The /proc/sys/kernel/randomize_va_space
interface controls ASLR system-wide.
If you don't want a system-wide change, use ADDR_NO_RANDOMIZE
personality flag to temporarily disable ASLR. Controlling of this flag can be done with setarch
and its -R
option, like
setarch `uname -m` -R /bin/bash
This will open a new Bash shell for you with ASLR disabled, including all child processes run from this shell. Just exit
the shell once you're done.
By the way, on i386, ulimit -s unlimited
can effectively "disable" ASLR.
EDIT (Apr 2016): The ulimit -s unlimited
was fixed and assigned CVE-2016-3672.