* [PATCH] crypto: qat - use kcalloc() instead of kzalloc()
@ 2024-01-29 12:57 Lenko Donchev
2024-01-30 18:35 ` Gustavo A. R. Silva
2024-02-06 12:26 ` Cabiddu, Giovanni
0 siblings, 2 replies; 3+ messages in thread
From: Lenko Donchev @ 2024-01-29 12:57 UTC (permalink / raw)
To: Giovanni Cabiddu, Herbert Xu, David S. Miller,
Gustavo A. R. Silva
Cc: qat-linux, linux-crypto, linux-kernel, linux-hardening
We are trying to get rid of all multiplications from allocation
functions to prevent integer overflows[1]. Here the multiplication is
obviously safe, but using kcalloc() is more appropriate and improves
readability. This patch has no effect on runtime behavior.
Link: https://github.com/KSPP/linux/issues/162 [1]
Link: https://www.kernel.org/doc/html/next/process/deprecated.html#open-coded-arithmetic-in-allocator-arguments [2]
Signed-off-by: Lenko Donchev <lenko.donchev@gmail.com>
---
drivers/crypto/intel/qat/qat_common/adf_isr.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/crypto/intel/qat/qat_common/adf_isr.c b/drivers/crypto/intel/qat/qat_common/adf_isr.c
index 3557a0d6dea2..a13d9885d60f 100644
--- a/drivers/crypto/intel/qat/qat_common/adf_isr.c
+++ b/drivers/crypto/intel/qat/qat_common/adf_isr.c
@@ -272,7 +272,7 @@ static int adf_isr_alloc_msix_vectors_data(struct adf_accel_dev *accel_dev)
if (!accel_dev->pf.vf_info)
msix_num_entries += hw_data->num_banks;
- irqs = kzalloc_node(msix_num_entries * sizeof(*irqs),
+ irqs = kcalloc_node(msix_num_entries, sizeof(*irqs),
GFP_KERNEL, dev_to_node(&GET_DEV(accel_dev)));
if (!irqs)
return -ENOMEM;
--
2.43.0
^ permalink raw reply related [flat|nested] 3+ messages in thread
* Re: [PATCH] crypto: qat - use kcalloc() instead of kzalloc()
2024-01-29 12:57 [PATCH] crypto: qat - use kcalloc() instead of kzalloc() Lenko Donchev
@ 2024-01-30 18:35 ` Gustavo A. R. Silva
2024-02-06 12:26 ` Cabiddu, Giovanni
1 sibling, 0 replies; 3+ messages in thread
From: Gustavo A. R. Silva @ 2024-01-30 18:35 UTC (permalink / raw)
To: Lenko Donchev, Giovanni Cabiddu, Herbert Xu, David S. Miller,
Gustavo A. R. Silva
Cc: qat-linux, linux-crypto, linux-kernel, linux-hardening
On 1/29/24 06:57, Lenko Donchev wrote:
> We are trying to get rid of all multiplications from allocation
> functions to prevent integer overflows[1]. Here the multiplication is
> obviously safe, but using kcalloc() is more appropriate and improves
> readability. This patch has no effect on runtime behavior.
>
> Link: https://github.com/KSPP/linux/issues/162 [1]
> Link: https://www.kernel.org/doc/html/next/process/deprecated.html#open-coded-arithmetic-in-allocator-arguments [2]
>
> Signed-off-by: Lenko Donchev <lenko.donchev@gmail.com>
Reviewed-by: Gustavo A. R. Silva <gustavoars@kernel.org>
Thanks!
--
Gustavo
> ---
> drivers/crypto/intel/qat/qat_common/adf_isr.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/drivers/crypto/intel/qat/qat_common/adf_isr.c b/drivers/crypto/intel/qat/qat_common/adf_isr.c
> index 3557a0d6dea2..a13d9885d60f 100644
> --- a/drivers/crypto/intel/qat/qat_common/adf_isr.c
> +++ b/drivers/crypto/intel/qat/qat_common/adf_isr.c
> @@ -272,7 +272,7 @@ static int adf_isr_alloc_msix_vectors_data(struct adf_accel_dev *accel_dev)
> if (!accel_dev->pf.vf_info)
> msix_num_entries += hw_data->num_banks;
>
> - irqs = kzalloc_node(msix_num_entries * sizeof(*irqs),
> + irqs = kcalloc_node(msix_num_entries, sizeof(*irqs),
> GFP_KERNEL, dev_to_node(&GET_DEV(accel_dev)));
> if (!irqs)
> return -ENOMEM;
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [PATCH] crypto: qat - use kcalloc() instead of kzalloc()
2024-01-29 12:57 [PATCH] crypto: qat - use kcalloc() instead of kzalloc() Lenko Donchev
2024-01-30 18:35 ` Gustavo A. R. Silva
@ 2024-02-06 12:26 ` Cabiddu, Giovanni
1 sibling, 0 replies; 3+ messages in thread
From: Cabiddu, Giovanni @ 2024-02-06 12:26 UTC (permalink / raw)
To: Lenko Donchev
Cc: Herbert Xu, David S. Miller, Gustavo A. R. Silva, qat-linux,
linux-crypto, linux-kernel, linux-hardening
On Mon, Jan 29, 2024 at 06:57:28AM -0600, Lenko Donchev wrote:
> We are trying to get rid of all multiplications from allocation
> functions to prevent integer overflows[1]. Here the multiplication is
> obviously safe, but using kcalloc() is more appropriate and improves
> readability. This patch has no effect on runtime behavior.
>
> Link: https://github.com/KSPP/linux/issues/162 [1]
> Link: https://www.kernel.org/doc/html/next/process/deprecated.html#open-coded-arithmetic-in-allocator-arguments [2]
>
> Signed-off-by: Lenko Donchev <lenko.donchev@gmail.com>
Thanks for your patch.
The same change was already applied to the cryptodev tree about two
weeks ago. See 4da3bc65d218 ("crypto: qat - use kcalloc_node() instead of
kzalloc_node()") [1].
[1] https://git.kernel.org/pub/scm/linux/kernel/git/herbert/cryptodev-2.6.git/commit/?id=4da3bc65d218605557696109e42cfeee666d601f
Regards,
--
Giovanni
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2024-02-06 12:28 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2024-01-29 12:57 [PATCH] crypto: qat - use kcalloc() instead of kzalloc() Lenko Donchev
2024-01-30 18:35 ` Gustavo A. R. Silva
2024-02-06 12:26 ` Cabiddu, Giovanni
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).