Searched hist:"3 d965b33e40d973b450cb0212913f039476c16f4" (Results 1 – 6 of 6) sorted by relevance
/linux/arch/arm/boot/compressed/ |
H A D | misc.h | diff 3d965b33e40d973b450cb0212913f039476c16f4 Fri Apr 07 21:27:16 CEST 2023 Kees Cook <keescook@chromium.org> fortify: Improve buffer overflow reporting
Improve the reporting of buffer overflows under CONFIG_FORTIFY_SOURCE to help accelerate debugging efforts. The calculations are all just sitting in registers anyway, so pass them along to the function to be reported.
For example, before:
detected buffer overflow in memcpy
and after:
memcpy: detected buffer overflow: 4096 byte read of buffer size 1
Link: https://lore.kernel.org/r/20230407192717.636137-10-keescook@chromium.org Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | misc.c | diff 3d965b33e40d973b450cb0212913f039476c16f4 Fri Apr 07 21:27:16 CEST 2023 Kees Cook <keescook@chromium.org> fortify: Improve buffer overflow reporting
Improve the reporting of buffer overflows under CONFIG_FORTIFY_SOURCE to help accelerate debugging efforts. The calculations are all just sitting in registers anyway, so pass them along to the function to be reported.
For example, before:
detected buffer overflow in memcpy
and after:
memcpy: detected buffer overflow: 4096 byte read of buffer size 1
Link: https://lore.kernel.org/r/20230407192717.636137-10-keescook@chromium.org Signed-off-by: Kees Cook <keescook@chromium.org>
|
/linux/lib/ |
H A D | fortify_kunit.c | diff 3d965b33e40d973b450cb0212913f039476c16f4 Fri Apr 07 21:27:16 CEST 2023 Kees Cook <keescook@chromium.org> fortify: Improve buffer overflow reporting
Improve the reporting of buffer overflows under CONFIG_FORTIFY_SOURCE to help accelerate debugging efforts. The calculations are all just sitting in registers anyway, so pass them along to the function to be reported.
For example, before:
detected buffer overflow in memcpy
and after:
memcpy: detected buffer overflow: 4096 byte read of buffer size 1
Link: https://lore.kernel.org/r/20230407192717.636137-10-keescook@chromium.org Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | string_helpers.c | diff 3d965b33e40d973b450cb0212913f039476c16f4 Fri Apr 07 21:27:16 CEST 2023 Kees Cook <keescook@chromium.org> fortify: Improve buffer overflow reporting
Improve the reporting of buffer overflows under CONFIG_FORTIFY_SOURCE to help accelerate debugging efforts. The calculations are all just sitting in registers anyway, so pass them along to the function to be reported.
For example, before:
detected buffer overflow in memcpy
and after:
memcpy: detected buffer overflow: 4096 byte read of buffer size 1
Link: https://lore.kernel.org/r/20230407192717.636137-10-keescook@chromium.org Signed-off-by: Kees Cook <keescook@chromium.org>
|
/linux/include/linux/ |
H A D | fortify-string.h | diff 3d965b33e40d973b450cb0212913f039476c16f4 Fri Apr 07 21:27:16 CEST 2023 Kees Cook <keescook@chromium.org> fortify: Improve buffer overflow reporting
Improve the reporting of buffer overflows under CONFIG_FORTIFY_SOURCE to help accelerate debugging efforts. The calculations are all just sitting in registers anyway, so pass them along to the function to be reported.
For example, before:
detected buffer overflow in memcpy
and after:
memcpy: detected buffer overflow: 4096 byte read of buffer size 1
Link: https://lore.kernel.org/r/20230407192717.636137-10-keescook@chromium.org Signed-off-by: Kees Cook <keescook@chromium.org>
|
/linux/arch/x86/boot/compressed/ |
H A D | misc.c | diff 3d965b33e40d973b450cb0212913f039476c16f4 Fri Apr 07 21:27:16 CEST 2023 Kees Cook <keescook@chromium.org> fortify: Improve buffer overflow reporting
Improve the reporting of buffer overflows under CONFIG_FORTIFY_SOURCE to help accelerate debugging efforts. The calculations are all just sitting in registers anyway, so pass them along to the function to be reported.
For example, before:
detected buffer overflow in memcpy
and after:
memcpy: detected buffer overflow: 4096 byte read of buffer size 1
Link: https://lore.kernel.org/r/20230407192717.636137-10-keescook@chromium.org Signed-off-by: Kees Cook <keescook@chromium.org>
|