public inbox for newlib@sourceware.org
 help / color / mirror / Atom feed
From: Yaakov Selkowitz <yselkowi@redhat.com>
To: newlib@sourceware.org
Subject: [PATCH v4 00/10] Add Stack Smashing Protection and Object Size Checking
Date: Wed, 29 Nov 2017 00:22:00 -0000	[thread overview]
Message-ID: <20171129002143.12500-1-yselkowi@redhat.com> (raw)

Changes in this version:
* Added __ssp_decl macro for cleaner "custom" inline wrappers (e.g. fread)
* Switched fgets wrapper to pure inline
* Added missing declaration of __mempcpy_chk
* Added basic documentation

Yaakov Selkowitz (10):
  ssp: add APIs for Stack Smashing Protection
  ssp: add Object Size Checking common code
  ssp: add Object Size Checking for string.h functions
  ssp: add Object Size Checking for strings.h functions
  ssp: add Object Size Checking for stdio.h functions, part 1
  ssp: add Object Size Checking for unistd.h functions, part 1
  ssp: add documentation
  ssp: add build infrastructure
  cygwin: export SSP functions
  cygwin: create libssp compatibility import library

 newlib/Makefile.am                     |   4 +
 newlib/Makefile.in                     |   4 +
 newlib/libc/Makefile.am                |   4 +-
 newlib/libc/Makefile.in                |  15 +-
 newlib/libc/configure                  |   3 +-
 newlib/libc/configure.in               |   2 +-
 newlib/libc/include/ssp/ssp.h          |  75 ++++
 newlib/libc/include/ssp/stdio.h        | 101 +++++
 newlib/libc/include/ssp/string.h       | 115 ++++++
 newlib/libc/include/ssp/strings.h      |  55 +++
 newlib/libc/include/ssp/unistd.h       |  53 +++
 newlib/libc/include/stdio.h            |  12 +
 newlib/libc/include/string.h           |   4 +
 newlib/libc/include/strings.h          |   6 +-
 newlib/libc/include/sys/features.h     |  18 +-
 newlib/libc/include/sys/unistd.h       |  11 +
 newlib/libc/libc.in.xml                |   1 +
 newlib/libc/libc.texinfo               |   1 +
 newlib/libc/ssp/Makefile.am            |  69 ++++
 newlib/libc/ssp/Makefile.in            | 706 +++++++++++++++++++++++++++++++++
 newlib/libc/ssp/chk_fail.c             |  13 +
 newlib/libc/ssp/gets_chk.c             |  78 ++++
 newlib/libc/ssp/memcpy_chk.c           |  54 +++
 newlib/libc/ssp/memmove_chk.c          |  50 +++
 newlib/libc/ssp/mempcpy_chk.c          |  21 +
 newlib/libc/ssp/memset_chk.c           |  49 +++
 newlib/libc/ssp/snprintf_chk.c         |  59 +++
 newlib/libc/ssp/sprintf_chk.c          |  63 +++
 newlib/libc/ssp/ssp.tex                |  44 ++
 newlib/libc/ssp/stack_protector.c      |  45 +++
 newlib/libc/ssp/stpcpy_chk.c           |  58 +++
 newlib/libc/ssp/stpncpy_chk.c          |  56 +++
 newlib/libc/ssp/strcat_chk.c           |  62 +++
 newlib/libc/ssp/strcpy_chk.c           |  55 +++
 newlib/libc/ssp/strncat_chk.c          |  73 ++++
 newlib/libc/ssp/strncpy_chk.c          |  55 +++
 newlib/libc/ssp/vsnprintf_chk.c        |  51 +++
 newlib/libc/ssp/vsprintf_chk.c         |  60 +++
 winsup/cygwin/Makefile.in              |   5 +-
 winsup/cygwin/common.din               |  19 +
 winsup/cygwin/include/cygwin/version.h |   7 +-
 41 files changed, 2223 insertions(+), 13 deletions(-)
 create mode 100644 newlib/libc/include/ssp/ssp.h
 create mode 100644 newlib/libc/include/ssp/stdio.h
 create mode 100644 newlib/libc/include/ssp/string.h
 create mode 100644 newlib/libc/include/ssp/strings.h
 create mode 100644 newlib/libc/include/ssp/unistd.h
 create mode 100644 newlib/libc/ssp/Makefile.am
 create mode 100644 newlib/libc/ssp/Makefile.in
 create mode 100644 newlib/libc/ssp/chk_fail.c
 create mode 100644 newlib/libc/ssp/gets_chk.c
 create mode 100644 newlib/libc/ssp/memcpy_chk.c
 create mode 100644 newlib/libc/ssp/memmove_chk.c
 create mode 100644 newlib/libc/ssp/mempcpy_chk.c
 create mode 100644 newlib/libc/ssp/memset_chk.c
 create mode 100644 newlib/libc/ssp/snprintf_chk.c
 create mode 100644 newlib/libc/ssp/sprintf_chk.c
 create mode 100644 newlib/libc/ssp/ssp.tex
 create mode 100644 newlib/libc/ssp/stack_protector.c
 create mode 100644 newlib/libc/ssp/stpcpy_chk.c
 create mode 100644 newlib/libc/ssp/stpncpy_chk.c
 create mode 100644 newlib/libc/ssp/strcat_chk.c
 create mode 100644 newlib/libc/ssp/strcpy_chk.c
 create mode 100644 newlib/libc/ssp/strncat_chk.c
 create mode 100644 newlib/libc/ssp/strncpy_chk.c
 create mode 100644 newlib/libc/ssp/vsnprintf_chk.c
 create mode 100644 newlib/libc/ssp/vsprintf_chk.c

-- 
2.15.0

             reply	other threads:[~2017-11-29  0:22 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-11-29  0:22 Yaakov Selkowitz [this message]
2017-11-29  0:21 ` [PATCH v4 01/10] ssp: add APIs for Stack Smashing Protection Yaakov Selkowitz
2017-11-29  0:22 ` [PATCH v4 06/10] ssp: add Object Size Checking for unistd.h functions, part 1 Yaakov Selkowitz
2017-11-29  0:22 ` [PATCH v4 02/10] ssp: add Object Size Checking common code Yaakov Selkowitz
2017-11-29  0:22 ` [PATCH v4 10/10] cygwin: create libssp compatibility import library Yaakov Selkowitz
2017-11-29  0:22 ` [PATCH v4 07/10] ssp: add documentation Yaakov Selkowitz
2017-11-29  0:29 ` [PATCH v4 05/10] ssp: add Object Size Checking for stdio.h functions, part 1 Yaakov Selkowitz
2017-11-29  0:29 ` [PATCH v4 03/10] ssp: add Object Size Checking for string.h functions Yaakov Selkowitz
2017-11-29  0:31 ` [PATCH v4 09/10] cygwin: export SSP functions Yaakov Selkowitz
2017-11-29  0:31 ` [PATCH v4 08/10] ssp: add build infrastructure Yaakov Selkowitz
2017-11-29  9:43 ` [PATCH v4 04/10] ssp: add Object Size Checking for strings.h functions Yaakov Selkowitz

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20171129002143.12500-1-yselkowi@redhat.com \
    --to=yselkowi@redhat.com \
    --cc=newlib@sourceware.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).