Page MenuHomeFreeBSD

Update ASLR stack sysctl description in security.7 and mitigations.7
ClosedPublic

Authored by emaste on Oct 24 2023, 10:10 PM.
Tags
None
Referenced Files
Unknown Object (File)
Wed, Mar 5, 6:44 PM
Unknown Object (File)
Fri, Feb 14, 10:09 AM
Unknown Object (File)
Jan 26 2025, 3:01 PM
Unknown Object (File)
Jan 25 2025, 11:45 AM
Unknown Object (File)
Jan 25 2025, 9:12 AM
Unknown Object (File)
Jan 24 2025, 5:32 PM
Unknown Object (File)
Jan 18 2025, 9:42 PM
Unknown Object (File)
Jan 12 2025, 1:38 PM
Subscribers

Details

Summary
In an earlier implementation the stack was randomized when the enable
sysctl was set, and ASLR was enabled (in general) for the binary.  In
the current implementation the sysctl operates independently.

Diff Detail

Lint
Lint Skipped
Unit
Tests Skipped

Event Timeline

emaste created this revision.
This revision is now accepted and ready to land.Oct 24 2023, 10:12 PM

It looks like this was changed with 1811c1e957ee1250b08b3246fc0db37ddf64b736, although that still has

+.It Dv kern.elf32.aslr.stack
+If ASLR is enabled for a binary, a non-zero value enables randomization
+of the stack.
+Otherwise, the stack is mapped at a fixed location determined by the
+process ABI.