Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1750876AbeAPVBN (ORCPT + 1 other); Tue, 16 Jan 2018 16:01:13 -0500 Received: from mail-ua0-f193.google.com ([209.85.217.193]:33605 "EHLO mail-ua0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750750AbeAPVBL (ORCPT ); Tue, 16 Jan 2018 16:01:11 -0500 X-Google-Smtp-Source: ACJfBosX3cpxe+OZe4bMLWYRqF1eB2Uk+NVYuO29QQabsF7e7BRQmh6qg8QHsgAmfmO4y7pvD/Mut9ID+Dei+BKM7gQ= MIME-Version: 1.0 In-Reply-To: <151571799008.27429.12325141216769795517.stgit@dwillia2-desk3.amr.corp.intel.com> References: <151571798296.27429.7166552848688034184.stgit@dwillia2-desk3.amr.corp.intel.com> <151571799008.27429.12325141216769795517.stgit@dwillia2-desk3.amr.corp.intel.com> From: Kees Cook Date: Tue, 16 Jan 2018 13:01:09 -0800 X-Google-Sender-Auth: Ak45CcFtc0OEu0hZqrKYWlmFhcE Message-ID: Subject: Re: [PATCH v2 01/19] Documentation: document array_ptr To: Dan Williams , Mark Rutland Cc: LKML , linux-arch , kernel-hardening@lists.openwall.com, Peter Zijlstra , Jonathan Corbet , Will Deacon , Thomas Gleixner , Linus Torvalds , Andrew Morton , Alan Cox Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On Thu, Jan 11, 2018 at 4:46 PM, Dan Williams wrote: > From: Mark Rutland > > Document the rationale and usage of the new array_ptr() helper. > > Signed-off-by: Mark Rutland > Signed-off-by: Will Deacon > Cc: Dan Williams > Cc: Jonathan Corbet > Cc: Peter Zijlstra > Signed-off-by: Dan Williams > --- > Documentation/speculation.txt | 142 +++++++++++++++++++++++++++++++++++++++++ > [...] > +NULL is returned. Additionally, array_ptr() an out-of-bounds poitner is > +not propagated to code which is speculatively executed. I think this meant to say: Additionally, array_ptr() of an out-of-bounds pointer is not propagated to code which is speculatively executed. Other than that: Reviewed-by: Kees Cook -Kees -- Kees Cook Pixel Security