Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 24521 Details for
Bug 36154
dev-haskell/haddock-0.6-r1 ebuild failed using Propolice gcc
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
ssp.c
ssp2.c (text/plain), 3.63 KB, created by
solar (RETIRED)
on 2004-01-27 22:34:32 UTC
(
hide
)
Description:
ssp.c
Filename:
MIME Type:
Creator:
solar (RETIRED)
Created:
2004-01-27 22:34:32 UTC
Size:
3.63 KB
patch
obsolete
>/* > Distributed under the terms of the GNU General Public License v2 > $Header: $ > >- This is a modified version of Hiroaki Etoh's stack smashing routines >- implemented for glibc by pappy@gentoo.org > >- (Dec 14 2003 solar@gentoo.org) >- A SEGV is better to send to the process vs ABRT >- Needed for core dumping and actually being able to fix bugs. >- If EBUG_SSP on x86 is defined then we dump extended base pointer trace to stderr. > >*/ > >#include <stdio.h> >#include <string.h> >#include <fcntl.h> >#include <unistd.h> > >#ifdef _POSIX_SOURCE >#include <signal.h> >#endif > >#if defined(HAVE_SYSLOG) >#include <sys/types.h> >#include <sys/socket.h> >#include <sys/un.h> > >#include <sys/syslog.h> >#ifndef _PATH_LOG >#define _PATH_LOG "/dev/log" >#endif >#endif > >long __guard[8] = { 0, 0, 0, 0, 0, 0, 0, 0 }; > >void __guard_setup(void) >{ > int fd; > > if (__guard[0] != 0) > return; > fd = open("/dev/urandom", 0); > if (fd != -1) { > ssize_t size = read(fd, (char *) &__guard, sizeof(__guard)); > > close(fd); > if (size == sizeof(__guard)) > return; > } > /* If a random generator can't be used, the protector switches the guard > * to the "terminator canary" */ > ((char *) __guard)[0] = 0; > ((char *) __guard)[1] = 0; > ((char *) __guard)[2] = '\n'; > ((char *) __guard)[3] = 255; >} > >void __stack_smash_handler(char func[], int damaged) >{ >#if defined(__GNUC__) && defined(__i386__) && defined(EBUG_SSP) > { > unsigned int *ebp, i; > /* save the extended base pointer right away */ > __asm__("movl %%ebp, %0":"=g"(ebp)); > fprintf(stderr, "SSP Trace:\n"); > for (i = 0; > (*ebp > (unsigned int) ebp) && > (*ebp < (0x3FffFF | (unsigned int) ebp)); > ebp = (unsigned int *) *ebp, i++) > fprintf(stderr, "\t#%-2d 0x%08X\n", i, *(ebp + 1)); > } >#endif > >#if defined (__GNU_LIBRARY__) > extern char *__progname; >#endif > const char message[] = ": stack smashing attack in function "; > int bufsz = 512, len; > char buf[bufsz]; > >#if defined(HAVE_SYSLOG) > int logfile; > struct sockaddr_un syslogaddr; /* AF_UNIX address of local logger */ >#endif > >#ifdef _POSIX_SOURCE > { > sigset_t mask; > > sigfillset(&mask); > sigdelset(&mask, SIGSEGV); /* Block all signal handlers */ > sigprocmask(SIG_BLOCK, &mask, NULL); /* except SIGSEGV */ > } >#endif > > strcpy(buf, "<2>"); > len = 3; /* send LOG_CRIT */ >#if defined (__GNU_LIBRARY__) > strncat(buf, (__progname != NULL) ? __progname : "progname", > bufsz - len - 1); > len = strlen(buf); >#endif > if (bufsz > len) { > strncat(buf, message, bufsz - len - 1); > len = strlen(buf); > } > if (bufsz > len) { > strncat(buf, func, bufsz - len - 1); > len = strlen(buf); > } > /* print error message */ > write(STDERR_FILENO, buf + 3, len - 3); >#if defined(HAVE_SYSLOG) > if ((logfile = socket(AF_UNIX, SOCK_DGRAM, 0)) != -1) { > > /* > * Send "found" message to the "/dev/log" path > */ > syslogaddr.sun_family = AF_UNIX; > (void) strncpy(syslogaddr.sun_path, _PATH_LOG, > sizeof(syslogaddr.sun_path) - 1); > syslogaddr.sun_path[sizeof(syslogaddr.sun_path) - 1] = '\0'; > sendto(logfile, buf, len, 0, (struct sockaddr *) &syslogaddr, > sizeof(syslogaddr)); > } >#endif > >#ifdef _POSIX_SOURCE > { /* Make sure the default handler is associated with SIGSEGV */ > struct sigaction sa; > > memset(&sa, 0, sizeof(struct sigaction)); > sigfillset(&sa.sa_mask); /* Block all signals */ > sa.sa_flags = 0; > sa.sa_handler = SIG_DFL; > sigaction(SIGSEGV, &sa, NULL); > (void) kill(getpid(), SIGSEGV); > } >#endif > _exit(127); >}
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 36154
: 24521