Hi Tero,

> Also, I think this patch should be split up in two, as there are two
> issues you are fixing; the bad pointer issue (which I think you only
> fixed partially, also the in->sgl has similar problem), and the missing
> output IVI. Why is this needed btw, I have never faced the requirement
> to update the IVI on the ahash request? Any crypto test cases I have ran
> just work fine without this bit.

I spotted the in_sgl issue also, the code looks very suspicious and should.
be reworked. For the moment the bad kfree from in_sgl has never occurred.
I'll recheck and retest.
I'll send a separate patch for the IV case


Signed-off-by: Francis Le Bourse <francis.lebou...@sfr.fr>
---
 drivers/crypto/omap-aes.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/drivers/crypto/omap-aes.c b/drivers/crypto/omap-aes.c
index 49bd56f..1e040eb 100644
--- a/drivers/crypto/omap-aes.c
+++ b/drivers/crypto/omap-aes.c
@@ -498,7 +498,7 @@ static void omap_aes_done_task(unsigned long data)
        omap_crypto_cleanup(dd->in_sgl, NULL, 0, dd->total_save,
                            FLAGS_IN_DATA_ST_SHIFT, dd->flags);
 
-       omap_crypto_cleanup(&dd->out_sgl, dd->orig_out, 0, dd->total_save,
+       omap_crypto_cleanup(dd->out_sg, dd->orig_out, 0, dd->total_save,
                            FLAGS_OUT_DATA_ST_SHIFT, dd->flags);
 
        omap_aes_finish_req(dd, 0);

Reply via email to