diff options
Diffstat (limited to 'Documentation/sysctl/kernel.txt')
| -rw-r--r-- | Documentation/sysctl/kernel.txt | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/Documentation/sysctl/kernel.txt b/Documentation/sysctl/kernel.txt index 8984a5396271..dc8801d4e944 100644 --- a/Documentation/sysctl/kernel.txt +++ b/Documentation/sysctl/kernel.txt | |||
| @@ -41,6 +41,7 @@ show up in /proc/sys/kernel: | |||
| 41 | - pid_max | 41 | - pid_max |
| 42 | - powersave-nap [ PPC only ] | 42 | - powersave-nap [ PPC only ] |
| 43 | - printk | 43 | - printk |
| 44 | - randomize_va_space | ||
| 44 | - real-root-dev ==> Documentation/initrd.txt | 45 | - real-root-dev ==> Documentation/initrd.txt |
| 45 | - reboot-cmd [ SPARC only ] | 46 | - reboot-cmd [ SPARC only ] |
| 46 | - rtsig-max | 47 | - rtsig-max |
| @@ -280,6 +281,34 @@ send before ratelimiting kicks in. | |||
| 280 | 281 | ||
| 281 | ============================================================== | 282 | ============================================================== |
| 282 | 283 | ||
| 284 | randomize-va-space: | ||
| 285 | |||
| 286 | This option can be used to select the type of process address | ||
| 287 | space randomization that is used in the system, for architectures | ||
| 288 | that support this feature. | ||
| 289 | |||
| 290 | 0 - Turn the process address space randomization off by default. | ||
| 291 | |||
| 292 | 1 - Make the addresses of mmap base, stack and VDSO page randomized. | ||
| 293 | This, among other things, implies that shared libraries will be | ||
| 294 | loaded to random addresses. Also for PIE-linked binaries, the location | ||
| 295 | of code start is randomized. | ||
| 296 | |||
| 297 | With heap randomization, the situation is a little bit more | ||
| 298 | complicated. | ||
| 299 | There a few legacy applications out there (such as some ancient | ||
| 300 | versions of libc.so.5 from 1996) that assume that brk area starts | ||
| 301 | just after the end of the code+bss. These applications break when | ||
| 302 | start of the brk area is randomized. There are however no known | ||
| 303 | non-legacy applications that would be broken this way, so for most | ||
| 304 | systems it is safe to choose full randomization. However there is | ||
| 305 | a CONFIG_COMPAT_BRK option for systems with ancient and/or broken | ||
| 306 | binaries, that makes heap non-randomized, but keeps all other | ||
| 307 | parts of process address space randomized if randomize_va_space | ||
| 308 | sysctl is turned on. | ||
| 309 | |||
| 310 | ============================================================== | ||
| 311 | |||
| 283 | reboot-cmd: (Sparc only) | 312 | reboot-cmd: (Sparc only) |
| 284 | 313 | ||
| 285 | ??? This seems to be a way to give an argument to the Sparc | 314 | ??? This seems to be a way to give an argument to the Sparc |
