Page MenuHomeFreeBSD

user stack randomization: only enable by default for 64bit processes
ClosedPublic

Authored by kib on Oct 24 2023, 9:47 PM.
Tags
None
Referenced Files
Unknown Object (File)
Wed, Oct 30, 11:30 AM
Unknown Object (File)
Sun, Oct 13, 3:21 AM
Unknown Object (File)
Sun, Oct 13, 3:20 AM
Unknown Object (File)
Sun, Oct 13, 3:20 AM
Unknown Object (File)
Sun, Oct 13, 3:10 AM
Unknown Object (File)
Sep 29 2024, 12:57 AM
Unknown Object (File)
Sep 18 2024, 10:03 PM
Unknown Object (File)
Sep 12 2024, 1:04 AM
Subscribers

Details

Summary
All aslr knobs are disabled by default for 32bit processes, except
stack.  This results in weird stack location, typically making around 1G
of user address space hard to use.

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable

Event Timeline

kib requested review of this revision.Oct 24 2023, 9:47 PM

Yes, it makes sense to have this consistent with other 32/64-bit ASLR knobs.

The description in mitigations.7 and security.7 says If ASLR is enabled for a process, also randomize the stack location.(or equivalent) but it looks like that may be referring to an older implementation. I can update that text.

This revision is now accepted and ready to land.Oct 24 2023, 10:00 PM