netwerk/srtp/src/crypto/kernel/alloc.c

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

michael@0 1 /*
michael@0 2 * alloc.c
michael@0 3 *
michael@0 4 * memory allocation and deallocation
michael@0 5 *
michael@0 6 * David A. McGrew
michael@0 7 * Cisco Systems, Inc.
michael@0 8 */
michael@0 9 /*
michael@0 10 *
michael@0 11 * Copyright (c) 2001-2006 Cisco Systems, Inc.
michael@0 12 * All rights reserved.
michael@0 13 *
michael@0 14 * Redistribution and use in source and binary forms, with or without
michael@0 15 * modification, are permitted provided that the following conditions
michael@0 16 * are met:
michael@0 17 *
michael@0 18 * Redistributions of source code must retain the above copyright
michael@0 19 * notice, this list of conditions and the following disclaimer.
michael@0 20 *
michael@0 21 * Redistributions in binary form must reproduce the above
michael@0 22 * copyright notice, this list of conditions and the following
michael@0 23 * disclaimer in the documentation and/or other materials provided
michael@0 24 * with the distribution.
michael@0 25 *
michael@0 26 * Neither the name of the Cisco Systems, Inc. nor the names of its
michael@0 27 * contributors may be used to endorse or promote products derived
michael@0 28 * from this software without specific prior written permission.
michael@0 29 *
michael@0 30 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
michael@0 31 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
michael@0 32 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
michael@0 33 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
michael@0 34 * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
michael@0 35 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
michael@0 36 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
michael@0 37 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
michael@0 38 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
michael@0 39 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
michael@0 40 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
michael@0 41 * OF THE POSSIBILITY OF SUCH DAMAGE.
michael@0 42 *
michael@0 43 */
michael@0 44
michael@0 45 #include "alloc.h"
michael@0 46 #include "crypto_kernel.h"
michael@0 47
michael@0 48 /* the debug module for memory allocation */
michael@0 49
michael@0 50 debug_module_t mod_alloc = {
michael@0 51 0, /* debugging is off by default */
michael@0 52 "alloc" /* printable name for module */
michael@0 53 };
michael@0 54
michael@0 55 /*
michael@0 56 * Nota bene: the debugging statements for crypto_alloc() and
michael@0 57 * crypto_free() have identical prefixes, which include the addresses
michael@0 58 * of the memory locations on which they are operating. This fact can
michael@0 59 * be used to locate memory leaks, by turning on memory debugging,
michael@0 60 * grepping for 'alloc', then matching alloc and free calls by
michael@0 61 * address.
michael@0 62 */
michael@0 63
michael@0 64 #ifdef SRTP_KERNEL_LINUX
michael@0 65
michael@0 66 #include <linux/interrupt.h>
michael@0 67
michael@0 68 void *
michael@0 69 crypto_alloc(size_t size) {
michael@0 70 void *ptr;
michael@0 71
michael@0 72 ptr = kmalloc(size, in_interrupt() ? GFP_ATOMIC : GFP_KERNEL);
michael@0 73
michael@0 74 if (ptr) {
michael@0 75 debug_print(mod_alloc, "(location: %p) allocated", ptr);
michael@0 76 } else {
michael@0 77 debug_print(mod_alloc, "allocation failed (asked for %d bytes)\n", size);
michael@0 78 }
michael@0 79
michael@0 80 return ptr;
michael@0 81 }
michael@0 82
michael@0 83 void
michael@0 84 crypto_free(void *ptr) {
michael@0 85
michael@0 86 debug_print(mod_alloc, "(location: %p) freed", ptr);
michael@0 87
michael@0 88 kfree(ptr);
michael@0 89 }
michael@0 90
michael@0 91
michael@0 92 #elif defined(HAVE_STDLIB_H)
michael@0 93
michael@0 94 void *
michael@0 95 crypto_alloc(size_t size) {
michael@0 96 void *ptr;
michael@0 97
michael@0 98 ptr = malloc(size);
michael@0 99
michael@0 100 if (ptr) {
michael@0 101 debug_print(mod_alloc, "(location: %p) allocated", ptr);
michael@0 102 } else {
michael@0 103 debug_print(mod_alloc, "allocation failed (asked for %d bytes)\n", size);
michael@0 104 }
michael@0 105
michael@0 106 return ptr;
michael@0 107 }
michael@0 108
michael@0 109 void
michael@0 110 crypto_free(void *ptr) {
michael@0 111
michael@0 112 debug_print(mod_alloc, "(location: %p) freed", ptr);
michael@0 113
michael@0 114 free(ptr);
michael@0 115 }
michael@0 116
michael@0 117 #else /* we need to define our own memory allocation routines */
michael@0 118
michael@0 119 #error no memory allocation defined yet
michael@0 120
michael@0 121 #endif

mercurial