compiler_stack_protect.c 1.5 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162
  1. /*
  2. * Copyright (c) 2012-2014 Wind River Systems, Inc.
  3. *
  4. * SPDX-License-Identifier: Apache-2.0
  5. */
  6. /**
  7. * @file
  8. * @brief Compiler stack protection (kernel part)
  9. *
  10. * This module provides functions to support compiler stack protection
  11. * using canaries. This feature is enabled with configuration
  12. * CONFIG_STACK_CANARIES=y.
  13. *
  14. * When this feature is enabled, the compiler generated code refers to
  15. * function __stack_chk_fail and global variable __stack_chk_guard.
  16. */
  17. #include <toolchain.h> /* compiler specific configurations */
  18. #include <kernel_structs.h>
  19. #include <toolchain.h>
  20. #include <linker/sections.h>
  21. #include <kernel.h>
  22. #include <app_memory/app_memdomain.h>
  23. /**
  24. *
  25. * @brief Stack canary error handler
  26. *
  27. * This function is invoked when a stack canary error is detected.
  28. *
  29. * @return Does not return
  30. */
  31. void _StackCheckHandler(void)
  32. {
  33. /* Stack canary error is a software fatal condition; treat it as such.
  34. */
  35. z_except_reason(K_ERR_STACK_CHK_FAIL);
  36. CODE_UNREACHABLE; /* LCOV_EXCL_LINE */
  37. }
  38. /* Global variable */
  39. /*
  40. * Symbol referenced by GCC compiler generated code for canary value.
  41. * The canary value gets initialized in z_cstart().
  42. */
  43. #ifdef CONFIG_USERSPACE
  44. K_APP_DMEM(z_libc_partition) uintptr_t __stack_chk_guard;
  45. #else
  46. __noinit uintptr_t __stack_chk_guard;
  47. #endif
  48. /**
  49. *
  50. * @brief Referenced by GCC compiler generated code
  51. *
  52. * This routine is invoked when a stack canary error is detected, indicating
  53. * a buffer overflow or stack corruption problem.
  54. */
  55. FUNC_ALIAS(_StackCheckHandler, __stack_chk_fail, void);