IF YOU WOULD LIKE TO GET AN ACCOUNT, please write an email to Administrator. User accounts are meant only to access repo and report issues and/or generate pull requests. This is a purpose-specific Git hosting for BaseALT projects. Thank you for your understanding!
Только зарегистрированные пользователи имеют доступ к сервису! Для получения аккаунта, обратитесь к администратору.
Logo
Explore Help
Sign In
iv/linux
1
0
Fork 0
You've already forked linux
Code Issues Pull Requests Actions Packages Projects Releases Wiki Activity
linux/lib/test_fortify
History
Kees Cook 28e77cc1c0 fortify: Detect struct member overflows in memset() at compile-time
As done for memcpy(), also update memset() to use the same tightened
compile-time bounds checking under CONFIG_FORTIFY_SOURCE.

Signed-off-by: Kees Cook <keescook@chromium.org>
2022-02-13 16:50:06 -08:00
..
read_overflow2_field-memcpy.c
…
read_overflow2_field-memmove.c
fortify: Detect struct member overflows in memmove() at compile-time
2022-02-13 16:50:06 -08:00
read_overflow2-memcmp.c
…
read_overflow2-memcpy.c
…
read_overflow2-memmove.c
…
read_overflow-memchr_inv.c
…
read_overflow-memchr.c
…
read_overflow-memcmp.c
…
read_overflow-memscan.c
…
test_fortify.h
…
write_overflow_field-memcpy.c
…
write_overflow_field-memmove.c
fortify: Detect struct member overflows in memmove() at compile-time
2022-02-13 16:50:06 -08:00
write_overflow_field-memset.c
fortify: Detect struct member overflows in memset() at compile-time
2022-02-13 16:50:06 -08:00
write_overflow-memcpy.c
…
write_overflow-memmove.c
…
write_overflow-memset.c
…
write_overflow-strcpy-lit.c
…
write_overflow-strcpy.c
…
write_overflow-strlcpy-src.c
…
write_overflow-strlcpy.c
…
write_overflow-strncpy-src.c
…
write_overflow-strncpy.c
…
write_overflow-strscpy.c
…
Powered by Gitea Version: 1.23.3 Page: 1085ms Template: 3ms
English
English Русский
Licenses API