The stack can also be marked immutable, because we expect no sane program
authorderaadt <deraadt@openbsd.org>
Sat, 8 Oct 2022 17:03:09 +0000 (17:03 +0000)
committerderaadt <deraadt@openbsd.org>
Sat, 8 Oct 2022 17:03:09 +0000 (17:03 +0000)
commit14839093e1f153b210299e0a6a1ef33bc814e33e
tree37ac0ede52d68d16a872234718db0f56dda9014e
parent8db818c7f40fac08bddec07697f8f4afe76dcbaa
The stack can also be marked immutable, because we expect no sane program
to try to change the permissions of it.  We won't know who's trying that
until we enable it and see what breaks.
A tricky piece relating to setrlimit stack size changing was previously commited.
ok kettenis
sys/kern/kern_exec.c