summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authormortimer <mortimer@cvs.openbsd.org>2018-06-01 03:28:00 +0000
committermortimer <mortimer@cvs.openbsd.org>2018-06-01 03:28:00 +0000
commitae50f26ee424fb370bb0901627f59502c02b262a (patch)
tree73ece2eebcab2515f4ddbde48d6f705c73907243
parentc34900ccc9e7be47652b009cf367fea8b288b371 (diff)
Bump ELF_RANDOMIZE_LIMIT to 1MB.
ok deraadt@
-rw-r--r--libexec/ld.so/SPECS.randomdata4
-rw-r--r--sys/sys/exec.h4
2 files changed, 4 insertions, 4 deletions
diff --git a/libexec/ld.so/SPECS.randomdata b/libexec/ld.so/SPECS.randomdata
index 2cbde3fd41d..1e71ba99711 100644
--- a/libexec/ld.so/SPECS.randomdata
+++ b/libexec/ld.so/SPECS.randomdata
@@ -1,4 +1,4 @@
-$OpenBSD: SPECS.randomdata,v 1.2 2015/02/06 23:58:12 deraadt Exp $
+$OpenBSD: SPECS.randomdata,v 1.3 2018/06/01 03:27:59 mortimer Exp $
This document describes the OpenBSD operating system supplement for
adding "random data" sections to the ELF ABI. These sections can be
@@ -45,4 +45,4 @@ PT_LOAD segments: the kernel handles initializing random data segments
in executables and program interpreters (i.e., ld.so), while ld.so
handles initializing them in shared libraries. Additionally, the
kernel limits the total number of PT_OPENBSD_RANDOMIZE segment bytes
-in an executable or interpreter to 65536 bytes.
+in an executable or interpreter to 1048576 bytes.
diff --git a/sys/sys/exec.h b/sys/sys/exec.h
index ad2594ad7e6..b7e413cadde 100644
--- a/sys/sys/exec.h
+++ b/sys/sys/exec.h
@@ -1,4 +1,4 @@
-/* $OpenBSD: exec.h,v 1.37 2018/04/12 17:13:44 deraadt Exp $ */
+/* $OpenBSD: exec.h,v 1.38 2018/06/01 03:27:59 mortimer Exp $ */
/* $NetBSD: exec.h,v 1.59 1996/02/09 18:25:09 christos Exp $ */
/*-
@@ -223,7 +223,7 @@ extern int exec_maxhdrsz;
extern int stackgap_random;
/* Limit on total PT_OPENBSD_RANDOMIZE bytes. */
-#define ELF_RANDOMIZE_LIMIT 64*1024
+#define ELF_RANDOMIZE_LIMIT 1024*1024
#endif /* _KERNEL */