Commit 32a93233 authored by Ingo Molnar's avatar Ingo Molnar

brk randomization: introduce CONFIG_COMPAT_BRK

based on similar patch from: Pavel Machek <>

Introduce CONFIG_COMPAT_BRK. If disabled then the kernel is free
(but not obliged to) randomize the brk area.

Heap randomization breaks ancient binaries, so we keep COMPAT_BRK
enabled by default.
Signed-off-by: default avatarIngo Molnar <>
parent 4cc6028d
......@@ -1077,7 +1077,7 @@ static int load_elf_binary(struct linux_binprm *bprm, struct pt_regs *regs)
current->mm->start_stack = bprm->p;
#ifdef arch_randomize_brk
if (current->flags & PF_RANDOMIZE)
if ((current->flags & PF_RANDOMIZE) && (randomize_va_space > 1))
current->mm->brk = current->mm->start_brk =
......@@ -541,6 +541,18 @@ config ELF_CORE
Enable support for generating core dumps. Disabling saves about 4k.
bool "Disable heap randomization"
default y
Randomizing heap placement makes heap exploits harder, but it
also breaks ancient binaries (including anything libc5 based).
This option changes the bootup default to heap randomization
disabled, and can be overriden runtime by setting
/proc/sys/kernel/randomize_va_space to 2.
On non-ancient distros (post-2000 ones) Y is usually a safe choice.
config BASE_FULL
default y
bool "Enable full-sized data structures for core" if EMBEDDED
......@@ -82,7 +82,18 @@ void * high_memory;
int randomize_va_space __read_mostly = 1;
* Randomize the address space (stacks, mmaps, brk, etc.).
* ( When CONFIG_COMPAT_BRK=y we exclude brk from randomization,
* as ancient (libc5 based) binaries can segfault. )
int randomize_va_space __read_mostly =
static int __init disable_randmaps(char *s)
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment