DPDK patches and discussions
 help / color / mirror / Atom feed
* [dpdk-dev] [PATCH] crypto/caam_jr: fix memory leak and illegal memory access
@ 2019-04-09  6:18 Gagandeep Singh
  2019-04-09  6:18 ` Gagandeep Singh
  2019-04-16 13:47 ` Akhil Goyal
  0 siblings, 2 replies; 6+ messages in thread
From: Gagandeep Singh @ 2019-04-09  6:18 UTC (permalink / raw)
  To: dev, Akhil Goyal; +Cc: Gagandeep Singh

Opendir() returns allocated storage which must be freed at the
end of function or in case any return on error. so freeing the
allocation using closedir in an error case.

Coverity issue: 323507
Coverity issue: 325880
Fixes: e7a45f3cc245 ("crypto/caam_jr: add UIO specific operations")
Cc: g.singh@nxp.com

Signed-off-by: Gagandeep Singh <g.singh@nxp.com>
---
 drivers/crypto/caam_jr/caam_jr_uio.c | 10 +++++++---
 1 file changed, 7 insertions(+), 3 deletions(-)

diff --git a/drivers/crypto/caam_jr/caam_jr_uio.c b/drivers/crypto/caam_jr/caam_jr_uio.c
index bf872a2..afd75c9 100644
--- a/drivers/crypto/caam_jr/caam_jr_uio.c
+++ b/drivers/crypto/caam_jr/caam_jr_uio.c
@@ -362,8 +362,8 @@
 			job_ring->register_base_addr,
 			(unsigned long)job_ring->map_size, strerror(errno));
 	} else
-		CAAM_JR_DEBUG("  JR UIO memory unmapped at %p",
-				job_ring->register_base_addr);
+		CAAM_JR_DEBUG("JR UIO memory is unmapped");
+
 	job_ring->register_base_addr = NULL;
 }
 
@@ -445,7 +445,11 @@ uio_job_ring *config_job_ring(void)
 			ret = file_read_first_line(SEC_UIO_DEVICE_SYS_ATTR_PATH,
 					dir->d_name, "name", uio_name);
 			CAAM_JR_INFO("sec device uio name: %s", uio_name);
-			SEC_ASSERT(ret == 0, -1, "file_read_first_line failed");
+			if (ret != 0) {
+				CAAM_JR_ERR("file_read_first_line failed\n");
+				closedir(d);
+				return -1;
+			}
 
 			if (file_name_match_extract(uio_name,
 						SEC_UIO_DEVICE_NAME,
-- 
1.9.1


^ permalink raw reply	[flat|nested] 6+ messages in thread

* [dpdk-dev] [PATCH] crypto/caam_jr: fix memory leak and illegal memory access
  2019-04-09  6:18 [dpdk-dev] [PATCH] crypto/caam_jr: fix memory leak and illegal memory access Gagandeep Singh
@ 2019-04-09  6:18 ` Gagandeep Singh
  2019-04-16 13:47 ` Akhil Goyal
  1 sibling, 0 replies; 6+ messages in thread
From: Gagandeep Singh @ 2019-04-09  6:18 UTC (permalink / raw)
  To: dev, Akhil Goyal; +Cc: Gagandeep Singh

Opendir() returns allocated storage which must be freed at the
end of function or in case any return on error. so freeing the
allocation using closedir in an error case.

Coverity issue: 323507
Coverity issue: 325880
Fixes: e7a45f3cc245 ("crypto/caam_jr: add UIO specific operations")
Cc: g.singh@nxp.com

Signed-off-by: Gagandeep Singh <g.singh@nxp.com>
---
 drivers/crypto/caam_jr/caam_jr_uio.c | 10 +++++++---
 1 file changed, 7 insertions(+), 3 deletions(-)

diff --git a/drivers/crypto/caam_jr/caam_jr_uio.c b/drivers/crypto/caam_jr/caam_jr_uio.c
index bf872a2..afd75c9 100644
--- a/drivers/crypto/caam_jr/caam_jr_uio.c
+++ b/drivers/crypto/caam_jr/caam_jr_uio.c
@@ -362,8 +362,8 @@
 			job_ring->register_base_addr,
 			(unsigned long)job_ring->map_size, strerror(errno));
 	} else
-		CAAM_JR_DEBUG("  JR UIO memory unmapped at %p",
-				job_ring->register_base_addr);
+		CAAM_JR_DEBUG("JR UIO memory is unmapped");
+
 	job_ring->register_base_addr = NULL;
 }
 
@@ -445,7 +445,11 @@ uio_job_ring *config_job_ring(void)
 			ret = file_read_first_line(SEC_UIO_DEVICE_SYS_ATTR_PATH,
 					dir->d_name, "name", uio_name);
 			CAAM_JR_INFO("sec device uio name: %s", uio_name);
-			SEC_ASSERT(ret == 0, -1, "file_read_first_line failed");
+			if (ret != 0) {
+				CAAM_JR_ERR("file_read_first_line failed\n");
+				closedir(d);
+				return -1;
+			}
 
 			if (file_name_match_extract(uio_name,
 						SEC_UIO_DEVICE_NAME,
-- 
1.9.1


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [dpdk-dev] [PATCH] crypto/caam_jr: fix memory leak and illegal memory access
  2019-04-09  6:18 [dpdk-dev] [PATCH] crypto/caam_jr: fix memory leak and illegal memory access Gagandeep Singh
  2019-04-09  6:18 ` Gagandeep Singh
@ 2019-04-16 13:47 ` Akhil Goyal
  2019-04-16 13:47   ` Akhil Goyal
  2019-04-16 14:51   ` Akhil Goyal
  1 sibling, 2 replies; 6+ messages in thread
From: Akhil Goyal @ 2019-04-16 13:47 UTC (permalink / raw)
  To: Gagandeep Singh, dev


> Opendir() returns allocated storage which must be freed at the
> end of function or in case any return on error. so freeing the
> allocation using closedir in an error case.
> 
> Coverity issue: 323507
> Coverity issue: 325880
> Fixes: e7a45f3cc245 ("crypto/caam_jr: add UIO specific operations")
> Cc: g.singh@nxp.com
> 
> Signed-off-by: Gagandeep Singh <g.singh@nxp.com>
> ---
>  drivers/crypto/caam_jr/caam_jr_uio.c | 10 +++++++---
>  1 file changed, 7 insertions(+), 3 deletions(-)


Acked-by: Akhil Goyal <akhil.goyal@nxp.com>


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [dpdk-dev] [PATCH] crypto/caam_jr: fix memory leak and illegal memory access
  2019-04-16 13:47 ` Akhil Goyal
@ 2019-04-16 13:47   ` Akhil Goyal
  2019-04-16 14:51   ` Akhil Goyal
  1 sibling, 0 replies; 6+ messages in thread
From: Akhil Goyal @ 2019-04-16 13:47 UTC (permalink / raw)
  To: Gagandeep Singh, dev


> Opendir() returns allocated storage which must be freed at the
> end of function or in case any return on error. so freeing the
> allocation using closedir in an error case.
> 
> Coverity issue: 323507
> Coverity issue: 325880
> Fixes: e7a45f3cc245 ("crypto/caam_jr: add UIO specific operations")
> Cc: g.singh@nxp.com
> 
> Signed-off-by: Gagandeep Singh <g.singh@nxp.com>
> ---
>  drivers/crypto/caam_jr/caam_jr_uio.c | 10 +++++++---
>  1 file changed, 7 insertions(+), 3 deletions(-)


Acked-by: Akhil Goyal <akhil.goyal@nxp.com>


^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [dpdk-dev] [PATCH] crypto/caam_jr: fix memory leak and illegal memory access
  2019-04-16 13:47 ` Akhil Goyal
  2019-04-16 13:47   ` Akhil Goyal
@ 2019-04-16 14:51   ` Akhil Goyal
  2019-04-16 14:51     ` Akhil Goyal
  1 sibling, 1 reply; 6+ messages in thread
From: Akhil Goyal @ 2019-04-16 14:51 UTC (permalink / raw)
  To: Gagandeep Singh, dev

> 
> > Opendir() returns allocated storage which must be freed at the
> > end of function or in case any return on error. so freeing the
> > allocation using closedir in an error case.
> >
> > Coverity issue: 323507
> > Coverity issue: 325880
> > Fixes: e7a45f3cc245 ("crypto/caam_jr: add UIO specific operations")
> > Cc: g.singh@nxp.com
> >
> > Signed-off-by: Gagandeep Singh <g.singh@nxp.com>
> > ---
> >  drivers/crypto/caam_jr/caam_jr_uio.c | 10 +++++++---
> >  1 file changed, 7 insertions(+), 3 deletions(-)
> 
> 
> Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
Applied to dpdk-next-crypto

Thanks.

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [dpdk-dev] [PATCH] crypto/caam_jr: fix memory leak and illegal memory access
  2019-04-16 14:51   ` Akhil Goyal
@ 2019-04-16 14:51     ` Akhil Goyal
  0 siblings, 0 replies; 6+ messages in thread
From: Akhil Goyal @ 2019-04-16 14:51 UTC (permalink / raw)
  To: Gagandeep Singh, dev

> 
> > Opendir() returns allocated storage which must be freed at the
> > end of function or in case any return on error. so freeing the
> > allocation using closedir in an error case.
> >
> > Coverity issue: 323507
> > Coverity issue: 325880
> > Fixes: e7a45f3cc245 ("crypto/caam_jr: add UIO specific operations")
> > Cc: g.singh@nxp.com
> >
> > Signed-off-by: Gagandeep Singh <g.singh@nxp.com>
> > ---
> >  drivers/crypto/caam_jr/caam_jr_uio.c | 10 +++++++---
> >  1 file changed, 7 insertions(+), 3 deletions(-)
> 
> 
> Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
Applied to dpdk-next-crypto

Thanks.

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2019-04-16 14:51 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-04-09  6:18 [dpdk-dev] [PATCH] crypto/caam_jr: fix memory leak and illegal memory access Gagandeep Singh
2019-04-09  6:18 ` Gagandeep Singh
2019-04-16 13:47 ` Akhil Goyal
2019-04-16 13:47   ` Akhil Goyal
2019-04-16 14:51   ` Akhil Goyal
2019-04-16 14:51     ` Akhil Goyal

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).