product/upstream/bash.git
2 years agoriscv64: update config.sub 77/284377/1 sandbox/lstelmach/tizen_riscv_base accepted/tizen/base/tool/20221130.233718 submit/tizen_base/20221129.015542
Łukasz Stelmach [Wed, 17 Aug 2022 11:50:13 +0000 (13:50 +0200)]
riscv64: update config.sub

Change-Id: Ib5293afdcc15a39d6a6fb0e202256a2e7169b654
Signed-off-by: Łukasz Stelmach <l.stelmach@samsung.com>
3 years agoSet SYS_BASHRC macro 13/270013/1 accepted/tizen/7.0/base/tool/20221028.110339 accepted/tizen/7.0/base/tool/hotfix/20221115.084808 accepted/tizen/base/tool/20220124.115748 submit/tizen_7.0_base/20221028.194701 submit/tizen_7.0_base_hotfix/20221115.160301 submit/tizen_base/20220124.075844 tizen_7.0_m2_release
DongHun Kwak [Mon, 24 Jan 2022 06:56:52 +0000 (15:56 +0900)]
Set SYS_BASHRC macro

/etc/bashrc

Change-Id: I49b66db46202196bd5a0570e53f163563da50ccb

4 years agopackaging: Enable LTO and set visibility to hidden 83/236383/1 accepted/tizen/6.0/base/20201029.110008 accepted/tizen/6.0/base/tool/20201029.111701 accepted/tizen/6.0/base/tool/hotfix/20201030.124509 accepted/tizen/6.0/base/tool/hotfix/20201102.085627 accepted/tizen/6.5/base/tool/20211027.121810 accepted/tizen/base/tool/20200803.000045 submit/tizen_6.0_base/20201029.184802 submit/tizen_6.0_base_hotfix/20201030.192502 submit/tizen_6.0_base_hotfix/20201102.162702 submit/tizen_6.5_base/20211026.180901 submit/tizen_6.5_base/20211027.183101 submit/tizen_6.5_base/20211027.201201 submit/tizen_base/20200720.235336 submit/tizen_base/20200726.235124 submit/tizen_base/20201207.055733 submit/tizen_base/20201208.051231 submit/tizen_base/20201208.051733 tizen_6.0.m2_release tizen_6.5.m2_release
Slava Barinov [Tue, 16 Jun 2020 13:54:47 +0000 (16:54 +0300)]
packaging: Enable LTO and set visibility to hidden

Change-Id: Ida0e9975246c14bd733cf2e98c7124edcf5fb869
Signed-off-by: Slava Barinov <v.barinov@samsung.com>
6 years agoFix buffer overflow in _rl_copy_to_kill_ring 51/200751/1 submit/tizen_base/20190509.002219
Mikhail Kashkarov [Fri, 1 Mar 2019 16:09:44 +0000 (19:09 +0300)]
Fix buffer overflow in _rl_copy_to_kill_ring

This fix is included in bash-5.0:

commit d233b485e83c3a784b803fb894280773f16f2deb (tag: bash-5.0)
Author: Chet Ramey <chet.ramey@case.edu>
Date:   Mon Jan 7 09:27:52 2019 -0500
...
lib/readline/kill.c
       - _rl_copy_to_kill_ring: make sure the current slot in the kill ring
         has something in it, even if the last command was a kill, before
         trying to modify it. Another fuzzing bug
...

Address Sanitizer report:

==12957==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x607000000700 at pc 0x561a0cc3482c bp 0x7fff4d983030 sp 0x7fff4d983028
READ of size 8 at 0x607000000700 thread T0
    #0 0x561a0cc3482b in _rl_copy_to_kill_ring /usr/src/debug/bash-3.2.57/lib/readline/kill.c:120:0
    #1 0x561a0cc350a8 in rl_kill_text /usr/src/debug/bash-3.2.57/lib/readline/kill.c:183:0
    #2 0x561a0cc3519e in rl_backward_kill_word /usr/src/debug/bash-3.2.57/lib/readline/kill.c:238:0
    #3 0x561a0cc0794a in _rl_dispatch_subseq /usr/src/debug/bash-3.2.57/lib/readline/readline.c:742:0
    #4 0x561a0cc07c18 in _rl_dispatch_subseq /usr/src/debug/bash-3.2.57/lib/readline/readline.c:831:0
    #5 0x561a0cc08007 in readline_internal_char /usr/src/debug/bash-3.2.57/lib/readline/readline.c:519:0
    #6 0x561a0cc08cb4 in readline_internal_charloop /usr/src/debug/bash-3.2.57/lib/readline/readline.c:545:0
    #7 0x561a0cc08cb4 in readline_internal /usr/src/debug/bash-3.2.57/lib/readline/readline.c:559:0
    #8 0x561a0cc08cb4 in readline /usr/src/debug/bash-3.2.57/lib/readline/readline.c:321:0
    #9 0x561a0cb2fa21 in yy_readline_get /usr/src/debug/bash-3.2.57/./parse.y:1218:0
    #10 0x561a0cb3449b in yy_getc /usr/src/debug/bash-3.2.57/./parse.y:1151:0
    #11 0x561a0cb3449b in shell_getc /usr/src/debug/bash-3.2.57/./parse.y:1947:0
    #12 0x561a0cb372e0 in read_token /usr/src/debug/bash-3.2.57/./parse.y:2594:0
    #13 0x561a0cb3c05a in yylex /usr/src/debug/bash-3.2.57/./parse.y:2223:0
    #14 0x561a0cb3dd7a in yyparse /usr/src/debug/bash-3.2.57/y.tab.c:5133:0
    #15 0x561a0cb2e6a1 in parse_command /usr/src/debug/bash-3.2.57/eval.c:222:0
    #16 0x561a0cb2e8cc in read_command /usr/src/debug/bash-3.2.57/eval.c:266:0
    #17 0x561a0cb2ee45 in reader_loop /usr/src/debug/bash-3.2.57/eval.c:132:0
    #18 0x561a0cb2b537 in main /usr/src/debug/bash-3.2.57/shell.c:715:0
    #19 0x7fda249d71f0 in __libc_start_main /usr/src/debug/glibc-2.24/csu/../csu/libc-start.c:289:0
    #20 0x561a0cb2d059 in ?? /usr/src/debug//////////////glibc-2.24/csu/../sysdeps/x86_64/start.S:120:0 (/emul/usr/bin/bash+0x6f059)

0x607000000700 is located 0 bytes to the right of 80-byte region [0x6070000006b0,0x607000000700)
allocated by thread T0 here:
    #0 0x7fda25043790 in __interceptor_realloc _asan_rtl_:0
    #1 0x561a0cbd01a3 in xrealloc /usr/src/debug/bash-3.2.57/xmalloc.c:109:0
    #2 0x561a0cc3458d in _rl_copy_to_kill_ring /usr/src/debug/bash-3.2.57/lib/readline/kill.c:125:0
    #3 0x561a0cc350a8 in rl_kill_text /usr/src/debug/bash-3.2.57/lib/readline/kill.c:183:0
    #4 0x561a0cc3519e in rl_backward_kill_word /usr/src/debug/bash-3.2.57/lib/readline/kill.c:238:0
    #5 0x561a0cc0794a in _rl_dispatch_subseq /usr/src/debug/bash-3.2.57/lib/readline/readline.c:742:0
    #6 0x561a0cc07c18 in _rl_dispatch_subseq /usr/src/debug/bash-3.2.57/lib/readline/readline.c:831:0
    #7 0x561a0cc08007 in readline_internal_char /usr/src/debug/bash-3.2.57/lib/readline/readline.c:519:0
    #8 0x561a0cc08cb4 in readline_internal_charloop /usr/src/debug/bash-3.2.57/lib/readline/readline.c:545:0
    #9 0x561a0cc08cb4 in readline_internal /usr/src/debug/bash-3.2.57/lib/readline/readline.c:559:0
    #10 0x561a0cc08cb4 in readline /usr/src/debug/bash-3.2.57/lib/readline/readline.c:321:0
    #11 0x561a0cb2fa21 in yy_readline_get /usr/src/debug/bash-3.2.57/./parse.y:1218:0
    #12 0x561a0cb3449b in yy_getc /usr/src/debug/bash-3.2.57/./parse.y:1151:0
    #13 0x561a0cb3449b in shell_getc /usr/src/debug/bash-3.2.57/./parse.y:1947:0
    #14 0x561a0cb372e0 in read_token /usr/src/debug/bash-3.2.57/./parse.y:2594:0
    #15 0x561a0cb3c05a in yylex /usr/src/debug/bash-3.2.57/./parse.y:2223:0
    #16 0x561a0cb3dd7a in yyparse /usr/src/debug/bash-3.2.57/y.tab.c:5133:0
    #17 0x561a0cb2e6a1 in parse_command /usr/src/debug/bash-3.2.57/eval.c:222:0
    #18 0x561a0cb2e8cc in read_command /usr/src/debug/bash-3.2.57/eval.c:266:0
    #19 0x561a0cb2ee45 in reader_loop /usr/src/debug/bash-3.2.57/eval.c:132:0
    #20 0x561a0cb2b537 in main /usr/src/debug/bash-3.2.57/shell.c:715:0
    #21 0x7fda249d71f0 in __libc_start_main /usr/src/debug/glibc-2.24/csu/../csu/libc-start.c:289:0

SUMMARY: AddressSanitizer: heap-buffer-overflow (/emul/usr/bin/bash+0x17682b)
Shadow bytes around the buggy address:
  0x0c0e7fff8090: 00 00 00 00 00 00 00 00 00 fa fa fa fa fa 00 00
  0x0c0e7fff80a0: 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa
  0x0c0e7fff80b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c0e7fff80c0: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd
  0x0c0e7fff80d0: fd fa fa fa fa fa 00 00 00 00 00 00 00 00 00 00
=>0x0c0e7fff80e0:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c0e7fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c0e7fff8100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c0e7fff8110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c0e7fff8120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c0e7fff8130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa

Change-Id: If4281b0aea13a411c7bf327656f4f34ab79500b0

7 years agochange cflags option 95/167995/1 accepted/tizen_5.0_base accepted/tizen_5.5_base accepted/tizen_5.5_base_mobile_hotfix accepted/tizen_5.5_base_wearable_hotfix tizen_5.0_base tizen_5.5_base tizen_5.5_base_mobile_hotfix tizen_5.5_base_wearable_hotfix tizen_5.5_tv accepted/tizen/5.0/base/20181101.091548 accepted/tizen/5.5/base/20191030.084528 accepted/tizen/5.5/base/mobile/hotfix/20201023.084030 accepted/tizen/5.5/base/wearable/hotfix/20201023.080421 accepted/tizen/base/20180126.040746 submit/tizen_5.0_base/20181101.000002 submit/tizen_5.5_base/20191030.000001 submit/tizen_5.5_base_mobile_hotfix/20201023.171502 submit/tizen_5.5_base_wearable_hotfix/20201023.155602 submit/tizen_base/20180123.090103 submit/tizen_base/20180531.070507 tizen_5.5.m2_release
DongHun Kwak [Tue, 23 Jan 2018 07:55:41 +0000 (16:55 +0900)]
change cflags option

[Model] All
[BinType] AP
[Customer] OPEN

[Issue#] N/A
[Request] N/A
[Occurrence Version] N/A

[Problem]
[Cause & Measure] fPIE -> fPIC
[Checking Method]

[Team] Open Source Management and Setting Part
[Developer] dh0128.kwak
[Solution company] Samsung
[Change Type] N/A

Change-Id: I5e7771b54318411f223699ea40643a12c64b96f0
Signed-off-by: DongHun Kwak <dh0128.kwak@samsung.com>
7 years agoapply ASLR options 44/144444/1 accepted/tizen/base/20170901.225409 submit/tizen_base/20170817.011914
MyoungJune Park [Fri, 11 Aug 2017 06:40:57 +0000 (15:40 +0900)]
apply ASLR options

Change-Id: I27317cce30bb5b18dc5776c6317a65237492107d
Signed-off-by: MyoungJune Park <mj2004.park@samsung.com>
Signed-off-by: DongHun Kwak <dh0128.kwak@samsung.com>
9 years ago[TINF-1406] gbs chroot does not load "/etc/profile" 86/71786/1 accepted/tizen_3.0.m2_base accepted/tizen_3.0_base tizen_3.0 tizen_3.0.m2_base tizen_3.0_base accepted/tizen/3.0.m2/base/20170104.082122 accepted/tizen/3.0/base/20161028.103430 accepted/tizen/4.0/base/20170811.093058 accepted/tizen/4.0/base/20170828.221400 accepted/tizen/base/20160602.023934 submit/tizen_3.0.m2_base/20170104.072059 submit/tizen_3.0.m2_base/20170104.073748 submit/tizen_3.0_base/20161028.062326 submit/tizen_4.0_base/20170811.071500 submit/tizen_4.0_base/20170828.000000 submit/tizen_4.0_base/20170828.000001 submit/tizen_base/20160530.044056 tizen_4.0.m1_release
DongHun Kwak [Fri, 27 May 2016 05:57:16 +0000 (14:57 +0900)]
[TINF-1406] gbs chroot does not load "/etc/profile"

[Model] ALL
[BinType] AP
[Customer] OPEN

[Issue#] N/A
[Request] N/A
[Occurrence Version] N/A

[Problem] gbs chroot does not load "/etc/profile"
[Cause & Measure] Defined NON_INTERACTIVE_LOGIN_SHELLS flag
[Checking Method]
sudo vim path_to_buildroot/scratch.armv7l.0/etc/profile
At the end append: export FOO=1
sudo chroot path_to_buildroot/scratch.armv7l.0/
su -c env - abuild
expected result:
It should prints: FOO=1

[Team] Open Source Management and Setting Part
[Developer] dh0128.kwak
[Solution company] Samsung
[Change Type] N/A

Change-Id: If3c557cb3bb1c47fbecb6989f27551e5ab872085
Signed-off-by: DongHun Kwak <dh0128.kwak@samsung.com>
9 years agoFix Build error. 14/55714/2 accepted/tizen_common accepted/tizen/base/20151229.114316 accepted/tizen/common/20160107.114050 submit/tizen_base/20151229.075051 submit/tizen_common/20160104.112601
DongHun Kwak [Tue, 29 Dec 2015 01:38:36 +0000 (10:38 +0900)]
Fix Build error.

Change-Id: Iea0d0bc4f8fee53aca3f9355135da713dd8a72e4
Signed-off-by: DongHun Kwak <dh0128.kwak@samsung.com>
9 years agoBump to Bash 3.2.57 24/54424/1 submit/tizen/20151223.035455
DongHun Kwak [Tue, 15 Dec 2015 07:34:59 +0000 (16:34 +0900)]
Bump to Bash 3.2.57

Sync with tizen 2.4
Run unit test

Change-Id: I5fa76c14280318a3c945e4d4f706a1fa03994a15
Signed-off-by: DongHun Kwak <dh0128.kwak@samsung.com>
9 years agoImported Upstream version 3.2.57 51/54351/1 upstream upstream/3.2.57
DongHun Kwak [Tue, 15 Dec 2015 04:35:28 +0000 (13:35 +0900)]
Imported Upstream version 3.2.57

Change-Id: I6af9900cf91de089601c1b1472646b6a3618fbcf
Signed-off-by: DongHun Kwak <dh0128.kwak@samsung.com>
9 years agoInitial empty repository master
KyungMi Lee [Thu, 10 Dec 2015 23:15:57 +0000 (15:15 -0800)]
Initial empty repository