From patchwork Wed Nov 29 09:42:50 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yaakov Selkowitz X-Patchwork-Id: 119941 Delivered-To: patch@linaro.org Received: by 10.140.22.227 with SMTP id 90csp2832181qgn; Wed, 29 Nov 2017 01:44:20 -0800 (PST) X-Google-Smtp-Source: AGs4zMYqJN67Rvn6bNfbGeOhEJupisoSKvCT/oX736c82ULScFE0Ttpb+Eszfifcz5xYwy7/qDl3 X-Received: by 10.99.138.194 with SMTP id y185mr2193820pgd.290.1511948660750; Wed, 29 Nov 2017 01:44:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1511948660; cv=none; d=google.com; s=arc-20160816; b=WA18wm4MaF7fUktLRlqHwj97JbuM6Ry3cXvM3IZOWMNhBBQtaGJPaQx/iK+S5vcfXG Idv7AIowazUgeygAw20a3A0Y91JchjJlBLhftgSYle03sCQRid3MOZI6tL63BtMq5GCn M0xNmrxH+Mpep3oa1H79rcj5SptXKWyjxhnrhvgZmuVNsV1I7F3hWoJ4L7lKqkQjfZ5M eAld3vv0hVHDk0KjzNiVxzaXeN4WLOni3F7/C6CD/RKpH6+4OvLzO7U+D0OOTzBHkyKE mNjDVO0Dg5clnpXTBRT16I1qkVTAE6uqXIpJiHYP4l0nr0//pabp7Glu8HzxrsVU0L+l tgZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=message-id:date:subject:to:from:delivered-to:sender:list-help :list-post:list-archive:list-subscribe:list-unsubscribe:list-id :precedence:mailing-list:dkim-signature:domainkey-signature :arc-authentication-results; bh=p4tlLe7xcQv6eNGeq51XyzO4U05lLWqfvqBKmJq/j6k=; b=AB8+Cmc9/FMw1JxYavaVtZYmPvWVG+d3ozi47Vkhl4uJE1iV8y+pM8jWxdXWGtZHWH V/EjHmdssjdzCabVhmQQ434ANzq9VgG2UZhlDlDBwD8LbMlkjn2blzHj8x6CXy6F4NEc 7NAS2ROFNCCKMbL86NtlIJ1JdbxfntD9U4hQo5rXwarLM82yzyo6HDZzf1CMjmK4aiAR 94BQEE3CxLZFm9kRARjiCsMw89MT4nPGG3hvbgT6G34xBMsMFSVo5oH1cThXh5t1kMq0 iy+/aZqAAqpCcbs61S5GDDLhaSa+i6tXZ8HF3q7aJrdtqzx3mZwO3B7ocKaQHdzJH3od W57g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@sourceware.org header.s=default header.b=BPYCaiRa; spf=pass (google.com: domain of newlib-return-15402-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) smtp.mailfrom=newlib-return-15402-patch=linaro.org@sourceware.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from sourceware.org (server1.sourceware.org. [209.132.180.131]) by mx.google.com with ESMTPS id g1si1015264pgq.22.2017.11.29.01.44.20 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 29 Nov 2017 01:44:20 -0800 (PST) Received-SPF: pass (google.com: domain of newlib-return-15402-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) client-ip=209.132.180.131; Authentication-Results: mx.google.com; dkim=pass header.i=@sourceware.org header.s=default header.b=BPYCaiRa; spf=pass (google.com: domain of newlib-return-15402-patch=linaro.org@sourceware.org designates 209.132.180.131 as permitted sender) smtp.mailfrom=newlib-return-15402-patch=linaro.org@sourceware.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com DomainKey-Signature: a=rsa-sha1; c=nofws; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:subject:date:message-id; q=dns; s= default; b=QGQFEhHoCM+GgM2aPF3EbIY7hSQo53CD7ZmB5I8LfXmIojT0uvHJy CsH3/smDgUxwJQ1nGWp3V21E6sMmTmXNUSmgAcEgVRg0E2J+mc8f31seVWIyi31T GdVXlQbz4DosMyiMpqzh2gFa7LW0mecNSbMeAeAxfx5YIXgk5aF/Ck= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=sourceware.org; h=list-id :list-unsubscribe:list-subscribe:list-archive:list-post :list-help:sender:from:to:subject:date:message-id; s=default; bh=CbX7hKEDmqWZBXa4EYOu37QoT0g=; b=BPYCaiRakWoD+eW/pdUfazfR4z5d 7EPX4wxs5AQr6t6Tf6pJ9kGRUC/lFp2tv7cVdzEyFly8zN40N0CWe7az5w55pXYF XF8dd9wMiwjbZ940g31ersMx4wMldQka/CNlGOC3ue1vDkA3hMF6i+StMyFXAqMI nAgZQnEtLsdNNk4= Received: (qmail 67069 invoked by alias); 29 Nov 2017 09:43:23 -0000 Mailing-List: contact newlib-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: newlib-owner@sourceware.org Delivered-To: mailing list newlib@sourceware.org Received: (qmail 66967 invoked by uid 89); 29 Nov 2017 09:43:23 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-6.7 required=5.0 tests=BAYES_00, GIT_PATCH_3, KB_WAM_FROM_NAME_SINGLEWORD, SPF_HELO_PASS, T_RP_MATCHES_RCVD autolearn=ham version=3.3.2 spammy=Hx-languages-length:3812 X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Wed, 29 Nov 2017 09:43:13 +0000 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id E3AEB15447 for ; Wed, 29 Nov 2017 09:43:11 +0000 (UTC) Received: from localhost.localdomain (ovpn-120-11.rdu2.redhat.com [10.10.120.11]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 741F760BE5 for ; Wed, 29 Nov 2017 09:43:11 +0000 (UTC) From: Yaakov Selkowitz To: newlib@sourceware.org Subject: [PATCH v5 00/10] Add Stack Smashing Protection and Object Size Checking Date: Wed, 29 Nov 2017 03:42:50 -0600 Message-Id: <20171129094300.20296-1-yselkowi@redhat.com> Changes in this version: * _ELIDABLE_INLINE in C99 mode causes conflicts with extern function declarations. Restoring __ssp_inline from NetBSD, updated to modern GCC, allows for fewer changes to the main headers. * The 'symbol' argument to __ssp_decl/__ssp_redirect_raw was always the same as 'fun'. It is removed in this version to avoid needless duplication. * The return type of read was fixed (tested on mmix-knuth-mmixware). * Basic documentation has been added. Yaakov Selkowitz (10): ssp: add APIs for Stack Smashing Protection ssp: add Object Size Checking common code ssp: add Object Size Checking for string.h ssp: add Object Size Checking for strings.h ssp: add Object Size Checking for stdio.h, part 1 ssp: add Object Size Checking for unistd.h, part 1 ssp: add documentation ssp: add build infrastructure cygwin: export SSP functions cygwin: create libssp compatibility import library newlib/Makefile.am | 4 + newlib/Makefile.in | 4 + newlib/libc/Makefile.am | 4 +- newlib/libc/Makefile.in | 15 +- newlib/libc/configure | 3 +- newlib/libc/configure.in | 2 +- newlib/libc/include/ssp/ssp.h | 77 ++++ newlib/libc/include/ssp/stdio.h | 101 +++++ newlib/libc/include/ssp/string.h | 115 ++++++ newlib/libc/include/ssp/strings.h | 55 +++ newlib/libc/include/ssp/unistd.h | 53 +++ newlib/libc/include/stdio.h | 4 + newlib/libc/include/string.h | 4 + newlib/libc/include/strings.h | 4 + newlib/libc/include/sys/features.h | 18 +- newlib/libc/include/sys/unistd.h | 5 + newlib/libc/libc.in.xml | 1 + newlib/libc/libc.texinfo | 1 + newlib/libc/ssp/Makefile.am | 69 ++++ newlib/libc/ssp/Makefile.in | 706 +++++++++++++++++++++++++++++++++ newlib/libc/ssp/chk_fail.c | 13 + newlib/libc/ssp/gets_chk.c | 78 ++++ newlib/libc/ssp/memcpy_chk.c | 54 +++ newlib/libc/ssp/memmove_chk.c | 50 +++ newlib/libc/ssp/mempcpy_chk.c | 21 + newlib/libc/ssp/memset_chk.c | 49 +++ newlib/libc/ssp/snprintf_chk.c | 59 +++ newlib/libc/ssp/sprintf_chk.c | 63 +++ newlib/libc/ssp/ssp.tex | 44 ++ newlib/libc/ssp/stack_protector.c | 45 +++ newlib/libc/ssp/stpcpy_chk.c | 58 +++ newlib/libc/ssp/stpncpy_chk.c | 56 +++ newlib/libc/ssp/strcat_chk.c | 62 +++ newlib/libc/ssp/strcpy_chk.c | 55 +++ newlib/libc/ssp/strncat_chk.c | 73 ++++ newlib/libc/ssp/strncpy_chk.c | 55 +++ newlib/libc/ssp/vsnprintf_chk.c | 51 +++ newlib/libc/ssp/vsprintf_chk.c | 60 +++ winsup/cygwin/Makefile.in | 5 +- winsup/cygwin/common.din | 19 + winsup/cygwin/include/cygwin/version.h | 7 +- 41 files changed, 2210 insertions(+), 12 deletions(-) create mode 100644 newlib/libc/include/ssp/ssp.h create mode 100644 newlib/libc/include/ssp/stdio.h create mode 100644 newlib/libc/include/ssp/string.h create mode 100644 newlib/libc/include/ssp/strings.h create mode 100644 newlib/libc/include/ssp/unistd.h create mode 100644 newlib/libc/ssp/Makefile.am create mode 100644 newlib/libc/ssp/Makefile.in create mode 100644 newlib/libc/ssp/chk_fail.c create mode 100644 newlib/libc/ssp/gets_chk.c create mode 100644 newlib/libc/ssp/memcpy_chk.c create mode 100644 newlib/libc/ssp/memmove_chk.c create mode 100644 newlib/libc/ssp/mempcpy_chk.c create mode 100644 newlib/libc/ssp/memset_chk.c create mode 100644 newlib/libc/ssp/snprintf_chk.c create mode 100644 newlib/libc/ssp/sprintf_chk.c create mode 100644 newlib/libc/ssp/ssp.tex create mode 100644 newlib/libc/ssp/stack_protector.c create mode 100644 newlib/libc/ssp/stpcpy_chk.c create mode 100644 newlib/libc/ssp/stpncpy_chk.c create mode 100644 newlib/libc/ssp/strcat_chk.c create mode 100644 newlib/libc/ssp/strcpy_chk.c create mode 100644 newlib/libc/ssp/strncat_chk.c create mode 100644 newlib/libc/ssp/strncpy_chk.c create mode 100644 newlib/libc/ssp/vsnprintf_chk.c create mode 100644 newlib/libc/ssp/vsprintf_chk.c -- 2.15.0