summaryrefslogtreecommitdiff
path: root/Base/usr
diff options
context:
space:
mode:
authorLiav A <liavalb@gmail.com>2022-11-11 14:25:42 +0200
committerAndrew Kaster <andrewdkaster@gmail.com>2022-12-03 05:47:58 -0700
commit756d2a7f63b8a5c12324f956f07bbecbdc2ad3d4 (patch)
treed6f73758bbd5427aa1db5fb44605ffebcc45f779 /Base/usr
parent95d8aa298202121bf978c2a927bf854b7e69abe9 (diff)
downloadserenity-756d2a7f63b8a5c12324f956f07bbecbdc2ad3d4.zip
Base: Add a description about Jails to the Mitigations(7) document
We add a new document entry to mention jailed processes' restrictions, so it is clear which restrictions apply when using Jails.
Diffstat (limited to 'Base/usr')
-rw-r--r--Base/usr/share/man/man7/Mitigations.md27
1 files changed, 27 insertions, 0 deletions
diff --git a/Base/usr/share/man/man7/Mitigations.md b/Base/usr/share/man/man7/Mitigations.md
index 1303a4f3fb..19200d764b 100644
--- a/Base/usr/share/man/man7/Mitigations.md
+++ b/Base/usr/share/man/man7/Mitigations.md
@@ -90,6 +90,33 @@ Date: Mon Jan 20 22:12:04 2020 +0100
Kernel: Add a basic implementation of unveil()
```
+### Jails
+
+`jails` are mitigation originating from FreeBSD.
+It allows a program to be placed inside a lightweight OS-level virtualization environment.
+
+Current restrictions on jailed processes:
+- Process ID view isolation, being limited (both in `/proc` and `/sys/kernel/processes`) to only processes that share the same jail.
+
+Special restrictions on filesystem also apply:
+- Write access is forbidden to the `/sys/kernel/power_state` node.
+- Read accesses is forbidden by default to all nodes in `/sys/kernel` directory, except for:
+ `df`, `interrupts`, `keymap`, `memstat`, `processes`, `stats` and `uptime`.
+- Write access is forbidden to kernel variables (which are located in `/sys/kernel/variables`).
+
+It was first added in the following [commit](https://github.com/SerenityOS/serenity/commit/5e062414c11df31ed595c363990005eef00fa263),
+for kernel support, and the following commits added basic userspace utilities:
+
+```
+commit 5e062414c11df31ed595c363990005eef00fa263
+Author: Liav A <liavalb@gmail.com>
+Date: Wed Nov 2 22:26:02 2022 +0200
+
+Kernel: Add support for jails
+
+...
+```
+
### Readonly atexit
[Readonly atexit](https://isopenbsdsecu.re/mitigations/atexit_hardening/) is a mitigation originating from OpenBSD.