]> git.baikalelectronics.ru Git - kernel.git/commitdiff
net/smc: Fix sock leak when release after smc_shutdown()
authorTony Lu <tonylu@linux.alibaba.com>
Thu, 14 Apr 2022 07:51:03 +0000 (15:51 +0800)
committerDavid S. Miller <davem@davemloft.net>
Fri, 15 Apr 2022 10:14:38 +0000 (11:14 +0100)
Since commit 8e0b121b4a1c ("net/smc: fix sk_refcnt underflow on linkdown
and fallback"), for a fallback connection, __smc_release() does not call
sock_put() if its state is already SMC_CLOSED.

When calling smc_shutdown() after falling back, its state is set to
SMC_CLOSED but does not call sock_put(), so this patch calls it.

Reported-and-tested-by: syzbot+6e29a053eb165bd50de5@syzkaller.appspotmail.com
Fixes: 8e0b121b4a1c ("net/smc: fix sk_refcnt underflow on linkdown and fallback")
Signed-off-by: Tony Lu <tonylu@linux.alibaba.com>
Acked-by: Karsten Graul <kgraul@linux.ibm.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/smc/af_smc.c

index 14ddc40149e8f0bd555a075f1914b8b422867f79..fc7b6eb22143e5f45a7f89f4463825819be2b67b 100644 (file)
@@ -2674,8 +2674,10 @@ static int smc_shutdown(struct socket *sock, int how)
        if (smc->use_fallback) {
                rc = kernel_sock_shutdown(smc->clcsock, how);
                sk->sk_shutdown = smc->clcsock->sk->sk_shutdown;
-               if (sk->sk_shutdown == SHUTDOWN_MASK)
+               if (sk->sk_shutdown == SHUTDOWN_MASK) {
                        sk->sk_state = SMC_CLOSED;
+                       sock_put(sk);
+               }
                goto out;
        }
        switch (how) {