Commit 20ea7fd2 authored by Namjae Jeon's avatar Namjae Jeon Committed by Steve French

cifsd: use kmalloc() for small allocations

Just use kmalloc() for small allocations.
Signed-off-by: default avatarNamjae Jeon <namjae.jeon@samsung.com>
Signed-off-by: default avatarSteve French <stfrench@microsoft.com>
parent 69f447be
...@@ -63,7 +63,7 @@ static int register_wm_size_class(size_t sz) ...@@ -63,7 +63,7 @@ static int register_wm_size_class(size_t sz)
{ {
struct wm_list *l, *nl; struct wm_list *l, *nl;
nl = kvmalloc(sizeof(struct wm_list), GFP_KERNEL); nl = kmalloc(sizeof(struct wm_list), GFP_KERNEL);
if (!nl) if (!nl)
return -ENOMEM; return -ENOMEM;
......
...@@ -92,7 +92,7 @@ static int parse_veto_list(struct ksmbd_share_config *share, ...@@ -92,7 +92,7 @@ static int parse_veto_list(struct ksmbd_share_config *share,
while (veto_list_sz > 0) { while (veto_list_sz > 0) {
struct ksmbd_veto_pattern *p; struct ksmbd_veto_pattern *p;
p = ksmbd_alloc(sizeof(struct ksmbd_veto_pattern)); p = kzalloc(sizeof(struct ksmbd_veto_pattern), GFP_KERNEL);
if (!p) if (!p)
return -ENOMEM; return -ENOMEM;
...@@ -129,7 +129,7 @@ static struct ksmbd_share_config *share_config_request(char *name) ...@@ -129,7 +129,7 @@ static struct ksmbd_share_config *share_config_request(char *name)
if (resp->flags == KSMBD_SHARE_FLAG_INVALID) if (resp->flags == KSMBD_SHARE_FLAG_INVALID)
goto out; goto out;
share = ksmbd_alloc(sizeof(struct ksmbd_share_config)); share = kzalloc(sizeof(struct ksmbd_share_config), GFP_KERNEL);
if (!share) if (!share)
goto out; goto out;
......
...@@ -31,7 +31,7 @@ struct ksmbd_user *ksmbd_alloc_user(struct ksmbd_login_response *resp) ...@@ -31,7 +31,7 @@ struct ksmbd_user *ksmbd_alloc_user(struct ksmbd_login_response *resp)
{ {
struct ksmbd_user *user = NULL; struct ksmbd_user *user = NULL;
user = ksmbd_alloc(sizeof(struct ksmbd_user)); user = kmalloc(sizeof(struct ksmbd_user), GFP_KERNEL);
if (!user) if (!user)
return NULL; return NULL;
...@@ -40,7 +40,7 @@ struct ksmbd_user *ksmbd_alloc_user(struct ksmbd_login_response *resp) ...@@ -40,7 +40,7 @@ struct ksmbd_user *ksmbd_alloc_user(struct ksmbd_login_response *resp)
user->gid = resp->gid; user->gid = resp->gid;
user->uid = resp->uid; user->uid = resp->uid;
user->passkey_sz = resp->hash_sz; user->passkey_sz = resp->hash_sz;
user->passkey = ksmbd_alloc(resp->hash_sz); user->passkey = kmalloc(resp->hash_sz, GFP_KERNEL);
if (user->passkey) if (user->passkey)
memcpy(user->passkey, resp->hash, resp->hash_sz); memcpy(user->passkey, resp->hash, resp->hash_sz);
......
...@@ -101,7 +101,7 @@ int ksmbd_session_rpc_open(struct ksmbd_session *sess, char *rpc_name) ...@@ -101,7 +101,7 @@ int ksmbd_session_rpc_open(struct ksmbd_session *sess, char *rpc_name)
if (!method) if (!method)
return -EINVAL; return -EINVAL;
entry = ksmbd_alloc(sizeof(struct ksmbd_session_rpc)); entry = kzalloc(sizeof(struct ksmbd_session_rpc), GFP_KERNEL);
if (!entry) if (!entry)
return -EINVAL; return -EINVAL;
...@@ -266,7 +266,7 @@ static struct ksmbd_session *__session_create(int protocol) ...@@ -266,7 +266,7 @@ static struct ksmbd_session *__session_create(int protocol)
struct ksmbd_session *sess; struct ksmbd_session *sess;
int ret; int ret;
sess = ksmbd_alloc(sizeof(struct ksmbd_session)); sess = kzalloc(sizeof(struct ksmbd_session), GFP_KERNEL);
if (!sess) if (!sess)
return NULL; return NULL;
......
...@@ -593,7 +593,7 @@ static int oplock_break_pending(struct oplock_info *opinfo, int req_op_level) ...@@ -593,7 +593,7 @@ static int oplock_break_pending(struct oplock_info *opinfo, int req_op_level)
static inline int allocate_oplock_break_buf(struct ksmbd_work *work) static inline int allocate_oplock_break_buf(struct ksmbd_work *work)
{ {
work->response_buf = ksmbd_alloc_response(MAX_CIFS_SMALL_BUFFER_SIZE); work->response_buf = kzalloc(MAX_CIFS_SMALL_BUFFER_SIZE, GFP_KERNEL);
if (!work->response_buf) if (!work->response_buf)
return -ENOMEM; return -ENOMEM;
work->response_sz = MAX_CIFS_SMALL_BUFFER_SIZE; work->response_sz = MAX_CIFS_SMALL_BUFFER_SIZE;
......
...@@ -1174,7 +1174,7 @@ static int alloc_preauth_hash(struct ksmbd_session *sess, ...@@ -1174,7 +1174,7 @@ static int alloc_preauth_hash(struct ksmbd_session *sess,
if (sess->Preauth_HashValue) if (sess->Preauth_HashValue)
return 0; return 0;
sess->Preauth_HashValue = ksmbd_alloc(PREAUTH_HASHVALUE_SIZE); sess->Preauth_HashValue = kmalloc(PREAUTH_HASHVALUE_SIZE, GFP_KERNEL);
if (!sess->Preauth_HashValue) if (!sess->Preauth_HashValue)
return -ENOMEM; return -ENOMEM;
...@@ -8345,7 +8345,7 @@ int smb3_encrypt_resp(struct ksmbd_work *work) ...@@ -8345,7 +8345,7 @@ int smb3_encrypt_resp(struct ksmbd_work *work)
if (ARRAY_SIZE(iov) < rq_nvec) if (ARRAY_SIZE(iov) < rq_nvec)
return -ENOMEM; return -ENOMEM;
tr_hdr = ksmbd_alloc_response(sizeof(struct smb2_transform_hdr)); tr_hdr = kzalloc(sizeof(struct smb2_transform_hdr), GFP_KERNEL);
if (!tr_hdr) if (!tr_hdr)
return rc; return rc;
......
...@@ -569,7 +569,7 @@ static struct interface *alloc_iface(char *ifname) ...@@ -569,7 +569,7 @@ static struct interface *alloc_iface(char *ifname)
if (!ifname) if (!ifname)
return NULL; return NULL;
iface = ksmbd_alloc(sizeof(struct interface)); iface = kzalloc(sizeof(struct interface), GFP_KERNEL);
if (!iface) { if (!iface) {
kfree(ifname); kfree(ifname);
return NULL; return NULL;
......
...@@ -830,7 +830,7 @@ int ksmbd_file_table_flush(struct ksmbd_work *work) ...@@ -830,7 +830,7 @@ int ksmbd_file_table_flush(struct ksmbd_work *work)
int ksmbd_init_file_table(struct ksmbd_file_table *ft) int ksmbd_init_file_table(struct ksmbd_file_table *ft)
{ {
ft->idr = ksmbd_alloc(sizeof(struct idr)); ft->idr = kzalloc(sizeof(struct idr), GFP_KERNEL);
if (!ft->idr) if (!ft->idr)
return -ENOMEM; return -ENOMEM;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment