In the Linux kernel, the following vulnerability has been resolved: smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy() We can't call destroy_workqueue(smb_direct_wq); before stop_sessions()! Otherwise already existing connections try to use smb_direct_wq as a NULL pointer.
https://git.kernel.org/stable/c/e41e33400516702427603f8fbbec43c91ede09c0
https://git.kernel.org/stable/c/bac7b996d42e458a94578f4227795a0d4deef6fa
https://git.kernel.org/stable/c/524e90e58a267dad11e23351d9e4b1f941490976
https://git.kernel.org/stable/c/212eb86f75b4d7b82f3d94aed95ba61103bccb93
https://git.kernel.org/stable/c/003e6a3150299f681f34cb189aa068018cef6a45