From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Miller Subject: Re: [PATCH net-next] tls: Fixed a memory leak during socket close Date: Tue, 25 Sep 2018 10:52:34 -0700 (PDT) Message-ID: <20180925.105234.1515947833639402176.davem@davemloft.net> References: <20180925145151.10992-1-vakul.garg@nxp.com> Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Cc: netdev@vger.kernel.org, borisp@mellanox.com, aviadye@mellanox.com, davejwatson@fb.com, doronrk@fb.com To: vakul.garg@nxp.com Return-path: Received: from shards.monkeyblade.net ([23.128.96.9]:38826 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726163AbeIZABM (ORCPT ); Tue, 25 Sep 2018 20:01:12 -0400 In-Reply-To: <20180925145151.10992-1-vakul.garg@nxp.com> Sender: netdev-owner@vger.kernel.org List-ID: From: Vakul Garg Date: Tue, 25 Sep 2018 20:21:51 +0530 > During socket close, if there is a open record with tx context, it needs > to be be freed apart from freeing up plaintext and encrypted scatter > lists. This patch frees up the open record if present in tx context. > > Also tls_free_both_sg() has been renamed to tls_free_open_rec() to > indicate that the free record in tx context is being freed inside the > function. > > Fixes: a42055e8d2c3 ("net/tls: Add support for async encryption") > Signed-off-by: Vakul Garg Applied.