summaryrefslogtreecommitdiff
path: root/certs
diff options
context:
space:
mode:
authorKees Cook <kees@kernel.org>2026-02-20 23:49:23 -0800
committerKees Cook <kees@kernel.org>2026-02-21 01:02:28 -0800
commit69050f8d6d075dc01af7a5f2f550a8067510366f (patch)
treebb265f94d9dfa7876c06a5d9f88673d496a15341 /certs
parentd39a1d7486d98668dd34aaa6732aad7977c45f5a (diff)
treewide: Replace kmalloc with kmalloc_obj for non-scalar types
This is the result of running the Coccinelle script from scripts/coccinelle/api/kmalloc_objs.cocci. The script is designed to avoid scalar types (which need careful case-by-case checking), and instead replace kmalloc-family calls that allocate struct or union object instances: Single allocations: kmalloc(sizeof(TYPE), ...) are replaced with: kmalloc_obj(TYPE, ...) Array allocations: kmalloc_array(COUNT, sizeof(TYPE), ...) are replaced with: kmalloc_objs(TYPE, COUNT, ...) Flex array allocations: kmalloc(struct_size(PTR, FAM, COUNT), ...) are replaced with: kmalloc_flex(*PTR, FAM, COUNT, ...) (where TYPE may also be *VAR) The resulting allocations no longer return "void *", instead returning "TYPE *". Signed-off-by: Kees Cook <kees@kernel.org>
Diffstat (limited to 'certs')
-rw-r--r--certs/blacklist.c2
-rw-r--r--certs/system_keyring.c2
2 files changed, 2 insertions, 2 deletions
diff --git a/certs/blacklist.c b/certs/blacklist.c
index 11fc858b2921..725c2f18fa31 100644
--- a/certs/blacklist.c
+++ b/certs/blacklist.c
@@ -328,7 +328,7 @@ static int __init blacklist_init(void)
if (register_key_type(&key_type_blacklist) < 0)
panic("Can't allocate system blacklist key type\n");
- restriction = kzalloc(sizeof(*restriction), GFP_KERNEL);
+ restriction = kzalloc_obj(*restriction, GFP_KERNEL);
if (!restriction)
panic("Can't allocate blacklist keyring restriction\n");
restriction->check = restrict_link_for_blacklist;
diff --git a/certs/system_keyring.c b/certs/system_keyring.c
index 9de610bf1f4b..afe67e2a47ed 100644
--- a/certs/system_keyring.c
+++ b/certs/system_keyring.c
@@ -140,7 +140,7 @@ static __init struct key_restriction *get_builtin_and_secondary_restriction(void
{
struct key_restriction *restriction;
- restriction = kzalloc(sizeof(struct key_restriction), GFP_KERNEL);
+ restriction = kzalloc_obj(struct key_restriction, GFP_KERNEL);
if (!restriction)
panic("Can't allocate secondary trusted keyring restriction\n");