Skip to content

Commit 02fa834

Browse files
s-pankratovgregkh
authored andcommitted
crypto: qat - fix double free during reset
[ Upstream commit 01aed66 ] There is no need to free the reset_data structure if the recovery is unsuccessful and the reset is synchronous. The function adf_dev_aer_schedule_reset() handles the cleanup properly. Only asynchronous resets require such structure to be freed inside the reset worker. Fixes: d8cba25 ("crypto: qat - Intel(R) QAT driver framework") Signed-off-by: Svyatoslav Pankratov <svyatoslav.pankratov@intel.com> Signed-off-by: Giovanni Cabiddu <giovanni.cabiddu@intel.com> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Stable-dep-of: 7d42e09 ("crypto: qat - resolve race condition during AER recovery") Signed-off-by: Sasha Levin <sashal@kernel.org>
1 parent 6796844 commit 02fa834

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

drivers/crypto/qat/qat_common/adf_aer.c

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,8 @@ static void adf_device_reset_worker(struct work_struct *work)
9595
if (adf_dev_init(accel_dev) || adf_dev_start(accel_dev)) {
9696
/* The device hanged and we can't restart it so stop here */
9797
dev_err(&GET_DEV(accel_dev), "Restart device failed\n");
98-
kfree(reset_data);
98+
if (reset_data->mode == ADF_DEV_RESET_ASYNC)
99+
kfree(reset_data);
99100
WARN(1, "QAT: device restart failed. Device is unusable\n");
100101
return;
101102
}

0 commit comments

Comments
 (0)