Page MenuHomeFreeBSD

Update ASLR stack sysctl description in security.7 and mitigations.7
ClosedPublic

Authored by emaste on Oct 24 2023, 10:10 PM.
Tags
None
Referenced Files
Unknown Object (File)
Fri, Feb 14, 10:09 AM
Unknown Object (File)
Sun, Jan 26, 3:01 PM
Unknown Object (File)
Sat, Jan 25, 11:45 AM
Unknown Object (File)
Sat, Jan 25, 9:12 AM
Unknown Object (File)
Fri, Jan 24, 5:32 PM
Unknown Object (File)
Sat, Jan 18, 9:42 PM
Unknown Object (File)
Jan 12 2025, 1:38 PM
Unknown Object (File)
Dec 17 2024, 8:35 PM
Subscribers

Details

Summary
In an earlier implementation the stack was randomized when the enable
sysctl was set, and ASLR was enabled (in general) for the binary.  In
the current implementation the sysctl operates independently.

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

emaste created this revision.
This revision is now accepted and ready to land.Oct 24 2023, 10:12 PM

It looks like this was changed with 1811c1e957ee1250b08b3246fc0db37ddf64b736, although that still has

+.It Dv kern.elf32.aslr.stack
+If ASLR is enabled for a binary, a non-zero value enables randomization
+of the stack.
+Otherwise, the stack is mapped at a fixed location determined by the
+process ABI.