Print this page
7029 want per-process exploit mitigation features (secflags)
7030 want basic address space layout randomization (aslr)
7031 noexec_user_stack should be a secflag
7032 want a means to forbid mappings around NULL.
*** 331,340 ****
--- 331,346 ----
agent LWP and contains the psinfo_t of the process that
created the agent LWP. See the proc(4) description of
the spymaster entry for more details.
+ prsecflags_t
+ n_type: NT_SECFLAGS. This entry contains the process
+ security-flags, see security-flags(5), proc(4), and
+ psecflags(1M) for more information.
+
+
Depending on the coreadm(1M) settings, the section header of an ELF
core file can contain entries for CTF, symbol table, and string table
sections. The sh_addr fields are set to the base address of the first
mapping of the load object that they came from to. This can be used to
*** 346,358 ****
SEE ALSO
elfdump(1), gcore(1), mdb(1), proc(1), ps(1), coreadm(1M),
getrlimit(2), setrlimit(2), setuid(2), sysinfo(2), uname(2),
getzonenamebyid(3C), getzoneid(3C), elf(3ELF), signal.h(3HEAD),
! a.out(4), proc(4), zones(5)
ANSI C Programmer's Guide
! March 31, 2013 CORE(4)
--- 352,364 ----
SEE ALSO
elfdump(1), gcore(1), mdb(1), proc(1), ps(1), coreadm(1M),
getrlimit(2), setrlimit(2), setuid(2), sysinfo(2), uname(2),
getzonenamebyid(3C), getzoneid(3C), elf(3ELF), signal.h(3HEAD),
! a.out(4), proc(4), zones(5), security-flags(5)
ANSI C Programmer's Guide
! July 23, 2015 CORE(4)