From 4390383b32250a941ec616e8bff6f568a801b1c0 Mon Sep 17 00:00:00 2001 From: Rich Felker Date: Wed, 17 Oct 2018 22:20:01 -0400 Subject: impose barrier between thread pointer setup and use for static linking this is the analog of commit 1c84c99913bf1cd47b866ed31e665848a0da84a2 for static linking. unlike with dynamic linking, we don't have symbolic lookup to use as a barrier. use a dummy (target-agnostic) degenerate inline asm fragment instead. this technique has precedent in commit 05ac345f895098657cf44d419b5d572161ebaf43 where it's used for explicit_bzero. if it proves problematic in any way, loading the address of the stage 2 function from a pointer object whose address leaks to kernelspace during thread pointer init could be used as an even stronger barrier. --- src/env/__libc_start_main.c | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/src/env/__libc_start_main.c b/src/env/__libc_start_main.c index 58da9e83..ba4d2135 100644 --- a/src/env/__libc_start_main.c +++ b/src/env/__libc_start_main.c @@ -63,11 +63,24 @@ static void libc_start_init(void) weak_alias(libc_start_init, __libc_start_init); +static int libc_start_main_stage2(int (*)(int,char **,char **), int, char **); + int __libc_start_main(int (*main)(int,char **,char **), int argc, char **argv) { char **envp = argv+argc+1; __init_libc(envp, argv[0]); + + /* Barrier against hoisting application code or anything using ssp + * or thread pointer prior to its initialization above. */ + int (*stage2)(); + __asm__ ( "" : "=r"(stage2) : "r"(libc_start_main_stage2) : "memory" ); + return stage2(main, argc, argv); +} + +static int libc_start_main_stage2(int (*main)(int,char **,char **), int argc, char **argv) +{ + char **envp = argv+argc+1; __libc_start_init(); /* Pass control to the application */ -- cgit v1.2.1