From nobody Sun Feb 8 08:08:09 2026 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CDAC438DE1 for ; Mon, 12 Feb 2024 11:22:36 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707736956; cv=none; b=ciE7GevXyaGfdfv0bubCdmuz6514QIXzmdOiGrNFQl67CRqYI2MnIJth7HJarDXi0Z38qroZus6SzDDfXp0bp4racWwfUOwWArern1+bum8yf57EULXW6VgElU5UtizGNdDEXacApw01en4KycEd5jwWDvnJ2JqeAgenaok85Go= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707736956; c=relaxed/simple; bh=4C5nZGco26sonFA2eNFl58Z2ow6XP0jrBTogGeyvF7M=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=pCem9RjHWqILqkinwLResYyiLigh2tQkaxKj7PYLQn0dHXwAFNuvFOzjkkg/UUeq94I5/Zw8YicD19SHUv4DUMuuOoBKLkHEr3Hw1pX2hab98YqsDuhYN6mPcAepMGMfQP4aCPtHqMfQ2sczTXTfN41swTg6zYso5ol4I4qWk4I= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=CygLBY8X; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="CygLBY8X" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 81EFDC433C7; Mon, 12 Feb 2024 11:22:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1707736956; bh=4C5nZGco26sonFA2eNFl58Z2ow6XP0jrBTogGeyvF7M=; h=From:To:Cc:Subject:Date:From; b=CygLBY8XhV8HOEbO2Yhqk49rWMjOa8t2XLVwB952Zz4Bn5kxp5qwPCPwj6HZhry+M ONK37SaoxMjxxOqj6C4rHrZzvJp/ArzDLuID/k7Ii2qYxHlnmZ7Y022pDFbWlcEq2i xaYEp2k8aUx4AkjEA4ekWKpu+lqThQHgBVjee8XR4SI3IJVazSwqTit59Mhqt60bs7 ZqpVppMJxzsAiodFBPS9eJ3C+3oDXxa/00VxMMGxnPpkfVU9t7QfG7XwQUR0JmP9Jx rDGkdxt3oHqtyzYakpPU2f085hoUlMnvvb3VDUNrmjscFJAe4gkI+/yMqEj0h+mfb+ 6xwEdiygBPvKg== From: Arnd Bergmann To: Karol Herbst , Lyude Paul , Danilo Krummrich , David Airlie , Daniel Vetter , "Gustavo A. R. Silva" , Kees Cook Cc: Arnd Bergmann , Dave Airlie , Jani Nikula , dri-devel@lists.freedesktop.org, nouveau@lists.freedesktop.org, linux-kernel@vger.kernel.org Subject: [PATCH] nouveau/svm: fix kvcalloc() argument order Date: Mon, 12 Feb 2024 12:22:17 +0100 Message-Id: <20240212112230.1117284-1-arnd@kernel.org> X-Mailer: git-send-email 2.39.2 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Arnd Bergmann The conversion to kvcalloc() mixed up the object size and count arguments, causing a warning: drivers/gpu/drm/nouveau/nouveau_svm.c: In function 'nouveau_svm_fault_buffe= r_ctor': drivers/gpu/drm/nouveau/nouveau_svm.c:1010:40: error: 'kvcalloc' sizes spec= ified with 'sizeof' in the earlier argument and not in the later argument [= -Werror=3Dcalloc-transposed-args] 1010 | buffer->fault =3D kvcalloc(sizeof(*buffer->fault), buffer->= entries, GFP_KERNEL); | ^ drivers/gpu/drm/nouveau/nouveau_svm.c:1010:40: note: earlier argument shoul= d specify number of elements, later size of each element The behavior is still correct aside from the warning, but fixing it avoids the warnings and can help the compiler track the individual objects better. Fixes: 71e4bbca070e ("nouveau/svm: Use kvcalloc() instead of kvzalloc()") Signed-off-by: Arnd Bergmann --- drivers/gpu/drm/nouveau/nouveau_svm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/gpu/drm/nouveau/nouveau_svm.c b/drivers/gpu/drm/nouvea= u/nouveau_svm.c index 4d1008915499..b4da82ddbb6b 100644 --- a/drivers/gpu/drm/nouveau/nouveau_svm.c +++ b/drivers/gpu/drm/nouveau/nouveau_svm.c @@ -1007,7 +1007,7 @@ nouveau_svm_fault_buffer_ctor(struct nouveau_svm *svm= , s32 oclass, int id) if (ret) return ret; =20 - buffer->fault =3D kvcalloc(sizeof(*buffer->fault), buffer->entries, GFP_K= ERNEL); + buffer->fault =3D kvcalloc(buffer->entries, sizeof(*buffer->fault), GFP_K= ERNEL); if (!buffer->fault) return -ENOMEM; =20 --=20 2.39.2