Re: Sourceware mitigating and preventing the next xz-backdoor

2024-04-10 Thread James K. Lowden
On Mon, 1 Apr 2024 17:06:17 +0200 Mark Wielaard wrote: > We should discuss what we have been doing and should do more to > mitigate and prevent the next xz-backdoor. Since we're working on a compiler, "On Trusting Trust" comes to mind. Russ Cox posted some thoughts last year that might be appli

Re: Sourceware mitigating and preventing the next xz-backdoor

2024-04-10 Thread Frank Ch. Eigler via Gcc
Hi - >This is very true, however a few words of caution: IME this is a >maintainability nightmare. Fixing patches that forgot to regenerate, >regenerating on rebase, confirming everything is up-to-date before >merge, etc etc. It can be handled, I have, but it was painful and >t

Re: Sourceware mitigating and preventing the next xz-backdoor

2024-04-10 Thread Alejandro Colomar via Gcc
Hi Joel, On Wed, Apr 03, 2024 at 08:53:21AM -0500, Joel Sherrill wrote: > On Wed, Apr 3, 2024, 3:09 AM Florian Weimer via Gdb > wrote: > > > * Guinevere Larsen via Overseers: > > > > > Beyond that, we (GDB) are already experimenting with approved-by, and > > > I think glibc was doing the same. >

[RFC] Linux system call builtins

2024-04-10 Thread Matheus Afonso Martins Moreira via Gcc
> Yes, for regular function calls, > but at least in the case of NetBSD, > not for syscalls. Those are the registers Linux uses for system calls on MIPS. They are documented as such here: https://www.man7.org/linux/man-pages/man2/syscall.2.html > The second table shows the registers used > to pa

Re: Sourceware mitigating and preventing the next xz-backdoor

2024-04-10 Thread Frank Ch. Eigler via Gcc
Hi - > In Autotools, `make dist` produces a tarball that contains many > files not present in the source respoitory, it includes build system > core files and this fact was used for the xz attack. In contrast, > for newer build systems the "release tarball" is purely a snapshot > of the source rep

[RFC] Linux system call builtins

2024-04-10 Thread Matheus Afonso Martins Moreira via Gcc
> because the portable c api layer and syscall abi layer > has a large enough gap that applications can break > libc internals by doing raw syscalls. I think that problem cannot really be fixed. System call users just have to be aware of it. It's true that using certain system calls can clobber l

Re: [RFC] Linux system call builtins

2024-04-10 Thread Paul Koning via Gcc
> On Apr 9, 2024, at 9:48 PM, Matheus Afonso Martins Moreira via Gcc > wrote: > > ... > MIPS calling conventions work like this: > >> mips/n32,64 a0 a1 a2 a3 a4 a5 >> mips/o32a0 a1 a2 a3 ... >> mips/o32args5-8 are passed on the stack Yes, for regular function calls, but at least in

Re: [RFC] Linux system call builtins

2024-04-10 Thread Szabolcs Nagy via Gcc
The 04/09/2024 23:59, Matheus Afonso Martins Moreira via Gcc wrote: > > and using raw syscalls outside of the single runtime the > > application is using is problematic (at least on linux). > > Why do you say they are problematic on Linux though? Please elaborate. because the portable c api layer

Re: Sourceware mitigating and preventing the next xz-backdoor

2024-04-10 Thread Claudio Bantaloukas via Gcc
On 09/04/2024 18:57, Andreas Schwab wrote: > On Apr 09 2024, anderson.jonath...@gmail.com wrote: > >> - This xz backdoor injection unpacked attacker-controlled files and ran them >> during `configure`. Newer build systems implement a build abstraction (aka >> DSL) that acts similar to a sandbo