123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132 |
- /*
- * Distributed under the terms of the GNU Lesser General Public License
- * $Header: $
- *
- * This is a modified version of Hiroaki Etoh's stack smashing routines
- * implemented for glibc.
- *
- * The following people have contributed input to this code.
- * Ned Ludd - <solar[@]gentoo.org>
- * Alexander Gabert - <pappy[@]gentoo.org>
- * The PaX Team - <pageexec[@]freemail.hu>
- * Peter S. Mazinger - <ps.m[@]gmx.net>
- * Yoann Vandoorselaere - <yoann[@]prelude-ids.org>
- * Robert Connolly - <robert[@]linuxfromscratch.org>
- * Cory Visi <cory[@]visi.name>
- * Mike Frysinger <vapier[@]gentoo.org>
- */
- #if defined __SSP__ || defined __SSP_ALL__
- #error "file must not be compiled with stack protection enabled on it. Use -fno-stack-protector"
- #endif
- #include <string.h>
- #include <unistd.h>
- #include <signal.h>
- #ifdef __UCLIBC_HAS_SYSLOG__
- #include <sys/syslog.h>
- #endif
- #ifdef __PROPOLICE_BLOCK_SEGV__
- # define SSP_SIGTYPE SIGSEGV
- #else
- # define SSP_SIGTYPE SIGABRT
- #endif
- static void do_write(const char *msg)
- {
- /* could use inlined syscall here to be sure ... */
- return (void) write(STDERR_FILENO, msg, strlen(msg));
- }
- static void __cold do_msg(const char *msg1, const char *msg2, const char *msg3)
- {
- do_write(msg1);
- do_write(msg2);
- do_write(msg3);
- do_write("\n");
- #ifdef __UCLIBC_HAS_SYSLOG__
- syslog(LOG_INFO, "%s%s%s()", msg1, msg2, msg3);
- #endif
- }
- static void __cold attribute_noreturn
- #ifdef __UCLIBC_HAS_SSP_COMPAT__
- ssp_handler(char func[])
- #else
- ssp_handler(void)
- #endif
- {
- pid_t pid;
- static const char msg_ssd[] = "*** stack smashing detected ***: ";
- static const char msg_terminated[] = " terminated";
- #ifdef __UCLIBC_HAS_SSP_COMPAT__
- static const char msg_ssa[] = ": stack smashing attack in function ";
- #endif
- #ifdef __DODEBUG__
- struct sigaction sa;
- sigset_t mask;
- __sigfillset(&mask);
- __sigdelset(&mask, SSP_SIGTYPE); /* Block all signal handlers */
- sigprocmask(SIG_BLOCK, &mask, NULL); /* except SSP_SIGTYPE */
- #endif
- #ifdef __UCLIBC_HAS_SSP_COMPAT__
- if (func != NULL)
- do_msg(__uclibc_progname, msg_ssa, func);
- else
- #endif
- do_msg(msg_ssd, __uclibc_progname, msg_terminated);
- pid = getpid();
- #ifdef __DODEBUG__
- /* Make the default handler associated with the signal handler */
- memset(&sa, 0, sizeof(sa));
- __sigfillset(&sa.sa_mask); /* Block all signals */
- if (SIG_DFL) /* if it's constant zero, it's already done */
- sa.sa_handler = SIG_DFL;
- if (sigaction(SSP_SIGTYPE, &sa, NULL) == 0)
- (void)kill(pid, SSP_SIGTYPE);
- #endif
- (void)kill(pid, SIGKILL);
- /* The loop is added only to keep gcc happy. */
- while(1)
- _exit(127);
- }
- #ifdef __UCLIBC_HAS_SSP_COMPAT__
- void __stack_smash_handler(char func[], int damaged) attribute_noreturn __cold;
- void __stack_smash_handler(char func[], int damaged attribute_unused)
- {
- ssp_handler(func);
- }
- void __stack_chk_fail(void)
- {
- ssp_handler(NULL);
- }
- #else
- strong_alias(ssp_handler,__stack_chk_fail)
- #endif
- #ifdef __UCLIBC_HAS_FORTIFY__
- /* should be redone when activated to use common code above.
- * for now, it works without debugging support */
- void __chk_fail(void)
- {
- static const char msg_fail[] = "*** buffer overflow detected ***: ";
- static const char msg_terminated[] = " terminated";
- pid_t pid;
- do_msg(msg_fail, __uclibc_progname, msg_terminated);
- pid = getpid();
- (void)kill(pid, SIGKILL);
- /* The loop is added only to keep gcc happy. */
- while(1)
- _exit(127);
- }
- libc_hidden_def(__chk_fail)
- #endif
|