From: Rich Felker Date: Tue, 24 Apr 2012 22:07:59 +0000 (-0400) Subject: first attempt at enabling stack protector support X-Git-Url: http://nsz.repo.hu/git/?p=musl;a=commitdiff_plain;h=60872cf9c93687e771c1b8bc41bb006bdcdc2e45 first attempt at enabling stack protector support the code is written to pre-init the thread pointer in static linked programs that pull in __stack_chk_fail or dynamic-linked programs that lookup the symbol. no explicit canary is set; the canary will be whatever happens to be in the thread structure at the offset gcc hard-coded. this can be improved later. --- diff --git a/src/env/__init_security.c b/src/env/__init_security.c index 5fd12ecb..6893a252 100644 --- a/src/env/__init_security.c +++ b/src/env/__init_security.c @@ -8,11 +8,18 @@ #define AUX_CNT 24 +void dummy(void) +{ +} +weak_alias(dummy, __init_ssp); + void __init_security(size_t *auxv) { size_t i, aux[AUX_CNT] = { 0 }; struct pollfd pfd[3] = { {.fd=0}, {.fd=1}, {.fd=2} }; + __init_ssp(); + for (; auxv[0]; auxv+=2) if (auxv[0]next) { Sym *sym; if (!dso->global) continue; @@ -611,6 +616,8 @@ void *__dynlink(int argc, char **argv) reclaim((void *)builtin_dsos, 0, sizeof builtin_dsos); } + if (ssp_used) __pthread_self_init(); + errno = 0; return (void *)aux[AT_ENTRY]; }