aboutsummaryrefslogtreecommitdiffstats
path: root/lib/test_fortify/write_overflow-strncpy.c
diff options
context:
space:
mode:
authorKees Cook <[email protected]>2021-08-03 05:51:31 +0000
committerKees Cook <[email protected]>2021-09-25 15:20:50 +0000
commit3009f891bb9f328945ebd5b71e12df7e2467f3dd (patch)
tree21639a71e598f1fd3c9f51bf1adeb2d2bf8a06e4 /lib/test_fortify/write_overflow-strncpy.c
parentfortify: Prepare to improve strnlen() and strlen() warnings (diff)
downloadkernel-3009f891bb9f328945ebd5b71e12df7e2467f3dd.tar.gz
kernel-3009f891bb9f328945ebd5b71e12df7e2467f3dd.zip
fortify: Allow strlen() and strnlen() to pass compile-time known lengths
Under CONFIG_FORTIFY_SOURCE, it is possible for the compiler to perform strlen() and strnlen() at compile-time when the string size is known. This is required to support compile-time overflow checking in strlcpy(). Signed-off-by: Kees Cook <[email protected]>
Diffstat (limited to 'lib/test_fortify/write_overflow-strncpy.c')
0 files changed, 0 insertions, 0 deletions