Commit 23b29ed8 authored by Vlad Yasevich's avatar Vlad Yasevich Committed by David S. Miller

sctp: Do not leak memory on multiple listen() calls

SCTP permits multiple listen call and on subsequent calls
we leak he memory allocated for the crypto transforms.
Signed-off-by: default avatarVlad Yasevich <vladislav.yasevich@hp.com>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent 7dab83de
...@@ -5773,7 +5773,7 @@ int sctp_inet_listen(struct socket *sock, int backlog) ...@@ -5773,7 +5773,7 @@ int sctp_inet_listen(struct socket *sock, int backlog)
goto out; goto out;
/* Allocate HMAC for generating cookie. */ /* Allocate HMAC for generating cookie. */
if (sctp_hmac_alg) { if (!sctp_sk(sk)->hmac && sctp_hmac_alg) {
tfm = crypto_alloc_hash(sctp_hmac_alg, 0, CRYPTO_ALG_ASYNC); tfm = crypto_alloc_hash(sctp_hmac_alg, 0, CRYPTO_ALG_ASYNC);
if (IS_ERR(tfm)) { if (IS_ERR(tfm)) {
if (net_ratelimit()) { if (net_ratelimit()) {
...@@ -5801,6 +5801,7 @@ int sctp_inet_listen(struct socket *sock, int backlog) ...@@ -5801,6 +5801,7 @@ int sctp_inet_listen(struct socket *sock, int backlog)
goto cleanup; goto cleanup;
/* Store away the transform reference. */ /* Store away the transform reference. */
if (!sctp_sk(sk)->hmac)
sctp_sk(sk)->hmac = tfm; sctp_sk(sk)->hmac = tfm;
out: out:
sctp_release_sock(sk); sctp_release_sock(sk);
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment