fortify: Detect struct member overflows in memmove() at compile-time
authorKees Cook <keescook@chromium.org>
Wed, 16 Jun 2021 21:48:19 +0000 (14:48 -0700)
committerKees Cook <keescook@chromium.org>
Mon, 14 Feb 2022 00:50:06 +0000 (16:50 -0800)
commit938a000e3f9bead24ea753286b3e4d2423275c9e
treef3cdcabaea66b2f14b5488b6180cf552814b5aec
parentf68f2ff91512c199ec24883001245912afc17873
fortify: Detect struct member overflows in memmove() at compile-time

As done for memcpy(), also update memmove() to use the same tightened
compile-time checks under CONFIG_FORTIFY_SOURCE.

Signed-off-by: Kees Cook <keescook@chromium.org>
arch/x86/boot/compressed/misc.c
arch/x86/lib/memcpy_32.c
include/linux/fortify-string.h
lib/test_fortify/read_overflow2_field-memmove.c [new file with mode: 0644]
lib/test_fortify/write_overflow_field-memmove.c [new file with mode: 0644]