From 60872cf9c93687e771c1b8bc41bb006bdcdc2e45 Mon Sep 17 00:00:00 2001 From: Rich Felker Date: Tue, 24 Apr 2012 18:07:59 -0400 Subject: first attempt at enabling stack protector support the code is written to pre-init the thread pointer in static linked programs that pull in __stack_chk_fail or dynamic-linked programs that lookup the symbol. no explicit canary is set; the canary will be whatever happens to be in the thread structure at the offset gcc hard-coded. this can be improved later. --- src/env/__init_security.c | 7 +++++++ src/env/__stack_chk_fail.c | 14 ++++++++++++++ src/ldso/dynlink.c | 7 +++++++ 3 files changed, 28 insertions(+) create mode 100644 src/env/__stack_chk_fail.c diff --git a/src/env/__init_security.c b/src/env/__init_security.c index 5fd12ecb..6893a252 100644 --- a/src/env/__init_security.c +++ b/src/env/__init_security.c @@ -8,11 +8,18 @@ #define AUX_CNT 24 +void dummy(void) +{ +} +weak_alias(dummy, __init_ssp); + void __init_security(size_t *auxv) { size_t i, aux[AUX_CNT] = { 0 }; struct pollfd pfd[3] = { {.fd=0}, {.fd=1}, {.fd=2} }; + __init_ssp(); + for (; auxv[0]; auxv+=2) if (auxv[0]next) { Sym *sym; if (!dso->global) continue; @@ -611,6 +616,8 @@ void *__dynlink(int argc, char **argv) reclaim((void *)builtin_dsos, 0, sizeof builtin_dsos); } + if (ssp_used) __pthread_self_init(); + errno = 0; return (void *)aux[AT_ENTRY]; } -- cgit v1.2.1