platform_bionic/libc
Jeremy Compostella 611ad621c6 Revert "Add 64-bit slm optimized strlcpy and srlcat."
This reverts commit 2e7145c048.

When src is at the end page, the sse2 strlcpy SSE2 optimized version
can issue a movdqu instruction that can cross the page boundary.  If
the next page is not allocated to that process, it leads to
segmentation fault.  This is a rare but has be caught multiple times
during robustness testing.

We isolated a way to reproduce that issue outside of an Android device
and we have been able to resolve this particular case.  However, we
ran some additional compliance and robustness tests and found several
other similar page crossing issues with this implementation.

In conclusion, this optimization needs to be re-written from scratch
because its design is at cause.  In the meantime, it is better to
remove it.

Change-Id:  If90450de430ba9b7cd9282a422783beabd701f3d
Signed-off-by: Jeremy Compostella <jeremy.compostella@intel.com>
2018-04-12 14:00:43 -07:00
..
arch-arm Merge "Remove __overloadable/__RENAME_CLANG" 2018-02-10 02:30:37 +00:00
arch-arm64 bionic: add vdso clock_getres 2017-12-07 09:41:48 -08:00
arch-common/bionic Merge "crtbegin: Correctly align ESP to 16 for __i386__" 2018-02-09 06:56:31 +00:00
arch-mips Remove __overloadable/__RENAME_CLANG 2018-02-06 13:35:56 -08:00
arch-mips64 bionic: add vdso clock_getres 2017-12-07 09:41:48 -08:00
arch-x86 Fix sigsetjmp/siglongjmp to save/restore RT signals on arm/x86 too. 2018-01-31 17:47:16 -08:00
arch-x86_64 Revert "Add 64-bit slm optimized strlcpy and srlcat." 2018-04-12 14:00:43 -07:00
async_safe Switch the rest of our internal headers to #pragma once. 2018-02-13 14:27:17 -08:00
bionic Support getting/setting API level in static binaries. 2018-04-03 21:53:29 -07:00
dns Pad queries when EDNS0 is enabled. 2018-04-02 05:28:16 +00:00
include Pad queries when EDNS0 is enabled. 2018-04-02 05:28:16 +00:00
kernel Use the ion.h from the kernel headers. 2018-02-22 20:22:14 +00:00
malloc_debug Point to the NDK wrap.sh docs. 2018-04-06 15:13:14 -07:00
malloc_hooks Implement malloc hooks. 2018-02-13 13:37:30 -08:00
private bionic_fortify: clarify error message for an out of bounds FD. 2018-03-14 12:37:25 +00:00
seccomp Merge "Revert "Revert system seccomp filter changes"" 2018-04-02 23:43:50 +00:00
stdio Call __fortify_fatal if printf sees %n. 2018-03-07 13:32:58 -08:00
stdlib Mark __BIONIC_WEAK_FOR_NATIVE_BRIDGE symbols 2017-10-27 10:01:46 +02:00
system_properties Remove non-trivial constructors/destructors from SystemProperties 2018-02-21 15:10:17 -08:00
tools Block bunch of privileged syscalls to apps 2018-01-22 22:30:17 -08:00
tzcode Add strptime %s. 2018-02-28 16:29:40 -08:00
upstream-freebsd Change ARG_MAX/_SC_ARG_MAX back to a constant. 2017-11-15 15:14:35 -08:00
upstream-netbsd libc: Add support to allow library calls to find appropriate shell executable for a process 2017-08-22 10:17:28 -07:00
upstream-openbsd Rewrite system(3) to use posix_spawn(3). 2018-03-05 17:20:12 -08:00
versioner-dependencies Unified sysroot: kill arch-specific include dirs. 2017-10-12 13:19:51 -07:00
Android.bp Revert "Add 64-bit slm optimized strlcpy and srlcat." 2018-04-12 14:00:43 -07:00
Android.mk
fs_config_generator.py
libc.arm.map Fortify ppoll64. 2018-03-22 13:59:02 -07:00
libc.arm64.map Fortify ppoll64. 2018-03-22 13:59:02 -07:00
libc.map.txt Fortify ppoll64. 2018-03-22 13:59:02 -07:00
libc.mips.map Fortify ppoll64. 2018-03-22 13:59:02 -07:00
libc.mips64.map Fortify ppoll64. 2018-03-22 13:59:02 -07:00
libc.x86.map Fortify ppoll64. 2018-03-22 13:59:02 -07:00
libc.x86_64.map Fortify ppoll64. 2018-03-22 13:59:02 -07:00
libstdc++.arm.map
libstdc++.arm64.map
libstdc++.map.txt
libstdc++.mips.map
libstdc++.mips64.map
libstdc++.x86.map
libstdc++.x86_64.map
MODULE_LICENSE_BSD
NOTICE Rewrite getentropy. 2018-02-05 12:57:22 -08:00
SECCOMP_BLACKLIST_APP.TXT Allow several syscalls to app process 2018-03-28 16:30:20 -07:00
SECCOMP_BLACKLIST_COMMON.TXT Split zygote's seccomp filter into two 2018-01-04 12:28:40 -08:00
SECCOMP_WHITELIST_APP.TXT Revert "Revert system seccomp filter changes" 2018-03-30 16:48:36 +00:00
SECCOMP_WHITELIST_COMMON.TXT Revert "Revert system seccomp filter changes" 2018-03-30 16:48:36 +00:00
SECCOMP_WHITELIST_GLOBAL.TXT
SECCOMP_WHITELIST_SYSTEM.TXT Add bpf syscall to seccomp whitelist 2018-01-18 12:08:34 -08:00
SYSCALLS.TXT Add sigset64_t and accompanying functions. 2018-01-30 18:47:16 -08:00
version_script.txt