diff options
author | Kees Cook <keescook@chromium.org> | 2023-09-22 10:50:58 -0700 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2023-10-05 13:34:03 +0200 |
commit | 3c69d52e3e12f0330c554c9c6e5498c436c86f4b (patch) | |
tree | 56a271af645d5cc95601dadbe39dec8d70407fe1 /include/uapi/linux | |
parent | 4d08c3d12b61022501989f9f071514d2d6f77c47 (diff) | |
download | linux-3c69d52e3e12f0330c554c9c6e5498c436c86f4b.tar.gz linux-3c69d52e3e12f0330c554c9c6e5498c436c86f4b.tar.bz2 linux-3c69d52e3e12f0330c554c9c6e5498c436c86f4b.zip |
misc: bcm-vk: Annotate struct bcm_vk_wkent with __counted_by
Prepare for the coming implementation by GCC and Clang of the __counted_by
attribute. Flexible array members annotated with __counted_by can have
their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS
(for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
functions).
As found with Coccinelle[1], add __counted_by for struct bcm_vk_wkent.
Additionally, since the element count member must be set before accessing
the annotated flexible array member, move its initialization earlier.
[1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci
Cc: Scott Branden <scott.branden@broadcom.com>
Cc: Broadcom internal kernel review list <bcm-kernel-feedback-list@broadcom.com>
Cc: Arnd Bergmann <arnd@arndb.de>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: "Gustavo A. R. Silva" <gustavoars@kernel.org>
Link: https://lore.kernel.org/r/20230922175057.work.558-kees@kernel.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'include/uapi/linux')
0 files changed, 0 insertions, 0 deletions