diff options
author | mortimer <mortimer@cvs.openbsd.org> | 2018-06-01 03:28:00 +0000 |
---|---|---|
committer | mortimer <mortimer@cvs.openbsd.org> | 2018-06-01 03:28:00 +0000 |
commit | ae50f26ee424fb370bb0901627f59502c02b262a (patch) | |
tree | 73ece2eebcab2515f4ddbde48d6f705c73907243 | |
parent | c34900ccc9e7be47652b009cf367fea8b288b371 (diff) |
Bump ELF_RANDOMIZE_LIMIT to 1MB.
ok deraadt@
-rw-r--r-- | libexec/ld.so/SPECS.randomdata | 4 | ||||
-rw-r--r-- | sys/sys/exec.h | 4 |
2 files changed, 4 insertions, 4 deletions
diff --git a/libexec/ld.so/SPECS.randomdata b/libexec/ld.so/SPECS.randomdata index 2cbde3fd41d..1e71ba99711 100644 --- a/libexec/ld.so/SPECS.randomdata +++ b/libexec/ld.so/SPECS.randomdata @@ -1,4 +1,4 @@ -$OpenBSD: SPECS.randomdata,v 1.2 2015/02/06 23:58:12 deraadt Exp $ +$OpenBSD: SPECS.randomdata,v 1.3 2018/06/01 03:27:59 mortimer Exp $ This document describes the OpenBSD operating system supplement for adding "random data" sections to the ELF ABI. These sections can be @@ -45,4 +45,4 @@ PT_LOAD segments: the kernel handles initializing random data segments in executables and program interpreters (i.e., ld.so), while ld.so handles initializing them in shared libraries. Additionally, the kernel limits the total number of PT_OPENBSD_RANDOMIZE segment bytes -in an executable or interpreter to 65536 bytes. +in an executable or interpreter to 1048576 bytes. diff --git a/sys/sys/exec.h b/sys/sys/exec.h index ad2594ad7e6..b7e413cadde 100644 --- a/sys/sys/exec.h +++ b/sys/sys/exec.h @@ -1,4 +1,4 @@ -/* $OpenBSD: exec.h,v 1.37 2018/04/12 17:13:44 deraadt Exp $ */ +/* $OpenBSD: exec.h,v 1.38 2018/06/01 03:27:59 mortimer Exp $ */ /* $NetBSD: exec.h,v 1.59 1996/02/09 18:25:09 christos Exp $ */ /*- @@ -223,7 +223,7 @@ extern int exec_maxhdrsz; extern int stackgap_random; /* Limit on total PT_OPENBSD_RANDOMIZE bytes. */ -#define ELF_RANDOMIZE_LIMIT 64*1024 +#define ELF_RANDOMIZE_LIMIT 1024*1024 #endif /* _KERNEL */ |