Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1041751imm; Fri, 5 Oct 2018 17:06:12 -0700 (PDT) X-Google-Smtp-Source: ACcGV63SlTH3jGnyNW42GTLmDBRFZdw9UKVSnXvisfsygTlxcgaTWjBUIkrtJqP6wT86jZPwxm2E X-Received: by 2002:a63:954a:: with SMTP id t10-v6mr11945853pgn.432.1538784372524; Fri, 05 Oct 2018 17:06:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1538784372; cv=none; d=google.com; s=arc-20160816; b=eLPAJLhkENz369IJxJOoJYBSx6LOoCO92GtfJYfs+SiYd9QGn0f8X5gYCvjPfVGnRz xIyqP8lIY2vGhl75K+kYgKIZ7FOwWfcEi44jhTcowmc81LBhbouSr89DGZlJ9NemzjX+ Rq5D2aHnWl2Nm5giGw7ajzAu+CT0e70yk82h9pycRXxugISS+JK/V/ze5q49eiotHl/X Ul1+OjkLP4s6F4dS7AjAeLdM63NUQXFJE5WFdQR+Av/m6PIDtkmJlabVsogpgXXDPvMe MLlhthCwqkGHuVq58eGBs46MDYuJ6y6Ec42i6wsr/kOcFfyFJ/nFPk1EVZBwuxMdpwMW 44mg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature; bh=HMSE6orMcmHkT2mznbA9dUcPMyTPZXa48sNNzlO0+58=; b=EsIdnGgJtmALYjyIQgO2JkhQkWXkGjaQg9JALVP/Uoch8i91mwIa5vgiN7iXz7/xfk iyzNGEjp+CLcIYv5/6cc5c7R44YQzy04F1K9EFRiCY9+MHJzKtFb9m8UipEMAeUR8GS1 PgXqVHeaWSflb148hrHXl4exetL08t1NqUI3O4H0/0rUBCtPkuutJhiDoHr9/hAhwimk jMci7iU9FN48WpjuZtWLU1ut1lpG2nTHJ0b7TW7MKK+g2clgTEIEBbBVBsHiTK1xRrw+ zKqIgvF3883uW9A4ArDLShzD7TaC9q+fYR/dIgQ1/97WrMWFOyfz1Wdy0PDmQ3yKs51o vzeQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=i6Nwshzg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i23-v6si9228702pgl.230.2018.10.05.17.05.56; Fri, 05 Oct 2018 17:06:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=i6Nwshzg; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729325AbeJFHFY (ORCPT + 99 others); Sat, 6 Oct 2018 03:05:24 -0400 Received: from mail-yw1-f65.google.com ([209.85.161.65]:46790 "EHLO mail-yw1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726399AbeJFHFY (ORCPT ); Sat, 6 Oct 2018 03:05:24 -0400 Received: by mail-yw1-f65.google.com with SMTP id j202-v6so5943815ywa.13 for ; Fri, 05 Oct 2018 17:04:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=HMSE6orMcmHkT2mznbA9dUcPMyTPZXa48sNNzlO0+58=; b=i6NwshzgwU7p1ZMqUx8Mnrhvq3vm/KFXIziIcg/g8tznm15ZVMSOSKMw/nw7vEssYL FXH1EGJLgaouLa343tOvGmuWEYMti54aSRyecqv0DUYI/nz2afw3jokrHJE0LMH2kLBR Gb5MmByCKOwD6AnYMhNU4+V7gYUJeDh2GI7l8= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=HMSE6orMcmHkT2mznbA9dUcPMyTPZXa48sNNzlO0+58=; b=kjVfQOjVQLErHod86K3sAPaBVzNKfFMfK21ACCsei+rVvJPGTx7EZwqCG4Q4DXPjz4 VWO4fKintnzUf7pBb0zHUGYpCGrUdGpOELT9QriL4zKlGoQoTTFCUrcjvi2mn3UfTDp3 8qhxfoXl1v4uHNAIAoEQnfZ1/N4y949t507BASHVsEVPlheWDIDTgYlGS74XpXCFgIay TV4MILRMqRnRGiKKlohLfkdfsscE5mPi1pQTA6VtP/mqob7G4Uol2S41UUzyRkys0+Dd JhItaVjzdGXbEJybPZIg1oEoQsuf579fJ49XjsSbNBPPRhteJUULl8TpvaKgdC14XWzD /5sw== X-Gm-Message-State: ABuFfoiEmAfXQjLYYtXEsXLjSP/hZGjAbQ245XGZVOvFM8LjpOYJiT17 y9+FOZwDXJafLluBwLJxip6sMUzU0AE= X-Received: by 2002:a0d:f0c1:: with SMTP id z184-v6mr7671962ywe.479.1538784259682; Fri, 05 Oct 2018 17:04:19 -0700 (PDT) Received: from mail-yw1-f51.google.com (mail-yw1-f51.google.com. [209.85.161.51]) by smtp.gmail.com with ESMTPSA id l30-v6sm8188026ywa.104.2018.10.05.17.04.18 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 05 Oct 2018 17:04:18 -0700 (PDT) Received: by mail-yw1-f51.google.com with SMTP id y76-v6so5963577ywd.2 for ; Fri, 05 Oct 2018 17:04:18 -0700 (PDT) X-Received: by 2002:a0d:cd84:: with SMTP id p126-v6mr7956103ywd.288.1538784257867; Fri, 05 Oct 2018 17:04:17 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a25:d116:0:0:0:0:0 with HTTP; Fri, 5 Oct 2018 17:04:16 -0700 (PDT) In-Reply-To: <20181005235131.GA27193@kroah.com> References: <20181005233559.GA37919@beast> <20181005235131.GA27193@kroah.com> From: Kees Cook Date: Fri, 5 Oct 2018 17:04:16 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v4.19-rc7] treewide: Replace more open-coded allocation size multiplications To: Greg KH Cc: LKML Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Oct 5, 2018 at 4:51 PM, Greg KH wrote: > On Fri, Oct 05, 2018 at 04:35:59PM -0700, Kees Cook wrote: >> As done treewide earlier, this catches several more open-coded >> allocation size calculations that were added to the kernel during the >> merge window. This performs the following mechanical transformations >> using Coccinelle: >> >> kvmalloc(a * b, ...) -> kvmalloc_array(a, b, ...) >> kvzalloc(a * b, ...) -> kvcalloc(a, b, ...) >> devm_kzalloc(..., a * b, ...) -> devm_kcalloc(..., a, b, ...) >> >> Signed-off-by: Kees Cook > > Has this had any testing in linux-next? No; they're mechanical transformations (though I did build test them). If you want I could add this to linux-next for a week? > And when was "earlier"? v4.18, when all of these were originally eliminated: 026f05079b00 treewide: Use array_size() in f2fs_kzalloc() c86065938aab treewide: Use array_size() in f2fs_kmalloc() 76e43e37a407 treewide: Use array_size() in sock_kmalloc() 84ca176bf54a treewide: Use array_size() in kvzalloc_node() fd7becedb1f0 treewide: Use array_size() in vzalloc_node() fad953ce0b22 treewide: Use array_size() in vzalloc() 42bc47b35320 treewide: Use array_size() in vmalloc() a86854d0c599 treewide: devm_kzalloc() -> devm_kcalloc() 3c4211ba8ad8 treewide: devm_kmalloc() -> devm_kmalloc_array() 778e1cdd81bb treewide: kvzalloc() -> kvcalloc() 344476e16acb treewide: kvmalloc() -> kvmalloc_array() 590b5b7d8671 treewide: kzalloc_node() -> kcalloc_node() 6396bb221514 treewide: kzalloc() -> kcalloc() 6da2ec56059c treewide: kmalloc() -> kmalloc_array() The new patch is catching new open-coded multiplications introduced in v4.19. -Kees -- Kees Cook Pixel Security