Logo
Explore Help
Sign In
dasharo/linux
0
0
Fork 0
You've already forked linux
mirror of https://github.com/Dasharo/linux.git synced 2026-03-06 15:25:10 -08:00
Code Issues Packages Projects Releases Wiki Activity
Files
f177cd0c15fcc7bdbb68d8d1a3166dead95314c8
linux/lib/test_fortify
History
Kees Cook 28e77cc1c0 fortify: Detect struct member overflows in memset() at compile-time
As done for memcpy(), also update memset() to use the same tightened
compile-time bounds checking under CONFIG_FORTIFY_SOURCE.

Signed-off-by: Kees Cook <keescook@chromium.org>
2022-02-13 16:50:06 -08:00
..
read_overflow2_field-memcpy.c
…
read_overflow2_field-memmove.c
fortify: Detect struct member overflows in memmove() at compile-time
2022-02-13 16:50:06 -08:00
read_overflow2-memcmp.c
…
read_overflow2-memcpy.c
…
read_overflow2-memmove.c
…
read_overflow-memchr_inv.c
…
read_overflow-memchr.c
…
read_overflow-memcmp.c
…
read_overflow-memscan.c
…
test_fortify.h
…
write_overflow_field-memcpy.c
…
write_overflow_field-memmove.c
fortify: Detect struct member overflows in memmove() at compile-time
2022-02-13 16:50:06 -08:00
write_overflow_field-memset.c
fortify: Detect struct member overflows in memset() at compile-time
2022-02-13 16:50:06 -08:00
write_overflow-memcpy.c
…
write_overflow-memmove.c
…
write_overflow-memset.c
…
write_overflow-strcpy-lit.c
…
write_overflow-strcpy.c
…
write_overflow-strlcpy-src.c
…
write_overflow-strlcpy.c
…
write_overflow-strncpy-src.c
…
write_overflow-strncpy.c
…
write_overflow-strscpy.c
…
Powered by Gitea Page: 1098ms Template: 14ms
English
English
Licenses API