fortify_source · Supported
Maintainers
- M Kees Cook <kees@kernel.org>
Paths
- F
include/linux/fortify-string.h - F
lib/test_fortify/* - F
lib/tests/fortify_kunit.c - F
lib/tests/memcpy_kunit.c
Last 30 days
Recent patches
Most-recent 15 patches in this subsystem on linux-wireless, ordered by date desc.
-
[PATCH 04/32] fortify: Add run-time WARN for cross-field memcpy()
2022-05-04 · Kees Cook <hidden> -
[PATCH v2 27/63] fortify: Move remaining fortify helpers into fortify-string.h
2021-08-18 · Kees Cook <hidden> -
[PATCH v2 62/63] fortify: Detect struct member overflows in memset() at compile-time
2021-08-18 · Kees Cook <hidden> -
[PATCH v2 63/63] fortify: Work around Clang inlining bugs
2021-08-18 · Kees Cook <hidden> -
[PATCH v2 35/63] fortify: Detect struct member overflows in memmove() at compile-time
2021-08-18 · Kees Cook <hidden> -
[PATCH v2 31/63] fortify: Allow strlen() and strnlen() to pass compile-time known lengths
2021-08-18 · Kees Cook <hidden> -
[PATCH v2 30/63] fortify: Prepare to improve strnlen() and strlen() warnings
2021-08-18 · Kees Cook <hidden> -
[PATCH v2 34/63] fortify: Detect struct member overflows in memcpy() at compile-time
2021-08-18 · Kees Cook <hidden> -
[PATCH v2 29/63] fortify: Fix dropped strcpy() compile-time write overflow check
2021-08-18 · Kees Cook <hidden> -
[PATCH 59/64] fortify: Detect struct member overflows in memset() at compile-time
2021-07-27 · Kees Cook <hidden> -
[PATCH 35/64] fortify: Detect struct member overflows in memmove() at compile-time
2021-07-27 · Kees Cook <hidden> -
[PATCH 60/64] fortify: Work around Clang inlining bugs
2021-07-27 · Kees Cook <hidden> -
[PATCH 34/64] fortify: Detect struct member overflows in memcpy() at compile-time
2021-07-27 · Kees Cook <hidden> -
[PATCH 64/64] fortify: Add run-time WARN for cross-field memcpy()
2021-07-27 · Kees Cook <hidden> -
[PATCH 30/64] fortify: Move remaining fortify helpers into fortify-string.h
2021-07-27 · Kees Cook <hidden>