forked from luck/tmp_suning_uos_patched
[NET]: Remove more unneeded typecasts on *malloc()
This removes more unneeded casts on the return value for kmalloc(), sock_kmalloc(), and vmalloc(). Signed-off-by: Kris Katterjohn <kjak@users.sourceforge.net> Acked-by: James Morris <jmorris@namei.org> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
ae0f7d5f83
commit
8b3a70058b
|
@ -1811,8 +1811,7 @@ make_entry(struct lec_priv *priv, unsigned char *mac_addr)
|
|||
{
|
||||
struct lec_arp_table *to_return;
|
||||
|
||||
to_return = (struct lec_arp_table *) kmalloc(sizeof(struct lec_arp_table),
|
||||
GFP_ATOMIC);
|
||||
to_return = kmalloc(sizeof(struct lec_arp_table), GFP_ATOMIC);
|
||||
if (!to_return) {
|
||||
printk("LEC: Arp entry kmalloc failed\n");
|
||||
return NULL;
|
||||
|
|
|
@ -944,7 +944,7 @@ static int do_replace(void __user *user, unsigned int len)
|
|||
if (countersize)
|
||||
memset(newinfo->counters, 0, countersize);
|
||||
|
||||
newinfo->entries = (char *)vmalloc(tmp.entries_size);
|
||||
newinfo->entries = vmalloc(tmp.entries_size);
|
||||
if (!newinfo->entries) {
|
||||
ret = -ENOMEM;
|
||||
goto free_newinfo;
|
||||
|
@ -1146,7 +1146,7 @@ int ebt_register_table(struct ebt_table *table)
|
|||
if (!newinfo)
|
||||
return -ENOMEM;
|
||||
|
||||
newinfo->entries = (char *)vmalloc(table->table->entries_size);
|
||||
newinfo->entries = vmalloc(table->table->entries_size);
|
||||
if (!(newinfo->entries))
|
||||
goto free_newinfo;
|
||||
|
||||
|
|
|
@ -158,7 +158,7 @@ int dev_mc_add(struct net_device *dev, void *addr, int alen, int glbl)
|
|||
int err = 0;
|
||||
struct dev_mc_list *dmi, *dmi1;
|
||||
|
||||
dmi1 = (struct dev_mc_list *)kmalloc(sizeof(*dmi), GFP_ATOMIC);
|
||||
dmi1 = kmalloc(sizeof(*dmi), GFP_ATOMIC);
|
||||
|
||||
spin_lock_bh(&dev->xmit_lock);
|
||||
for (dmi = dev->mc_list; dmi != NULL; dmi = dmi->next) {
|
||||
|
|
|
@ -975,7 +975,7 @@ static void igmpv3_add_delrec(struct in_device *in_dev, struct ip_mc_list *im)
|
|||
* for deleted items allows change reports to use common code with
|
||||
* non-deleted or query-response MCA's.
|
||||
*/
|
||||
pmc = (struct ip_mc_list *)kmalloc(sizeof(*pmc), GFP_KERNEL);
|
||||
pmc = kmalloc(sizeof(*pmc), GFP_KERNEL);
|
||||
if (!pmc)
|
||||
return;
|
||||
memset(pmc, 0, sizeof(*pmc));
|
||||
|
@ -1155,7 +1155,7 @@ void ip_mc_inc_group(struct in_device *in_dev, u32 addr)
|
|||
}
|
||||
}
|
||||
|
||||
im = (struct ip_mc_list *)kmalloc(sizeof(*im), GFP_KERNEL);
|
||||
im = kmalloc(sizeof(*im), GFP_KERNEL);
|
||||
if (!im)
|
||||
goto out;
|
||||
|
||||
|
@ -1476,7 +1476,7 @@ static int ip_mc_add1_src(struct ip_mc_list *pmc, int sfmode,
|
|||
psf_prev = psf;
|
||||
}
|
||||
if (!psf) {
|
||||
psf = (struct ip_sf_list *)kmalloc(sizeof(*psf), GFP_ATOMIC);
|
||||
psf = kmalloc(sizeof(*psf), GFP_ATOMIC);
|
||||
if (!psf)
|
||||
return -ENOBUFS;
|
||||
memset(psf, 0, sizeof(*psf));
|
||||
|
@ -1659,7 +1659,7 @@ int ip_mc_join_group(struct sock *sk , struct ip_mreqn *imr)
|
|||
err = -ENOBUFS;
|
||||
if (count >= sysctl_igmp_max_memberships)
|
||||
goto done;
|
||||
iml = (struct ip_mc_socklist *)sock_kmalloc(sk,sizeof(*iml),GFP_KERNEL);
|
||||
iml = sock_kmalloc(sk,sizeof(*iml),GFP_KERNEL);
|
||||
if (iml == NULL)
|
||||
goto done;
|
||||
|
||||
|
@ -1823,8 +1823,7 @@ int ip_mc_source(int add, int omode, struct sock *sk, struct
|
|||
|
||||
if (psl)
|
||||
count += psl->sl_max;
|
||||
newpsl = (struct ip_sf_socklist *)sock_kmalloc(sk,
|
||||
IP_SFLSIZE(count), GFP_KERNEL);
|
||||
newpsl = sock_kmalloc(sk, IP_SFLSIZE(count), GFP_KERNEL);
|
||||
if (!newpsl) {
|
||||
err = -ENOBUFS;
|
||||
goto done;
|
||||
|
@ -1907,8 +1906,8 @@ int ip_mc_msfilter(struct sock *sk, struct ip_msfilter *msf, int ifindex)
|
|||
goto done;
|
||||
}
|
||||
if (msf->imsf_numsrc) {
|
||||
newpsl = (struct ip_sf_socklist *)sock_kmalloc(sk,
|
||||
IP_SFLSIZE(msf->imsf_numsrc), GFP_KERNEL);
|
||||
newpsl = sock_kmalloc(sk, IP_SFLSIZE(msf->imsf_numsrc),
|
||||
GFP_KERNEL);
|
||||
if (!newpsl) {
|
||||
err = -ENOBUFS;
|
||||
goto done;
|
||||
|
|
|
@ -621,7 +621,7 @@ int ip_setsockopt(struct sock *sk, int level, int optname, char __user *optval,
|
|||
err = -ENOBUFS;
|
||||
break;
|
||||
}
|
||||
msf = (struct ip_msfilter *)kmalloc(optlen, GFP_KERNEL);
|
||||
msf = kmalloc(optlen, GFP_KERNEL);
|
||||
if (msf == 0) {
|
||||
err = -ENOBUFS;
|
||||
break;
|
||||
|
@ -778,7 +778,7 @@ int ip_setsockopt(struct sock *sk, int level, int optname, char __user *optval,
|
|||
err = -ENOBUFS;
|
||||
break;
|
||||
}
|
||||
gsf = (struct group_filter *)kmalloc(optlen,GFP_KERNEL);
|
||||
gsf = kmalloc(optlen,GFP_KERNEL);
|
||||
if (gsf == 0) {
|
||||
err = -ENOBUFS;
|
||||
break;
|
||||
|
@ -798,7 +798,7 @@ int ip_setsockopt(struct sock *sk, int level, int optname, char __user *optval,
|
|||
goto mc_msf_out;
|
||||
}
|
||||
msize = IP_MSFILTER_SIZE(gsf->gf_numsrc);
|
||||
msf = (struct ip_msfilter *)kmalloc(msize,GFP_KERNEL);
|
||||
msf = kmalloc(msize,GFP_KERNEL);
|
||||
if (msf == 0) {
|
||||
err = -ENOBUFS;
|
||||
goto mc_msf_out;
|
||||
|
|
|
@ -549,7 +549,7 @@ int ipv6_setsockopt(struct sock *sk, int level, int optname,
|
|||
retv = -ENOBUFS;
|
||||
break;
|
||||
}
|
||||
gsf = (struct group_filter *)kmalloc(optlen,GFP_KERNEL);
|
||||
gsf = kmalloc(optlen,GFP_KERNEL);
|
||||
if (gsf == 0) {
|
||||
retv = -ENOBUFS;
|
||||
break;
|
||||
|
|
|
@ -449,8 +449,7 @@ int ip6_mc_source(int add, int omode, struct sock *sk,
|
|||
|
||||
if (psl)
|
||||
count += psl->sl_max;
|
||||
newpsl = (struct ip6_sf_socklist *)sock_kmalloc(sk,
|
||||
IP6_SFLSIZE(count), GFP_ATOMIC);
|
||||
newpsl = sock_kmalloc(sk, IP6_SFLSIZE(count), GFP_ATOMIC);
|
||||
if (!newpsl) {
|
||||
err = -ENOBUFS;
|
||||
goto done;
|
||||
|
@ -535,8 +534,8 @@ int ip6_mc_msfilter(struct sock *sk, struct group_filter *gsf)
|
|||
goto done;
|
||||
}
|
||||
if (gsf->gf_numsrc) {
|
||||
newpsl = (struct ip6_sf_socklist *)sock_kmalloc(sk,
|
||||
IP6_SFLSIZE(gsf->gf_numsrc), GFP_ATOMIC);
|
||||
newpsl = sock_kmalloc(sk, IP6_SFLSIZE(gsf->gf_numsrc),
|
||||
GFP_ATOMIC);
|
||||
if (!newpsl) {
|
||||
err = -ENOBUFS;
|
||||
goto done;
|
||||
|
@ -768,7 +767,7 @@ static void mld_add_delrec(struct inet6_dev *idev, struct ifmcaddr6 *im)
|
|||
* for deleted items allows change reports to use common code with
|
||||
* non-deleted or query-response MCA's.
|
||||
*/
|
||||
pmc = (struct ifmcaddr6 *)kmalloc(sizeof(*pmc), GFP_ATOMIC);
|
||||
pmc = kmalloc(sizeof(*pmc), GFP_ATOMIC);
|
||||
if (!pmc)
|
||||
return;
|
||||
memset(pmc, 0, sizeof(*pmc));
|
||||
|
@ -1937,7 +1936,7 @@ static int ip6_mc_add1_src(struct ifmcaddr6 *pmc, int sfmode,
|
|||
psf_prev = psf;
|
||||
}
|
||||
if (!psf) {
|
||||
psf = (struct ip6_sf_list *)kmalloc(sizeof(*psf), GFP_ATOMIC);
|
||||
psf = kmalloc(sizeof(*psf), GFP_ATOMIC);
|
||||
if (!psf)
|
||||
return -ENOBUFS;
|
||||
memset(psf, 0, sizeof(*psf));
|
||||
|
|
|
@ -82,8 +82,7 @@ struct ias_object *irias_new_object( char *name, int id)
|
|||
|
||||
IRDA_DEBUG( 4, "%s()\n", __FUNCTION__);
|
||||
|
||||
obj = (struct ias_object *) kmalloc(sizeof(struct ias_object),
|
||||
GFP_ATOMIC);
|
||||
obj = kmalloc(sizeof(struct ias_object), GFP_ATOMIC);
|
||||
if (obj == NULL) {
|
||||
IRDA_WARNING("%s(), Unable to allocate object!\n",
|
||||
__FUNCTION__);
|
||||
|
@ -348,8 +347,7 @@ void irias_add_integer_attrib(struct ias_object *obj, char *name, int value,
|
|||
IRDA_ASSERT(obj->magic == IAS_OBJECT_MAGIC, return;);
|
||||
IRDA_ASSERT(name != NULL, return;);
|
||||
|
||||
attrib = (struct ias_attrib *) kmalloc(sizeof(struct ias_attrib),
|
||||
GFP_ATOMIC);
|
||||
attrib = kmalloc(sizeof(struct ias_attrib), GFP_ATOMIC);
|
||||
if (attrib == NULL) {
|
||||
IRDA_WARNING("%s: Unable to allocate attribute!\n",
|
||||
__FUNCTION__);
|
||||
|
@ -385,8 +383,7 @@ void irias_add_octseq_attrib(struct ias_object *obj, char *name, __u8 *octets,
|
|||
IRDA_ASSERT(name != NULL, return;);
|
||||
IRDA_ASSERT(octets != NULL, return;);
|
||||
|
||||
attrib = (struct ias_attrib *) kmalloc(sizeof(struct ias_attrib),
|
||||
GFP_ATOMIC);
|
||||
attrib = kmalloc(sizeof(struct ias_attrib), GFP_ATOMIC);
|
||||
if (attrib == NULL) {
|
||||
IRDA_WARNING("%s: Unable to allocate attribute!\n",
|
||||
__FUNCTION__);
|
||||
|
@ -420,8 +417,7 @@ void irias_add_string_attrib(struct ias_object *obj, char *name, char *value,
|
|||
IRDA_ASSERT(name != NULL, return;);
|
||||
IRDA_ASSERT(value != NULL, return;);
|
||||
|
||||
attrib = (struct ias_attrib *) kmalloc(sizeof( struct ias_attrib),
|
||||
GFP_ATOMIC);
|
||||
attrib = kmalloc(sizeof( struct ias_attrib), GFP_ATOMIC);
|
||||
if (attrib == NULL) {
|
||||
IRDA_WARNING("%s: Unable to allocate attribute!\n",
|
||||
__FUNCTION__);
|
||||
|
|
|
@ -1237,7 +1237,7 @@ static int packet_mc_add(struct sock *sk, struct packet_mreq_max *mreq)
|
|||
goto done;
|
||||
|
||||
err = -ENOBUFS;
|
||||
i = (struct packet_mclist *)kmalloc(sizeof(*i), GFP_KERNEL);
|
||||
i = kmalloc(sizeof(*i), GFP_KERNEL);
|
||||
if (i == NULL)
|
||||
goto done;
|
||||
|
||||
|
|
|
@ -1287,7 +1287,7 @@ static sctp_cookie_param_t *sctp_pack_cookie(const struct sctp_endpoint *ep,
|
|||
- (bodysize % SCTP_COOKIE_MULTIPLE);
|
||||
*cookie_len = headersize + bodysize;
|
||||
|
||||
retval = (sctp_cookie_param_t *)kmalloc(*cookie_len, GFP_ATOMIC);
|
||||
retval = kmalloc(*cookie_len, GFP_ATOMIC);
|
||||
|
||||
if (!retval) {
|
||||
*cookie_len = 0;
|
||||
|
|
|
@ -860,7 +860,7 @@ SCTP_STATIC int sctp_setsockopt_bindx(struct sock* sk,
|
|||
return -EFAULT;
|
||||
|
||||
/* Alloc space for the address array in kernel memory. */
|
||||
kaddrs = (struct sockaddr *)kmalloc(addrs_size, GFP_KERNEL);
|
||||
kaddrs = kmalloc(addrs_size, GFP_KERNEL);
|
||||
if (unlikely(!kaddrs))
|
||||
return -ENOMEM;
|
||||
|
||||
|
@ -1150,7 +1150,7 @@ SCTP_STATIC int sctp_setsockopt_connectx(struct sock* sk,
|
|||
return -EFAULT;
|
||||
|
||||
/* Alloc space for the address array in kernel memory. */
|
||||
kaddrs = (struct sockaddr *)kmalloc(addrs_size, GFP_KERNEL);
|
||||
kaddrs = kmalloc(addrs_size, GFP_KERNEL);
|
||||
if (unlikely(!kaddrs))
|
||||
return -ENOMEM;
|
||||
|
||||
|
|
|
@ -993,7 +993,7 @@ static int sock_fasync(int fd, struct file *filp, int on)
|
|||
|
||||
if (on)
|
||||
{
|
||||
fna=(struct fasync_struct *)kmalloc(sizeof(struct fasync_struct), GFP_KERNEL);
|
||||
fna = kmalloc(sizeof(struct fasync_struct), GFP_KERNEL);
|
||||
if(fna==NULL)
|
||||
return -ENOMEM;
|
||||
}
|
||||
|
|
|
@ -94,7 +94,7 @@ rpcauth_init_credcache(struct rpc_auth *auth, unsigned long expire)
|
|||
struct rpc_cred_cache *new;
|
||||
int i;
|
||||
|
||||
new = (struct rpc_cred_cache *)kmalloc(sizeof(*new), GFP_KERNEL);
|
||||
new = kmalloc(sizeof(*new), GFP_KERNEL);
|
||||
if (!new)
|
||||
return -ENOMEM;
|
||||
for (i = 0; i < RPC_CREDCACHE_NR; i++)
|
||||
|
|
|
@ -70,7 +70,7 @@ unx_create_cred(struct rpc_auth *auth, struct auth_cred *acred, int flags)
|
|||
dprintk("RPC: allocating UNIX cred for uid %d gid %d\n",
|
||||
acred->uid, acred->gid);
|
||||
|
||||
if (!(cred = (struct unx_cred *) kmalloc(sizeof(*cred), GFP_KERNEL)))
|
||||
if (!(cred = kmalloc(sizeof(*cred), GFP_KERNEL)))
|
||||
return ERR_PTR(-ENOMEM);
|
||||
|
||||
atomic_set(&cred->uc_count, 1);
|
||||
|
|
|
@ -118,7 +118,7 @@ rpc_new_client(struct rpc_xprt *xprt, char *servname,
|
|||
goto out_err;
|
||||
|
||||
err = -ENOMEM;
|
||||
clnt = (struct rpc_clnt *) kmalloc(sizeof(*clnt), GFP_KERNEL);
|
||||
clnt = kmalloc(sizeof(*clnt), GFP_KERNEL);
|
||||
if (!clnt)
|
||||
goto out_err;
|
||||
memset(clnt, 0, sizeof(*clnt));
|
||||
|
@ -225,7 +225,7 @@ rpc_clone_client(struct rpc_clnt *clnt)
|
|||
{
|
||||
struct rpc_clnt *new;
|
||||
|
||||
new = (struct rpc_clnt *)kmalloc(sizeof(*new), GFP_KERNEL);
|
||||
new = kmalloc(sizeof(*new), GFP_KERNEL);
|
||||
if (!new)
|
||||
goto out_no_clnt;
|
||||
memcpy(new, clnt, sizeof(*new));
|
||||
|
|
|
@ -32,7 +32,7 @@ svc_create(struct svc_program *prog, unsigned int bufsize)
|
|||
int vers;
|
||||
unsigned int xdrsize;
|
||||
|
||||
if (!(serv = (struct svc_serv *) kmalloc(sizeof(*serv), GFP_KERNEL)))
|
||||
if (!(serv = kmalloc(sizeof(*serv), GFP_KERNEL)))
|
||||
return NULL;
|
||||
memset(serv, 0, sizeof(*serv));
|
||||
serv->sv_name = prog->pg_name;
|
||||
|
|
Loading…
Reference in New Issue
Block a user