mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
synced 2025-01-07 14:32:23 +00:00
ea0b0bcef4
Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family functions). As found with Coccinelle[1], add __counted_by for struct module_notes_attrs. [1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci Cc: Luis Chamberlain <mcgrof@kernel.org> Cc: linux-modules@vger.kernel.org Signed-off-by: Kees Cook <keescook@chromium.org> Signed-off-by: Luis Chamberlain <mcgrof@kernel.org> |
||
---|---|---|
.. | ||
debug_kmemleak.c | ||
decompress.c | ||
dups.c | ||
internal.h | ||
kallsyms.c | ||
Kconfig | ||
kdb.c | ||
kmod.c | ||
livepatch.c | ||
main.c | ||
Makefile | ||
procfs.c | ||
signing.c | ||
stats.c | ||
strict_rwx.c | ||
sysfs.c | ||
tracking.c | ||
tree_lookup.c | ||
version.c |