summaryrefslogtreecommitdiffstats
path: root/fs/overlayfs/overlayfs.h
diff options
context:
space:
mode:
authorKees Cook <keescook@chromium.org>2022-09-24 09:33:15 +0200
committerMiklos Szeredi <mszeredi@redhat.com>2022-12-08 10:49:46 +0100
commitcf8aa9bf97cadf85745506c6a3e244b22c268d63 (patch)
treeae16d91a1fc51725c8bb78f359981fa88a926bc8 /fs/overlayfs/overlayfs.h
parentovl: update ->f_iocb_flags when ovl_change_flags() modifies ->f_flags (diff)
downloadlinux-cf8aa9bf97cadf85745506c6a3e244b22c268d63.tar.xz
linux-cf8aa9bf97cadf85745506c6a3e244b22c268d63.zip
ovl: Use "buf" flexible array for memcpy() destination
The "buf" flexible array needs to be the memcpy() destination to avoid false positive run-time warning from the recent FORTIFY_SOURCE hardening: memcpy: detected field-spanning write (size 93) of single field "&fh->fb" at fs/overlayfs/export.c:799 (size 21) Reported-by: syzbot+9d14351a171d0d1c7955@syzkaller.appspotmail.com Link: https://lore.kernel.org/all/000000000000763a6c05e95a5985@google.com/ Signed-off-by: Kees Cook <keescook@chromium.org> Reviewed-by: Gustavo A. R. Silva <gustavoars@kernel.org> Signed-off-by: Miklos Szeredi <mszeredi@redhat.com>
Diffstat (limited to 'fs/overlayfs/overlayfs.h')
-rw-r--r--fs/overlayfs/overlayfs.h2
1 files changed, 1 insertions, 1 deletions
diff --git a/fs/overlayfs/overlayfs.h b/fs/overlayfs/overlayfs.h
index eee8f08d32b6..e74a610a117e 100644
--- a/fs/overlayfs/overlayfs.h
+++ b/fs/overlayfs/overlayfs.h
@@ -108,7 +108,7 @@ struct ovl_fh {
u8 padding[3]; /* make sure fb.fid is 32bit aligned */
union {
struct ovl_fb fb;
- u8 buf[0];
+ DECLARE_FLEX_ARRAY(u8, buf);
};
} __packed;