diff options
author | Kees Cook <[email protected]> | 2021-07-01 16:22:21 +0200 |
---|---|---|
committer | Jens Axboe <[email protected]> | 2021-07-01 09:27:04 -0600 |
commit | 2b7a8dc06d0f840345ae3c7ed6f9d55962b5f54a (patch) | |
tree | b7b812b202d59648ea0fc04e969f0e506f0cee29 /net/unix/unix_bpf.c | |
parent | 299f2b5fc08be90aebcaa471b4d0f2bb94f2fbbf (diff) |
s390/dasd: Avoid field over-reading memcpy()
In preparation for FORTIFY_SOURCE performing compile-time and run-time
field array bounds checking for memcpy(), memmove(), and memset(),
avoid intentionally reading across neighboring array fields.
Add a wrapping structure to serve as the memcpy() source, so the compiler
can do appropriate bounds checking, avoiding this future warning:
In function '__fortify_memcpy',
inlined from 'create_uid' at drivers/s390/block/dasd_eckd.c:749:2:
./include/linux/fortify-string.h:246:4: error: call to '__read_overflow2_field' declared with attribute error: detected read beyond size of field (2nd parameter)
Signed-off-by: Kees Cook <[email protected]>
Signed-off-by: Stefan Haberland <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Jens Axboe <[email protected]>
Diffstat (limited to 'net/unix/unix_bpf.c')
0 files changed, 0 insertions, 0 deletions