| Property | Value |
|---|---|
| OID | 7ffffce3.7ffffcbf |
| Description | BSD security policy |
| Label | |
| Type | node |
| Format | N |
| Flags |
|
| Child | Description |
|---|---|
| security.bsd.stack_guard_page | Specifies the number of guard pages for a stack that grows |
| security.bsd.unprivileged_get_quota | Unprivileged processes may retrieve quotas for other uids and gids |
| security.bsd.allow_read_dir | Enable read(2) of directory by root for filesystems that support it |
| security.bsd.hardlink_check_gid | Unprivileged processes cannot create hard links to files owned by other groups |
| security.bsd.hardlink_check_uid | Unprivileged processes cannot create hard links to files owned by other users |
| security.bsd.unprivileged_idprio | Allow non-root users to set an idle priority |
| security.bsd.unprivileged_proc_debug | Unprivileged processes may use process debugging facilities |
| security.bsd.conservative_signals | Unprivileged processes prevented from sending certain signals to processes whose credentials have changed |
| security.bsd.see_jail_proc | Unprivileged processes may see subjects/objects with different jail ids |
| security.bsd.see_other_gids | Unprivileged processes may see subjects/objects with different real gid |
| security.bsd.see_other_uids | Unprivileged processes may see subjects/objects with different real uid |
| security.bsd.unprivileged_read_msgbuf | Unprivileged processes may read the kernel message buffer |
| security.bsd.unprivileged_mlock | Allow non-root users to call mlock(2) |
| security.bsd.suser_enabled | Processes with uid 0 have privilege |
| security.bsd.map_at_zero | Permit processes to map an object at virtual address 0. |