/* Copyright (C) 2005 Free Software Foundation, Inc. This file is part of the GNU C Library. The GNU C Library is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. The GNU C Library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details. You should have received a copy of the GNU Lesser General Public License along with the GNU C Library; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA. */ /* Copyright (C) 2006 Gentoo Foundation Inc. * License terms as above. * * Hardened Gentoo SSP handler * * An SSP failure handler that does not use functions from the rest of * glibc; it uses the INTERNAL_SYSCALL methods directly. This ensures * no possibility of recursion into the handler. * * Direct all bug reports to http://bugs.gentoo.org/ * * Re-written from the glibc-2.3 Hardened Gentoo SSP handler * by Kevin F. Quinn - * * The following people contributed to the glibc-2.3 Hardened * Gentoo SSP handler, from which this implementation draws much: * * Ned Ludd - * Alexander Gabert - * The PaX Team - * Peter S. Mazinger - * Yoann Vandoorselaere - * Robert Connolly - * Cory Visi * Mike Frysinger */ #include #include #include #include #include #include #include #include #include #include /* from sysdeps */ #include /* for the stuff in bits/socket.h */ #include #include /* Sanity check on SYSCALL macro names - force compilation * failure if the names used here do not exist */ #if !defined __NR_socketcall && !defined __NR_socket # error Cannot do syscall socket or socketcall #endif #if !defined __NR_socketcall && !defined __NR_connect # error Cannot do syscall connect or socketcall #endif #ifndef __NR_write # error Cannot do syscall write #endif #ifndef __NR_close # error Cannot do syscall close #endif #ifndef __NR_getpid # error Cannot do syscall getpid #endif #ifndef __NR_kill # error Cannot do syscall kill #endif #ifndef __NR_exit # error Cannot do syscall exit #endif #ifdef SSP_SMASH_DUMPS_CORE # if !defined _KERNEL_NSIG && !defined _NSIG # error No _NSIG or _KERNEL_NSIG for rt_sigaction # endif # if !defined __NR_sigation && !defined __NR_rt_sigaction # error Cannot do syscall sigaction or rt_sigaction # endif #endif /* Define DO_SOCKET/DO_CONNECT macros to deal with socketcall vs socket/connect */ #ifdef __NR_socketcall # define DO_SOCKET(result,domain,type,protocol) \ {socketargs[0] = domain; \ socketargs[1] = type; \ socketargs[2] = protocol; \ socketargs[3] = 0; \ result = INLINE_SYSCALL(socketcall,2,SOCKOP_socket,socketargs);} # define DO_CONNECT(result,sockfd,serv_addr,addrlen) \ {socketargs[0] = sockfd; \ socketargs[1] = (unsigned long int)serv_addr; \ socketargs[2] = addrlen; \ socketargs[3] = 0; \ result = INLINE_SYSCALL(socketcall,2,SOCKOP_connect,socketargs);} #else # define DO_SOCKET(result,domain,type,protocol) \ {result = INLINE_SYSCALL(socket,3,domain,type,protocol);} # define DO_CONNECT(result,sockfd,serv_addr,addrlen) \ {result = INLINE_SYSCALL(connect,3,sockfd,serv_addr,addrlen);} #endif /* __NR_socketcall */ #ifndef _PATH_LOG # define _PATH_LOG "/dev/log" #endif static const char path_log[]=_PATH_LOG; /* For building glibc with SSP switched on, define __progname to a * constant if building for the run-time loader, to avoid pulling * in more of libc.so into ld.so */ #ifdef IS_IN_rtld static char *__progname = ""; #else extern char *__progname; #endif /* Common handler code, used by stack_chk_fail and __stack_smash_handler * Inlined to ensure no self-references to the handler within itself. * Data static to avoid putting more than necessary on the stack, * to aid core debugging. */ static inline void __attribute__ ((__noreturn__ , __always_inline__)) __hardened_gentoo_stack_chk_fail (char func[], int damaged) { #define MESSAGE_BUFSIZ 256 static pid_t pid; static int plen, i; static char message[MESSAGE_BUFSIZ]; static const char msg_ssa[]=": stack smashing attack"; static const char msg_inf[]=" in function "; static const char msg_ssd[]="*** stack smashing detected ***: "; static const char msg_terminated[]=" - terminated\n"; static const char msg_report[]="Report to http://bugs.gentoo.org/\n"; static const char msg_unknown[]=""; #ifdef SSP_SMASH_DUMPS_CORE static struct sigaction default_abort_act; #endif static int log_socket, connect_result; static struct sockaddr_un sock; #ifdef __NR_socketcall static unsigned long int socketargs[4]; #endif /* Build socket address */ sock.sun_family = AF_UNIX; i=0; while ((path_log[i] != '\0') && (i<(sizeof(sock.sun_path)-1))) { sock.sun_path[i]=path_log[i]; i++; } sock.sun_path[i]='\0'; /* Try SOCK_DGRAM connection to syslog */ connect_result=-1; DO_SOCKET(log_socket,AF_UNIX,SOCK_DGRAM,0); if (log_socket != -1) DO_CONNECT(connect_result,log_socket,(&sock),(sizeof(sock))); if (connect_result == -1) { if (log_socket != -1) INLINE_SYSCALL(close,1,log_socket); /* Try SOCK_STREAM connection to syslog */ DO_SOCKET(log_socket,AF_UNIX,SOCK_STREAM,0); if (log_socket != -1) DO_CONNECT(connect_result,log_socket,(&sock),(sizeof(sock))); } /* Build message. Messages are generated both in the old style and new style, * so that log watchers that are configured for the old-style message continue * to work. */ #define strconcat(str) \ {i=0; while ((str[i] != '\0') && ((i+plen)<(MESSAGE_BUFSIZ-1))) \ {\ message[plen+i]=str[i];\ i++;\ }\ plen+=i;} /* R.Henderson post-gcc-4 style message */ plen=0; strconcat(msg_ssd); if (__progname != (char *)0) strconcat(__progname) else strconcat(msg_unknown); strconcat(msg_terminated); /* Write out error message to STDERR, to syslog if open */ INLINE_SYSCALL(write,3,STDERR_FILENO,message,plen); if (connect_result != -1) INLINE_SYSCALL(write,3,log_socket,message,plen); /* Dr. Etoh pre-gcc-4 style message */ plen=0; if (__progname != (char *)0) strconcat(__progname) else strconcat(msg_unknown); strconcat(msg_ssa); strconcat(msg_inf); if (func!=NULL) strconcat(func) else strconcat(msg_unknown); strconcat(msg_terminated); /* Write out error message to STDERR, to syslog if open */ INLINE_SYSCALL(write,3,STDERR_FILENO,message,plen); if (connect_result != -1) INLINE_SYSCALL(write,3,log_socket,message,plen); /* Direct reports to bugs.gentoo.org */ plen=0; strconcat(msg_report); message[plen++]='\0'; /* Write out error message to STDERR, to syslog if open */ INLINE_SYSCALL(write,3,STDERR_FILENO,message,plen); if (connect_result != -1) INLINE_SYSCALL(write,3,log_socket,message,plen); if (log_socket != -1) INLINE_SYSCALL(close,1,log_socket); /* Suicide */ pid=INLINE_SYSCALL(getpid,0); #ifdef SSP_SMASH_DUMPS_CORE /* Remove any user-supplied handler for SIGABRT, before using it */ default_abort_act.sa_handler = SIG_DFL; default_abort_act.sa_sigaction = NULL; __sigfillset(&default_abort_act.sa_mask); default_abort_act.sa_flags = 0; /* sigaction doesn't exist on amd64; however rt_sigaction seems to * exist everywhere. rt_sigaction has an extra parameter - the * size of sigset_t. */ # ifdef __NR_sigation if (INLINE_SYSCALL(sigaction,3,SIGABRT,&default_abort_act,NULL) == 0) # else /* Although rt_sigaction expects sizeof(sigset_t) - it expects the size * of the _kernel_ sigset_t which is not the same as the user sigset_t. * Most arches have this as _NSIG bits - mips has _KERNEL_NSIG bits for * some reason. */ # ifdef _KERNEL_NSIG if (INLINE_SYSCALL(rt_sigaction,4,SIGABRT,&default_abort_act,NULL,_KERNEL_NSIG/8) == 0) # else if (INLINE_SYSCALL(rt_sigaction,4,SIGABRT,&default_abort_act,NULL,_NSIG/8) == 0) # endif # endif INLINE_SYSCALL(kill,2,pid,SIGABRT); #endif /* Note; actions cannot be added to SIGKILL */ INLINE_SYSCALL(kill,2,pid,SIGKILL); /* In case the kill didn't work, exit anyway * The loop prevents gcc thinking this routine returns */ while (1) INLINE_SYSCALL(exit,0); } void __attribute__ ((__noreturn__)) __stack_chk_fail (void) { __hardened_gentoo_stack_chk_fail(NULL,0); } #ifdef ENABLE_OLD_SSP_COMPAT void __attribute__ ((__noreturn__)) __stack_smash_handler(char func[], int damaged) { __hardened_gentoo_stack_chk_fail(func,damaged); } #endif