On Thu, Sep 19, 2013 at 02:35:42PM +0200, Daniel Vetter wrote:
> On Thu, Sep 19, 2013 at 2:30 PM, Chris Wilson <ch...@chris-wilson.co.uk> 
> wrote:
> > On Thu, Sep 19, 2013 at 02:06:39PM +0200, Daniel Vetter wrote:
> >> No buffer overflows here, but better safe than sorry.
> >>
> >> v2:
> >> - Fixup the sizeof conversion, I've missed the pointer deref (Jani).
> >> - Drop the redundant GFP_ZERO, kcalloc alreads memsets (Jani).
> >> - Use kmalloc_array for the execbuf fastpath to avoid the memset
> >>   (Chris). I've opted to leave all other conversions as-is since they
> >>   aren't in a fastpath and dealing with cleared memory instead of
> >>   random garbage is just generally nicer.
> >
> > I still don't agree with this change to kmalloc_array. The code is
> > written explicitly such that an invalid buffer_count is reported as
> > EINVAL and not ENOMEM.
> 
> It's just paranoia - imo consistently using kcalloc/kmalloc array
> where possible is just safer. Note also that the subtest I've added
> explicitly checks for EINVAL, so if we ever botch this it should get
> caught.

Paranoia for what? Checking the same thing twice in case the compiler
changes it mind?
-Chris

-- 
Chris Wilson, Intel Open Source Technology Centre
_______________________________________________
Intel-gfx mailing list
Intel-gfx@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/intel-gfx

Reply via email to