123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657 |
- /*
- * Copyright (c) 2018-2020, Andreas Kling <kling@serenityos.org>
- *
- * SPDX-License-Identifier: BSD-2-Clause
- */
- #include <AK/Types.h>
- #include <assert.h>
- #include <stdio.h>
- #include <stdlib.h>
- #include <sys/internals.h>
- #include <unistd.h>
- #ifndef _DYNAMIC_LOADER
- extern "C" {
- extern size_t __stack_chk_guard;
- int main(int, char**, char**);
- // Tell the compiler that this may be called from somewhere else.
- int _entry(int argc, char** argv, char** env);
- void _start(int, char**, char**);
- NAKED void _start(int, char**, char**)
- {
- asm(
- "push $0\n"
- "jmp _entry@plt\n");
- }
- int _entry(int argc, char** argv, char** env)
- {
- size_t original_stack_chk = __stack_chk_guard;
- arc4random_buf(&__stack_chk_guard, sizeof(__stack_chk_guard));
- if (__stack_chk_guard == 0)
- __stack_chk_guard = original_stack_chk;
- environ = env;
- __environ_is_malloced = false;
- _init();
- int status = main(argc, argv, environ);
- exit(status);
- // We should never get here, but if we ever do, make sure to
- // restore the stack guard to the value we entered _start with.
- // Then we won't trigger the stack canary check on the way out.
- __stack_chk_guard = original_stack_chk;
- return 20150614;
- }
- }
- #endif
|