Message ID | 55bdcf76-f1c9-180d-6798-959e617b10ac@users.sourceforge.net (mailing list archive) |
---|---|
State | Rejected |
Delegated to: | Herbert Xu |
Headers | show |
On Wed, Feb 14, 2018 at 10:40:26PM +0100, SF Markus Elfring wrote: > From: Markus Elfring <elfring@users.sourceforge.net> > Date: Wed, 14 Feb 2018 22:22:20 +0100 > > The kfree() function was called in one case by the do_shash() function > during error handling even if the passed variable contained a null pointer. > > * Reorder two function calls at the end. > > * Add a jump target. This patch is pointless as kfree on NULL is a no-op. Cheers,
> This patch is pointless as kfree on NULL is a no-op.
I prefer to avoid unnecessary function calls generally.
Regards,
Markus
diff --git a/drivers/crypto/bcm/util.c b/drivers/crypto/bcm/util.c index a912c6ad3e85..c141a0242223 100644 --- a/drivers/crypto/bcm/util.c +++ b/drivers/crypto/bcm/util.c @@ -279,7 +279,7 @@ int do_shash(unsigned char *name, unsigned char *result, sdesc = kmalloc(size, GFP_KERNEL); if (!sdesc) { rc = -ENOMEM; - goto do_shash_err; + goto free_shash; } sdesc->shash.tfm = hash; sdesc->shash.flags = 0x0; @@ -314,9 +314,9 @@ int do_shash(unsigned char *name, unsigned char *result, pr_err("%s: Could not generate %s hash\n", __func__, name); do_shash_err: - crypto_free_shash(hash); kfree(sdesc); - +free_shash: + crypto_free_shash(hash); return rc; }