diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2011-07-25 15:53:15 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2011-07-25 15:53:15 -0400 |
commit | 0003230e8200699860f0b10af524dc47bf8aecad (patch) | |
tree | 8addb0c889b32111d6973c46cd3d0a5b5c17606c /drivers/crypto | |
parent | 4b478cedcdc1b2d131170f22bd3f916e53472f52 (diff) | |
parent | 4e34e719e457f2e031297175410fc0bd4016a085 (diff) |
Merge branch 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs-2.6
* 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs-2.6:
fs: take the ACL checks to common code
bury posix_acl_..._masq() variants
kill boilerplates around posix_acl_create_masq()
generic_acl: no need to clone acl just to push it to set_cached_acl()
kill boilerplate around posix_acl_chmod_masq()
reiserfs: cache negative ACLs for v1 stat format
xfs: cache negative ACLs if there is no attribute fork
9p: do no return 0 from ->check_acl without actually checking
vfs: move ACL cache lookup into generic code
CIFS: Fix oops while mounting with prefixpath
xfs: Fix wrong return value of xfs_file_aio_write
fix devtmpfs race
caam: don't pass bogus S_IFCHR to debugfs_create_...()
get rid of create_proc_entry() abuses - proc_mkdir() is there for purpose
asus-wmi: ->is_visible() can't return negative
fix jffs2 ACLs on big-endian with 16bit mode_t
9p: close ACL leaks
ocfs2_init_acl(): fix a leak
VFS : mount lock scalability for internal mounts
Diffstat (limited to 'drivers/crypto')
-rw-r--r-- | drivers/crypto/caam/ctrl.c | 26 |
1 files changed, 13 insertions, 13 deletions
diff --git a/drivers/crypto/caam/ctrl.c b/drivers/crypto/caam/ctrl.c index fc2d9ed22470..73988bb7322a 100644 --- a/drivers/crypto/caam/ctrl.c +++ b/drivers/crypto/caam/ctrl.c | |||
@@ -166,52 +166,52 @@ static int caam_probe(struct platform_device *pdev) | |||
166 | /* Controller-level - performance monitor counters */ | 166 | /* Controller-level - performance monitor counters */ |
167 | ctrlpriv->ctl_rq_dequeued = | 167 | ctrlpriv->ctl_rq_dequeued = |
168 | debugfs_create_u64("rq_dequeued", | 168 | debugfs_create_u64("rq_dequeued", |
169 | S_IFCHR | S_IRUSR | S_IRGRP | S_IROTH, | 169 | S_IRUSR | S_IRGRP | S_IROTH, |
170 | ctrlpriv->ctl, &perfmon->req_dequeued); | 170 | ctrlpriv->ctl, &perfmon->req_dequeued); |
171 | ctrlpriv->ctl_ob_enc_req = | 171 | ctrlpriv->ctl_ob_enc_req = |
172 | debugfs_create_u64("ob_rq_encrypted", | 172 | debugfs_create_u64("ob_rq_encrypted", |
173 | S_IFCHR | S_IRUSR | S_IRGRP | S_IROTH, | 173 | S_IRUSR | S_IRGRP | S_IROTH, |
174 | ctrlpriv->ctl, &perfmon->ob_enc_req); | 174 | ctrlpriv->ctl, &perfmon->ob_enc_req); |
175 | ctrlpriv->ctl_ib_dec_req = | 175 | ctrlpriv->ctl_ib_dec_req = |
176 | debugfs_create_u64("ib_rq_decrypted", | 176 | debugfs_create_u64("ib_rq_decrypted", |
177 | S_IFCHR | S_IRUSR | S_IRGRP | S_IROTH, | 177 | S_IRUSR | S_IRGRP | S_IROTH, |
178 | ctrlpriv->ctl, &perfmon->ib_dec_req); | 178 | ctrlpriv->ctl, &perfmon->ib_dec_req); |
179 | ctrlpriv->ctl_ob_enc_bytes = | 179 | ctrlpriv->ctl_ob_enc_bytes = |
180 | debugfs_create_u64("ob_bytes_encrypted", | 180 | debugfs_create_u64("ob_bytes_encrypted", |
181 | S_IFCHR | S_IRUSR | S_IRGRP | S_IROTH, | 181 | S_IRUSR | S_IRGRP | S_IROTH, |
182 | ctrlpriv->ctl, &perfmon->ob_enc_bytes); | 182 | ctrlpriv->ctl, &perfmon->ob_enc_bytes); |
183 | ctrlpriv->ctl_ob_prot_bytes = | 183 | ctrlpriv->ctl_ob_prot_bytes = |
184 | debugfs_create_u64("ob_bytes_protected", | 184 | debugfs_create_u64("ob_bytes_protected", |
185 | S_IFCHR | S_IRUSR | S_IRGRP | S_IROTH, | 185 | S_IRUSR | S_IRGRP | S_IROTH, |
186 | ctrlpriv->ctl, &perfmon->ob_prot_bytes); | 186 | ctrlpriv->ctl, &perfmon->ob_prot_bytes); |
187 | ctrlpriv->ctl_ib_dec_bytes = | 187 | ctrlpriv->ctl_ib_dec_bytes = |
188 | debugfs_create_u64("ib_bytes_decrypted", | 188 | debugfs_create_u64("ib_bytes_decrypted", |
189 | S_IFCHR | S_IRUSR | S_IRGRP | S_IROTH, | 189 | S_IRUSR | S_IRGRP | S_IROTH, |
190 | ctrlpriv->ctl, &perfmon->ib_dec_bytes); | 190 | ctrlpriv->ctl, &perfmon->ib_dec_bytes); |
191 | ctrlpriv->ctl_ib_valid_bytes = | 191 | ctrlpriv->ctl_ib_valid_bytes = |
192 | debugfs_create_u64("ib_bytes_validated", | 192 | debugfs_create_u64("ib_bytes_validated", |
193 | S_IFCHR | S_IRUSR | S_IRGRP | S_IROTH, | 193 | S_IRUSR | S_IRGRP | S_IROTH, |
194 | ctrlpriv->ctl, &perfmon->ib_valid_bytes); | 194 | ctrlpriv->ctl, &perfmon->ib_valid_bytes); |
195 | 195 | ||
196 | /* Controller level - global status values */ | 196 | /* Controller level - global status values */ |
197 | ctrlpriv->ctl_faultaddr = | 197 | ctrlpriv->ctl_faultaddr = |
198 | debugfs_create_u64("fault_addr", | 198 | debugfs_create_u64("fault_addr", |
199 | S_IFCHR | S_IRUSR | S_IRGRP | S_IROTH, | 199 | S_IRUSR | S_IRGRP | S_IROTH, |
200 | ctrlpriv->ctl, &perfmon->faultaddr); | 200 | ctrlpriv->ctl, &perfmon->faultaddr); |
201 | ctrlpriv->ctl_faultdetail = | 201 | ctrlpriv->ctl_faultdetail = |
202 | debugfs_create_u32("fault_detail", | 202 | debugfs_create_u32("fault_detail", |
203 | S_IFCHR | S_IRUSR | S_IRGRP | S_IROTH, | 203 | S_IRUSR | S_IRGRP | S_IROTH, |
204 | ctrlpriv->ctl, &perfmon->faultdetail); | 204 | ctrlpriv->ctl, &perfmon->faultdetail); |
205 | ctrlpriv->ctl_faultstatus = | 205 | ctrlpriv->ctl_faultstatus = |
206 | debugfs_create_u32("fault_status", | 206 | debugfs_create_u32("fault_status", |
207 | S_IFCHR | S_IRUSR | S_IRGRP | S_IROTH, | 207 | S_IRUSR | S_IRGRP | S_IROTH, |
208 | ctrlpriv->ctl, &perfmon->status); | 208 | ctrlpriv->ctl, &perfmon->status); |
209 | 209 | ||
210 | /* Internal covering keys (useful in non-secure mode only) */ | 210 | /* Internal covering keys (useful in non-secure mode only) */ |
211 | ctrlpriv->ctl_kek_wrap.data = &ctrlpriv->ctrl->kek[0]; | 211 | ctrlpriv->ctl_kek_wrap.data = &ctrlpriv->ctrl->kek[0]; |
212 | ctrlpriv->ctl_kek_wrap.size = KEK_KEY_SIZE * sizeof(u32); | 212 | ctrlpriv->ctl_kek_wrap.size = KEK_KEY_SIZE * sizeof(u32); |
213 | ctrlpriv->ctl_kek = debugfs_create_blob("kek", | 213 | ctrlpriv->ctl_kek = debugfs_create_blob("kek", |
214 | S_IFCHR | S_IRUSR | | 214 | S_IRUSR | |
215 | S_IRGRP | S_IROTH, | 215 | S_IRGRP | S_IROTH, |
216 | ctrlpriv->ctl, | 216 | ctrlpriv->ctl, |
217 | &ctrlpriv->ctl_kek_wrap); | 217 | &ctrlpriv->ctl_kek_wrap); |
@@ -219,7 +219,7 @@ static int caam_probe(struct platform_device *pdev) | |||
219 | ctrlpriv->ctl_tkek_wrap.data = &ctrlpriv->ctrl->tkek[0]; | 219 | ctrlpriv->ctl_tkek_wrap.data = &ctrlpriv->ctrl->tkek[0]; |
220 | ctrlpriv->ctl_tkek_wrap.size = KEK_KEY_SIZE * sizeof(u32); | 220 | ctrlpriv->ctl_tkek_wrap.size = KEK_KEY_SIZE * sizeof(u32); |
221 | ctrlpriv->ctl_tkek = debugfs_create_blob("tkek", | 221 | ctrlpriv->ctl_tkek = debugfs_create_blob("tkek", |
222 | S_IFCHR | S_IRUSR | | 222 | S_IRUSR | |
223 | S_IRGRP | S_IROTH, | 223 | S_IRGRP | S_IROTH, |
224 | ctrlpriv->ctl, | 224 | ctrlpriv->ctl, |
225 | &ctrlpriv->ctl_tkek_wrap); | 225 | &ctrlpriv->ctl_tkek_wrap); |
@@ -227,7 +227,7 @@ static int caam_probe(struct platform_device *pdev) | |||
227 | ctrlpriv->ctl_tdsk_wrap.data = &ctrlpriv->ctrl->tdsk[0]; | 227 | ctrlpriv->ctl_tdsk_wrap.data = &ctrlpriv->ctrl->tdsk[0]; |
228 | ctrlpriv->ctl_tdsk_wrap.size = KEK_KEY_SIZE * sizeof(u32); | 228 | ctrlpriv->ctl_tdsk_wrap.size = KEK_KEY_SIZE * sizeof(u32); |
229 | ctrlpriv->ctl_tdsk = debugfs_create_blob("tdsk", | 229 | ctrlpriv->ctl_tdsk = debugfs_create_blob("tdsk", |
230 | S_IFCHR | S_IRUSR | | 230 | S_IRUSR | |
231 | S_IRGRP | S_IROTH, | 231 | S_IRGRP | S_IROTH, |
232 | ctrlpriv->ctl, | 232 | ctrlpriv->ctl, |
233 | &ctrlpriv->ctl_tdsk_wrap); | 233 | &ctrlpriv->ctl_tdsk_wrap); |