1 /* $OpenBSD: stack_protector.c,v 1.8 2005/08/08 08:05:37 espie Exp $ */ 2 3 /* 4 * Copyright (c) 2002 Hiroaki Etoh, Federico G. Schwindt, and Miodrag Vallat. 5 * All rights reserved. 6 * 7 * Redistribution and use in source and binary forms, with or without 8 * modification, are permitted provided that the following conditions 9 * are met: 10 * 1. Redistributions of source code must retain the above copyright 11 * notice, this list of conditions and the following disclaimer. 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in the 14 * documentation and/or other materials provided with the distribution. 15 * 16 * THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS OR 17 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 18 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE 19 * DISCLAIMED. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, 20 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES 21 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR 22 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 24 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN 25 * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 26 * POSSIBILITY OF SUCH DAMAGE. 27 * 28 */ 29 30 #include <sys/param.h> 31 #include <sys/sysctl.h> 32 #include <signal.h> 33 #include <string.h> 34 #include <syslog.h> 35 #include <unistd.h> 36 37 extern int __sysctl(int *, u_int, void *, size_t *, void *, size_t); 38 39 long __guard[8] = {0, 0, 0, 0, 0, 0, 0, 0}; 40 static void __guard_setup(void) __attribute__ ((constructor)); 41 void __stack_smash_handler(char func[], int damaged __attribute__((unused))); 42 43 static void 44 __guard_setup(void) 45 { 46 int i, mib[2]; 47 size_t len; 48 49 if (__guard[0] != 0) 50 return; 51 52 mib[0] = CTL_KERN; 53 mib[1] = KERN_ARND; 54 55 len = 4; 56 for (i = 0; i < sizeof(__guard) / 4; i++) { 57 if (__sysctl(mib, 2, (char *)&((int *)__guard)[i], 58 &len, NULL, 0) == -1) 59 break; 60 } 61 62 if (i < sizeof(__guard) / 4) { 63 /* If sysctl was unsuccessful, use the "terminator canary". */ 64 ((unsigned char *)__guard)[0] = 0; 65 ((unsigned char *)__guard)[1] = 0; 66 ((unsigned char *)__guard)[2] = '\n'; 67 ((unsigned char *)__guard)[3] = 255; 68 } 69 } 70 71 void 72 __stack_smash_handler(char func[], int damaged) 73 { 74 struct syslog_data sdata = SYSLOG_DATA_INIT; 75 const char message[] = "stack overflow in function %s"; 76 struct sigaction sa; 77 sigset_t mask; 78 79 /* Immediately block all signal handlers from running code */ 80 sigfillset(&mask); 81 sigdelset(&mask, SIGABRT); 82 sigprocmask(SIG_BLOCK, &mask, NULL); 83 84 /* This may fail on a chroot jail... */ 85 syslog_r(LOG_CRIT, &sdata, message, func); 86 87 bzero(&sa, sizeof(struct sigaction)); 88 sigemptyset(&sa.sa_mask); 89 sa.sa_flags = 0; 90 sa.sa_handler = SIG_DFL; 91 sigaction(SIGABRT, &sa, NULL); 92 93 kill(getpid(), SIGABRT); 94 95 _exit(127); 96 } 97