summaryrefslogtreecommitdiffstats
path: root/include/linux/fortify-string.h
Commit message (Expand)AuthorAgeFilesLines
* fortify: strcat: Move definition to use fortified strlcat()Kees Cook2023-05-161-27/+26
* fortify: Add protection for strlcat()Kees Cook2023-05-161-0/+64
* fortify: Use const variables for __member_size trackingKees Cook2023-05-161-21/+21
* fortify: strscpy: Fix flipped q and p docstring typoArne Welzel2023-05-161-2/+2
* fortify: Use __builtin_dynamic_object_size() when availableKees Cook2023-01-051-0/+7
* Merge tag 'hardening-v6.2-rc1' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds2022-12-141-12/+136
|\
| * fortify: Do not cast to "unsigned char"Kees Cook2022-11-011-1/+1
| * fortify: Short-circuit known-safe calls to strscpy()Kees Cook2022-11-011-0/+10
| * string: Add __realloc_size hint to kmemdup()Kees Cook2022-11-011-1/+2
| * string: Rewrite and add more kern-doc for the str*() functionsKees Cook2022-10-281-10/+123
* | Merge tag 'hardening-v6.1-rc4' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds2022-11-041-4/+9
|\|
| * fortify: Capture __bos() results in const temp varsKees Cook2022-10-281-4/+9
* | x86: fortify: kmsan: fix KMSAN fortify buildsAlexander Potapenko2022-10-281-2/+15
|/
* Merge tag 'mm-stable-2022-10-08' of git://git.kernel.org/pub/scm/linux/kernel...Linus Torvalds2022-10-101-0/+2
|\
| * x86: kmsan: use __msan_ string functions where possible.Alexander Potapenko2022-10-031-0/+2
* | fortify: Convert to struct vs member helpersKees Cook2022-09-261-33/+35
* | fortify: Explicitly check bounds are compile-time constantsKees Cook2022-09-261-19/+30
* | fortify: Add run-time WARN for cross-field memcpy()Kees Cook2022-09-071-3/+67
* | fortify: Use SIZE_MAX instead of (size_t)-1Kees Cook2022-09-071-14/+15
* | fortify: Fix __compiletime_strlen() under UBSAN_BOUNDS_LOCALKees Cook2022-09-071-1/+2
* | string: Introduce strtomem() and strtomem_pad()Kees Cook2022-09-071-0/+32
|/
* fortify: Provide a memcpy trap door for sharp cornersKees Cook2022-05-121-0/+16
* fortify: Add Clang supportKees Cook2022-02-131-14/+26
* fortify: Make sure strlen() may still be used as a constant expressionKees Cook2022-02-131-2/+11
* fortify: Use __diagnose_as() for better diagnostic coverageKees Cook2022-02-131-7/+14
* fortify: Make pointer arguments constKees Cook2022-02-131-13/+13
* fortify: Replace open-coded __gnu_inline attributeKees Cook2022-02-131-1/+1
* fortify: Detect struct member overflows in memset() at compile-timeKees Cook2022-02-131-8/+46
* fortify: Detect struct member overflows in memmove() at compile-timeKees Cook2022-02-131-17/+4
* fortify: Detect struct member overflows in memcpy() at compile-timeKees Cook2022-02-131-12/+97
* fortify: strlen: Avoid shadowing previous localsQian Cai2021-10-251-12/+12
* fortify: Allow strlen() and strnlen() to pass compile-time known lengthsKees Cook2021-09-251-11/+38
* fortify: Prepare to improve strnlen() and strlen() warningsKees Cook2021-09-251-11/+11
* fortify: Fix dropped strcpy() compile-time write overflow checkKees Cook2021-09-251-1/+4
* fortify: Move remaining fortify helpers into fortify-string.hKees Cook2021-09-251-0/+7
* string.h: move fortified functions definitions in a dedicated header.Francis Laniel2021-02-261-0/+302