Home
last modified time | relevance | path

Searched hist:"938 a000e" (Results 1 – 5 of 5) sorted by relevance

/openbmc/linux/lib/test_fortify/
H A Dread_overflow2_field-memmove.c938a000e Wed Jun 16 16:48:19 CDT 2021 Kees Cook <keescook@chromium.org> fortify: Detect struct member overflows in memmove() at compile-time

As done for memcpy(), also update memmove() to use the same tightened
compile-time checks under CONFIG_FORTIFY_SOURCE.

Signed-off-by: Kees Cook <keescook@chromium.org>
H A Dwrite_overflow_field-memmove.c938a000e Wed Jun 16 16:48:19 CDT 2021 Kees Cook <keescook@chromium.org> fortify: Detect struct member overflows in memmove() at compile-time

As done for memcpy(), also update memmove() to use the same tightened
compile-time checks under CONFIG_FORTIFY_SOURCE.

Signed-off-by: Kees Cook <keescook@chromium.org>
/openbmc/linux/arch/x86/lib/
H A Dmemcpy_32.c938a000e Wed Jun 16 16:48:19 CDT 2021 Kees Cook <keescook@chromium.org> fortify: Detect struct member overflows in memmove() at compile-time

As done for memcpy(), also update memmove() to use the same tightened
compile-time checks under CONFIG_FORTIFY_SOURCE.

Signed-off-by: Kees Cook <keescook@chromium.org>
/openbmc/linux/include/linux/
H A Dfortify-string.h938a000e Wed Jun 16 16:48:19 CDT 2021 Kees Cook <keescook@chromium.org> fortify: Detect struct member overflows in memmove() at compile-time

As done for memcpy(), also update memmove() to use the same tightened
compile-time checks under CONFIG_FORTIFY_SOURCE.

Signed-off-by: Kees Cook <keescook@chromium.org>
/openbmc/linux/arch/x86/boot/compressed/
H A Dmisc.c938a000e Wed Jun 16 16:48:19 CDT 2021 Kees Cook <keescook@chromium.org> fortify: Detect struct member overflows in memmove() at compile-time

As done for memcpy(), also update memmove() to use the same tightened
compile-time checks under CONFIG_FORTIFY_SOURCE.

Signed-off-by: Kees Cook <keescook@chromium.org>