From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Miller Subject: Re: [PATCH net 0/2] rds-tcp: sock_graft() leak Date: Sat, 08 Jul 2017 11:17:04 +0100 (WEST) Message-ID: <20170708.111704.1692315804267544511.davem@davemloft.net> References: Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Cc: netdev@vger.kernel.org, santosh.shilimkar@oracle.com To: sowmini.varadhan@oracle.com Return-path: Received: from shards.monkeyblade.net ([184.105.139.130]:41132 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752555AbdGHKRi (ORCPT ); Sat, 8 Jul 2017 06:17:38 -0400 In-Reply-To: Sender: netdev-owner@vger.kernel.org List-ID: From: Sowmini Varadhan Date: Thu, 6 Jul 2017 08:15:05 -0700 > Following up on the discussion at > https://www.spinics.net/lists/netdev/msg442859.html > - make rds_tcp_accept_one() call sock_create_lite() > - add a WARN_ON() to sock_graft() > > Tested by running an infinite while() loop that does > (module-load; rds-stress; module-unload) and monitors > TCP slabinfo while the test is running. This looks great, thanks for following up on this. Series applied and queued up for -stable.