diff options
author | Kees Cook <keescook@chromium.org> | 2023-09-22 20:51:15 +0300 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2023-10-25 00:09:20 +0300 |
commit | bf5abc17bc434f27e20d3702b1992d9b5e4a7239 (patch) | |
tree | 8f5684266b586cdf62d5dd11ff3b2d0e3c4348d1 /scripts/gcc-plugins/randomize_layout_plugin.c | |
parent | 68a8f644575bde6b35c5fa8a3e6f024aa580e071 (diff) | |
download | linux-bf5abc17bc434f27e20d3702b1992d9b5e4a7239.tar.xz |
virtio_console: Annotate struct port_buffer with __counted_by
Prepare for the coming implementation by GCC and Clang of the __counted_by
attribute. Flexible array members annotated with __counted_by can have
their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS
(for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
functions).
As found with Coccinelle[1], add __counted_by for struct port_buffer.
[1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci
Cc: Amit Shah <amit@kernel.org>
Cc: Arnd Bergmann <arnd@arndb.de>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: virtualization@lists.linux-foundation.org
Reviewed-by: "Gustavo A. R. Silva" <gustavoars@kernel.org>
Reviewed-by: Amit Shah <amit@kernel.org>
Link: https://lore.kernel.org/r/20230922175115.work.059-kees@kernel.org
Signed-off-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'scripts/gcc-plugins/randomize_layout_plugin.c')
0 files changed, 0 insertions, 0 deletions