c61b4d41c9
The pointer guard used for pointer mangling was not initialized for static applications resulting in the security feature being disabled. The pointer guard is now correctly initialized to a random value for static applications. Existing static applications need to be recompiled to take advantage of the fix. The test tst-ptrguard1-static and tst-ptrguard1 add regression coverage to ensure the pointer guards are sufficiently random and initialized to a default value.
8 lines
196 B
C
8 lines
196 B
C
#include <stdint.h>
|
|
|
|
extern uintptr_t __stack_chk_guard;
|
|
#define STACK_CHK_GUARD __stack_chk_guard
|
|
|
|
extern uintptr_t __pointer_chk_guard_local;
|
|
#define POINTER_CHK_GUARD __pointer_chk_guard_local
|