Module Name:    src
Committed By:   ozaki-r
Date:           Tue May 16 07:43:50 UTC 2017

Modified Files:
        src/sys/netipsec: key.c

Log Message:
Fix memory leaks of sah->idents and sah->identd

Originally fixed by the SEIL team of IIJ


To generate a diff of this commit:
cvs rdiff -u -r1.128 -r1.129 src/sys/netipsec/key.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/netipsec/key.c
diff -u src/sys/netipsec/key.c:1.128 src/sys/netipsec/key.c:1.129
--- src/sys/netipsec/key.c:1.128	Tue May 16 07:25:57 2017
+++ src/sys/netipsec/key.c	Tue May 16 07:43:50 2017
@@ -1,4 +1,4 @@
-/*	$NetBSD: key.c,v 1.128 2017/05/16 07:25:57 ozaki-r Exp $	*/
+/*	$NetBSD: key.c,v 1.129 2017/05/16 07:43:50 ozaki-r Exp $	*/
 /*	$FreeBSD: src/sys/netipsec/key.c,v 1.3.2.3 2004/02/14 22:23:23 bms Exp $	*/
 /*	$KAME: key.c,v 1.191 2001/06/27 10:46:49 sakane Exp $	*/
 
@@ -32,7 +32,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.128 2017/05/16 07:25:57 ozaki-r Exp $");
+__KERNEL_RCSID(0, "$NetBSD: key.c,v 1.129 2017/05/16 07:43:50 ozaki-r Exp $");
 
 /*
  * This code is referd to RFC 2367
@@ -2929,6 +2929,11 @@ key_delsah(struct secashead *sah)
 	if (__LIST_CHAINED(sah))
 		LIST_REMOVE(sah, chain);
 
+	if (sah->idents != NULL)
+		KFREE(sah->idents);
+	if (sah->identd != NULL)
+		KFREE(sah->identd);
+
 	kmem_free(sah, sizeof(*sah));
 
 	splx(s);
@@ -5571,6 +5576,18 @@ key_setident(struct secashead *sah, stru
 	KASSERT(mhp != NULL);
 	KASSERT(mhp->msg != NULL);
 
+	/*
+	 * Can be called with an existing sah from key_update().
+	 */
+	if (sah->idents != NULL) {
+		KFREE(sah->idents);
+		sah->idents = NULL;
+	}
+	if (sah->identd != NULL) {
+		KFREE(sah->identd);
+		sah->identd = NULL;
+	}
+
 	/* don't make buffer if not there */
 	if (mhp->ext[SADB_EXT_IDENTITY_SRC] == NULL &&
 	    mhp->ext[SADB_EXT_IDENTITY_DST] == NULL) {

Reply via email to