<feed xmlns='http://www.w3.org/2005/Atom'>
<title>fortify-headers/include/string.h, branch 2.2</title>
<subtitle>Standalone portable header-based implementation of FORTIFY_SOURCE=3 
</subtitle>
<id>http://git.dustri.org/fortify-headers/atom?h=2.2</id>
<link rel='self' href='http://git.dustri.org/fortify-headers/atom?h=2.2'/>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/'/>
<updated>2024-03-19T17:35:13Z</updated>
<entry>
<title>Relax our checks for memchr on C11 and above</title>
<updated>2024-03-19T17:35:13Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-03-19T17:35:13Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=8ed72e7c1caa0eb4238e649063c26a11720935de'/>
<id>urn:sha1:8ed72e7c1caa0eb4238e649063c26a11720935de</id>
<content type='text'>
Since C11:

&gt; This function behaves as if it reads the bytes sequentially and stops as soon
as a matching bytes is found: if the array pointed to by ptr is smaller than
count, but the match is found within the array, the behavior is well-defined.

Reported-by: q66
</content>
</entry>
<entry>
<title>Add some NULL-pointers checks</title>
<updated>2024-03-08T15:28:52Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-03-08T15:07:57Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=140cffbe84a08669d67c3257258d2bb70ff29c3b'/>
<id>urn:sha1:140cffbe84a08669d67c3257258d2bb70ff29c3b</id>
<content type='text'>
See:
- https://www.imperialviolet.org/2016/06/26/nonnull.html
- https://davidben.net/2024/01/15/empty-slices.html
</content>
</entry>
<entry>
<title>Re-enable previously disabled overlap checks</title>
<updated>2023-12-28T15:13:37Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2023-12-27T16:07:32Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=22a8094b41b2606084dc0c0c70487e5ed0fcb652'/>
<id>urn:sha1:22a8094b41b2606084dc0c0c70487e5ed0fcb652</id>
<content type='text'>
They were previously disabled in 80a83a5
</content>
</entry>
<entry>
<title>Improve __fh_overlap implementation</title>
<updated>2023-12-27T15:17:55Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2023-12-27T15:17:55Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=8513fddefca4c6e3982718732afeec71bad4e688'/>
<id>urn:sha1:8513fddefca4c6e3982718732afeec71bad4e688</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Don't check for overlapping in strncpy/stpncpy for now</title>
<updated>2023-12-27T15:06:59Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2023-12-27T11:36:47Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=80a83a56b52e833e6d3afec4d0723d7625d52cee'/>
<id>urn:sha1:80a83a56b52e833e6d3afec4d0723d7625d52cee</id>
<content type='text'>
They check overlap across the whole range of the given length, but
the given length is not what will actually be copied, rather it's
the maximum length (if src is shorter, only length of src will be
copied). This triggers false positives and traps where it shouldn't
(e.g. in ICU tests).

Reported-by: q66
</content>
</entry>
<entry>
<title>fix typo for __builtin_memcpy</title>
<updated>2023-12-18T11:52:12Z</updated>
<author>
<name>psykose</name>
</author>
<published>2023-12-18T11:47:09Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=01dc0e38a8a0be034bf21cc6ae4cc8cebc0e7a79'/>
<id>urn:sha1:01dc0e38a8a0be034bf21cc6ae4cc8cebc0e7a79</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Disable str(r)chr hardening</title>
<updated>2023-12-15T23:51:48Z</updated>
<author>
<name>q66</name>
</author>
<published>2023-12-15T23:51:48Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=021e25b5c0a098fc4e2b27a31abb34cb32b76be5'/>
<id>urn:sha1:021e25b5c0a098fc4e2b27a31abb34cb32b76be5</id>
<content type='text'>
It's UB to subtract null pointers, which these potentially may
be. It also makes python test suite fail.
</content>
</entry>
<entry>
<title>Rename some macros to be more namespace-friendly</title>
<updated>2023-12-15T22:50:43Z</updated>
<author>
<name>q66</name>
</author>
<published>2023-12-15T22:48:58Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=a018052d410126f94c2602b208b099839d333b05'/>
<id>urn:sha1:a018052d410126f94c2602b208b099839d333b05</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Remove superfluous includes</title>
<updated>2023-12-15T20:41:08Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2023-12-15T15:08:12Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=57a3e9c1c7507b5ce56122429cc3649009a4ecc7'/>
<id>urn:sha1:57a3e9c1c7507b5ce56122429cc3649009a4ecc7</id>
<content type='text'>
This should fix #32
</content>
</entry>
<entry>
<title>Fix a typo</title>
<updated>2023-09-30T17:24:02Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2023-09-30T17:24:02Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=160298c6fb4c5151ef58ef1556ae2c271d8a9a9e'/>
<id>urn:sha1:160298c6fb4c5151ef58ef1556ae2c271d8a9a9e</id>
<content type='text'>
</content>
</entry>
</feed>
