Print this page
7029 want per-process exploit mitigation features (secflags)
7030 want basic address space layout randomization (aslr)
7031 noexec_user_stack should be a secflag
7032 want a means to forbid mappings around NULL.

Split Close
Expand all
Collapse all
          --- old/usr/src/lib/libc/port/gen/priv_str_xlate.c
          +++ new/usr/src/lib/libc/port/gen/priv_str_xlate.c
↓ open down ↓ 64 lines elided ↑ open up ↑
  65   65   *      equivalent privilege set is returned.
  66   66   *
  67   67   *      Special tokens recognized: all, none, basic and "".
  68   68   *
  69   69   *      On failure, this function returns NULL.
  70   70   *      *endptr == NULL and errno set: resource error.
  71   71   *      *endptr != NULL: parse error.
  72   72   */
  73   73  priv_set_t *
  74   74  priv_str_to_set(const char *priv_names,
  75      -                const char *separators,
  76      -                const char **endptr)
       75 +    const char *separators,
       76 +    const char **endptr)
  77   77  {
  78   78  
  79   79          char *base;
  80   80          char *offset;
  81   81          char *last;
  82   82          priv_set_t *pset = NULL;
  83   83          priv_set_t *zone;
  84   84          priv_set_t *basic;
  85   85  
  86   86          if (endptr != NULL)
↓ open down ↓ 368 lines elided ↑ open up ↑
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX