summaryrefslogtreecommitdiff
path: root/Documentation/devicetree/bindings/spi
diff options
context:
space:
mode:
authorKees Cook <keescook@chromium.org>2023-09-22 20:53:23 +0300
committerMark Brown <broonie@kernel.org>2023-09-22 21:01:40 +0300
commitc40897f4730f4f9a37f3155e3e0452e1c8da37b4 (patch)
tree3c4b6628e89ab9960dfeb613f0dfa0d20297d980 /Documentation/devicetree/bindings/spi
parent21f252cd29f08892d48739fd7513ad79c1cff96a (diff)
downloadlinux-c40897f4730f4f9a37f3155e3e0452e1c8da37b4.tar.xz
spi: mchp-pci1xxxx: Annotate struct pci1xxxx_spi with __counted_by
Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family functions). As found with Coccinelle[1], add __counted_by for struct pci1xxxx_spi. [1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci Cc: Mark Brown <broonie@kernel.org> Cc: linux-spi@vger.kernel.org Signed-off-by: Kees Cook <keescook@chromium.org> Link: https://lore.kernel.org/r/20230922175322.work.170-kees@kernel.org Signed-off-by: Mark Brown <broonie@kernel.org>
Diffstat (limited to 'Documentation/devicetree/bindings/spi')
0 files changed, 0 insertions, 0 deletions