| // Copyright 2021 The Chromium Authors | 
 | // Use of this source code is governed by a BSD-style license that can be | 
 | // found in the LICENSE file. | 
 |  | 
 | #ifndef BASE_STACK_CANARY_LINUX_H_ | 
 | #define BASE_STACK_CANARY_LINUX_H_ | 
 |  | 
 | #include "base/base_export.h" | 
 |  | 
 | namespace base { | 
 |  | 
 | // This resets the reference stack canary to a new random value, which is | 
 | // useful when forking so multiple processes don't have the same canary (which | 
 | // makes it easy to brute force). All functions called from here on out will | 
 | // use the new stack canary. However, functions that are on the call stack at | 
 | // the time of calling this function are now unsafe to return from unless they | 
 | // have the no_stack_protector attribute. | 
 | // | 
 | // On ARM we require the process to be single-threaded, as this function needs | 
 | // to edit a read-only page containing the canary. | 
 | void BASE_EXPORT ResetStackCanaryIfPossible(); | 
 |  | 
 | // After this is called, any canary mismatch is considered to be due to a | 
 | // change in the reference canary (see ResetStackCanaryIfPossible()) rather | 
 | // than a stack corruption. Instead of immediately crashing, emit a useful | 
 | // debug message that explains how to avoid the crash. | 
 | // Has no effect is non-debug builds. | 
 | void BASE_EXPORT SetStackSmashingEmitsDebugMessage(); | 
 |  | 
 | }  // namespace base | 
 |  | 
 | #endif  // BASE_STACK_CANARY_LINUX_H_ |