2
0
mirror of https://github.com/edk2-porting/linux-next.git synced 2024-12-28 15:13:55 +08:00
linux-next/lib/test_fortify
Kees Cook 28e77cc1c0 fortify: Detect struct member overflows in memset() at compile-time
As done for memcpy(), also update memset() to use the same tightened
compile-time bounds checking under CONFIG_FORTIFY_SOURCE.

Signed-off-by: Kees Cook <keescook@chromium.org>
2022-02-13 16:50:06 -08:00
..
read_overflow2_field-memcpy.c
read_overflow2_field-memmove.c fortify: Detect struct member overflows in memmove() at compile-time 2022-02-13 16:50:06 -08:00
read_overflow2-memcmp.c
read_overflow2-memcpy.c
read_overflow2-memmove.c
read_overflow-memchr_inv.c
read_overflow-memchr.c
read_overflow-memcmp.c
read_overflow-memscan.c
test_fortify.h
write_overflow_field-memcpy.c
write_overflow_field-memmove.c fortify: Detect struct member overflows in memmove() at compile-time 2022-02-13 16:50:06 -08:00
write_overflow_field-memset.c fortify: Detect struct member overflows in memset() at compile-time 2022-02-13 16:50:06 -08:00
write_overflow-memcpy.c
write_overflow-memmove.c
write_overflow-memset.c
write_overflow-strcpy-lit.c
write_overflow-strcpy.c
write_overflow-strlcpy-src.c
write_overflow-strlcpy.c
write_overflow-strncpy-src.c
write_overflow-strncpy.c
write_overflow-strscpy.c