1. 22 Aug, 2023 2 commits
    • Kees Cook's avatar
      clk: qcom: clk-spmi-pmic-div: Annotate struct spmi_pmic_div_clk_cc with __counted_by · a5be6db5
      Kees Cook authored
      Prepare for the coming implementation by GCC and Clang of the __counted_by
      attribute. Flexible array members annotated with __counted_by can have
      their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS
      (for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
      functions).
      
      As found with Coccinelle[1], add __counted_by for struct spmi_pmic_div_clk_cc.
      
      [1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci
      
      Cc: Bjorn Andersson <andersson@kernel.org>
      Cc: Andy Gross <agross@kernel.org>
      Cc: Konrad Dybcio <konrad.dybcio@linaro.org>
      Cc: Michael Turquette <mturquette@baylibre.com>
      Cc: Stephen Boyd <sboyd@kernel.org>
      Cc: linux-arm-msm@vger.kernel.org
      Cc: linux-clk@vger.kernel.org
      Signed-off-by: default avatarKees Cook <keescook@chromium.org>
      Link: https://lore.kernel.org/r/20230817202941.never.657-kees@kernel.orgReviewed-by: default avatarGustavo A. R. Silva <gustavoars@kernel.org>
      Signed-off-by: default avatarStephen Boyd <sboyd@kernel.org>
      a5be6db5
    • Kees Cook's avatar
      clk: Annotate struct clk_hw_onecell_data with __counted_by · f316cdff
      Kees Cook authored
      Prepare for the coming implementation by GCC and Clang of the __counted_by
      attribute. Flexible array members annotated with __counted_by can have
      their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS
      (for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
      functions).
      
      As found with Coccinelle[1], add __counted_by for struct clk_hw_onecell_data.
      Additionally, since the element count member must be set before accessing
      the annotated flexible array member, move its initialization earlier.
      
      [1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci
      
      Cc: Michael Turquette <mturquette@baylibre.com>
      Cc: Stephen Boyd <sboyd@kernel.org>
      Cc: Joel Stanley <joel@jms.id.au>
      Cc: Andrew Jeffery <andrew@aj.id.au>
      Cc: Taichi Sugaya <sugaya.taichi@socionext.com>
      Cc: Takao Orito <orito.takao@socionext.com>
      Cc: Qin Jian <qinjian@cqplus1.com>
      Cc: Andrew Lunn <andrew@lunn.ch>
      Cc: Gregory Clement <gregory.clement@bootlin.com>
      Cc: Sebastian Hesselbarth <sebastian.hesselbarth@gmail.com>
      Cc: Andy Gross <agross@kernel.org>
      Cc: Bjorn Andersson <andersson@kernel.org>
      Cc: Konrad Dybcio <konrad.dybcio@linaro.org>
      Cc: Sergio Paracuellos <sergio.paracuellos@gmail.com>
      Cc: Matthias Brugger <matthias.bgg@gmail.com>
      Cc: AngeloGioacchino Del Regno <angelogioacchino.delregno@collabora.com>
      Cc: Maxime Ripard <mripard@kernel.org>
      Cc: Chen-Yu Tsai <wens@csie.org>
      Cc: Jernej Skrabec <jernej.skrabec@gmail.com>
      Cc: David Airlie <airlied@gmail.com>
      Cc: Daniel Vetter <daniel@ffwll.ch>
      Cc: Samuel Holland <samuel@sholland.org>
      Cc: Vinod Koul <vkoul@kernel.org>
      Cc: Kishon Vijay Abraham I <kishon@kernel.org>
      Cc: linux-clk@vger.kernel.org
      Cc: linux-arm-kernel@lists.infradead.org
      Cc: linux-aspeed@lists.ozlabs.org
      Cc: linux-arm-msm@vger.kernel.org
      Cc: linux-mediatek@lists.infradead.org
      Cc: dri-devel@lists.freedesktop.org
      Cc: linux-sunxi@lists.linux.dev
      Cc: linux-phy@lists.infradead.org
      Signed-off-by: default avatarKees Cook <keescook@chromium.org>
      Link: https://lore.kernel.org/r/20230817203019.never.795-kees@kernel.orgReviewed-by: default avatarGustavo A. R. Silva <gustavoars@kernel.org>
      Signed-off-by: default avatarStephen Boyd <sboyd@kernel.org>
      f316cdff
  2. 09 Jul, 2023 10 commits
  3. 08 Jul, 2023 28 commits