Commit d60667fc authored by Daniel Jurgens's avatar Daniel Jurgens Committed by Jason Gunthorpe

IB/core: Unregister notifier before freeing MAD security

If the notifier runs after the security context is freed an access of
freed memory can occur.

Fixes: 47a2b338 ("IB/core: Enforce security on management datagrams")
Signed-off-by: default avatarDaniel Jurgens <danielj@mellanox.com>
Reviewed-by: default avatarParav Pandit <parav@mellanox.com>
Signed-off-by: default avatarLeon Romanovsky <leonro@mellanox.com>
Signed-off-by: default avatarJason Gunthorpe <jgg@mellanox.com>
parent 0c236606
...@@ -727,9 +727,10 @@ void ib_mad_agent_security_cleanup(struct ib_mad_agent *agent) ...@@ -727,9 +727,10 @@ void ib_mad_agent_security_cleanup(struct ib_mad_agent *agent)
if (!rdma_protocol_ib(agent->device, agent->port_num)) if (!rdma_protocol_ib(agent->device, agent->port_num))
return; return;
security_ib_free_security(agent->security);
if (agent->lsm_nb_reg) if (agent->lsm_nb_reg)
unregister_lsm_notifier(&agent->lsm_nb); unregister_lsm_notifier(&agent->lsm_nb);
security_ib_free_security(agent->security);
} }
int ib_mad_enforce_security(struct ib_mad_agent_private *map, u16 pkey_index) int ib_mad_enforce_security(struct ib_mad_agent_private *map, u16 pkey_index)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment