[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <66b317e630f6904cbddbb8affcf06b59b4c0ead8.camel@codeconstruct.com.au>
Date: Fri, 22 Sep 2023 11:48:11 -0700
From: Jeremy Kerr <jk@...econstruct.com.au>
To: Kees Cook <keescook@...omium.org>, Alexandre Belloni
<alexandre.belloni@...tlin.com>
Cc: Joel Stanley <joel@....id.au>, linux-i3c@...ts.infradead.org, Nathan
Chancellor <nathan@...nel.org>, Nick Desaulniers <ndesaulniers@...gle.com>,
Tom Rix <trix@...hat.com>, Uwe Kleine-König
<u.kleine-koenig@...gutronix.de>, Matt Johnston
<matt@...econstruct.com.au>, Krzysztof Kozlowski
<krzysztof.kozlowski@...aro.org>, Jack Chen <zenghuchen@...gle.com>,
linux-kernel@...r.kernel.org, llvm@...ts.linux.dev,
linux-hardening@...r.kernel.org
Subject: Re: [PATCH] i3c: dw: Annotate struct dw_i3c_xfer with __counted_by
Hi Kees,
> Prepare for the coming implementation by GCC and Clang of the
> __counted_by attribute. Flexible array members annotated with
> __counted_by can have their accesses bounds-checked at run-time
> checking via CONFIG_UBSAN_BOUNDS (for array indexing) and
> CONFIG_FORTIFY_SOURCE (for strcpy/memcpy- family functions).
Nice!
Reviewed-by: Jeremy Kerr <jk@...econstruct.com.au>
Cheers,
Jeremy
Powered by blists - more mailing lists