Received: by 10.213.65.68 with SMTP id h4csp1280397imn; Mon, 26 Mar 2018 04:40:25 -0700 (PDT) X-Google-Smtp-Source: AG47ELtqxLl+M7OA4MhSJSzXE7FnA07t3uSL9z6WyUwrRumsDD8nMuLuSTBbstj7oac63tNX83zQ X-Received: by 10.99.109.139 with SMTP id i133mr11200241pgc.174.1522064425493; Mon, 26 Mar 2018 04:40:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522064425; cv=none; d=google.com; s=arc-20160816; b=jIJypwghcE+bv9H+hZuLu/D4G5ImgekSDjU5PhBsAeLEwKAdr5seyRZ0bxkAQ2ZNaX KzJVjSC3v6kjIAbxwuAaNNiqSJh+D8c3+3RpFhPT9zSSrxtm7kZrEqUDnmhR87+GrytI LFVNTR1N1re6oMZ6uHUGAZldePtBt+BpjCQPVaS7N6RYgeRBHYWYKKu4fZwye0+pPhSi ACHJFaJclH6R0rDjDrU2kryzTfQlbKumTxH2d9dcXCmQ/h+vKzApN6oAcFaXqw7RvMSn Dptgfzeo8OJEqFP3z3TEhHp7VR4eNpTyi9pTN3Pjj7JYhqpmtIT4g7bf7298LhzWd1Ww IJMQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:to :from:date:arc-authentication-results; bh=cneOMLJi2sBtRbyrwyxdVita44Br5IatJ2A7lP7C00A=; b=M1wkC0i7ln/Z6tXIdsm1/k5+fL147KSHYOjLs6zYxewkVJ+UEPIhdG3U31AlIhCChD WQo+mJ7htpQo/MaIL+HSGfWpaw1sX3gEasy85dP6O4/Iu7dlu+uFIGh7mExvIcLS0PDz i9bf09n6AskGlJ5wVrdRgisdD6iIevfCdyBvFLZbmJL/+xIvt7WVkjcGl9JvKnOwyA9m xrkuxC651gDfBiuppRmZdOYKDcM9uG/WAe1NMQop9683azijJYSLSoBk0OuqQpdwvbSS jmpRt8WqHHxCcQGwp3bh6RQMTG1fQBLc7NUabGfQKZvEw0eo+V7QJiidbTeQD3czXa+x hE2A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 3-v6si5903894plt.98.2018.03.26.04.40.10; Mon, 26 Mar 2018 04:40:25 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751840AbeCZLjS (ORCPT + 99 others); Mon, 26 Mar 2018 07:39:18 -0400 Received: from la.guarana.org ([173.254.219.205]:47542 "EHLO la.guarana.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751674AbeCZLjR (ORCPT ); Mon, 26 Mar 2018 07:39:17 -0400 Received: by la.guarana.org (Postfix, from userid 1006) id 9E7253460C5C; Mon, 26 Mar 2018 07:39:16 -0400 (EDT) Date: Mon, 26 Mar 2018 07:39:16 -0400 From: Kevin Easton To: Steffen Klassert , Herbert Xu , "David S. Miller" , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 1/2] af_key: Use DIV_ROUND_UP() instead of open-coded equivalent Message-ID: <930c4e2a88e93c6863ddb97df9ebd0fa1b32149e.1522063171.git.kevin@guarana.org> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Several places use (x + 7) / 8 to convert from a number of bits to a number of bytes. Replace those with DIV_ROUND_UP(x, 8) instead, for consistency with other parts of the same file. Signed-off-by: Kevin Easton --- net/key/af_key.c | 21 +++++++++++---------- 1 file changed, 11 insertions(+), 10 deletions(-) diff --git a/net/key/af_key.c b/net/key/af_key.c index 7e2e718..911b68d 100644 --- a/net/key/af_key.c +++ b/net/key/af_key.c @@ -795,12 +795,12 @@ static struct sk_buff *__pfkey_xfrm_state2msg(const struct xfrm_state *x, if (add_keys) { if (x->aalg && x->aalg->alg_key_len) { auth_key_size = - PFKEY_ALIGN8((x->aalg->alg_key_len + 7) / 8); + PFKEY_ALIGN8(DIV_ROUND_UP(x->aalg->alg_key_len, 8)); size += sizeof(struct sadb_key) + auth_key_size; } if (x->ealg && x->ealg->alg_key_len) { encrypt_key_size = - PFKEY_ALIGN8((x->ealg->alg_key_len+7) / 8); + PFKEY_ALIGN8(DIV_ROUND_UP(x->ealg->alg_key_len, 8)); size += sizeof(struct sadb_key) + encrypt_key_size; } } @@ -960,7 +960,8 @@ static struct sk_buff *__pfkey_xfrm_state2msg(const struct xfrm_state *x, key->sadb_key_exttype = SADB_EXT_KEY_AUTH; key->sadb_key_bits = x->aalg->alg_key_len; key->sadb_key_reserved = 0; - memcpy(key + 1, x->aalg->alg_key, (x->aalg->alg_key_len+7)/8); + memcpy(key + 1, x->aalg->alg_key, + DIV_ROUND_UP(x->aalg->alg_key_len, 8)); } /* encrypt key */ if (add_keys && encrypt_key_size) { @@ -971,7 +972,7 @@ static struct sk_buff *__pfkey_xfrm_state2msg(const struct xfrm_state *x, key->sadb_key_bits = x->ealg->alg_key_len; key->sadb_key_reserved = 0; memcpy(key + 1, x->ealg->alg_key, - (x->ealg->alg_key_len+7)/8); + DIV_ROUND_UP(x->ealg->alg_key_len, 8)); } /* sa */ @@ -1104,14 +1105,14 @@ static struct xfrm_state * pfkey_msg2xfrm_state(struct net *net, key = ext_hdrs[SADB_EXT_KEY_AUTH - 1]; if (key != NULL && sa->sadb_sa_auth != SADB_X_AALG_NULL && - ((key->sadb_key_bits+7) / 8 == 0 || - (key->sadb_key_bits+7) / 8 > key->sadb_key_len * sizeof(uint64_t))) + (DIV_ROUND_UP(key->sadb_key_bits, 8) == 0 || + DIV_ROUND_UP(key->sadb_key_bits, 8) > key->sadb_key_len * sizeof(uint64_t))) return ERR_PTR(-EINVAL); key = ext_hdrs[SADB_EXT_KEY_ENCRYPT-1]; if (key != NULL && sa->sadb_sa_encrypt != SADB_EALG_NULL && - ((key->sadb_key_bits+7) / 8 == 0 || - (key->sadb_key_bits+7) / 8 > key->sadb_key_len * sizeof(uint64_t))) + (DIV_ROUND_UP(key->sadb_key_bits, 8) == 0 || + DIV_ROUND_UP(key->sadb_key_bits, 8) > key->sadb_key_len * sizeof(uint64_t))) return ERR_PTR(-EINVAL); x = xfrm_state_alloc(net); @@ -1168,7 +1169,7 @@ static struct xfrm_state * pfkey_msg2xfrm_state(struct net *net, goto out; } if (key) - keysize = (key->sadb_key_bits + 7) / 8; + keysize = DIV_ROUND_UP(key->sadb_key_bits, 8); x->aalg = kmalloc(sizeof(*x->aalg) + keysize, GFP_KERNEL); if (!x->aalg) { err = -ENOMEM; @@ -1207,7 +1208,7 @@ static struct xfrm_state * pfkey_msg2xfrm_state(struct net *net, } key = (struct sadb_key*) ext_hdrs[SADB_EXT_KEY_ENCRYPT-1]; if (key) - keysize = (key->sadb_key_bits + 7) / 8; + keysize = DIV_ROUND_UP(key->sadb_key_bits, 8); x->ealg = kmalloc(sizeof(*x->ealg) + keysize, GFP_KERNEL); if (!x->ealg) { err = -ENOMEM; -- 2.8.1