From mboxrd@z Thu Jan 1 00:00:00 1970 From: Vakul Garg Subject: [net-next v5 3/3] net/tls: Remove redundant array allocation. Date: Thu, 19 Jul 2018 21:56:13 +0530 Message-ID: <20180719162613.27184-4-vakul.garg@nxp.com> References: <20180719162613.27184-1-vakul.garg@nxp.com> Mime-Version: 1.0 Content-Type: text/plain Cc: borisp@mellanox.com, aviadye@mellanox.com, davejwatson@fb.com, davem@davemloft.net, Vakul Garg To: netdev@vger.kernel.org Return-path: Received: from mail-eopbgr10041.outbound.protection.outlook.com ([40.107.1.41]:41605 "EHLO EUR02-HE1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730621AbeGSLwy (ORCPT ); Thu, 19 Jul 2018 07:52:54 -0400 In-Reply-To: <20180719162613.27184-1-vakul.garg@nxp.com> Sender: netdev-owner@vger.kernel.org List-ID: In function decrypt_skb(), array allocation in case when sgout is NULL is unnecessary. Instead, local variable sgin_arr[] can be used. Signed-off-by: Vakul Garg --- net/tls/tls_sw.c | 4 ---- 1 file changed, 4 deletions(-) diff --git a/net/tls/tls_sw.c b/net/tls/tls_sw.c index e15ace0ebd79..1aa2d46713d7 100644 --- a/net/tls/tls_sw.c +++ b/net/tls/tls_sw.c @@ -704,7 +704,6 @@ int decrypt_skb(struct sock *sk, struct sk_buff *skb, memcpy(iv, tls_ctx->rx.iv, TLS_CIPHER_AES_GCM_128_SALT_SIZE); if (!sgout) { nsg = skb_cow_data(skb, 0, &unused) + 1; - sgin = kmalloc_array(nsg, sizeof(*sgin), sk->sk_allocation); sgout = sgin; } @@ -725,9 +724,6 @@ int decrypt_skb(struct sock *sk, struct sk_buff *skb, rxm->full_len - tls_ctx->rx.overhead_size, skb, sk->sk_allocation); - if (sgin != &sgin_arr[0]) - kfree(sgin); - return ret; } -- 2.13.6