Stack Smashing Protector: Difference between revisions
→How to implement it: Fix the canary setter to something that works. It's now pretending to be exception-throwing code, a null terminator, and a likely invalid pointer.
[unchecked revision] | [unchecked revision] |
m (Added a link to a GCC stack protector related topic in the forum) |
(→How to implement it: Fix the canary setter to something that works. It's now pretending to be exception-throwing code, a null terminator, and a likely invalid pointer.) |
||
Line 62:
/* If you have the ability to generate random numbers in your kernel then use them,
otherwise for 32-bit code: */
p[0] = 0xcd; p[1] = 0x00; p[2] = 0x0a; p[3] = 0xff;
}
|