<feed xmlns='http://www.w3.org/2005/Atom'>
<title>fortify-headers, branch 0.7</title>
<subtitle>Standalone portable header-based implementation of FORTIFY_SOURCE=3 
</subtitle>
<id>http://git.dustri.org/fortify-headers/atom?h=0.7</id>
<link rel='self' href='http://git.dustri.org/fortify-headers/atom?h=0.7'/>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/'/>
<updated>2015-07-24T13:29:06Z</updated>
<entry>
<title>Bump to 0.7</title>
<updated>2015-07-24T13:29:06Z</updated>
<author>
<name>sin</name>
</author>
<published>2015-07-24T13:29:06Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=578b693300171edfbbefb4b14f1bc9bd46f94a1f'/>
<id>urn:sha1:578b693300171edfbbefb4b14f1bc9bd46f94a1f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Only crash on overflow for realpath()</title>
<updated>2015-07-16T10:45:19Z</updated>
<author>
<name>sin</name>
</author>
<published>2015-07-16T10:45:19Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=60dcebb6b812097eb6ca141086c2d8c1875d3347'/>
<id>urn:sha1:60dcebb6b812097eb6ca141086c2d8c1875d3347</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Fix stpncpy() check</title>
<updated>2015-07-15T16:02:27Z</updated>
<author>
<name>sin</name>
</author>
<published>2015-07-15T16:02:27Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=edb2ded3af887cd0a206c0f00e20118d58a7775c'/>
<id>urn:sha1:edb2ded3af887cd0a206c0f00e20118d58a7775c</id>
<content type='text'>
Do not crash unless the overflow would happen.
</content>
</entry>
<entry>
<title>Fix confstr() check</title>
<updated>2015-07-15T15:05:52Z</updated>
<author>
<name>sin</name>
</author>
<published>2015-07-15T15:05:52Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=a51406af124e712bc943b29c73fdf219e003ffaa'/>
<id>urn:sha1:a51406af124e712bc943b29c73fdf219e003ffaa</id>
<content type='text'>
Do not crash unless the overflow would actually happen.
</content>
</entry>
<entry>
<title>Fix wcrtomb() check</title>
<updated>2015-07-15T14:55:56Z</updated>
<author>
<name>sin</name>
</author>
<published>2015-07-15T14:53:41Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=a255506ca487250255f9f048e61cf90166ceab77'/>
<id>urn:sha1:a255506ca487250255f9f048e61cf90166ceab77</id>
<content type='text'>
This was breaking valid code, example:
char c;
wcrtomb(&amp;c, L'0', st);
</content>
</entry>
<entry>
<title>Add __extension__ mark to include_next to silence -pedantic</title>
<updated>2015-06-25T09:18:26Z</updated>
<author>
<name>Steven Barth</name>
</author>
<published>2015-06-24T18:13:37Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=7fd984fcb532be01f68cddc194c09a7ca10c1ea6'/>
<id>urn:sha1:7fd984fcb532be01f68cddc194c09a7ca10c1ea6</id>
<content type='text'>
Signed-off-by: Steven Barth &lt;steven@midlink.org&gt;
</content>
</entry>
<entry>
<title>unistd: fix signed / unsigned comparison in getgroups</title>
<updated>2015-06-22T18:05:54Z</updated>
<author>
<name>Steven Barth</name>
</author>
<published>2015-06-22T12:36:16Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=0825063aa6725f8ddf6661ead3263072d630870c'/>
<id>urn:sha1:0825063aa6725f8ddf6661ead3263072d630870c</id>
<content type='text'>
Signed-off-by: Steven Barth &lt;steven@midlink.org&gt;
</content>
</entry>
<entry>
<title>Bump to 0.6</title>
<updated>2015-06-17T15:37:56Z</updated>
<author>
<name>sin</name>
</author>
<published>2015-06-17T15:37:56Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=8ff214efe64637a398901ca59c887539ad2dc3fc'/>
<id>urn:sha1:8ff214efe64637a398901ca59c887539ad2dc3fc</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Use the __inline__ keyword instead of __inline to avoid breakage</title>
<updated>2015-06-04T17:52:50Z</updated>
<author>
<name>Trutz Behn</name>
</author>
<published>2015-06-04T13:01:37Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=4cdac9cbdaa01f884e0e8b3f947b7f0cb1170729'/>
<id>urn:sha1:4cdac9cbdaa01f884e0e8b3f947b7f0cb1170729</id>
<content type='text'>
Newer compilers default to GNU11, a C11 dialect. Some software however
is unprepared for this or has wrong compatibility checks. What happens
is that some software will for compatibility with C89

  #define inline

before inclusion of a standard header, which is undefined behaviour in
C99 and above (C99/C11 7.1.2/4), as inline is a keyword.

If any libc headers that are then included via #include_next provide an
__inline macro definition (current musl does this if C++ or C99 and
above is detected) like the following

  #define __inline inline

this results in any __inline token to be preprocessed away.

This breaks use of __builtin_va_arg_pack() in our stdio.h at
compile-time as it can only be used in always inlined functions. The
function attributes __always_inline__ and __gnu_inline__ themselves
require an inline specifier on the function to be applied.
</content>
</entry>
<entry>
<title>Use namespace-safe macro, param and variable names</title>
<updated>2015-06-03T17:55:35Z</updated>
<author>
<name>Trutz Behn</name>
</author>
<published>2015-06-03T17:27:01Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=1cd5461a5375207602f2cbdfd9a50a9b751cb7c8'/>
<id>urn:sha1:1cd5461a5375207602f2cbdfd9a50a9b751cb7c8</id>
<content type='text'>
</content>
</entry>
</feed>
