summaryrefslogtreecommitdiff
path: root/net/netfilter/nft_tunnel.c
diff options
context:
space:
mode:
authorFlorian Westphal <fw@strlen.de>2018-08-03 19:40:21 +0300
committerPablo Neira Ayuso <pablo@netfilter.org>2018-08-03 22:15:13 +0300
commit020f6cc5f75511c5974cfd454f224365bc0c2df4 (patch)
treefb0bd60a7277c8c0445e67c6a9a8d914d2c9f39f /net/netfilter/nft_tunnel.c
parent7bdfcea875ad42b6fd00413882fbc657c751f13a (diff)
downloadlinux-020f6cc5f75511c5974cfd454f224365bc0c2df4.tar.xz
netfilter: conntrack: avoid use-after free on rmmod
When the conntrack module is removed, we call nf_ct_iterate_destroy via nf_ct_l4proto_unregister(). Problem is that nf_conntrack_proto_fini() gets called after the conntrack hash table has already been freed. Just remove the l4proto unregister call, its unecessary as the nf_ct_protos[] array gets free'd right after anyway. v2: add comment wrt. missing unreg call. Fixes: a0ae2562c6c4b2 ("netfilter: conntrack: remove l3proto abstraction") Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'net/netfilter/nft_tunnel.c')
0 files changed, 0 insertions, 0 deletions