Loading...
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 | /*
* Distributed under the terms of the GNU Lesser General Public License
* $Header: $
*
* This is a modified version of Hiroaki Etoh's stack smashing routines
* implemented for glibc.
*
* The following people have contributed input to this code.
* Ned Ludd - <solar[@]gentoo.org>
* Alexander Gabert - <pappy[@]gentoo.org>
* The PaX Team - <pageexec[@]freemail.hu>
* Peter S. Mazinger - <ps.m[@]gmx.net>
* Yoann Vandoorselaere - <yoann[@]prelude-ids.org>
* Robert Connolly - <robert[@]linuxfromscratch.org>
* Cory Visi <cory[@]visi.name>
* Mike Frysinger <vapier[@]gentoo.org>
*/
#if defined __SSP__ || defined __SSP_ALL__
#error "file must not be compiled with stack protection enabled on it. Use -fno-stack-protector"
#endif
#include <string.h>
#include <unistd.h>
#include <signal.h>
#ifdef __UCLIBC_HAS_SYSLOG__
#include <sys/syslog.h>
#endif
#ifdef __PROPOLICE_BLOCK_SEGV__
# define SSP_SIGTYPE SIGSEGV
#else
# define SSP_SIGTYPE SIGABRT
#endif
static void do_write(const char *msg)
{
/* could use inlined syscall here to be sure ... */
return (void) write(STDERR_FILENO, msg, strlen(msg));
}
static void __cold do_msg(const char *msg1, const char *msg2, const char *msg3)
{
do_write(msg1);
do_write(msg2);
do_write(msg3);
do_write("\n");
#ifdef __UCLIBC_HAS_SYSLOG__
syslog(LOG_INFO, "%s%s%s()", msg1, msg2, msg3);
#endif
}
static void __cold attribute_noreturn
ssp_handler(void)
{
pid_t pid;
static const char msg_ssd[] = "*** stack smashing detected ***: ";
static const char msg_terminated[] = " terminated";
#ifdef __DODEBUG__
struct sigaction sa;
sigset_t mask;
__sigfillset(&mask);
__sigdelset(&mask, SSP_SIGTYPE); /* Block all signal handlers */
sigprocmask(SIG_BLOCK, &mask, NULL); /* except SSP_SIGTYPE */
#endif
do_msg(msg_ssd, __uclibc_progname, msg_terminated);
pid = getpid();
#ifdef __DODEBUG__
/* Make the default handler associated with the signal handler */
memset(&sa, 0, sizeof(sa));
__sigfillset(&sa.sa_mask); /* Block all signals */
if (SIG_DFL) /* if it's constant zero, it's already done */
sa.sa_handler = SIG_DFL;
if (sigaction(SSP_SIGTYPE, &sa, NULL) == 0)
(void)kill(pid, SSP_SIGTYPE);
#endif
(void)kill(pid, SIGKILL);
/* The loop is added only to keep gcc happy. */
while(1)
_exit(127);
}
strong_alias(ssp_handler,__stack_chk_fail)
#ifdef __UCLIBC_HAS_FORTIFY__
/* should be redone when activated to use common code above.
* for now, it works without debugging support */
void __chk_fail(void)
{
static const char msg_fail[] = "*** buffer overflow detected ***: ";
static const char msg_terminated[] = " terminated";
pid_t pid;
do_msg(msg_fail, __uclibc_progname, msg_terminated);
pid = getpid();
(void)kill(pid, SIGKILL);
/* The loop is added only to keep gcc happy. */
while(1)
_exit(127);
}
libc_hidden_def(__chk_fail)
#endif
|