You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Split out from #5: If the user defines a custom entrypoint via /ENTRY, we should verify that they call call __security_init_cookie(). If they fail to, we should mark GS as not enabled, as the stack cookie will be whatever the compile time value was.
The text was updated successfully, but these errors were encountered:
To elaborate: the current /GS detection is probably over-sensitive, since every recent build of the Windows CRT has stack cookies enabled and uses the default cookie to protect _start at the very minimum.
Instead, we should be checking for /GS instrumentation in non-_start functions, which will look something like this in pseudo-assembly:
mov rax, [__security_cookie]
xor rax, rsp
# ...
where __security_cookie is pointed to by the RVA in the load config's SecurityCookie field.
Split out from #5: If the user defines a custom entrypoint via
/ENTRY
, we should verify that they call call__security_init_cookie()
. If they fail to, we should mark GS as not enabled, as the stack cookie will be whatever the compile time value was.The text was updated successfully, but these errors were encountered: