Re: [PATCH][next] ALSA: 6fire: Fix undefined behavior bug in struct comm_runtime

2023-10-06 Thread Takashi Iwai
On Fri, 29 Sep 2023 17:59:22 +0200, Gustavo A. R. Silva wrote: > > `struct urb` is a flexible structure, which means that it contains a > flexible-array member at the bottom. This could potentially lead to an > overwrite of the objects following `receiver` in `struct comm_runtime`, > among them so

Re: [PATCH][next] ALSA: 6fire: Fix undefined behavior bug in struct midi_runtime

2023-10-06 Thread Takashi Iwai
On Fri, 29 Sep 2023 18:06:32 +0200, Gustavo A. R. Silva wrote: > > `struct urb` is a flexible structure, which means that it contains a > flexible-array member at the bottom. This could potentially lead to an > overwrite of the objects following `out_urb` in `struct midi_runtime`, > among them a f

Re: [PATCH v2] net: dsa: lan9303: use ethtool_sprintf() for lan9303_get_strings()

2023-10-06 Thread Alexander Lobakin
From: Justin Stitt Date: Thu, 05 Oct 2023 18:56:50 + > This pattern of strncpy with some pointer arithmetic setting fixed-sized > intervals with string literal data is a bit weird so let's use > ethtool_sprintf() as this has more obvious behavior and is less-error > prone. [...] > diff --gi

Re: [PATCH] nfp: nsp: Annotate struct nfp_eth_table with __counted_by

2023-10-06 Thread patchwork-bot+netdevbpf
Hello: This patch was applied to netdev/net-next.git (main) by David S. Miller : On Tue, 3 Oct 2023 16:18:51 -0700 you wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bou

Re: [PATCH] netlink: Annotate struct netlink_policy_dump_state with __counted_by

2023-10-06 Thread patchwork-bot+netdevbpf
Hello: This patch was applied to netdev/net-next.git (main) by David S. Miller : On Tue, 3 Oct 2023 16:21:02 -0700 you wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bou

Re: [PATCH] nexthop: Annotate struct nh_notifier_grp_info with __counted_by

2023-10-06 Thread patchwork-bot+netdevbpf
Hello: This patch was applied to netdev/net-next.git (main) by David S. Miller : On Tue, 3 Oct 2023 16:21:47 -0700 you wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bou

Re: [PATCH] nexthop: Annotate struct nh_group with __counted_by

2023-10-06 Thread patchwork-bot+netdevbpf
Hello: This patch was applied to netdev/net-next.git (main) by David S. Miller : On Tue, 3 Oct 2023 18:44:49 -0700 you wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bou

Re: [PATCH] net/packet: Annotate struct packet_fanout with __counted_by

2023-10-06 Thread patchwork-bot+netdevbpf
Hello: This patch was applied to netdev/net-next.git (main) by David S. Miller : On Tue, 3 Oct 2023 16:17:41 -0700 you wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bou

Re: [PATCH] flow_offload: Annotate struct flow_action_entry with __counted_by

2023-10-06 Thread patchwork-bot+netdevbpf
Hello: This patch was applied to netdev/net-next.git (main) by David S. Miller : On Tue, 3 Oct 2023 16:18:33 -0700 you wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bou

Re: [PATCH v2] net: sched: cls_u32: Fix allocation size in u32_init()

2023-10-06 Thread patchwork-bot+netdevbpf
Hello: This patch was applied to netdev/net.git (main) by David S. Miller : On Wed, 4 Oct 2023 15:19:37 +0200 you wrote: > commit d61491a51f7e ("net/sched: cls_u32: Replace one-element array > with flexible-array member") incorrecly replaced an instance of > `sizeof(*tp_c)` with `struct_size(tp_c

RE: [PATCH] net: ena: replace deprecated strncpy with strscpy

2023-10-06 Thread Kiyanovski, Arthur
> -Original Message- > From: Kees Cook > Sent: Friday, October 6, 2023 1:39 AM > To: Kiyanovski, Arthur > Cc: Justin Stitt ; Agroskin, Shay > ; Arinzon, David ; Dagan, > Noam ; Bshara, Saeed ; David > S. Miller ; Eric Dumazet ; > Jakub Kicinski ; Paolo Abeni ; > net...@vger.kernel.org;

Re: [PATCH] MAINTAINERS: Include additional ASoC paths

2023-10-06 Thread Mark Brown
On Wed, 04 Oct 2023 12:34:45 -0700, Kees Cook wrote: > Make sure a few other paths are correctly sent to the ASoC maintainers. > > Applied to https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git for-next Thanks! [1/1] MAINTAINERS: Include additional ASoC paths commit: 21

Re: [PATCH] MAINTAINERS: Include sof headers under ASoC

2023-10-06 Thread Mark Brown
On Wed, 04 Oct 2023 19:56:21 -0700, Kees Cook wrote: > Add missing sof header files for ASoC. > > Applied to https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git for-next Thanks! [1/1] MAINTAINERS: Include sof headers under ASoC commit: 4b226f15421d160cc07ff497179547f559

Re: [PATCH 0/5] chelsio: Annotate structs with __counted_by

2023-10-06 Thread Jakub Kicinski
On Fri, 6 Oct 2023 01:58:54 +0530 Ayush Sawal wrote: >  The current maintainer for cxgb4 driver is Sourabh Sagar > , I have added him in the CC. >  He will update the MAINTAINERS file for cxgb4 driver. Thanks & looking forward to the update!

[PATCH] bpf: Annotate struct bpf_stack_map with __counted_by

2023-10-06 Thread Kees Cook
Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family functions). A

[PATCH] pinctrl: samsung: Annotate struct exynos_muxed_weint_data with __counted_by

2023-10-06 Thread Kees Cook
Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family functions). A

[PATCH] wifi: rtw89: coex: Annotate struct rtw89_btc_btf_set_slot_table with __counted_by

2023-10-06 Thread Kees Cook
Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family functions). A

[PATCH] wifi: p54: Annotate struct p54_cal_database with __counted_by

2023-10-06 Thread Kees Cook
Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family functions). A

[PATCH] mtd: rawnand: Annotate struct mtk_nfc_nand_chip with __counted_by

2023-10-06 Thread Kees Cook
Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family functions). A

[PATCH] mtd: rawnand: cadence: Annotate struct cdns_nand_chip with __counted_by

2023-10-06 Thread Kees Cook
Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family functions). A

[PATCH] Input: Annotate struct ff_device with __counted_by

2023-10-06 Thread Kees Cook
Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family functions). A

[PATCH] driver core: platform: Annotate struct irq_affinity_devres with __counted_by

2023-10-06 Thread Kees Cook
Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family functions). A

[PATCH] perf/x86/rapl: Annotate struct rapl_pmus with __counted_by

2023-10-06 Thread Kees Cook
Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family functions). A

[PATCH] wifi: intersil: hostap: Annotate struct prism2_download_data with __counted_by

2023-10-06 Thread Kees Cook
Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family functions). A

Re: [PATCH] wifi: mt76: Annotate struct mt76_rx_tid with __counted_by

2023-10-06 Thread Kees Cook
On Fri, Sep 15, 2023 at 01:06:12PM -0700, Kees Cook wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS > (for array

Re: [PATCH] ASoC: apple: mca: Annotate struct mca_data with __counted_by

2023-10-06 Thread Kees Cook
On Fri, Sep 22, 2023 at 10:50:50AM -0700, Kees Cook wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS > (for array

Re: [PATCH] sparc: Annotate struct cpuinfo_tree with __counted_by

2023-10-06 Thread Kees Cook
On Fri, 22 Sep 2023 10:52:00 -0700, Kees Cook wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS > (for array indexi

Re: [PATCH] media: allegro: Annotate struct mcu_msg_push_buffers_internal with __counted_by

2023-10-06 Thread Kees Cook
On Fri, 22 Sep 2023 10:49:36 -0700, Kees Cook wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS > (for array indexi

Re: [PATCH] media: v4l2-event: Annotate struct v4l2_subscribed_event with __counted_by

2023-10-06 Thread Kees Cook
On Fri, 22 Sep 2023 10:49:52 -0700, Kees Cook wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS > (for array indexi

Re: [PATCH] hwmon: Annotate struct gsc_hwmon_platform_data with __counted_by

2023-10-06 Thread Kees Cook
On Fri, 22 Sep 2023 10:50:53 -0700, Kees Cook wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS > (for array indexi

Re: [PATCH] regulator: da9063: Annotate struct da9063_regulators with __counted_by

2023-10-06 Thread Kees Cook
On Fri, Sep 22, 2023 at 10:52:07AM -0700, Kees Cook wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS > (for array

Re: [PATCH] mailbox: zynqmp: Annotate struct zynqmp_ipi_pdata with __counted_by

2023-10-06 Thread Kees Cook
On Fri, 22 Sep 2023 10:53:51 -0700, Kees Cook wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS > (for array indexi

Re: [PATCH] drivers: thermal: tsens: Annotate struct tsens_priv with __counted_by

2023-10-06 Thread Kees Cook
On Fri, 22 Sep 2023 10:53:41 -0700, Kees Cook wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS > (for array indexi

Re: [PATCH] irqchip/imx-intmux: Annotate struct intmux_data with __counted_by

2023-10-06 Thread Kees Cook
On Fri, 22 Sep 2023 10:51:32 -0700, Kees Cook wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS > (for array indexi

Re: [PATCH] virt: acrn: Annotate struct vm_memory_region_batch with __counted_by

2023-10-06 Thread Kees Cook
On Fri, 22 Sep 2023 10:51:02 -0700, Kees Cook wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS > (for array indexi

Re: [PATCH] KVM: Annotate struct kvm_irq_routing_table with __counted_by

2023-10-06 Thread Kees Cook
On Fri, 22 Sep 2023 10:51:21 -0700, Kees Cook wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS > (for array indexi

Re: [PATCH] wifi: intersil: hostap: Annotate struct prism2_download_data with __counted_by

2023-10-06 Thread Gustavo A. R. Silva
On 10/6/23 22:19, Kees Cook wrote: Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE

Re: [PATCH] perf/x86/rapl: Annotate struct rapl_pmus with __counted_by

2023-10-06 Thread Gustavo A. R. Silva
On 10/6/23 22:17, Kees Cook wrote: Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE

Re: [PATCH] driver core: platform: Annotate struct irq_affinity_devres with __counted_by

2023-10-06 Thread Gustavo A. R. Silva
On 10/6/23 22:17, Kees Cook wrote: Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE

Re: [PATCH] Input: Annotate struct ff_device with __counted_by

2023-10-06 Thread Gustavo A. R. Silva
On 10/6/23 22:17, Kees Cook wrote: Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE

Re: [PATCH] mtd: rawnand: cadence: Annotate struct cdns_nand_chip with __counted_by

2023-10-06 Thread Gustavo A. R. Silva
On 10/6/23 22:17, Kees Cook wrote: Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE

Re: [PATCH] ASoC: apple: mca: Annotate struct mca_data with __counted_by

2023-10-06 Thread Mark Brown
On Fri, Oct 06, 2023 at 01:22:55PM -0700, Kees Cook wrote: > On Fri, Sep 22, 2023 at 10:50:50AM -0700, Kees Cook wrote: > > Prepare for the coming implementation by GCC and Clang of the __counted_by > > attribute. Flexible array members annotated with __counted_by can have > > their accesses bound

Re: [PATCH] regulator: da9063: Annotate struct da9063_regulators with __counted_by

2023-10-06 Thread Mark Brown
On Fri, Oct 06, 2023 at 01:40:08PM -0700, Kees Cook wrote: > On Fri, Sep 22, 2023 at 10:52:07AM -0700, Kees Cook wrote: > > Prepare for the coming implementation by GCC and Clang of the __counted_by > > attribute. Flexible array members annotated with __counted_by can have > > their accesses bound

Re: [PATCH] bpf: Annotate struct bpf_stack_map with __counted_by

2023-10-06 Thread Stanislav Fomichev
On 10/06, Kees Cook wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for > array indexing) and CONFIG_FORTIFY_SOURCE (for

Re: [PATCH] bpf: Annotate struct bpf_stack_map with __counted_by

2023-10-06 Thread patchwork-bot+netdevbpf
Hello: This patch was applied to bpf/bpf-next.git (master) by Daniel Borkmann : On Fri, 6 Oct 2023 13:17:00 -0700 you wrote: > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses boun

Missing cache considerations in randstruct performance feature

2023-10-06 Thread Lukas Loidolt
Hello! I have been looking into the implementation of the "randstruct" gcc-plugin and noticed a potential bug in its performance version, which is supposed to limit randomization to cache-line sized groupings of structure members. I haven't been able to find too much documentation on this vers

Re: [PATCH] net: ax88796c: replace deprecated strncpy with strscpy

2023-10-06 Thread patchwork-bot+netdevbpf
Hello: This patch was applied to netdev/net-next.git (main) by Jakub Kicinski : On Thu, 05 Oct 2023 01:06:26 + you wrote: > `strncpy` is deprecated for use on NUL-terminated destination strings > [1] and as such we should prefer more robust and less ambiguous string > interfaces. > > A suita

Re: [PATCH] net: atheros: replace deprecated strncpy with strscpy

2023-10-06 Thread patchwork-bot+netdevbpf
Hello: This patch was applied to netdev/net-next.git (main) by Jakub Kicinski : On Thu, 05 Oct 2023 01:29:45 + you wrote: > `strncpy` is deprecated for use on NUL-terminated destination strings > [1] and as such we should prefer more robust and less ambiguous string > interfaces. > > We expe

Re: [PATCH] bpf: Annotate struct bpf_stack_map with __counted_by

2023-10-06 Thread Gustavo A. R. Silva
On 10/6/23 22:17, Kees Cook wrote: Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE

Re: [PATCH] mtd: rawnand: Annotate struct mtk_nfc_nand_chip with __counted_by

2023-10-06 Thread Gustavo A. R. Silva
On 10/6/23 22:17, Kees Cook wrote: Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE

Re: [PATCH] wifi: p54: Annotate struct p54_cal_database with __counted_by

2023-10-06 Thread Gustavo A. R. Silva
On 10/6/23 22:17, Kees Cook wrote: Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE

Re: [PATCH] pinctrl: samsung: Annotate struct exynos_muxed_weint_data with __counted_by

2023-10-06 Thread Gustavo A. R. Silva
On 10/6/23 22:17, Kees Cook wrote: Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE

Re: [PATCH] wifi: rtw89: coex: Annotate struct rtw89_btc_btf_set_slot_table with __counted_by

2023-10-06 Thread Gustavo A. R. Silva
On 10/6/23 22:17, Kees Cook wrote: Prepare for the coming implementation by GCC and Clang of the __counted_by attribute. Flexible array members annotated with __counted_by can have their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for array indexing) and CONFIG_FORTIFY_SOURCE

Re: [PATCH] wifi: rtw89: coex: Annotate struct rtw89_btc_btf_set_slot_table with __counted_by

2023-10-06 Thread Ping-Ke Shih
On Fri, 2023-10-06 at 13:17 -0700, Kees Cook wrote: > > Prepare for the coming implementation by GCC and Clang of the __counted_by > attribute. Flexible array members annotated with __counted_by can have > their accesses bounds-checked at run-time via CONFIG_UBSAN_BOUNDS (for > array indexing) and

Re: Missing cache considerations in randstruct performance feature

2023-10-06 Thread Kees Cook
On Sat, Oct 07, 2023 at 12:30:01AM +0200, Lukas Loidolt wrote: > Hello! > > I have been looking into the implementation of the "randstruct" gcc-plugin > and noticed a potential bug in its performance version, which is supposed to > limit randomization to cache-line sized groupings of structure mem

Re: [PATCH] wifi: mt76: Annotate struct mt76_rx_tid with __counted_by

2023-10-06 Thread Kalle Valo
Kees Cook writes: > On Fri, Sep 15, 2023 at 01:06:12PM -0700, Kees Cook wrote: >> Prepare for the coming implementation by GCC and Clang of the __counted_by >> attribute. Flexible array members annotated with __counted_by can have >> their accesses bounds-checked at run-time checking via CONFIG_U

Re: Missing cache considerations in randstruct performance feature

2023-10-06 Thread Kees Cook
On Sat, Oct 07, 2023 at 12:30:01AM +0200, Lukas Loidolt wrote: > In my tests, however, the performance version behaves more or less like the > full version of randstruct. Can you try this patch? commit d73a3244700d3c945cedea7e1fb7042243c41e08 Author: Kees Cook AuthorDate: Fri Oct 6 21:09:28