Logo
Explore Help
Register Sign In
mirrors/linux
1
0
Fork 0
You've already forked linux
mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git synced 2026-01-11 14:14:53 -05:00
Code Issues Packages Projects Releases Wiki Activity
Files
c19edff61210eb846bf8ec44c9f87d1ca9efdfd2
linux/lib/test_fortify
History
Kees Cook 28e77cc1c0 fortify: Detect struct member overflows in memset() at compile-time
As done for memcpy(), also update memset() to use the same tightened
compile-time bounds checking under CONFIG_FORTIFY_SOURCE.

Signed-off-by: Kees Cook <keescook@chromium.org>
2022-02-13 16:50:06 -08:00
..
read_overflow2_field-memcpy.c
…
read_overflow2_field-memmove.c
fortify: Detect struct member overflows in memmove() at compile-time
2022-02-13 16:50:06 -08:00
read_overflow2-memcmp.c
…
read_overflow2-memcpy.c
…
read_overflow2-memmove.c
…
read_overflow-memchr_inv.c
…
read_overflow-memchr.c
…
read_overflow-memcmp.c
…
read_overflow-memscan.c
…
test_fortify.h
…
write_overflow_field-memcpy.c
…
write_overflow_field-memmove.c
fortify: Detect struct member overflows in memmove() at compile-time
2022-02-13 16:50:06 -08:00
write_overflow_field-memset.c
fortify: Detect struct member overflows in memset() at compile-time
2022-02-13 16:50:06 -08:00
write_overflow-memcpy.c
…
write_overflow-memmove.c
…
write_overflow-memset.c
…
write_overflow-strcpy-lit.c
…
write_overflow-strcpy.c
…
write_overflow-strlcpy-src.c
…
write_overflow-strlcpy.c
…
write_overflow-strncpy-src.c
…
write_overflow-strncpy.c
…
write_overflow-strscpy.c
…
Powered by Gitea Version: 1.24.7 Page: 1214ms Template: 2ms
English
Bahasa Indonesia Deutsch English Español Français Gaeilge Italiano Latviešu Magyar nyelv Nederlands Polski Português de Portugal Português do Brasil Suomi Svenska Türkçe Čeština Ελληνικά Български Русский Українська فارسی മലയാളം 日本語 简体中文 繁體中文(台灣) 繁體中文(香港) 한국어
Licenses API