aboutsummaryrefslogtreecommitdiff
path: root/lib/crypto/mpi/mpi-add.c
diff options
context:
space:
mode:
authorKees Cook <keescook@chromium.org>2023-08-17 13:29:42 -0700
committerStephen Boyd <sboyd@kernel.org>2023-08-22 13:51:54 -0700
commita5be6db5a2880f9edda0f062a0bb23efd01ece37 (patch)
treeb5a0dfe5f97c1b3c5bf171d9cf2c511fab4ff101 /lib/crypto/mpi/mpi-add.c
parentf316cdff8d677db9ad9c90acb44c4cd535b0ee27 (diff)
clk: qcom: clk-spmi-pmic-div: Annotate struct spmi_pmic_div_clk_cc with __counted_by
Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family functions). As found with Coccinelle[1], add __counted_by for struct spmi_pmic_div_clk_cc. [1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci Cc: Bjorn Andersson <andersson@kernel.org> Cc: Andy Gross <agross@kernel.org> Cc: Konrad Dybcio <konrad.dybcio@linaro.org> Cc: Michael Turquette <mturquette@baylibre.com> Cc: Stephen Boyd <sboyd@kernel.org> Cc: linux-arm-msm@vger.kernel.org Cc: linux-clk@vger.kernel.org Signed-off-by: Kees Cook <keescook@chromium.org> Link: https://lore.kernel.org/r/20230817202941.never.657-kees@kernel.org Reviewed-by: Gustavo A. R. Silva <gustavoars@kernel.org> Signed-off-by: Stephen Boyd <sboyd@kernel.org>
Diffstat (limited to 'lib/crypto/mpi/mpi-add.c')
0 files changed, 0 insertions, 0 deletions