diff options
author | Arun Chandran <achandran@mvista.com> | 2014-10-10 13:31:24 +0200 |
---|---|---|
committer | Catalin Marinas <catalin.marinas@arm.com> | 2014-10-24 16:47:49 +0200 |
commit | 92980405f3537136b8e81007a9df576762f49bbb (patch) | |
tree | a40d98e18e154c3d04e673842864812e14425c08 /arch/arm64/kernel/process.c | |
parent | arm64: vexpress: Add CLCD support to the ARMv8 model platform (diff) | |
download | linux-92980405f3537136b8e81007a9df576762f49bbb.tar.xz linux-92980405f3537136b8e81007a9df576762f49bbb.zip |
arm64: ASLR: Don't randomise text when randomise_va_space == 0
When user asks to turn off ASLR by writing "0" to
/proc/sys/kernel/randomize_va_space there should not be
any randomization to mmap base, stack, VDSO, libs, text and heap
Currently arm64 violates this behavior by randomising text.
Fix this by defining a constant ELF_ET_DYN_BASE. The randomisation of
mm->mmap_base is done by setup_new_exec -> arch_pick_mmap_layout ->
mmap_base -> mmap_rnd.
Signed-off-by: Arun Chandran <achandran@mvista.com>
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
Diffstat (limited to '')
-rw-r--r-- | arch/arm64/kernel/process.c | 5 |
1 files changed, 0 insertions, 5 deletions
diff --git a/arch/arm64/kernel/process.c b/arch/arm64/kernel/process.c index c3065dbc4fa2..fde9923af859 100644 --- a/arch/arm64/kernel/process.c +++ b/arch/arm64/kernel/process.c @@ -378,8 +378,3 @@ unsigned long arch_randomize_brk(struct mm_struct *mm) { return randomize_base(mm->brk); } - -unsigned long randomize_et_dyn(unsigned long base) -{ - return randomize_base(base); -} |