Logo
Explore Help
Sign In
mirror/linux
1
0
Fork 0
You've already forked linux
Code Issues Pull Requests Packages Projects Releases Wiki Activity
Files
e2ed78d5d9ca07a2b9d158ebac366170a2d3083d
linux/lib/test_fortify
History
Kees Cook 28e77cc1c0 fortify: Detect struct member overflows in memset() at compile-time
As done for memcpy(), also update memset() to use the same tightened
compile-time bounds checking under CONFIG_FORTIFY_SOURCE.

Signed-off-by: Kees Cook <keescook@chromium.org>
2022-02-13 16:50:06 -08:00
..
read_overflow2_field-memcpy.c
…
read_overflow2_field-memmove.c
fortify: Detect struct member overflows in memmove() at compile-time
2022-02-13 16:50:06 -08:00
read_overflow2-memcmp.c
…
read_overflow2-memcpy.c
…
read_overflow2-memmove.c
…
read_overflow-memchr_inv.c
…
read_overflow-memchr.c
…
read_overflow-memcmp.c
…
read_overflow-memscan.c
…
test_fortify.h
…
write_overflow_field-memcpy.c
…
write_overflow_field-memmove.c
fortify: Detect struct member overflows in memmove() at compile-time
2022-02-13 16:50:06 -08:00
write_overflow_field-memset.c
fortify: Detect struct member overflows in memset() at compile-time
2022-02-13 16:50:06 -08:00
write_overflow-memcpy.c
…
write_overflow-memmove.c
…
write_overflow-memset.c
…
write_overflow-strcpy-lit.c
…
write_overflow-strcpy.c
…
write_overflow-strlcpy-src.c
…
write_overflow-strlcpy.c
…
write_overflow-strncpy-src.c
…
write_overflow-strncpy.c
…
write_overflow-strscpy.c
…
Powered by Gitea Version: 1.25.3 Page: 1062ms Template: 3ms
English
Bahasa Indonesia Deutsch English Español Français Gaeilge Italiano Latviešu Magyar nyelv Nederlands Polski Português de Portugal Português do Brasil Suomi Svenska Türkçe Čeština Ελληνικά Български Русский Українська فارسی മലയാളം 日本語 简体中文 繁體中文(台灣) 繁體中文(香港) 한국어
Licenses API