summaryrefslogtreecommitdiffstats
path: root/scripts/gcc-plugins
diff options
context:
space:
mode:
authorKees Cook <keescook@chromium.org>2017-05-25 21:40:22 -0700
committerKees Cook <keescook@chromium.org>2017-06-22 16:21:42 -0700
commit802762cdfff256b6bf3fdb624ac2c56ec043c4f0 (patch)
tree4a05dac3288791da1aefc191f6fe8da1e2e0c56e /scripts/gcc-plugins
parentb07b65846ba33a4deba03eb6e39043c8bc70903b (diff)
downloadlinux-stable-802762cdfff256b6bf3fdb624ac2c56ec043c4f0.tar.gz
linux-stable-802762cdfff256b6bf3fdb624ac2c56ec043c4f0.tar.bz2
linux-stable-802762cdfff256b6bf3fdb624ac2c56ec043c4f0.zip
randstruct: Whitelist big_key path struct overloading
The big_key payload structure intentionally stores a struct path in two void pointers to avoid header soup. Whitelist this case: security/keys/big_key.c: In function ‘big_key_read’: security/keys/big_key.c:293:16: note: found mismatched rhs struct pointer types: ‘struct path’ and ‘void *’ struct path *path = (struct path *)&key->payload.data[big_key_path]; ^~~~ Cc: David Howells <dhowells@redhat.com> Signed-off-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'scripts/gcc-plugins')
-rw-r--r--scripts/gcc-plugins/randomize_layout_plugin.c2
1 files changed, 2 insertions, 0 deletions
diff --git a/scripts/gcc-plugins/randomize_layout_plugin.c b/scripts/gcc-plugins/randomize_layout_plugin.c
index 2e710bf29699..c07818dac401 100644
--- a/scripts/gcc-plugins/randomize_layout_plugin.c
+++ b/scripts/gcc-plugins/randomize_layout_plugin.c
@@ -48,6 +48,8 @@ struct whitelist_entry {
static const struct whitelist_entry whitelist[] = {
/* unix_skb_parms via UNIXCB() buffer */
{ "net/unix/af_unix.c", "unix_skb_parms", "char" },
+ /* big_key payload.data struct splashing */
+ { "security/keys/big_key.c", "path", "void *" },
/* walk struct security_hook_heads as an array of struct list_head */
{ "security/security.c", "list_head", "security_hook_heads" },
{ }