5059ab35f3
git-svn-id: https://svn.disconnected-by-peer.at/svn/linamh/trunk/linamh@1552 6952d904-891a-0410-993b-d76249ca496b
156 lines
4.2 KiB
C
156 lines
4.2 KiB
C
/*
|
|
* Distributed under the terms of the GNU General Public License v2
|
|
* $Header: /var/cvsroot/gentoo-x86/sys-libs/glibc/files/2.3.5/ssp.c,v 1.3 2005/06/07 01:38:58 vapier Exp $
|
|
*
|
|
* This is a modified version of Hiroaki Etoh's stack smashing routines
|
|
* implemented for glibc.
|
|
*
|
|
* The following people have contributed input to this code.
|
|
* Ned Ludd - <solar[@]gentoo.org>
|
|
* Alexander Gabert - <pappy[@]gentoo.org>
|
|
* The PaX Team - <pageexec[@]freemail.hu>
|
|
* Peter S. Mazinger - <ps.m[@]gmx.net>
|
|
* Yoann Vandoorselaere - <yoann[@]prelude-ids.org>
|
|
* Robert Connolly - <robert[@]linuxfromscratch.org>
|
|
* Cory Visi <cory@visi.name>
|
|
*
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
# include <config.h>
|
|
#endif
|
|
|
|
#ifdef __SSP__
|
|
# error ssp.c has to be built w/ -fno-stack-protector
|
|
#endif
|
|
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <fcntl.h>
|
|
#include <unistd.h>
|
|
#include <signal.h>
|
|
#include <sys/types.h>
|
|
#include <sys/un.h>
|
|
#include <sys/syslog.h>
|
|
#include <sys/time.h>
|
|
#ifdef __SSP_USE_ERANDOM__
|
|
# include <sys/sysctl.h>
|
|
#endif
|
|
|
|
#ifdef __PROPOLICE_BLOCK_SEGV__
|
|
# define SSP_SIGTYPE SIGSEGV
|
|
#elif __PROPOLICE_BLOCK_KILL__
|
|
# define SSP_SIGTYPE SIGKILL
|
|
#else
|
|
# define SSP_SIGTYPE SIGABRT
|
|
#endif
|
|
|
|
unsigned long __guard = 0UL;
|
|
|
|
/* Use of __* functions from the rest of glibc here avoids
|
|
* initialisation problems for executables preloaded with
|
|
* libraries that overload the associated standard library
|
|
* functions.
|
|
*/
|
|
#ifdef __UCLIBC__
|
|
extern int __libc_open(__const char *file, int flags, ...);
|
|
extern ssize_t __libc_read(int fd, void *buf, size_t count);
|
|
extern int __libc_close(int fd);
|
|
#else
|
|
# define __libc_open(file, flags) __open(file, flags)
|
|
# define __libc_read(fd, buf, count) __read(fd, buf, count)
|
|
# define __libc_close(fd) __close(fd)
|
|
# define __libc_write(fd, buf, count) __write(fd, buf, count)
|
|
#endif
|
|
|
|
void __guard_setup(void) __attribute__ ((constructor));
|
|
void __guard_setup(void)
|
|
{
|
|
size_t size;
|
|
|
|
if (__guard != 0UL)
|
|
return;
|
|
|
|
/* Start with the "terminator canary". */
|
|
__guard = 0xFF0A0D00UL;
|
|
|
|
#ifndef __SSP_QUICK_CANARY__
|
|
# ifdef __SSP_USE_ERANDOM__
|
|
{
|
|
int mib[3];
|
|
/* Random is another depth in Linux, hence an array of 3. */
|
|
mib[0] = CTL_KERN;
|
|
mib[1] = KERN_RANDOM;
|
|
mib[2] = RANDOM_ERANDOM;
|
|
|
|
size = sizeof(unsigned long);
|
|
if (__sysctl(mib, 3, &__guard, &size, NULL, 0) != (-1))
|
|
if (__guard != 0UL)
|
|
return;
|
|
}
|
|
# endif /* ifdef __SSP_USE_ERANDOM__ */
|
|
/*
|
|
* Attempt to open kernel pseudo random device if one exists before
|
|
* opening urandom to avoid system entropy depletion.
|
|
*/
|
|
{
|
|
int fd;
|
|
|
|
# ifdef __SSP_USE_ERANDOM__
|
|
if ((fd = __libc_open("/dev/erandom", O_RDONLY)) == (-1))
|
|
# endif
|
|
fd = __libc_open("/dev/urandom", O_RDONLY);
|
|
if (fd != (-1)) {
|
|
size = __libc_read(fd, (char *) &__guard, sizeof(__guard));
|
|
__libc_close(fd);
|
|
if (size == sizeof(__guard))
|
|
return;
|
|
}
|
|
}
|
|
#endif /* ifndef __SSP_QUICK_CANARY__ */
|
|
|
|
/* Everything failed? Or we are using a weakened model of the
|
|
* terminator canary */
|
|
{
|
|
struct timeval tv;
|
|
__gettimeofday(&tv, NULL);
|
|
__guard ^= tv.tv_usec ^ tv.tv_sec;
|
|
}
|
|
}
|
|
|
|
void __stack_smash_handler(char func[], int damaged __attribute__ ((unused)));
|
|
void __stack_smash_handler(char func[], int damaged)
|
|
{
|
|
extern char *__progname;
|
|
const char message[] = ": stack smashing attack in function ";
|
|
struct sigaction sa;
|
|
sigset_t mask;
|
|
|
|
sigfillset(&mask);
|
|
|
|
sigdelset(&mask, SSP_SIGTYPE); /* Block all signal handlers */
|
|
sigprocmask(SIG_BLOCK, &mask, NULL); /* except SSP_SIGTYPE */
|
|
|
|
/* Print error message to stderr and syslog */
|
|
#if 1 /* syslog() causes issues with glibc #94325 */
|
|
__libc_write(STDERR_FILENO, __progname, strlen(__progname));
|
|
__libc_write(STDERR_FILENO, message, strlen(message));
|
|
__libc_write(STDERR_FILENO, func, strlen(func));
|
|
__libc_write(STDERR_FILENO, "()\n", 3);
|
|
//_syscall3(int, _ssp_syslog, int, type, char *, bufp, int, len)
|
|
//_ssp_syslog(LOG_INFO,
|
|
#else
|
|
fprintf(stderr, "%s%s%s()\n", __progname, message, func);
|
|
syslog(LOG_INFO, "%s%s%s()", __progname, message, func);
|
|
#endif
|
|
|
|
/* Make the default handler associated with the signal handler */
|
|
memset(&sa, 0, sizeof(struct sigaction));
|
|
sigfillset(&sa.sa_mask); /* Block all signals */
|
|
sa.sa_flags = 0;
|
|
sa.sa_handler = SIG_DFL;
|
|
sigaction(SSP_SIGTYPE, &sa, NULL);
|
|
(void) kill(getpid(), SSP_SIGTYPE);
|
|
_exit(127);
|
|
}
|