[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <169521696355.3440140.11697535957050657885.b4-ty@kernel.org>
Date: Wed, 20 Sep 2023 14:36:03 +0100
From: Lee Jones <lee@...nel.org>
To: Pavel Machek <pavel@....cz>, Kees Cook <keescook@...omium.org>
Cc: Lee Jones <lee@...nel.org>, linux-leds@...r.kernel.org,
Nathan Chancellor <nathan@...nel.org>,
Nick Desaulniers <ndesaulniers@...gle.com>,
Tom Rix <trix@...hat.com>, linux-kernel@...r.kernel.org,
llvm@...ts.linux.dev, linux-hardening@...r.kernel.org
Subject: Re: (subset) [PATCH] leds: cr0014114: Annotate struct cr0014114
with __counted_by
On Fri, 15 Sep 2023 13:09:48 -0700, Kees Cook wrote:
> Prepare for the coming implementation by GCC and Clang of the __counted_by
> attribute. Flexible array members annotated with __counted_by can have
> their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS
> (for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
> functions).
>
> As found with Coccinelle[1], add __counted_by for struct cr0014114.
>
> [...]
Applied, thanks!
[1/1] leds: cr0014114: Annotate struct cr0014114 with __counted_by
commit: dfd75548c30c4a27bcc4c81aed0287d2e8b62add
--
Lee Jones [李琼斯]
Powered by blists - more mailing lists