svn commit: r333168 - stable/11/lib/libc/secure

Konstantin Belousov kib at FreeBSD.org
Wed May 2 08:27:00 UTC 2018


Author: kib
Date: Wed May  2 08:26:59 2018
New Revision: 333168
URL: https://svnweb.freebsd.org/changeset/base/333168

Log:
  MFC r332940:
  Carefully update stack guard bytes inside __guard_setup().

Modified:
  stable/11/lib/libc/secure/stack_protector.c
Directory Properties:
  stable/11/   (props changed)

Modified: stable/11/lib/libc/secure/stack_protector.c
==============================================================================
--- stable/11/lib/libc/secure/stack_protector.c	Wed May  2 08:24:59 2018	(r333167)
+++ stable/11/lib/libc/secure/stack_protector.c	Wed May  2 08:26:59 2018	(r333168)
@@ -54,15 +54,27 @@ static void
 __guard_setup(void)
 {
 	static const int mib[2] = { CTL_KERN, KERN_ARND };
+	volatile long tmp_stack_chk_guard[nitems(__stack_chk_guard)];
 	size_t len;
-	int error;
+	int error, idx;
 
 	if (__stack_chk_guard[0] != 0)
 		return;
-	error = _elf_aux_info(AT_CANARY, __stack_chk_guard,
-	    sizeof(__stack_chk_guard));
-	if (error == 0 && __stack_chk_guard[0] != 0)
+	/*
+	 * Avoid using functions which might have stack protection
+	 * enabled, to update the __stack_chk_guard.  First fetch the
+	 * data into a temporal array, then do manual volatile copy to
+	 * not allow optimizer to call memcpy() behind us.
+	 */
+	error = _elf_aux_info(AT_CANARY, (void *)tmp_stack_chk_guard,
+	    sizeof(tmp_stack_chk_guard));
+	if (error == 0 && tmp_stack_chk_guard[0] != 0) {
+		for (idx = 0; idx < nitems(__stack_chk_guard); idx++) {
+			__stack_chk_guard[idx] = tmp_stack_chk_guard[idx];
+			tmp_stack_chk_guard[idx] = 0;
+		}
 		return;
+	}
 
 	len = sizeof(__stack_chk_guard);
 	if (__sysctl(mib, nitems(mib), __stack_chk_guard, &len, NULL, 0) ==


More information about the svn-src-stable-11 mailing list