Print this page
smf: switch to a tri-state for process-security properties true=on,false=off,nil=default

Split Close
Expand all
Collapse all
          --- old/usr/src/man/man5/security-flags.5.man.txt
          +++ new/usr/src/man/man5/security-flags.5.man.txt
↓ open down ↓ 50 lines elided ↑ open up ↑
  51   51                    Mappings with an address of 0 are forbidden, and return
  52   52                    EINVAL rather than being honored.
  53   53  
  54   54  
  55   55         Make the userspace stack non-executable (NOEXECSTACK)
  56   56                    The stack will be mapped without executable permission, and
  57   57                    attempts to execute it will fault.
  58   58  
  59   59         System default security-flags are configured via properties on the
  60   60         svc:/system/process-security service, which contains a boolean property
  61      -       per-flag in the default, lower and upper, property groups.  For
  62      -       example, to enable ASLR by default you would execute the following
  63      -       commands:
       61 +       per-flag in the default, lower and upper, property groups.  The value
       62 +       indicates the setting of the flag, flags with no value take their
       63 +       defaults.  For example, to enable ASLR by default you would execute the
       64 +       following commands:
  64   65  
  65   66           # svccfg -s svc:/system/process-security setprop default/aslr = true
  66   67  
  67   68  
       69 +       To restore the setting to the defaults you would execute:
       70 +
       71 +         # svccfg -s svc:/system/process-security delpropvalue default/aslr true
       72 +
       73 +
  68   74         This can be done by any user with the solaris.smf.value.process-
  69   75         security authorization.
  70   76  
  71   77         Since security-flags are strictly inherited, this will not take effect
  72   78         until the system or zone is next booted.
  73   79  
  74   80  
  75   81  SEE ALSO
  76   82         psecflags(1), svccfg(1M), brk(2), exec(2), mmap(2), mmapobj(2),
  77   83         privileges(5), rbac(5)
  78   84  
  79   85  
  80   86  
  81   87                                   June 6, 2016                SECURITY-FLAGS(5)
    
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX