aboutsummaryrefslogtreecommitdiffstats
path: root/scripts/gdb/linux/tasks.py
diff options
context:
space:
mode:
authorDaniel Axtens <dja@axtens.net>2020-12-15 20:43:47 -0800
committerLinus Torvalds <torvalds@linux-foundation.org>2020-12-15 22:46:16 -0800
commitd96938daae2a2ae20e5d3d38ddb85d8afdaee628 (patch)
treef6acad466d3facc3dea1f146af9d86f19cd92f9e /scripts/gdb/linux/tasks.py
parentlib: string.h: detect intra-object overflow in fortified string functions (diff)
downloadlinux-dev-d96938daae2a2ae20e5d3d38ddb85d8afdaee628.tar.xz
linux-dev-d96938daae2a2ae20e5d3d38ddb85d8afdaee628.zip
lkdtm: tests for FORTIFY_SOURCE
Add code to test both: - runtime detection of the overrun of a structure. This covers the __builtin_object_size(x, 0) case. This test is called FORTIFY_OBJECT. - runtime detection of the overrun of a char array within a structure. This covers the __builtin_object_size(x, 1) case which can be used for some string functions. This test is called FORTIFY_SUBOBJECT. Link: https://lkml.kernel.org/r/20201122162451.27551-3-laniel_francis@privacyrequired.com Signed-off-by: Daniel Axtens <dja@axtens.net> Signed-off-by: Francis Laniel <laniel_francis@privacyrequired.com> Suggested-by: Kees Cook <keescook@chromium.org> Reviewed-by: Kees Cook <keescook@chromium.org> Cc: Daniel Micay <danielmicay@gmail.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'scripts/gdb/linux/tasks.py')
0 files changed, 0 insertions, 0 deletions