diff options
author | Kees Cook <keescook@chromium.org> | 2023-10-03 18:44:49 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2023-10-06 10:50:34 +0100 |
commit | 2a92fccdaca837f65990139207981014970f996c (patch) | |
tree | 544ecd74fa94395b86b05dca0f81d7d80a30cf85 /drivers/net/ethernet/sfc | |
parent | cf9ecad9772554a5b78c4f31b098ed680bc5251e (diff) | |
download | lwn-2a92fccdaca837f65990139207981014970f996c.tar.gz lwn-2a92fccdaca837f65990139207981014970f996c.zip |
nexthop: Annotate struct nh_group with __counted_by
Prepare for the coming implementation by GCC and Clang of the __counted_by
attribute. Flexible array members annotated with __counted_by can have
their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for
array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
functions).
As found with Coccinelle[1], add __counted_by for struct nh_group.
Cc: David Ahern <dsahern@kernel.org>
Cc: "David S. Miller" <davem@davemloft.net>
Cc: Eric Dumazet <edumazet@google.com>
Cc: Jakub Kicinski <kuba@kernel.org>
Cc: Paolo Abeni <pabeni@redhat.com>
Cc: netdev@vger.kernel.org
Link: https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci [1]
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: David Ahern <dsahern@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'drivers/net/ethernet/sfc')
0 files changed, 0 insertions, 0 deletions