Trutz Behn
1cd5461a53
Use namespace-safe macro, param and variable names
2015-06-03 18:55:35 +01:00
Trutz Behn
a9ee1d2743
Fix usage of __USER_LABEL_PREFIX__
...
The predefined __USER_LABEL_PREFIX__ macro if it is non-empty contains
an identifier, not a string literal, thus it needs to be stringified.
2015-06-03 08:33:32 +01:00
sin
ec970ecb88
Bump to 0.5
2015-05-29 12:38:17 +01:00
Trutz Behn
720c4f7414
Fix return-type of fortified FD_CLR and FD_SET
...
POSIX specifies them to have return-type void, not int.
2015-05-21 10:10:17 +01:00
sin
a81e053a1c
Be less verbose in README
2015-05-19 10:22:59 +01:00
sin
50e37c7f76
Wrap some overly long lines
2015-05-13 12:18:35 +01:00
sin
07adb50914
Add LICENSE header
2015-05-13 12:15:36 +01:00
sin
158782b3bb
Add fortify_fn() helper in fortify-headers.h
2015-05-13 12:05:29 +01:00
sin
316a486533
Minor style fix
2015-05-07 18:04:01 +01:00
Natanael Copa
c2bb9e106a
fix realpath when stdlib.h is included before limits.h
...
If program includes stdlib.h before limits.h without _XOPEN_SOURCE,
_GNU_SOURCE or _BSD_SOURCE explicitly set, then will it always trigger
the trap with musl libc.
This is becase stdlib.h will pull in features.h which will set
_GNU_SOURCE. This means that the fortify stdlib.h will not include
limits.h but it will still trigger the fortified realpath(), but without
PATH_MAX set.
We fix this by including system stdlib.h before testing if limits.h
should be included.
Since PATH_MAX is known at compile time we can also error at compile
time, instead of compiling a broken realpath().
2015-05-07 15:02:11 +01:00
sin
c7e82d4863
Add read checks for bcopy()
2015-04-08 15:25:47 +01:00
sin
2bd3091b36
Check for out of bound reads for memcpy, memmove and mempcpy()
2015-04-08 15:18:49 +01:00
sin
91a579a42c
Bump to 0.4
2015-04-06 10:06:01 +01:00
sin
534ef92103
Update README again
2015-04-01 17:49:31 +01:00
sin
e359fc6ace
Update README
2015-04-01 17:46:57 +01:00
sin
73839e34a6
Add feature-test guards for mbsnrtowcs() and wcsnrtombs()
2015-04-01 12:41:08 +01:00
sin
739ec00a02
Update README
2015-03-24 12:25:13 +00:00
sin
d6510c1594
Add url to alpine linux fortify integration
2015-03-24 12:24:17 +00:00
sin
19e34402d5
Bump to 0.3
2015-03-16 12:02:16 +00:00
sin
442a2a4d65
Hide stpcpy() and stpncpy() under feature test macros
2015-03-15 09:57:26 +00:00
Trutz Behn
22e7e51007
Use __typeof__ to in part avoid replicating function types
2015-03-14 20:37:27 +00:00
Trutz Behn
c2c9d0c6c8
Fix typo in attribute name
2015-03-14 19:39:14 +00:00
sin
9419492998
Update the README
...
__builtin_va_arg_pack() is not present in clang along with some
other things like __artificial__ etc.
There will be a fallback mechanism for this implemented in the
next release.
2015-03-14 11:11:04 +00:00
sin
0932a82ada
Explicitly cast pointers to satisfy C++ code
2015-03-14 09:45:37 +00:00
sin
37eb2c9c1d
Add __artificial__ to aid in debugging
2015-03-14 09:38:22 +00:00
sin
d12254166a
Restore C++ support
2015-03-13 23:09:15 +00:00
sin
c4abf4497b
Fix typo again
2015-03-13 17:14:58 +00:00
sin
c8ecc164f1
Implement snprintf() and sprintf() using __builtin_va_arg_pack()
...
Requires at least GCC 4.3.
2015-03-13 17:03:52 +00:00
sin
c2b0ad0bf5
Re-order vsnprintf() and vsprintf()
...
vsprintf() needs to access __vsnprintf_orig().
2015-03-13 14:22:41 +00:00
sin
2b6657b759
Fix typo
2015-03-13 14:19:32 +00:00
sin
9f8c543dc8
Rework fortify implementation to use extern inline
...
Overriding functions with macros is legal in C but a lot of software
is not prepared for it. Use the extern inline method to achieve the
same result.
2015-03-13 11:00:46 +00:00
Trutz Behn
b211796d68
Put include guards in the reserved namespace
...
fortify-headers is considered part of the implementation.
2015-03-11 21:33:01 +00:00
sin
5933d58bde
Clarify what is meant by not supporting C++
2015-03-11 15:31:47 +00:00
sin
ef43d8c0a5
Add note about C++ in the README
2015-03-11 12:59:01 +00:00
sin
69e43f5c5e
Revert "Add explicit casts to satisfy C++ code"
...
This reverts commit 1fbf7a3a5e
.
2015-03-11 12:57:37 +00:00
sin
14af218559
Ignore C++ for now
...
It is not legal to override standard functions using macros in C++.
We may have to revisit this in the future.
2015-03-11 11:18:31 +00:00
sin
8604f138c5
Add ifdef guards for C++ code
2015-03-11 09:26:11 +00:00
sin
1fbf7a3a5e
Add explicit casts to satisfy C++ code
2015-03-11 09:21:25 +00:00
sin
499ea65dd5
Revert "Fix invalid conversion in C++ code"
...
This reverts commit 4b4dfea25d
.
2015-03-11 09:21:00 +00:00
sin
4b4dfea25d
Fix invalid conversion in C++ code
...
/usr/include/fortify/string.h: In function 'void* __fortify_memcpy(void*, const void*, size_t)':
/usr/include/fortify/string.h:13:12: error: invalid conversion from 'void*' to 'char*' [-fpermissive]
/usr/include/fortify/string.h:14:18: error: invalid conversion from 'const void*' to 'const char*' [-fpermissive]
Since we are relying on GCC anyway, assume void * arithmetic is OK.
2015-03-11 09:17:56 +00:00
sin
4f9058faae
Bump to 0.2
2015-03-10 18:04:47 +00:00
sin
0362def21a
Inline ppoll() as well
2015-03-10 18:04:21 +00:00
sin
711c366a0d
Initial 0.1 release
2015-03-10 16:41:19 +00:00
sin
dfa0e63986
Rename make dist target to fortify-headers
2015-03-10 16:40:53 +00:00
sin
99d1025513
Make ppoll() static
...
Thanks Timo Teras.
2015-03-10 16:38:26 +00:00
sin
f71ff70b5b
Update README
2015-03-10 16:38:26 +00:00
sin
a885774e45
Minor README update
2015-03-10 16:38:26 +00:00
sin
701d7d3303
Fix strncat() and strncpy() mappings
...
Thanks zhasha.
2015-03-10 16:38:26 +00:00
sin
8cb1c705b1
Style fix
2015-03-07 10:32:28 +00:00
sin
a15fe65f92
Expand UB, may not be clear for all readers
2015-03-07 10:01:14 +00:00