Print this page
7029 want per-process exploit mitigation features (secflags)
7030 want basic address space layout randomization (aslr)
7031 noexec_user_stack should be a secflag
7032 want a means to forbid mappings around NULL.

Split Close
Expand all
Collapse all
          --- old/usr/src/lib/libscf/inc/libscf_priv.h
          +++ new/usr/src/lib/libscf/inc/libscf_priv.h
↓ open down ↓ 21 lines elided ↑ open up ↑
  22   22   * Copyright (c) 2004, 2010, Oracle and/or its affiliates. All rights reserved.
  23   23   * Copyright 2013, Joyent, Inc. All rights reserved.
  24   24   */
  25   25  
  26   26  #ifndef _LIBSCF_PRIV_H
  27   27  #define _LIBSCF_PRIV_H
  28   28  
  29   29  
  30   30  #include <libscf.h>
  31   31  #include <unistd.h>
       32 +#if !defined(NATIVE_BUILD)
       33 +#include <sys/secflags.h>
       34 +#endif
  32   35  
  33   36  #ifdef  __cplusplus
  34   37  extern "C" {
  35   38  #endif
  36   39  
  37   40  /*
  38   41   * NOTE
  39   42   *
  40   43   * The contents of this file are private to the implementation of Solaris
  41   44   * and are subject to change at any time without notice.
↓ open down ↓ 543 lines elided ↑ open up ↑
 585  588   */
 586  589  int _scf_get_svc_notify_params(const char *, nvlist_t *, int32_t, int, int);
 587  590  
 588  591  /*
 589  592   * _scf_notify_get_params()
 590  593   * Specialized function to get notification parametes from a pg into an
 591  594   * nvlist_t
 592  595   */
 593  596  int _scf_notify_get_params(scf_propertygroup_t *, nvlist_t *);
 594  597  
      598 +#if !defined(NATIVE_BUILD)
      599 +int scf_default_secflags(scf_handle_t *, psecflags_t *);
      600 +#endif
      601 +
 595  602  #define SCF_NOTIFY_PARAMS_SOURCE_NAME   ((const char *)"preference_source")
 596  603  
 597  604  #ifdef  __cplusplus
 598  605  }
 599  606  #endif
 600  607  
 601  608  #endif  /* _LIBSCF_PRIV_H */
    
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX