Page MenuHomeFreeBSD

user stack randomization: only enable by default for 64bit processes
ClosedPublic

Authored by kib on Oct 24 2023, 9:47 PM.
Tags
None
Referenced Files
Unknown Object (File)
Wed, Dec 25, 3:41 AM
Unknown Object (File)
Sat, Dec 21, 2:13 AM
Unknown Object (File)
Dec 5 2024, 9:19 AM
Unknown Object (File)
Dec 3 2024, 7:32 PM
Unknown Object (File)
Nov 28 2024, 6:21 PM
Unknown Object (File)
Nov 20 2024, 9:36 PM
Unknown Object (File)
Nov 19 2024, 12:58 PM
Unknown Object (File)
Nov 8 2024, 3:08 AM
Subscribers

Details

Summary
All aslr knobs are disabled by default for 32bit processes, except
stack.  This results in weird stack location, typically making around 1G
of user address space hard to use.

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

kib requested review of this revision.Oct 24 2023, 9:47 PM

Yes, it makes sense to have this consistent with other 32/64-bit ASLR knobs.

The description in mitigations.7 and security.7 says If ASLR is enabled for a process, also randomize the stack location.(or equivalent) but it looks like that may be referring to an older implementation. I can update that text.

This revision is now accepted and ready to land.Oct 24 2023, 10:00 PM