Received: by 10.213.65.68 with SMTP id h4csp750045imn; Sat, 7 Apr 2018 08:45:38 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/0CBanjD8nUhu953vEpId5ajH7RkU+vBw/iAYvgKcyx3vc839AZDG91jqEEFMQsG9tv9pJ X-Received: by 10.98.99.4 with SMTP id x4mr984992pfb.179.1523115938741; Sat, 07 Apr 2018 08:45:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523115938; cv=none; d=google.com; s=arc-20160816; b=MxbnoNWb9Iz6i8K/Q1AxOP5HX/oWOAdzqFhBafcYbYdWFA5gnkKHQ9t2n6s3aS3WZ1 PQA0cd8wI9QAChDXEu6wtS1kOEO0atPYF457UZoKTqmgVUTu89mOWCrUe0mopyChZuyI msv7E2Z/8x9wbZ+w23KRMgxfwl5qIu64xIXVzAUowBGewqeXhDPtxHX/q3NPfp0KD02i VduKxIYBuaivi9LQ6HyqKWVFgjKzKrfMQaujjUAM90tH06BNK2VJyXKq1S5BsFGuzlNh 9mGSreVeUBEF/FUXhuWjAPEgSbtScn+DNgpcIWOYxA2xizOI1qx1s3034wiGQiOnv8ff eT6w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:to :from:date:arc-authentication-results; bh=xDL7jWCuP9zICrRkCJ88YBaWxm27LgWppgOBjQaT+rg=; b=fcJePldcjoolDGcUFRzftM1Cm0SRFjiOBDw9UVm7RC6nsi4hGkC69x8P9ps4W2BiGV 72jyq3/rHnUHIDP6a3JdFPNFd0k0eDEdOuz1Q2Qg7+YXswIzTMx5gIMKle/Liyr5suTz ZB5qKtkYwX4imntF6WST3mdxiDTIzOWRFpUhzjnaw1jkLGhhbwSdT8fVGumKDwxlMZh8 HY0ubChRN8cowj0+pjjL7hZfTpr5KyEaFfQxt3D/sFlmLUDxnhvepsgjwgnz+gKlFpkZ zFaRMC7Db6/D7L0v61unjsHccZw+D3tN9brJ0OFtSdzYtBBCVoEyAQKlvugpcUOHwdP5 YMJg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w3si8713348pgo.645.2018.04.07.08.45.02; Sat, 07 Apr 2018 08:45:38 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752171AbeDGPku (ORCPT + 99 others); Sat, 7 Apr 2018 11:40:50 -0400 Received: from la.guarana.org ([173.254.219.205]:58870 "EHLO la.guarana.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751807AbeDGPkr (ORCPT ); Sat, 7 Apr 2018 11:40:47 -0400 Received: by la.guarana.org (Postfix, from userid 1006) id 9CF153461157; Sat, 7 Apr 2018 11:40:47 -0400 (EDT) Date: Sat, 7 Apr 2018 11:40:47 -0400 From: Kevin Easton To: Steffen Klassert , Herbert Xu , "David S. Miller" , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v2 2/2] af_key: Use DIV_ROUND_UP() instead of open-coded equivalent Message-ID: <494dcebdc07530d6afbd7eda300da890a3e68e1c.1523115061.git.kevin@guarana.org> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Several places use (x + 7) / 8 to convert from a number of bits to a number of bytes. Replace those with DIV_ROUND_UP(x, 8) instead, for consistency with other parts of the same file. Signed-off-by: Kevin Easton --- net/key/af_key.c | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) diff --git a/net/key/af_key.c b/net/key/af_key.c index e62e52e..f3ebb84 100644 --- a/net/key/af_key.c +++ b/net/key/af_key.c @@ -822,12 +822,12 @@ static struct sk_buff *__pfkey_xfrm_state2msg(const struct xfrm_state *x, if (add_keys) { if (x->aalg && x->aalg->alg_key_len) { auth_key_size = - PFKEY_ALIGN8((x->aalg->alg_key_len + 7) / 8); + PFKEY_ALIGN8(DIV_ROUND_UP(x->aalg->alg_key_len, 8)); size += sizeof(struct sadb_key) + auth_key_size; } if (x->ealg && x->ealg->alg_key_len) { encrypt_key_size = - PFKEY_ALIGN8((x->ealg->alg_key_len+7) / 8); + PFKEY_ALIGN8(DIV_ROUND_UP(x->ealg->alg_key_len, 8)); size += sizeof(struct sadb_key) + encrypt_key_size; } } @@ -987,7 +987,8 @@ static struct sk_buff *__pfkey_xfrm_state2msg(const struct xfrm_state *x, key->sadb_key_exttype = SADB_EXT_KEY_AUTH; key->sadb_key_bits = x->aalg->alg_key_len; key->sadb_key_reserved = 0; - memcpy(key + 1, x->aalg->alg_key, (x->aalg->alg_key_len+7)/8); + memcpy(key + 1, x->aalg->alg_key, + DIV_ROUND_UP(x->aalg->alg_key_len, 8)); } /* encrypt key */ if (add_keys && encrypt_key_size) { @@ -998,7 +999,7 @@ static struct sk_buff *__pfkey_xfrm_state2msg(const struct xfrm_state *x, key->sadb_key_bits = x->ealg->alg_key_len; key->sadb_key_reserved = 0; memcpy(key + 1, x->ealg->alg_key, - (x->ealg->alg_key_len+7)/8); + DIV_ROUND_UP(x->ealg->alg_key_len, 8)); } /* sa */ @@ -1193,7 +1194,7 @@ static struct xfrm_state * pfkey_msg2xfrm_state(struct net *net, goto out; } if (key) - keysize = (key->sadb_key_bits + 7) / 8; + keysize = DIV_ROUND_UP(key->sadb_key_bits, 8); x->aalg = kmalloc(sizeof(*x->aalg) + keysize, GFP_KERNEL); if (!x->aalg) { err = -ENOMEM; @@ -1232,7 +1233,7 @@ static struct xfrm_state * pfkey_msg2xfrm_state(struct net *net, } key = (struct sadb_key*) ext_hdrs[SADB_EXT_KEY_ENCRYPT-1]; if (key) - keysize = (key->sadb_key_bits + 7) / 8; + keysize = DIV_ROUND_UP(key->sadb_key_bits, 8); x->ealg = kmalloc(sizeof(*x->ealg) + keysize, GFP_KERNEL); if (!x->ealg) { err = -ENOMEM; -- 2.8.1