<feed xmlns='http://www.w3.org/2005/Atom'>
<title>fortify-headers/tests, branch 2.2</title>
<subtitle>Standalone portable header-based implementation of FORTIFY_SOURCE=3 
</subtitle>
<id>http://git.dustri.org/fortify-headers/atom?h=2.2</id>
<link rel='self' href='http://git.dustri.org/fortify-headers/atom?h=2.2'/>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/'/>
<updated>2024-03-19T17:35:13Z</updated>
<entry>
<title>Relax our checks for memchr on C11 and above</title>
<updated>2024-03-19T17:35:13Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-03-19T17:35:13Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=8ed72e7c1caa0eb4238e649063c26a11720935de'/>
<id>urn:sha1:8ed72e7c1caa0eb4238e649063c26a11720935de</id>
<content type='text'>
Since C11:

&gt; This function behaves as if it reads the bytes sequentially and stops as soon
as a matching bytes is found: if the array pointed to by ptr is smaller than
count, but the match is found within the array, the behavior is well-defined.

Reported-by: q66
</content>
</entry>
<entry>
<title>Add some NULL-pointers checks</title>
<updated>2024-03-08T15:28:52Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2024-03-08T15:07:57Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=140cffbe84a08669d67c3257258d2bb70ff29c3b'/>
<id>urn:sha1:140cffbe84a08669d67c3257258d2bb70ff29c3b</id>
<content type='text'>
See:
- https://www.imperialviolet.org/2016/06/26/nonnull.html
- https://davidben.net/2024/01/15/empty-slices.html
</content>
</entry>
<entry>
<title>Re-enable previously disabled overlap checks</title>
<updated>2023-12-28T15:13:37Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2023-12-27T16:07:32Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=22a8094b41b2606084dc0c0c70487e5ed0fcb652'/>
<id>urn:sha1:22a8094b41b2606084dc0c0c70487e5ed0fcb652</id>
<content type='text'>
They were previously disabled in 80a83a5
</content>
</entry>
<entry>
<title>Don't check for overlapping in strncpy/stpncpy for now</title>
<updated>2023-12-27T15:06:59Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2023-12-27T11:36:47Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=80a83a56b52e833e6d3afec4d0723d7625d52cee'/>
<id>urn:sha1:80a83a56b52e833e6d3afec4d0723d7625d52cee</id>
<content type='text'>
They check overlap across the whole range of the given length, but
the given length is not what will actually be copied, rather it's
the maximum length (if src is shorter, only length of src will be
copied). This triggers false positives and traps where it shouldn't
(e.g. in ICU tests).

Reported-by: q66
</content>
</entry>
<entry>
<title>Ditto for strrchr</title>
<updated>2023-12-16T01:07:23Z</updated>
<author>
<name>q66</name>
</author>
<published>2023-12-16T01:07:23Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=c59aa9ac0efa20e7194f6bb93635d0482f5c60f4'/>
<id>urn:sha1:c59aa9ac0efa20e7194f6bb93635d0482f5c60f4</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Disable strchr tests since strchr hardening is disabled</title>
<updated>2023-12-16T01:03:16Z</updated>
<author>
<name>q66</name>
</author>
<published>2023-12-16T01:03:16Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=9d7f00791381217ccaa4d2da58a5c135ef4773b9'/>
<id>urn:sha1:9d7f00791381217ccaa4d2da58a5c135ef4773b9</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Also handle SIGTRAP in tests</title>
<updated>2023-12-16T01:00:43Z</updated>
<author>
<name>q66</name>
</author>
<published>2023-12-16T01:00:10Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=ca2ede3b63b0b3c12a4059f282c86fd66024dbb7'/>
<id>urn:sha1:ca2ede3b63b0b3c12a4059f282c86fd66024dbb7</id>
<content type='text'>
SIGILL is not the only possible trap handler. On non-x86 archs
this is not the case for instance.
</content>
</entry>
<entry>
<title>Remove superfluous includes</title>
<updated>2023-12-15T20:41:08Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2023-12-15T15:08:12Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=57a3e9c1c7507b5ce56122429cc3649009a4ecc7'/>
<id>urn:sha1:57a3e9c1c7507b5ce56122429cc3649009a4ecc7</id>
<content type='text'>
This should fix #32
</content>
</entry>
<entry>
<title>Add qsort</title>
<updated>2023-12-07T16:29:06Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2023-12-06T20:45:57Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=b5d5cebc2b4218ca2c04c52546849df7625a53a0'/>
<id>urn:sha1:b5d5cebc2b4218ca2c04c52546849df7625a53a0</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Add a global test to ensure that all headers are compiling</title>
<updated>2023-12-07T11:07:29Z</updated>
<author>
<name>jvoisin</name>
</author>
<published>2023-12-07T10:58:47Z</published>
<link rel='alternate' type='text/html' href='http://git.dustri.org/fortify-headers/commit/?id=9064a508d5f1ed3514d3e5b4734576e80f7048ae'/>
<id>urn:sha1:9064a508d5f1ed3514d3e5b4734576e80f7048ae</id>
<content type='text'>
</content>
</entry>
</feed>
