Home
last modified time | relevance | path

Searched hist:"3 d965b33e40d973b450cb0212913f039476c16f4" (Results 1 – 6 of 6) sorted by relevance

/linux/arch/arm/boot/compressed/
H A Dmisc.hdiff 3d965b33e40d973b450cb0212913f039476c16f4 Fri Apr 07 21:27:16 CEST 2023 Kees Cook <keescook@chromium.org> fortify: Improve buffer overflow reporting

Improve the reporting of buffer overflows under CONFIG_FORTIFY_SOURCE to
help accelerate debugging efforts. The calculations are all just sitting
in registers anyway, so pass them along to the function to be reported.

For example, before:

detected buffer overflow in memcpy

and after:

memcpy: detected buffer overflow: 4096 byte read of buffer size 1

Link: https://lore.kernel.org/r/20230407192717.636137-10-keescook@chromium.org
Signed-off-by: Kees Cook <keescook@chromium.org>
H A Dmisc.cdiff 3d965b33e40d973b450cb0212913f039476c16f4 Fri Apr 07 21:27:16 CEST 2023 Kees Cook <keescook@chromium.org> fortify: Improve buffer overflow reporting

Improve the reporting of buffer overflows under CONFIG_FORTIFY_SOURCE to
help accelerate debugging efforts. The calculations are all just sitting
in registers anyway, so pass them along to the function to be reported.

For example, before:

detected buffer overflow in memcpy

and after:

memcpy: detected buffer overflow: 4096 byte read of buffer size 1

Link: https://lore.kernel.org/r/20230407192717.636137-10-keescook@chromium.org
Signed-off-by: Kees Cook <keescook@chromium.org>
/linux/lib/
H A Dfortify_kunit.cdiff 3d965b33e40d973b450cb0212913f039476c16f4 Fri Apr 07 21:27:16 CEST 2023 Kees Cook <keescook@chromium.org> fortify: Improve buffer overflow reporting

Improve the reporting of buffer overflows under CONFIG_FORTIFY_SOURCE to
help accelerate debugging efforts. The calculations are all just sitting
in registers anyway, so pass them along to the function to be reported.

For example, before:

detected buffer overflow in memcpy

and after:

memcpy: detected buffer overflow: 4096 byte read of buffer size 1

Link: https://lore.kernel.org/r/20230407192717.636137-10-keescook@chromium.org
Signed-off-by: Kees Cook <keescook@chromium.org>
H A Dstring_helpers.cdiff 3d965b33e40d973b450cb0212913f039476c16f4 Fri Apr 07 21:27:16 CEST 2023 Kees Cook <keescook@chromium.org> fortify: Improve buffer overflow reporting

Improve the reporting of buffer overflows under CONFIG_FORTIFY_SOURCE to
help accelerate debugging efforts. The calculations are all just sitting
in registers anyway, so pass them along to the function to be reported.

For example, before:

detected buffer overflow in memcpy

and after:

memcpy: detected buffer overflow: 4096 byte read of buffer size 1

Link: https://lore.kernel.org/r/20230407192717.636137-10-keescook@chromium.org
Signed-off-by: Kees Cook <keescook@chromium.org>
/linux/include/linux/
H A Dfortify-string.hdiff 3d965b33e40d973b450cb0212913f039476c16f4 Fri Apr 07 21:27:16 CEST 2023 Kees Cook <keescook@chromium.org> fortify: Improve buffer overflow reporting

Improve the reporting of buffer overflows under CONFIG_FORTIFY_SOURCE to
help accelerate debugging efforts. The calculations are all just sitting
in registers anyway, so pass them along to the function to be reported.

For example, before:

detected buffer overflow in memcpy

and after:

memcpy: detected buffer overflow: 4096 byte read of buffer size 1

Link: https://lore.kernel.org/r/20230407192717.636137-10-keescook@chromium.org
Signed-off-by: Kees Cook <keescook@chromium.org>
/linux/arch/x86/boot/compressed/
H A Dmisc.cdiff 3d965b33e40d973b450cb0212913f039476c16f4 Fri Apr 07 21:27:16 CEST 2023 Kees Cook <keescook@chromium.org> fortify: Improve buffer overflow reporting

Improve the reporting of buffer overflows under CONFIG_FORTIFY_SOURCE to
help accelerate debugging efforts. The calculations are all just sitting
in registers anyway, so pass them along to the function to be reported.

For example, before:

detected buffer overflow in memcpy

and after:

memcpy: detected buffer overflow: 4096 byte read of buffer size 1

Link: https://lore.kernel.org/r/20230407192717.636137-10-keescook@chromium.org
Signed-off-by: Kees Cook <keescook@chromium.org>