Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1267497pxb; Thu, 21 Oct 2021 19:57:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzDYfWzqkDKlfZYA5+y4pgipCzoowXngHIf3cfrdvCTYqrG+dPl/f7/5aOJqzNHa05RlUMC X-Received: by 2002:a05:6a00:1a8d:b0:44d:72f1:96e5 with SMTP id e13-20020a056a001a8d00b0044d72f196e5mr9874309pfv.40.1634871466709; Thu, 21 Oct 2021 19:57:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634871466; cv=none; d=google.com; s=arc-20160816; b=zlvqiTyg4KuoASlcWCMFXoxfWzKrEgc5i/bvgwOjRXLu0pzhg8dHD0ThtQhxcndIje 7PDdXKUD4mlzRjXxkBu6l1IRujaGgNdOJZH4cZVvSIS8YxZnxmEboj73fszYvbiSlLRc q92nA0lZVOfgVUKeLhAD70+mN9Rh5qaU6kRnEJCAJAg4PYktHTrSbMd7UUkwk/a7CyaB PNZ/GPTwpaNTcoTXxrnt6imo9uyNTiHtuEyai7VUi/9rMnlT+KlVo8qI2Km/WnTyvqXs LAOFkc8ubXBlJJfo6SAYKxJr2DgTQzv/t8qgBgQbw72XLkq1VzNxmnTE5c6cl7xTS+O2 6QRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:abuse-reports-to:tuid:content-transfer-encoding :mime-version:message-id:date:subject:cc:to:from; bh=nFaMv8UNN3cbwtJhF4vA+MdEpbjLtnGmmfWIlT2eap8=; b=si2djUls7MSjb0HPNZfjkyJFNsiMW/skBgKpdQlNHaXk8Ts/lBIUeBb1rQ0MlqK16u v2PrkJ2ZZHKcRIVuQsYfq9//m/qnZ/NGnSp2ARm9IkiqQV1upw7mGL1tyWjozP65Nm6m a0Gf8NZlEQNmWAob5iSFfjHpeye+NhlM4UMRpXApRd5L9aGdAu3PG+qZk2UlVl4ln4j1 XdrSv2ixnqPUiCoCluEPqk6hZ5o+DGoTGaajlQ5nx+sHhKxH8HsjiliUFrGTTZKTmRYc a+tSSbPiKyaX/TMZ4f7pEphGEIqaRXcKhVC5bS+vSPtrJjarwc1XGN3KXS1X51Mr7Gz3 tKLA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n11si8446703pff.177.2021.10.21.19.57.33; Thu, 21 Oct 2021 19:57:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232606AbhJVC6x (ORCPT + 99 others); Thu, 21 Oct 2021 22:58:53 -0400 Received: from ssh248.corpemail.net ([210.51.61.248]:9354 "EHLO ssh248.corpemail.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232603AbhJVC6w (ORCPT ); Thu, 21 Oct 2021 22:58:52 -0400 Received: from ([60.208.111.195]) by ssh248.corpemail.net ((LNX1044)) with ASMTP (SSL) id PCA00130; Fri, 22 Oct 2021 10:56:30 +0800 Received: from localhost.localdomain (10.200.104.119) by jtjnmail201604.home.langchao.com (10.100.2.4) with Microsoft SMTP Server id 15.1.2308.14; Fri, 22 Oct 2021 10:55:57 +0800 From: Kai Song To: CC: , , , , , Kai Song Subject: [PATCH] staging: r8188eu: Use memdup_user instead of kmalloc/copy_from_user Date: Fri, 22 Oct 2021 10:55:55 +0800 Message-ID: <20211022025555.6612-1-songkai01@inspur.com> X-Mailer: git-send-email 2.27.0 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.200.104.119] tUid: 20211022105630129e2bae6274888de4809c42d710a487 X-Abuse-Reports-To: service@corp-email.com Abuse-Reports-To: service@corp-email.com X-Complaints-To: service@corp-email.com X-Report-Abuse-To: service@corp-email.com Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Use memdup_user helper instead of open-coding to simplify the code. Signed-off-by: Kai Song --- drivers/staging/r8188eu/os_dep/ioctl_linux.c | 10 +++------- 1 file changed, 3 insertions(+), 7 deletions(-) diff --git a/drivers/staging/r8188eu/os_dep/ioctl_linux.c b/drivers/staging/r8188eu/os_dep/ioctl_linux.c index 0201f6fbeb25..96a08cc5a1ed 100644 --- a/drivers/staging/r8188eu/os_dep/ioctl_linux.c +++ b/drivers/staging/r8188eu/os_dep/ioctl_linux.c @@ -1984,14 +1984,10 @@ static int rtw_wx_read32(struct net_device *dev, padapter = (struct adapter *)rtw_netdev_priv(dev); p = &wrqu->data; len = p->length; - ptmp = kmalloc(len, GFP_KERNEL); - if (!ptmp) - return -ENOMEM; - if (copy_from_user(ptmp, p->pointer, len)) { - kfree(ptmp); - return -EFAULT; - } + ptmp = memdup_user(p->pointer, len); + if (IS_ERR(ptmp)) + return PTR_ERR(ptmp); bytes = 0; addr = 0; -- 2.27.0