summaryrefslogtreecommitdiffstats
path: root/sys/security/mac/mac_sysv_sem.c
diff options
context:
space:
mode:
authorrwatson <rwatson@FreeBSD.org>2006-12-21 09:51:34 +0000
committerrwatson <rwatson@FreeBSD.org>2006-12-21 09:51:34 +0000
commit6fa1425be4ba1838fbf0b757c9cbbb6c0da6811f (patch)
tree0e00125c1e53f64a611961efffaf3188df3fc0d6 /sys/security/mac/mac_sysv_sem.c
parent24b8c057ed5ff8edf963e31c6cd9eaf0514469b2 (diff)
downloadFreeBSD-src-6fa1425be4ba1838fbf0b757c9cbbb6c0da6811f.zip
FreeBSD-src-6fa1425be4ba1838fbf0b757c9cbbb6c0da6811f.tar.gz
Remove mac_enforce_subsystem debugging sysctls. Enforcement on
subsystems will be a property of policy modules, which may require access control check entry points to be invoked even when not actively enforcing (i.e., to track information flow without providing protection). Obtained from: TrustedBSD Project Suggested by: Christopher dot Vance at sparta dot com
Diffstat (limited to 'sys/security/mac/mac_sysv_sem.c')
-rw-r--r--sys/security/mac/mac_sysv_sem.c14
1 files changed, 0 insertions, 14 deletions
diff --git a/sys/security/mac/mac_sysv_sem.c b/sys/security/mac/mac_sysv_sem.c
index aae6788..80778c3 100644
--- a/sys/security/mac/mac_sysv_sem.c
+++ b/sys/security/mac/mac_sysv_sem.c
@@ -54,11 +54,6 @@ __FBSDID("$FreeBSD$");
#include <security/mac/mac_framework.h>
#include <security/mac/mac_internal.h>
-static int mac_enforce_sysv_sem = 1;
-SYSCTL_INT(_security_mac, OID_AUTO, enforce_sysv_sem, CTLFLAG_RW,
- &mac_enforce_sysv_sem, 0, "Enforce MAC policy on System V IPC Semaphores");
-TUNABLE_INT("security.mac.enforce_sysv", &mac_enforce_sysv_sem);
-
static struct label *
mac_sysv_sem_label_alloc(void)
{
@@ -112,9 +107,6 @@ mac_check_sysv_semctl(struct ucred *cred, struct semid_kernel *semakptr,
{
int error;
- if (!mac_enforce_sysv_sem)
- return (0);
-
MAC_CHECK(check_sysv_semctl, cred, semakptr, semakptr->label, cmd);
return(error);
@@ -125,9 +117,6 @@ mac_check_sysv_semget(struct ucred *cred, struct semid_kernel *semakptr)
{
int error;
- if (!mac_enforce_sysv_sem)
- return (0);
-
MAC_CHECK(check_sysv_semget, cred, semakptr, semakptr->label);
return(error);
@@ -139,9 +128,6 @@ mac_check_sysv_semop(struct ucred *cred, struct semid_kernel *semakptr,
{
int error;
- if (!mac_enforce_sysv_sem)
- return (0);
-
MAC_CHECK(check_sysv_semop, cred, semakptr, semakptr->label,
accesstype);
OpenPOWER on IntegriCloud