From 4abab5ad6c8465a7528ccdd5f49367da05f78bbd Mon Sep 17 00:00:00 2001 From: Vladimir Azarov Date: Tue, 1 Oct 2024 15:47:05 +0200 Subject: Initial version --- src/env/__stack_chk_fail.c | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) create mode 100644 src/env/__stack_chk_fail.c (limited to 'src/env/__stack_chk_fail.c') diff --git a/src/env/__stack_chk_fail.c b/src/env/__stack_chk_fail.c new file mode 100644 index 0000000..e535260 --- /dev/null +++ b/src/env/__stack_chk_fail.c @@ -0,0 +1,31 @@ +#include +#include +#include "pthread_impl.h" + +uintptr_t __stack_chk_guard; + +void __init_ssp(void *entropy) +{ + if (entropy) memcpy(&__stack_chk_guard, entropy, sizeof(uintptr_t)); + else __stack_chk_guard = (uintptr_t)&__stack_chk_guard * 1103515245; + +#if UINTPTR_MAX >= 0xffffffffffffffff + /* Sacrifice 8 bits of entropy on 64bit to prevent leaking/ + * overwriting the canary via string-manipulation functions. + * The NULL byte is on the second byte so that off-by-ones can + * still be detected. Endianness is taken care of + * automatically. */ + ((char *)&__stack_chk_guard)[1] = 0; +#endif + + __pthread_self()->canary = __stack_chk_guard; +} + +void __stack_chk_fail(void) +{ + a_crash(); +} + +hidden void __stack_chk_fail_local(void); + +weak_alias(__stack_chk_fail, __stack_chk_fail_local); -- cgit v1.2.3