diff options
author | Jia-Ju Bai <baijiaju1990@gmail.com> | 2018-01-25 17:57:54 +0800 |
---|---|---|
committer | Herbert Xu <herbert@gondor.apana.org.au> | 2018-02-15 23:26:47 +0800 |
commit | 4e92247a228c2d2c8a063842aa3dad2b0c9256f3 (patch) | |
tree | a7c5673d43d94d50ee09e6f3d12c9105db25337b /crypto/rsa-pkcs1pad.c | |
parent | cd274594062b37c5169c997540f16207a3a50a4b (diff) | |
download | linux-crypto-4e92247a228c2d2c8a063842aa3dad2b0c9256f3.tar.gz linux-crypto-4e92247a228c2d2c8a063842aa3dad2b0c9256f3.zip |
crypto: rsa-pkcs1pad - Replace GFP_ATOMIC with GFP_KERNEL in pkcs1pad_encrypt_sign_complete
After checking all possible call chains to kzalloc here,
my tool finds that this kzalloc is never called in atomic context.
Thus GFP_ATOMIC is not necessary, and it can be replaced with GFP_KERNEL.
This is found by a static analysis tool named DCNS written by myself.
Signed-off-by: Jia-Ju Bai <baijiaju1990@gmail.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Diffstat (limited to 'crypto/rsa-pkcs1pad.c')
-rw-r--r-- | crypto/rsa-pkcs1pad.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/crypto/rsa-pkcs1pad.c b/crypto/rsa-pkcs1pad.c index 2908f93c..9893dbfc 100644 --- a/crypto/rsa-pkcs1pad.c +++ b/crypto/rsa-pkcs1pad.c @@ -192,7 +192,7 @@ static int pkcs1pad_encrypt_sign_complete(struct akcipher_request *req, int err) if (likely(!pad_len)) goto out; - out_buf = kzalloc(ctx->key_size, GFP_ATOMIC); + out_buf = kzalloc(ctx->key_size, GFP_KERNEL); err = -ENOMEM; if (!out_buf) goto out; |