From f97377b242f609a558e12e53bbe9c0b88c42ab0e Mon Sep 17 00:00:00 2001 From: Andrei Gherzan <andrei.gherzan@huawei.com> Date: Thu, 9 Dec 2021 12:41:14 +0100 Subject: [PATCH] busybox: Drop -Wformat-security patch as it doesn't apply for 1.34.1 Signed-off-by: Andrei Gherzan <andrei.gherzan@huawei.com> --- .../busybox-1.31.1-Wformat-security.patch | 199 ------------------ ...ybox-1.31.1-Wformat-security.patch.license | 2 - .../recipes-core/busybox/busybox_%.bbappend | 16 +- 3 files changed, 3 insertions(+), 214 deletions(-) delete mode 100644 meta-oniro-core/recipes-core/busybox/busybox/busybox-1.31.1-Wformat-security.patch delete mode 100644 meta-oniro-core/recipes-core/busybox/busybox/busybox-1.31.1-Wformat-security.patch.license diff --git a/meta-oniro-core/recipes-core/busybox/busybox/busybox-1.31.1-Wformat-security.patch b/meta-oniro-core/recipes-core/busybox/busybox/busybox-1.31.1-Wformat-security.patch deleted file mode 100644 index 1ebda4c9..00000000 --- a/meta-oniro-core/recipes-core/busybox/busybox/busybox-1.31.1-Wformat-security.patch +++ /dev/null @@ -1,199 +0,0 @@ -From bernhard.rosenkraenzer.ext@huawei.com Thu Sep 2 12:30:04 2021 -From: Bernhard Rosenkraenzer <bernhard.rosenkraenzer.ext@huawei.com> -Date: Thu, 2 Sep 2021 12:30:04 +0100 -Subject: [PATCH] Fix -Wformat-string warnings - -Make sure we don't pass potentially dangerous strings to printf-like functions. -This fixes building in OPTIMIZE_FOR=security mode (-Werror=format-string). - -Signed-off-by: Bernhard Rosenkraenzer <bernhard.rosenkraenzer.ext@huawei.com> -Upstream-Status: Pending - -diff -up busybox-1.31.1/archival/libarchive/decompress_gunzip.c.omv~ busybox-1.31.1/archival/libarchive/decompress_gunzip.c ---- busybox-1.31.1/archival/libarchive/decompress_gunzip.c.omv~ 2021-09-02 11:08:42.987268111 +0200 -+++ busybox-1.31.1/archival/libarchive/decompress_gunzip.c 2021-09-02 11:08:48.491282095 +0200 -@@ -1022,7 +1022,7 @@ inflate_unzip_internal(STATE_PARAM trans - error_msg = "corrupted data"; - if (setjmp(error_jmp)) { - /* Error from deep inside zip machinery */ -- bb_error_msg(error_msg); -+ bb_error_msg("%s", error_msg); - n = -1; - goto ret; - } -diff -up busybox-1.31.1/libbb/fflush_stdout_and_exit.c.omv~ busybox-1.31.1/libbb/fflush_stdout_and_exit.c ---- busybox-1.31.1/libbb/fflush_stdout_and_exit.c.omv~ 2021-09-02 11:10:03.489471808 +0200 -+++ busybox-1.31.1/libbb/fflush_stdout_and_exit.c 2021-09-02 11:10:11.948493100 +0200 -@@ -15,7 +15,7 @@ void FAST_FUNC fflush_stdout_and_exit(in - { - xfunc_error_retval = retval; - if (fflush(stdout)) -- bb_perror_msg_and_die(bb_msg_standard_output); -+ bb_perror_msg_and_die("%s", bb_msg_standard_output); - /* In case we are in NOFORK applet. Do not exit() directly, - * but use xfunc_die() */ - xfunc_die(); -diff -up busybox-1.31.1/libbb/xfuncs_printf.c.omv~ busybox-1.31.1/libbb/xfuncs_printf.c ---- busybox-1.31.1/libbb/xfuncs_printf.c.omv~ 2021-09-02 11:13:01.210916054 +0200 -+++ busybox-1.31.1/libbb/xfuncs_printf.c 2021-09-02 11:13:13.371946229 +0200 -@@ -27,7 +27,7 @@ - - void FAST_FUNC bb_die_memory_exhausted(void) - { -- bb_error_msg_and_die(bb_msg_memory_exhausted); -+ bb_error_msg_and_die("%s", bb_msg_memory_exhausted); - } - - #ifndef DMALLOC -@@ -40,7 +40,7 @@ void* FAST_FUNC malloc_or_warn(size_t si - { - void *ptr = malloc(size); - if (ptr == NULL && size != 0) -- bb_error_msg(bb_msg_memory_exhausted); -+ bb_error_msg("%s", bb_msg_memory_exhausted); - return ptr; - } - -diff -up busybox-1.31.1/networking/ping.c.omv~ busybox-1.31.1/networking/ping.c ---- busybox-1.31.1/networking/ping.c.omv~ 2021-09-02 11:06:55.945994276 +0200 -+++ busybox-1.31.1/networking/ping.c 2021-09-02 11:07:14.816042825 +0200 -@@ -184,8 +184,8 @@ create_icmp_socket(void) - sock = socket(AF_INET, SOCK_RAW, 1); /* 1 == ICMP */ - if (sock < 0) { - if (errno == EPERM) -- bb_error_msg_and_die(bb_msg_perm_denied_are_you_root); -- bb_perror_msg_and_die(bb_msg_can_not_create_raw_socket); -+ bb_error_msg_and_die("%s", bb_msg_perm_denied_are_you_root); -+ bb_perror_msg_and_die("%s", bb_msg_can_not_create_raw_socket); - } - - xmove_fd(sock, pingsock); -diff -up busybox-1.31.1/networking/traceroute.c.omv~ busybox-1.31.1/networking/traceroute.c ---- busybox-1.31.1/networking/traceroute.c.omv~ 2021-09-02 11:06:32.367933433 +0200 -+++ busybox-1.31.1/networking/traceroute.c 2021-09-02 11:06:48.343974681 +0200 -@@ -875,7 +875,7 @@ common_traceroute_main(int op, char **ar - * probe (e.g., on a multi-homed host). - */ - if (getuid() != 0) -- bb_error_msg_and_die(bb_msg_you_must_be_root); -+ bb_error_msg_and_die("%s", bb_msg_you_must_be_root); - } - if (op & OPT_WAITTIME) - waittime = xatou_range(waittime_str, 1, 24 * 60 * 60); -diff -up busybox-1.31.1/shell/ash.c.omv~ busybox-1.31.1/shell/ash.c ---- busybox-1.31.1/shell/ash.c.omv~ 2021-09-02 11:15:04.255220263 +0200 -+++ busybox-1.31.1/shell/ash.c 2021-09-02 11:15:54.587344068 +0200 -@@ -4223,7 +4223,7 @@ sprint_status48(char *s, int status, int - } - st &= 0x7f; - //TODO: use bbox's get_signame? strsignal adds ~600 bytes to text+rodata -- col = fmtstr(s, 32, strsignal(st)); -+ col = fmtstr(s, 32, "%s", strsignal(st)); - if (WCOREDUMP(status)) { - strcpy(s + col, " (core dumped)"); - col += sizeof(" (core dumped)")-1; -diff -up busybox-1.31.1/loginutils/addgroup.c.omv~ busybox-1.31.1/loginutils/addgroup.c ---- busybox-1.31.1/loginutils/addgroup.c.omv~ 2021-09-02 17:52:53.644854060 +0200 -+++ busybox-1.31.1/loginutils/addgroup.c 2021-09-02 17:53:07.412923202 +0200 -@@ -149,7 +149,7 @@ int addgroup_main(int argc UNUSED_PARAM, - - /* need to be root */ - if (geteuid()) { -- bb_error_msg_and_die(bb_msg_perm_denied_are_you_root); -+ bb_error_msg_and_die("%s", bb_msg_perm_denied_are_you_root); - } - /* Syntax: - * addgroup group -diff -up busybox-1.31.1/loginutils/adduser.c.omv~ busybox-1.31.1/loginutils/adduser.c ---- busybox-1.31.1/loginutils/adduser.c.omv~ 2021-09-02 17:50:27.751128814 +0200 -+++ busybox-1.31.1/loginutils/adduser.c 2021-09-02 17:50:34.763163329 +0200 -@@ -193,7 +193,7 @@ int adduser_main(int argc UNUSED_PARAM, - - /* got root? */ - if (geteuid()) { -- bb_error_msg_and_die(bb_msg_perm_denied_are_you_root); -+ bb_error_msg_and_die("%s", bb_msg_perm_denied_are_you_root); - } - - pw.pw_gecos = (char *)"Linux User,,,"; -diff -up busybox-1.31.1/loginutils/deluser.c.omv~ busybox-1.31.1/loginutils/deluser.c ---- busybox-1.31.1/loginutils/deluser.c.omv~ 2021-09-02 17:44:26.398416096 +0200 -+++ busybox-1.31.1/loginutils/deluser.c 2021-09-02 17:44:47.114509906 +0200 -@@ -76,7 +76,7 @@ int deluser_main(int argc, char **argv) - #endif - - if (geteuid() != 0) -- bb_error_msg_and_die(bb_msg_perm_denied_are_you_root); -+ bb_error_msg_and_die("%s", bb_msg_perm_denied_are_you_root); - - name = argv[1]; - member = NULL; -diff -up busybox-1.31.1/networking/udhcp/arpping.c.omv~ busybox-1.31.1/networking/udhcp/arpping.c ---- busybox-1.31.1/networking/udhcp/arpping.c.omv~ 2021-09-02 17:59:15.301802783 +0200 -+++ busybox-1.31.1/networking/udhcp/arpping.c 2021-09-02 17:59:24.787851883 +0200 -@@ -53,7 +53,7 @@ int FAST_FUNC arpping(uint32_t test_nip, - - s = socket(PF_PACKET, SOCK_PACKET, htons(ETH_P_ARP)); - if (s == -1) { -- bb_perror_msg(bb_msg_can_not_create_raw_socket); -+ bb_perror_msg("%s", bb_msg_can_not_create_raw_socket); - return -1; - } - -diff -up busybox-1.31.1/util-linux/mount.c.omv~ busybox-1.31.1/util-linux/mount.c ---- busybox-1.31.1/util-linux/mount.c.omv~ 2021-09-02 17:54:39.676389182 +0200 -+++ busybox-1.31.1/util-linux/mount.c 2021-09-02 17:55:53.673765879 +0200 -@@ -745,7 +745,7 @@ static int mount_it_now(struct mntent *m - // Abort entirely if permission denied. - - if (rc && errno == EPERM) -- bb_error_msg_and_die(bb_msg_perm_denied_are_you_root); -+ bb_error_msg_and_die("%s", bb_msg_perm_denied_are_you_root); - - // If the mount was successful, and we're maintaining an old-style - // mtab file by hand, add the new entry to it now. -@@ -2113,7 +2113,7 @@ static int singlemount(struct mntent *mp - ); - if (loopfd < 0) { - if (errno == EPERM || errno == EACCES) -- bb_error_msg(bb_msg_perm_denied_are_you_root); -+ bb_error_msg("%s", bb_msg_perm_denied_are_you_root); - else - bb_perror_msg("can't setup loop device"); - return errno; -@@ -2321,7 +2321,7 @@ int mount_main(int argc UNUSED_PARAM, ch - // argument when we get it. - if (argv[1]) { - if (nonroot) -- bb_error_msg_and_die(bb_msg_you_must_be_root); -+ bb_error_msg_and_die("%s", bb_msg_you_must_be_root); - mtpair->mnt_fsname = argv[0]; - mtpair->mnt_dir = argv[1]; - mtpair->mnt_type = fstype; -@@ -2338,7 +2338,7 @@ int mount_main(int argc UNUSED_PARAM, ch - - cmdopt_flags = parse_mount_options(cmdopts, NULL); - if (nonroot && (cmdopt_flags & ~MS_SILENT)) // Non-root users cannot specify flags -- bb_error_msg_and_die(bb_msg_you_must_be_root); -+ bb_error_msg_and_die("%s", bb_msg_you_must_be_root); - - // If we have a shared subtree flag, don't worry about fstab or mtab. - if (ENABLE_FEATURE_MOUNT_FLAGS -@@ -2403,7 +2403,7 @@ int mount_main(int argc UNUSED_PARAM, ch - // No, mount -a won't mount anything, - // even user mounts, for mere humans - if (nonroot) -- bb_error_msg_and_die(bb_msg_you_must_be_root); -+ bb_error_msg_and_die("%s", bb_msg_you_must_be_root); - - // Does type match? (NULL matches always) - if (!fstype_matches(mtcur->mnt_type, fstype)) -@@ -2483,7 +2483,7 @@ int mount_main(int argc UNUSED_PARAM, ch - // fstab must have "users" or "user" - l = parse_mount_options(mtcur->mnt_opts, NULL); - if (!(l & MOUNT_USERS)) -- bb_error_msg_and_die(bb_msg_you_must_be_root); -+ bb_error_msg_and_die("%s", bb_msg_you_must_be_root); - } - - //util-linux-2.12 does not do this check. diff --git a/meta-oniro-core/recipes-core/busybox/busybox/busybox-1.31.1-Wformat-security.patch.license b/meta-oniro-core/recipes-core/busybox/busybox/busybox-1.31.1-Wformat-security.patch.license deleted file mode 100644 index 2a2d9f5d..00000000 --- a/meta-oniro-core/recipes-core/busybox/busybox/busybox-1.31.1-Wformat-security.patch.license +++ /dev/null @@ -1,2 +0,0 @@ -# SPDX-FileCopyrightText: Huawei Inc. -# SPDX-License-Identifier: Apache-2.0 diff --git a/meta-oniro-core/recipes-core/busybox/busybox_%.bbappend b/meta-oniro-core/recipes-core/busybox/busybox_%.bbappend index 162b87ab..afb542e6 100644 --- a/meta-oniro-core/recipes-core/busybox/busybox_%.bbappend +++ b/meta-oniro-core/recipes-core/busybox/busybox_%.bbappend @@ -3,16 +3,6 @@ # SPDX-License-Identifier: Apache-2.0 FILESEXTRAPATHS:prepend := "${THISDIR}/${PN}:" -SRC_URI += "file://busybox-1.31.1-Wformat-security.patch \ - file://oniro.cfg" - -# busybox implements some of its own string handling that triggers -# warnings with -Wformat-nonliteral. -# This has been verified to be harmless in 1.31.1. -# -# Removing -Werror=format-nonliteral here allows us to use -# -Werror=format-nonliteral globally in OPTIMIZE_FOR=security mode -# while keeping busybox building. - -TARGET_CFLAGS:remove = "-Wformat-nonliteral -Werror=format-nonliteral" - +SRC_URI += " \ + file://oniro.cfg \ +" -- GitLab