diff options
author | Gustavo A. R. Silva <gustavoars@kernel.org> | 2020-05-28 09:35:11 -0500 |
---|---|---|
committer | Gustavo A. R. Silva <gustavoars@kernel.org> | 2020-06-15 23:08:32 -0500 |
commit | eb492c627a61b5630d5e6d9f6cfecbcd60611e05 (patch) | |
tree | 1d2713f9e423beb04967eb039d79494d57ab7511 /security/integrity | |
parent | af6bb61cc0a25fba4411f4348f01011c9a769047 (diff) | |
download | linux-stable-eb492c627a61b5630d5e6d9f6cfecbcd60611e05.tar.gz linux-stable-eb492c627a61b5630d5e6d9f6cfecbcd60611e05.tar.bz2 linux-stable-eb492c627a61b5630d5e6d9f6cfecbcd60611e05.zip |
ima: Replace zero-length array with flexible-array
There is a regular need in the kernel to provide a way to declare having a
dynamically sized set of trailing elements in a structure. Kernel code should
always use “flexible array members”[1] for these cases. The older style of
one-element or zero-length arrays should no longer be used[2].
[1] https://en.wikipedia.org/wiki/Flexible_array_member
[2] https://github.com/KSPP/linux/issues/21
Signed-off-by: Gustavo A. R. Silva <gustavoars@kernel.org>
Diffstat (limited to 'security/integrity')
-rw-r--r-- | security/integrity/integrity.h | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/security/integrity/integrity.h b/security/integrity/integrity.h index 298b73794d8b..16c1894c29bb 100644 --- a/security/integrity/integrity.h +++ b/security/integrity/integrity.h @@ -107,7 +107,7 @@ struct ima_digest_data { } ng; u8 data[2]; } xattr; - u8 digest[0]; + u8 digest[]; } __packed; /* @@ -119,7 +119,7 @@ struct signature_v2_hdr { uint8_t hash_algo; /* Digest algorithm [enum hash_algo] */ __be32 keyid; /* IMA key identifier - not X509/PGP specific */ __be16 sig_size; /* signature size */ - uint8_t sig[0]; /* signature payload */ + uint8_t sig[]; /* signature payload */ } __packed; /* integrity data associated with an inode */ |