public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: "Chang, Jianpeng (CN)" <Jianpeng.Chang.CN@windriver.com>
To: horia.geanta@nxp.com, pankaj.gupta@nxp.com, gaurav.jain@nxp.com,
	herbert@gondor.apana.org.au, davem@davemloft.net,
	leitao@debian.org, kuba@kernel.org
Cc: linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org
Subject: Re: [v2 PATCH 1/1] crypto: caam: fix netdev memory leak in dpaa2_caam_probe
Date: Thu, 29 Jan 2026 14:08:37 +0800	[thread overview]
Message-ID: <c6ca990e-0d53-430e-9ae9-4eb0f79f2cdb@windriver.com> (raw)
In-Reply-To: <20260120015524.1989458-1-jianpeng.chang.cn@windriver.com>

Gentle ping, any comments on this patch?

Thanks,
Jianpeng

On 1/20/2026 9:55 AM, Jianpeng Chang wrote:
> When commit 0e1a4d427f58 ("crypto: caam: Unembed net_dev structure in
> dpaa2") converted embedded net_device to dynamically allocated pointers,
> it added cleanup in dpaa2_dpseci_disable() but missed adding cleanup in
> dpaa2_dpseci_free() for error paths.
> 
> This causes memory leaks when dpaa2_dpseci_dpio_setup() fails during probe
> due to DPIO devices not being ready yet. The kernel's deferred probe
> mechanism handles the retry successfully, but the netdevs allocated during
> the failed probe attempt are never freed, resulting in kmemleak reports
> showing multiple leaked netdev-related allocations all traced back to
> dpaa2_caam_probe().
> 
> Fix this by preserving the CPU mask of allocated netdevs during setup and
> using it for cleanup in dpaa2_dpseci_free(). This approach ensures that
> only the CPUs that actually had netdevs allocated will be cleaned up,
> avoiding potential issues with CPU hotplug scenarios.
> 
> Fixes: 0e1a4d427f58 ("crypto: caam: Unembed net_dev structure in dpaa2")
> Signed-off-by: Jianpeng Chang <jianpeng.chang.cn@windriver.com>
> ---
> v2:
>    - fix the build error with CPUMASK_OFFSTACK disabled
>    - instead of the movement of free_dpaa2_pcpu_netdev, implement it
>      directly in dpaa2_dpseci_free
> v1: https://lore.kernel.org/all/20260116014455.2575351-1-jianpeng.chang.cn@windriver.com/
> 
>   drivers/crypto/caam/caamalg_qi2.c | 27 +++++++++++++++------------
>   drivers/crypto/caam/caamalg_qi2.h |  2 ++
>   2 files changed, 17 insertions(+), 12 deletions(-)
> 
> diff --git a/drivers/crypto/caam/caamalg_qi2.c b/drivers/crypto/caam/caamalg_qi2.c
> index 107ccb2ade42..c6117c23eb25 100644
> --- a/drivers/crypto/caam/caamalg_qi2.c
> +++ b/drivers/crypto/caam/caamalg_qi2.c
> @@ -4814,7 +4814,8 @@ static void dpaa2_dpseci_free(struct dpaa2_caam_priv *priv)
>   {
>   	struct device *dev = priv->dev;
>   	struct fsl_mc_device *ls_dev = to_fsl_mc_device(dev);
> -	int err;
> +	struct dpaa2_caam_priv_per_cpu *ppriv;
> +	int i, err;
>   
>   	if (DPSECI_VER(priv->major_ver, priv->minor_ver) > DPSECI_VER(5, 3)) {
>   		err = dpseci_reset(priv->mc_io, 0, ls_dev->mc_handle);
> @@ -4822,6 +4823,12 @@ static void dpaa2_dpseci_free(struct dpaa2_caam_priv *priv)
>   			dev_err(dev, "dpseci_reset() failed\n");
>   	}
>   
> +	for_each_cpu(i, priv->clean_mask) {
> +		ppriv = per_cpu_ptr(priv->ppriv, i);
> +		free_netdev(ppriv->net_dev);
> +	}
> +	free_cpumask_var(priv->clean_mask);
> +
>   	dpaa2_dpseci_congestion_free(priv);
>   	dpseci_close(priv->mc_io, 0, ls_dev->mc_handle);
>   }
> @@ -5007,16 +5014,15 @@ static int __cold dpaa2_dpseci_setup(struct fsl_mc_device *ls_dev)
>   	struct device *dev = &ls_dev->dev;
>   	struct dpaa2_caam_priv *priv;
>   	struct dpaa2_caam_priv_per_cpu *ppriv;
> -	cpumask_var_t clean_mask;
>   	int err, cpu;
>   	u8 i;
>   
>   	err = -ENOMEM;
> -	if (!zalloc_cpumask_var(&clean_mask, GFP_KERNEL))
> -		goto err_cpumask;
> -
>   	priv = dev_get_drvdata(dev);
>   
> +	if (!zalloc_cpumask_var(&priv->clean_mask, GFP_KERNEL))
> +		goto err_cpumask;
> +
>   	priv->dev = dev;
>   	priv->dpsec_id = ls_dev->obj_desc.id;
>   
> @@ -5118,7 +5124,7 @@ static int __cold dpaa2_dpseci_setup(struct fsl_mc_device *ls_dev)
>   			err = -ENOMEM;
>   			goto err_alloc_netdev;
>   		}
> -		cpumask_set_cpu(cpu, clean_mask);
> +		cpumask_set_cpu(cpu, priv->clean_mask);
>   		ppriv->net_dev->dev = *dev;
>   
>   		netif_napi_add_tx_weight(ppriv->net_dev, &ppriv->napi,
> @@ -5126,18 +5132,16 @@ static int __cold dpaa2_dpseci_setup(struct fsl_mc_device *ls_dev)
>   					 DPAA2_CAAM_NAPI_WEIGHT);
>   	}
>   
> -	err = 0;
> -	goto free_cpumask;
> +	return 0;
>   
>   err_alloc_netdev:
> -	free_dpaa2_pcpu_netdev(priv, clean_mask);
> +	free_dpaa2_pcpu_netdev(priv, priv->clean_mask);
>   err_get_rx_queue:
>   	dpaa2_dpseci_congestion_free(priv);
>   err_get_vers:
>   	dpseci_close(priv->mc_io, 0, ls_dev->mc_handle);
>   err_open:
> -free_cpumask:
> -	free_cpumask_var(clean_mask);
> +	free_cpumask_var(priv->clean_mask);
>   err_cpumask:
>   	return err;
>   }
> @@ -5182,7 +5186,6 @@ static int __cold dpaa2_dpseci_disable(struct dpaa2_caam_priv *priv)
>   		ppriv = per_cpu_ptr(priv->ppriv, i);
>   		napi_disable(&ppriv->napi);
>   		netif_napi_del(&ppriv->napi);
> -		free_netdev(ppriv->net_dev);
>   	}
>   
>   	return 0;
> diff --git a/drivers/crypto/caam/caamalg_qi2.h b/drivers/crypto/caam/caamalg_qi2.h
> index 61d1219a202f..8e65b4b28c7b 100644
> --- a/drivers/crypto/caam/caamalg_qi2.h
> +++ b/drivers/crypto/caam/caamalg_qi2.h
> @@ -42,6 +42,7 @@
>    * @mc_io: pointer to MC portal's I/O object
>    * @domain: IOMMU domain
>    * @ppriv: per CPU pointers to privata data
> + * @clean_mask: CPU mask of CPUs that have allocated netdevs
>    */
>   struct dpaa2_caam_priv {
>   	int dpsec_id;
> @@ -65,6 +66,7 @@ struct dpaa2_caam_priv {
>   
>   	struct dpaa2_caam_priv_per_cpu __percpu *ppriv;
>   	struct dentry *dfs_root;
> +	cpumask_var_t clean_mask;
>   };
>   
>   /**


  reply	other threads:[~2026-01-29  6:34 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-01-20  1:55 [v2 PATCH 1/1] crypto: caam: fix netdev memory leak in dpaa2_caam_probe Jianpeng Chang
2026-01-29  6:08 ` Chang, Jianpeng (CN) [this message]
2026-01-29 11:35 ` Breno Leitao
2026-01-31  3:00 ` Herbert Xu

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=c6ca990e-0d53-430e-9ae9-4eb0f79f2cdb@windriver.com \
    --to=jianpeng.chang.cn@windriver.com \
    --cc=davem@davemloft.net \
    --cc=gaurav.jain@nxp.com \
    --cc=herbert@gondor.apana.org.au \
    --cc=horia.geanta@nxp.com \
    --cc=kuba@kernel.org \
    --cc=leitao@debian.org \
    --cc=linux-crypto@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=pankaj.gupta@nxp.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox