summaryrefslogtreecommitdiff
path: root/Kernel/init.cpp
diff options
context:
space:
mode:
authorAndreas Kling <kling@serenityos.org>2021-07-27 14:47:42 +0200
committerAndreas Kling <kling@serenityos.org>2021-07-27 14:50:10 +0200
commit8f6bc7fd10af0a89cc740c29c5812bfd87ccce64 (patch)
tree279062bbe049a69e6510e4073b3d85696283270b /Kernel/init.cpp
parent84d3428ab34ef79b82c643f704bd8de720298b37 (diff)
downloadserenity-8f6bc7fd10af0a89cc740c29c5812bfd87ccce64.zip
Kernel: Mark the stack check guard as READONLY_AFTER_INIT
This makes it harder for an exploit to replace the kernel's randomized canary value since the memory containing it will be mapped read-only.
Diffstat (limited to 'Kernel/init.cpp')
-rw-r--r--Kernel/init.cpp2
1 files changed, 1 insertions, 1 deletions
diff --git a/Kernel/init.cpp b/Kernel/init.cpp
index 3dda9f51e5..39d2ec7ed5 100644
--- a/Kernel/init.cpp
+++ b/Kernel/init.cpp
@@ -68,7 +68,7 @@ extern ctor_func_t start_ctors[];
extern ctor_func_t end_ctors[];
extern size_t __stack_chk_guard;
-size_t __stack_chk_guard;
+READONLY_AFTER_INIT size_t __stack_chk_guard;
extern "C" u8 start_of_safemem_text[];
extern "C" u8 end_of_safemem_text[];