Kernel: Mark the stack check guard as READONLY_AFTER_INIT
This makes it harder for an exploit to replace the kernel's randomized canary value since the memory containing it will be mapped read-only.
This commit is contained in:
parent
84d3428ab3
commit
8f6bc7fd10
Notes:
sideshowbarker
2024-07-18 08:03:15 +09:00
Author: https://github.com/awesomekling Commit: https://github.com/SerenityOS/serenity/commit/8f6bc7fd10a
1 changed files with 1 additions and 1 deletions
|
@ -68,7 +68,7 @@ extern ctor_func_t start_ctors[];
|
|||
extern ctor_func_t end_ctors[];
|
||||
|
||||
extern size_t __stack_chk_guard;
|
||||
size_t __stack_chk_guard;
|
||||
READONLY_AFTER_INIT size_t __stack_chk_guard;
|
||||
|
||||
extern "C" u8 start_of_safemem_text[];
|
||||
extern "C" u8 end_of_safemem_text[];
|
||||
|
|
Loading…
Add table
Reference in a new issue