public inbox for libc-alpha@sourceware.org
 help / color / mirror / Atom feed
* Changing stack protector initialization
@ 2016-10-27 14:00 Florian Weimer
  2016-10-27 17:03 ` Carlos O'Donell
  0 siblings, 1 reply; 3+ messages in thread
From: Florian Weimer @ 2016-10-27 14:00 UTC (permalink / raw)
  To: GNU C Library

I need a few more pseudo-random bits (32 instead of 16 on 64-bit 
architectures).  I talked to some cryptography people and they told me 
to expand the 16-byte secret by hashing it with SHA-256.

This key expansion has to happen both in ld.so (for the stack protector 
and pointer guard) and libc.so (for the new stuff).  My first attempt 
failed because doing the initialization in ld.so triggers duplication of 
the new guard variables from libc.so in ld.so, and the libc.so variables 
are never initialized.  (This is very confusing to GDB, which does not 
tell you that you have two variables with the same name at different 
addresses.)

I think the best approach is to duplicate the initialization code and 
run it twice, once based on the _dl_random value, and once using 
getauxval (AT_RANDOM).  The other alternative would be to put the values 
computed by rtld into rtld_global or some similar place and use those 
values to initialize the libc.so variables, but this wastes 16 bytes in 
the data segment per process.  (I need to make a copy so that the 
variable access does not go through the GOT.)

Is there another option to implement this?

Thanks,
Florian

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2016-10-27 17:55 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-10-27 14:00 Changing stack protector initialization Florian Weimer
2016-10-27 17:03 ` Carlos O'Donell
2016-10-27 17:55   ` Florian Weimer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).