Message ID | 20241203-crypto-qce-refactor-v1-7-c5901d2dd45c@linaro.org (mailing list archive) |
---|---|
State | Not Applicable |
Headers | show |
Series | crypto: qce - refactor the driver | expand |
On 03/12/2024 10:19, Bartosz Golaszewski wrote: > From: Bartosz Golaszewski <bartosz.golaszewski@linaro.org> > > The buffer allocated in qce_ahash_hmac_setkey is always freed before > returning to use __free() to automate it. I think you wanted to use "so" instead of "to", otherwise it means nothing ^^ > > Signed-off-by: Bartosz Golaszewski <bartosz.golaszewski@linaro.org> > --- > drivers/crypto/qce/sha.c | 6 +++--- > 1 file changed, 3 insertions(+), 3 deletions(-) > > diff --git a/drivers/crypto/qce/sha.c b/drivers/crypto/qce/sha.c > index fc72af8aa9a72..916908c04b635 100644 > --- a/drivers/crypto/qce/sha.c > +++ b/drivers/crypto/qce/sha.c > @@ -3,6 +3,7 @@ > * Copyright (c) 2010-2014, The Linux Foundation. All rights reserved. > */ > > +#include <linux/cleanup.h> > #include <linux/device.h> > #include <linux/dma-mapping.h> > #include <linux/interrupt.h> > @@ -336,7 +337,6 @@ static int qce_ahash_hmac_setkey(struct crypto_ahash *tfm, const u8 *key, > struct scatterlist sg; > unsigned int blocksize; > struct crypto_ahash *ahash_tfm; > - u8 *buf; > int ret; > const char *alg_name; > > @@ -370,7 +370,8 @@ static int qce_ahash_hmac_setkey(struct crypto_ahash *tfm, const u8 *key, > crypto_req_done, &wait); > crypto_ahash_clear_flags(ahash_tfm, ~0); > > - buf = kzalloc(keylen + QCE_MAX_ALIGN_SIZE, GFP_KERNEL); > + u8 *buf __free(kfree) = kzalloc(keylen + QCE_MAX_ALIGN_SIZE, > + GFP_KERNEL); > if (!buf) { > ret = -ENOMEM; > goto err_free_req; > @@ -382,7 +383,6 @@ static int qce_ahash_hmac_setkey(struct crypto_ahash *tfm, const u8 *key, > > ret = crypto_wait_req(crypto_ahash_digest(req), &wait); > > - kfree(buf); > err_free_req: > ahash_request_free(req); > err_free_ahash: > With the typo fixes: Reviewed-by: Neil Armstrong <neil.armstrong@linaro.org>
diff --git a/drivers/crypto/qce/sha.c b/drivers/crypto/qce/sha.c index fc72af8aa9a72..916908c04b635 100644 --- a/drivers/crypto/qce/sha.c +++ b/drivers/crypto/qce/sha.c @@ -3,6 +3,7 @@ * Copyright (c) 2010-2014, The Linux Foundation. All rights reserved. */ +#include <linux/cleanup.h> #include <linux/device.h> #include <linux/dma-mapping.h> #include <linux/interrupt.h> @@ -336,7 +337,6 @@ static int qce_ahash_hmac_setkey(struct crypto_ahash *tfm, const u8 *key, struct scatterlist sg; unsigned int blocksize; struct crypto_ahash *ahash_tfm; - u8 *buf; int ret; const char *alg_name; @@ -370,7 +370,8 @@ static int qce_ahash_hmac_setkey(struct crypto_ahash *tfm, const u8 *key, crypto_req_done, &wait); crypto_ahash_clear_flags(ahash_tfm, ~0); - buf = kzalloc(keylen + QCE_MAX_ALIGN_SIZE, GFP_KERNEL); + u8 *buf __free(kfree) = kzalloc(keylen + QCE_MAX_ALIGN_SIZE, + GFP_KERNEL); if (!buf) { ret = -ENOMEM; goto err_free_req; @@ -382,7 +383,6 @@ static int qce_ahash_hmac_setkey(struct crypto_ahash *tfm, const u8 *key, ret = crypto_wait_req(crypto_ahash_digest(req), &wait); - kfree(buf); err_free_req: ahash_request_free(req); err_free_ahash: