diff options
author | Kees Cook <keescook@chromium.org> | 2024-02-16 15:30:05 -0800 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2024-02-19 10:57:27 +0000 |
commit | 40b9385dd8e6a0515e1c9cd06a277483556b7286 (patch) | |
tree | 5d4638e8e3d3cdb81452fca24fc3d77bb01210b1 /LICENSES | |
parent | 121e4dcba3700b30e63f25203d09ddfccbab4a09 (diff) | |
download | linux-stable-40b9385dd8e6a0515e1c9cd06a277483556b7286.tar.gz linux-stable-40b9385dd8e6a0515e1c9cd06a277483556b7286.tar.bz2 linux-stable-40b9385dd8e6a0515e1c9cd06a277483556b7286.zip |
enic: Avoid false positive under FORTIFY_SOURCE
FORTIFY_SOURCE has been ignoring 0-sized destinations while the kernel
code base has been converted to flexible arrays. In order to enforce
the 0-sized destinations (e.g. with __counted_by), the remaining 0-sized
destinations need to be handled. Unfortunately, struct vic_provinfo
resists full conversion, as it contains a flexible array of flexible
arrays, which is only possible with the 0-sized fake flexible array.
Use unsafe_memcpy() to avoid future false positives under
CONFIG_FORTIFY_SOURCE.
Signed-off-by: Kees Cook <keescook@chromium.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'LICENSES')
0 files changed, 0 insertions, 0 deletions