net/smc: fix closing of fallback SMC sockets
authorUrsula Braun <ubraun@linux.ibm.com>
Wed, 23 Oct 2019 13:44:05 +0000 (15:44 +0200)
committerDavid S. Miller <davem@davemloft.net>
Sat, 26 Oct 2019 02:18:21 +0000 (19:18 -0700)
commitf536dffc0b79738c3104af999318279dccbaa261
tree7fbe29b9602d336c4451a8b5bcc5f20686afb393
parent91e2e57636f163837e1aea2ce6c4995b8a2a6f10
net/smc: fix closing of fallback SMC sockets

For SMC sockets forced to fallback to TCP, the file is propagated
from the outer SMC to the internal TCP socket. When closing the SMC
socket, the internal TCP socket file pointer must be restored to the
original NULL value, otherwise memory leaks may show up (found with
CONFIG_DEBUG_KMEMLEAK).

The internal TCP socket is released in smc_clcsock_release(), which
calls __sock_release() function in net/socket.c. This calls the
needed iput(SOCK_INODE(sock)) only, if the file pointer has been reset
to the original NULL-value.

Fixes: 07603b230895 ("net/smc: propagate file from SMC to TCP socket")
Signed-off-by: Ursula Braun <ubraun@linux.ibm.com>
Signed-off-by: Karsten Graul <kgraul@linux.ibm.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/smc/af_smc.c