Print this page
Code review comments from jeffpc
7029 want per-process exploit mitigation features (secflags)
7030 want basic address space layout randomization (aslr)
7031 noexec_user_stack should be a secflag
7032 want a means to forbid mappings around NULL.

Split Close
Expand all
Collapse all
          --- old/usr/src/man/man5/privileges.5
          +++ new/usr/src/man/man5/privileges.5
   1    1  '\" te
   2    2  .\" Copyright (c) 2009, Sun Microsystems, Inc. All Rights Reserved.
   3    3  .\" Copyright 2015, Joyent, Inc. All Rights Reserved.
   4    4  .\" The contents of this file are subject to the terms of the Common Development and Distribution License (the "License"). You may not use this file except in compliance with the License. You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE or http://www.opensolaris.org/os/licensing.
   5    5  .\"  See the License for the specific language governing permissions and limitations under the License. When distributing Covered Code, include this CDDL HEADER in each file and include the License file at usr/src/OPENSOLARIS.LICENSE. If applicable, add the following below this CDDL HEADER, with
   6    6  .\" the fields enclosed by brackets "[]" replaced with your own identifying information: Portions Copyright [yyyy] [name of copyright owner]
   7      -.TH PRIVILEGES 5 "Oct 30, 2015"
        7 +.TH PRIVILEGES 5 "Jun 6, 2016"
   8    8  .SH NAME
   9    9  privileges \- process privilege model
  10   10  .SH DESCRIPTION
  11   11  .LP
  12   12  Solaris software implements a set of privileges that provide fine-grained
  13   13  control over the actions of processes. The possession of a certain privilege
  14   14  allows a process to perform a specific set of restricted operations.
  15   15  .sp
  16   16  .LP
  17   17  The change to a primarily privilege-based security model in the Solaris
↓ open down ↓ 547 lines elided ↑ open up ↑
 565  565  .sp .6
 566  566  .RS 4n
 567  567  Allows all that PRIV_PROC_PRIOUP allows.
 568  568  Allow a process to change its scheduling class to any scheduling class,
 569  569  including the RT class.
 570  570  .RE
 571  571  
 572  572  .sp
 573  573  .ne 2
 574  574  .na
      575 +\fB\PRIV_PROC_SECFLAGS\fR
      576 +.ad
      577 +.sp .6
      578 +.RS 4n
      579 +Allow a process to manipulate the secflags of processes (subject to,
      580 +additionally, the ability to signal that process).
      581 +.RE
      582 +
      583 +.sp
      584 +.ne 2
      585 +.na
 575  586  \fB\fBPRIV_PROC_SESSION\fR\fR
 576  587  .ad
 577  588  .sp .6
 578  589  .RS 4n
 579  590  Allow a process to send signals or trace processes outside its session.
 580  591  .RE
 581  592  
 582  593  .sp
 583  594  .ne 2
 584  595  .na
↓ open down ↓ 767 lines elided ↑ open up ↑
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX