From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:38894 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727027AbfKKQlD (ORCPT ); Mon, 11 Nov 2019 11:41:03 -0500 Received: from pps.filterd (m0098414.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id xABGeBHU122017 for ; Mon, 11 Nov 2019 11:41:02 -0500 Received: from e06smtp02.uk.ibm.com (e06smtp02.uk.ibm.com [195.75.94.98]) by mx0b-001b2d01.pphosted.com with ESMTP id 2w79rq4rvf-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Mon, 11 Nov 2019 11:41:01 -0500 Received: from localhost by e06smtp02.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Mon, 11 Nov 2019 16:40:58 -0000 Subject: Re: [PATCH v4] s390/pkey: Fix memory leak in error case by using memdup_user() rather than open coding References: <08422b7e-2071-ee52-049e-c3ac55bc67a9@web.de> <6137855bb4170c438c7436cbdb7dfd21639a8855.camel@perches.com> <833d7d5e-6ede-6bdd-a2cc-2da7f0b03908@de.ibm.com> <1b65bc81-f47a-eefa-f1f4-d5af6a1809c0@web.de> <733b29df-207e-a165-ee80-46be8720c0c4@de.ibm.com> <8f98f9fc-57df-5993-44b5-5ea4c0de7ef9@web.de> <61244676-8ac1-20af-ed94-99e19c1f95d5@web.de> <040f3e18-d97a-fc32-b237-20e7553e1733@de.ibm.com> From: Christian Borntraeger Date: Mon, 11 Nov 2019 17:40:52 +0100 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 8bit Message-Id: <0c47ee47-35a0-65ee-4da1-e1745f882947@de.ibm.com> Sender: linux-s390-owner@vger.kernel.org List-ID: To: Markus Elfring , linux-s390@vger.kernel.org, Harald Freudenberger , Heiko Carstens , Ingo Franzki , Vasily Gorbik , Joe Perches Cc: LKML , kernel-janitors@vger.kernel.org, Kangjie Lu , Navid Emamdoost , Stephen McCamant On 11.11.19 15:45, Markus Elfring wrote: > Date: Mon, 11 Nov 2019 15:20:44 +0100 > > Reuse existing functionality from memdup_user() instead of keeping > duplicate source code. > > Generated by: scripts/coccinelle/api/memdup_user.cocci > > * The function "_copy_apqns_from_user" contained a memory leak > because of a misssing function call "kfree(kapqns)" for an if branch. > Link: https://lore.kernel.org/r/833d7d5e-6ede-6bdd-a2cc-2da7f0b03908@de.ibm.com/ > > Thus complete the exception handling by this code replacement. > > * Delete local variables which became unnecessary with this refactoring > in two function implementations. > > Fixes: f2bbc96e7cfad3891b7bf9bd3e566b9b7ab4553d ("s390/pkey: add CCA AES cipher key support") > Signed-off-by: Markus Elfring > --- > > v4: > Further changes were requested by Christian Bornträger. > https://lore.kernel.org/r/040f3e18-d97a-fc32-b237-20e7553e1733@de.ibm.com/ > > * An other patch subject was selected. > > * An other email address was used for the tag “Signed-off-by” this time. applied. [...] > + if (!uapqns || nr_apqns <= 0) While applying I changed that to if (!uapqns || nr_apqns == 0) as nr_apqns is size_t and thus unsigned.