Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp6565134ybx; Mon, 11 Nov 2019 11:02:56 -0800 (PST) X-Google-Smtp-Source: APXvYqxEFC7ehDmbQiksdKKaj1W25dCPcLyf2uAo3Kw1jokjG3rD0C9MRg9behd7bcDwoNV4dEiZ X-Received: by 2002:aa7:d391:: with SMTP id x17mr28153681edq.43.1573498976723; Mon, 11 Nov 2019 11:02:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573498976; cv=none; d=google.com; s=arc-20160816; b=shtNhrIgY3g5QOAcu6TQC7Ear3Tfumi9ultDLyiCoqQDreXJLmNW0Ly73AFc9uN3WP RgUCG5DrxsVKJu1DbbH667quaAgAWOUeUiFgPGheBd4sxw9sU8AnfXpjVWRG6h+5LTE1 5ndxRb8Qj9k0NV7kzJjcSRDI9alS8JrhRzvwLaztweRSSnyY4QB3tyjE1F73MMD8p26o QuMTSK/ELGbQe/EvA0bi0z8S6zjU6KGEJJKXOV7Ul4cMc3J/Owmq96yEUA1x0SwkPZCV aax2xnWVZuzjaPKdeu6LJbVXX9hjyJT0czdID669FjeryR2D7sgyeMn3WmQcOE3Yzkxw 3jgQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=RBRt3fabTeg2+KMc03Wc37aCZBmNXZeek87qny04DWI=; b=ukEGTRZPVzNXFOYJagQM3JHzewHNuBMIAeB4dUK+DUsdUfuLVgKpa4umO4A0nFagA6 2OeuLuSlHewuyhBd0+hZ+o2SrKZ2EjsxTfapVpPv5H0O5wX8vhnMhkHpc82hNj34xqS1 w4L+LwBCf0HR0aI4tTtijrSMPMbPub6GM+F9MVCTKDTdbg2n8EW3qEvBzz7/9O9yiT6z 4epQKvLuNRSwXVoWqxarY7BlB7TSembqQnMVDULNA37y4nZtBft1WGmZIWX0pAPOBVhO DoWUAt/uxqRJOmT0OEUM5mU8A/PKQ3thQK/FrW3ZfguQzSE7dY0+G8csQ+0zND7RVmGQ /SHw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="u7q81zx/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b2si9879152eja.89.2019.11.11.11.02.28; Mon, 11 Nov 2019 11:02:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="u7q81zx/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729636AbfKKSvN (ORCPT + 99 others); Mon, 11 Nov 2019 13:51:13 -0500 Received: from mail.kernel.org ([198.145.29.99]:45244 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730378AbfKKSvL (ORCPT ); Mon, 11 Nov 2019 13:51:11 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 96825222C1; Mon, 11 Nov 2019 18:51:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573498271; bh=adpq1GeiD4Ew3QlqO1RCEkWdEP6zfS3FL2ey0sj1iRk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=u7q81zx/e3YL/5hJxSooUn1yUNDqE7TPmEon7dAoOW6Ae90g6OluLdRAXOTvNH9k8 ThMDt50801c7Xc+R0kr/GiCAjauXkkb+mBzQRRif407gHFGS40kUo1wAt3NlP7iS0c 6AkYToQl06kr5jzBB+xtSNODMbc3LgFk4+U6jJs8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ursula Braun , Karsten Graul , "David S. Miller" Subject: [PATCH 5.3 022/193] net/smc: fix ethernet interface refcounting Date: Mon, 11 Nov 2019 19:26:44 +0100 Message-Id: <20191111181501.851467676@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191111181459.850623879@linuxfoundation.org> References: <20191111181459.850623879@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ursula Braun [ Upstream commit 98f3375505b8d6517bd6710bc6d4f6289eeb30aa ] If a pnet table entry is to be added mentioning a valid ethernet interface, but an invalid infiniband or ISM device, the dev_put() operation for the ethernet interface is called twice, resulting in a negative refcount for the ethernet interface, which disables removal of such a network interface. This patch removes one of the dev_put() calls. Fixes: 890a2cb4a966 ("net/smc: rework pnet table") Signed-off-by: Ursula Braun Signed-off-by: Karsten Graul Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/smc/smc_pnet.c | 2 -- 1 file changed, 2 deletions(-) --- a/net/smc/smc_pnet.c +++ b/net/smc/smc_pnet.c @@ -376,8 +376,6 @@ static int smc_pnet_fill_entry(struct ne return 0; error: - if (pnetelem->ndev) - dev_put(pnetelem->ndev); return rc; }