diff options
author | Masami Hiramatsu <mhiramat@kernel.org> | 2022-01-25 17:19:30 +0300 |
---|---|---|
committer | Steven Rostedt (Google) <rostedt@goodmis.org> | 2022-01-28 03:15:45 +0300 |
commit | 58c5724ec2cdd72b22107ec5de00d90cc4797796 (patch) | |
tree | 1db63eab3b10ae98723dfd912024a4846ae02ff4 /security/Kconfig | |
parent | e629e7b525a179e29d53463d992bdee759c950fb (diff) | |
download | linux-58c5724ec2cdd72b22107ec5de00d90cc4797796.tar.xz |
tracing: Avoid -Warray-bounds warning for __rel_loc macro
Since -Warray-bounds checks the destination size from the type of given
pointer, __assign_rel_str() macro gets warned because it passes the
pointer to the 'u32' field instead of 'trace_event_raw_*' data structure.
Pass the data address calculated from the 'trace_event_raw_*' instead of
'u32' __rel_loc field.
Link: https://lkml.kernel.org/r/20220125233154.dac280ed36944c0c2fe6f3ac@kernel.org
Cc: Stephen Rothwell <sfr@canb.auug.org.au>
Cc: Kees Cook <keescook@chromium.org>
Signed-off-by: Masami Hiramatsu <mhiramat@kernel.org>
[ This did not fix the warning, but is still a nice clean up ]
Signed-off-by: Steven Rostedt (Google) <rostedt@goodmis.org>
Diffstat (limited to 'security/Kconfig')
0 files changed, 0 insertions, 0 deletions