mirror of
				https://sourceware.org/git/glibc.git
				synced 2025-11-03 20:53:13 +03:00 
			
		
		
		
	The pointer guard used for pointer mangling was not initialized for static applications resulting in the security feature being disabled. The pointer guard is now correctly initialized to a random value for static applications. Existing static applications need to be recompiled to take advantage of the fix. The test tst-ptrguard1-static and tst-ptrguard1 add regression coverage to ensure the pointer guards are sufficiently random and initialized to a default value.
		
			
				
	
	
		
			15 lines
		
	
	
		
			382 B
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			15 lines
		
	
	
		
			382 B
		
	
	
	
		
			C
		
	
	
	
	
	
#include <stdint.h>
 | 
						|
 | 
						|
#define STACK_CHK_GUARD \
 | 
						|
  ({ uintptr_t x; asm ("lwz %0,-28680(2)" : "=r" (x)); x; })
 | 
						|
 | 
						|
#define POINTER_CHK_GUARD \
 | 
						|
  ({												\
 | 
						|
     uintptr_t x;										\
 | 
						|
     asm ("lwz %0,%1(2)"									\
 | 
						|
	  : "=r" (x)										\
 | 
						|
	  : "i" (offsetof (tcbhead_t, pointer_guard) - TLS_TCB_OFFSET - sizeof (tcbhead_t))	\
 | 
						|
         );											\
 | 
						|
     x;												\
 | 
						|
   })
 |