aboutsummaryrefslogtreecommitdiffstats
path: root/arch/powerpc/sysdev/xive/native.c
diff options
context:
space:
mode:
authorKees Cook <[email protected]>2021-11-18 20:36:04 +0000
committerMichael Ellerman <[email protected]>2021-12-01 23:39:00 +0000
commit62ea67e31981bca95ec16c37e2a1fba68f3dd8c5 (patch)
tree48bd43cd095317cd076eaa4f542289cfbb6f60d6 /arch/powerpc/sysdev/xive/native.c
parentpowerpc/32s: Fix shift-out-of-bounds in KASAN init (diff)
downloadkernel-62ea67e31981bca95ec16c37e2a1fba68f3dd8c5.tar.gz
kernel-62ea67e31981bca95ec16c37e2a1fba68f3dd8c5.zip
powerpc/signal32: Use struct_group() to zero spe regs
In preparation for FORTIFY_SOURCE performing compile-time and run-time field bounds checking for memset(), avoid intentionally writing across neighboring fields. Add a struct_group() for the spe registers so that memset() can correctly reason about the size: In function 'fortify_memset_chk', inlined from 'restore_user_regs.part.0' at arch/powerpc/kernel/signal_32.c:539:3: >> include/linux/fortify-string.h:195:4: error: call to '__write_overflow_field' declared with attribute warning: detected write beyond size of field (1st parameter); maybe use struct_group()? [-Werror=attribute-warning] 195 | __write_overflow_field(); | ^~~~~~~~~~~~~~~~~~~~~~~~ Reported-by: kernel test robot <[email protected]> Signed-off-by: Kees Cook <[email protected]> Reviewed-by: Christophe Leroy <[email protected]> Acked-by: Michael Ellerman <[email protected]> Signed-off-by: Michael Ellerman <[email protected]> Link: https://lore.kernel.org/r/[email protected]
Diffstat (limited to 'arch/powerpc/sysdev/xive/native.c')
0 files changed, 0 insertions, 0 deletions