init.8 (54199) | init.8 (54668) |
---|---|
1.\" Copyright (c) 1980, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" This code is derived from software contributed to Berkeley by 5.\" Donn Seeley at Berkeley Software Design, Inc. 6.\" 7.\" Redistribution and use in source and binary forms, with or without 8.\" modification, are permitted provided that the following conditions --- 19 unchanged lines hidden (view full) --- 28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33.\" SUCH DAMAGE. 34.\" 35.\" @(#)init.8 8.3 (Berkeley) 4/18/94 | 1.\" Copyright (c) 1980, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" This code is derived from software contributed to Berkeley by 5.\" Donn Seeley at Berkeley Software Design, Inc. 6.\" 7.\" Redistribution and use in source and binary forms, with or without 8.\" modification, are permitted provided that the following conditions --- 19 unchanged lines hidden (view full) --- 28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33.\" SUCH DAMAGE. 34.\" 35.\" @(#)init.8 8.3 (Berkeley) 4/18/94 |
36.\" $FreeBSD: head/sbin/init/init.8 54199 1999-12-06 09:07:14Z sheldonh $ | 36.\" $FreeBSD: head/sbin/init/init.8 54668 1999-12-16 02:15:53Z nik $ |
37.\" 38.Dd April 18, 1994 39.Dt INIT 8 40.Os BSD 4 41.Sh NAME 42.Nm init 43.Nd process control initialization 44.Sh SYNOPSIS --- 69 unchanged lines hidden (view full) --- 114Highly secure mode \- same as secure mode, plus disks may not be 115opened for writing (except by 116.Xr mount 2 ) 117whether mounted or not. 118This level precludes tampering with filesystems by unmounting them, 119but also inhibits running 120.Xr newfs 8 121while the system is multi-user. | 37.\" 38.Dd April 18, 1994 39.Dt INIT 8 40.Os BSD 4 41.Sh NAME 42.Nm init 43.Nd process control initialization 44.Sh SYNOPSIS --- 69 unchanged lines hidden (view full) --- 114Highly secure mode \- same as secure mode, plus disks may not be 115opened for writing (except by 116.Xr mount 2 ) 117whether mounted or not. 118This level precludes tampering with filesystems by unmounting them, 119but also inhibits running 120.Xr newfs 8 121while the system is multi-user. |
122.Pp 123In addition, kernel time changes are restricted to less than or equal to one 124second. Attempts to change the time by more than this will log the message 125.Dq Time adjustment clamped to +1 second . |
|
122.It Ic 3 123Network secure mode \- same as highly secure mode, plus 124IP packet filter rules (see 125.Xr ipfw 8 126and 127.Xr ipfirewall 4 ) 128cannot be changed and 129.Xr dummynet 4 --- 260 unchanged lines hidden --- | 126.It Ic 3 127Network secure mode \- same as highly secure mode, plus 128IP packet filter rules (see 129.Xr ipfw 8 130and 131.Xr ipfirewall 4 ) 132cannot be changed and 133.Xr dummynet 4 --- 260 unchanged lines hidden --- |