lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <169601526970.3013632.470911371867487341.b4-ty@chromium.org> Date: Fri, 29 Sep 2023 12:21:12 -0700 From: Kees Cook <keescook@...omium.org> To: Greg Kroah-Hartman <gregkh@...uxfoundation.org>, Kees Cook <keescook@...omium.org> Cc: John Keeping <john@...ping.me.uk>, Peter Chen <peter.chen@....com>, Hulk Robot <hulkci@...wei.com>, Allen Pais <allen.lkml@...il.com>, Will McVicker <willmcvicker@...gle.com>, Davidlohr Bueso <dave@...olabs.net>, Zhang Qilong <zhangqilong3@...wei.com>, linux-usb@...r.kernel.org, Nathan Chancellor <nathan@...nel.org>, Nick Desaulniers <ndesaulniers@...gle.com>, Tom Rix <trix@...hat.com>, Linyu Yuan <quic_linyyuan@...cinc.com>, linux-kernel@...r.kernel.org, llvm@...ts.linux.dev, linux-hardening@...r.kernel.org Subject: Re: [PATCH] usb: gadget: f_midi: Annotate struct f_midi with __counted_by On Fri, 15 Sep 2023 12:59:39 -0700, Kees Cook wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS > (for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family > functions). > > As found with Coccinelle[1], add __counted_by for struct f_midi. > Additionally, since the element count member must be set before accessing > the annotated flexible array member, move its initialization earlier. > > [...] Applied to for-next/hardening, thanks! [1/1] usb: gadget: f_midi: Annotate struct f_midi with __counted_by https://git.kernel.org/kees/c/cfe2af2d553f Take care, -- Kees Cook
Powered by blists - more mailing lists