diff options
author | Harald Freudenberger <freude@linux.ibm.com> | 2022-10-25 10:05:25 +0200 |
---|---|---|
committer | Vasily Gorbik <gor@linux.ibm.com> | 2022-11-02 22:15:57 +0100 |
commit | b43088f30db1a7bff61c8486238c195c77788d6d (patch) | |
tree | 10ab2bfd2e45866e3e694050ddb497260821d110 /scripts/gcc-plugins/structleak_plugin.c | |
parent | e38de4804421b064a9c73c5a9b7f3df96b863e4b (diff) |
s390/zcrypt: fix warning about field-spanning write
This patch fixes the warning
memcpy: detected field-spanning write (size 60) of single field "to" at drivers/s390/crypto/zcrypt_api.h:173 (size 2)
WARNING: CPU: 1 PID: 2114 at drivers/s390/crypto/zcrypt_api.h:173 prep_ep11_ap_msg+0x2c6/0x2e0 [zcrypt]
The code has been rewritten to use a union in combination
with a flex array to clearly state which part of the buffer
the payload is to be copied in via z_copy_from_user
function (which may call memcpy() in case of in-kernel calls).
Signed-off-by: Harald Freudenberger <freude@linux.ibm.com>
Suggested-by: Jürgen Christ <jchrist@linux.ibm.com>
Reviewed-by: Jürgen Christ <jchrist@linux.ibm.com>
Signed-off-by: Vasily Gorbik <gor@linux.ibm.com>
Diffstat (limited to 'scripts/gcc-plugins/structleak_plugin.c')
0 files changed, 0 insertions, 0 deletions