diff options
author | Liav A <liavalb@gmail.com> | 2022-11-11 14:25:42 +0200 |
---|---|---|
committer | Andrew Kaster <andrewdkaster@gmail.com> | 2022-12-03 05:47:58 -0700 |
commit | 756d2a7f63b8a5c12324f956f07bbecbdc2ad3d4 (patch) | |
tree | d6f73758bbd5427aa1db5fb44605ffebcc45f779 /Base/usr | |
parent | 95d8aa298202121bf978c2a927bf854b7e69abe9 (diff) | |
download | serenity-756d2a7f63b8a5c12324f956f07bbecbdc2ad3d4.zip |
Base: Add a description about Jails to the Mitigations(7) document
We add a new document entry to mention jailed processes' restrictions,
so it is clear which restrictions apply when using Jails.
Diffstat (limited to 'Base/usr')
-rw-r--r-- | Base/usr/share/man/man7/Mitigations.md | 27 |
1 files changed, 27 insertions, 0 deletions
diff --git a/Base/usr/share/man/man7/Mitigations.md b/Base/usr/share/man/man7/Mitigations.md index 1303a4f3fb..19200d764b 100644 --- a/Base/usr/share/man/man7/Mitigations.md +++ b/Base/usr/share/man/man7/Mitigations.md @@ -90,6 +90,33 @@ Date: Mon Jan 20 22:12:04 2020 +0100 Kernel: Add a basic implementation of unveil() ``` +### Jails + +`jails` are mitigation originating from FreeBSD. +It allows a program to be placed inside a lightweight OS-level virtualization environment. + +Current restrictions on jailed processes: +- Process ID view isolation, being limited (both in `/proc` and `/sys/kernel/processes`) to only processes that share the same jail. + +Special restrictions on filesystem also apply: +- Write access is forbidden to the `/sys/kernel/power_state` node. +- Read accesses is forbidden by default to all nodes in `/sys/kernel` directory, except for: + `df`, `interrupts`, `keymap`, `memstat`, `processes`, `stats` and `uptime`. +- Write access is forbidden to kernel variables (which are located in `/sys/kernel/variables`). + +It was first added in the following [commit](https://github.com/SerenityOS/serenity/commit/5e062414c11df31ed595c363990005eef00fa263), +for kernel support, and the following commits added basic userspace utilities: + +``` +commit 5e062414c11df31ed595c363990005eef00fa263 +Author: Liav A <liavalb@gmail.com> +Date: Wed Nov 2 22:26:02 2022 +0200 + +Kernel: Add support for jails + +... +``` + ### Readonly atexit [Readonly atexit](https://isopenbsdsecu.re/mitigations/atexit_hardening/) is a mitigation originating from OpenBSD. |