Print this page
7029 want per-process exploit mitigation features (secflags)
7030 want basic address space layout randomization (aslr)
7031 noexec_user_stack should be a secflag
7032 want a means to forbid mappings around NULL.
@@ -38,10 +38,11 @@
#include <sys/cred.h>
#include <sys/netstack.h>
#include <sys/uadmin.h>
#include <sys/ksynch.h>
#include <sys/socket_impl.h>
+#include <sys/secflags.h>
#include <netinet/in.h>
#ifdef __cplusplus
extern "C" {
#endif
@@ -102,10 +103,11 @@
#define ZONE_ATTR_FLAGS 14
#define ZONE_ATTR_HOSTID 15
#define ZONE_ATTR_FS_ALLOWED 16
#define ZONE_ATTR_NETWORK 17
#define ZONE_ATTR_INITNORESTART 20
+#define ZONE_ATTR_SECFLAGS 21
/* Start of the brand-specific attribute namespace */
#define ZONE_ATTR_BRAND_ATTRS 32768
#define ZONE_FS_ALLOWED_MAX 1024
@@ -576,10 +578,12 @@
uint64_t zone_anonpgin; /* anon pages paged in */
uint64_t zone_execpgin; /* exec pages paged in */
uint64_t zone_fspgin; /* fs pages paged in */
uint64_t zone_anon_alloc_fail; /* cnt of anon alloc fails */
+ psecflags_t zone_secflags; /* default zone security-flags */
+
/*
* Misc. kstats and counters for zone cpu-usage aggregation.
* The zone_Xtime values are the sum of the micro-state accounting
* values for all threads that are running or have run in the zone.
* This is tracked in msacct.c as threads change state.