summaryrefslogtreecommitdiffstats
path: root/sys/security/mac/mac_sysv_shm.c
diff options
context:
space:
mode:
authorrwatson <rwatson@FreeBSD.org>2006-12-21 09:51:34 +0000
committerrwatson <rwatson@FreeBSD.org>2006-12-21 09:51:34 +0000
commit6fa1425be4ba1838fbf0b757c9cbbb6c0da6811f (patch)
tree0e00125c1e53f64a611961efffaf3188df3fc0d6 /sys/security/mac/mac_sysv_shm.c
parent24b8c057ed5ff8edf963e31c6cd9eaf0514469b2 (diff)
downloadFreeBSD-src-6fa1425be4ba1838fbf0b757c9cbbb6c0da6811f.zip
FreeBSD-src-6fa1425be4ba1838fbf0b757c9cbbb6c0da6811f.tar.gz
Remove mac_enforce_subsystem debugging sysctls. Enforcement on
subsystems will be a property of policy modules, which may require access control check entry points to be invoked even when not actively enforcing (i.e., to track information flow without providing protection). Obtained from: TrustedBSD Project Suggested by: Christopher dot Vance at sparta dot com
Diffstat (limited to 'sys/security/mac/mac_sysv_shm.c')
-rw-r--r--sys/security/mac/mac_sysv_shm.c18
1 files changed, 0 insertions, 18 deletions
diff --git a/sys/security/mac/mac_sysv_shm.c b/sys/security/mac/mac_sysv_shm.c
index b7c8cfb..7bdffdb 100644
--- a/sys/security/mac/mac_sysv_shm.c
+++ b/sys/security/mac/mac_sysv_shm.c
@@ -54,12 +54,6 @@ __FBSDID("$FreeBSD$");
#include <security/mac/mac_framework.h>
#include <security/mac/mac_internal.h>
-static int mac_enforce_sysv_shm = 1;
-SYSCTL_INT(_security_mac, OID_AUTO, enforce_sysv_shm, CTLFLAG_RW,
- &mac_enforce_sysv_shm, 0,
- "Enforce MAC policy on System V IPC shared memory");
-TUNABLE_INT("security.mac.enforce_sysv", &mac_enforce_sysv_shm);
-
static struct label *
mac_sysv_shm_label_alloc(void)
{
@@ -113,9 +107,6 @@ mac_check_sysv_shmat(struct ucred *cred, struct shmid_kernel *shmsegptr,
{
int error;
- if (!mac_enforce_sysv_shm)
- return (0);
-
MAC_CHECK(check_sysv_shmat, cred, shmsegptr, shmsegptr->label,
shmflg);
@@ -128,9 +119,6 @@ mac_check_sysv_shmctl(struct ucred *cred, struct shmid_kernel *shmsegptr,
{
int error;
- if (!mac_enforce_sysv_shm)
- return (0);
-
MAC_CHECK(check_sysv_shmctl, cred, shmsegptr, shmsegptr->label,
cmd);
@@ -142,9 +130,6 @@ mac_check_sysv_shmdt(struct ucred *cred, struct shmid_kernel *shmsegptr)
{
int error;
- if (!mac_enforce_sysv_shm)
- return (0);
-
MAC_CHECK(check_sysv_shmdt, cred, shmsegptr, shmsegptr->label);
return(error);
@@ -156,9 +141,6 @@ mac_check_sysv_shmget(struct ucred *cred, struct shmid_kernel *shmsegptr,
{
int error;
- if (!mac_enforce_sysv_shm)
- return (0);
-
MAC_CHECK(check_sysv_shmget, cred, shmsegptr, shmsegptr->label,
shmflg);
OpenPOWER on IntegriCloud