diff options
author | Kees Cook <keescook@chromium.org> | 2023-09-22 19:52:53 +0200 |
---|---|---|
committer | Luis Chamberlain <mcgrof@kernel.org> | 2023-11-01 21:07:32 +0100 |
commit | ea0b0bcef4917a2640ecc100c768b8e785784834 (patch) | |
tree | ed39dac4a9d68439da5664934ba35b033a7b025a /kernel/module/sysfs.c | |
parent | module: Fix comment typo (diff) | |
download | linux-ea0b0bcef4917a2640ecc100c768b8e785784834.tar.xz linux-ea0b0bcef4917a2640ecc100c768b8e785784834.zip |
module: Annotate struct module_notes_attrs with __counted_by
Prepare for the coming implementation by GCC and Clang of the __counted_by
attribute. Flexible array members annotated with __counted_by can have
their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS
(for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
functions).
As found with Coccinelle[1], add __counted_by for struct module_notes_attrs.
[1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci
Cc: Luis Chamberlain <mcgrof@kernel.org>
Cc: linux-modules@vger.kernel.org
Signed-off-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Luis Chamberlain <mcgrof@kernel.org>
Diffstat (limited to '')
-rw-r--r-- | kernel/module/sysfs.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/kernel/module/sysfs.c b/kernel/module/sysfs.c index c921bf044050..d964167c6658 100644 --- a/kernel/module/sysfs.c +++ b/kernel/module/sysfs.c @@ -143,7 +143,7 @@ static void remove_sect_attrs(struct module *mod) struct module_notes_attrs { struct kobject *dir; unsigned int notes; - struct bin_attribute attrs[]; + struct bin_attribute attrs[] __counted_by(notes); }; static ssize_t module_notes_read(struct file *filp, struct kobject *kobj, |