diff options
author | Steffen Klassert <steffen.klassert@secunet.com> | 2019-11-06 08:13:49 +0100 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2019-12-05 15:38:10 +0100 |
commit | 171148ea3ab00b372f29d41b56fec44313cb0dca (patch) | |
tree | 5e757126fff4f477c16cf0f9a6176866b84021b1 /net/xfrm | |
parent | 0a6f9bc592ef8bd28629dbc32cc82150ea060045 (diff) | |
download | linux-stable-171148ea3ab00b372f29d41b56fec44313cb0dca.tar.gz linux-stable-171148ea3ab00b372f29d41b56fec44313cb0dca.tar.bz2 linux-stable-171148ea3ab00b372f29d41b56fec44313cb0dca.zip |
xfrm: Fix memleak on xfrm state destroy
commit 86c6739eda7d2a03f2db30cbee67a5fb81afa8ba upstream.
We leak the page that we use to create skb page fragments
when destroying the xfrm_state. Fix this by dropping a
page reference if a page was assigned to the xfrm_state.
Fixes: cac2661c53f3 ("esp4: Avoid skb_cow_data whenever possible")
Reported-by: JD <jdtxs00@gmail.com>
Reported-by: Paul Wouters <paul@nohats.ca>
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'net/xfrm')
-rw-r--r-- | net/xfrm/xfrm_state.c | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/net/xfrm/xfrm_state.c b/net/xfrm/xfrm_state.c index bd16e6882017..190ca59d5ba3 100644 --- a/net/xfrm/xfrm_state.c +++ b/net/xfrm/xfrm_state.c @@ -449,6 +449,8 @@ static void xfrm_state_gc_destroy(struct xfrm_state *x) x->type->destructor(x); xfrm_put_type(x->type); } + if (x->xfrag.page) + put_page(x->xfrag.page); xfrm_dev_state_free(x); security_xfrm_state_free(x); kfree(x); |