diff options
author | Andreas Kling <kling@serenityos.org> | 2021-07-27 14:47:42 +0200 |
---|---|---|
committer | Andreas Kling <kling@serenityos.org> | 2021-07-27 14:50:10 +0200 |
commit | 8f6bc7fd10af0a89cc740c29c5812bfd87ccce64 (patch) | |
tree | 279062bbe049a69e6510e4073b3d85696283270b /Kernel/init.cpp | |
parent | 84d3428ab34ef79b82c643f704bd8de720298b37 (diff) | |
download | serenity-8f6bc7fd10af0a89cc740c29c5812bfd87ccce64.zip |
Kernel: Mark the stack check guard as READONLY_AFTER_INIT
This makes it harder for an exploit to replace the kernel's randomized
canary value since the memory containing it will be mapped read-only.
Diffstat (limited to 'Kernel/init.cpp')
-rw-r--r-- | Kernel/init.cpp | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/Kernel/init.cpp b/Kernel/init.cpp index 3dda9f51e5..39d2ec7ed5 100644 --- a/Kernel/init.cpp +++ b/Kernel/init.cpp @@ -68,7 +68,7 @@ extern ctor_func_t start_ctors[]; extern ctor_func_t end_ctors[]; extern size_t __stack_chk_guard; -size_t __stack_chk_guard; +READONLY_AFTER_INIT size_t __stack_chk_guard; extern "C" u8 start_of_safemem_text[]; extern "C" u8 end_of_safemem_text[]; |