diff options
author | Kees Cook <keescook@chromium.org> | 2023-09-22 10:52:50 -0700 |
---|---|---|
committer | Ulf Hansson <ulf.hansson@linaro.org> | 2023-09-27 12:13:18 +0200 |
commit | 45492b13453f9862abff6f9d7af5e8116849a9c9 (patch) | |
tree | 9cf43a9df100486ee17b543a8708e614b37f833d /net/x25 | |
parent | c8b850f0f021c15594a1543b7f5d629e45f9150a (diff) | |
download | linux-stable-45492b13453f9862abff6f9d7af5e8116849a9c9.tar.gz linux-stable-45492b13453f9862abff6f9d7af5e8116849a9c9.tar.bz2 linux-stable-45492b13453f9862abff6f9d7af5e8116849a9c9.zip |
memstick: jmb38x_ms: Annotate struct jmb38x_ms with __counted_by
Prepare for the coming implementation by GCC and Clang of the __counted_by
attribute. Flexible array members annotated with __counted_by can have
their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS
(for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
functions).
As found with Coccinelle[1], add __counted_by for struct jmb38x_ms.
[1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci
Cc: Maxim Levitsky <maximlevitsky@gmail.com>
Cc: Alex Dubov <oakad@yahoo.com>
Cc: Ulf Hansson <ulf.hansson@linaro.org>
Cc: Tom Rix <trix@redhat.com>
Cc: Len Baker <len.baker@gmx.com>
Cc: Dan Carpenter <error27@gmail.com>
Cc: "Gustavo A. R. Silva" <gustavoars@kernel.org>
Cc: linux-mmc@vger.kernel.org
Signed-off-by: Kees Cook <keescook@chromium.org>
Link: https://lore.kernel.org/r/20230922175249.work.593-kees@kernel.org
Signed-off-by: Ulf Hansson <ulf.hansson@linaro.org>
Diffstat (limited to 'net/x25')
0 files changed, 0 insertions, 0 deletions