In D3043#205126, @ngie wrote:Is this review still valid?
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Oct 21 2017
Oct 21 2017
Mar 9 2017
Mar 9 2017
Mar 8 2017
Mar 8 2017
Is this review still valid?
Mar 15 2016
Mar 15 2016
We will be abandoning this idea altogether:
Oct 14 2015
Oct 14 2015
hmm, apparently this sat in my account unsubmitted. No idea is it still useful.
Sep 21 2015
Sep 21 2015
Sep 3 2015
Sep 3 2015
I did a detailed review, which Phabricator appears to have eaten. I'll try to summarise here, as there was some talk of committing this, and it is a long way away from being ready to go in the tree:
Sep 1 2015
Sep 1 2015
Update comments from regarding man page.
(I will let Oliver answer David's concerns.)
Fix manpage comments. Thanks!
I've done a partial review. This needs a lot more work before it's close to being ready to commit. I stopped after seeing the same logic errors repeated in many functions - there may be new kinds of error, but please fix the ones that are repeated everywhere first.
Updated the manpage according to wblock's feedback.
Aug 31 2015
Aug 31 2015
I suspect I am a man page away from something I can commit ;)..
Aug 30 2015
Aug 30 2015
As always, thanks for the feedback.
Small updates to the manpage: still a long way to go.
Aug 28 2015
Aug 28 2015
Rebase again: underscore attribute name.
Rebase cdefs.h
Aug 27 2015
Aug 27 2015
Some thoughts from a first read through the man page.
Aug 26 2015
Aug 26 2015
Minor cleanups + initial attempt at providing a man page.
Aug 22 2015
Aug 22 2015
Aug 21 2015
Aug 21 2015
op retitled D3455: [7/N] FORTIFY_SOURCE: add stdio.h related fortified functions: __f{gets,read,write}_chk, __{,v}s{,n}printf_chk from to [7/N] FORTIFY_SOURCE: add stdio.h related fortified functions: __f{gets,read,write}_chk, __{,v}s{,n}printf_chk.
pfg added a comment to D3454: [6/N] FORTIFY_SOURCE: add sys/stat.h related fortified functions: __umask_chk.
Oliver ... please stop opening differential revisions. It doesn't help at all.
op retitled D3454: [6/N] FORTIFY_SOURCE: add sys/stat.h related fortified functions: __umask_chk from add sys/stat.h related fortified functions: __umask_chk to [6/N] FORTIFY_SOURCE: add sys/stat.h related fortified functions: __umask_chk.
op retitled D3454: [6/N] FORTIFY_SOURCE: add sys/stat.h related fortified functions: __umask_chk from to add sys/stat.h related fortified functions: __umask_chk.
op retitled D3453: [5/N] FORTIFY_SOURCE: add sys/socket.h related fortified functions: __recvfrom_chk from to [5/N] FORTIFY_SOURCE: add sys/socket.h related fortified functions: __recvfrom_chk.
op retitled D3452: [4/N] FORTIFY_SOURCE: add sys/poll.h related fortified functions: __poll_chk and __ppoll_chk from to [4/N] FORTIFY_SOURCE: add sys/poll.h related fortified functions: __poll_chk and __ppoll_chk.
op retitled D3450: [3/N] FORTIFY_SOURCE: disable the FORTIFY_SOURCE on programs, which depends on libstand or knowly not compiles with FORTIFTY_SOURCE from to [3/N] FORTIFY_SOURCE: disable the FORTIFY_SOURCE on programs, which depends on libstand or knowly not compiles with FORTIFTY_SOURCE.
op retitled D3449: [2/N] FORTIFY_SOURCE: #undef _FORTIFY_SOURCE to avoid infinite recursion from to [2/N] FORTIFY_SOURCE: #undef _FORTIFY_SOURCE to avoid infinite recursion.
Missing the *_chk functions, without them nothing works.
op retitled D3448: [1/N] FORTIFY_SOURCE: basic requirements and framework from to [1/N] FORTIFY_SOURCE: basic requirements and framework.
Oliver Pinter (4):
FBSD FORTIFY: fix spelling in WITHOUT_FORTIFY FBSD FORTIFY: update gcc build script FBSD FORTIFY: add the ability do disable FORTIFY_SOURCE per compiler FBSD FORTIFY: blacklist from fortified build in gcc case the libbfd, objdump and libsqlite3
Aug 20 2015
Aug 20 2015
In D3043#70047, @pfg wrote:Note some of the issues detected by the exp-run:
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=202311
Note some of the issues detected by the exp-run:
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=202311
Aug 18 2015
Aug 18 2015
FBSD FORTIFY: remove unneeded man page, this page documented a compiler feature instead of the fortify source FBSD FORTIFY: fix jilles comments and add a comment about overlapping FBSD FORTIFY: fix jilles comment in __strlen_chk.c FBSD FORTIFY: optimize and move __fortify_chk_overlap FBSD FORITIFY: undef _FORTIFY_SOURCE in secure_common.c to avoid recursion FBSD FORTIFY: added {,un-}namespace.h around includes in secure_common.c FBSD FORTIFY: fix the build FBSD FORTIFY: change signature
Aug 17 2015
Aug 17 2015
In D3043#69265, @jilles wrote:In D3043#68914, @kib wrote:The diff is enormous and it pollutes a lot of unrelated places. E.g. the loader Makefiles changes or the forced undef fortify in libc/strings/stdio, as I understand, to avoid recursion.
Can the pollution be minimized somehow ? Can the patch be split into digestable pieces ?
Partly the boot loader pollution is like the pollution for SSP. I do wonder why FORTIFY conditionals were added to some places that currently do not have SSP conditionals.
I think compilation features that do not work in boot loader environments will continue to exist and grow, so a more general framework for turning them off may be interesting.
In D3043#69481, @op wrote:...
Can the pollution be minimized somehow ? Can the patch be split into digestable pieces ?The makefile changes mostly correlate with -ffreestanding. I'm thinking about make the MK_SSP and MK_FORTIRY on freestanding. I plan to factor out all of the CFLAGS+= -freestanding to new "make option".
In D3043#68914, @kib wrote:The diff is enormous and it pollutes a lot of unrelated places. E.g. the loader Makefiles changes or the forced undef fortify in libc/strings/stdio, as I understand, to avoid recursion.
Can the pollution be minimized somehow ? Can the patch be split into digestable pieces ?
Aug 16 2015
Aug 16 2015
In D3043#69265, @jilles wrote:Partly the boot loader pollution is like the pollution for SSP. I do wonder why FORTIFY conditionals were added to some places that currently do not have SSP conditionals.
In D3043#68914, @kib wrote:The diff is enormous and it pollutes a lot of unrelated places. E.g. the loader Makefiles changes or the forced undef fortify in libc/strings/stdio, as I understand, to avoid recursion.
Can the pollution be minimized somehow ? Can the patch be split into digestable pieces ?
Aug 14 2015
Aug 14 2015
In D3043#68914, @kib wrote:The diff is enormous and it pollutes a lot of unrelated places. E.g. the loader Makefiles changes or the forced undef fortify in libc/strings/stdio, as I understand, to avoid recursion.
The diff is enormous and it pollutes a lot of unrelated places. E.g. the loader Makefiles changes or the forced undef fortify in libc/strings/stdio, as I understand, to avoid recursion.
Add some more reviewers: It is still WIP, and it needs tmore testing with newer GCC but there are many new files and it's easy for minor details to go unnoticed if I am the only reviewer.
- FBSD FORTIFY: fix undefined reference error with gcc-4.2 on MIPS
- FBSD FORTIFY: fix a typo error_attr -> errordecl
- FBSD FORTIFY: fix build failure GNUC_PREREQ -> __GNUC_PREREQ
- rebased against recent HEAD
Committed as r286760.
No objection.
Aug 13 2015
Aug 13 2015
>>> World build completed on Thu Aug 13 21:30:52 UTC 2015
mips.mips64 buildworld completed on Thu Aug 13 21:30:52 UTC 2015
mips.mips buildworld completed on Thu Aug 13 21:30:52 UTC 2015
mips.mipsn32 buildworld completed on Thu Aug 13 21:30:52 UTC 2015
mips.mipsel buildworld completed on Thu Aug 13 21:30:55 UTC 2015
...
- fix a typo error_attr -> errordecl
- fixed style issues
- added fall-back static function to older gcc compilers
Aug 12 2015
Aug 12 2015
pfg added a reviewer for D3333: Move the stack-protector to a new "secure" directory within libc.: secteam.
This is a no-op, just moving the files, but just want to make sure there are no objections.
Aug 8 2015
Aug 8 2015
Seen on MIPS and POWERPC (gcc-4.2 from base)
> lib/libc/tests/stdio (all)
fmemopen2_test.o: In function `atfu_test_data_length_body':
fmemopen2_test.c:(.text+0xfa4): undefined reference to `__fread_too_big_error'
- fmemopen2_test ---
- [fmemopen2_test] Error code 1
Aug 7 2015
Aug 7 2015
fix the style in sys too
Oliver Pinter (11):
FBSD FORTIFY: blacklist boot/powerpc/uboot from fortified build FBSD FORTIFY: call the original functions from __vs{,n}printf_chk, and not the __*_real version FBSD FORTIFY: drop __gets_chk, discussed with Pedro FBSD FORTIFY: added __getcwd_chk.cpp from bionic FBSD FORTIFY: adapt __getcwd_chk FBSD FORTIFY: cleanup _unistd.h FBSD FORTIFY: take __fread_chk.cpp and __fwrite_chk.cpp from android FBSD FORTIFY: adapt __f{read,write}_chk FBSD: fix expression in _stdio.h, this change should be a no-op FBSD FORTIFY: change ifdef style FBSD FORTIFY: one more round of style change
pfg added a project to D3333: Move the stack-protector to a new "secure" directory within libc.: fortify source.
Jul 30 2015
Jul 30 2015
FBSD FORTIFY: add WITHOUT_FORTIFY knob description FBSD FORTIFY: rename parameter names, requested by ngie FBSD FORTIFY: move the RCS IDs below the license, requested by ngie FBSD FORTIFY: add accent to my name, and remove mail address from copyright
In D3043#65675, @ngie wrote:Also, csh scripts for building HardenedBSD? Ow...
I make it an effort not to install tcsh scripts on my systems. If you need help converting the scripts over, I can assist.
In D3043#65675, @ngie wrote:Also, csh scripts for building HardenedBSD? Ow...
I make it an effort not to install tcsh scripts on my systems. If you need help converting the scripts over, I can assist.
In D3043#65670, @ngie wrote:Per bde's comments before on #ifdef foo vs #if defined(foo), (and the !defined(foo) idiom), the shorter versions should be used.
On a more relevant note -- why are the ssp testcases causing issues?
Also, csh scripts for building HardenedBSD? Ow...
Per bde's comments before on #ifdef foo vs #if defined(foo), (and the !defined(foo) idiom), the shorter versions should be used.
Hi Garret;
FBSD FORTIFY: typo fix in gcc case and remove old comment FBSD FORTIFY: blacklist pc98's loader from fortified build, because they use libstand FBSD FORTIFY: blacklist powerpc/ofw's loader from fortified build, because they use libstand FBSD FORTIFY: blacklist powerpc/ps3's loader from fortified build, because they use libstand FBSD FORTIFY: blacklist sparc64's loader from fortified build, because they use libstand FBSD FORTIFY: lower the fortify level, requested by Pedro
Jul 27 2015
Jul 27 2015
(Currently testing with gcc ...)
- move the __FORTIFY_UNKNOWN_SIZE case from headers to c files
- many style fixes
- microoptimizations
- possible new typos when you compile with gcc, only tested with clang
op@opn secure> git shortlog 20a3b6ffc28dc163f43ec68a67b904b89e8f82f6..
Oliver Pinter (6):
FBSD FORTIFY: try to fix MIPS's build error FBSD FORTIFY: drop __FD_*chk functions from the base FBSD FORTIFY: reenable fortified build of usr.sbin/ppp FBSD FORTIFY: remove _select.h from include/secure/Makefile FBSD FORTIFY: fix c++ build FBSD FORTIFY: guard *_real functions from double declaration
Jul 26 2015
Jul 26 2015