crypto: tcrypt - Fix multibuffer skcipher speed test mem leak
authorZhang Yiqun <zhangyiqun@phytium.com.cn>
Wed, 16 Nov 2022 09:24:11 +0000 (17:24 +0800)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 31 Dec 2022 12:32:34 +0000 (13:32 +0100)
[ Upstream commit 1aa33fc8d4032227253ceb736f47c52b859d9683 ]

In the past, the data for mb-skcipher test has been allocated
twice, that means the first allcated memory area is without
free, which may cause a potential memory leakage. So this
patch is to remove one allocation to fix this error.

Fixes: e161c5930c15 ("crypto: tcrypt - add multibuf skcipher...")
Signed-off-by: Zhang Yiqun <zhangyiqun@phytium.com.cn>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Sasha Levin <sashal@kernel.org>
crypto/tcrypt.c

index 3f7dc94..b23235d 100644 (file)
@@ -1090,15 +1090,6 @@ static void test_mb_skcipher_speed(const char *algo, int enc, int secs,
                        goto out_free_tfm;
                }
 
-
-       for (i = 0; i < num_mb; ++i)
-               if (testmgr_alloc_buf(data[i].xbuf)) {
-                       while (i--)
-                               testmgr_free_buf(data[i].xbuf);
-                       goto out_free_tfm;
-               }
-
-
        for (i = 0; i < num_mb; ++i) {
                data[i].req = skcipher_request_alloc(tfm, GFP_KERNEL);
                if (!data[i].req) {