public inbox for libc-alpha@sourceware.org
 help / color / mirror / Atom feed
From: Adhemerval Zanella Netto <adhemerval.zanella@linaro.org>
To: Carlos O'Donell <carlos@redhat.com>, libc-alpha@sourceware.org
Cc: Siddhesh Poyarekar <siddhesh@gotplt.org>
Subject: Re: [PATCH v3 04/10] stdlib: Improve fortify with clang
Date: Thu, 22 Feb 2024 15:45:16 -0300	[thread overview]
Message-ID: <6b0b1774-749a-4c88-aa78-75caa86aea52@linaro.org> (raw)
In-Reply-To: <36f280a2-8d9f-457e-be7e-0121f96c45b4@redhat.com>



On 20/02/24 19:05, Carlos O'Donell wrote:
> On 2/8/24 13:46, Adhemerval Zanella wrote:
>> It improve fortify checks for realpath, ptsname_r, wctomb, mbstowcs,
>> and wcstombs.  The runtime and compile checks have similar coverage as
>> with GCC.
>>
> 
> Please fix the whitespace change post a v4 of just this patch and I'll
> give my Reviewed-by.
> 
> Tested on x86_64 and i686.
> 
> Tested-by: Carlos O'Donell <carlos@redhat.com>
> 
>> Checked on aarch64, armhf, x86_64, and i686.
>> ---
>>  stdlib/bits/stdlib.h | 40 +++++++++++++++++++++++++++++-----------
>>  1 file changed, 29 insertions(+), 11 deletions(-)
>>
>> diff --git a/stdlib/bits/stdlib.h b/stdlib/bits/stdlib.h
>> index 1c7191ba57..9e31801e80 100644
>> --- a/stdlib/bits/stdlib.h
>> +++ b/stdlib/bits/stdlib.h
>> @@ -33,15 +33,22 @@ extern char *__REDIRECT_NTH (__realpath_chk_warn,
>>       __warnattr ("second argument of realpath must be either NULL or at "
>>  		 "least PATH_MAX bytes long buffer");
>>  
>> -__fortify_function __wur char *
>> -__NTH (realpath (const char *__restrict __name, char *__restrict __resolved))
>> +__fortify_function __attribute_overloadable__ __wur char *
>> +__NTH (realpath (const char *__restrict __name,
>> +		 __fortify_clang_overload_arg (char *, __restrict, __resolved)))
>> +#if defined _LIBC_LIMITS_H_ && defined PATH_MAX
>> +     __fortify_clang_warning_only_if_bos_lt (PATH_MAX, __resolved,
>> +					     "second argument of realpath must be "
>> +					     "either NULL or at least PATH_MAX "
>> +					     "bytes long buffer")
>> +#endif
>>  {
>>    size_t sz = __glibc_objsize (__resolved);
>>  
>>    if (sz == (size_t) -1)
>>      return __realpath_alias (__name, __resolved);
>>  
>> -#if defined _LIBC_LIMITS_H_ && defined PATH_MAX
>> +#if !__fortify_use_clang && defined _LIBC_LIMITS_H_ && defined PATH_MAX
>>    if (__glibc_unsafe_len (PATH_MAX, sizeof (char), sz))
>>      return __realpath_chk_warn (__name, __resolved, sz);
>>  #endif
>> @@ -61,8 +68,13 @@ extern int __REDIRECT_NTH (__ptsname_r_chk_warn,
>>       __nonnull ((2)) __warnattr ("ptsname_r called with buflen bigger than "
>>  				 "size of buf");
>>  
>> -__fortify_function int
>> -__NTH (ptsname_r (int __fd, char *__buf, size_t __buflen))
>> +__fortify_function __attribute_overloadable__ int
>> +__NTH (ptsname_r (int __fd,
>> +		 __fortify_clang_overload_arg (char *, ,__buf),
>> +		 size_t __buflen))
>> +     __fortify_clang_warning_only_if_bos_lt (__buflen, __buf,
>> +					     "ptsname_r called with buflen "
>> +					     "bigger than size of buf")
>>  {
>>    return __glibc_fortify (ptsname_r, __buflen, sizeof (char),
>>  			  __glibc_objsize (__buf),
>> @@ -75,8 +87,8 @@ extern int __wctomb_chk (char *__s, wchar_t __wchar, size_t __buflen)
>>  extern int __REDIRECT_NTH (__wctomb_alias, (char *__s, wchar_t __wchar),
>>  			   wctomb) __wur;
>>  
>> -__fortify_function __wur int
>> -__NTH (wctomb (char *__s, wchar_t __wchar))
>> +__fortify_function __attribute_overloadable__ __wur int
>> +__NTH (wctomb (__fortify_clang_overload_arg (char *, ,__s), wchar_t __wchar))
>>  {
>>    /* We would have to include <limits.h> to get a definition of MB_LEN_MAX.
>>       But this would only disturb the namespace.  So we define our own
>> @@ -113,12 +125,17 @@ extern size_t __REDIRECT_NTH (__mbstowcs_chk_warn,
>>       __warnattr ("mbstowcs called with dst buffer smaller than len "
>>  		 "* sizeof (wchar_t)");
>>  
>> -__fortify_function size_t
>> -__NTH (mbstowcs (wchar_t *__restrict __dst, const char *__restrict __src,
>> +__fortify_function __attribute_overloadable__ size_t
>> +__NTH (mbstowcs (__fortify_clang_overload_arg (wchar_t *, __restrict, __dst),
>> +		 const char *__restrict __src,
>>  		 size_t __len))
>> +     __fortify_clang_warning_only_if_bos0_lt2 (__len, __dst, sizeof (wchar_t),
>> +					       "mbstowcs called with dst buffer "
>> +					       "smaller than len * sizeof (wchar_t)")
>>  {
>>    if (__builtin_constant_p (__dst == NULL) && __dst == NULL)
>>      return __mbstowcs_nulldst (__dst, __src, __len);
>> +
> 
> Drop the whitespace change.

Ack.

> 
>>    else
>>      return __glibc_fortify_n (mbstowcs, __len, sizeof (wchar_t),
>>  			      __glibc_objsize (__dst), __dst, __src, __len);
>> @@ -139,8 +156,9 @@ extern size_t __REDIRECT_NTH (__wcstombs_chk_warn,
>>  			       size_t __len, size_t __dstlen), __wcstombs_chk)
>>       __warnattr ("wcstombs called with dst buffer smaller than len");
>>  
>> -__fortify_function size_t
>> -__NTH (wcstombs (char *__restrict __dst, const wchar_t *__restrict __src,
>> +__fortify_function __attribute_overloadable__ size_t
>> +__NTH (wcstombs (__fortify_clang_overload_arg (char *, __restrict, __dst),
>> +		 const wchar_t *__restrict __src,
>>  		 size_t __len))
>>  {
>>    return __glibc_fortify (wcstombs, __len, sizeof (char),
> 

  reply	other threads:[~2024-02-22 18:45 UTC|newest]

Thread overview: 32+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-02-08 18:46 [PATCH v3 00/10] Improve fortify support " Adhemerval Zanella
2024-02-08 18:46 ` [PATCH v3 01/10] cdefs.h: Add clang fortify directives Adhemerval Zanella
2024-02-20 19:48   ` Siddhesh Poyarekar
2024-02-21  5:48     ` Sam James
2024-02-22 18:21     ` Adhemerval Zanella Netto
2024-02-22 19:41       ` Siddhesh Poyarekar
2024-02-20 22:05   ` Carlos O'Donell
2024-02-20 22:45     ` Joseph Myers
2024-02-22 18:39     ` Adhemerval Zanella Netto
2024-02-08 18:46 ` [PATCH v3 02/10] libio: Improve fortify with clang Adhemerval Zanella
2024-02-20 22:06   ` Carlos O'Donell
2024-02-22 18:41     ` Adhemerval Zanella Netto
2024-02-08 18:46 ` [PATCH v3 03/10] string: " Adhemerval Zanella
2024-02-20 22:06   ` Carlos O'Donell
2024-02-08 18:46 ` [PATCH v3 04/10] stdlib: " Adhemerval Zanella
2024-02-20 22:05   ` Carlos O'Donell
2024-02-22 18:45     ` Adhemerval Zanella Netto [this message]
2024-02-22 19:24     ` Adhemerval Zanella Netto
2024-02-26 14:07       ` Carlos O'Donell
2024-02-08 18:46 ` [PATCH v3 05/10] unistd: " Adhemerval Zanella
2024-02-20 22:06   ` Carlos O'Donell
2024-02-08 18:46 ` [PATCH v3 06/10] socket: " Adhemerval Zanella
2024-02-21 13:20   ` Carlos O'Donell
2024-02-08 18:46 ` [PATCH v3 07/10] syslog: " Adhemerval Zanella
2024-02-20 22:05   ` Carlos O'Donell
2024-02-08 18:46 ` [PATCH v3 08/10] wcsmbs: " Adhemerval Zanella
2024-02-20 22:05   ` Carlos O'Donell
2024-02-08 18:46 ` [PATCH v3 09/10] debug: Improve fcntl.h fortify warnings " Adhemerval Zanella
2024-02-20 22:05   ` Carlos O'Donell
2024-02-08 18:46 ` [PATCH v3 10/10] debug: Improve mqueue.h " Adhemerval Zanella
2024-02-20 22:05   ` Carlos O'Donell
2024-02-20 13:17 ` [PATCH v3 00/10] Improve fortify support " Adhemerval Zanella Netto

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=6b0b1774-749a-4c88-aa78-75caa86aea52@linaro.org \
    --to=adhemerval.zanella@linaro.org \
    --cc=carlos@redhat.com \
    --cc=libc-alpha@sourceware.org \
    --cc=siddhesh@gotplt.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).