diff options
author | Kees Cook <[email protected]> | 2023-08-17 14:03:28 -0700 |
---|---|---|
committer | Kees Cook <[email protected]> | 2023-08-18 10:17:07 -0700 |
commit | a4b35d4d05b9f2e84c1dd6301d3dca65719334ef (patch) | |
tree | 8d1a6e7d740e86686fa0c166f6e32f7fbd9b086d /tools/perf/scripts/python/gecko.py | |
parent | 5d207e83ca41206e75c2cd414d40b451ef04c259 (diff) |
integrity: Annotate struct ima_rule_opt_list with __counted_by
Prepare for the coming implementation by GCC and Clang of the __counted_by
attribute. Flexible array members annotated with __counted_by can have
their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS
(for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
functions).
As found with Coccinelle[1], add __counted_by for struct ima_rule_opt_list.
Additionally, since the element count member must be set before accessing
the annotated flexible array member, move its initialization earlier.
[1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci
Cc: Mimi Zohar <[email protected]>
Cc: Dmitry Kasatkin <[email protected]>
Cc: Paul Moore <[email protected]>
Cc: James Morris <[email protected]>
Cc: "Serge E. Hallyn" <[email protected]>
Cc: [email protected]
Cc: [email protected]
Acked-by: Mimi Zohar <[email protected]>
Reviewed-by: "Gustavo A. R. Silva" <[email protected]>
Acked-by: Jarkko Sakkinen <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Kees Cook <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/gecko.py')
0 files changed, 0 insertions, 0 deletions