📄 ssp.c
字号:
/* * Distributed under the terms of the GNU General Public License v2 * $Header: $ * * This is a modified version of Hiroaki Etoh's stack smashing routines * implemented for glibc. * * The following people have contributed input to this code. * Ned Ludd - <solar[@]gentoo.org> * Alexander Gabert - <pappy[@]gentoo.org> * The PaX Team - <pageexec[@]freemail.hu> * Peter S. Mazinger - <ps.m[@]gmx.net> * Yoann Vandoorselaere - <yoann[@]prelude-ids.org> * Robert Connolly - <robert[@]linuxfromscratch.org> * Cory Visi <cory@visi.name> * */#ifdef HAVE_CONFIG_H# include <config.h>#endif#include <stdio.h>#include <string.h>#include <fcntl.h>#include <unistd.h>#include <signal.h>#include <sys/types.h>#include <sys/un.h>#include <sys/syslog.h>#include <sys/time.h>#ifdef HAVE_DEV_ERANDOM#include <sys/sysctl.h>#endif#ifdef __PROPOLICE_BLOCK_SEGV__#define SSP_SIGTYPE SIGSEGV#elif __PROPOLICE_BLOCK_KILL__#define SSP_SIGTYPE SIGKILL#else#define SSP_SIGTYPE SIGABRT#endifunsigned long __guard = 0UL;void __guard_setup(void){ size_t size; struct timeval tv;#ifdef HAVE_DEV_ERANDOM int mib[3];#endif if (__guard != 0UL) return;#ifndef __SSP_QUICK_CANARY__#ifdef HAVE_DEV_ERANDOM /* Random is another depth in Linux, hence an array of 3. */ mib[0] = CTL_KERN; mib[1] = KERN_RANDOM; mib[2] = RANDOM_ERANDOM; size = sizeof(unsigned long); if (__sysctl(mib, 3, &__guard, &size, NULL, 0) != (-1)) if (__guard != 0UL) return;#endif /* * Attempt to open kernel pseudo random device if one exists before * opening urandom to avoid system entropy depletion. */ { int fd;#ifdef HAVE_DEV_ERANDOM if ((fd = open("/dev/erandom", O_RDONLY)) == (-1))#endif fd = open("/dev/urandom", O_RDONLY); if (fd != (-1)) { size = read(fd, (char *) &__guard, sizeof(__guard)); close(fd); if (size == sizeof(__guard)) return; } }#endif /* If sysctl was unsuccessful, use the "terminator canary". */ __guard = 0xFF0A0D00UL; /* Everything failed? Or we are using a weakened model of the * terminator canary */ gettimeofday(&tv, NULL); __guard ^= tv.tv_usec ^ tv.tv_sec;}void __stack_smash_handler(char func[], int damaged){ extern char *__progname; const char message[] = ": stack smashing attack in function "; struct sigaction sa; sigset_t mask; sigfillset(&mask); sigdelset(&mask, SSP_SIGTYPE); /* Block all signal handlers */ sigprocmask(SIG_BLOCK, &mask, NULL); /* except SIGABRT */ /* print error message to stderr and syslog */ fprintf(stderr, "%s%s%s()\n", __progname, message, func); syslog(LOG_INFO, "%s%s%s()", __progname, message, func); /* Make sure the default handler is associated with the our signal handler */ memset(&sa, 0, sizeof(struct sigaction)); sigfillset(&sa.sa_mask); /* Block all signals */ sa.sa_flags = 0; sa.sa_handler = SIG_DFL; sigaction(SSP_SIGTYPE, &sa, NULL); (void) kill(getpid(), SSP_SIGTYPE); _exit(127);}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -