Logo
Explore Help
Register Sign In
mirrors/linux
1
0
Fork 0
You've already forked linux
mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git synced 2026-01-01 18:02:10 -05:00
Code Issues Packages Projects Releases Wiki Activity
Files
adc18506941dcafe216aba80766ab51c890358e8
linux/lib/test_fortify
History
Kees Cook 28e77cc1c0 fortify: Detect struct member overflows in memset() at compile-time
As done for memcpy(), also update memset() to use the same tightened
compile-time bounds checking under CONFIG_FORTIFY_SOURCE.

Signed-off-by: Kees Cook <keescook@chromium.org>
2022-02-13 16:50:06 -08:00
..
read_overflow2_field-memcpy.c
…
read_overflow2_field-memmove.c
fortify: Detect struct member overflows in memmove() at compile-time
2022-02-13 16:50:06 -08:00
read_overflow2-memcmp.c
…
read_overflow2-memcpy.c
…
read_overflow2-memmove.c
…
read_overflow-memchr_inv.c
…
read_overflow-memchr.c
…
read_overflow-memcmp.c
…
read_overflow-memscan.c
…
test_fortify.h
…
write_overflow_field-memcpy.c
…
write_overflow_field-memmove.c
fortify: Detect struct member overflows in memmove() at compile-time
2022-02-13 16:50:06 -08:00
write_overflow_field-memset.c
fortify: Detect struct member overflows in memset() at compile-time
2022-02-13 16:50:06 -08:00
write_overflow-memcpy.c
…
write_overflow-memmove.c
…
write_overflow-memset.c
…
write_overflow-strcpy-lit.c
…
write_overflow-strcpy.c
…
write_overflow-strlcpy-src.c
…
write_overflow-strlcpy.c
…
write_overflow-strncpy-src.c
…
write_overflow-strncpy.c
…
write_overflow-strscpy.c
…
Powered by Gitea Version: 1.24.7 Page: 1247ms Template: 120ms
English
Bahasa Indonesia Deutsch English Español Français Gaeilge Italiano Latviešu Magyar nyelv Nederlands Polski Português de Portugal Português do Brasil Suomi Svenska Türkçe Čeština Ελληνικά Български Русский Українська فارسی മലയാളം 日本語 简体中文 繁體中文(台灣) 繁體中文(香港) 한국어
Licenses API