Re: [PATCH 00/18] prevent bounds-check bypass via speculative execution

From: Arjan van de Ven
Date: Sat Jan 06 2018 - 13:59:18 EST


It sounds like Coverity was used to produce these patches? If so, is
there a plan to have smatch (hey Dan) or other open source static
analysis tool be possibly enhanced to do a similar type of work?

I'd love for that to happen; the tricky part is being able to have even a
sort of sensible concept of "trusted" vs "untrusted" value...

if you look at a very small window of code, that does not work well;
you likely need to even look (as tool) across .c file boundaries