<feed xmlns='http://www.w3.org/2005/Atom'>
<title>glibc/debug, branch master</title>
<subtitle>Fork of glibc for development</subtitle>
<id>https://git.zx2c4.com/glibc/atom/debug?h=master</id>
<link rel='self' href='https://git.zx2c4.com/glibc/atom/debug?h=master'/>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/glibc/'/>
<updated>2024-05-14T10:55:06Z</updated>
<entry>
<title>Unify output from backtrace_symbols_fd with backtrace_symbols (bug 31730)</title>
<updated>2024-05-14T10:55:06Z</updated>
<author>
<name>Andreas Schwab</name>
<email>schwab@suse.de</email>
</author>
<published>2024-05-13T10:35:48Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/glibc/commit/?id=ec6ed525f1aa24fd38ea5153e88d14d92d0d2f82'/>
<id>urn:sha1:ec6ed525f1aa24fd38ea5153e88d14d92d0d2f82</id>
<content type='text'>
</content>
</entry>
<entry>
<title>string: Add hidden builtin definition for __strcpy_chk.</title>
<updated>2024-02-06T08:17:04Z</updated>
<author>
<name>Stefan Liebler</name>
<email>stli@linux.ibm.com</email>
</author>
<published>2024-02-05T13:22:06Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/glibc/commit/?id=fa3eb7d5e7d32ca1ad48b48a7eb6d15b8382c3a7'/>
<id>urn:sha1:fa3eb7d5e7d32ca1ad48b48a7eb6d15b8382c3a7</id>
<content type='text'>
Otherwise on at least x86_64 and s390x there is an unwanted PLT entry
in libc.so when configured with --enable-fortify-source=3 and build
with -Os.

This is observed in elf/check-localplt
Extra PLT reference: libc.so: __strcpy_chk

The call to PLT entry is in inet/ruserpass.c.
Reviewed-by: Adhemerval Zanella  &lt;adhemerval.zanella@linaro.org&gt;
</content>
</entry>
<entry>
<title>debug/getwd_chk.c: warning should be emitted for the __getwd_chk symbol.</title>
<updated>2024-01-12T14:21:26Z</updated>
<author>
<name>Frederic Cambus</name>
<email>fred@statdns.com</email>
</author>
<published>2023-12-05T11:23:07Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/glibc/commit/?id=9fd2ceb55de003c09c909103966db913319bcfdc'/>
<id>urn:sha1:9fd2ceb55de003c09c909103966db913319bcfdc</id>
<content type='text'>
Otherwise the warning message for the getwd symbol ends up being duplicated.

Signed-off-by: Frederic Cambus &lt;fred@statdns.com&gt;
Reviewed-by: Adhemerval Zanella  &lt;adhemerval.zanella@linaro.org&gt;
Signed-off-by: Andreas K. Hüttel &lt;dilfridge@gentoo.org&gt;
</content>
</entry>
<entry>
<title>Update copyright dates not handled by scripts/update-copyrights</title>
<updated>2024-01-01T18:53:40Z</updated>
<author>
<name>Paul Eggert</name>
<email>eggert@cs.ucla.edu</email>
</author>
<published>2024-01-01T18:35:28Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/glibc/commit/?id=1059defeee95e28c65b266a55eba6d47d852026b'/>
<id>urn:sha1:1059defeee95e28c65b266a55eba6d47d852026b</id>
<content type='text'>
I've updated copyright dates in glibc for 2024.  This is the patch for
the changes not generated by scripts/update-copyrights and subsequent
build / regeneration of generated files.
</content>
</entry>
<entry>
<title>Update copyright dates with scripts/update-copyrights</title>
<updated>2024-01-01T18:53:40Z</updated>
<author>
<name>Paul Eggert</name>
<email>eggert@cs.ucla.edu</email>
</author>
<published>2024-01-01T18:12:26Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/glibc/commit/?id=dff8da6b3e89b986bb7f6b1ec18cf65d5972e307'/>
<id>urn:sha1:dff8da6b3e89b986bb7f6b1ec18cf65d5972e307</id>
<content type='text'>
</content>
</entry>
<entry>
<title>debug: Add fortify wprintf tests</title>
<updated>2023-12-29T13:57:27Z</updated>
<author>
<name>Adhemerval Zanella</name>
<email>adhemerval.zanella@linaro.org</email>
</author>
<published>2023-12-21T18:59:19Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/glibc/commit/?id=a8a4c94ae9cefeeba72ca41364fcf684a64477bc'/>
<id>urn:sha1:a8a4c94ae9cefeeba72ca41364fcf684a64477bc</id>
<content type='text'>
Similar to other printf-like ones.  It requires to be in a different
process so we can change the orientation of stdout.

Checked on aarch64, armhf, x86_64, and i686.
</content>
</entry>
<entry>
<title>debug: Add fortify syslog tests</title>
<updated>2023-12-29T13:57:03Z</updated>
<author>
<name>Adhemerval Zanella</name>
<email>adhemerval.zanella@linaro.org</email>
</author>
<published>2023-12-21T18:59:18Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/glibc/commit/?id=446e2c935a174d33fa9974859628e3c44156bca9'/>
<id>urn:sha1:446e2c935a174d33fa9974859628e3c44156bca9</id>
<content type='text'>
It requires to be in a container tests to avoid logging bogus
information on the system.  The syslog also requires to be checked in
a different process because the internal printf call will abort with
the internal syslog lock taken (which makes subsequent syslog calls
deadlock).

Checked on aarch64, armhf, x86_64, and i686.
Reviewed-by: Siddhesh Poyarekar &lt;siddhesh@sourceware.org&gt;
</content>
</entry>
<entry>
<title>debug: Add fortify dprintf tests</title>
<updated>2023-12-29T13:57:03Z</updated>
<author>
<name>Adhemerval Zanella</name>
<email>adhemerval.zanella@linaro.org</email>
</author>
<published>2023-12-21T18:59:17Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/glibc/commit/?id=121aad59dea8431cae5cd3efb6ba588d0ddc52b4'/>
<id>urn:sha1:121aad59dea8431cae5cd3efb6ba588d0ddc52b4</id>
<content type='text'>
Similar to other printf-like ones.

Checked on aarch64, armhf, x86_64, and i686.
Reviewed-by: Siddhesh Poyarekar &lt;siddhesh@sourceware.org&gt;
</content>
</entry>
<entry>
<title>debug: Increase tst-fortify checks for compiler without __va_arg_pack support</title>
<updated>2023-12-29T13:57:03Z</updated>
<author>
<name>Adhemerval Zanella</name>
<email>adhemerval.zanella@linaro.org</email>
</author>
<published>2023-12-21T18:59:16Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/glibc/commit/?id=bf320000b47ce46aa6dbe1b7068e6539bf2df9bb'/>
<id>urn:sha1:bf320000b47ce46aa6dbe1b7068e6539bf2df9bb</id>
<content type='text'>
The fortify wrappers for varargs functions already add fallbacks to
builtins calls if __va_arg_pack is not supported.

Checked on aarch64, armhf, x86_64, and i686.
Reviewed-by: Siddhesh Poyarekar &lt;siddhesh@sourceware.org&gt;
</content>
</entry>
<entry>
<title>debug: Adapt fortify tests to libsupport</title>
<updated>2023-12-29T13:57:03Z</updated>
<author>
<name>Adhemerval Zanella</name>
<email>adhemerval.zanella@linaro.org</email>
</author>
<published>2023-12-21T18:59:15Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/glibc/commit/?id=9556acd249687ac562deb6309503165d66eb06fa'/>
<id>urn:sha1:9556acd249687ac562deb6309503165d66eb06fa</id>
<content type='text'>
Checked on aarch64, armhf, x86_64, and i686.
Reviewed-by: Siddhesh Poyarekar &lt;siddhesh@sourceware.org&gt;
</content>
</entry>
</feed>
