/* * Distributed under the terms of the GNU General Public License v2 * $Header: /var/cvs/uClibc/libc/sysdeps/linux/common/ssp.c,v 1.4 2004/11/11 03:13:36 solar Exp $ * * This is a modified version of Hiroaki Etoh's stack smashing routines * implemented for glibc. * * The following people have contributed input to this code. * Ned Ludd - * Alexander Gabert - * The PaX Team - * Peter S. Mazinger - * Yoann Vandoorselaere - * Robert Connolly - * Cory Visi * */ #ifdef HAVE_CONFIG_H # include #endif #include #include #include #include #include #include #include #include #include #include #ifdef __PROPOLICE_BLOCK_SEGV__ #define SSP_SIGTYPE SIGSEGV #elif __PROPOLICE_BLOCK_KILL__ #define SSP_SIGTYPE SIGKILL #else #define SSP_SIGTYPE SIGABRT #endif unsigned long __guard = 0UL; void __guard_setup(void) { size_t size; struct timeval tv; #ifdef HAVE_DEV_ERANDOM int mib[3]; #endif if (__guard != 0UL) return; #ifndef __SSP_QUICK_CANARY__ #ifdef HAVE_DEV_ERANDOM /* Random is another depth in Linux, hence an array of 3. */ mib[0] = CTL_KERN; mib[1] = KERN_RANDOM; mib[2] = RANDOM_ERANDOM; size = sizeof(unsigned long); if (__sysctl(mib, 3, &__guard, &size, NULL, 0) != (-1)) if (__guard != 0UL) return; #endif /* * Attempt to open kernel pseudo random device if one exists before * opening urandom to avoid system entropy depletion. */ { int fd; #ifdef HAVE_DEV_ERANDOM if ((fd = open("/dev/erandom", O_RDONLY)) == (-1)) #endif fd = open("/dev/urandom", O_RDONLY); if (fd != (-1)) { size = read(fd, (char *) &__guard, sizeof(__guard)); close(fd); if (size == sizeof(__guard)) return; } } #endif /* If sysctl was unsuccessful, use the "terminator canary". */ __guard = 0xFF0A0D00UL; /* Everything failed? Or we are using a weakened model of the * terminator canary */ gettimeofday(&tv, NULL); __guard ^= tv.tv_usec ^ tv.tv_sec; } void __stack_smash_handler(char func[], int damaged) { extern char *__progname; const char message[] = ": stack smashing attack in function "; struct sigaction sa; sigset_t mask; sigfillset(&mask); sigdelset(&mask, SSP_SIGTYPE); /* Block all signal handlers */ sigprocmask(SIG_BLOCK, &mask, NULL); /* except SIGABRT */ /* print error message to stderr and syslog */ fprintf(stderr, "%s%s%s()\n", __progname, message, func); syslog(LOG_INFO, "%s%s%s()", __progname, message, func); /* Make sure the default handler is associated with the our signal handler */ memset(&sa, 0, sizeof(struct sigaction)); sigfillset(&sa.sa_mask); /* Block all signals */ sa.sa_flags = 0; sa.sa_handler = SIG_DFL; sigaction(SSP_SIGTYPE, &sa, NULL); (void) kill(getpid(), SSP_SIGTYPE); _exit(127); }