mitigations.7: minor cleanup (linter errors)

Reviewed by:	emaste
MFC after:	3 days
Pull Request:	https://github.com/freebsd/freebsd-src/pull/1428
This commit is contained in:
Alexander Ziaee 2024-09-21 14:03:57 -04:00 committed by Mitchell Horne
parent 22fb46af90
commit c3294033e0

View File

@ -154,7 +154,7 @@ proccontrol
.Ss Position Independent Executable (PIE) .Ss Position Independent Executable (PIE)
PIE binaries are executable files that do not have a fixed load address. PIE binaries are executable files that do not have a fixed load address.
They can be loaded at an arbitrary memory address by the They can be loaded at an arbitrary memory address by the
.Xr rtld .Xr rtld 1
run-time linker. run-time linker.
With ASLR they are loaded at a random address on each execution. With ASLR they are loaded at a random address on each execution.
.\" .\"
@ -185,17 +185,19 @@ Allow 64-bit processes to map pages simultaneously writable and executable.
.\" .\"
.Ss PROT_MAX .Ss PROT_MAX
.Dv PROT_MAX .Dv PROT_MAX
is a FreeBSD-specific extension to is a
.Fx Ns
-specific extension to
.Xr mmap 2 . .Xr mmap 2 .
.Dv PROT_MAX .Dv PROT_MAX
provides the ability to set the maximum protection of a region allocated by provides the ability to set the maximum protection of a region allocated by
.Xr mmap .Xr mmap 2
and later altered by and later altered by
.Xr mprotect . .Xr mprotect 2 .
For example, memory allocated originally with an mmap prot argument of For example, memory allocated originally with an mmap prot argument of
PROT_MAX(PROT_READ | PROT_WRITE) | PROT_READ PROT_MAX(PROT_READ | PROT_WRITE) | PROT_READ
may be made writable by a future may be made writable by a future
.Xr mprotect .Xr mprotect 2
call, but may not be made executable. call, but may not be made executable.
.\" .\"
.Ss Relocation Read-Only (RELRO) .Ss Relocation Read-Only (RELRO)