aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2015-03-31Replace __attribute__((visibility("protected")))hjl/pr17711/2.19H.J. Lu
With copy relocation, address of protected data defined in the shared library may be external. Compiler shouldn't asssume protected data will be local. But due to https://gcc.gnu.org/bugzilla/show_bug.cgi?id=65248 __attribute__((visibility("protected"))) doesn't work correctly, we need to use asm (".protected xxx") instead. Cherry-pick from master: e0ed2fb40a0e29c43cf60addc74741dab15f2e05 * elf/ifuncdep2.c (global): Replace __attribute__((visibility("protected"))) with asm (".protected global"). * elf/ifuncmod1.c (global): Likewise. * elf/ifuncmod5.c (global): Likewise.
2015-03-31Add a testcase for copy reloc against protected dataH.J. Lu
Linkers in some versions of binutils 2.25 and 2.26 don't support protected data symbol with error messsage like: /usr/bin/ld: copy reloc against protected `bar' is invalid /usr/bin/ld: failed to set dynamic section sizes: Bad value We check if linker supports copy reloc against protected data symbol to avoid running the test if linker is broken. Cherry-pick from master: 83569fb894050db7430047da2219ca50c68f882a [BZ #17711] * config.make.in (have-protected-data): New. * configure.ac: Check linker support for protected data symbol. * configure: Regenerated. * elf/Makefile (modules-names): Add tst-protected1moda and tst-protected1modb if $(have-protected-data) is yes. (tests): Add tst-protected1a and tst-protected1b if $(have-protected-data) is yes. ($(objpfx)tst-protected1a): New. ($(objpfx)tst-protected1b): Likewise. (tst-protected1modb.so-no-z-defs): Likewise. * elf/tst-protected1a.c: New file. * elf/tst-protected1b.c: Likewise. * elf/tst-protected1mod.h: Likewise. * elf/tst-protected1moda.c: Likewise. * elf/tst-protected1modb.c: Likewise.
2015-03-31Add ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA to x86H.J. Lu
With copy relocation, address of protected data defined in the shared library may be external. When there is a relocation against the protected data symbol within the shared library, we need to check if we should skip the definition in the executable copied from the protected data. This patch adds ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA and defines it for x86. If ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA isn't 0, do_lookup_x will skip the data definition in the executable from copy reloc. Cherry-pick from master: 62da1e3b00b51383ffa7efc89d8addda0502e107 [BZ #17711] * elf/dl-lookup.c (do_lookup_x): When UNDEF_MAP is NULL, which indicates it is called from do_lookup_x on relocation against protected data, skip the data definion in the executable from copy reloc. (_dl_lookup_symbol_x): Pass ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA, instead of ELF_RTYPE_CLASS_PLT, to do_lookup_x for EXTERN_PROTECTED_DATA relocation against STT_OBJECT symbol. * sysdeps/generic/ldsodefs.h * (ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA): New. Defined to 4 if DL_EXTERN_PROTECTED_DATA is defined, otherwise to 0. * sysdeps/i386/dl-lookupcfg.h (DL_EXTERN_PROTECTED_DATA): New. * sysdeps/i386/dl-machine.h (elf_machine_type_class): Set class to ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA for R_386_GLOB_DAT. * sysdeps/x86_64/dl-lookupcfg.h (DL_EXTERN_PROTECTED_DATA): New. * sysdeps/x86_64/dl-machine.h (elf_machine_type_class): Set class to ELF_RTYPE_CLASS_EXTERN_PROTECTED_DATA for R_X86_64_GLOB_DAT.
2014-11-11[AArch64] End frame record chain correctly.Renlin Li
2014-09-05CVE-2014-6040: Crashes on invalid input in IBM gconv modules [BZ #17325]Florian Weimer
These changes are based on the fix for BZ #14134 in commit 6e230d11837f3ae7b375ea69d7905f0d18eb79e5. (cherry picked from commit 41488498b6d9440ee66ab033808cce8323bba7ac) Conflicts: NEWS iconvdata/Makefile
2014-09-05__gconv_translit_find: Disable function [BZ #17187]Florian Weimer
This functionality has never worked correctly, and the implementation contained a security vulnerability (CVE-2014-5119). (cherry picked from commit a1a6a401ab0a3c9f15fb7eaebbdcee24192254e8) (cherry picked from commit f9df71e895d3552d557e783fdb9d133328195645) Conflicts: NEWS
2014-09-05NEWS: Explain the s390 jmp_buf / ucontext_t ABI change reversal.Stefan Liebler
(cherry picked from commit 95ee7fb13ba99ba265b49531c57e1cb8db629bc6) Typo fix as in commit 45ef66289acbab17278a73512f9b2a9d8a7ca79d and NEW enty adjusted to reflect revert occuring in 2.19.1 and 2.20. Conflicts: NEWS
2014-09-05S/390: Revert the jmp_buf/ucontext_t ABI changeStefan Liebler
Backport of commit 2f438e20ab591641760e97458d5d1569942eced5
2014-09-05manual: Update the locale documentationFlorian Weimer
(cherry picked from commit 585367266923156ac6fb789939a923641ba5aaf4) Conflicts: manual/locale.texi
2014-09-05_nl_find_locale: Improve handling of crafted locale names [BZ #17137]Florian Weimer
Prevent directory traversal in locale-related environment variables (CVE-2014-0475). (cherry picked from commit 4e8f95a0df7c2300b830ec12c0ae1e161bc8a8a3) Addiational backporting fixes: Added tst-setlocale3-ENV to localedata/Makefile Conflicts: NEWS localedata/Makefile
2014-09-05setlocale: Use the heap for the copy of the locale argumentFlorian Weimer
This avoids alloca calls with potentially large arguments. (cherry picked from commit d183645616b0533b3acee28f1a95570bffbdf50f)
2014-09-05Use NSS_STATUS_TRYAGAIN to indicate insufficient buffer (BZ #16878)Siddhesh Poyarekar
The netgroups nss modules in the glibc tree use NSS_STATUS_UNAVAIL (with errno as ERANGE) when the supplied buffer does not have sufficient space for the result. This is wrong, because the canonical way to indicate insufficient buffer is to set the errno to ERANGE and the status to NSS_STATUS_TRYAGAIN, as is used by all other modules. This fixes nscd behaviour when the nss_ldap module returns NSS_STATUS_TRYAGAIN to indicate that a netgroup entry is too long to fit into the supplied buffer. (cherry picked from commit c3ec475c5dd16499aa040908e11d382c3ded9692) Conflicts: NEWS
2014-09-05Provide correct buffer length to netgroup queries in nscd (BZ #16695)Siddhesh Poyarekar
The buffer to query netgroup entries is allocated sufficient space for the netgroup entries and the key to be appended at the end, but it sends in an incorrect available length to the NSS netgroup query functions, resulting in overflow of the buffer in some special cases. The fix here is to factor in the key length when sending the available buffer and buffer length to the query functions. (cherry picked from commit c44496df2f090a56d3bf75df930592dac6bba46f) Conflicts: NEWS
2014-09-05[BZ #16046] dl_iterate_phdr static executable testMaciej W. Rozycki
(cherry picked from commit 257ce7127e2f64a6a959b146786cd43de0e42b5f)
2014-09-05Fix another memory leak in regexp compiler (BZ #17069)Andreas Schwab
(cherry picked from commit aa6ec754f3b4b1df81d186480c534b6486a1e6ee) Conflicts: NEWS
2014-09-05Fix memory leak in regexp compiler (BZ #17069)Andreas Schwab
(cherry picked from commit 4d43ef1e7434d7d419afbcd754931cb0c794763c) Conflicts: posix/Makefile
2014-09-05Fix invalid file descriptor reuse while sending DNS query (BZ #15946)Andreas Schwab
(cherry picked from commit f9d2d03254a58d92635a311a42253eeed5a40a47) Conflicts: NEWS
2014-09-05Properly fix memory leak in _nss_dns_gethostbyname4_r with big DNS answerAndreas Schwab
Instead of trying to guess whether the second buffer needs to be freed set a flag at the place it is allocated (cherry picked from commit ab09bf616ad527b249aca5f2a4956fd526f0712f)
2014-09-05Deduplicate resolv/nss_dns/dns-host.cOndřej Bílka
In resolv/nss_dns/dns-host.c one of code path duplicated code after that. We merge these paths. (cherry picked from commit ab7ac0f2cf8731fe4c3f3aea6088a7c0127b5725)
2014-09-05Fix memory leak in _nss_dns_gethostbyname4_r with big DNS answerAndreas Schwab
(cherry picked from commit d668061994a7486a3ba9c7d5e7882d85a2883707) Conflicts: NEWS
2014-09-05Fix unbound stack use in NIS NSS moduleAndreas Schwab
(cherry picked from commit 315eb1d86aea489cd6325fd1c2521dcfb4fc0e1c) Conflicts: NEWS
2014-09-05Mention CVE-2014-4043 in NEWSAllan McRae
(cherry picked from commit d03efb2f979defd473955a455d66b949961d26b2) Conflicts: NEWS
2014-09-05posix_spawn_faction_addopen: Add missing string.h include directiveStefan Liebler
This is needed to avoid a PLT call on s390. (cherry picked from commit 35a5e3e338ae17f3d42c60a708763c5d498fb840)
2014-06-22posix_spawn_file_actions_addopen needs to copy the path argument (BZ 17048)Florian Weimer
POSIX requires that we make a copy, so we allocate a new string and free it in posix_spawn_file_actions_destroy. Reported by David Reid, Alex Gaynor, and Glyph Lefkowitz. This bug may have security implications. (cherry picked from commit 89e435f3559c53084498e9baad22172b64429362) Conflicts: NEWS
2014-06-03Fixed pthread_spin_lock on sparc32/64 (bug 16882)Guo Yixuan
[BZ #16882] * nptl/sysdeps/sparc/sparc32/pthread_spin_lock.S (pthread_spin_lock): Branch out of spin loop to proper location. * nptl/sysdeps/sparc/sparc64/pthread_spin_lock.S (pthread_spin_lock): Likewise. * nptl/tst-spin4.c: New test. * nptl/Makefile (tests): Add tst-spin4.
2014-05-21aarch64: Merge __local_multiple_threads offset with memory referenceRichard Henderson
This also highlights that we'd been loading 64-bits instead of the proper 32-bits. Caught by the linker as a relocation error, since the variable happened to be unaligned for 64-bits. Cherry-pick of a6b3657be6bc5067aeec98d990f60765361c6557.
2014-05-17Fix sparc memcpy data corruption when using niagara2 optimized routines.Jose E. Marchesi
* sysdeps/sparc/sparc64/multiarch/memcpy-niagara2.S: Add missing membar to avoid block loads/stores to overlap previous stores.
2014-05-16tzselect: use zonedir instead of current working directorySami Kerola
(cherry picked from commit 893b4f375668c025cbd6828f82a8844edda276d1) (cherry picked from commit c72399fbc5228580a560d8fe319ff98150928b05) Conflicts: timezone/Makefile
2014-05-16Update Swedish translationsAllan McRae
(cherry picked from commit d51d659d114e2edb0037b2af45d6ee36458e48d1)
2014-05-16SPARC: add prlimit and prlimit64 in <bits/resource.h> (BZ #16943)Aurelien Jarno
prlimit and prlimit64 have been added in the main <bits/resource.h>, but not in the SPARC specific version. Fix that. Note: this is Debian bug#703559, reported by Emilio Pozuelo Monfort <pochu@debian.org> (cherry picked from commit d16e6ec7ca2c861ba681e3a2fbd431725774292e)
2014-05-07SPARC: add EFD_SEMAPHORE in <bits/eventfd.h> (BZ #16916)Aurelien Jarno
EFD_SEMAPHORE has been added in the main <bits/eventfd.h>, but not in the SPARC specific version. Fix that. (cherry picked from commit 83df9ad0cc861ef24f08a88c5a4c055e2516d33c)
2014-05-04misc/sys/xattr.h: guard against linux uapi header inclusionSerge Hallyn
If the glibc xattr.h header is included after the uapi header, compilation fails due to an enum re-using a #define from the uapi header. Protect against this by guarding the define and enum inclusions against each other. (A corresponding kernel patch has been sent here: http://lkml.org/lkml/2014/3/7/331 ) (See https://lists.debian.org/debian-glibc/2014/03/msg00029.html and https://sourceware.org/glibc/wiki/Synchronizing_Headers for more information.) Signed-off-by: Serge Hallyn <serge.hallyn@ubuntu.com> (cherry picked from commit fdbe8eae2b9aed74dabba1b0a189c5d7d61bf032)
2014-05-04Update Esperanto translationsAllan McRae
(cherry picked from commit d69aeb123961252ddd2a23acc7dc9ce0ae2cfa5f)
2014-05-01NEWS: Add 16885 to fixed bug list.David S. Miller
2014-05-01Fix v9/64-bit strcmp when string ends in multiple zero bytes.David S. Miller
[BZ #16885] * sysdeps/sparc/sparc64/strcmp.S: Fix end comparison handling when multiple zero bytes exist at the end of a string. Reported by Aurelien Jarno <aurelien@aurel32.net> * string/test-strcmp.c (check): Add explicit test for situations where there are multiple zero bytes after the first.
2014-02-27Fix sign of input to bsloww1 (BZ #16623)Siddhesh Poyarekar
In 84ba214c, I removed some redundant sign computations and in the process, I incorrectly got rid of a temporary variable, thus passing the absolute value of the input to bsloww1. This caused #16623. This fix undoes the incorrect change.
2014-02-20Update x86_64 libm-test-ulps on AMD family 21h model 1 (bug 16545).Dylan Alex Simon
(cherry picked from commit fbfdf9cb039486f66994637081862c01bbd6a765) Conflicts: NEWS
2014-02-07Update version.h and include/features.h for 2.19 releaseglibc-2.19Allan McRae
2014-02-07Bug 15968 was fixed by commit 0748546f660d27a2ad29fa6174d456e2f6490758.Joseph Myers
2014-02-07Bug 6981 was fixed by commit 1484e65736f4cab27e5051e0f06be8470e69af82.Joseph Myers
2014-02-06BZ #16529: Fix pedantic warning with netinet/in.h.Carlos O'Donell
When compiling with pedantic the following warning is seen: gcc -Wall -pedantic -O0 -o test test.c In file included from test.c:3:0: /path/inet/netinet/in.h:111:21: warning: comma at end of \ enumerator list [-Wpedantic] IPPROTO_MH = 135, /* IPv6 mobility header. */ ^ It is valid C99 to have a trailing comma after the last item in an enumeration. However it is not valid C90. If possible glibc attempts to keep all headers C90 + long long without requiring C99 features. In this case it's easy to fix the headers and it removes the warning seem with -pedantic.
2014-02-06Update contrib.texiSiddhesh Poyarekar
Update blurb for Roland, Alex, Ryan, Joseph and Carlos.
2014-02-05Add missing ChangeLog from yesterday's sparc ULPs update.David S. Miller
2014-02-06Revert "microblaze BZ #15705: Define MMAP2_PAGE_SHIFT"David Holsgrove
This reverts commit 79b846ecc0275ceb02b5e2d3b03a34d7c43e6bf9. Conflicts: NEWS ports/ChangeLog.microblaze Signed-off-by: David Holsgrove <david.holsgrove@xilinx.com>
2014-02-06Revert "BZ 16133 has been fixed (async signal safe TLS)."Allan McRae
This reverts commit a494421f5268df333c589d71104a39bb6a9cff19. Conflicts: NEWS
2014-02-06Revert "Patch [1/4] async-signal safe TLS."Allan McRae
This reverts commit 69a17d9d245dc3551792e95e1823cc2d877592f3.
2014-02-06Revert "Patch 3/4 of the effort to make TLS access async-signal-safe."Allan McRae
This reverts commit 35e8f7ab94c910659de9d507aa0f3e1f8973d914.
2014-02-06Revert "Patch 2/4 of the effort to make TLS access async-signal-safe."Allan McRae
This reverts commit 1f33d36a8a9e78c81bed59b47f260723f56bb7e6. Conflicts: elf/dl-misc.c Also reverts the follow commits that were bug fixes to new code introduced in the above commit: 063b2acbce83549df82ab30f5af573f1b9c4bd19 b627fdd58554bc36bd344dc40a8787c4b7a9cc46 e81c64bba13d2d8b2a4e53254a82cc80f27c8497
2014-02-06Revert "Async-signal safe TLS."Allan McRae
This reverts commit 7f507ee17aee720fa423fa38502bc3caa0dd03d7. Conflicts: ChangeLog nptl/tst-tls7.c nptl/tst-tls7mod.c
2014-02-05Fix comment in kernel-features.h.Carlos O'Donell
Use "was" not "were."