Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3984660pxb; Tue, 25 Jan 2022 00:41:10 -0800 (PST) X-Google-Smtp-Source: ABdhPJyJ0NXk5lSEY7p0CJ6ASPquNjiicZkJM/B/TE0Y++vghlP5Fi3efIl/tbBEtPIMGu4hFy56 X-Received: by 2002:a17:907:7251:: with SMTP id ds17mr1152800ejc.709.1643100070094; Tue, 25 Jan 2022 00:41:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643100070; cv=none; d=google.com; s=arc-20160816; b=rutQibJKFGhQdnfacoqroSwyS24TLUwW0bklFWpvTro9+6YdGKmJHW9hVEOnJw4N0Z umSgDFfaLdtS5uBx07y7zFpcoL+yAjojb2nMLyhm6rPfTEKMgH2PsVVGX/lMLcteGyCj ONbPykprKMHp6bWlec7DGHN2rX/Ea4b/mfymc0fyhMzrV05z2apIh1gqa+2AQDIbnTx4 w7CKRLrC4mm7S87vXLZIrnbL4k73GWQ4mDLxVyczYRJc0VMwTaX7Y3GgPMWx8QGh2ARq pepDJNzBaYhW5f3ceRm4TZ8+T96Kt30AwEmL7R6TBoVkafz1bNUqDqKVMkEfYseL5/mU P6Vw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:cc:to:from:date:dkim-signature; bh=uqGLMZ2xt0yuFO7kNvinch2H9kh67Ouo0bwdX8yXDk4=; b=cDjRgRpqZtoES/lRzbPCSo2hzsEolgsP/F6v+A5+PibBBfgrN6kD59xWJ495iU220q 3tCjt2CCaQ51mtSnut3eQ/9lWsBpgxpiLOrredCZvR/0GaB4viPPdD/1mjgpVDZ/E7jX TZeATh/X6uD/JbU6eat1JrI4xFcuuZkiCcWPh9+wazE2aRBU3+9e8FlCcRgXZi1FD4oC 02NuIF7Ys+nNcmGCNCsU9lK832y+74OhLHBa/0LuyQcFLsQv2l7iBH0iw+Hn89gzFpBZ AeFrDkapUL+gi4LUUuwHEe2gTgrKH5IBaq+/Mplki+BMyWOQdWlE/ZdfDJE1Qu58xk8v uJZw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Ar5k98Rn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 4si1374115ejc.404.2022.01.25.00.40.45; Tue, 25 Jan 2022 00:41:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Ar5k98Rn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1318311AbiAYDFP (ORCPT + 99 others); Mon, 24 Jan 2022 22:05:15 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56794 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S3415619AbiAYBtW (ORCPT ); Mon, 24 Jan 2022 20:49:22 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C4DC9C06179A; Mon, 24 Jan 2022 17:49:22 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 5F06161227; Tue, 25 Jan 2022 01:49:22 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1BF29C340E4; Tue, 25 Jan 2022 01:49:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1643075361; bh=n9p4chGrfYBwW/8m0BAudbbep+5r1Wm8/mnKLL8vO50=; h=Date:From:To:Cc:Subject:From; b=Ar5k98RnWiRSPN29uouVjK20XA+S3kp5Bmh/FpFPdRkWyG5bqLbXGtB/+ViplKv1Z LVKO9qdgIZpRP8Ov980O62sx1tliLoM+OXG36W7eaSLaIcKXxF7swqBkUrytIqpFjR FqOJcNGLbVhReIiMZtLVZrlN4MbJ3ohqo+RGDhordrHNc2lCsPABNXcpJWRh9P2gnH MIot5EieNl7H2rhuY+/61advXPqbMNeZQUi95UYK/GLDpp/4BAO0UjIN9qF/Hg6Rop CoTGd7RpLHQYNpAbpsJo9rLsOHpqCJfPmd36mR3Tj8LhImUoplYuMSKnn9ArSpxIS/ 4ugEgQeFM0THw== Date: Mon, 24 Jan 2022 19:56:06 -0600 From: "Gustavo A. R. Silva" To: John Johansen , James Morris , "Serge E. Hallyn" Cc: linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, "Gustavo A. R. Silva" , linux-hardening@vger.kernel.org Subject: [PATCH][next] apparmor: Use struct_size() helper in kmalloc() Message-ID: <20220125015606.GA28243@embeddedor> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Make use of the struct_size() helper instead of an open-coded version, in order to avoid any potential type mistakes or integer overflows that, in the worst scenario, could lead to heap overflows. Also, address the following sparse warnings: security/apparmor/lib.c:139:23: warning: using sizeof on a flexible structure Link: https://github.com/KSPP/linux/issues/174 Signed-off-by: Gustavo A. R. Silva --- security/apparmor/lib.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/security/apparmor/lib.c b/security/apparmor/lib.c index fa49b81eb54c..5eda003c0d45 100644 --- a/security/apparmor/lib.c +++ b/security/apparmor/lib.c @@ -136,7 +136,7 @@ __counted char *aa_str_alloc(int size, gfp_t gfp) { struct counted_str *str; - str = kmalloc(sizeof(struct counted_str) + size, gfp); + str = kmalloc(struct_size(str, name, size), gfp); if (!str) return NULL; -- 2.27.0