Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src Centralize documentation about exported sysctl variables in ...



details:   https://anonhg.NetBSD.org/src/rev/0b1ae5b53a3a
branches:  trunk
changeset: 747812:0b1ae5b53a3a
user:      elad <elad%NetBSD.org@localhost>
date:      Fri Oct 02 20:31:19 2009 +0000

description:
Centralize documentation about exported sysctl variables in the relevant
secmodel's man-page.

diffstat:

 sbin/mount/mount.8                    |  25 +++++-----------------
 share/man/man7/sysctl.7               |   9 +++----
 share/man/man9/secmodel_securelevel.9 |  12 +++++++++-
 share/man/man9/secmodel_suser.9       |  39 ++++++++++++++++++++++++++++++++++-
 4 files changed, 59 insertions(+), 26 deletions(-)

diffs (155 lines):

diff -r b368176e4c98 -r 0b1ae5b53a3a sbin/mount/mount.8
--- a/sbin/mount/mount.8        Fri Oct 02 20:15:07 2009 +0000
+++ b/sbin/mount/mount.8        Fri Oct 02 20:31:19 2009 +0000
@@ -1,4 +1,4 @@
-.\"    $NetBSD: mount.8,v 1.67 2009/02/23 08:14:53 wiz Exp $
+.\"    $NetBSD: mount.8,v 1.68 2009/10/02 20:31:19 elad Exp $
 .\"
 .\" Copyright (c) 1980, 1989, 1991, 1993
 .\"    The Regents of the University of California.  All rights reserved.
@@ -29,7 +29,7 @@
 .\"
 .\"     @(#)mount.8    8.8 (Berkeley) 6/16/94
 .\"
-.Dd February 22, 2009
+.Dd October 2, 2009
 .Dt MOUNT 8
 .Os
 .Sh NAME
@@ -133,23 +133,10 @@
 .Pp
 In
 .Nx ,
-a file system can only be mounted by an ordinary user who owns the
-point
-.Ar node
-and has access to the
-.Ar special
-device (at least read permissions).
-Also, the
-.Em vfs.generic.usermount
-.Xr sysctl 3
-must be set to 1 to permit file system mounting by ordinary users,
-see
-.Xr sysctl 8 .
-Finally, the flags
-.Cm nosuid
-and
-.Cm nodev
-must be given for non-superuser mounts.
+the file-system mounting policy is dictated by the running security models.
+The default security model may allow unprivileged mounting; see
+.Xr secmodel_suser 9
+for details. 
 .Pp
 The options are as follows:
 .Bl -tag -width indent
diff -r b368176e4c98 -r 0b1ae5b53a3a share/man/man7/sysctl.7
--- a/share/man/man7/sysctl.7   Fri Oct 02 20:15:07 2009 +0000
+++ b/share/man/man7/sysctl.7   Fri Oct 02 20:31:19 2009 +0000
@@ -1,4 +1,4 @@
-.\"    $NetBSD: sysctl.7,v 1.24 2009/09/11 19:43:26 wiz Exp $
+.\"    $NetBSD: sysctl.7,v 1.25 2009/10/02 20:31:19 elad Exp $
 .\"
 .\" Copyright (c) 1993
 .\"    The Regents of the University of California.  All rights reserved.
@@ -29,7 +29,7 @@
 .\"
 .\"    @(#)sysctl.3    8.4 (Berkeley) 5/9/95
 .\"
-.Dd September 11, 2009
+.Dd October 2, 2009
 .Dt SYSCTL 7
 .Os
 .Sh NAME
@@ -713,9 +713,8 @@
 Maximum socket buffer size.
 .\" XXX units?
 .It Li kern.securelevel ( KERN_SECURELVL )
-The system security level.
-This level may be raised by processes with appropriate privilege.
-It may only be lowered by process 1.
+See
+.Xr secmodel_securelevel 9 .
 .It Li kern.somaxkva ( KERN_SOMAXKVA )
 Maximum amount of kernel memory to be used for socket buffers.
 .\" XXX units?
diff -r b368176e4c98 -r 0b1ae5b53a3a share/man/man9/secmodel_securelevel.9
--- a/share/man/man9/secmodel_securelevel.9     Fri Oct 02 20:15:07 2009 +0000
+++ b/share/man/man9/secmodel_securelevel.9     Fri Oct 02 20:31:19 2009 +0000
@@ -1,4 +1,4 @@
-.\" $NetBSD: secmodel_securelevel.9,v 1.6 2009/07/25 16:20:11 mbalmer Exp $
+.\" $NetBSD: secmodel_securelevel.9,v 1.7 2009/10/02 20:31:19 elad Exp $
 .\"
 .\" Copyright (c) 2006 Elad Efrat <elad%NetBSD.org@localhost>
 .\" Copyright (c) 2000 Hugh Graham
@@ -180,6 +180,16 @@
 interpreter, through any mechanism) and the kernel itself are "programs
 that run while the security level is 0" and must be considered part of
 the TCB.
+.Pp
+The following
+.Xr sysctl 3
+variables are exported:
+.Bl -tag -width compact
+.It security.models.securelevel.securelevel
+The system security level.
+This level may be raised by processes with appropriate privilege.
+It may only be lowered by process 1 (init).
+.El
 .Sh SEE ALSO
 .Xr kauth 9 ,
 .Xr secmodel 9 ,
diff -r b368176e4c98 -r 0b1ae5b53a3a share/man/man9/secmodel_suser.9
--- a/share/man/man9/secmodel_suser.9   Fri Oct 02 20:15:07 2009 +0000
+++ b/share/man/man9/secmodel_suser.9   Fri Oct 02 20:31:19 2009 +0000
@@ -1,4 +1,4 @@
-.\" $NetBSD: secmodel_suser.9,v 1.2 2009/10/02 19:50:37 elad Exp $
+.\" $NetBSD: secmodel_suser.9,v 1.3 2009/10/02 20:31:19 elad Exp $
 .\"
 .\" Copyright (c) 2009 Elad Efrat <elad%NetBSD.org@localhost>
 .\" All rights reserved.
@@ -41,6 +41,43 @@
 .Em super-user
 is the host administrator, considered to have higher privileges than other
 users.
+.Pp
+The following
+.Xr sysctl 3
+variables are exported:
+.Bl -tag -width compact
+.It security.models.suser.curtain
+If non-zero, will filter returned objects according to the user-id
+requesting information about them, preventing from users any access to
+objects they don't own.
+.Pp
+At the moment, it affects
+.Xr ps 1 ,
+.Xr netstat 1
+(for
+.Dv PF_INET ,
+.Dv PF_INET6 ,
+and
+.Dv PF_UNIX
+PCBs), and
+.Xr w 1 .
+.It security.models.suser.usermount
+Allow non-superuser mounts.
+.Pp
+If non-zero, file-systems are allowed to be mounted by an ordinary user who
+owns the point
+.Ar node
+and has at least read access to the 
+.Ar special
+device 
+.Xr mount 8
+arguments.
+Finally, the flags
+.Cm nosuid
+and
+.Cm nodev
+must be given for non-superuser mounts.
+.El
 .Sh SEE ALSO
 .Xr kauth 9 ,
 .Xr secmodel 9 ,



Home | Main Index | Thread Index | Old Index