mirror of
https://sourceware.org/git/glibc.git
synced 2024-12-02 09:40:13 +00:00
c61b4d41c9
The pointer guard used for pointer mangling was not initialized for static applications resulting in the security feature being disabled. The pointer guard is now correctly initialized to a random value for static applications. Existing static applications need to be recompiled to take advantage of the fix. The test tst-ptrguard1-static and tst-ptrguard1 add regression coverage to ensure the pointer guards are sufficiently random and initialized to a default value.
21 lines
702 B
C
21 lines
702 B
C
#include <bits/wordsize.h>
|
|
|
|
#ifdef __tilegx__
|
|
# if __WORDSIZE == 64
|
|
# define STACK_CHK_GUARD \
|
|
({ uintptr_t x; asm ("addi %0, tp, -16; ld %0, %0" : "=r" (x)); x; })
|
|
# define POINTER_CHK_GUARD \
|
|
({ uintptr_t x; asm ("addi %0, tp, -24; ld %0, %0" : "=r" (x)); x; })
|
|
# else
|
|
# define STACK_CHK_GUARD \
|
|
({ uintptr_t x; asm ("addi %0, tp, -8; ld4s %0, %0" : "=r" (x)); x; })
|
|
# define POINTER_CHK_GUARD \
|
|
({ uintptr_t x; asm ("addi %0, tp, -12; ld4s %0, %0" : "=r" (x)); x; })
|
|
# endif
|
|
#else
|
|
# define STACK_CHK_GUARD \
|
|
({ uintptr_t x; asm ("addi %0, tp, -8; lw %0, %0" : "=r" (x)); x; })
|
|
# define POINTER_CHK_GUARD \
|
|
({ uintptr_t x; asm ("addi %0, tp, -12; lw %0, %0" : "=r" (x)); x; })
|
|
#endif
|