xref: /aosp_15_r20/external/cronet/base/stack_canary_linux.cc (revision 6777b5387eb2ff775bb5750e3f5d96f37fb7352b)
1*6777b538SAndroid Build Coastguard Worker // Copyright 2021 The Chromium Authors
2*6777b538SAndroid Build Coastguard Worker // Use of this source code is governed by a BSD-style license that can be
3*6777b538SAndroid Build Coastguard Worker // found in the LICENSE file.
4*6777b538SAndroid Build Coastguard Worker 
5*6777b538SAndroid Build Coastguard Worker #include "base/stack_canary_linux.h"
6*6777b538SAndroid Build Coastguard Worker 
7*6777b538SAndroid Build Coastguard Worker #include <dlfcn.h>
8*6777b538SAndroid Build Coastguard Worker #include <stdint.h>
9*6777b538SAndroid Build Coastguard Worker #include <sys/mman.h>
10*6777b538SAndroid Build Coastguard Worker 
11*6777b538SAndroid Build Coastguard Worker #include "base/bits.h"
12*6777b538SAndroid Build Coastguard Worker #include "base/check_op.h"
13*6777b538SAndroid Build Coastguard Worker #include "base/compiler_specific.h"
14*6777b538SAndroid Build Coastguard Worker #include "base/logging.h"
15*6777b538SAndroid Build Coastguard Worker #include "base/memory/page_size.h"
16*6777b538SAndroid Build Coastguard Worker #include "base/rand_util.h"
17*6777b538SAndroid Build Coastguard Worker #include "build/build_config.h"
18*6777b538SAndroid Build Coastguard Worker 
19*6777b538SAndroid Build Coastguard Worker namespace base {
20*6777b538SAndroid Build Coastguard Worker 
21*6777b538SAndroid Build Coastguard Worker #if defined(LIBC_GLIBC)
22*6777b538SAndroid Build Coastguard Worker 
23*6777b538SAndroid Build Coastguard Worker #if defined(ARCH_CPU_ARM_FAMILY)
24*6777b538SAndroid Build Coastguard Worker // On ARM, Glibc uses a global variable (exported) called __stack_chk_guard.
25*6777b538SAndroid Build Coastguard Worker extern "C" {
26*6777b538SAndroid Build Coastguard Worker extern uintptr_t __stack_chk_guard;
27*6777b538SAndroid Build Coastguard Worker }
28*6777b538SAndroid Build Coastguard Worker #endif  // defined(ARCH_CPU_ARM_FAMILY)
29*6777b538SAndroid Build Coastguard Worker 
30*6777b538SAndroid Build Coastguard Worker #if !defined(NDEBUG)
31*6777b538SAndroid Build Coastguard Worker // In debug builds, if we detect stack smashing in old stack frames after
32*6777b538SAndroid Build Coastguard Worker // changing the canary, it's nice to let someone know that it's because the
33*6777b538SAndroid Build Coastguard Worker // canary changed and they should prevent their function from using stack
34*6777b538SAndroid Build Coastguard Worker // canaries.
35*6777b538SAndroid Build Coastguard Worker static bool g_emit_debug_message = false;
36*6777b538SAndroid Build Coastguard Worker 
37*6777b538SAndroid Build Coastguard Worker extern "C" {
38*6777b538SAndroid Build Coastguard Worker typedef __attribute__((noreturn)) void(GLibcStackChkFailFunction)();
39*6777b538SAndroid Build Coastguard Worker 
40*6777b538SAndroid Build Coastguard Worker // This overrides glibc's version of __stack_chk_fail(), which is called when
41*6777b538SAndroid Build Coastguard Worker // the canary doesn't match.
42*6777b538SAndroid Build Coastguard Worker __attribute__((visibility("default"), noinline, noreturn)) void
__stack_chk_fail()43*6777b538SAndroid Build Coastguard Worker __stack_chk_fail() {
44*6777b538SAndroid Build Coastguard Worker   if (g_emit_debug_message) {
45*6777b538SAndroid Build Coastguard Worker     RAW_LOG(
46*6777b538SAndroid Build Coastguard Worker         FATAL,
47*6777b538SAndroid Build Coastguard Worker         "Stack smashing detected. The canary was changed during runtime "
48*6777b538SAndroid Build Coastguard Worker         "(see crbug.com/1206626). You may need to mark your function with "
49*6777b538SAndroid Build Coastguard Worker         "the no_stack_protector attribute, or just exit() before stack "
50*6777b538SAndroid Build Coastguard Worker         "smashing occurs. You can also disable this canary-changing feature "
51*6777b538SAndroid Build Coastguard Worker         "by adding --change-stack-guard-on-fork=disable to the command line.");
52*6777b538SAndroid Build Coastguard Worker   }
53*6777b538SAndroid Build Coastguard Worker 
54*6777b538SAndroid Build Coastguard Worker   // Call the real __stack_chk_fail().
55*6777b538SAndroid Build Coastguard Worker   // Note that dlsym may not be safe to perform since this is called during
56*6777b538SAndroid Build Coastguard Worker   // corruption, but this code purposely only runs in debug builds and in the
57*6777b538SAndroid Build Coastguard Worker   // normal case might provide better debug information.
58*6777b538SAndroid Build Coastguard Worker   GLibcStackChkFailFunction* glibc_stack_chk_fail =
59*6777b538SAndroid Build Coastguard Worker       reinterpret_cast<GLibcStackChkFailFunction*>(
60*6777b538SAndroid Build Coastguard Worker           dlsym(RTLD_NEXT, "__stack_chk_fail"));
61*6777b538SAndroid Build Coastguard Worker   (*glibc_stack_chk_fail)();
62*6777b538SAndroid Build Coastguard Worker }
63*6777b538SAndroid Build Coastguard Worker }
64*6777b538SAndroid Build Coastguard Worker #endif  // !defined(NDEBUG)
65*6777b538SAndroid Build Coastguard Worker 
ResetStackCanaryIfPossible()66*6777b538SAndroid Build Coastguard Worker void NO_STACK_PROTECTOR ResetStackCanaryIfPossible() {
67*6777b538SAndroid Build Coastguard Worker   uintptr_t canary;
68*6777b538SAndroid Build Coastguard Worker   base::RandBytes(as_writable_bytes(make_span(&canary, 1u)));
69*6777b538SAndroid Build Coastguard Worker   // First byte should be the null byte for string functions.
70*6777b538SAndroid Build Coastguard Worker   canary &= ~static_cast<uintptr_t>(0xff);
71*6777b538SAndroid Build Coastguard Worker 
72*6777b538SAndroid Build Coastguard Worker   // The x86/x64 offsets should work for musl too.
73*6777b538SAndroid Build Coastguard Worker #if defined(ARCH_CPU_X86_64)
74*6777b538SAndroid Build Coastguard Worker   asm volatile("movq %q0,%%fs:%P1" : : "er"(canary), "i"(0x28));
75*6777b538SAndroid Build Coastguard Worker #elif defined(ARCH_CPU_X86)
76*6777b538SAndroid Build Coastguard Worker   asm volatile("movl %0,%%gs:%P1" : : "ir"(canary), "i"(0x14));
77*6777b538SAndroid Build Coastguard Worker #elif defined(ARCH_CPU_ARM_FAMILY)
78*6777b538SAndroid Build Coastguard Worker   // ARM's stack canary is held on a relro page. So, we'll need to make the page
79*6777b538SAndroid Build Coastguard Worker   // writable, change the stack canary, and then make the page ro again.
80*6777b538SAndroid Build Coastguard Worker   // We want to be single-threaded when changing page permissions, since it's
81*6777b538SAndroid Build Coastguard Worker   // reasonable for other threads to assume that page permissions for global
82*6777b538SAndroid Build Coastguard Worker   // variables don't change.
83*6777b538SAndroid Build Coastguard Worker   size_t page_size = base::GetPageSize();
84*6777b538SAndroid Build Coastguard Worker   uintptr_t __stack_chk_guard_page = base::bits::AlignDown(
85*6777b538SAndroid Build Coastguard Worker       reinterpret_cast<uintptr_t>(&__stack_chk_guard), page_size);
86*6777b538SAndroid Build Coastguard Worker   PCHECK(0 == mprotect(reinterpret_cast<void*>(__stack_chk_guard_page),
87*6777b538SAndroid Build Coastguard Worker                        page_size, PROT_READ | PROT_WRITE));
88*6777b538SAndroid Build Coastguard Worker   __stack_chk_guard = canary;
89*6777b538SAndroid Build Coastguard Worker   PCHECK(0 == mprotect(reinterpret_cast<void*>(__stack_chk_guard_page),
90*6777b538SAndroid Build Coastguard Worker                        page_size, PROT_READ));
91*6777b538SAndroid Build Coastguard Worker #endif
92*6777b538SAndroid Build Coastguard Worker }
93*6777b538SAndroid Build Coastguard Worker 
SetStackSmashingEmitsDebugMessage()94*6777b538SAndroid Build Coastguard Worker void SetStackSmashingEmitsDebugMessage() {
95*6777b538SAndroid Build Coastguard Worker #if !defined(NDEBUG)
96*6777b538SAndroid Build Coastguard Worker   g_emit_debug_message = true;
97*6777b538SAndroid Build Coastguard Worker #endif  // !defined(NDEBUG)
98*6777b538SAndroid Build Coastguard Worker }
99*6777b538SAndroid Build Coastguard Worker 
100*6777b538SAndroid Build Coastguard Worker #else  // defined(LIBC_GLIBC)
101*6777b538SAndroid Build Coastguard Worker 
102*6777b538SAndroid Build Coastguard Worker // We don't know how to reset the canary if not compiling for glibc.
103*6777b538SAndroid Build Coastguard Worker void ResetStackCanaryIfPossible() {}
104*6777b538SAndroid Build Coastguard Worker 
105*6777b538SAndroid Build Coastguard Worker void SetStackSmashingEmitsDebugMessage() {}
106*6777b538SAndroid Build Coastguard Worker 
107*6777b538SAndroid Build Coastguard Worker #endif  // defined(LIBC_GLIBC)
108*6777b538SAndroid Build Coastguard Worker }  // namespace base
109