(1) Put MAC kernel options into <literal></literal> when described in

text.

(2) Correct option name for mac_seeotheruids.

Submitted by:	Hiten Pandya <hiten@angelica.unixdaemons.com> (1)
This commit is contained in:
Robert Watson 2002-12-08 19:23:22 +00:00
parent bde558861f
commit 9b3a376116
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=15224

View file

@ -3615,7 +3615,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
</indexterm>
<para>Vendor: TrustedBSD Project</para>
<para>Module name: mac_biba.ko</para>
<para>Kernel option: MAC_BIBA</para>
<para>Kernel option: <literal>MAC_BIBA</literal></para>
<para>The Biba Integrity Policy (&man.mac.biba.4&) provides
for hierarchal and non-hierarchal labeling of all system
objects with integrity data, and the strict enforcement of
@ -3638,7 +3638,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
</indexterm>
<para>Vendor: TrustedBSD Project</para>
<para>Module name: mac_bsdextended.ko</para>
<para>Kernel option: MAC_BSDEXTENDED</para>
<para>Kernel option: <literal>MAC_BSDEXTENDED</literal></para>
<para> The File System Firewall Policy (&man.mac.bsdextended.4;)
provides an extension to the BSD file system permission model,
permitting the administrator to define a set of firewall-like
@ -3665,7 +3665,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
</indexterm>
<para>Vendor: TrustedBSD Project</para>
<para>Module name: mac_ifoff.ko</para>
<para>Kernel option: MAC_IFOFF</para>
<para>Kernel option: <literal>MAC_IFOFF</literal></para>
<para>The interface silencing policy (XXXMANPAGE)
prohibits the use of network interfaces during the boot
until explicitly enabled, preventing spurious stack output
@ -3684,7 +3684,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
</indexterm>
<para>Vendor: Network Associates Laboratories</para>
<para>Module name: mac_lomac.ko</para>
<para>Kernel option: MAC_LOMAC</para>
<para>Kernel option: <literal>MAC_LOMAC</literal></para>
<para>Similar to the Biba Integrity Policy, the LOMAC
policy (XXXMANPAGE) relies on the ubiquitous
labeling of all system objects with integrity labels.
@ -3707,7 +3707,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
</indexterm>
<para>Vendor: TrustedBSD Project</para>
<para>Module name: mac_mls.ko</para>
<para>Kernel option: MAC_MLS</para>
<para>Kernel option: <literal>MAC_MLS</literal></para>
<para>Multi-Level Security (<acronym>MLS</acronym>)
(&man.mac.mls.4;) provides for hierarchal and
non-hierarchal labeling of all system objects with
@ -3733,7 +3733,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
</indexterm>
<para>Vendor: TrustedBSD Project</para>
<para>Module name: mac_none.ko</para>
<para>Kernel option: MAC_NONE</para>
<para>Kernel option: <literal>MAC_NONE</literal></para>
<para>The None policy (XXXMANPAGE) provides a stub
sample policy for developers, implementing all entry
points, but not changing the system access control
@ -3747,7 +3747,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
</indexterm>
<para>Vendor: TrustedBSD Project</para>
<para>Module name: mac_partition.ko</para>
<para>Kernel option: MAC_PARTITION</para>
<para>Kernel option: <literal>MAC_PARTITION</literal></para>
<para>The Partition policy (XXXMANPAGE) provides for a
simple process visibility limitation, assigning labels to
processes identifying what numeric system partition they
@ -3764,7 +3764,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
</indexterm>
<para>Vendor: TrustedBSD Project</para>
<para>Module name: mac_seeotheruids.ko</para>
<para>Kernel option: MAC_BIBA</para>
<para>Kernel option: <literal>MAC_SEEOTHERUIDS</literal></para>
<para>The See Other Uids policy (XXXMANPAGE) implements
a similar process visibility model to mac_partition,
except that it relies on process credentials to control
@ -3781,7 +3781,7 @@ user@unfirewalled.myserver.com's password: <userinput>*******</userinput></scree
</indexterm>
<para>Vendor: TrustedBSD Project</para>
<para>Module name: mac_test.ko</para>
<para>Kernel option: MAC_TEST</para>
<para>Kernel option: <literal>MAC_TEST</literal></para>
<para>The Test policy (XXXMANPAGE) provides a regression test
environment for the MAC Framework, and will cause a
fail-stop in the event that internal MAC Framework assertions