public inbox for stable@vger.kernel.org
 help / color / mirror / Atom feed
* [PATCH] crypto: nx - fix memory leaks in nx842_crypto_{alloc,free}_ctx
@ 2026-03-11 15:09 Thorsten Blum
  2026-03-11 15:16 ` Ard Biesheuvel
  0 siblings, 1 reply; 3+ messages in thread
From: Thorsten Blum @ 2026-03-11 15:09 UTC (permalink / raw)
  To: Haren Myneni, Madhavan Srinivasan, Michael Ellerman,
	Nicholas Piggin, Christophe Leroy (CS GROUP), Herbert Xu,
	David S. Miller, Dan Streetman, Ard Biesheuvel
  Cc: Thorsten Blum, stable, linuxppc-dev, linux-crypto, linux-kernel

The bounce buffers are allocated with __get_free_pages() using
BOUNCE_BUFFER_ORDER (order 2 = 4 pages), but both the allocation error
path and nx842_crypto_free_ctx() release the buffers with free_page().
Use free_pages() with the matching order instead.

Also, since the scomp conversion, nx842_crypto_alloc_ctx() allocates the
context separately, but nx842_crypto_free_ctx() never releases it. Add
the missing kfree(ctx) in nx842_crypto_free_ctx(), and reuse
nx842_crypto_free_ctx() in the allocation error path.

Fixes: ed70b479c2c0 ("crypto: nx - add hardware 842 crypto comp alg")
Fixes: 980b5705f4e7 ("crypto: nx - Migrate to scomp API")
Cc: stable@vger.kernel.org
Signed-off-by: Thorsten Blum <thorsten.blum@linux.dev>
---
 drivers/crypto/nx/nx-842.c | 10 ++++------
 1 file changed, 4 insertions(+), 6 deletions(-)

diff --git a/drivers/crypto/nx/nx-842.c b/drivers/crypto/nx/nx-842.c
index b61f2545e165..a61208cbcd27 100644
--- a/drivers/crypto/nx/nx-842.c
+++ b/drivers/crypto/nx/nx-842.c
@@ -115,10 +115,7 @@ void *nx842_crypto_alloc_ctx(struct nx842_driver *driver)
 	ctx->sbounce = (u8 *)__get_free_pages(GFP_KERNEL, BOUNCE_BUFFER_ORDER);
 	ctx->dbounce = (u8 *)__get_free_pages(GFP_KERNEL, BOUNCE_BUFFER_ORDER);
 	if (!ctx->wmem || !ctx->sbounce || !ctx->dbounce) {
-		kfree(ctx->wmem);
-		free_page((unsigned long)ctx->sbounce);
-		free_page((unsigned long)ctx->dbounce);
-		kfree(ctx);
+		nx842_crypto_free_ctx(ctx);
 		return ERR_PTR(-ENOMEM);
 	}
 
@@ -131,8 +128,9 @@ void nx842_crypto_free_ctx(void *p)
 	struct nx842_crypto_ctx *ctx = p;
 
 	kfree(ctx->wmem);
-	free_page((unsigned long)ctx->sbounce);
-	free_page((unsigned long)ctx->dbounce);
+	free_pages((unsigned long)ctx->sbounce, BOUNCE_BUFFER_ORDER);
+	free_pages((unsigned long)ctx->dbounce, BOUNCE_BUFFER_ORDER);
+	kfree(ctx);
 }
 EXPORT_SYMBOL_GPL(nx842_crypto_free_ctx);
 

^ permalink raw reply related	[flat|nested] 3+ messages in thread

* Re: [PATCH] crypto: nx - fix memory leaks in nx842_crypto_{alloc,free}_ctx
  2026-03-11 15:09 [PATCH] crypto: nx - fix memory leaks in nx842_crypto_{alloc,free}_ctx Thorsten Blum
@ 2026-03-11 15:16 ` Ard Biesheuvel
  2026-03-11 18:15   ` Thorsten Blum
  0 siblings, 1 reply; 3+ messages in thread
From: Ard Biesheuvel @ 2026-03-11 15:16 UTC (permalink / raw)
  To: Thorsten Blum, Haren Myneni, Madhavan Srinivasan,
	Michael Ellerman, Nicholas Piggin, Christophe Leroy (CS GROUP),
	Herbert Xu, David S. Miller, Dan Streetman
  Cc: stable, linuxppc-dev, linux-crypto, linux-kernel

Hi Thorsten,

On Wed, 11 Mar 2026, at 16:09, Thorsten Blum wrote:
> The bounce buffers are allocated with __get_free_pages() using
> BOUNCE_BUFFER_ORDER (order 2 = 4 pages), but both the allocation error
> path and nx842_crypto_free_ctx() release the buffers with free_page().
> Use free_pages() with the matching order instead.
>
> Also, since the scomp conversion, nx842_crypto_alloc_ctx() allocates the
> context separately, but nx842_crypto_free_ctx() never releases it. Add
> the missing kfree(ctx) in nx842_crypto_free_ctx(), and reuse
> nx842_crypto_free_ctx() in the allocation error path.
>
> Fixes: ed70b479c2c0 ("crypto: nx - add hardware 842 crypto comp alg")
> Fixes: 980b5705f4e7 ("crypto: nx - Migrate to scomp API")

Thanks for the fixes.

Given that you are fixing two separate issues that were introduced ~10 years apart, I think it would be better to split this up.


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [PATCH] crypto: nx - fix memory leaks in nx842_crypto_{alloc,free}_ctx
  2026-03-11 15:16 ` Ard Biesheuvel
@ 2026-03-11 18:15   ` Thorsten Blum
  0 siblings, 0 replies; 3+ messages in thread
From: Thorsten Blum @ 2026-03-11 18:15 UTC (permalink / raw)
  To: Ard Biesheuvel
  Cc: Haren Myneni, Madhavan Srinivasan, Michael Ellerman,
	Nicholas Piggin, Christophe Leroy (CS GROUP), Herbert Xu,
	David S. Miller, Dan Streetman, stable, linuxppc-dev,
	linux-crypto, linux-kernel

On 11. Mar 2026, at 16:16, Ard Biesheuvel wrote:
> On Wed, 11 Mar 2026, at 16:09, Thorsten Blum wrote:
>> The bounce buffers are allocated with __get_free_pages() using
>> BOUNCE_BUFFER_ORDER (order 2 = 4 pages), but both the allocation error
>> path and nx842_crypto_free_ctx() release the buffers with free_page().
>> Use free_pages() with the matching order instead.
>> 
>> Also, since the scomp conversion, nx842_crypto_alloc_ctx() allocates the
>> context separately, but nx842_crypto_free_ctx() never releases it. Add
>> the missing kfree(ctx) in nx842_crypto_free_ctx(), and reuse
>> nx842_crypto_free_ctx() in the allocation error path.
>> 
>> Fixes: ed70b479c2c0 ("crypto: nx - add hardware 842 crypto comp alg")
>> Fixes: 980b5705f4e7 ("crypto: nx - Migrate to scomp API")
> 
> Thanks for the fixes.
> 
> Given that you are fixing two separate issues that were introduced ~10 years apart, I think it would be better to split this up.

Yes, good idea. I submitted them separately here:

https://lore.kernel.org/lkml/20260311155645.397083-4-thorsten.blum@linux.dev/

Thanks,
Thorsten


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2026-03-11 18:15 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2026-03-11 15:09 [PATCH] crypto: nx - fix memory leaks in nx842_crypto_{alloc,free}_ctx Thorsten Blum
2026-03-11 15:16 ` Ard Biesheuvel
2026-03-11 18:15   ` Thorsten Blum

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox