Searched hist:c1298a3a1139c9a73a188fbb153b6eb83dbd4d7d (Results 1 – 2 of 2) sorted by relevance
/openbmc/linux/scripts/gcc-plugins/ |
H A D | randomize_layout_plugin.c | diff c1298a3a1139c9a73a188fbb153b6eb83dbd4d7d Sun May 08 11:15:53 CDT 2022 Kees Cook <keescook@chromium.org> big_keys: Use struct for internal payload
The randstruct GCC plugin gets upset when it sees struct path (which is randomized) being assigned from a "void *" (which it cannot type-check).
There's no need for these casts, as the entire internal payload use is following a normal struct layout. Convert the enum-based void * offset dereferencing to the new big_key_payload struct. No meaningful machine code changes result after this change, and source readability is improved.
Drop the randstruct exception now that there is no "confusing" cross-type assignment.
Cc: David Howells <dhowells@redhat.com> Cc: Eric Biggers <ebiggers@kernel.org> Cc: Christoph Hellwig <hch@infradead.org> Cc: Jarkko Sakkinen <jarkko@kernel.org> Cc: James Morris <jmorris@namei.org> Cc: "Serge E. Hallyn" <serge@hallyn.com> Cc: linux-hardening@vger.kernel.org Cc: keyrings@vger.kernel.org Cc: linux-security-module@vger.kernel.org Signed-off-by: Kees Cook <keescook@chromium.org>
|
/openbmc/linux/security/keys/ |
H A D | big_key.c | diff c1298a3a1139c9a73a188fbb153b6eb83dbd4d7d Sun May 08 11:15:53 CDT 2022 Kees Cook <keescook@chromium.org> big_keys: Use struct for internal payload
The randstruct GCC plugin gets upset when it sees struct path (which is randomized) being assigned from a "void *" (which it cannot type-check).
There's no need for these casts, as the entire internal payload use is following a normal struct layout. Convert the enum-based void * offset dereferencing to the new big_key_payload struct. No meaningful machine code changes result after this change, and source readability is improved.
Drop the randstruct exception now that there is no "confusing" cross-type assignment.
Cc: David Howells <dhowells@redhat.com> Cc: Eric Biggers <ebiggers@kernel.org> Cc: Christoph Hellwig <hch@infradead.org> Cc: Jarkko Sakkinen <jarkko@kernel.org> Cc: James Morris <jmorris@namei.org> Cc: "Serge E. Hallyn" <serge@hallyn.com> Cc: linux-hardening@vger.kernel.org Cc: keyrings@vger.kernel.org Cc: linux-security-module@vger.kernel.org Signed-off-by: Kees Cook <keescook@chromium.org>
|