crypto: qat - Fix a double free in adf_create_ring
authorLv Yunlong <lyl2019@mail.ustc.edu.cn>
Fri, 2 Apr 2021 17:13:48 +0000 (10:13 -0700)
committerHerbert Xu <herbert@gondor.apana.org.au>
Fri, 9 Apr 2021 07:45:14 +0000 (17:45 +1000)
In adf_create_ring, if the callee adf_init_ring() failed, the callee will
free the ring->base_addr by dma_free_coherent() and return -EFAULT. Then
adf_create_ring will goto err and the ring->base_addr will be freed again
in adf_cleanup_ring().

My patch sets ring->base_addr to NULL after the first freed to avoid the
double free.

Fixes: a672a9dc872ec ("crypto: qat - Intel(R) QAT transport code")
Signed-off-by: Lv Yunlong <lyl2019@mail.ustc.edu.cn>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
drivers/crypto/qat/qat_common/adf_transport.c

index 888c1e0..8ba2840 100644 (file)
@@ -172,6 +172,7 @@ static int adf_init_ring(struct adf_etr_ring_data *ring)
                dev_err(&GET_DEV(accel_dev), "Ring address not aligned\n");
                dma_free_coherent(&GET_DEV(accel_dev), ring_size_bytes,
                                  ring->base_addr, ring->dma_addr);
+               ring->base_addr = NULL;
                return -EFAULT;
        }