linux-stable/arch/x86/boot/compressed
Kees Cook 3d965b33e4 fortify: Improve buffer overflow reporting
Improve the reporting of buffer overflows under CONFIG_FORTIFY_SOURCE to
help accelerate debugging efforts. The calculations are all just sitting
in registers anyway, so pass them along to the function to be reported.

For example, before:

  detected buffer overflow in memcpy

and after:

  memcpy: detected buffer overflow: 4096 byte read of buffer size 1

Link: https://lore.kernel.org/r/20230407192717.636137-10-keescook@chromium.org
Signed-off-by: Kees Cook <keescook@chromium.org>
2024-02-29 13:38:02 -08:00
..
.gitignore
Makefile arch/x86: Fix typos 2024-01-03 11:46:22 +01:00
acpi.c x86, kexec: fix the wrong ifdeffery CONFIG_KEXEC 2023-12-12 17:20:18 -08:00
cmdline.c x86/boot: Rename conflicting 'boot_params' pointer to 'boot_params_ptr' 2023-10-18 12:03:03 +02:00
cpuflags.c
early_serial_console.c
efi.c
efi.h
efi_mixed.S
error.c
error.h
head_32.S
head_64.S
ident_map_64.c x86/boot: Ignore NMIs during very early boot 2023-11-30 09:55:40 +01:00
idt_64.c x86/boot: Ignore NMIs during very early boot 2023-11-30 09:55:40 +01:00
idt_handlers_64.S x86/boot: Ignore NMIs during very early boot 2023-11-30 09:55:40 +01:00
kaslr.c x86/boot: Rename conflicting 'boot_params' pointer to 'boot_params_ptr' 2023-10-18 12:03:03 +02:00
kernel_info.S
mem.c arch/x86: Fix typos 2024-01-03 11:46:22 +01:00
mem_encrypt.S
misc.c fortify: Improve buffer overflow reporting 2024-02-29 13:38:02 -08:00
misc.h x86/boot: Ignore NMIs during very early boot 2023-11-30 09:55:40 +01:00
mkpiggy.c
pgtable.h
pgtable_64.c x86/boot: Rename conflicting 'boot_params' pointer to 'boot_params_ptr' 2023-10-18 12:03:03 +02:00
sev.c x86 MM handling code changes for v6.7: 2023-10-30 15:40:57 -10:00
sev.h
string.c
tdcall.S
tdx-shared.c
tdx.c x86/tdx: Remove 'struct tdx_hypercall_args' 2023-09-12 16:30:14 -07:00
tdx.h
vmlinux.lds.S x86/boot: Increase section and file alignment to 4k/512 2023-09-17 19:48:44 +02:00