msgbuf: Handle pointer-overflow sanitization

The implementation explicitly checks for overflow, so don't trigger
ubsan on the fact that test suite explicitly exercises the explicit
overflow check.

Signed-off-by: Andrew Jeffery <andrew@aj.id.au>
Change-Id: Ifce702a08804e6ad715a6b28c6c8102ee903d060
diff --git a/src/msgbuf.h b/src/msgbuf.h
index 5489590..551ce46 100644
--- a/src/msgbuf.h
+++ b/src/msgbuf.h
@@ -32,8 +32,9 @@
  * PLDM_ERROR_INVALID_DATA if pointer parameters are invalid, or
  * PLDM_ERROR_INVALID_LENGTH if length constraints are violated.
  */
-static inline int pldm_msgbuf_init(struct pldm_msgbuf *ctx, size_t minsize,
-				   const void *buf, size_t len)
+__attribute__((no_sanitize("pointer-overflow"))) static inline int
+pldm_msgbuf_init(struct pldm_msgbuf *ctx, size_t minsize, const void *buf,
+		 size_t len)
 {
 	uint8_t *end;