@linux.ibm.com Cc: netdev@vger.kernel.org, linux-s390@vger.kernel.org, schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com, raspl@linux.ibm.com, linux-kernel@vger.kernel.org, ebiggers3@gmail.com Subject: Re: [PATCH net 1/1] net/smc: reduce sock_put() for fallback sockets From: David Miller In-Reply-To: <20180705141530.72728-1-ubraun@linux.ibm.com> References: <20180705141530.72728-1-ubraun@linux.ibm.com> X-Mailer: Mew version 6.7 on Emacs 26 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Sat, 07 Jul 2018 04:25:58 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ursula Braun Date: Thu, 5 Jul 2018 16:15:30 +0200 > smc_release() calls a sock_put() for smc fallback sockets to cover > the passive closing sock_hold() in __smc_connect() and > smc_tcp_listen_work(). This does not make sense for sockets in state > SMC_LISTEN and SMC_INIT. > An SMC socket stays in state SMC_INIT if connect fails. The sock_put > in smc_connect_abort() does not cover all failures. Move it into > smc_connect_decline_fallback(). > > Fixes: ee9dfbef02d18 ("net/smc: handle sockopts forcing fallback") > Reported-by: syzbot+3a0748c8f2f210c0ef9b@syzkaller.appspotmail.com > Reported-by: syzbot+9e60d2428a42049a592a@syzkaller.appspotmail.com > Signed-off-by: Ursula Braun Applied, thanks.