Lines Matching +full:20 +full:a

16 		char a[10];  in lkdtm_FORTIFY_STR_OBJECT()  member
21 * 'size' at compile time. Without that, we would get a compile error in lkdtm_FORTIFY_STR_OBJECT()
22 * rather than a runtime error. in lkdtm_FORTIFY_STR_OBJECT()
24 volatile int size = 20; in lkdtm_FORTIFY_STR_OBJECT()
26 pr_info("trying to strcmp() past the end of a struct\n"); in lkdtm_FORTIFY_STR_OBJECT()
28 strncpy(target[0].a, target[1].a, size); in lkdtm_FORTIFY_STR_OBJECT()
31 fortify_scratch_space = target[0].a[3]; in lkdtm_FORTIFY_STR_OBJECT()
33 pr_err("FAIL: fortify did not block a strncpy() object write overflow!\n"); in lkdtm_FORTIFY_STR_OBJECT()
40 char a[10]; in lkdtm_FORTIFY_STR_MEMBER() member
43 volatile int size = 20; in lkdtm_FORTIFY_STR_MEMBER()
50 pr_info("trying to strncpy() past the end of a struct member...\n"); in lkdtm_FORTIFY_STR_MEMBER()
53 * strncpy(target.a, src, 20); will hit a compile error because the in lkdtm_FORTIFY_STR_MEMBER()
54 * compiler knows at build time that target.a < 20 bytes. Use a in lkdtm_FORTIFY_STR_MEMBER()
55 * volatile to force a runtime error. in lkdtm_FORTIFY_STR_MEMBER()
57 strncpy(target.a, src, size); in lkdtm_FORTIFY_STR_MEMBER()
60 fortify_scratch_space = target.a[3]; in lkdtm_FORTIFY_STR_MEMBER()
62 pr_err("FAIL: fortify did not block a strncpy() struct member write overflow!\n"); in lkdtm_FORTIFY_STR_MEMBER()
72 char a[10]; in lkdtm_FORTIFY_MEM_OBJECT() member
78 * 'size' at compile time. Without that, we would get a compile error in lkdtm_FORTIFY_MEM_OBJECT()
79 * rather than a runtime error. in lkdtm_FORTIFY_MEM_OBJECT()
81 volatile int size = 20; in lkdtm_FORTIFY_MEM_OBJECT()
88 pr_info("trying to memcpy() past the end of a struct\n"); in lkdtm_FORTIFY_MEM_OBJECT()
96 fortify_scratch_space = target.a[3]; in lkdtm_FORTIFY_MEM_OBJECT()
98 pr_err("FAIL: fortify did not block a memcpy() object write overflow!\n"); in lkdtm_FORTIFY_MEM_OBJECT()
105 char a[10]; in lkdtm_FORTIFY_MEM_MEMBER() member
108 volatile int size = 20; in lkdtm_FORTIFY_MEM_MEMBER()
115 pr_info("trying to memcpy() past the end of a struct member...\n"); in lkdtm_FORTIFY_MEM_MEMBER()
118 * strncpy(target.a, src, 20); will hit a compile error because the in lkdtm_FORTIFY_MEM_MEMBER()
119 * compiler knows at build time that target.a < 20 bytes. Use a in lkdtm_FORTIFY_MEM_MEMBER()
120 * volatile to force a runtime error. in lkdtm_FORTIFY_MEM_MEMBER()
122 memcpy(target.a, src, size); in lkdtm_FORTIFY_MEM_MEMBER()
125 fortify_scratch_space = target.a[3]; in lkdtm_FORTIFY_MEM_MEMBER()
127 pr_err("FAIL: fortify did not block a memcpy() struct member write overflow!\n"); in lkdtm_FORTIFY_MEM_MEMBER()
135 * strscpy and generate a panic because there is a write overflow (i.e. src
184 /* Test when src is embedded inside a union. */ in lkdtm_FORTIFY_STRSCPY()
196 * a runtime write overflow. in lkdtm_FORTIFY_STRSCPY()