From mboxrd@z Thu Jan 1 00:00:00 1970 From: Thomas Monjalon Subject: Re: [PATCH v2] ip_frag: fix double free of chained mbufs Date: Sun, 15 Apr 2018 14:46:39 +0200 Message-ID: <1801925.UK3NFUW1rP@xps> References: <20180319141833.21669-1-allain.legacy@windriver.com> <20180319142523.22163-1-allain.legacy@windriver.com> <2601191342CEEE43887BDE71AB977258AE9139B5@IRSMSX102.ger.corp.intel.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7Bit Cc: dev@dpdk.org, "Ananyev, Konstantin" , "Peters, Matt (Wind River)" , "stable@dpdk.org" To: "Legacy, Allain (Wind River)" Return-path: In-Reply-To: <2601191342CEEE43887BDE71AB977258AE9139B5@IRSMSX102.ger.corp.intel.com> List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" > > The first mbuf and the last mbuf to be visited in the preceding loop > > are not set to NULL in the fragmentation table. This creates the > > possibility of a double free when the fragmentation table is later freed > > with rte_ip_frag_table_destroy(). > > > > Fixes: 95908f52393d ("ip_frag: free mbufs on reassembly table destroy") Cc: stable@dpdk.org Reminder: this Cc must be saved in the commit message for later backport. > > Signed-off-by: Allain Legacy > > Acked-by: Konstantin Ananyev Applied, thanks