CVSROOT:        /cvs
Module name:    src
Changes by:     [email protected] 2019/06/01 16:42:21

Modified files:
        sys/sys        : proc.h syscall_mi.h 
        sys/uvm        : uvm_map.c uvm_map.h 
        sys/arch/alpha/alpha: trap.c 
        sys/arch/amd64/amd64: trap.c 
        sys/arch/arm/arm: fault.c 
        sys/arch/arm64/arm64: trap.c 
        sys/arch/hppa/hppa: trap.c 
        sys/arch/i386/i386: trap.c 
        sys/arch/mips64/mips64: trap.c 
        sys/arch/powerpc/powerpc: trap.c 
        sys/arch/sparc64/sparc64: trap.c 

Log message:
Refactor the MAP_STACK feature, and introduce another similar variation:
Lookup the address that a syscall instruction is executed from, and kill
the process if that page is writeable.  This brings an aspect of W^X
behaviour to W|X mappings (in JITs not yet adapted to W^X).  The goal is
to remove simple attack methods and force use of ret2libc or other more
complicated means.
ok kettenis stefan visa

Reply via email to