RE: [PATCH] crypto: caam - Dynamic memory allocation for caam_rng_ctx object

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Acked-by: Ruchika Gupta <ruchika.gupta@xxxxxxxxxxxxx>

> -----Original Message-----
> From: Nitesh Lal [mailto:NiteshNarayanLal@xxxxxxxxxxxxx]
> Sent: Friday, March 07, 2014 4:06 PM
> To: linux-crypto@xxxxxxxxxxxxxxx; Gupta Ruchika-R66431; Dutta Yashpal-
> B05456; herbert@xxxxxxxxxxxxxxxx
> Cc: Lal Nitesh-B44382
> Subject: [PATCH] crypto: caam - Dynamic memory allocation for caam_rng_ctx
> object
> 
> This patch allocates memory from DMAable region to the caam_rng_ctx object,
> earlier it had been statically allocated which resulted in errorneous
> behaviour on inserting the caamrng module at the runtime.
> 
> Signed-off-by: Nitesh Lal <NiteshNarayanLal@xxxxxxxxxxxxx>
> ---
>  drivers/crypto/caam/caamrng.c | 15 +++++++++------
>  1 file changed, 9 insertions(+), 6 deletions(-)
> 
> diff --git a/drivers/crypto/caam/caamrng.c b/drivers/crypto/caam/caamrng.c
> index 28486b1..403d8d5 100644
> --- a/drivers/crypto/caam/caamrng.c
> +++ b/drivers/crypto/caam/caamrng.c
> @@ -76,7 +76,7 @@ struct caam_rng_ctx {
>  	struct buf_data bufs[2];
>  };
> 
> -static struct caam_rng_ctx rng_ctx;
> +static struct caam_rng_ctx *rng_ctx;
> 
>  static inline void rng_unmap_buf(struct device *jrdev, struct buf_data *bd)
> { @@ -137,7 +137,7 @@ static inline int submit_job(struct caam_rng_ctx *ctx,
> int to_current)
> 
>  static int caam_read(struct hwrng *rng, void *data, size_t max, bool wait)
> {
> -	struct caam_rng_ctx *ctx = &rng_ctx;
> +	struct caam_rng_ctx *ctx = rng_ctx;
>  	struct buf_data *bd = &ctx->bufs[ctx->current_buf];
>  	int next_buf_idx, copied_idx;
>  	int err;
> @@ -237,12 +237,12 @@ static void caam_cleanup(struct hwrng *rng)
>  	struct buf_data *bd;
> 
>  	for (i = 0; i < 2; i++) {
> -		bd = &rng_ctx.bufs[i];
> +		bd = &rng_ctx->bufs[i];
>  		if (atomic_read(&bd->empty) == BUF_PENDING)
>  			wait_for_completion(&bd->filled);
>  	}
> 
> -	rng_unmap_ctx(&rng_ctx);
> +	rng_unmap_ctx(rng_ctx);
>  }
> 
>  static void caam_init_buf(struct caam_rng_ctx *ctx, int buf_id) @@ -273,8
> +273,9 @@ static struct hwrng caam_rng = {
> 
>  static void __exit caam_rng_exit(void)
>  {
> -	caam_jr_free(rng_ctx.jrdev);
> +	caam_jr_free(rng_ctx->jrdev);
>  	hwrng_unregister(&caam_rng);
> +	kfree(rng_ctx);
>  }
> 
>  static int __init caam_rng_init(void)
> @@ -286,7 +287,9 @@ static int __init caam_rng_init(void)
>  		pr_err("Job Ring Device allocation for transform failed\n");
>  		return PTR_ERR(dev);
>  	}
> -
> +	rng_ctx = kmalloc(sizeof(struct caam_rng_ctx), GFP_DMA);
> +	if (!rng_ctx)
> +		return -ENOMEM;
>  	caam_init_rng(&rng_ctx, dev);
> 
>  	dev_info(dev, "registering rng-caam\n");
> --
> 1.8.1.4
> 

--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Kernel]     [Gnu Classpath]     [Gnu Crypto]     [DM Crypt]     [Netfilter]     [Bugtraq]

  Powered by Linux