diff options
author | Ted Unangst <tedu@cvs.openbsd.org> | 2003-09-03 22:52:48 +0000 |
---|---|---|
committer | Ted Unangst <tedu@cvs.openbsd.org> | 2003-09-03 22:52:48 +0000 |
commit | 774422469551d3a5a6acdb7e46bba36bbe180686 (patch) | |
tree | 4bf8c46ce8630484c61fd36e5908ff42f18ed9b1 | |
parent | bc17088ca5ee42ad42200d559b3840b197878a4d (diff) |
m68k at least doesn't like random mappings. disable for now.
i386 exec mappings are still random. detected by pvalchev@. ok deraadt@
-rw-r--r-- | sys/uvm/uvm_map.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/sys/uvm/uvm_map.c b/sys/uvm/uvm_map.c index 68948b16881..e5240144f1c 100644 --- a/sys/uvm/uvm_map.c +++ b/sys/uvm/uvm_map.c @@ -1,4 +1,4 @@ -/* $OpenBSD: uvm_map.c,v 1.61 2003/09/02 17:57:12 tedu Exp $ */ +/* $OpenBSD: uvm_map.c,v 1.62 2003/09/03 22:52:47 tedu Exp $ */ /* $NetBSD: uvm_map.c,v 1.86 2000/11/27 08:40:03 chs Exp $ */ /* @@ -1095,7 +1095,7 @@ uvm_map_hint(struct proc *p, vm_prot_t prot) } #endif addr = (vaddr_t)p->p_vmspace->vm_daddr + MAXDSIZ; -#ifndef __vax__ +#if 0 addr += arc4random() & (256 * 1024 * 1024 - 1); #endif return (round_page(addr)); |