[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <66b317e630f6904cbddbb8affcf06b59b4c0ead8.camel@codeconstruct.com.au>
Date: Fri, 22 Sep 2023 11:48:11 -0700
From: Jeremy Kerr <jk@...econstruct.com.au>
To: Kees Cook <keescook@...omium.org>,
Alexandre Belloni <alexandre.belloni@...tlin.com>
Cc: Joel Stanley <joel@....id.au>, linux-i3c@...ts.infradead.org,
Nathan Chancellor <nathan@...nel.org>,
Nick Desaulniers <ndesaulniers@...gle.com>,
Tom Rix <trix@...hat.com>,
Uwe Kleine-König
<u.kleine-koenig@...gutronix.de>,
Matt Johnston <matt@...econstruct.com.au>,
Krzysztof Kozlowski <krzysztof.kozlowski@...aro.org>,
Jack Chen <zenghuchen@...gle.com>,
linux-kernel@...r.kernel.org, llvm@...ts.linux.dev,
linux-hardening@...r.kernel.org
Subject: Re: [PATCH] i3c: dw: Annotate struct dw_i3c_xfer with __counted_by
Hi Kees,
> Prepare for the coming implementation by GCC and Clang of the
> __counted_by attribute. Flexible array members annotated with
> __counted_by can have their accesses bounds-checked at run-time
> checking via CONFIG_UBSAN_BOUNDS (for array indexing) and
> CONFIG_FORTIFY_SOURCE (for strcpy/memcpy- family functions).
Nice!
Reviewed-by: Jeremy Kerr <jk@...econstruct.com.au>
Cheers,
Jeremy
Powered by blists - more mailing lists