/linux/lib/test_fortify/ |
H A D | read_overflow2-memcmp.c | be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | read_overflow-memchr.c | be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | read_overflow2-memmove.c | be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | write_overflow-memmove.c | be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | write_overflow-strcpy-lit.c | be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | read_overflow-memchr_inv.c | be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | write_overflow-strncpy.c | be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | write_overflow-strscpy.c | be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | write_overflow-strcpy.c | be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | read_overflow-memscan.c | be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | read_overflow-memcmp.c | be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | read_overflow2-memcpy.c | be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | write_overflow-strncpy-src.c | be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | write_overflow-memcpy.c | be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | write_overflow-memset.c | be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | test_fortify.h | be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
/linux/lib/ |
H A D | .gitignore | diff be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
H A D | Makefile | diff be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|
/linux/ |
H A D | MAINTAINERS | diff be58f7103700a68d5c7ca60a2bc0b309907599ab Wed Apr 21 08:22:52 CEST 2021 Kees Cook <keescook@chromium.org> fortify: Add compile-time FORTIFY_SOURCE tests
While the run-time testing of FORTIFY_SOURCE is already present in LKDTM, there is no testing of the expected compile-time detections. In preparation for correctly supporting FORTIFY_SOURCE under Clang, adding additional FORTIFY_SOURCE defenses, and making sure FORTIFY_SOURCE doesn't silently regress with GCC, introduce a build-time test suite that checks each expected compile-time failure condition.
As this is relatively backwards from standard build rules in the sense that a successful test is actually a compile _failure_, create a wrapper script to check for the correct errors, and wire it up as a dummy dependency to lib/string.o, collecting the results into a log file artifact.
Signed-off-by: Kees Cook <keescook@chromium.org>
|