* [PATCH 0/7] RDMA: Annotate structs with __counted_by
@ 2023-09-29 18:04 Kees Cook
2023-09-29 18:04 ` [PATCH 1/7] RDMA: Annotate struct rdma_hw_stats " Kees Cook
` (7 more replies)
0 siblings, 8 replies; 9+ messages in thread
From: Kees Cook @ 2023-09-29 18:04 UTC (permalink / raw)
To: Jason Gunthorpe
Cc: Kees Cook, Dennis Dalessandro, Leon Romanovsky, Håkon Bugge,
Avihai Horon, Anand Khoje, Mark Bloch, Christian Benvenuti,
Nelson Escobar, Bernard Metzler, Bart Van Assche,
Gustavo A. R. Silva, Nathan Chancellor, Nick Desaulniers,
Tom Rix, Patrisious Haddad, Chuck Lever, Tom Talpey, wangjianli,
linux-kernel, linux-rdma, linux-hardening, llvm
Hi,
This annotates several structures with the coming __counted_by attribute
for bounds checking of flexible arrays at run-time. For more details, see
commit dd06e72e68bc ("Compiler Attributes: Add __counted_by macro").
Thanks!
-Kees
Kees Cook (7):
RDMA: Annotate struct rdma_hw_stats with __counted_by
RDMA/core: Annotate struct ib_pkey_cache with __counted_by
RDMA/usnic: Annotate struct usnic_uiom_chunk with __counted_by
RDMA/siw: Annotate struct siw_pbl with __counted_by
IB/srp: Annotate struct srp_fr_pool with __counted_by
IB/mthca: Annotate struct mthca_icm_table with __counted_by
IB/hfi1: Annotate struct tid_rb_node with __counted_by
drivers/infiniband/core/cache.c | 2 +-
drivers/infiniband/hw/hfi1/user_exp_rcv.h | 2 +-
drivers/infiniband/hw/mthca/mthca_memfree.h | 2 +-
drivers/infiniband/hw/usnic/usnic_uiom.h | 2 +-
drivers/infiniband/sw/siw/siw.h | 2 +-
drivers/infiniband/ulp/srp/ib_srp.h | 2 +-
include/rdma/ib_verbs.h | 2 +-
7 files changed, 7 insertions(+), 7 deletions(-)
--
2.34.1
^ permalink raw reply [flat|nested] 9+ messages in thread
* [PATCH 1/7] RDMA: Annotate struct rdma_hw_stats with __counted_by
2023-09-29 18:04 [PATCH 0/7] RDMA: Annotate structs with __counted_by Kees Cook
@ 2023-09-29 18:04 ` Kees Cook
2023-09-29 18:04 ` [PATCH 2/7] RDMA/core: Annotate struct ib_pkey_cache " Kees Cook
` (6 subsequent siblings)
7 siblings, 0 replies; 9+ messages in thread
From: Kees Cook @ 2023-09-29 18:04 UTC (permalink / raw)
To: Jason Gunthorpe
Cc: Kees Cook, Leon Romanovsky, linux-rdma, Dennis Dalessandro,
Håkon Bugge, Avihai Horon, Anand Khoje, Mark Bloch,
Christian Benvenuti, Nelson Escobar, Bernard Metzler,
Bart Van Assche, Gustavo A. R. Silva, Nathan Chancellor,
Nick Desaulniers, Tom Rix, Patrisious Haddad, Chuck Lever,
Tom Talpey, wangjianli, linux-kernel, linux-hardening, llvm
Prepare for the coming implementation by GCC and Clang of the __counted_by
attribute. Flexible array members annotated with __counted_by can have
their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS
(for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
functions).
As found with Coccinelle[1], add __counted_by for struct rdma_hw_stats.
[1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci
Cc: Jason Gunthorpe <jgg@ziepe.ca>
Cc: Leon Romanovsky <leon@kernel.org>
Cc: linux-rdma@vger.kernel.org
Signed-off-by: Kees Cook <keescook@chromium.org>
---
include/rdma/ib_verbs.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/include/rdma/ib_verbs.h b/include/rdma/ib_verbs.h
index e36c0d9aad27..79bcdebbe228 100644
--- a/include/rdma/ib_verbs.h
+++ b/include/rdma/ib_verbs.h
@@ -607,7 +607,7 @@ struct rdma_hw_stats {
const struct rdma_stat_desc *descs;
unsigned long *is_disabled;
int num_counters;
- u64 value[];
+ u64 value[] __counted_by(num_counters);
};
#define RDMA_HW_STATS_DEFAULT_LIFESPAN 10
--
2.34.1
^ permalink raw reply related [flat|nested] 9+ messages in thread
* [PATCH 2/7] RDMA/core: Annotate struct ib_pkey_cache with __counted_by
2023-09-29 18:04 [PATCH 0/7] RDMA: Annotate structs with __counted_by Kees Cook
2023-09-29 18:04 ` [PATCH 1/7] RDMA: Annotate struct rdma_hw_stats " Kees Cook
@ 2023-09-29 18:04 ` Kees Cook
2023-09-29 18:04 ` [PATCH 3/7] RDMA/usnic: Annotate struct usnic_uiom_chunk " Kees Cook
` (5 subsequent siblings)
7 siblings, 0 replies; 9+ messages in thread
From: Kees Cook @ 2023-09-29 18:04 UTC (permalink / raw)
To: Jason Gunthorpe
Cc: Kees Cook, Leon Romanovsky, Håkon Bugge, Avihai Horon,
Anand Khoje, Mark Bloch, linux-rdma, Dennis Dalessandro,
Christian Benvenuti, Nelson Escobar, Bernard Metzler,
Bart Van Assche, Gustavo A. R. Silva, Nathan Chancellor,
Nick Desaulniers, Tom Rix, Patrisious Haddad, Chuck Lever,
Tom Talpey, wangjianli, linux-kernel, linux-hardening, llvm
Prepare for the coming implementation by GCC and Clang of the __counted_by
attribute. Flexible array members annotated with __counted_by can have
their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS
(for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
functions).
As found with Coccinelle[1], add __counted_by for struct ib_pkey_cache.
[1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci
Cc: Jason Gunthorpe <jgg@ziepe.ca>
Cc: Leon Romanovsky <leon@kernel.org>
Cc: "Håkon Bugge" <haakon.bugge@oracle.com>
Cc: Avihai Horon <avihaih@nvidia.com>
Cc: Anand Khoje <anand.a.khoje@oracle.com>
Cc: Mark Bloch <mbloch@nvidia.com>
Cc: linux-rdma@vger.kernel.org
Signed-off-by: Kees Cook <keescook@chromium.org>
---
drivers/infiniband/core/cache.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/infiniband/core/cache.c b/drivers/infiniband/core/cache.c
index 7acc0f936dad..c02a96d3572a 100644
--- a/drivers/infiniband/core/cache.c
+++ b/drivers/infiniband/core/cache.c
@@ -46,7 +46,7 @@
struct ib_pkey_cache {
int table_len;
- u16 table[];
+ u16 table[] __counted_by(table_len);
};
struct ib_update_work {
--
2.34.1
^ permalink raw reply related [flat|nested] 9+ messages in thread
* [PATCH 3/7] RDMA/usnic: Annotate struct usnic_uiom_chunk with __counted_by
2023-09-29 18:04 [PATCH 0/7] RDMA: Annotate structs with __counted_by Kees Cook
2023-09-29 18:04 ` [PATCH 1/7] RDMA: Annotate struct rdma_hw_stats " Kees Cook
2023-09-29 18:04 ` [PATCH 2/7] RDMA/core: Annotate struct ib_pkey_cache " Kees Cook
@ 2023-09-29 18:04 ` Kees Cook
2023-09-29 18:04 ` [PATCH 4/7] RDMA/siw: Annotate struct siw_pbl " Kees Cook
` (4 subsequent siblings)
7 siblings, 0 replies; 9+ messages in thread
From: Kees Cook @ 2023-09-29 18:04 UTC (permalink / raw)
To: Jason Gunthorpe
Cc: Kees Cook, Christian Benvenuti, Nelson Escobar, Leon Romanovsky,
linux-rdma, Dennis Dalessandro, Håkon Bugge, Avihai Horon,
Anand Khoje, Mark Bloch, Bernard Metzler, Bart Van Assche,
Gustavo A. R. Silva, Nathan Chancellor, Nick Desaulniers,
Tom Rix, Patrisious Haddad, Chuck Lever, Tom Talpey, wangjianli,
linux-kernel, linux-hardening, llvm
Prepare for the coming implementation by GCC and Clang of the __counted_by
attribute. Flexible array members annotated with __counted_by can have
their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS
(for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
functions).
As found with Coccinelle[1], add __counted_by for struct usnic_uiom_chunk.
[1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci
Cc: Christian Benvenuti <benve@cisco.com>
Cc: Nelson Escobar <neescoba@cisco.com>
Cc: Jason Gunthorpe <jgg@ziepe.ca>
Cc: Leon Romanovsky <leon@kernel.org>
Cc: linux-rdma@vger.kernel.org
Signed-off-by: Kees Cook <keescook@chromium.org>
---
drivers/infiniband/hw/usnic/usnic_uiom.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/infiniband/hw/usnic/usnic_uiom.h b/drivers/infiniband/hw/usnic/usnic_uiom.h
index 5a9acf941510..70d51d919d12 100644
--- a/drivers/infiniband/hw/usnic/usnic_uiom.h
+++ b/drivers/infiniband/hw/usnic/usnic_uiom.h
@@ -77,7 +77,7 @@ struct usnic_uiom_reg {
struct usnic_uiom_chunk {
struct list_head list;
int nents;
- struct scatterlist page_list[];
+ struct scatterlist page_list[] __counted_by(nents);
};
struct usnic_uiom_pd *usnic_uiom_alloc_pd(struct device *dev);
--
2.34.1
^ permalink raw reply related [flat|nested] 9+ messages in thread
* [PATCH 4/7] RDMA/siw: Annotate struct siw_pbl with __counted_by
2023-09-29 18:04 [PATCH 0/7] RDMA: Annotate structs with __counted_by Kees Cook
` (2 preceding siblings ...)
2023-09-29 18:04 ` [PATCH 3/7] RDMA/usnic: Annotate struct usnic_uiom_chunk " Kees Cook
@ 2023-09-29 18:04 ` Kees Cook
2023-09-29 18:04 ` [PATCH 5/7] IB/srp: Annotate struct srp_fr_pool " Kees Cook
` (3 subsequent siblings)
7 siblings, 0 replies; 9+ messages in thread
From: Kees Cook @ 2023-09-29 18:04 UTC (permalink / raw)
To: Jason Gunthorpe
Cc: Kees Cook, Bernard Metzler, Leon Romanovsky, linux-rdma,
Dennis Dalessandro, Håkon Bugge, Avihai Horon, Anand Khoje,
Mark Bloch, Christian Benvenuti, Nelson Escobar, Bart Van Assche,
Gustavo A. R. Silva, Nathan Chancellor, Nick Desaulniers,
Tom Rix, Patrisious Haddad, Chuck Lever, Tom Talpey, wangjianli,
linux-kernel, linux-hardening, llvm
Prepare for the coming implementation by GCC and Clang of the __counted_by
attribute. Flexible array members annotated with __counted_by can have
their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS
(for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
functions).
As found with Coccinelle[1], add __counted_by for struct siw_pbl.
[1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci
Cc: Bernard Metzler <bmt@zurich.ibm.com>
Cc: Jason Gunthorpe <jgg@ziepe.ca>
Cc: Leon Romanovsky <leon@kernel.org>
Cc: linux-rdma@vger.kernel.org
Signed-off-by: Kees Cook <keescook@chromium.org>
---
drivers/infiniband/sw/siw/siw.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/infiniband/sw/siw/siw.h b/drivers/infiniband/sw/siw/siw.h
index 1c78c1ca7d7a..cec5cccd2e75 100644
--- a/drivers/infiniband/sw/siw/siw.h
+++ b/drivers/infiniband/sw/siw/siw.h
@@ -137,7 +137,7 @@ struct siw_pble {
struct siw_pbl {
unsigned int num_buf;
unsigned int max_buf;
- struct siw_pble pbe[];
+ struct siw_pble pbe[] __counted_by(max_buf);
};
/*
--
2.34.1
^ permalink raw reply related [flat|nested] 9+ messages in thread
* [PATCH 5/7] IB/srp: Annotate struct srp_fr_pool with __counted_by
2023-09-29 18:04 [PATCH 0/7] RDMA: Annotate structs with __counted_by Kees Cook
` (3 preceding siblings ...)
2023-09-29 18:04 ` [PATCH 4/7] RDMA/siw: Annotate struct siw_pbl " Kees Cook
@ 2023-09-29 18:04 ` Kees Cook
2023-09-29 18:04 ` [PATCH 6/7] IB/mthca: Annotate struct mthca_icm_table " Kees Cook
` (2 subsequent siblings)
7 siblings, 0 replies; 9+ messages in thread
From: Kees Cook @ 2023-09-29 18:04 UTC (permalink / raw)
To: Jason Gunthorpe
Cc: Kees Cook, Bart Van Assche, Leon Romanovsky, linux-rdma,
Dennis Dalessandro, Håkon Bugge, Avihai Horon, Anand Khoje,
Mark Bloch, Christian Benvenuti, Nelson Escobar, Bernard Metzler,
Gustavo A. R. Silva, Nathan Chancellor, Nick Desaulniers,
Tom Rix, Patrisious Haddad, Chuck Lever, Tom Talpey, wangjianli,
linux-kernel, linux-hardening, llvm
Prepare for the coming implementation by GCC and Clang of the __counted_by
attribute. Flexible array members annotated with __counted_by can have
their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS
(for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
functions).
As found with Coccinelle[1], add __counted_by for struct srp_fr_pool.
[1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci
Cc: Bart Van Assche <bvanassche@acm.org>
Cc: Jason Gunthorpe <jgg@ziepe.ca>
Cc: Leon Romanovsky <leon@kernel.org>
Cc: linux-rdma@vger.kernel.org
Signed-off-by: Kees Cook <keescook@chromium.org>
---
drivers/infiniband/ulp/srp/ib_srp.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/infiniband/ulp/srp/ib_srp.h b/drivers/infiniband/ulp/srp/ib_srp.h
index 5d94db453df3..349576ff3845 100644
--- a/drivers/infiniband/ulp/srp/ib_srp.h
+++ b/drivers/infiniband/ulp/srp/ib_srp.h
@@ -306,7 +306,7 @@ struct srp_fr_pool {
int max_page_list_len;
spinlock_t lock;
struct list_head free_list;
- struct srp_fr_desc desc[];
+ struct srp_fr_desc desc[] __counted_by(size);
};
/**
--
2.34.1
^ permalink raw reply related [flat|nested] 9+ messages in thread
* [PATCH 6/7] IB/mthca: Annotate struct mthca_icm_table with __counted_by
2023-09-29 18:04 [PATCH 0/7] RDMA: Annotate structs with __counted_by Kees Cook
` (4 preceding siblings ...)
2023-09-29 18:04 ` [PATCH 5/7] IB/srp: Annotate struct srp_fr_pool " Kees Cook
@ 2023-09-29 18:04 ` Kees Cook
2023-09-29 18:04 ` [PATCH 7/7] IB/hfi1: Annotate struct tid_rb_node " Kees Cook
2023-10-02 11:45 ` [PATCH 0/7] RDMA: Annotate structs " Leon Romanovsky
7 siblings, 0 replies; 9+ messages in thread
From: Kees Cook @ 2023-09-29 18:04 UTC (permalink / raw)
To: Jason Gunthorpe
Cc: Kees Cook, Leon Romanovsky, linux-rdma, Dennis Dalessandro,
Håkon Bugge, Avihai Horon, Anand Khoje, Mark Bloch,
Christian Benvenuti, Nelson Escobar, Bernard Metzler,
Bart Van Assche, Gustavo A. R. Silva, Nathan Chancellor,
Nick Desaulniers, Tom Rix, Patrisious Haddad, Chuck Lever,
Tom Talpey, wangjianli, linux-kernel, linux-hardening, llvm
Prepare for the coming implementation by GCC and Clang of the __counted_by
attribute. Flexible array members annotated with __counted_by can have
their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS
(for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
functions).
As found with Coccinelle[1], add __counted_by for struct mthca_icm_table.
[1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci
Cc: Jason Gunthorpe <jgg@ziepe.ca>
Cc: Leon Romanovsky <leon@kernel.org>
Cc: linux-rdma@vger.kernel.org
Signed-off-by: Kees Cook <keescook@chromium.org>
---
drivers/infiniband/hw/mthca/mthca_memfree.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/infiniband/hw/mthca/mthca_memfree.h b/drivers/infiniband/hw/mthca/mthca_memfree.h
index f9a2e65e2ff5..61d5bbba293a 100644
--- a/drivers/infiniband/hw/mthca/mthca_memfree.h
+++ b/drivers/infiniband/hw/mthca/mthca_memfree.h
@@ -68,7 +68,7 @@ struct mthca_icm_table {
int lowmem;
int coherent;
struct mutex mutex;
- struct mthca_icm *icm[];
+ struct mthca_icm *icm[] __counted_by(num_icm);
};
struct mthca_icm_iter {
--
2.34.1
^ permalink raw reply related [flat|nested] 9+ messages in thread
* [PATCH 7/7] IB/hfi1: Annotate struct tid_rb_node with __counted_by
2023-09-29 18:04 [PATCH 0/7] RDMA: Annotate structs with __counted_by Kees Cook
` (5 preceding siblings ...)
2023-09-29 18:04 ` [PATCH 6/7] IB/mthca: Annotate struct mthca_icm_table " Kees Cook
@ 2023-09-29 18:04 ` Kees Cook
2023-10-02 11:45 ` [PATCH 0/7] RDMA: Annotate structs " Leon Romanovsky
7 siblings, 0 replies; 9+ messages in thread
From: Kees Cook @ 2023-09-29 18:04 UTC (permalink / raw)
To: Jason Gunthorpe
Cc: Kees Cook, Dennis Dalessandro, Leon Romanovsky, linux-rdma,
Håkon Bugge, Avihai Horon, Anand Khoje, Mark Bloch,
Christian Benvenuti, Nelson Escobar, Bernard Metzler,
Bart Van Assche, Gustavo A. R. Silva, Nathan Chancellor,
Nick Desaulniers, Tom Rix, Patrisious Haddad, Chuck Lever,
Tom Talpey, wangjianli, linux-kernel, linux-hardening, llvm
Prepare for the coming implementation by GCC and Clang of the __counted_by
attribute. Flexible array members annotated with __counted_by can have
their accesses bounds-checked at run-time checking via CONFIG_UBSAN_BOUNDS
(for array indexing) and CONFIG_FORTIFY_SOURCE (for strcpy/memcpy-family
functions).
As found with Coccinelle[1], add __counted_by for struct tid_rb_node.
[1] https://github.com/kees/kernel-tools/blob/trunk/coccinelle/examples/counted_by.cocci
Cc: Dennis Dalessandro <dennis.dalessandro@cornelisnetworks.com>
Cc: Jason Gunthorpe <jgg@ziepe.ca>
Cc: Leon Romanovsky <leon@kernel.org>
Cc: linux-rdma@vger.kernel.org
Signed-off-by: Kees Cook <keescook@chromium.org>
---
drivers/infiniband/hw/hfi1/user_exp_rcv.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/infiniband/hw/hfi1/user_exp_rcv.h b/drivers/infiniband/hw/hfi1/user_exp_rcv.h
index b85de9070aee..055726f7c139 100644
--- a/drivers/infiniband/hw/hfi1/user_exp_rcv.h
+++ b/drivers/infiniband/hw/hfi1/user_exp_rcv.h
@@ -36,7 +36,7 @@ struct tid_rb_node {
dma_addr_t dma_addr;
bool freed;
unsigned int npages;
- struct page *pages[];
+ struct page *pages[] __counted_by(npages);
};
static inline int num_user_pages(unsigned long addr,
--
2.34.1
^ permalink raw reply related [flat|nested] 9+ messages in thread
* Re: [PATCH 0/7] RDMA: Annotate structs with __counted_by
2023-09-29 18:04 [PATCH 0/7] RDMA: Annotate structs with __counted_by Kees Cook
` (6 preceding siblings ...)
2023-09-29 18:04 ` [PATCH 7/7] IB/hfi1: Annotate struct tid_rb_node " Kees Cook
@ 2023-10-02 11:45 ` Leon Romanovsky
7 siblings, 0 replies; 9+ messages in thread
From: Leon Romanovsky @ 2023-10-02 11:45 UTC (permalink / raw)
To: Jason Gunthorpe, Kees Cook
Cc: Dennis Dalessandro, Håkon Bugge, Avihai Horon, Anand Khoje,
Mark Bloch, Christian Benvenuti, Nelson Escobar, Bernard Metzler,
Bart Van Assche, Gustavo A. R. Silva, Nathan Chancellor,
Nick Desaulniers, Tom Rix, Patrisious Haddad, Chuck Lever,
Tom Talpey, wangjianli, linux-kernel, linux-rdma,
linux-hardening, llvm
On Fri, 29 Sep 2023 11:04:23 -0700, Kees Cook wrote:
> This annotates several structures with the coming __counted_by attribute
> for bounds checking of flexible arrays at run-time. For more details, see
> commit dd06e72e68bc ("Compiler Attributes: Add __counted_by macro").
>
> Thanks!
>
> -Kees
>
> [...]
Applied, thanks!
[1/7] RDMA: Annotate struct rdma_hw_stats with __counted_by
https://git.kernel.org/rdma/rdma/c/4755dc6f29597d
[2/7] RDMA/core: Annotate struct ib_pkey_cache with __counted_by
https://git.kernel.org/rdma/rdma/c/fc424078f50840
[3/7] RDMA/usnic: Annotate struct usnic_uiom_chunk with __counted_by
https://git.kernel.org/rdma/rdma/c/ed7c64de622ff9
[4/7] RDMA/siw: Annotate struct siw_pbl with __counted_by
https://git.kernel.org/rdma/rdma/c/0bc018b7a7b733
[5/7] IB/srp: Annotate struct srp_fr_pool with __counted_by
https://git.kernel.org/rdma/rdma/c/bd8eec5bfa59b5
[6/7] IB/mthca: Annotate struct mthca_icm_table with __counted_by
https://git.kernel.org/rdma/rdma/c/2aba54a9e0ead5
[7/7] IB/hfi1: Annotate struct tid_rb_node with __counted_by
https://git.kernel.org/rdma/rdma/c/964168970cef5f
Best regards,
--
Leon Romanovsky <leon@kernel.org>
^ permalink raw reply [flat|nested] 9+ messages in thread
end of thread, other threads:[~2023-10-02 11:45 UTC | newest]
Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-09-29 18:04 [PATCH 0/7] RDMA: Annotate structs with __counted_by Kees Cook
2023-09-29 18:04 ` [PATCH 1/7] RDMA: Annotate struct rdma_hw_stats " Kees Cook
2023-09-29 18:04 ` [PATCH 2/7] RDMA/core: Annotate struct ib_pkey_cache " Kees Cook
2023-09-29 18:04 ` [PATCH 3/7] RDMA/usnic: Annotate struct usnic_uiom_chunk " Kees Cook
2023-09-29 18:04 ` [PATCH 4/7] RDMA/siw: Annotate struct siw_pbl " Kees Cook
2023-09-29 18:04 ` [PATCH 5/7] IB/srp: Annotate struct srp_fr_pool " Kees Cook
2023-09-29 18:04 ` [PATCH 6/7] IB/mthca: Annotate struct mthca_icm_table " Kees Cook
2023-09-29 18:04 ` [PATCH 7/7] IB/hfi1: Annotate struct tid_rb_node " Kees Cook
2023-10-02 11:45 ` [PATCH 0/7] RDMA: Annotate structs " Leon Romanovsky
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).