Print this page
7029 want per-process exploit mitigation features (secflags)
7030 want basic address space layout randomization (aslr)
7031 noexec_user_stack should be a secflag
7032 want a means to forbid mappings around NULL.


  20  */
  21 /*
  22  * Copyright 2004 Sun Microsystems, Inc.  All rights reserved.
  23  * Use is subject to license terms.
  24  */
  25 
  26         .file   "brk.s"
  27 
  28 #include "SYS.h"
  29 
  30 /*
  31  * _brk_unlocked() simply traps into the kernel to set the brk.  It
  32  * returns 0 if the break was successfully set, or -1 otherwise.
  33  * It doesn't enforce any alignment and it doesn't perform any locking.
  34  * _brk_unlocked() is only called from brk() and _sbrk_unlocked().
  35  */
  36 
  37         ENTRY_NP(_brk_unlocked)
  38         SYSTRAP_RVAL1(brk)
  39         SYSCERROR
  40         RETC
  41         SET_SIZE(_brk_unlocked)


  20  */
  21 /*
  22  * Copyright 2004 Sun Microsystems, Inc.  All rights reserved.
  23  * Use is subject to license terms.
  24  */
  25 
  26         .file   "brk.s"
  27 
  28 #include "SYS.h"
  29 
  30 /*
  31  * _brk_unlocked() simply traps into the kernel to set the brk.  It
  32  * returns 0 if the break was successfully set, or -1 otherwise.
  33  * It doesn't enforce any alignment and it doesn't perform any locking.
  34  * _brk_unlocked() is only called from brk() and _sbrk_unlocked().
  35  */
  36 
  37         ENTRY_NP(_brk_unlocked)
  38         SYSTRAP_RVAL1(brk)
  39         SYSCERROR
  40         RET
  41         SET_SIZE(_brk_unlocked)