Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/share/man/man4 Reformat a little, clarify terminology and ma...
details: https://anonhg.NetBSD.org/src/rev/ac541f0025b5
branches: trunk
changeset: 533261:ac541f0025b5
user: gmcgarry <gmcgarry%NetBSD.org@localhost>
date: Wed Jun 26 06:44:59 2002 +0000
description:
Reformat a little, clarify terminology and make less terse.
diffstat:
share/man/man4/systrace.4 | 89 ++++++++++++++++++++++++++++------------------
1 files changed, 54 insertions(+), 35 deletions(-)
diffs (159 lines):
diff -r 3049020ac145 -r ac541f0025b5 share/man/man4/systrace.4
--- a/share/man/man4/systrace.4 Wed Jun 26 06:00:26 2002 +0000
+++ b/share/man/man4/systrace.4 Wed Jun 26 06:44:59 2002 +0000
@@ -1,4 +1,4 @@
-.\" $NetBSD: systrace.4,v 1.4 2002/06/18 14:17:05 wiz Exp $
+.\" $NetBSD: systrace.4,v 1.5 2002/06/26 06:44:59 gmcgarry Exp $
.\" $OpenBSD: systrace.4,v 1.2 2002/06/03 15:44:17 mpech Exp $
.\"
.\" Copyright (c) 2002 CubeSoft Communications, Inc.
@@ -34,30 +34,38 @@
.Sh SYNOPSIS
.Cd "options SYSTRACE"
.Sh DESCRIPTION
+The
.Nm
-attaches to processes and enforces policies for system calls.
-A pseudo-device,
-.Pa /dev/systrace ,
-allows userland processes to control the behavior of
+kernel facility provides a mechanism to manipulate and enforce access
+policies for system calls. Using the
.Nm
+facility it is possible to monitor and control a process's access to
+the kernel through system calls.
+.Pp
+Access to the
+.Nm
+facility is provided to userland processes, such as
+.Xr systrace 1 ,
through an
.Xr ioctl 2
-interface.
-.Sh SYSTEM CALL POLICIES
+interface on the pseudo-device
+.Pa /dev/systrace .
+This interface allows messages to be sent from the kernel to the
+userland process to request confirmation of an access policy.
+.Pp
+The
.Nm
-can assign the following policies to system calls:
-.Bl -tag -enum -width "xxxxxx"
+facility can assign the following policies to system calls for a
+specific process:
+.Bl -tag -offset indent -width "XXXXXX"
.It SYSTR_POLICY_ASK
-Send a message of the type
-.Dv SYSTR_MSG_ASK ,
-and put the process to sleep until a
-.Dv STRIOCANSWER
-.Xr ioctl 2
-is made.
+Send a message on
+.Pa /dev/systrace
+requesting the access policy for the system call.
.It SYSTR_POLICY_PERMIT
Immediately allow the system call.
.It SYSTR_POLICY_NEVER
-Immediately return an error code.
+Immediately deny the system call and return an error code.
.El
.Sh SYSTRACE MESSAGES
A
@@ -99,7 +107,12 @@
};
.Ed
.Sh IOCTL INTERFACE
-.Bl -tag -width "xxxxxx"
+The
+.Nm
+facility supports the following
+.Xr ioctl 2
+operations:
+.Bl -tag -width "XXXXXX"
.It Dv SYSTR_CLONE Fa "int"
Return a
.Nm
@@ -107,36 +120,35 @@
further
.Xr ioctl 2
operations.
-.El
-.Nm
-supports the following
-.Xr ioctl 2
-command:
-.Bl -tag -width "xxxxxx"
.It Dv STRIOCATTACH Fa "pid_t"
-Attach to a process, unless:
-.Bl -enum -compact -width 2n
+Attach to the process with the specified process ID. This operation
+will fail under the following conditions:
+.Pp
+.Bl -enum -offset indent -compact -width 2n
+.It
+The process is trying to attach to itself.
.It
-It's the process that's doing the attaching.
+The process is a system process.
.It
-It's a system process.
+The process is being traced already.
.It
-It's being traced already.
+You do not own the process and you are not root.
.It
-You do not own the process and you're not root.
-.It
-It's
+The process is
.Xr init 8 ,
and the
kernel was not compiled with
.Cd option INSECURE .
.El
.It Dv STRIOCDETACH Fa "pid_t"
-Wake up a process if it is waiting for an answer, and detach from it.
+Wake up the process if it is waiting for an answer, and detach from
+it.
.It Dv STRIOCANSWER Fa "struct systrace_answer"
-Tell
+Notify the
.Nm
-what to do with a system call that was assigned a policy of
+facility in response to a
+SYSTR_MSG_ASK
+message what to do with a system call that was assigned a policy of
.Dv SYSTR_POLICY_ASK .
.Bd -literal
struct systrace_answer {
@@ -148,6 +160,11 @@
#define SYSTR_FLAGS_RESULT 0x0001 /* Report syscall result */
};
.Ed
+.Pp
+Valid return values for
+.Em stra_policy
+are
+SYSTR_POLICY_PERMIT, SYSTR_POLICY_ASK and SYSTR_POLICY_NEVER.
.It Dv STRIOCIO Fa "struct systrace_io"
Copy data in/out of the process being traced.
.Bd -literal
@@ -211,7 +228,7 @@
.Va strp_policy .
.It Dv STRIOCGETCWD Fa "pid_t"
Set the working directory of the current process to that of the
-named process.
+specified process.
.It Dv STRIOCRESCWD
Restore the working directory of the current process.
.El
@@ -231,5 +248,7 @@
.Nm
facility first appeared in
.Ox 3.2 .
+It appeared in
+.Nx 1.7 .
.\" .Sh BUGS
.\" .Sh CAVEATS
Home |
Main Index |
Thread Index |
Old Index