linux-stable/drivers/misc/bcm-vk
Kees Cook 3c69d52e3e misc: bcm-vk: Annotate struct bcm_vk_wkent with __counted_by
Prepare for the coming implementation by GCC and Clang of the __counted_by
attribute. Flexible array members annotated with __counted_by can have
their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS
(for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
functions).

As found with Coccinelle[1], add __counted_by for struct bcm_vk_wkent.
Additionally, since the element count member must be set before accessing
the annotated flexible array member, move its initialization earlier.

[1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci

Cc: Scott Branden <scott.branden@broadcom.com>
Cc: Broadcom internal kernel review list <bcm-kernel-feedback-list@broadcom.com>
Cc: Arnd Bergmann <arnd@arndb.de>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: "Gustavo A. R. Silva" <gustavoars@kernel.org>
Link: https://lore.kernel.org/r/20230922175057.work.558-kees@kernel.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2023-10-05 13:34:03 +02:00
..
bcm_vk.h misc: bcm_vk: Fix potential deadlock on &vk->ctx_lock 2023-08-04 15:45:19 +02:00
bcm_vk_dev.c misc: bcm_vk: Remove usage of deprecated functions 2022-09-01 16:29:32 +02:00
bcm_vk_msg.c misc: bcm-vk: Annotate struct bcm_vk_wkent with __counted_by 2023-10-05 13:34:03 +02:00
bcm_vk_msg.h misc: bcm-vk: Annotate struct bcm_vk_wkent with __counted_by 2023-10-05 13:34:03 +02:00
bcm_vk_sg.c misc: bcm-vk: add VK messaging support 2021-01-25 18:44:44 +01:00
bcm_vk_sg.h misc: bcm-vk: add VK messaging support 2021-01-25 18:44:44 +01:00
bcm_vk_tty.c tty: make tty_operations::write()'s count size_t 2023-08-11 21:12:46 +02:00
Kconfig misc: bcm-vk: only support ttyVK if CONFIG_TTY is set 2021-02-04 00:48:58 +01:00
Makefile misc: bcm-vk: only support ttyVK if CONFIG_TTY is set 2021-02-04 00:48:58 +01:00