From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 21D3EC433EF for ; Fri, 22 Jul 2022 06:23:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:Content-Transfer-Encoding: Content-Type:In-Reply-To:From:References:Cc:To:Subject:MIME-Version:Date: Message-ID:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=2bwvU2jM2541NokEqgrmZxlu5UK7D/HJkt3nQDJv4Fw=; b=RityYmyg7NulkjIT6vhBziWUuN JrSDEa2McqPJNAvDxdZlN6RHV79YLFeuvdMJT5GSO2g7nYJC/SWseTd2pw3kAE0k5//zclEkL9gq5 Jmo/0qOz9XrdxGMvpwyQq9DZblkC5gkeIy4P1+Ak5QqwdfZoE4v1Sntj1lOkyAZnKGO+mAmOdBIJ1 g6mJGR1kE2oXhKGf4/yj73GSou46K65N7K8xDDgW74SCC/i9HR8oqidgiAIhztVkU0JR2R24R4a74 trcpO5Sp2dEOrqWcVU/Lku35ZQbehRLv7L8TYg1kTVfx6GNy4saPypzL1DjC8CkF6iMF/bhLd89LT lIMGPgNw==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1oEm4H-000KSt-8e; Fri, 22 Jul 2022 06:23:21 +0000 Received: from smtp-out2.suse.de ([195.135.220.29]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1oEm4E-000KQY-Fj for linux-nvme@lists.infradead.org; Fri, 22 Jul 2022 06:23:20 +0000 Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id D84501FB6C; Fri, 22 Jul 2022 06:23:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_rsa; t=1658470993; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=2bwvU2jM2541NokEqgrmZxlu5UK7D/HJkt3nQDJv4Fw=; b=bi0TEJUehKEs/BQndASOxEna8UgaWt3GzsKoevhxbM3Vgjfq+0QkseUW2gKjvHiWpO1JJ2 DeHNuzQkXmWcblQJQ5W24ZAr8SP1VDiBGXu3mQ1vCFgxTmtV1vG9OtN/NGo5Wz3e6V9Rcy Yt+FGDQfTA2KHPT1I+Ts7sR+gXnfv4k= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.de; s=susede2_ed25519; t=1658470993; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=2bwvU2jM2541NokEqgrmZxlu5UK7D/HJkt3nQDJv4Fw=; b=TZnzrJZJs9lEZo+/BvONd61roCDEKPwqax1IkizqN54MbNhuuwr09zWOnnS7GrgcpaTwwx IR4/IRI4MrqV1XCQ== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id BF42113ABC; Fri, 22 Jul 2022 06:23:13 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id HDbFLVFC2mLZFAAAMHmgww (envelope-from ); Fri, 22 Jul 2022 06:23:13 +0000 Message-ID: Date: Fri, 22 Jul 2022 08:23:13 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 Subject: Re: [PATCH] nvme-auth: Uninitialized variable in nvme_auth_transform_key() Content-Language: en-US To: Dan Carpenter Cc: linux-kernel@vger.kernel.org, kernel-janitors@vger.kernel.org, linux-nvme@lists.infradead.org References: From: Hannes Reinecke In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220721_232318_696710_9D3559FC X-CRM114-Status: GOOD ( 17.43 ) X-BeenThere: linux-nvme@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "Linux-nvme" Errors-To: linux-nvme-bounces+linux-nvme=archiver.kernel.org@lists.infradead.org On 7/18/22 13:10, Dan Carpenter wrote: > A couple of the early error gotos call kfree_sensitive(transformed_key); > before "transformed_key" has been initialized. > > Fixes: a476416bb57b ("nvme: implement In-Band authentication") > Signed-off-by: Dan Carpenter > --- > I wrote this several times in different ways, and kept on doing it > wrong so in the end I wrote it this way. It's a bigger diff, but I > think it's the clearest way to write it. > > drivers/nvme/common/auth.c | 25 ++++++++++++++++--------- > 1 file changed, 16 insertions(+), 9 deletions(-) > > diff --git a/drivers/nvme/common/auth.c b/drivers/nvme/common/auth.c > index bfb16fec0aed..1890193c7333 100644 > --- a/drivers/nvme/common/auth.c > +++ b/drivers/nvme/common/auth.c > @@ -278,26 +278,33 @@ u8 *nvme_auth_transform_key(struct nvme_dhchap_key *key, char *nqn) > shash->tfm = key_tfm; > ret = crypto_shash_setkey(key_tfm, key->key, key->len); > if (ret < 0) > - goto out_free_shash; > + goto out_free_transformed_key; > ret = crypto_shash_init(shash); > if (ret < 0) > - goto out_free_shash; > + goto out_free_transformed_key; > ret = crypto_shash_update(shash, nqn, strlen(nqn)); > if (ret < 0) > - goto out_free_shash; > + goto out_free_transformed_key; > ret = crypto_shash_update(shash, "NVMe-over-Fabrics", 17); > if (ret < 0) > - goto out_free_shash; > + goto out_free_transformed_key; > ret = crypto_shash_final(shash, transformed_key); > + if (ret < 0) > + goto out_free_transformed_key; > + > + kfree(shash); > + crypto_free_shash(key_tfm); > + > + return transformed_key; > + > +out_free_transformed_key: > + kfree_sensitive(transformed_key); > out_free_shash: > kfree(shash); > out_free_key: > crypto_free_shash(key_tfm); > - if (ret < 0) { > - kfree_sensitive(transformed_key); > - return ERR_PTR(ret); > - } > - return transformed_key; > + > + return ERR_PTR(ret); > } > EXPORT_SYMBOL_GPL(nvme_auth_transform_key); > Reviewed-by: Hannes Reinecke Cheers, Hannes -- Dr. Hannes Reinecke Kernel Storage Architect hare@suse.de +49 911 74053 688 SUSE Software Solutions GmbH, Maxfeldstr. 5, 90409 Nürnberg HRB 36809 (AG Nürnberg), Geschäftsführer: Ivo Totev, Andrew Myers, Andrew McDonald, Martje Boudien Moerman