Print this page
Code review comments from jeffpc
7029 want per-process exploit mitigation features (secflags)
7030 want basic address space layout randomization (aslr)
7031 noexec_user_stack should be a secflag
7032 want a means to forbid mappings around NULL.
*** 9,19 ****
.\" http://www.illumos.org/license/CDDL.
.\"
.\"
.\" Copyright 2015 Joyent, Inc.
.\"
! .Dd May 08, 2016
.Dt LIBPROC 3LIB
.Os
.Sh NAME
.Nm libproc
.Nd process control library
--- 9,19 ----
.\" http://www.illumos.org/license/CDDL.
.\"
.\"
.\" Copyright 2015 Joyent, Inc.
.\"
! .Dd June 06, 2016
.Dt LIBPROC 3LIB
.Os
.Sh NAME
.Nm libproc
.Nd process control library
*** 221,246 ****
.It Sy Pplatform Ta Sy Ppltdest
.It Sy Ppriv Ta Sy Ppsinfo
.It Sy Pputareg Ta Sy Prd_agent
.It Sy Pread Ta Sy Pread_string
.It Sy Preset_maps Ta Sy Psetbkpt
! .It Sy Psetcred Ta Sy Psetfault
! .It Sy Psetflags Ta Sy Psetpriv
! .It Sy Psetrun Ta Sy Psetsignal
! .It Sy Psetsysentry Ta Sy Psetsysexit
! .It Sy Psetwapt Ta Sy Psetzoneid
! .It Sy Psignal Ta Sy Pstate
! .It Sy Pstatus Ta Sy Pstop
! .It Sy Pstopstatus Ta Sy Psync
! .It Sy Psysentry Ta Sy Psysexit
! .It Sy Puname Ta Sy Punsetflags
! .It Sy Pupdate_maps Ta Sy Pupdate_syms
! .It Sy Pwait Ta Sy Pwrite
! .It Sy Pxecbkpt Ta Sy Pxecwapt
! .It Sy Pxlookup_by_addr Ta Sy Pxlookup_by_addr_resolved
! .It Sy Pxlookup_by_name Ta Sy Pzonename
! .It Sy Pzonepath Ta Sy Pzoneroot
.El
.Ss Thread interrogation and manipulation
The following routines obtain information about a thread and allow
manipulation of the thread itself.
.Bl -column -offset indent ".Sy Pmapping_iter_resolved" ".Sy Psymbol_iter_by_addr"
--- 221,247 ----
.It Sy Pplatform Ta Sy Ppltdest
.It Sy Ppriv Ta Sy Ppsinfo
.It Sy Pputareg Ta Sy Prd_agent
.It Sy Pread Ta Sy Pread_string
.It Sy Preset_maps Ta Sy Psetbkpt
! .It Sy Psecflags Ta Sy Psetcred
! .It Sy Psetfault Ta Sy Psetflags
! .It Sy Psetpriv Ta Sy Psetrun
! .It Sy Psetsignal Ta Sy Psetsysentry
! .It Sy Psetsysexit Ta Sy Psetwapt
! .It Sy Psetzoneid Ta Sy Psignal
! .It Sy Pstate Ta Sy Pstatus
! .It Sy Pstop Ta Sy Pstopstatus
! .It Sy Psync Ta Sy Psysentry
! .It Sy Psysexit Ta Sy Puname
! .It Sy Punsetflags Ta Sy Pupdate_maps
! .It Sy Pupdate_syms Ta Sy Pwait
! .It Sy Pwrite Ta Sy Pxecbkpt
! .It Sy Pxecwapt Ta Sy Pxlookup_by_addr
! .It Sy Pxlookup_by_addr_resolved Ta Sy Pxlookup_by_name
! .It Sy Pzonename Ta Sy Pzonepath
! .It Sy Pzoneroot Ta
.El
.Ss Thread interrogation and manipulation
The following routines obtain information about a thread and allow
manipulation of the thread itself.
.Bl -column -offset indent ".Sy Pmapping_iter_resolved" ".Sy Psymbol_iter_by_addr"
*** 1053,1062 ****
--- 1054,1064 ----
.Xr Pputareg 3PROC ,
.Xr Prd_agent 3PROC ,
.Xr Pread 3PROC ,
.Xr Pread_string 3PROC ,
.Xr Preset_maps 3PROC ,
+ .Xr Psecflags 3PROC ,
.Xr Psetbkpt 3PROC ,
.Xr Psetcred 3PROC ,
.Xr Psetfault 3PROC ,
.Xr Psetflags 3PROC ,
.Xr Psetpriv 3PROC ,