Skip to content

Commit c56c2e1

Browse files
chleroyherbertx
authored andcommitted
crypto: talitos - reorder code in talitos_edesc_alloc()
This patch moves the mapping of IV after the kmalloc(). This avoids having to unmap in case kmalloc() fails. Signed-off-by: Christophe Leroy <christophe.leroy@c-s.fr> Reviewed-by: Horia Geantă <horia.geanta@nxp.com> Cc: stable@vger.kernel.org Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
1 parent 6db4341 commit c56c2e1

File tree

1 file changed

+7
-18
lines changed

1 file changed

+7
-18
lines changed

drivers/crypto/talitos.c

Lines changed: 7 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1361,23 +1361,18 @@ static struct talitos_edesc *talitos_edesc_alloc(struct device *dev,
13611361
struct talitos_private *priv = dev_get_drvdata(dev);
13621362
bool is_sec1 = has_ftr_sec1(priv);
13631363
int max_len = is_sec1 ? TALITOS1_MAX_DATA_LEN : TALITOS2_MAX_DATA_LEN;
1364-
void *err;
13651364

13661365
if (cryptlen + authsize > max_len) {
13671366
dev_err(dev, "length exceeds h/w max limit\n");
13681367
return ERR_PTR(-EINVAL);
13691368
}
13701369

1371-
if (ivsize)
1372-
iv_dma = dma_map_single(dev, iv, ivsize, DMA_TO_DEVICE);
1373-
13741370
if (!dst || dst == src) {
13751371
src_len = assoclen + cryptlen + authsize;
13761372
src_nents = sg_nents_for_len(src, src_len);
13771373
if (src_nents < 0) {
13781374
dev_err(dev, "Invalid number of src SG.\n");
1379-
err = ERR_PTR(-EINVAL);
1380-
goto error_sg;
1375+
return ERR_PTR(-EINVAL);
13811376
}
13821377
src_nents = (src_nents == 1) ? 0 : src_nents;
13831378
dst_nents = dst ? src_nents : 0;
@@ -1387,16 +1382,14 @@ static struct talitos_edesc *talitos_edesc_alloc(struct device *dev,
13871382
src_nents = sg_nents_for_len(src, src_len);
13881383
if (src_nents < 0) {
13891384
dev_err(dev, "Invalid number of src SG.\n");
1390-
err = ERR_PTR(-EINVAL);
1391-
goto error_sg;
1385+
return ERR_PTR(-EINVAL);
13921386
}
13931387
src_nents = (src_nents == 1) ? 0 : src_nents;
13941388
dst_len = assoclen + cryptlen + (encrypt ? authsize : 0);
13951389
dst_nents = sg_nents_for_len(dst, dst_len);
13961390
if (dst_nents < 0) {
13971391
dev_err(dev, "Invalid number of dst SG.\n");
1398-
err = ERR_PTR(-EINVAL);
1399-
goto error_sg;
1392+
return ERR_PTR(-EINVAL);
14001393
}
14011394
dst_nents = (dst_nents == 1) ? 0 : dst_nents;
14021395
}
@@ -1425,10 +1418,10 @@ static struct talitos_edesc *talitos_edesc_alloc(struct device *dev,
14251418
alloc_len += sizeof(struct talitos_desc);
14261419

14271420
edesc = kmalloc(alloc_len, GFP_DMA | flags);
1428-
if (!edesc) {
1429-
err = ERR_PTR(-ENOMEM);
1430-
goto error_sg;
1431-
}
1421+
if (!edesc)
1422+
return ERR_PTR(-ENOMEM);
1423+
if (ivsize)
1424+
iv_dma = dma_map_single(dev, iv, ivsize, DMA_TO_DEVICE);
14321425
memset(&edesc->desc, 0, sizeof(edesc->desc));
14331426

14341427
edesc->src_nents = src_nents;
@@ -1445,10 +1438,6 @@ static struct talitos_edesc *talitos_edesc_alloc(struct device *dev,
14451438
DMA_BIDIRECTIONAL);
14461439
}
14471440
return edesc;
1448-
error_sg:
1449-
if (iv_dma)
1450-
dma_unmap_single(dev, iv_dma, ivsize, DMA_TO_DEVICE);
1451-
return err;
14521441
}
14531442

14541443
static struct talitos_edesc *aead_edesc_alloc(struct aead_request *areq, u8 *iv,

0 commit comments

Comments
 (0)