On Tue, Oct 27, 2020 at 01:17:20PM +0100, Bartosz Golaszewski wrote:
> From: Bartosz Golaszewski <bgolaszew...@baylibre.com>
> 
> Use the helper that checks for overflows internally instead of manually
> calculating the size of the new array.
> 
> Signed-off-by: Bartosz Golaszewski <bgolaszew...@baylibre.com>

No problem with the patch, it does introduce some symmetry in the code.

Acked-by: Michael S. Tsirkin <m...@redhat.com>



> ---
>  drivers/vhost/vringh.c | 3 ++-
>  1 file changed, 2 insertions(+), 1 deletion(-)
> 
> diff --git a/drivers/vhost/vringh.c b/drivers/vhost/vringh.c
> index 8bd8b403f087..08a0e1c842df 100644
> --- a/drivers/vhost/vringh.c
> +++ b/drivers/vhost/vringh.c
> @@ -198,7 +198,8 @@ static int resize_iovec(struct vringh_kiov *iov, gfp_t 
> gfp)
>  
>       flag = (iov->max_num & VRINGH_IOV_ALLOCATED);
>       if (flag)
> -             new = krealloc(iov->iov, new_num * sizeof(struct iovec), gfp);
> +             new = krealloc_array(iov->iov, new_num,
> +                                  sizeof(struct iovec), gfp);
>       else {
>               new = kmalloc_array(new_num, sizeof(struct iovec), gfp);
>               if (new) {
> -- 
> 2.29.1

Reply via email to