From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932323AbdBNRqq (ORCPT ); Tue, 14 Feb 2017 12:46:46 -0500 Received: from mail-qt0-f178.google.com ([209.85.216.178]:35272 "EHLO mail-qt0-f178.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932286AbdBNRqg (ORCPT ); Tue, 14 Feb 2017 12:46:36 -0500 From: Rob Rice To: Herbert Xu , "David S. Miller" , Dan Carpenter , linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, bcm-kernel-feedback-list@broadcom.com Cc: Rob Rice Subject: [PATCH 1/1] crypto: brcm - Avoid double free in ahash_finup() Date: Tue, 14 Feb 2017 12:45:52 -0500 Message-Id: <1487094352-2016-1-git-send-email-rob.rice@broadcom.com> X-Mailer: git-send-email 2.1.0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In Broadcom SPU driver, in case where incremental hash is done in software in ahash_finup(), tmpbuf was freed twice. Reported-by: Dan Carpenter Signed-off-by: Rob Rice --- drivers/crypto/bcm/cipher.c | 1 - 1 file changed, 1 deletion(-) diff --git a/drivers/crypto/bcm/cipher.c b/drivers/crypto/bcm/cipher.c index a654a01..cc0d5b9 100644 --- a/drivers/crypto/bcm/cipher.c +++ b/drivers/crypto/bcm/cipher.c @@ -2331,7 +2331,6 @@ static int ahash_finup(struct ahash_request *req) /* Call synchronous update */ ret = crypto_shash_finup(ctx->shash, tmpbuf, req->nbytes, req->result); - kfree(tmpbuf); } else { /* Otherwise call the internal function which uses SPU hw */ return __ahash_finup(req); -- 2.1.0