diff options
author | rwatson <rwatson@FreeBSD.org> | 2006-12-21 09:51:34 +0000 |
---|---|---|
committer | rwatson <rwatson@FreeBSD.org> | 2006-12-21 09:51:34 +0000 |
commit | 6fa1425be4ba1838fbf0b757c9cbbb6c0da6811f (patch) | |
tree | 0e00125c1e53f64a611961efffaf3188df3fc0d6 /sys/security/mac/mac_pipe.c | |
parent | 24b8c057ed5ff8edf963e31c6cd9eaf0514469b2 (diff) | |
download | FreeBSD-src-6fa1425be4ba1838fbf0b757c9cbbb6c0da6811f.zip FreeBSD-src-6fa1425be4ba1838fbf0b757c9cbbb6c0da6811f.tar.gz |
Remove mac_enforce_subsystem debugging sysctls. Enforcement on
subsystems will be a property of policy modules, which may require
access control check entry points to be invoked even when not actively
enforcing (i.e., to track information flow without providing
protection).
Obtained from: TrustedBSD Project
Suggested by: Christopher dot Vance at sparta dot com
Diffstat (limited to 'sys/security/mac/mac_pipe.c')
-rw-r--r-- | sys/security/mac/mac_pipe.c | 23 |
1 files changed, 0 insertions, 23 deletions
diff --git a/sys/security/mac/mac_pipe.c b/sys/security/mac/mac_pipe.c index edc03132..44755ad 100644 --- a/sys/security/mac/mac_pipe.c +++ b/sys/security/mac/mac_pipe.c @@ -52,11 +52,6 @@ __FBSDID("$FreeBSD$"); #include <security/mac/mac_framework.h> #include <security/mac/mac_internal.h> -static int mac_enforce_pipe = 1; -SYSCTL_INT(_security_mac, OID_AUTO, enforce_pipe, CTLFLAG_RW, - &mac_enforce_pipe, 0, "Enforce MAC policy on pipe operations"); -TUNABLE_INT("security.mac.enforce_pipe", &mac_enforce_pipe); - struct label * mac_pipe_label_alloc(void) { @@ -141,9 +136,6 @@ mac_check_pipe_ioctl(struct ucred *cred, struct pipepair *pp, mtx_assert(&pp->pp_mtx, MA_OWNED); - if (!mac_enforce_pipe) - return (0); - MAC_CHECK(check_pipe_ioctl, cred, pp, pp->pp_label, cmd, data); return (error); @@ -156,9 +148,6 @@ mac_check_pipe_poll(struct ucred *cred, struct pipepair *pp) mtx_assert(&pp->pp_mtx, MA_OWNED); - if (!mac_enforce_pipe) - return (0); - MAC_CHECK(check_pipe_poll, cred, pp, pp->pp_label); return (error); @@ -171,9 +160,6 @@ mac_check_pipe_read(struct ucred *cred, struct pipepair *pp) mtx_assert(&pp->pp_mtx, MA_OWNED); - if (!mac_enforce_pipe) - return (0); - MAC_CHECK(check_pipe_read, cred, pp, pp->pp_label); return (error); @@ -187,9 +173,6 @@ mac_check_pipe_relabel(struct ucred *cred, struct pipepair *pp, mtx_assert(&pp->pp_mtx, MA_OWNED); - if (!mac_enforce_pipe) - return (0); - MAC_CHECK(check_pipe_relabel, cred, pp, pp->pp_label, newlabel); return (error); @@ -202,9 +185,6 @@ mac_check_pipe_stat(struct ucred *cred, struct pipepair *pp) mtx_assert(&pp->pp_mtx, MA_OWNED); - if (!mac_enforce_pipe) - return (0); - MAC_CHECK(check_pipe_stat, cred, pp, pp->pp_label); return (error); @@ -217,9 +197,6 @@ mac_check_pipe_write(struct ucred *cred, struct pipepair *pp) mtx_assert(&pp->pp_mtx, MA_OWNED); - if (!mac_enforce_pipe) - return (0); - MAC_CHECK(check_pipe_write, cred, pp, pp->pp_label); return (error); |