summaryrefslogtreecommitdiff
path: root/security/selinux
diff options
context:
space:
mode:
authorKees Cook <keescook@chromium.org>2022-05-08 19:15:53 +0300
committerKees Cook <keescook@chromium.org>2022-05-17 02:02:21 +0300
commitc1298a3a1139c9a73a188fbb153b6eb83dbd4d7d (patch)
treef52517bf328f19902d5550083a67379b7691ae98 /security/selinux
parent61f60bac8c05f8ecd2ae2a6360520b91a45be9a2 (diff)
downloadlinux-c1298a3a1139c9a73a188fbb153b6eb83dbd4d7d.tar.xz
big_keys: Use struct for internal payload
The randstruct GCC plugin gets upset when it sees struct path (which is randomized) being assigned from a "void *" (which it cannot type-check). There's no need for these casts, as the entire internal payload use is following a normal struct layout. Convert the enum-based void * offset dereferencing to the new big_key_payload struct. No meaningful machine code changes result after this change, and source readability is improved. Drop the randstruct exception now that there is no "confusing" cross-type assignment. Cc: David Howells <dhowells@redhat.com> Cc: Eric Biggers <ebiggers@kernel.org> Cc: Christoph Hellwig <hch@infradead.org> Cc: Jarkko Sakkinen <jarkko@kernel.org> Cc: James Morris <jmorris@namei.org> Cc: "Serge E. Hallyn" <serge@hallyn.com> Cc: linux-hardening@vger.kernel.org Cc: keyrings@vger.kernel.org Cc: linux-security-module@vger.kernel.org Signed-off-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'security/selinux')
0 files changed, 0 insertions, 0 deletions