Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp2621833pxb; Sun, 15 Nov 2020 11:23:56 -0800 (PST) X-Google-Smtp-Source: ABdhPJwQk+okJKFrWUuyqEP+ELmPOFyh5Vt3lV6Qyd6gEonBZI8mRbg5M4Y9XGG9n2IqGC2RA+z8 X-Received: by 2002:a17:906:4ed7:: with SMTP id i23mr2742460ejv.172.1605468235996; Sun, 15 Nov 2020 11:23:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605468235; cv=none; d=google.com; s=arc-20160816; b=GDrF+KTeT4geCpM76ijYXvYrYJVPIcwVrjJ1xZ5TlNMgH6UVjkXpgIaa7+U5To6uqM Khv9STsx4khc/b/O3QZrXBZ2P4Ni7AC5EedR95y6o47PdXjrrjnFg1YCGLQHZyjvugn4 lceq+qmXHuLUTMF6p5m6UlUlIHuCKkSRxzSPiRXfuxhHLb1to+rBtu1pKS2XbTkeqYTx onrN5rIbLzaqF1OY0IQIcUWN3/Nn29ypW2y7U/NwlJX4DhOhOVUbBbuMTE39Y8gW2lec VqLKGmh4D3p8/f/z7+NQwaqDDwYhnRJbuDQfXswZcq9TH0M8XZgVBeo5Ai/UFv68VOAL Hjiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from :dkim-signature; bh=4KPQVzj3XaK0dcddXHao3rFPSxVSyHVZa7GVCBHBYGg=; b=fnchH738rLFhITgVGis3RtXotbj/8yk5OG3W8Q9M+QcrYrs7yYkxaEypjBlpE5U2/1 Wf6F6w7Be6miMd3b3oQ+3bSJviMZAxTq4LSyZd74Zli051jhs1E53hezzfM3QCBRYwyo tsDXnBOo4kO+qhRndgxYihxxRQzt09gpOsffJL39Tf8bzGiwHN+lnM57jJlhEQGdy0Il XlzBIY18T7Gqq3e7eLa1K47jwiKvU8Y8zQ5Z6hSPR8IjqZnkUo1hL1Yvevy7T/xsFLRb iL9uAu099P95dQNFVg5VlWuNnpSYYS2wFPY/cuQTsk+OEM3c6S73SFY/9aXOEXbCg+Dv 6qXw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@baylibre-com.20150623.gappssmtp.com header.s=20150623 header.b=QBr+Tfpr; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p6si10082900edi.344.2020.11.15.11.23.17; Sun, 15 Nov 2020 11:23:55 -0800 (PST) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@baylibre-com.20150623.gappssmtp.com header.s=20150623 header.b=QBr+Tfpr; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727398AbgKOTI1 (ORCPT + 99 others); Sun, 15 Nov 2020 14:08:27 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35848 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726823AbgKOTI1 (ORCPT ); Sun, 15 Nov 2020 14:08:27 -0500 Received: from mail-pg1-x541.google.com (mail-pg1-x541.google.com [IPv6:2607:f8b0:4864:20::541]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 127CDC0613D1 for ; Sun, 15 Nov 2020 11:08:26 -0800 (PST) Received: by mail-pg1-x541.google.com with SMTP id q28so229912pgk.1 for ; Sun, 15 Nov 2020 11:08:26 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=baylibre-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id; bh=4KPQVzj3XaK0dcddXHao3rFPSxVSyHVZa7GVCBHBYGg=; b=QBr+Tfprgj2XQXAST4ZuTFUKXgfRKS//pj86h4zxdfUqPM530T+atjzm6q8qzowE7/ qpdtzmdQyCAWXpYeIpCQLU8OPsaMW9hFxc6XIpS5znQsI7j0GMmhk4AMg17/kuQ1J8go M4H+qyiSl36bUnDwZT+ahShgYJ/5F8MrW+tc+3GqB/X1jHlTfJPryMhJkF2mHDeah1nl iNYm28H4Y+Sb/UvoG0d4gqLpFLFyx8KgDMvkLbRx0YP+FWRS18AXKm5VFPA7EcWvTeeN uTvx86H5GWuac3Lr+g+ALnCtT92A7yXPmhbQCklK0kXuzWD2B6Cltrh4GLY0ThY7VGeq 2sBw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=4KPQVzj3XaK0dcddXHao3rFPSxVSyHVZa7GVCBHBYGg=; b=njLcmTscIAMif+mDBWLdvWiVrtRwC8kbn8k5WBYNSfO7uy1yxfsyxmB+MQimmSyNYQ u9BqPWJdeA/0za0Jrnu+Nk7KVxmn223zsMeeoyYlVgueuGhWKf16HdEHdEPxRSm3rq3H OkONkkURgIiMFTcjufdKiTDRy5bh/8y4t7IwHajwxRSopaMSrWZiUkSx2n7fNAMdMjnI t1WBsjbpJ+GhiIFm9N5GzSAyJ0zOEBGqx1UikNW9gQY1t2hZoi3RVF6zZ3CC/GNTgU1W l9xo2zBHt5OlLK/sXm/6w8NMxkeCCGqWvSxjVkRz2QaXSNEqz7UYaiTg0AVvJ+tL9dAk XFyQ== X-Gm-Message-State: AOAM532UJ8hGdJ6EojCcPJf6ovc6X8SsbPd5pQjlTlscrJVeSSDgcXlh J6TY7DV2mI5l3smiTgNboSFq/RmzEFimnQ== X-Received: by 2002:a63:484e:: with SMTP id x14mr10340222pgk.282.1605467304921; Sun, 15 Nov 2020 11:08:24 -0800 (PST) Received: from localhost.localdomain ([163.172.76.58]) by smtp.googlemail.com with ESMTPSA id i16sm15810339pfr.183.2020.11.15.11.08.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 15 Nov 2020 11:08:24 -0800 (PST) From: Corentin Labbe To: dan.carpenter@oracle.com, davem@davemloft.net, herbert@gondor.apana.org.au, jernej.skrabec@siol.net, mripard@kernel.org, wens@csie.org Cc: linux-arm-kernel@lists.infradead.org, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, Corentin Labbe Subject: [PATCH] crypto: allwinner: sun8i-ce: fix two error path's memory leak Date: Sun, 15 Nov 2020 19:08:07 +0000 Message-Id: <20201115190807.12251-1-clabbe@baylibre.com> X-Mailer: git-send-email 2.17.1 Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org This patch fixes the following smatch warnings: drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c:412 sun8i_ce_hash_run() warn: possible memory leak of 'result' Note: "buf" is leaked as well. Furthermore, in case of ENOMEM, crypto_finalize_hash_request() was not called which was an error. Fixes: 56f6d5aee88d ("crypto: sun8i-ce - support hash algorithms") Reported-by: kernel test robot Reported-by: Dan Carpenter Signed-off-by: Corentin Labbe --- .../crypto/allwinner/sun8i-ce/sun8i-ce-hash.c | 20 +++++++++++-------- 1 file changed, 12 insertions(+), 8 deletions(-) diff --git a/drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c b/drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c index a94bf28f858a..4c5a2c11d714 100644 --- a/drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c +++ b/drivers/crypto/allwinner/sun8i-ce/sun8i-ce-hash.c @@ -262,13 +262,13 @@ int sun8i_ce_hash_run(struct crypto_engine *engine, void *breq) u32 common; u64 byte_count; __le32 *bf; - void *buf; + void *buf = NULL; int j, i, todo; int nbw = 0; u64 fill, min_fill; __be64 *bebits; __le64 *lebits; - void *result; + void *result = NULL; u64 bs; int digestsize; dma_addr_t addr_res, addr_pad; @@ -285,13 +285,17 @@ int sun8i_ce_hash_run(struct crypto_engine *engine, void *breq) /* the padding could be up to two block. */ buf = kzalloc(bs * 2, GFP_KERNEL | GFP_DMA); - if (!buf) - return -ENOMEM; + if (!buf) { + err = -ENOMEM; + goto theend; + } bf = (__le32 *)buf; result = kzalloc(digestsize, GFP_KERNEL | GFP_DMA); - if (!result) - return -ENOMEM; + if (!result) { + err = -ENOMEM; + goto theend; + } flow = rctx->flow; chan = &ce->chanlist[flow]; @@ -403,11 +407,11 @@ int sun8i_ce_hash_run(struct crypto_engine *engine, void *breq) dma_unmap_sg(ce->dev, areq->src, nr_sgs, DMA_TO_DEVICE); dma_unmap_single(ce->dev, addr_res, digestsize, DMA_FROM_DEVICE); - kfree(buf); memcpy(areq->result, result, algt->alg.hash.halg.digestsize); - kfree(result); theend: + kfree(buf); + kfree(result); crypto_finalize_hash_request(engine, breq, err); return 0; } -- 2.26.2