[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <170138161643.3648998.10002287194260761975.b4-ty@chromium.org>
Date: Thu, 30 Nov 2023 14:00:19 -0800
From: Kees Cook <keescook@...omium.org>
To: David Howells <dhowells@...hat.com>,
Marc Dionne <marc.dionne@...istor.com>,
"Gustavo A. R. Silva" <gustavoars@...nel.org>
Cc: Kees Cook <keescook@...omium.org>, linux-afs@...ts.infradead.org,
linux-kernel@...r.kernel.org, linux-hardening@...r.kernel.org
Subject: Re: [PATCH][next] afs: Add __counted_by for struct afs_acl and use struct_size()
On Tue, 10 Oct 2023 06:59:44 -0600, Gustavo A. R. Silva wrote:
> Prepare for the coming implementation by GCC and Clang of the __counted_by
> attribute. Flexible array members annotated with __counted_by can have
> their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for
> array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
> functions).
>
> While there, use struct_size() helper, instead of the open-coded
> version, to calculate the size for the allocation of the whole
> flexible structure, including of course, the flexible-array member.
>
> [...]
Applied to for-next/hardening, thanks!
[1/1] afs: Add __counted_by for struct afs_acl and use struct_size()
https://git.kernel.org/kees/c/7403e688f0c0
Take care,
--
Kees Cook
Powered by blists - more mailing lists