Commit Graph

1511 Commits

Author SHA1 Message Date
yamt
e2f125eb9e process -> LWP. 2007-02-17 17:26:31 +00:00
yamt
69fa8e9367 correct a header.
XXX maybe it's better to introduce sys/cpu.h.
2007-02-17 17:25:34 +00:00
yamt
d8e79b86c0 locking note. 2007-02-17 17:24:01 +00:00
yamt
38384421f9 need_resched -> cpu_need_resched. 2007-02-17 17:18:31 +00:00
yamt
fbee1fbbf7 some more notes. 2007-02-17 17:14:21 +00:00
yamt
29f0b10c51 add manpages for yamt-idlelwp branch. not enabled in the makefile yet. 2007-02-17 16:23:08 +00:00
yamt
277af7c2c3 remove cpu_idle.9. it has not been available on trunk. 2007-02-17 14:32:23 +00:00
wiz
54c03147a4 Whitespace nit. 2007-02-17 08:50:04 +00:00
wiz
06dd0b9f76 Sort SEE ALSO (by section number first, then by name). 2007-02-17 08:49:39 +00:00
wiz
15bc0b94bc Fix Dd argument. 2007-02-17 08:44:08 +00:00
wiz
4d46e7cc67 Use Em for notes. Whitespace nits. 2007-02-17 08:43:19 +00:00
wiz
30fd28f965 Use Em for notes. Whitespace nits. Typo fix. 2007-02-17 08:43:10 +00:00
rmind
ede64e5874 - Add link to memoryallocators(9) in kmem_*(9), vmem(9), uvm(9), malloc(9),
pool(9) and pool_cache(9) manuals.
- Sort uvm(9) "SEE ALSO" section.
2007-02-16 23:13:05 +00:00
dillo
ff885dda73 Fix typo, add comma. 2007-02-16 22:26:36 +00:00
hannken
198beb0314 Make fstrans(9) the default helper for file system suspension.
Replaces the now obsolete vn_start_write()/vn_finished_write().
2007-02-16 17:23:53 +00:00
tron
4a83339899 Remove entries for rw_owned(9) again. The set lists were incorrect,
not this "Makefile".
2007-02-15 17:04:04 +00:00
tron
3e0f4f02f6 Create symbolic links for rw_owned(9). 2007-02-15 16:44:41 +00:00
skrll
8694ada1fe Sort some entries. 2007-02-15 07:30:07 +00:00
ad
d399d56922 Fix up MLINKS for previous. From nick@. 2007-02-11 18:49:18 +00:00
ad
6fa495aa59 Note that device drivers should not (in general) use these interfaces. 2007-02-11 16:36:06 +00:00
ad
6f86141195 Add mb/rwlock/condvar/mutex section 9 manual pages. 2007-02-11 16:16:09 +00:00
ad
b52b3eb8ff Mark these interfaces obsolete. 2007-02-11 16:05:08 +00:00
dillo
d096538b4a Fix typo. 2007-02-08 22:27:20 +00:00
dillo
8f94021d97 Mark up function arguments with .Fa, not .Fn; also, fix typo in
function argument.
2007-02-08 08:04:00 +00:00
elad
119d4b5acd PR/35253: YAMAMOTO Takashi: fileassoc hash size problem
fileassoc_table_add() was removed from the KPI and made internal. From now
fileassoc(9) will manage the optimal table size internally.

Input from and okay yamt@.
2007-02-06 01:09:48 +00:00
ad
20fd6754cf Sync with latest changes. 2007-02-05 15:04:21 +00:00
ad
26d6ccf325 Document cv_has_waiters(). 2007-02-03 16:49:11 +00:00
ad
00b8f6d201 - Require that cv_signal/cv_broadcast be called with the interlock held.
- Provide 'async' versions that don't need the interlock.
2007-02-03 16:39:53 +00:00
wiz
711856f6bb Fix Dd argument. 2007-02-02 07:37:06 +00:00
wiz
a88d4440e3 Sort SEE ALSO. Fix typo. 2007-02-02 07:36:09 +00:00
wiz
401fd96995 Sort options. Fix a few typos. 2007-02-02 07:35:28 +00:00
ad
c1a5096807 Add manpage for memory barrier ops. Not enabled in the Makefile yet. 2007-02-02 03:40:07 +00:00
elad
409147ef11 Forgot to add notes about secmodel_register() and secmodel_register() in
previous commit -- added now.
2007-01-31 11:18:23 +00:00
elad
ac22ef0996 Update instructions on writing a new security model to include some notes
about LKMs and private data in credentials.
2007-01-31 11:16:46 +00:00
elad
9d00fe4640 Fix mdoc (Lt -> Gt). 2007-01-31 10:39:40 +00:00
elad
c439bcfe43 Add a new scope, the credentials scope, which is internal to the kauth(9)
implementation and meant to be used by security models to hook credential
related operations (init, fork, copy, free -- hooked in kauth_cred_alloc(),
kauth_proc_fork(), kauth_cred_clone(), and kauth_cred_free(), respectively)
and document it.

Add specificdata to credentials, and routines to register/deregister new
"keys", as well as set/get routines. This allows security models to add
their own private data to a kauth_cred_t.

The above two, combined, allow security models to control inheritance of
their own private data in credentials which is a requirement for doing
stuff like, I dunno, capabilities?
2007-01-31 10:08:23 +00:00
hannken
4d607243ba Change fstrans enum types to upper case.
No functional change.

From Antti Kantee <pooka@netbsd.org>
2007-01-29 15:42:50 +00:00
elad
c2e4f788f9 Talk about special cases for kauth_authorize_action(). 2007-01-28 00:21:04 +00:00
elad
94d493dbe2 Remove extra '.El', left in previous commit. 2007-01-27 23:14:02 +00:00
wiz
c0ed8c1e97 Make HTML-safe. 2007-01-23 20:31:33 +00:00
wiz
0f3c9bb729 Sort ERRORS. 2007-01-23 20:31:20 +00:00
hannken
facd1f65cb Add and update documentation for fstrans(9) file system suspension helper.
wiz?
2007-01-21 15:42:36 +00:00
elad
a78693aa19 Kill KAUTH_PROCESS_RESOURCE and just replace it with two actions for
nice and rlimit.
2007-01-20 16:47:38 +00:00
elad
c3ca2b03a6 Add man-page for pathname(9) routines, but don't link to build yet. 2007-01-16 13:21:14 +00:00
elad
6df6f0ea65 Introduce kauth_proc_fork() to control credential inheritance. 2007-01-15 17:45:32 +00:00
elad
8ed50e44ae veriexec_file_delete() and veriexec_table_delete() now take 'struct lwp *'
too.
2007-01-11 16:24:47 +00:00
elad
d2e4f7167b Remove advertising clause from all of my stuff. 2007-01-09 12:49:36 +00:00
wiz
751fa51e41 Sort SEE ALSO. 2007-01-08 07:24:35 +00:00
elad
190f747fee Add a memoryallocators(9) man-page to give a short summary of memory
allocators available in the kernel.

Tons of input from YAMAMOTO Takashi, thanks!
2007-01-07 15:37:51 +00:00
elad
a13160f423 Make mount(2) and unmount(2) use kauth(9) for security policy.
Okay yamt@.
2007-01-02 10:47:28 +00:00
elad
c6e8423fec Make kauth_deregister_scope() and kauth_unlisten_scope() free the
passed kauth_scope_t and kauth_listener_t objects, respectively.

Okay yamt@.
2007-01-01 23:33:03 +00:00
elad
867767da66 Add veriexe_openchk(). 2006-12-30 15:32:19 +00:00
elad
504c71d9fe Make machdep scope architecture-agnostic by removing all arch-specific
requests and centralizing them all. The result is that some of these
are not used on some architectures, but the documentation was updated
to reflect that.
2006-12-26 10:43:43 +00:00
elad
ff39342b33 veriexec_lookup() should not return an internal data-structure, but rather
just a boolean value.
2006-12-26 07:50:40 +00:00
wiz
a1b013e655 Drop trailing dot in Nd. 2006-12-23 10:01:32 +00:00
wiz
0cbf97b519 Use HTML escapes. 2006-12-23 09:45:34 +00:00
wiz
103c72a1ca Bump date for previous. 2006-12-23 09:36:56 +00:00
wiz
6dfb14d789 New sentence, new line. Fix typo. 2006-12-23 09:21:10 +00:00
wiz
f92f3068da Use HTML escapes. 2006-12-23 09:05:20 +00:00
wiz
987a2558a6 Use Dv for defined values. 2006-12-23 09:02:45 +00:00
yamt
e9e681eded remove the fileassoc "tabledata" functionality. 2006-12-23 08:36:14 +00:00
wiz
66bd97f47f Use Dv for defined values. 2006-12-23 07:43:41 +00:00
yamt
dcedbd0734 remove a BUGS section because it's solved by yamt-splraiseipl. 2006-12-23 07:30:26 +00:00
wiz
7713de669b Fix sections in Xrefs. 2006-12-23 07:17:50 +00:00
wiz
43a0a70785 Use more markup. Use .Rs/.Re for book citation. 2006-12-23 06:51:41 +00:00
wiz
d15f199eb9 Use more markup. Use .Rs/.Re for book citation. Add missing comma. 2006-12-23 06:39:35 +00:00
wiz
f5ec841753 Fix typo. 2006-12-23 06:36:33 +00:00
wiz
fa9034328d Drop trailing whitespace. 2006-12-23 06:36:19 +00:00
elad
3d11477c94 Add requests indicating access to unmanaged memory for arm, pc532, powerpc,
sh3, sh5, and vax, and use them instead of KAUTH_GENERIC_ISSUSER.

Update documentation and example secmodel code.
2006-12-22 11:13:21 +00:00
yamt
71683748ca fix a typo. 2006-12-21 16:09:22 +00:00
yamt
5d51c3ca27 document splraiseipl and makeiplcookie. 2006-12-21 16:01:13 +00:00
elad
2fa3937ffc Markup fix - forgot 'Fn'. 2006-12-20 12:29:09 +00:00
elad
f1a69ab3ea Some changes to get rid of another KAUTH_GENERIC_ISSUSER usage:
- Make procfs_control() in procfs_ctl.c static,
  - Add an argument to the above, 'pfs', for the pfsnode,
  - Add another request type to KAUTH_PROCESS_CANPROCFS named
    KAUTH_REQ_PROCESS_CANPROCFS_CTL (and update documentation),
  - Use the above combination in a call to kauth_authorize_process().
2006-12-19 09:58:34 +00:00
simonb
58e3217148 Explicitly mention that pmap_extract() should deal with KSEG-style
kernel addresses.
2006-12-18 00:41:21 +00:00
elad
238ad51d2d - moves 'nice' access semantics to secmodel code,
- makes sysctl_proc_find() just lookup the process,
- use KAUTH_PROCESS_CANSEE requests to determine if the caller is
  allowed to view the target process' corename, stop flags, and
  rlimits,
- use explicit kauth(9) calls with KAUTH_PROCESS_CORENAME,
  KAUTH_REQ_PROCESS_RESOURCE_NICE, KAUTH_REQ_PROCESS_RESOURCE_RLIMIT,
  and KAUTH_PROCESS_STOPFLAG when modifying the aforementioned.
- sync man-page and example skeleton secmodel with reality.

okay yamt@

this is a pullup candidate.
2006-12-14 11:45:08 +00:00
yamt
687483b208 update an example. 2006-12-11 15:33:01 +00:00
yamt
995d487942 FILEASSOC_NHOOKS has gone. 2006-12-11 15:30:23 +00:00
yamt
9858d82855 it's fileassoc, not verifiedexec. 2006-12-11 15:27:46 +00:00
yamt
c534201d82 sync with the implementation. 2006-12-11 15:27:09 +00:00
pooka
9b0cc2c27b fix description to match the code 2006-12-10 23:03:03 +00:00
chs
c398ae9734 a smorgasbord of improvements to vnode locking and path lookup:
- LOCKPARENT is no longer relevant for lookup(), relookup() or VOP_LOOKUP().
   these now always return the parent vnode locked.  namei() works as before.
   lookup() and various other paths no longer acquire vnode locks in the
   wrong order via vrele().  fixes PR 32535.
   as a nice side effect, path lookup is also up to 25% faster.
 - the above allows us to get rid of PDIRUNLOCK.
 - also get rid of WANTPARENT (just use LOCKPARENT and unlock it).
 - remove an assumption in layer_node_find() that all file systems implement
   a recursive VOP_LOCK() (unionfs doesn't).
 - require that all file systems supply vfs_vptofh and vfs_fhtovp routines.
   fill in eopnotsupp() for file systems that don't support being exported
   and remove the checks for NULL.  (layerfs calls these without checking.)
 - in union_lookup1(), don't change refcounts in the ISDOTDOT case, just
   adjust which vnode is locked.  fixes PR 33374.
 - apply fixes for ufs_rename() from ufs_vnops.c rev. 1.61 to ext2fs_rename().
2006-12-09 16:11:50 +00:00
elad
b8e4702fb2 Back out uvm_is_swap_device(). 2006-12-07 14:06:51 +00:00
hubertf
e135fa8ee4 Update to describe current API (only), and not duplicate that can be
found elsewhere. (And which will appear in the NetBSD Internals Guide
soonish).

Submitted by Daniel Sieger <dsieger@TechFak.Uni-Bielefeld.DE>,
OK'd by martin@ and  yamt@
2006-12-04 15:36:23 +00:00
wiz
1f1eabcdb7 Use more markup. Use HTML escapes. Use .Rs/.Re for book citation. 2006-12-04 13:16:59 +00:00
tsutsui
32402b1bfe Remove an invalid (and nonexistent) .Xr usage. 2006-12-03 05:28:33 +00:00
elad
432c309931 Change kauth(9) KPI for kauth_authorize_device_passthru() to add another
argument, u_long, serving as a bit-mask of generic requests for the
passthru request.

Discussed on tech-security@ and tech-kern@. Okay tls@.
2006-12-02 03:10:42 +00:00
elad
1e92f4ba9c Trailing whitespace... 2006-12-01 16:13:36 +00:00
elad
a6c2dfb16d Introduce uvm_is_swap_device(), to check if the passed struct vnode * is
used as a swap device or not.

Okay mrg@.
2006-12-01 16:06:09 +00:00
elad
2f85bad1eb Sync with reality after recent changes. 2006-11-30 16:55:00 +00:00
pooka
0dd37417ef match description of VOP_PUTPAGES with reality 2006-11-28 19:26:30 +00:00
elad
8bb202af97 Move ktrace, ptrace, systrace, and procfs to use kauth(9).
First, remove process_checkioperm() calls from MD code. Similar checks
using kauth(9) routines (on the process scope, using appropriate action)
are done in the callers.

Add secmodel back-end to handle each subsystem.
2006-11-28 17:27:09 +00:00
elad
21bc112176 Implement Veriexec's raw disk policy on-top of kauth(9)'s device scope,
using both the rawio_spec and passthru actions to detect raw disk
activity. Same for kernel memory policy.

Update documentation (no longer need to expose veriexec_rawchk()) and
remove all Veriexec-related bits from specfs.
2006-11-26 20:27:27 +00:00
elad
df07d5d652 I wanted to do this for so long: veriexec_init_fp_ops() -> veriexec_init(). 2006-11-26 16:22:36 +00:00
scw
512f329f66 Document disk_blocksize(9). 2006-11-25 12:00:25 +00:00
elad
2664dc174c Add missing items to the securelevel implications list.
Now it is complete.
2006-11-22 21:00:30 +00:00
elad
4b316db1d1 Introduce KAUTH_REQ_MACHDEP_{ALPHA,X86}_UNMANAGEDMEM to handle access
to unmanaged memory.

These are the last two securelevel references in the MD code.
2006-11-22 12:12:51 +00:00
wiz
e524263824 Add RCS Id. Use Nx. Sort SEE ALSO. Avoid Xr to ourselves.
Avoid marking up commas. Uppercase Dt argument.
2006-11-19 00:26:52 +00:00
wiz
430da4d077 Bump date for previous. 2006-11-19 00:20:02 +00:00
elad
2db3a96be7 Provide a standard authorization wrapper for the device scope. 2006-11-19 00:11:29 +00:00
elad
cbaf7914e4 First attempt at an examples section, and while here also add some notes
about extending kauth(9).
2006-11-15 14:55:54 +00:00
ad
f2097c8b0d Remove misleading sentence, to be replaced by a manual page describing basic locking rules. 2006-11-14 15:30:09 +00:00
ad
316b72d710 Fix errors. 2006-11-13 18:28:15 +00:00
ad
bea3d13d1d Add manual pages for RW locks, mutexes and condition variables. Not
enabled in the Makefile.
2006-11-13 16:22:11 +00:00
dyoung
a25eaede91 Add a source-address selection policy mechanism to the kernel.
Also, add ioctls SIOCGIFADDRPREF/SIOCSIFADDRPREF to get/set preference
numbers for addresses.  Make ifconfig(8) set/display preference
numbers.

To activate source-address selection policies in your kernel, add
'options IPSELSRC' to your kernel configuration.

Miscellaneous changes in support of source-address selection:

        1 Factor out some common code, producing rt_replace_ifa().

        2 Abbreviate a for-loop with TAILQ_FOREACH().

        3 Add the predicates on IPv4 addresses IN_LINKLOCAL() and
          IN_PRIVATE(), that are true for link-local unicast
          (169.254/16) and RFC1918 private addresses, respectively.
          Add the predicate IN_ANY_LOCAL() that is true for link-local
          unicast and multicast.

        4 Add IPv4-specific interface attach/detach routines,
          in_domifattach and in_domifdetach, which build #ifdef
          IPSELSRC.

See in_getifa(9) for a more thorough description of source-address
selection policy.
2006-11-13 05:13:38 +00:00
plunky
57c0199dcf Tidy away wsmouse_input() abstractions and update
documentation to include the W direction.
2006-11-12 19:00:42 +00:00
wiz
0db5a288e6 Fix a typo. 2006-11-04 17:16:24 +00:00
yamt
90101c023b be explicit about the difference between vmem_free and vmem_xfree. 2006-11-04 13:07:58 +00:00
yamt
bf894997ce document vmem_xalloc/xfree. 2006-11-04 12:55:28 +00:00
yamt
f0fcd48625 consistency. 2006-11-04 12:39:50 +00:00
elad
1121d7d96a Sync with reality. 2006-11-04 10:47:37 +00:00
wiz
e63079c2a4 Avoid punctuation markup; remove pastos (?). 2006-10-30 21:36:36 +00:00
elad
52d8744717 Use integers, not pointers to integers, for KAUTH_REQ_NETWORK_SOCKET_OPEN.
Reminded by yamt@, thanks!
2006-10-30 16:53:48 +00:00
wiz
f31bc9e7e9 Bump date for previous. 2006-10-26 17:54:52 +00:00
drochner
cb7efd18c2 minor fixes and cleanup, reviewed by elad 2006-10-26 17:33:11 +00:00
elad
04e6d5f932 Don't take chances... properly document KAUTH_NETWORK_INTERFACE. On a
second thought having that warning just in the CVS log doesn't look too
helpful. :)
2006-10-26 16:11:17 +00:00
elad
ed853f6398 Document that arg1 and arg2 for KAUTH_NETWORK_INTERFACE are optional.
Document that arg3 is optionally the interface-specific request. Should
only make sense if we pass ifnet * in arg1!
2006-10-26 16:06:39 +00:00
wiz
faa00b034c Fix typo, found by yamt. 2006-10-26 12:31:14 +00:00
wiz
1751d830e6 Various minor improvements. 2006-10-26 11:16:28 +00:00
elad
adf8d7aab2 Introduce KAUTH_REQ_NETWORK_SOCKET_OPEN, to check if opening a socket is
allowed. It takes three int * arguments indicating domain, type, and
protocol. Replace previous KAUTH_REQ_NETWORK_SOCKET_RAWSOCK with it (but
keep it still).

Places that used to explicitly check for privileged context now don't
need it anymore, so I replaced these with XXX comment indiacting it for
future reference.

Documented and updated examples as well.
2006-10-25 22:49:22 +00:00
elad
0730babc25 Sync documentation for KAUTH_PROCESS_CANSIGNAL with reality. 2006-10-24 10:23:05 +00:00
peter
157373e263 Fix a typo. 2006-10-23 21:21:49 +00:00
elad
6b1bc77758 Use consistent wording.
While here, undocument converstion routines for pcred/ucred, as these are
going to be deprecated. They already are, actually, but because we exposed
them to userland so cleverly with sysctl, it may require more thinking
before actually removing them. For now, just make sure nobody relies on
these types. Or at least try...
2006-10-22 14:00:00 +00:00
pooka
418e5b1cea reflect kauth uucred routine changes
thanks to Elad for reminding
2006-10-22 13:42:17 +00:00
yamt
2026cc5abb be consistent with other vmem pages. 2006-10-22 11:23:32 +00:00
yamt
4194eaeebd document vmem. 2006-10-22 11:14:52 +00:00
elad
d53df4ed98 Document KAUTH_NETWORK_INTERFACE arguments. 2006-10-21 00:07:40 +00:00
elad
305fe09181 Introduce a new action on the network scope, KAUTH_NETWORK_INTERFACE,
used to manage network interfaces.

Add four sub-actions to fulfill generic needs for now, until a more
carefully defined usage of the interface is documented: get, set,
getpriv, and setpriv.
2006-10-20 23:10:33 +00:00
elad
fab05f403b Add a new ALTQ kauth(9) request, KAUTH_REQ_NETWORK_ALTQ_JOBS. 2006-10-20 22:02:54 +00:00
pooka
c870120337 VOP_RENAME synopsis:
* tdvp points to a vnode, not a componentname.
* name of the source vnode is fvp, not vp
2006-10-19 13:44:00 +00:00
rpaulo
ebc62e8a33 Update structure. 2006-10-15 17:48:07 +00:00
wiz
abefc88512 Sort SEE ALSO. 2006-10-14 07:31:41 +00:00
wiz
ca5812394a New sentence, new line. Drop trailing whitespace. Sort sections.
Use .Er for errors.
2006-10-13 21:14:46 +00:00
wiz
8ac31fda0f Improve HTML output. 2006-10-13 21:06:51 +00:00
wiz
2bbc82f29e Bump date for previous. 2006-10-13 20:47:42 +00:00
elad
8c494ca741 Introduce KAUTH_REQ_NETWORK_SOCKET_CANSEE. Since we're not gonna be having
credentials on sockets, at least not anytime soon, this is a way to check
if we can "look" at a socket. Later on when (and if) we do have socket
credentials, the interface usage remains the same because we pass the
socket.

This also fixes sysctl for inet/inet6 pcblist.
2006-10-13 15:39:18 +00:00
wiz
361e86f38f Bump date for previous. 2006-10-13 00:20:00 +00:00
peter
dd191f37f3 Merge the peter-altq branch.
(sync with KAME & add support for using ALTQ with pf(4)).
2006-10-12 19:59:07 +00:00
rpaulo
f3330397f0 Modular (I tried ;-) TCP congestion control API. Whenever certain conditions
happen in the TCP stack, this interface calls the specified callback to
handle the situation according to the currently selected congestion
control algorithm.
A new sysctl node was created: net.inet.tcp.congctl.{available,selected}
with obvious meanings.
The old net.inet.tcp.newreno MIB was removed.
The API is discussed in tcp_congctl(9).

In the near future, it will be possible to selected a congestion control
algorithm on a per-socket basis.

Discussed on tech-net and reviewed by <yamt>.
2006-10-09 16:27:07 +00:00
uebayasi
a70b6fe53b No variable name in function argument declaration. 2006-10-09 07:52:59 +00:00
elad
75783f892c PR/31140: Tetsuya Isaki: driver(9) does not describe about kqfilter 2006-10-08 15:44:25 +00:00
pooka
e2f3993f69 VOP_REMOVE is supposed to vput the arguments before returning instead
of keeping them locked
2006-10-08 08:13:56 +00:00
cube
007b992d97 Synchronise documentation with code. E.g., config_search is no more, but
instead you have config_search_{loc,ia}.  Add documentation for
config_finalize_regsiter, too.  Mostly fixes PR#32106 by Gavan Fantom, as I
think the cfdriver_* and cfattach_* stuff should be documented too, but I'm
not entirely sure where yet.
2006-10-07 17:26:24 +00:00
chs
33c1fd1917 add support for O_DIRECT (I/O directly to application memory,
bypassing any kernel caching for file data).
2006-10-05 14:48:32 +00:00
pooka
d6ced1d27a fix slight ooops in previous 2006-10-04 12:39:05 +00:00
reinoud
64f9244532 Fix confusing statement on locking and contradiction in the VOP_RECLAIM()
explanation.

It told the node vp would be locked on entry and later told that the vnode
is unlocked on entry and should remain unlocked on exit.
2006-10-04 12:32:53 +00:00
pooka
9852bfb57e ucred -> kauth sweep 2006-10-04 11:35:47 +00:00
pooka
ecf7acf05b and lo, the uvm_coredump() peril was no more (since almost 5 years ago) 2006-10-04 11:27:45 +00:00
wiz
5eebb711b9 Use present tense for device scope, like for the others. 2006-10-03 02:06:28 +00:00
jld
af0234e90d Remove erroneous boilerplate about VOP_POLL's return value (which was
already described correctly earlier in the paragraph).
2006-09-30 21:18:38 +00:00
elad
f831edb7d0 Some mdoc cleanup. 2006-09-30 20:14:53 +00:00
elad
b8a339347f Implement the "device" scope.
It uses an authorization wrapper per device class on the system to
ensure type-safety.

For now, it supports only terminal (TTY) devices, and has two actions
for them: "open terminal" and "privileged set". Sample usage has been
added to i386 and hp300 code for reference.

Update documentation.
2006-09-30 20:05:57 +00:00
dogcow
ef869ff8e9 it's now const char *name, not char *name. (hi, wiz!) 2006-09-24 07:27:57 +00:00
wiz
ecef25127f Bump date for previous. 2006-09-24 07:21:43 +00:00
jmcneill
f135e0d607 Add "name" parameter to powerhook_establish, to aid debugging. No objections
on tech-kern@
2006-09-24 03:53:07 +00:00
tsutsui
6e4dd0bf16 Sync PMAP_PREFER(9) usage with -current implemetation. 2006-09-24 01:34:19 +00:00
wiz
332a508d8a Bump date for previous. 2006-09-23 11:25:47 +00:00
wiz
3263fc6109 Drop trailing spaces. 2006-09-23 10:07:32 +00:00
jmcneill
5c58e26a02 PR# 34288: No splaudio() in man 9 spl, from Stephane Witzmann. 2006-09-23 04:16:43 +00:00
elad
6ecd7be983 Lose (void *) casts on the machdep scope authorization wrapper. Update
documentation.
2006-09-19 22:03:10 +00:00
elad
83a5239b28 Remove ugly (void *) casts from network scope authorization wrapper and
calls to it.

While here, adapt code for system scope listeners to avoid some more
casts (forgotten in previous run).

Update documentation.
2006-09-19 21:42:29 +00:00
elad
e40c6b13a0 Maintain list of security models we ship with NetBSD in secmodel(9), and
some tiny markup fix in secmodel_bsd44(9).
2006-09-19 19:22:05 +00:00
wiz
da7878157c Make links from ieee80211(9) to pages for all included functions. 2006-09-17 21:46:39 +00:00
plunky
ed289a21ec fix btsco(4) driver name 2006-09-17 15:00:07 +00:00
elad
efac261ecd Add SYNOPSIS, after consulting wiz@, thanks! 2006-09-17 13:43:26 +00:00
wiz
0b0ce0e490 Typo fix. Plural fixes. 2006-09-17 13:27:27 +00:00
elad
620ee93f12 Update kauth(9) that was forgotten in the big secmodel commit, and some
markup fixes.
2006-09-17 13:11:54 +00:00
wiz
bcbefab5bf "is be" -> "is" 2006-09-17 12:15:20 +00:00
wiz
d9d7ce0d27 We have no wicontrol(8), link to wiconfig(8) instead. 2006-09-17 12:13:02 +00:00
wiz
03e847b918 There is no, and was no, ifnet(9), remove it from SEE ALSO. 2006-09-17 12:11:46 +00:00
elad
066231b98f Reference veriexecgen(8). Bump date. 2006-09-16 21:07:36 +00:00
yamt
f349782fa8 add workqueue_destroy. 2006-09-16 11:15:50 +00:00
wiz
db06aa87ca Use macro for HTML output. 2006-09-16 08:54:22 +00:00
yamt
c76c4d01d3 VOP_ADVLOCK: document the current unnatural handling of SEEK_CUR.
pointed by efnbl06 at bn2.maus.net.
2006-09-16 08:47:18 +00:00
elad
2c4556dbe4 Refer to the secmodel_{bsd44,overlay}(9) man-pages and the examples
directory.

Bump date.
2006-09-16 08:46:14 +00:00
elad
a416017103 Add a man-page for secmodel_overlay(9). 2006-09-16 08:37:33 +00:00
yamt
658b31f04b VOP_ADVLOCK: fix a description of vp. pointed by efnbl06 at bn2.maus.net. 2006-09-16 08:23:30 +00:00
wiz
fb62ed2d80 Sort sections, remove superfluous line. 2006-09-15 20:27:57 +00:00
elad
172a3fa471 Remove securelevel-related text from init(8) man-page as they're now in
secmodel_bsd44(9).

I'm not sure I agree with the BUGS section, but for now move it to
secmodel_bsd44(9) as well.
2006-09-15 20:20:06 +00:00
wiz
324633bc37 Fix a typo, use \- for minus. 2006-09-15 20:15:33 +00:00
elad
85e66157f0 Add a man-page for secmodel_bsd44, describing a bit the concepts of
super-user and securelevel.

The securelevel part was compiled of text from both init(8) and OpenBSD's
securelevel(7), and brought in-sync with what we really do.
2006-09-15 20:01:38 +00:00
pooka
c013f8a66c markup fixes 2006-09-12 13:05:17 +00:00
pooka
a062135916 Bring the ieee80211 manual pages reasonably up-to-date with reality:
fix prototypes and descriptions, remove old stuff no longer present,
add some new interfaces, tweak markup, etcetc
2006-09-12 11:05:23 +00:00
wiz
93411912cb Quote HTML characters. Use standard headers. Remove trailing comma. 2006-09-10 22:17:04 +00:00
elad
5f7169ccb1 First take at security model abstraction.
- Add a few scopes to the kernel: system, network, and machdep.

- Add a few more actions/sub-actions (requests), and start using them as
  opposed to the KAUTH_GENERIC_ISSUSER place-holders.

- Introduce a basic set of listeners that implement our "traditional"
  security model, called "bsd44". This is the default (and only) model we
  have at the moment.

- Update all relevant documentation.

- Add some code and docs to help folks who want to actually use this stuff:

  * There's a sample overlay model, sitting on-top of "bsd44", for
    fast experimenting with tweaking just a subset of an existing model.

    This is pretty cool because it's *really* straightforward to do stuff
    you had to use ugly hacks for until now...

  * And of course, documentation describing how to do the above for quick
    reference, including code samples.

All of these changes were tested for regressions using a Python-based
testsuite that will be (I hope) available soon via pkgsrc. Information
about the tests, and how to write new ones, can be found on:

	http://kauth.linbsd.org/kauthwiki

NOTE FOR DEVELOPERS: *PLEASE* don't add any code that does any of the
following:

  - Uses a KAUTH_GENERIC_ISSUSER kauth(9) request,
  - Checks 'securelevel' directly,
  - Checks a uid/gid directly.

(or if you feel you have to, contact me first)

This is still work in progress; It's far from being done, but now it'll
be a lot easier.

Relevant mailing list threads:

http://mail-index.netbsd.org/tech-security/2006/01/25/0011.html
http://mail-index.netbsd.org/tech-security/2006/03/24/0001.html
http://mail-index.netbsd.org/tech-security/2006/04/18/0000.html
http://mail-index.netbsd.org/tech-security/2006/05/15/0000.html
http://mail-index.netbsd.org/tech-security/2006/08/01/0000.html
http://mail-index.netbsd.org/tech-security/2006/08/25/0000.html

Many thanks to YAMAMOTO Takashi, Matt Thomas, and Christos Zoulas for help
stablizing kauth(9).

Full credit for the regression tests, making sure these changes didn't break
anything, goes to Matt Fleming and Jaime Fournier.

Happy birthday Randi! :)
2006-09-08 20:58:56 +00:00
wiz
3629da0138 Fix todr(9) MLINKS line. 2006-09-06 18:15:35 +00:00
wiz
e88c786bd4 Fix typo. 2006-09-06 18:06:00 +00:00
gdamore
43de604779 time.9 renamed to time_second.9. various updates to reflect API changes. 2006-09-06 18:04:30 +00:00
blymn
c09e9ac5fb * Remove "hinted" interface
* Modify fileassoc internals to use fhandle_t instead of fileid
2006-09-06 13:37:49 +00:00
jnemeth
dbe703764c make bus_dmamap_load() definition match description 2006-08-30 11:37:39 +00:00
wiz
e4113c2f20 Bump date for previous. 2006-08-23 20:39:01 +00:00
blymn
50abf3c730 Add functions to the fileassoc interface to allow a "hint" to be provided
instead of performing an implicit VOP_GETATTR() when adding/looking up
fileassoc entries.
2006-08-20 10:38:23 +00:00
jld
1a62815660 vnode_if.src says that VOP_POLL's vnode is unlocked, and has said so
since 1998; adjust the man page to reflect that.
2006-08-17 04:38:27 +00:00
ad
5ed2f11fe6 Minor update for per-LWP creds. 2006-08-14 13:59:30 +00:00
christos
ce0ef6cfc4 Pretending to be Elad's keyboard:
fileassoc.diff adds a fileassoc_table_run() routine that allows you to
pass a callback to be called with every entry on a given mount.

veriexec.diff adds some raw device access policies: if raw disk is
opened at strict level 1, all fingerprints on this disk will be
invalidated as a safety measure. level 2 will not allow opening disk
for raw writing if we monitor it, and prevent raw writes to memory.
level 3 will not allow opening any disk for raw writing.

both update all relevant documentation.

veriexec concept is okay blymn@.
2006-08-11 19:17:47 +00:00
wiz
2ca3b72c7e Bump date for previous. 2006-07-30 00:25:24 +00:00
wiz
698ba8e09a Fix xref. New sentence, new line. Remove superfluous quotes. 2006-07-30 00:20:06 +00:00
wiz
08124ae215 Serial comma. 2006-07-30 00:19:43 +00:00
wiz
4783dcb5ed Use Dv for defined values. Add commas between SEE ALSO entries.
Remove trailing whitespace. Punctuation nits.
2006-07-29 23:47:01 +00:00
dyoung
01868ae406 Let there be no mistake, m_makewritable() does not guarantee that
the writable bytes [off, off+len) are consecutive.
2006-07-28 17:30:53 +00:00
gdt
306758ad1c man pages contributed by Igor Sobrado. 2006-07-27 00:00:56 +00:00