summaryrefslogtreecommitdiffstats
path: root/sys/security/mac/mac_socket.c
diff options
context:
space:
mode:
authorrwatson <rwatson@FreeBSD.org>2006-12-21 09:51:34 +0000
committerrwatson <rwatson@FreeBSD.org>2006-12-21 09:51:34 +0000
commit6fa1425be4ba1838fbf0b757c9cbbb6c0da6811f (patch)
tree0e00125c1e53f64a611961efffaf3188df3fc0d6 /sys/security/mac/mac_socket.c
parent24b8c057ed5ff8edf963e31c6cd9eaf0514469b2 (diff)
downloadFreeBSD-src-6fa1425be4ba1838fbf0b757c9cbbb6c0da6811f.zip
FreeBSD-src-6fa1425be4ba1838fbf0b757c9cbbb6c0da6811f.tar.gz
Remove mac_enforce_subsystem debugging sysctls. Enforcement on
subsystems will be a property of policy modules, which may require access control check entry points to be invoked even when not actively enforcing (i.e., to track information flow without providing protection). Obtained from: TrustedBSD Project Suggested by: Christopher dot Vance at sparta dot com
Diffstat (limited to 'sys/security/mac/mac_socket.c')
-rw-r--r--sys/security/mac/mac_socket.c42
1 files changed, 0 insertions, 42 deletions
diff --git a/sys/security/mac/mac_socket.c b/sys/security/mac/mac_socket.c
index 2a2dfa4..2898519 100644
--- a/sys/security/mac/mac_socket.c
+++ b/sys/security/mac/mac_socket.c
@@ -73,15 +73,6 @@ __FBSDID("$FreeBSD$");
#include <security/mac/mac_internal.h>
/*
- * mac_enforce_socket is used by the inet code when delivering to an inpcb
- * without hitting the socket layer, and has to be non-static for now.
- */
-int mac_enforce_socket = 1;
-SYSCTL_INT(_security_mac, OID_AUTO, enforce_socket, CTLFLAG_RW,
- &mac_enforce_socket, 0, "Enforce MAC policy on socket operations");
-TUNABLE_INT("security.mac.enforce_socket", &mac_enforce_socket);
-
-/*
* Currently, sockets hold two labels: the label of the socket itself, and a
* peer label, which may be used by policies to hold a copy of the label of
* any remote endpoint.
@@ -285,9 +276,6 @@ mac_check_socket_accept(struct ucred *cred, struct socket *socket)
SOCK_LOCK_ASSERT(socket);
- if (!mac_enforce_socket)
- return (0);
-
MAC_CHECK(check_socket_accept, cred, socket, socket->so_label);
return (error);
@@ -301,9 +289,6 @@ mac_check_socket_bind(struct ucred *ucred, struct socket *socket,
SOCK_LOCK_ASSERT(socket);
- if (!mac_enforce_socket)
- return (0);
-
MAC_CHECK(check_socket_bind, ucred, socket, socket->so_label,
sockaddr);
@@ -318,9 +303,6 @@ mac_check_socket_connect(struct ucred *cred, struct socket *socket,
SOCK_LOCK_ASSERT(socket);
- if (!mac_enforce_socket)
- return (0);
-
MAC_CHECK(check_socket_connect, cred, socket, socket->so_label,
sockaddr);
@@ -333,9 +315,6 @@ mac_check_socket_create(struct ucred *cred, int domain, int type,
{
int error;
- if (!mac_enforce_socket)
- return (0);
-
MAC_CHECK(check_socket_create, cred, domain, type, protocol);
return (error);
@@ -349,9 +328,6 @@ mac_check_socket_deliver(struct socket *socket, struct mbuf *mbuf)
SOCK_LOCK_ASSERT(socket);
- if (!mac_enforce_socket)
- return (0);
-
label = mac_mbuf_to_label(mbuf);
MAC_CHECK(check_socket_deliver, socket, socket->so_label, mbuf,
@@ -367,9 +343,6 @@ mac_check_socket_listen(struct ucred *cred, struct socket *socket)
SOCK_LOCK_ASSERT(socket);
- if (!mac_enforce_socket)
- return (0);
-
MAC_CHECK(check_socket_listen, cred, socket, socket->so_label);
return (error);
}
@@ -381,9 +354,6 @@ mac_check_socket_poll(struct ucred *cred, struct socket *so)
SOCK_LOCK_ASSERT(so);
- if (!mac_enforce_socket)
- return (0);
-
MAC_CHECK(check_socket_poll, cred, so, so->so_label);
return (error);
}
@@ -395,9 +365,6 @@ mac_check_socket_receive(struct ucred *cred, struct socket *so)
SOCK_LOCK_ASSERT(so);
- if (!mac_enforce_socket)
- return (0);
-
MAC_CHECK(check_socket_receive, cred, so, so->so_label);
return (error);
@@ -424,9 +391,6 @@ mac_check_socket_send(struct ucred *cred, struct socket *so)
SOCK_LOCK_ASSERT(so);
- if (!mac_enforce_socket)
- return (0);
-
MAC_CHECK(check_socket_send, cred, so, so->so_label);
return (error);
@@ -439,9 +403,6 @@ mac_check_socket_stat(struct ucred *cred, struct socket *so)
SOCK_LOCK_ASSERT(so);
- if (!mac_enforce_socket)
- return (0);
-
MAC_CHECK(check_socket_stat, cred, so, so->so_label);
return (error);
@@ -454,9 +415,6 @@ mac_check_socket_visible(struct ucred *cred, struct socket *socket)
SOCK_LOCK_ASSERT(socket);
- if (!mac_enforce_socket)
- return (0);
-
MAC_CHECK(check_socket_visible, cred, socket, socket->so_label);
return (error);
OpenPOWER on IntegriCloud