diff options
author | Kees Cook <keescook@chromium.org> | 2022-10-02 19:17:03 +0300 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2022-11-01 20:04:52 +0300 |
commit | 62e1cbfc5d795381a0f237ae7ee229a92d51cf9e (patch) | |
tree | cf730cfe96c528feef173c9e5ae642485ac84f44 /lib/siphash_kunit.c | |
parent | 41eefc46a3a4682976afb5f8c4b9734ed6bfd406 (diff) | |
download | linux-62e1cbfc5d795381a0f237ae7ee229a92d51cf9e.tar.xz |
fortify: Short-circuit known-safe calls to strscpy()
Replacing compile-time safe calls of strcpy()-related functions with
strscpy() was always calling the full strscpy() logic when a builtin
would be better. For example:
char buf[16];
strcpy(buf, "yes");
would reduce to __builtin_memcpy(buf, "yes", 4), but not if it was:
strscpy(buf, yes, sizeof(buf));
Fix this by checking if all sizes are known at compile-time.
Cc: linux-hardening@vger.kernel.org
Tested-by: Nathan Chancellor <nathan@kernel.org>
Signed-off-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'lib/siphash_kunit.c')
0 files changed, 0 insertions, 0 deletions