Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp5251944ybc; Wed, 27 Nov 2019 00:50:53 -0800 (PST) X-Google-Smtp-Source: APXvYqzoPMqgej2k5hGEariB+hEG7Fbw5r1zQdgss0nJKYneHc+AhGZd04rMiT0L7MRIzXTnHNXp X-Received: by 2002:a17:906:958e:: with SMTP id r14mr23965011ejx.228.1574844653728; Wed, 27 Nov 2019 00:50:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574844653; cv=none; d=google.com; s=arc-20160816; b=lX0jvLFCpZmDlFz3gu3fU0i5QCzWCLeo4q/riu/DNvvbOdC5F0G05enI/0NvqPFD0+ nsHu04I6IyvenMbOoTOeq8ZuHQ31jOGM5rFfnCzV0z5PWDbr4e3Qut3eqHiIfolgu8u8 TyA7U4f/jYFaJoBIj1c2SO5PXuNTHNNTTxvWuCwOWj4lAwSmj72FlTpKuW8RQ4/xhrxw D/wjCm3PSWWxk7XIWn8xJMgFOL/s0sL4DJFV90R8UtSLdCQBRj9vpurdUi2UBKNUJXmS fwDJDsbje+8R518akz8/vPBRKn4RVjrE8iT4hvA97XOW22loPbqRBd0Z/JNZMRBYTw3O EvaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=o873lY7sS08UnyFnQ1V9h7KzCynMaRiQYvbnwbg71VQ=; b=XbhKBVJdY1cFyOgj8anDqBJc1BW6tjJF3XScLQyWr+TqnQRAAXRPdCaocJ77klrusf fDnYl5UX6Ty7E646MXLs35kBBznW474sXvsDrcP1pIuIb0dn0bvaei0yZX+k2Wzkf/dZ H/AjEQpNF+LBEwN6uxFnHwWUdChxwqB+h8MwjPvs9nFD9BbM0QpecQjjlscBhKN8mskV 0Zm5KauOz77uJ86RqPlBd3QoEyCdKp8fBcZJdBN1z7nhaAFi/GRwQ9TXIhkxU98pHNtB GJ+JLu8rpqNllQqlzO7eUVyxIJBDDmM57KWMdf6aRAsHH7YE12wTDOGEWuucKIi26jlD rDew== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o19si9311733edq.238.2019.11.27.00.50.28; Wed, 27 Nov 2019 00:50:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726722AbfK0Itc (ORCPT + 99 others); Wed, 27 Nov 2019 03:49:32 -0500 Received: from foss.arm.com ([217.140.110.172]:44570 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726909AbfK0It2 (ORCPT ); Wed, 27 Nov 2019 03:49:28 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 3FC6031B; Wed, 27 Nov 2019 00:49:28 -0800 (PST) Received: from e110176-lin.kfn.arm.com (unknown [10.50.4.153]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id D4DCF3F52E; Wed, 27 Nov 2019 00:49:26 -0800 (PST) From: Gilad Ben-Yossef To: Herbert Xu , "David S. Miller" Cc: Ofir Drang , stable@vger.kernel.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 4/4] crypto: ccree: fix backlog memory leak Date: Wed, 27 Nov 2019 10:49:08 +0200 Message-Id: <20191127084909.14472-5-gilad@benyossef.com> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191127084909.14472-1-gilad@benyossef.com> References: <20191127084909.14472-1-gilad@benyossef.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Fix brown paper bag bug of not releasing backlog list item buffer when backlog was consumed causing a memory leak when backlog is used. Signed-off-by: Gilad Ben-Yossef Cc: stable@vger.kernel.org # v4.19+ --- drivers/crypto/ccree/cc_request_mgr.c | 1 + 1 file changed, 1 insertion(+) diff --git a/drivers/crypto/ccree/cc_request_mgr.c b/drivers/crypto/ccree/cc_request_mgr.c index 3ed3164820eb..a5606dc04b06 100644 --- a/drivers/crypto/ccree/cc_request_mgr.c +++ b/drivers/crypto/ccree/cc_request_mgr.c @@ -404,6 +404,7 @@ static void cc_proc_backlog(struct cc_drvdata *drvdata) spin_lock(&mgr->bl_lock); list_del(&bli->list); --mgr->bl_len; + kfree(bli); } spin_unlock(&mgr->bl_lock); -- 2.23.0