Page MenuHomeFreeBSD

Update ASLR stack sysctl description in security.7 and mitigations.7
ClosedPublic

Authored by emaste on Oct 24 2023, 10:10 PM.
Tags
None
Referenced Files
Unknown Object (File)
Tue, Sep 10, 6:18 AM
Unknown Object (File)
Tue, Sep 3, 11:48 PM
Unknown Object (File)
Thu, Aug 29, 6:10 AM
Unknown Object (File)
Thu, Aug 29, 4:53 AM
Unknown Object (File)
Aug 21 2024, 1:13 AM
Unknown Object (File)
Aug 18 2024, 4:58 AM
Unknown Object (File)
Aug 9 2024, 1:41 PM
Unknown Object (File)
Jul 9 2024, 10:03 PM
Subscribers

Details

Summary
In an earlier implementation the stack was randomized when the enable
sysctl was set, and ASLR was enabled (in general) for the binary.  In
the current implementation the sysctl operates independently.

Diff Detail

Lint
Lint Skipped
Unit
Tests Skipped

Event Timeline

emaste created this revision.
This revision is now accepted and ready to land.Oct 24 2023, 10:12 PM

It looks like this was changed with 1811c1e957ee1250b08b3246fc0db37ddf64b736, although that still has

+.It Dv kern.elf32.aslr.stack
+If ASLR is enabled for a binary, a non-zero value enables randomization
+of the stack.
+Otherwise, the stack is mapped at a fixed location determined by the
+process ABI.