Skip to content

Commit c7b205f

Browse files
Jianglei Niedavem330
authored andcommitted
net: macsec: fix potential resource leak in macsec_add_rxsa() and macsec_add_txsa()
init_rx_sa() allocates relevant resource for rx_sa->stats and rx_sa-> key.tfm with alloc_percpu() and macsec_alloc_tfm(). When some error occurs after init_rx_sa() is called in macsec_add_rxsa(), the function released rx_sa with kfree() without releasing rx_sa->stats and rx_sa-> key.tfm, which will lead to a resource leak. We should call macsec_rxsa_put() instead of kfree() to decrease the ref count of rx_sa and release the relevant resource if the refcount is 0. The same bug exists in macsec_add_txsa() for tx_sa as well. This patch fixes the above two bugs. Fixes: 3cf3227 ("net: macsec: hardware offloading infrastructure") Signed-off-by: Jianglei Nie <niejianglei2021@163.com> Signed-off-by: David S. Miller <davem@davemloft.net>
1 parent 20a8546 commit c7b205f

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

drivers/net/macsec.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1844,7 +1844,7 @@ static int macsec_add_rxsa(struct sk_buff *skb, struct genl_info *info)
18441844
return 0;
18451845

18461846
cleanup:
1847-
kfree(rx_sa);
1847+
macsec_rxsa_put(rx_sa);
18481848
rtnl_unlock();
18491849
return err;
18501850
}
@@ -2087,7 +2087,7 @@ static int macsec_add_txsa(struct sk_buff *skb, struct genl_info *info)
20872087

20882088
cleanup:
20892089
secy->operational = was_operational;
2090-
kfree(tx_sa);
2090+
macsec_txsa_put(tx_sa);
20912091
rtnl_unlock();
20922092
return err;
20932093
}

0 commit comments

Comments
 (0)