diff options
author | 2020-12-15 20:43:47 -0800 | |
---|---|---|
committer | 2020-12-15 22:46:16 -0800 | |
commit | d96938daae2a2ae20e5d3d38ddb85d8afdaee628 (patch) | |
tree | f6acad466d3facc3dea1f146af9d86f19cd92f9e /tools/perf/scripts/python/export-to-sqlite.py | |
parent | lib: string.h: detect intra-object overflow in fortified string functions (diff) | |
download | linux-dev-d96938daae2a2ae20e5d3d38ddb85d8afdaee628.tar.xz linux-dev-d96938daae2a2ae20e5d3d38ddb85d8afdaee628.zip |
lkdtm: tests for FORTIFY_SOURCE
Add code to test both:
- runtime detection of the overrun of a structure. This covers the
__builtin_object_size(x, 0) case. This test is called FORTIFY_OBJECT.
- runtime detection of the overrun of a char array within a structure.
This covers the __builtin_object_size(x, 1) case which can be used
for some string functions. This test is called FORTIFY_SUBOBJECT.
Link: https://lkml.kernel.org/r/20201122162451.27551-3-laniel_francis@privacyrequired.com
Signed-off-by: Daniel Axtens <dja@axtens.net>
Signed-off-by: Francis Laniel <laniel_francis@privacyrequired.com>
Suggested-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Kees Cook <keescook@chromium.org>
Cc: Daniel Micay <danielmicay@gmail.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'tools/perf/scripts/python/export-to-sqlite.py')
0 files changed, 0 insertions, 0 deletions