Home | History | Annotate | Download | only in bionic
      1 /*
      2  * Copyright (C) 2012 The Android Open Source Project
      3  * All rights reserved.
      4  *
      5  * Redistribution and use in source and binary forms, with or without
      6  * modification, are permitted provided that the following conditions
      7  * are met:
      8  *  * Redistributions of source code must retain the above copyright
      9  *    notice, this list of conditions and the following disclaimer.
     10  *  * Redistributions in binary form must reproduce the above copyright
     11  *    notice, this list of conditions and the following disclaimer in
     12  *    the documentation and/or other materials provided with the
     13  *    distribution.
     14  *
     15  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
     16  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
     17  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
     18  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
     19  * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
     20  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
     21  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
     22  * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
     23  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
     24  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
     25  * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     26  * SUCH DAMAGE.
     27  */
     28 
     29 #include <sys/cdefs.h>
     30 
     31 /*
     32    __stack_chk_fail routine is runtime part of stack protector compiler
     33    feature. It's implemented in libc and represents die routine when stack
     34    corruption is detected.
     35 
     36    Calls are generated by compiler and injected into user functions when
     37    -fstack-protector* options are used.
     38 
     39    __stack_chk_fail_local is wrapper for __stack_chk_fail. Compiler generates
     40    wrapper calls instead for PIC code only and only on IA32 for optimization
     41    purpose (see gcc/config/i386/i386.c). Wrapper body is always included into
     42    executable or library. This is the idea of optimization.
     43 
     44    Glibc is doing this via libc_nonshared.a which is linked automatically
     45    everytime with libc.so. In bionic we have to bring it within crtfiles
     46    because libc.so is real library and not a link script like libc.so at glibc.
     47 
     48    For x86_64 or non-PIC code compiler always generates __stack_chk_fail calls.
     49 */
     50 
     51 #ifdef __i386__
     52 extern void __stack_chk_fail();
     53 
     54 __LIBC_HIDDEN__ void __stack_chk_fail_local() {
     55   __stack_chk_fail();
     56 }
     57 #endif
     58