diff options
author | Marc Kleine-Budde <mkl@pengutronix.de> | 2015-07-11 22:16:08 +0300 |
---|---|---|
committer | Marc Kleine-Budde <mkl@pengutronix.de> | 2015-07-15 10:04:27 +0300 |
commit | 83537b6fd6c3752bcb578d2bd46312d1e2c4a73a (patch) | |
tree | 8c2dd4ded1e212e2190bdbb8adddb348cc54ae4f /security/security.c | |
parent | 20926d79244de4e9c698ae429fdc1e7e5832b081 (diff) | |
download | linux-83537b6fd6c3752bcb578d2bd46312d1e2c4a73a.tar.xz |
can: grcan: don't touch skb after netif_rx()
There is no guarantee that the skb is in the same state after calling
net_receive_skb() or netif_rx(). It might be freed or reused. Not really
harmful as its a read access, except you turn on the proper debugging options
which catch a use after free.
Cc: Andreas Larsson <andreas@gaisler.com>
Signed-off-by: Marc Kleine-Budde <mkl@pengutronix.de>
Diffstat (limited to 'security/security.c')
0 files changed, 0 insertions, 0 deletions