Hi Phil, > > for (i = 0; i < DEF_COP_RINGSIZE; i++) { > > tmp = kzalloc(sizeof(struct todo_list_item), GFP_KERNEL); > > if (!tmp) > > - return -ENOMEM; > > + goto err_ringalloc; > > This would mean that in case pcr allocation fails, the code would try to > destroy mutexes which haven't been initialised at all. Probably I was a > bit unclear here: just leave the code as is, returning -ENOMEM at this > point is perfectly fine. [] That part of the patch was reverted and doesn't show up anymore in v2. If pcr alloc fails, open returns -ENOMEM immediately as in the original (the v2 patch context does not make it clear). If ring alloc fails, we clean-up pcr (which didn't fail) and rollback the for loop. But by this point, the mutex-es have already been initialized and we should revert that too. Did you have something else in mind?
Cristian S. _______________________________________________ Cryptodev-linux-devel mailing list Cryptodev-linux-devel@gna.org https://mail.gna.org/listinfo/cryptodev-linux-devel