Am Freitag, 16. Dezember 2016, 19:54:36 CET schrieb Herbert Xu: Hi Herbert, > On Tue, Dec 13, 2016 at 09:42:45PM +0100, Stephan Müller wrote: > > + /* > > + * The async operation may have processed only a subset of > > + * the data that was initially received from the caller. > > + * Thus, we only can release the data that a cipher operation > > + * processed. > > + */ > > + if (len < sg->length) { > > + /* ensure that empty SGLs are not referenced any more */ > > + sreq->tsg = sg; > > Hmm if you change sreq->tsg how is the original tsg ever going to > get freed? You are right, this will introduce a memleak. But with the immediate freeing of sreq->tsg in the current code, the AIO interface cannot support multiple IOCBs. Thus, the entire memory handling in the AIO case seems broken. > > > + > > + /* advance the buffers to the unprocessed data */ > > + sg->length -= len; > > + sg->offset += len; > > + return; > > + } > > + > > + len -= sg->length; > > + put_page(page); > > + } > > > > kfree(sreq->tsg); > > Thanks, Ciao Stephan -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html