Received: by 10.192.165.148 with SMTP id m20csp1181160imm; Wed, 2 May 2018 15:56:14 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoRsd1YN/jPALMtUef0tahTFw1qEsNjfCkaNQMdSOWGCs1UR3bqfx2qb2OmPBjNVsQi2yeJ X-Received: by 2002:a17:902:aa90:: with SMTP id d16-v6mr21735605plr.189.1525301774611; Wed, 02 May 2018 15:56:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525301774; cv=none; d=google.com; s=arc-20160816; b=huOZAVImhdGvcIhf7N4mcNgKaaCStx2FtSaLD+1NuQ67DnEpPylAySlADtju1EqdGY k0FIw6Inn11vZYWg2YlST52z3H3RJ+sjE1klJdUMI6MstKG8FfiHXThOcodtOIpCRbo3 HmPBbSsj2IToBL9MiH9foRz9LthjO4IkaXtmRUGMEr4kHpqyXZzclnXFlUYXQJOhAPBN PUjpxVmHU5HYkM0XL17m8JHfndMHvemsD70RjO3PWbQxCeA+1ymu2b+/K1yjSPncv8/e xFCYmM+wS/GWfjLnivUxHobmWkz86KwEpvmhjnc5HYBzoLXZQ8CXUXL3A/g+e9ioE2TU N/3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition:mime-version :message-id:subject:cc:to:from:date:dkim-signature :arc-authentication-results; bh=+MIrHLa2R+IEtpgmg0S/zDhtXsyGW1JGyfsWADZRbqw=; b=WDdbqtdVPjXa5P+/TyOeVtDM5TYe5SXgSva0BLy2tZ6sitM576eLMBQ59FWlUxEjth S/eH98G/Rk5HUOsmQRDWi3GqNJNo0x37eEd9WgP59muDvzz60Ntj843U2UDE7QyKDgSt kWlHkksvRxGQY2+d9gJcCg7ezDhZpx+RZScfyfhRYQwMvoAGX/7t5UI/URULi3fDYL4M E+RrnVfI3b31oQd7b963ZSmtx3i02GzHfdsH5J4vdfSJfjqMBFsvAWlzW6I+sAALCGnU 7r9qkdo059t62txoVDkXjx93E8PaE8ju47ai1caxznlP/BMCgv1lAdgD06tpfVMqroNv D9Fw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=CeiS5dB4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h2-v6si11941754plr.320.2018.05.02.15.56.00; Wed, 02 May 2018 15:56:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=CeiS5dB4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751643AbeEBWzv (ORCPT + 99 others); Wed, 2 May 2018 18:55:51 -0400 Received: from mail-pf0-f196.google.com ([209.85.192.196]:46015 "EHLO mail-pf0-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751045AbeEBWzs (ORCPT ); Wed, 2 May 2018 18:55:48 -0400 Received: by mail-pf0-f196.google.com with SMTP id c10so13023260pfi.12 for ; Wed, 02 May 2018 15:55:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=date:from:to:cc:subject:message-id:mime-version:content-disposition; bh=+MIrHLa2R+IEtpgmg0S/zDhtXsyGW1JGyfsWADZRbqw=; b=CeiS5dB4YVl+U3NdbEHEYuywPibNXtYUVQlReyNM2nER0TrQp5tMrUX5ljAn8PPGWd Kt0nMpXwit14JoB4yrh1UNYPhd0MK8MAcc6ZIMScvBdRQgnhlMykPp31lVV56f2x9vQP eU9y69s86QM4wVI9w2Wy4En31wZM8uhorZF70= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:mime-version :content-disposition; bh=+MIrHLa2R+IEtpgmg0S/zDhtXsyGW1JGyfsWADZRbqw=; b=jqjF97sIZDGCC26HFzcdUVdb+O+vbTr7w62Hhss33JRPq1SouZ1ytqdcHj+w5qPYDq zzUVeKBgYiNjLD+R1YnDpj/Tilva/HcPmghQKjmkSUSSG8wioKDGmLevzmLtx6ssUu5k 2WdpCNwElvaHxu/E1NkMHwdvuXJhfgq33rQiFDRgGNSH9PaYMdNsfG/S0JYsQunhzfrN t5II/vyO2+9sl58f81aPWPyU71JDF/uTUuKyF725jusW9Va3f4N6DlkQUd5sv0XuPy55 kAZSCTEKXR3ALxIFPjPrqFJ/b3z4CqyxBug/z5u23x7xyQUPrXeayFXjnWsRdbYmSY14 BeCg== X-Gm-Message-State: ALQs6tDFw9mS1iu6SdqXH4wu8y26064eGHNPsv/KC0yV0wPEHMfhEpz1 +dGjvA0fP810IPb2z4lEEek2Fw== X-Received: by 2002:a17:902:aa95:: with SMTP id d21-v6mr20585524plr.73.1525301748191; Wed, 02 May 2018 15:55:48 -0700 (PDT) Received: from www.outflux.net (173-164-112-133-Oregon.hfc.comcastbusiness.net. [173.164.112.133]) by smtp.gmail.com with ESMTPSA id l19-v6sm19605692pgn.44.2018.05.02.15.55.46 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 02 May 2018 15:55:46 -0700 (PDT) Date: Wed, 2 May 2018 15:55:45 -0700 From: Kees Cook To: "Martin K. Petersen" Cc: Boaz Harrosh , "James E.J. Bottomley" , linux-scsi@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] scsi: libosd: Remove VLA usage Message-ID: <20180502225545.GA45533@beast> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On the quest to remove all VLAs from the kernel[1] this rearranges the code to avoid a VLA warning under -Wvla (gcc doesn't recognize "const" variables as not triggering VLA creation). Additionally cleans up variable naming to avoid 80 character column limit. [1] https://lkml.kernel.org/r/CA+55aFzCG-zNmZwX4A2FQpadafLfEzK6CC=qPXydAacU1RqZWA@mail.gmail.com Signed-off-by: Kees Cook --- drivers/scsi/osd/osd_initiator.c | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/drivers/scsi/osd/osd_initiator.c b/drivers/scsi/osd/osd_initiator.c index e18877177f1b..917a86a2ae8c 100644 --- a/drivers/scsi/osd/osd_initiator.c +++ b/drivers/scsi/osd/osd_initiator.c @@ -1842,14 +1842,14 @@ int osd_req_decode_sense_full(struct osd_request *or, case osd_sense_response_integrity_check: { struct osd_sense_response_integrity_check_descriptor - *osricd = cur_descriptor; - const unsigned len = - sizeof(osricd->integrity_check_value); - char key_dump[len*4 + 2]; /* 2nibbles+space+ASCII */ - - hex_dump_to_buffer(osricd->integrity_check_value, len, - 32, 1, key_dump, sizeof(key_dump), true); - OSD_SENSE_PRINT2("response_integrity [%s]\n", key_dump); + *d = cur_descriptor; + /* 2nibbles+space+ASCII */ + char dump[sizeof(d->integrity_check_value) * 4 + 2]; + + hex_dump_to_buffer(d->integrity_check_value, + sizeof(d->integrity_check_value), + 32, 1, dump, sizeof(dump), true); + OSD_SENSE_PRINT2("response_integrity [%s]\n", dump); } case osd_sense_attribute_identification: { -- 2.17.0 -- Kees Cook Pixel Security