/* * Distributed under the terms of the GNU Lesser General Public License * $Header: $ * * This is a modified version of Hiroaki Etoh's stack smashing routines * implemented for glibc. * * The following people have contributed input to this code. * Ned Ludd - * Alexander Gabert - * The PaX Team - * Peter S. Mazinger - * Yoann Vandoorselaere - * Robert Connolly - * Cory Visi * Mike Frysinger */ #if defined __SSP__ || defined __SSP_ALL__ #error "file must not be compiled with stack protection enabled on it. Use -fno-stack-protector" #endif #include #include #include #ifdef __UCLIBC_HAS_SYSLOG__ #include #endif #ifdef __PROPOLICE_BLOCK_SEGV__ # define SSP_SIGTYPE SIGSEGV #else # define SSP_SIGTYPE SIGABRT #endif static void do_write(const char *msg) { /* could use inlined syscall here to be sure ... */ return (void) write(STDERR_FILENO, msg, strlen(msg)); } static void __cold do_msg(const char *msg1, const char *msg2, const char *msg3) { do_write(msg1); do_write(msg2); do_write(msg3); do_write("\n"); #ifdef __UCLIBC_HAS_SYSLOG__ syslog(LOG_INFO, "%s%s%s()", msg1, msg2, msg3); #endif } static void __cold attribute_noreturn ssp_handler(void) { pid_t pid; static const char msg_ssd[] = "*** stack smashing detected ***: "; static const char msg_terminated[] = " terminated"; #ifdef __DODEBUG__ struct sigaction sa; sigset_t mask; __sigfillset(&mask); __sigdelset(&mask, SSP_SIGTYPE); /* Block all signal handlers */ sigprocmask(SIG_BLOCK, &mask, NULL); /* except SSP_SIGTYPE */ #endif do_msg(msg_ssd, __uclibc_progname, msg_terminated); pid = getpid(); #ifdef __DODEBUG__ /* Make the default handler associated with the signal handler */ memset(&sa, 0, sizeof(sa)); __sigfillset(&sa.sa_mask); /* Block all signals */ if (SIG_DFL) /* if it's constant zero, it's already done */ sa.sa_handler = SIG_DFL; if (sigaction(SSP_SIGTYPE, &sa, NULL) == 0) (void)kill(pid, SSP_SIGTYPE); #endif (void)kill(pid, SIGKILL); /* The loop is added only to keep gcc happy. */ while(1) _exit(127); } strong_alias(ssp_handler,__stack_chk_fail) #ifdef __UCLIBC_HAS_FORTIFY__ /* should be redone when activated to use common code above. * for now, it works without debugging support */ void __chk_fail(void) { static const char msg_fail[] = "*** buffer overflow detected ***: "; static const char msg_terminated[] = " terminated"; pid_t pid; do_msg(msg_fail, __uclibc_progname, msg_terminated); pid = getpid(); (void)kill(pid, SIGKILL); /* The loop is added only to keep gcc happy. */ while(1) _exit(127); } libc_hidden_def(__chk_fail) #endif