diff options
author | Mark Kettenis <kettenis@cvs.openbsd.org> | 2023-03-19 20:32:14 +0000 |
---|---|---|
committer | Mark Kettenis <kettenis@cvs.openbsd.org> | 2023-03-19 20:32:14 +0000 |
commit | b3e87e8127854e1511b3cc5e9ada88634658da5d (patch) | |
tree | a6b1c20bb9690ff3f9965a7ed80415b7442504a4 /distrib/Makefile | |
parent | 51864c134f3693dc4f3452f452bb8c5845c20c2f (diff) |
Aggressively randomize the location of the stack on all 64-bit architectures
except alpha. This will put the stack at a random location in the upper
1/4th of the userland virtual address space providing up to 26 additional
bits of randomness in the address. Skip alpha for now since it currently
puts the stack at a (for a 64-bit architecture) very low address. Skip
32-bit architectures for now as well since those have a much smaller
virtual address space and we need more time to figure out what a safe
amount of extra randomizations is. These architectures will continue to
use a mildly randomized stack address through the existing stackgap random
mechanism. We will revisit this after 7.3 is released.
This should make it harder for an attacker to find the stack.
ok deraadt@, miod@
Diffstat (limited to 'distrib/Makefile')
0 files changed, 0 insertions, 0 deletions