Re: [PATCH] x86: Don't randomize stack unless current->personalitypermits it

From: Paulo Marques
Date: Mon Jul 17 2006 - 11:48:23 EST

Al Boldi wrote:
[...] > void fn() {

long i = 9999999;
double x,y;

while (i--) fn2(&x,&y);
printf("%4lu ",elapsed(0));

You are not initializing x and y and with -Os at least my gcc really uses floating point load/store operations to handle that code.

Maybe the coprocessor has a hard time normalizing certain garbage on the stack, but without/with randomization the data comes from other addresses and you're just lucky with the contents.

Does this also happens if you add a "x=0, y=0;" line to that function?

Paulo Marques -

Pointy-Haired Boss: I don't see anything that could stand in our way.
Dilbert: Sanity? Reality? The laws of physics?
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at
Please read the FAQ at