Skip to content

Commit 6f8972a

Browse files
Li Zetaojwrdegoede
authored andcommitted
platform/x86: hp-bioscfg: Use kmemdup() to replace kmalloc + memcpy
There are some warnings reported by coccinelle: ./drivers/platform/x86/hp/hp-bioscfg/spmobj-attributes.c:317:35-42: WARNING opportunity for kmemdup ./drivers/platform/x86/hp/hp-bioscfg/spmobj-attributes.c:270:40-47: WARNING opportunity for kmemdup ./drivers/platform/x86/hp/hp-bioscfg/spmobj-attributes.c:233:36-43: WARNING opportunity for kmemdup Use kmemdup rather than duplicating its implementation. Signed-off-by: Li Zetao <[email protected]> Reviewed-by: Jorge Lopez <[email protected]> Link: https://lore.kernel.org/r/[email protected] Reviewed-by: Hans de Goede <[email protected]> Signed-off-by: Hans de Goede <[email protected]>
1 parent bfecbcb commit 6f8972a

File tree

1 file changed

+3
-8
lines changed

1 file changed

+3
-8
lines changed

drivers/platform/x86/hp/hp-bioscfg/spmobj-attributes.c

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -230,12 +230,10 @@ static ssize_t sk_store(struct kobject *kobj,
230230
length--;
231231

232232
/* allocate space and copy current signing key */
233-
bioscfg_drv.spm_data.signing_key = kmalloc(length, GFP_KERNEL);
233+
bioscfg_drv.spm_data.signing_key = kmemdup(buf, length, GFP_KERNEL);
234234
if (!bioscfg_drv.spm_data.signing_key)
235235
return -ENOMEM;
236236

237-
memcpy(bioscfg_drv.spm_data.signing_key, buf, length);
238-
239237
/* submit signing key payload */
240238
ret = hp_wmi_perform_query(HPWMI_SECUREPLATFORM_SET_SK,
241239
HPWMI_SECUREPLATFORM,
@@ -267,14 +265,12 @@ static ssize_t kek_store(struct kobject *kobj,
267265
length--;
268266

269267
/* allocate space and copy current signing key */
270-
bioscfg_drv.spm_data.endorsement_key = kmalloc(length, GFP_KERNEL);
268+
bioscfg_drv.spm_data.endorsement_key = kmemdup(buf, length, GFP_KERNEL);
271269
if (!bioscfg_drv.spm_data.endorsement_key) {
272270
ret = -ENOMEM;
273271
goto exit_kek;
274272
}
275273

276-
memcpy(bioscfg_drv.spm_data.endorsement_key, buf, length);
277-
278274
ret = hp_wmi_perform_query(HPWMI_SECUREPLATFORM_SET_KEK,
279275
HPWMI_SECUREPLATFORM,
280276
(void *)bioscfg_drv.spm_data.endorsement_key,
@@ -314,13 +310,12 @@ static ssize_t auth_token_store(struct kobject *kobj,
314310
length--;
315311

316312
/* allocate space and copy current auth token */
317-
bioscfg_drv.spm_data.auth_token = kmalloc(length, GFP_KERNEL);
313+
bioscfg_drv.spm_data.auth_token = kmemdup(buf, length, GFP_KERNEL);
318314
if (!bioscfg_drv.spm_data.auth_token) {
319315
ret = -ENOMEM;
320316
goto exit_token;
321317
}
322318

323-
memcpy(bioscfg_drv.spm_data.auth_token, buf, length);
324319
return count;
325320

326321
exit_token:

0 commit comments

Comments
 (0)