@@ -151,7 +151,7 @@ static int calc_ntlmv2_hash(struct ksmbd_conn *conn, struct ksmbd_session *sess,
151151
152152 /* convert user_name to unicode */
153153 len = strlen (user_name (sess -> user ));
154- uniname = kzalloc (2 + UNICODE_LEN (len ), GFP_KERNEL );
154+ uniname = kzalloc (2 + UNICODE_LEN (len ), KSMBD_DEFAULT_GFP );
155155 if (!uniname ) {
156156 ret = - ENOMEM ;
157157 goto out ;
@@ -175,7 +175,7 @@ static int calc_ntlmv2_hash(struct ksmbd_conn *conn, struct ksmbd_session *sess,
175175
176176 /* Convert domain name or conn name to unicode and uppercase */
177177 len = strlen (dname );
178- domain = kzalloc (2 + UNICODE_LEN (len ), GFP_KERNEL );
178+ domain = kzalloc (2 + UNICODE_LEN (len ), KSMBD_DEFAULT_GFP );
179179 if (!domain ) {
180180 ret = - ENOMEM ;
181181 goto out ;
@@ -254,7 +254,7 @@ int ksmbd_auth_ntlmv2(struct ksmbd_conn *conn, struct ksmbd_session *sess,
254254 }
255255
256256 len = CIFS_CRYPTO_KEY_SIZE + blen ;
257- construct = kzalloc (len , GFP_KERNEL );
257+ construct = kzalloc (len , KSMBD_DEFAULT_GFP );
258258 if (!construct ) {
259259 rc = - ENOMEM ;
260260 goto out ;
@@ -361,7 +361,7 @@ int ksmbd_decode_ntlmssp_auth_blob(struct authenticate_message *authblob,
361361 if (sess_key_len > CIFS_KEY_SIZE )
362362 return - EINVAL ;
363363
364- ctx_arc4 = kmalloc (sizeof (* ctx_arc4 ), GFP_KERNEL );
364+ ctx_arc4 = kmalloc (sizeof (* ctx_arc4 ), KSMBD_DEFAULT_GFP );
365365 if (!ctx_arc4 )
366366 return - ENOMEM ;
367367
@@ -451,7 +451,7 @@ ksmbd_build_ntlmssp_challenge_blob(struct challenge_message *chgblob,
451451
452452 chgblob -> NegotiateFlags = cpu_to_le32 (flags );
453453 len = strlen (ksmbd_netbios_name ());
454- name = kmalloc (2 + UNICODE_LEN (len ), GFP_KERNEL );
454+ name = kmalloc (2 + UNICODE_LEN (len ), KSMBD_DEFAULT_GFP );
455455 if (!name )
456456 return - ENOMEM ;
457457
@@ -1043,7 +1043,7 @@ static struct scatterlist *ksmbd_init_sg(struct kvec *iov, unsigned int nvec,
10431043 if (!nvec )
10441044 return NULL ;
10451045
1046- nr_entries = kcalloc (nvec , sizeof (int ), GFP_KERNEL );
1046+ nr_entries = kcalloc (nvec , sizeof (int ), KSMBD_DEFAULT_GFP );
10471047 if (!nr_entries )
10481048 return NULL ;
10491049
@@ -1063,7 +1063,8 @@ static struct scatterlist *ksmbd_init_sg(struct kvec *iov, unsigned int nvec,
10631063 /* Add two entries for transform header and signature */
10641064 total_entries += 2 ;
10651065
1066- sg = kmalloc_array (total_entries , sizeof (struct scatterlist ), GFP_KERNEL );
1066+ sg = kmalloc_array (total_entries , sizeof (struct scatterlist ),
1067+ KSMBD_DEFAULT_GFP );
10671068 if (!sg ) {
10681069 kfree (nr_entries );
10691070 return NULL ;
@@ -1163,7 +1164,7 @@ int ksmbd_crypt_message(struct ksmbd_work *work, struct kvec *iov,
11631164 goto free_ctx ;
11641165 }
11651166
1166- req = aead_request_alloc (tfm , GFP_KERNEL );
1167+ req = aead_request_alloc (tfm , KSMBD_DEFAULT_GFP );
11671168 if (!req ) {
11681169 rc = - ENOMEM ;
11691170 goto free_ctx ;
@@ -1182,7 +1183,7 @@ int ksmbd_crypt_message(struct ksmbd_work *work, struct kvec *iov,
11821183 }
11831184
11841185 iv_len = crypto_aead_ivsize (tfm );
1185- iv = kzalloc (iv_len , GFP_KERNEL );
1186+ iv = kzalloc (iv_len , KSMBD_DEFAULT_GFP );
11861187 if (!iv ) {
11871188 rc = - ENOMEM ;
11881189 goto free_sg ;
0 commit comments