Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140930155023.GC23797@brightrain.aerifal.cx>
Date: Tue, 30 Sep 2014 11:50:23 -0400
From: Rich Felker <dalias@...c.org>
To: musl@...ts.openwall.com
Subject: Re: A running list of questions from "porting" Slackware to
 musl

On Tue, Sep 30, 2014 at 08:32:16AM -0700, Isaac Dunham wrote:
> On Tue, Sep 30, 2014 at 06:13:37PM +0530, Weldon Goree wrote:
> > Hi all,
> > 
> > I added the quotation marks of shame because it's not a "port" in a real
> > sense. But still: I've had this side project[1] for a while of porting
> > Slackware to use Musl and it's Nearly There (tm), but I was hoping for some
> > advice on some persistent irritations I have. (Sorry for the length.)
> <snip> 
> > 6. Stack protection. This one really puzzles me. Stack protection is as
> > alien to glibc as it is to musl, but I keep running into this. 90% of the
> > problems can be avoided with adding -fno-stack-protector appropriately, but
> > libtool is very "helpful" on matters like this and seems to find a way to
> > put it back. I've actually not found an unworkable problem yet (though
> > several very annoying ones); I guess I'm just curious what the real state of
> > ssp on musl is (I'm not a fan of the concept, personally, but I know a lot
> > of people are), and whether there's a general solution to just telling
> > software to trust the ****ing stack.
> 
> You need a "libssp_nonshared.a" containing a function named
> __stack_chk_fail_local, which need only call __stack_chk_fail.
> No idea why, but this cannot be in a shared libary.

When gcc generates the canary-check code, on failure it normally
calls/jumps to __stack_chk_fail. But for shared libraries, that call
would go to a thunk in the library's PLT, which depends on the GOT
register being initialized (actually this varies by arch; x86_64
doesn't need it). In order to avoid (expensive) loading of the GOT
register in every function just as a contingency in case
__stack_chk_fail needs to be called, for position-independent code GCC
generates a call to __stack_chk_fail_local instead. This is a hidden
function (and necessarily exists within the same .so) so the call
doesn't have to go through the PLT; it's just a straight relative
call/jump instruction. __stack_chk_fail_local is then responsible for
loading the GOT register and calling __stack_chk_fail.

Rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.