Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp2748925ybh; Mon, 5 Aug 2019 06:15:07 -0700 (PDT) X-Google-Smtp-Source: APXvYqx+SjgbQVs89Vyr0NfCkm/M+VHXKEFL8EySdKU6iHuAxNTU/98J7OXxK9JIck+rtss0sCIh X-Received: by 2002:a17:90a:cb15:: with SMTP id z21mr18413939pjt.87.1565010907231; Mon, 05 Aug 2019 06:15:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565010907; cv=none; d=google.com; s=arc-20160816; b=XSzuivJ58GGXBkU9p2QSGaQ04OLJTLm/6/+VDjdqApHrMqUmuGMx4rsQMHoxMpYhSm lUkzE8tkxhFDV1QKhTjAIJGISsXhHFUGjRhHa76gCkeOJmfVFF32aR3sLxkUynzTLnyT e2ugSqNkZFzllmm4o67bhgna1hi0utIqp0T9ukzpukb74cVuBvR3DgUH5PpyAYBXPWzP 5yWqoMzSpdXyJDWlEZmMdqSsG9yGsqd3o4VC6xg2BA2SH31YSPgcdMhkUXSbiYGhYabM 9zbUCIgsI+lP47V1SqKwBCQb8yEBxmSihcbkzjIyGiSTWNVM0m+O9bxPSBZffnFBjEdi 6AFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=SSDp2uOC9hLXOE7I0jFR+XKDuk95Fp6FJVWwWfXSvrs=; b=LvWvJWOVjd+GbKyWiERQegPSsqzD9Ogxx9RFPZvbMHp4KI8H+Nx7IY4oRWdb72Duug W7ifQJXUlYNCzJzG7AItiiXcIL43Pc9byK3a2PJPVjYVkjxVQvbSFkPzgBAFi43Zmkz9 NnLN+KTKt5cxr860oACaQ+LpcAhARmfix2pmdukqBwtnW8bUXuqL2P1e2MKtDZYyGLyQ LACkoKKAF6tnlrfUiXrB+Wj9HAbCGPfLZ+Qj3RTea1W/WgOmQz8joFyjkdtz7bwDIP62 HQVk6DB0HG5Nc2Nq2dDTFRd2YUazSra15G3p7xSf1liJjnyCyoP44Vx1ywecbkVoNX+6 ODEQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zXO2sjIJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q8si12379658pjp.61.2019.08.05.06.14.51; Mon, 05 Aug 2019 06:15:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zXO2sjIJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730207AbfHENM6 (ORCPT + 99 others); Mon, 5 Aug 2019 09:12:58 -0400 Received: from mail.kernel.org ([198.145.29.99]:48474 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730245AbfHENJv (ORCPT ); Mon, 5 Aug 2019 09:09:51 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BD509217D9; Mon, 5 Aug 2019 13:09:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565010590; bh=Y8QJsEx3iQGHlddjHTT8Du+dE5LcgvkKqSkfYJiQt9c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=zXO2sjIJKWHjOQlSg1VLtZaiWuT5YhsFieiUWY111T39ejK1aCwDPeuOq5PttjPTt iLW/J9VxlkDPZ3FDrlhWC2t1C7xdiuibUpeJtcb1NjG7bcGgIu5spcjs8GjT41iUaV 2jDs6OxcrISMh4wri2STfE/ZqKiU+EOWuB6/in/w= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Kees Cook , Randy Dunlap , Rasmus Villemoes , Joe Perches , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 4.19 29/74] lib/test_overflow.c: avoid tainting the kernel and fix wrap size Date: Mon, 5 Aug 2019 15:02:42 +0200 Message-Id: <20190805124938.092685708@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190805124935.819068648@linuxfoundation.org> References: <20190805124935.819068648@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 8e060c21ae2c265a2b596e9e7f9f97ec274151a4 ] This adds __GFP_NOWARN to the kmalloc()-portions of the overflow test to avoid tainting the kernel. Additionally fixes up the math on wrap size to be architecture and page size agnostic. Link: http://lkml.kernel.org/r/201905282012.0A8767E24@keescook Fixes: ca90800a91ba ("test_overflow: Add memory allocation overflow tests") Signed-off-by: Kees Cook Reported-by: Randy Dunlap Suggested-by: Rasmus Villemoes Cc: Joe Perches Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- lib/test_overflow.c | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/lib/test_overflow.c b/lib/test_overflow.c index fc680562d8b69..7a4b6f6c5473c 100644 --- a/lib/test_overflow.c +++ b/lib/test_overflow.c @@ -486,16 +486,17 @@ static int __init test_overflow_shift(void) * Deal with the various forms of allocator arguments. See comments above * the DEFINE_TEST_ALLOC() instances for mapping of the "bits". */ -#define alloc010(alloc, arg, sz) alloc(sz, GFP_KERNEL) -#define alloc011(alloc, arg, sz) alloc(sz, GFP_KERNEL, NUMA_NO_NODE) +#define alloc_GFP (GFP_KERNEL | __GFP_NOWARN) +#define alloc010(alloc, arg, sz) alloc(sz, alloc_GFP) +#define alloc011(alloc, arg, sz) alloc(sz, alloc_GFP, NUMA_NO_NODE) #define alloc000(alloc, arg, sz) alloc(sz) #define alloc001(alloc, arg, sz) alloc(sz, NUMA_NO_NODE) -#define alloc110(alloc, arg, sz) alloc(arg, sz, GFP_KERNEL) +#define alloc110(alloc, arg, sz) alloc(arg, sz, alloc_GFP) #define free0(free, arg, ptr) free(ptr) #define free1(free, arg, ptr) free(arg, ptr) -/* Wrap around to 8K */ -#define TEST_SIZE (9 << PAGE_SHIFT) +/* Wrap around to 16K */ +#define TEST_SIZE (5 * 4096) #define DEFINE_TEST_ALLOC(func, free_func, want_arg, want_gfp, want_node)\ static int __init test_ ## func (void *arg) \ -- 2.20.1