Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
net: sctp: sctp_transport_destroy{, _rcu}: fix potential pointer corr…
…uption Probably this one is quite unlikely to be triggered, but it's more safe to do the call_rcu() at the end after we have dropped the reference on the asoc and freed sctp packet chunks. The reason why is because in sctp_transport_destroy_rcu() the transport is being kfree()'d, and if we're unlucky enough we could run into corrupted pointers. Probably that's more of theoretical nature, but it's safer to have this simple fix. Introduced by commit 8c98653 ("sctp: sctp_close: fix release of bindings for deferred call_rcu's"). I also did the 8c98653 regression test and it's fine that way. Signed-off-by: Daniel Borkmann <dborkman@redhat.com> Acked-by: Vlad Yasevich <vyasevich@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
- Loading branch information