Revision f2ebf8ffe7af10bff02d34addbebd9199de65ed2 authored by Riccardo Mancini on 15 July 2021, 16:07:21 UTC, committed by Arnaldo Carvalho de Melo on 15 July 2021, 20:34:39 UTC
ASan reports several memory leaks running: # perf test "88: Check open filename arg using perf trace + vfs_getname" The second of these leaks is caused by the arg_fmt field of syscall not being deallocated. This patch adds a new function syscall__exit which is called on all syscalls.table entries in trace__exit, which will free the arg_fmt field. Signed-off-by: Riccardo Mancini <rickyman7@gmail.com> Cc: Ian Rogers <irogers@google.com> Cc: Jiri Olsa <jolsa@redhat.com> Cc: Mark Rutland <mark.rutland@arm.com> Cc: Namhyung Kim <namhyung@kernel.org> Cc: Peter Zijlstra <peterz@infradead.org> Link: http://lore.kernel.org/lkml/d68f25c043d30464ac9fa79c3399e18f429bca82.1626343282.git.rickyman7@gmail.com Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
1 parent 6c7f0ab
ctr.h
/* SPDX-License-Identifier: GPL-2.0-or-later */
/*
* CTR: Counter mode
*
* Copyright (c) 2007 Herbert Xu <herbert@gondor.apana.org.au>
*/
#ifndef _CRYPTO_CTR_H
#define _CRYPTO_CTR_H
#include <crypto/algapi.h>
#include <crypto/internal/skcipher.h>
#include <linux/string.h>
#include <linux/types.h>
#define CTR_RFC3686_NONCE_SIZE 4
#define CTR_RFC3686_IV_SIZE 8
#define CTR_RFC3686_BLOCK_SIZE 16
static inline int crypto_ctr_encrypt_walk(struct skcipher_request *req,
void (*fn)(struct crypto_skcipher *,
const u8 *, u8 *))
{
struct crypto_skcipher *tfm = crypto_skcipher_reqtfm(req);
int blocksize = crypto_skcipher_chunksize(tfm);
u8 buf[MAX_CIPHER_BLOCKSIZE];
struct skcipher_walk walk;
int err;
/* avoid integer division due to variable blocksize parameter */
if (WARN_ON_ONCE(!is_power_of_2(blocksize)))
return -EINVAL;
err = skcipher_walk_virt(&walk, req, false);
while (walk.nbytes > 0) {
u8 *dst = walk.dst.virt.addr;
u8 *src = walk.src.virt.addr;
int nbytes = walk.nbytes;
int tail = 0;
if (nbytes < walk.total) {
tail = walk.nbytes & (blocksize - 1);
nbytes -= tail;
}
do {
int bsize = min(nbytes, blocksize);
fn(tfm, walk.iv, buf);
crypto_xor_cpy(dst, src, buf, bsize);
crypto_inc(walk.iv, blocksize);
dst += bsize;
src += bsize;
nbytes -= bsize;
} while (nbytes > 0);
err = skcipher_walk_done(&walk, tail);
}
return err;
}
#endif /* _CRYPTO_CTR_H */
![swh spinner](/static/img/swh-spinner.gif)
Computing file changes ...