41
42 This flag may also be enabled by the presence of the
43 DT_SUNW_ASLR dynamic tag in the .dynamic section of the
44 executable file. If this tag has a value of 1, ASLR will be
45 enabled. If the flag has a value of 0 ASLR will be disabled.
46 If the tag is not present, the value of the ASLR flag will
47 be inherited as normal.
48
49
50 Forbid mappings at NULL (FORBIDNULLMAP)
51 Mappings with an address of 0 are forbidden, and return
52 EINVAL rather than being honored.
53
54
55 Make the userspace stack non-executable (NOEXECSTACK)
56 The stack will be mapped without executable permission, and
57 attempts to execute it will fault.
58
59 System default security-flags are configured via properties on the
60 svc:/system/process-security service, which contains a boolean property
61 per-flag in the default, lower and upper, property groups. For
62 example, to enable ASLR by default you would execute the following
63 commands:
64
65 # svccfg -s svc:/system/process-security setprop default/aslr = true
66
67
68 This can be done by any user with the solaris.smf.value.process-
69 security authorization.
70
71 Since security-flags are strictly inherited, this will not take effect
72 until the system or zone is next booted.
73
74
75 SEE ALSO
76 psecflags(1), svccfg(1M), brk(2), exec(2), mmap(2), mmapobj(2),
77 privileges(5), rbac(5)
78
79
80
81 June 6, 2016 SECURITY-FLAGS(5)
|
41
42 This flag may also be enabled by the presence of the
43 DT_SUNW_ASLR dynamic tag in the .dynamic section of the
44 executable file. If this tag has a value of 1, ASLR will be
45 enabled. If the flag has a value of 0 ASLR will be disabled.
46 If the tag is not present, the value of the ASLR flag will
47 be inherited as normal.
48
49
50 Forbid mappings at NULL (FORBIDNULLMAP)
51 Mappings with an address of 0 are forbidden, and return
52 EINVAL rather than being honored.
53
54
55 Make the userspace stack non-executable (NOEXECSTACK)
56 The stack will be mapped without executable permission, and
57 attempts to execute it will fault.
58
59 System default security-flags are configured via properties on the
60 svc:/system/process-security service, which contains a boolean property
61 per-flag in the default, lower and upper, property groups. The value
62 indicates the setting of the flag, flags with no value take their
63 defaults. For example, to enable ASLR by default you would execute the
64 following commands:
65
66 # svccfg -s svc:/system/process-security setprop default/aslr = true
67
68
69 To restore the setting to the defaults you would execute:
70
71 # svccfg -s svc:/system/process-security delpropvalue default/aslr true
72
73
74 This can be done by any user with the solaris.smf.value.process-
75 security authorization.
76
77 Since security-flags are strictly inherited, this will not take effect
78 until the system or zone is next booted.
79
80
81 SEE ALSO
82 psecflags(1), svccfg(1M), brk(2), exec(2), mmap(2), mmapobj(2),
83 privileges(5), rbac(5)
84
85
86
87 June 6, 2016 SECURITY-FLAGS(5)
|