ssp.c

来自「ucLinux is a very good embeded sytem. Mo」· C语言 代码 · 共 146 行

C
146
字号
/* * Distributed under the terms of the GNU General Public License v2 * $Header: /var/cvs/uClibc/libc/sysdeps/linux/common/ssp.c,v 1.6 2005/01/11 17:01:53 vapier Exp $ * * This is a modified version of Hiroaki Etoh's stack smashing routines * implemented for glibc. * * The following people have contributed input to this code. * Ned Ludd - <solar[@]gentoo.org> * Alexander Gabert - <pappy[@]gentoo.org> * The PaX Team - <pageexec[@]freemail.hu> * Peter S. Mazinger - <ps.m[@]gmx.net> * Yoann Vandoorselaere - <yoann[@]prelude-ids.org> * Robert Connolly - <robert[@]linuxfromscratch.org> * Cory Visi <cory@visi.name> * */#ifdef HAVE_CONFIG_H# include <config.h>#endif#ifdef __SSP__# error ssp.c has to be built w/ -fno-stack-protector#endif#include <stdio.h>#include <string.h>#include <fcntl.h>#include <unistd.h>#include <signal.h>#include <sys/types.h>#include <sys/un.h>#include <sys/syslog.h>#include <sys/time.h>#ifdef __SSP_USE_ERANDOM__# include <sys/sysctl.h>#endif#ifdef __PROPOLICE_BLOCK_SEGV__# define SSP_SIGTYPE SIGSEGV#elif __PROPOLICE_BLOCK_KILL__# define SSP_SIGTYPE SIGKILL#else# define SSP_SIGTYPE SIGABRT#endifunsigned long __guard = 0UL;/* Use of __* functions from the rest of glibc here avoids * initialisation problems for executables preloaded with * libraries that overload the associated standard library * functions. */#ifdef __UCLIBC__extern int __libc_open(__const char *file, int flags, ...);extern ssize_t __libc_read(int fd, void *buf, size_t count);extern int __libc_close(int fd);#else# define __libc_open(file, flags) __open(file, flags)# define __libc_read(fd, buf, count) __read(fd, buf, count)# define __libc_close(fd) __close(fd)#endifvoid __guard_setup(void) __attribute__ ((constructor));void __guard_setup(void){	size_t size;	if (__guard != 0UL)		return;	/* Start with the "terminator canary". */	__guard = 0xFF0A0D00UL;#ifndef __SSP_QUICK_CANARY__# ifdef __SSP_USE_ERANDOM__	{		int mib[3];		/* Random is another depth in Linux, hence an array of 3. */		mib[0] = CTL_KERN;		mib[1] = KERN_RANDOM;		mib[2] = RANDOM_ERANDOM;		size = sizeof(unsigned long);		if (__sysctl(mib, 3, &__guard, &size, NULL, 0) != (-1))			if (__guard != 0UL)				return;	}# endif /* ifdef __SSP_USE_ERANDOM__ */	/* 	 * Attempt to open kernel pseudo random device if one exists before 	 * opening urandom to avoid system entropy depletion.	 */	{		int fd;# ifdef __SSP_USE_ERANDOM__		if ((fd = __libc_open("/dev/erandom", O_RDONLY)) == (-1))# endif			fd = __libc_open("/dev/urandom", O_RDONLY);		if (fd != (-1)) {			size = __libc_read(fd, (char *) &__guard, sizeof(__guard));			__libc_close(fd);			if (size == sizeof(__guard))				return;		}	}#endif /* ifndef __SSP_QUICK_CANARY__ */	/* Everything failed? Or we are using a weakened model of the 	 * terminator canary */	{		struct timeval tv;		gettimeofday(&tv, NULL);		__guard ^= tv.tv_usec ^ tv.tv_sec;	}}void __stack_smash_handler(char func[], int damaged __attribute__ ((unused)));void __stack_smash_handler(char func[], int damaged){	extern char *__progname;	const char message[] = ": stack smashing attack in function ";	struct sigaction sa;	sigset_t mask;	sigfillset(&mask);	sigdelset(&mask, SSP_SIGTYPE);	/* Block all signal handlers */	sigprocmask(SIG_BLOCK, &mask, NULL);	/* except SSP_SIGTYPE */	/* Print error message to stderr and syslog */	fprintf(stderr, "%s%s%s()\n", __progname, message, func);	syslog(LOG_INFO, "%s%s%s()", __progname, message, func);	/* Make the default handler associated with the signal handler */	memset(&sa, 0, sizeof(struct sigaction));	sigfillset(&sa.sa_mask);	/* Block all signals */	sa.sa_flags = 0;	sa.sa_handler = SIG_DFL;	sigaction(SSP_SIGTYPE, &sa, NULL);	(void) kill(getpid(), SSP_SIGTYPE);	_exit(127);}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?