diff options
author | Jia-Ju Bai <baijiaju1990@gmail.com> | 2018-01-25 17:57:54 +0800 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2018-02-15 23:26:47 +0800 |
commit | 1ca2809897155f1adc43e4859b4a3582e235c09a (patch) | |
tree | efd82bd91aff83220967913a3783b8dab3cb4831 /crypto | |
parent | c7f582f5de82f16b5e2eae80d0228e9fd0749040 (diff) | |
download | linux-1ca2809897155f1adc43e4859b4a3582e235c09a.tar.gz linux-1ca2809897155f1adc43e4859b4a3582e235c09a.tar.bz2 linux-1ca2809897155f1adc43e4859b4a3582e235c09a.zip |
crypto: rsa-pkcs1pad - Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete
After checking all possible call chains to kzalloc here,
my tool finds that this kzalloc is never called in atomic context.
Thus GFP_ATOMIC is not necessary, and it can be replaced with GFP_KERNEL.
This is found by a static analysis tool named DCNS written by myself.
Signed-off-by: Jia-Ju Bai <baijiaju1990@gmail.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto')
-rw-r--r-- | crypto/rsa-pkcs1pad.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/rsa-pkcs1pad.c b/crypto/rsa-pkcs1pad.c index 2908f93c3e55..9893dbfc1af4 100644 --- a/crypto/rsa-pkcs1pad.c +++ b/crypto/rsa-pkcs1pad.c @@ -192,7 +192,7 @@ static int pkcs1pad_encrypt_sign_complete(struct akcipher_request *req, int err) if (likely(!pad_len)) goto out; - out_buf = kzalloc(ctx->key_size, GFP_ATOMIC); + out_buf = kzalloc(ctx->key_size, GFP_KERNEL); err = -ENOMEM; if (!out_buf) goto out; |