wg: Avoid leaking mbufs when the input handshake queue is full
Reviewed by: grehan Sponsored by: The FreeBSD Foundation MFC after: 3 days Differential Revision: https://reviews.freebsd.org/D29011
This commit is contained in:
parent
af06ff5553
commit
a11009dccb
@ -1913,6 +1913,7 @@ wg_input(struct mbuf *m0, int offset, struct inpcb *inpcb,
|
||||
*/
|
||||
if ((m = m_pullup(m0, m0->m_pkthdr.len)) == NULL) {
|
||||
DPRINTF(sc, "DEFRAG fail\n");
|
||||
m_freem(m0);
|
||||
return;
|
||||
}
|
||||
data = mtod(m, void *);
|
||||
@ -1943,8 +1944,10 @@ wg_input(struct mbuf *m0, int offset, struct inpcb *inpcb,
|
||||
verify_endpoint(m);
|
||||
if (mbufq_enqueue(&sc->sc_handshake_queue, m) == 0) {
|
||||
GROUPTASK_ENQUEUE(&sc->sc_handshake);
|
||||
} else
|
||||
} else {
|
||||
DPRINTF(sc, "Dropping handshake packet\n");
|
||||
wg_m_freem(m);
|
||||
}
|
||||
} else if (pktlen >= sizeof(struct wg_pkt_data) + NOISE_MAC_SIZE
|
||||
&& pkttype == MESSAGE_DATA) {
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user