Print this page
7029 want per-process exploit mitigation features (secflags)
7030 want basic address space layout randomization (aslr)
7031 noexec_user_stack should be a secflag
7032 want a means to forbid mappings around NULL.

Split Close
Expand all
Collapse all
          --- old/usr/src/lib/libc/common/sys/brk.s
          +++ new/usr/src/lib/libc/common/sys/brk.s
↓ open down ↓ 29 lines elided ↑ open up ↑
  30   30  /*
  31   31   * _brk_unlocked() simply traps into the kernel to set the brk.  It
  32   32   * returns 0 if the break was successfully set, or -1 otherwise.
  33   33   * It doesn't enforce any alignment and it doesn't perform any locking.
  34   34   * _brk_unlocked() is only called from brk() and _sbrk_unlocked().
  35   35   */
  36   36  
  37   37          ENTRY_NP(_brk_unlocked)
  38   38          SYSTRAP_RVAL1(brk)
  39   39          SYSCERROR
  40      -        RETC
       40 +        RET
  41   41          SET_SIZE(_brk_unlocked)
    
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX