Print this page
7029 want per-process exploit mitigation features (secflags)
7030 want basic address space layout randomization (aslr)
7031 noexec_user_stack should be a secflag
7032 want a means to forbid mappings around NULL.
Split |
Close |
Expand all |
Collapse all |
--- old/usr/src/lib/brand/labeled/zone/config.xml
+++ new/usr/src/lib/brand/labeled/zone/config.xml
1 1 <?xml version="1.0"?>
2 2
3 3 <!--
4 4 CDDL HEADER START
5 5
6 6 The contents of this file are subject to the terms of the
7 7 Common Development and Distribution License (the "License").
8 8 You may not use this file except in compliance with the License.
9 9
10 10 You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
11 11 or http://www.opensolaris.org/os/licensing.
12 12 See the License for the specific language governing permissions
13 13 and limitations under the License.
14 14
15 15 When distributing Covered Code, include this CDDL HEADER in each
16 16 file and include the License file at usr/src/OPENSOLARIS.LICENSE.
17 17 If applicable, add the following below this CDDL HEADER, with the
18 18 fields enclosed by brackets "[]" replaced with your own identifying
19 19 information: Portions Copyright [yyyy] [name of copyright owner]
20 20
21 21 CDDL HEADER END
22 22
23 23 Copyright (c) 2006, 2010, Oracle and/or its affiliates. All rights reserved.
24 24
25 25 DO NOT EDIT THIS FILE.
26 26 Copyright 2014 Nexenta Systems, Inc. All rights reserved.
27 27 -->
28 28
29 29 <!DOCTYPE brand PUBLIC "-//Sun Microsystems Inc//DTD Brands//EN"
30 30 "file:///usr/share/lib/xml/dtd/brand.dtd.1">
31 31
32 32 <brand name="labeled">
33 33 <modname></modname>
34 34
35 35 <initname>/sbin/init</initname>
36 36 <login_cmd>/usr/bin/login -z %Z %u</login_cmd>
37 37 <forcedlogin_cmd>/usr/bin/login -z %Z -f %u</forcedlogin_cmd>
38 38
39 39 <user_cmd>/usr/bin/getent passwd %u</user_cmd>
40 40
41 41 <!-- We may not be able to do the create in pkg(1) proper. -->
42 42 <install>/usr/lib/brand/ipkg/pkgcreatezone -z %z -R %R</install>
43 43 <installopts>a:c:d:e:hk:P:p:suv</installopts>
44 44 <boot></boot>
45 45 <sysboot>/usr/lib/brand/ipkg/prestate %z %R 2 0</sysboot>
46 46 <halt></halt>
47 47 <shutdown>/usr/sbin/shutdown -y -g0 -i5</shutdown>
48 48 <verify_cfg></verify_cfg>
49 49 <verify_adm></verify_adm>
50 50 <postclone></postclone>
51 51 <postinstall></postinstall>
52 52 <attach>/usr/lib/brand/ipkg/attach %z %R</attach>
53 53 <detach>/usr/lib/brand/ipkg/detach -z %z -R %R</detach>
54 54 <clone>/usr/lib/brand/ipkg/clone -z %z -R %R</clone>
55 55 <uninstall>/usr/lib/brand/ipkg/uninstall %z %R</uninstall>
56 56 <prestatechange>/usr/lib/brand/ipkg/prestate %z %R</prestatechange>
57 57 <poststatechange>/usr/lib/brand/ipkg/poststate %z %R</poststatechange>
58 58 <query>/usr/lib/brand/shared/query %z %R</query>
59 59
60 60 <privilege set="default" name="contract_event" />
61 61 <privilege set="default" name="contract_identity" />
62 62 <privilege set="default" name="contract_observer" />
63 63 <privilege set="default" name="file_chown" />
64 64 <privilege set="default" name="file_chown_self" />
65 65 <privilege set="default" name="file_dac_execute" />
66 66 <privilege set="default" name="file_dac_read" />
67 67 <privilege set="default" name="file_dac_search" />
68 68 <privilege set="default" name="file_dac_write" />
69 69 <privilege set="default" name="file_owner" />
70 70 <privilege set="default" name="file_setid" />
71 71 <privilege set="default" name="ipc_dac_read" />
72 72 <privilege set="default" name="ipc_dac_write" />
73 73 <privilege set="default" name="ipc_owner" />
74 74 <privilege set="default" name="net_bindmlp" />
↓ open down ↓ |
74 lines elided |
↑ open up ↑ |
75 75 <privilege set="default" name="net_icmpaccess" />
76 76 <privilege set="default" name="net_mac_aware" />
77 77 <privilege set="default" name="net_observability" />
78 78 <privilege set="default" name="net_privaddr" />
79 79 <privilege set="default" name="net_rawaccess" ip-type="exclusive" />
80 80 <privilege set="default" name="proc_chroot" />
81 81 <privilege set="default" name="sys_audit" />
82 82 <privilege set="default" name="proc_audit" />
83 83 <privilege set="default" name="proc_lock_memory" />
84 84 <privilege set="default" name="proc_owner" />
85 + <privilege set="default" name="proc_secflags" />
85 86 <privilege set="default" name="proc_setid" />
86 87 <privilege set="default" name="proc_taskid" />
87 88 <privilege set="default" name="sys_acct" />
88 89 <privilege set="default" name="sys_admin" />
89 90 <privilege set="default" name="sys_ip_config" ip-type="exclusive" />
90 91 <privilege set="default" name="sys_iptun_config" ip-type="exclusive" />
91 92 <privilege set="default" name="sys_mount" />
92 93 <privilege set="default" name="sys_nfs" />
93 94 <privilege set="default" name="sys_resource" />
94 95 <privilege set="default" name="sys_ppp_config" ip-type="exclusive" />
95 96
96 97 <privilege set="prohibited" name="dtrace_kernel" />
97 98 <privilege set="prohibited" name="proc_zone" />
98 99 <privilege set="prohibited" name="sys_config" />
99 100 <privilege set="prohibited" name="sys_devices" />
100 101 <privilege set="prohibited" name="sys_ip_config" ip-type="shared" />
101 102 <privilege set="prohibited" name="sys_linkdir" />
102 103 <privilege set="prohibited" name="sys_net_config" />
103 104 <privilege set="prohibited" name="sys_res_config" />
104 105 <privilege set="prohibited" name="sys_suser_compat" />
105 106 <privilege set="prohibited" name="xvm_control" />
106 107 <privilege set="prohibited" name="virt_manage" />
107 108 <privilege set="prohibited" name="sys_ppp_config" ip-type="shared" />
108 109
109 110 <privilege set="required" name="proc_exec" />
110 111 <privilege set="required" name="proc_fork" />
111 112 <privilege set="required" name="sys_ip_config" ip-type="exclusive" />
112 113 <privilege set="required" name="sys_mount" />
113 114 </brand>
↓ open down ↓ |
19 lines elided |
↑ open up ↑ |
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX