On Mon, 4 Feb 2008, Ingo Molnar wrote:

> hm, so it seems that it isnt even the randomization that causes the 
> problem - but somehow the randomization code itself is broken, right? 
> Would you be interested in figuring out how to unbreak this? [if not, 
> could you send me the binary?]

I still don't seem to fully understand what is happening here -- aparently 
this is triggerable only with old programs linked against libc.so.5, and I 
am not able to trigger it with my trivial program when I link it against 
old libc.so.5, which just basically does brk() and checks whether 
/proc/<pid>/maps are OK. Seems to me that (at least certain versions) of 
libc.so.5 (wrongly) assume that end of the bss is the start of the heap, 
but I will try to investigate it more.

Ingo, the code in commit c1d171a0029 is IMHO funcionalli identical to 
your exec-shield in fedora kernels, so even libc.so.5-linked binaries on 
any Fedora distro should trigger this bug ... (or you can use the binary 
that Pavel supplied). Haven't tried this yet.

Thanks,

-- 
Jiri Kosina
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to