[PATCH] arm64: Make arch_randomize_brk avoid stack area

Catalin Marinas catalin.marinas at arm.com
Fri May 6 04:19:37 PDT 2016


Hi Tixy,

On Wed, May 04, 2016 at 03:09:54PM +0100, Jon Medhurst (Tixy) wrote:
> Note, in practice, since commit d1fd836dcf00 ("mm: split ET_DYN ASLR
> from mmap ASLR") this problem shouldn't occur because the address chosen
> for loading binaries is well clear of the stack, however, prior to that
> the problem does occur because of the following...

[...]

> These changes have been tested on Linux v4.6-rc4 using 100000
> invocations of a program [1] that can display the offset of a process's
> brk...

[...]

> Signed-off-by: Jon Medhurst <tixy at linaro.org>
> Cc: <stable at vger.kernel.org> # 4.0 and earlier

I don't fully understand what we are supposed to do with this patch.
Should it only be applied to stable kernels prior to 4.0? Do we need it
in mainline? As you stated above, this problem does not exist in recent
kernels.

-- 
Catalin



More information about the linux-arm-kernel mailing list