[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <170154914064.179444.11376018592445133931.b4-ty@chromium.org>
Date: Sat, 2 Dec 2023 12:32:23 -0800
From: Kees Cook <keescook@...omium.org>
To: Russell King <linux@...linux.org.uk>,
"Gustavo A. R. Silva" <gustavoars@...nel.org>
Cc: Kees Cook <keescook@...omium.org>,
linux-arm-kernel@...ts.infradead.org,
linux-kernel@...r.kernel.org,
linux-hardening@...r.kernel.org
Subject: Re: [PATCH][next] atags_proc: Add __counted_by for struct buffer and use struct_size()
On Tue, 10 Oct 2023 06:46:50 -0600, Gustavo A. R. Silva wrote:
> Prepare for the coming implementation by GCC and Clang of the __counted_by
> attribute. Flexible array members annotated with __counted_by can have
> their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for
> array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
> functions).
>
> While there, use struct_size() helper, instead of the open-coded
> version, to calculate the size for the allocation of the whole
> flexible structure, including of course, the flexible-array member.
>
> [...]
Applied to for-next/hardening, thanks!
[1/1] atags_proc: Add __counted_by for struct buffer and use struct_size()
https://git.kernel.org/kees/c/ac7110d883ff
Take care,
--
Kees Cook
Powered by blists - more mailing lists