diff options
| author | Steve French <stfrench@microsoft.com> | 2019-10-26 16:00:44 -0500 |
|---|---|---|
| committer | Steve French <stfrench@microsoft.com> | 2019-10-27 14:36:11 -0500 |
| commit | a08d897bc04f23c608dadde5c31ef194911e78bb (patch) | |
| tree | 535381dda06fa0db9b3be7ef265432efbcb974e2 | |
| parent | Linux 5.4-rc5 (diff) | |
| download | linux-a08d897bc04f23c608dadde5c31ef194911e78bb.tar.gz linux-a08d897bc04f23c608dadde5c31ef194911e78bb.zip | |
fix memory leak in large read decrypt offload
Spotted by Ronnie.
Reviewed-by: Ronnie Sahlberg <lsahlber@redhat.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
| -rw-r--r-- | fs/cifs/smb2ops.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/fs/cifs/smb2ops.c b/fs/cifs/smb2ops.c index 4c0922596467..cd55af9b7cc5 100644 --- a/fs/cifs/smb2ops.c +++ b/fs/cifs/smb2ops.c @@ -4084,6 +4084,7 @@ free_pages: kfree(dw->ppages); cifs_small_buf_release(dw->buf); + kfree(dw); } @@ -4157,7 +4158,7 @@ receive_encrypted_read(struct TCP_Server_Info *server, struct mid_q_entry **mid, dw->server = server; dw->ppages = pages; dw->len = len; - queue_work(cifsiod_wq, &dw->decrypt); + queue_work(decrypt_wq, &dw->decrypt); *num_mids = 0; /* worker thread takes care of finding mid */ return -1; } |
