summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--libexec/ld.so/SPECS.randomdata4
-rw-r--r--sys/sys/exec.h4
2 files changed, 4 insertions, 4 deletions
diff --git a/libexec/ld.so/SPECS.randomdata b/libexec/ld.so/SPECS.randomdata
index 2cbde3fd41d..1e71ba99711 100644
--- a/libexec/ld.so/SPECS.randomdata
+++ b/libexec/ld.so/SPECS.randomdata
@@ -1,4 +1,4 @@
-$OpenBSD: SPECS.randomdata,v 1.2 2015/02/06 23:58:12 deraadt Exp $
+$OpenBSD: SPECS.randomdata,v 1.3 2018/06/01 03:27:59 mortimer Exp $
This document describes the OpenBSD operating system supplement for
adding "random data" sections to the ELF ABI. These sections can be
@@ -45,4 +45,4 @@ PT_LOAD segments: the kernel handles initializing random data segments
in executables and program interpreters (i.e., ld.so), while ld.so
handles initializing them in shared libraries. Additionally, the
kernel limits the total number of PT_OPENBSD_RANDOMIZE segment bytes
-in an executable or interpreter to 65536 bytes.
+in an executable or interpreter to 1048576 bytes.
diff --git a/sys/sys/exec.h b/sys/sys/exec.h
index ad2594ad7e6..b7e413cadde 100644
--- a/sys/sys/exec.h
+++ b/sys/sys/exec.h
@@ -1,4 +1,4 @@
-/* $OpenBSD: exec.h,v 1.37 2018/04/12 17:13:44 deraadt Exp $ */
+/* $OpenBSD: exec.h,v 1.38 2018/06/01 03:27:59 mortimer Exp $ */
/* $NetBSD: exec.h,v 1.59 1996/02/09 18:25:09 christos Exp $ */
/*-
@@ -223,7 +223,7 @@ extern int exec_maxhdrsz;
extern int stackgap_random;
/* Limit on total PT_OPENBSD_RANDOMIZE bytes. */
-#define ELF_RANDOMIZE_LIMIT 64*1024
+#define ELF_RANDOMIZE_LIMIT 1024*1024
#endif /* _KERNEL */