From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751222AbWGPVbl (ORCPT ); Sun, 16 Jul 2006 17:31:41 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751297AbWGPVbl (ORCPT ); Sun, 16 Jul 2006 17:31:41 -0400 Received: from ns.suse.de ([195.135.220.2]:50620 "EHLO mx1.suse.de") by vger.kernel.org with ESMTP id S1751222AbWGPVbk (ORCPT ); Sun, 16 Jul 2006 17:31:40 -0400 From: Andi Kleen To: discuss@x86-64.org Subject: Re: [discuss] Re: [PATCH for 2.6.18-rc2] [2/8] i386/x86-64: Don't randomize stack top when no randomization personality is set II Date: Sun, 16 Jul 2006 23:33:21 +0200 User-Agent: KMail/1.9.1 Cc: Ingo Molnar , torvalds@osdl.org, akpm@osdl.org, linux-kernel@vger.kernel.org, Chuck Ebbert <76306.1226@compuserve.com> References: <44ba2f8d.0hsur33TTkK+bbJl%ak@suse.de> <200607162314.07764.ak@suse.de> <20060716211126.GA2880@elte.hu> In-Reply-To: <20060716211126.GA2880@elte.hu> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200607162333.21640.ak@suse.de> Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org > yeah. There's one security issue: the 'dont randomize' flag must be > cleared when we cross a protection domain. When for example suid-ing in > exec(). Just checked. It should be already done because ADDR_NO_RANDOMIZE is in PER_CLEAR_ON_SETID which is cleared in exec. -Andi