WSL2-Linux-Kernel/lib/test_fortify
Kees Cook 28e77cc1c0 fortify: Detect struct member overflows in memset() at compile-time
As done for memcpy(), also update memset() to use the same tightened
compile-time bounds checking under CONFIG_FORTIFY_SOURCE.

Signed-off-by: Kees Cook <keescook@chromium.org>
2022-02-13 16:50:06 -08:00
..
read_overflow-memchr.c
read_overflow-memchr_inv.c
read_overflow-memcmp.c
read_overflow-memscan.c
read_overflow2-memcmp.c
read_overflow2-memcpy.c
read_overflow2-memmove.c
read_overflow2_field-memcpy.c
read_overflow2_field-memmove.c fortify: Detect struct member overflows in memmove() at compile-time 2022-02-13 16:50:06 -08:00
test_fortify.h
write_overflow-memcpy.c
write_overflow-memmove.c
write_overflow-memset.c
write_overflow-strcpy-lit.c
write_overflow-strcpy.c
write_overflow-strlcpy-src.c
write_overflow-strlcpy.c
write_overflow-strncpy-src.c
write_overflow-strncpy.c
write_overflow-strscpy.c
write_overflow_field-memcpy.c
write_overflow_field-memmove.c fortify: Detect struct member overflows in memmove() at compile-time 2022-02-13 16:50:06 -08:00
write_overflow_field-memset.c fortify: Detect struct member overflows in memset() at compile-time 2022-02-13 16:50:06 -08:00