diff options
author | Kees Cook <keescook@chromium.org> | 2021-08-03 07:51:31 +0200 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2021-09-25 17:20:50 +0200 |
commit | 3009f891bb9f328945ebd5b71e12df7e2467f3dd (patch) | |
tree | 21639a71e598f1fd3c9f51bf1adeb2d2bf8a06e4 /drivers/nvmem/meson-efuse.c | |
parent | fortify: Prepare to improve strnlen() and strlen() warnings (diff) | |
download | linux-3009f891bb9f328945ebd5b71e12df7e2467f3dd.tar.xz linux-3009f891bb9f328945ebd5b71e12df7e2467f3dd.zip |
fortify: Allow strlen() and strnlen() to pass compile-time known lengths
Under CONFIG_FORTIFY_SOURCE, it is possible for the compiler to perform
strlen() and strnlen() at compile-time when the string size is known.
This is required to support compile-time overflow checking in strlcpy().
Signed-off-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'drivers/nvmem/meson-efuse.c')
0 files changed, 0 insertions, 0 deletions