In Broadcom SPU driver, in case where incremental hash
is done in software in ahash_finup(), tmpbuf was freed
twice.

Reported-by: Dan Carpenter <dan.carpen...@oracle.com>
Signed-off-by: Rob Rice <rob.r...@broadcom.com>
---
 drivers/crypto/bcm/cipher.c | 1 -
 1 file changed, 1 deletion(-)

diff --git a/drivers/crypto/bcm/cipher.c b/drivers/crypto/bcm/cipher.c
index a654a01..cc0d5b9 100644
--- a/drivers/crypto/bcm/cipher.c
+++ b/drivers/crypto/bcm/cipher.c
@@ -2331,7 +2331,6 @@ static int ahash_finup(struct ahash_request *req)
                /* Call synchronous update */
                ret = crypto_shash_finup(ctx->shash, tmpbuf, req->nbytes,
                                         req->result);
-               kfree(tmpbuf);
        } else {
                /* Otherwise call the internal function which uses SPU hw */
                return __ahash_finup(req);
-- 
2.1.0

Reply via email to