From owner-cvs-all@FreeBSD.ORG Thu Dec 21 11:23:00 2006 Return-Path: X-Original-To: cvs-all@FreeBSD.org Delivered-To: cvs-all@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 9BC7916A4D0; Thu, 21 Dec 2006 11:23:00 +0000 (UTC) (envelope-from rwatson@FreeBSD.org) Received: from repoman.freebsd.org (repoman.freebsd.org [69.147.83.41]) by mx1.freebsd.org (Postfix) with ESMTP id 889D213C49D; Thu, 21 Dec 2006 11:23:00 +0000 (UTC) (envelope-from rwatson@FreeBSD.org) Received: from repoman.freebsd.org (localhost [127.0.0.1]) by repoman.freebsd.org (8.13.6/8.13.6) with ESMTP id kBL9pY4F074644; Thu, 21 Dec 2006 09:51:34 GMT (envelope-from rwatson@repoman.freebsd.org) Received: (from rwatson@localhost) by repoman.freebsd.org (8.13.6/8.13.4/Submit) id kBL9pY0O074643; Thu, 21 Dec 2006 09:51:34 GMT (envelope-from rwatson) Message-Id: <200612210951.kBL9pY0O074643@repoman.freebsd.org> From: Robert Watson Date: Thu, 21 Dec 2006 09:51:34 +0000 (UTC) To: src-committers@FreeBSD.org, cvs-src@FreeBSD.org, cvs-all@FreeBSD.org X-FreeBSD-CVS-Branch: HEAD Cc: Subject: cvs commit: src/sys/kern kern_mac.c src/sys/security/mac mac_inet.c mac_internal.h mac_net.c mac_pipe.c mac_posix_sem.c mac_process.c mac_socket.c mac_system.c mac_sysv_msg.c mac_sysv_sem.c mac_sysv_shm.c mac_vfs.c X-BeenThere: cvs-all@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: CVS commit messages for the entire tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 21 Dec 2006 11:23:00 -0000 rwatson 2006-12-21 09:51:34 UTC FreeBSD src repository Modified files: sys/kern kern_mac.c sys/security/mac mac_inet.c mac_internal.h mac_net.c mac_pipe.c mac_posix_sem.c mac_process.c mac_socket.c mac_system.c mac_sysv_msg.c mac_sysv_sem.c mac_sysv_shm.c mac_vfs.c Log: Remove mac_enforce_subsystem debugging sysctls. Enforcement on subsystems will be a property of policy modules, which may require access control check entry points to be invoked even when not actively enforcing (i.e., to track information flow without providing protection). Obtained from: TrustedBSD Project Suggested by: Christopher dot Vance at sparta dot com Revision Changes Path 1.125 +1 -3 src/sys/kern/kern_mac.c 1.7 +0 -3 src/sys/security/mac/mac_inet.c 1.117 +0 -4 src/sys/security/mac/mac_internal.h 1.123 +0 -15 src/sys/security/mac/mac_net.c 1.109 +0 -23 src/sys/security/mac/mac_pipe.c 1.6 +0 -23 src/sys/security/mac/mac_posix_sem.c 1.116 +0 -57 src/sys/security/mac/mac_process.c 1.8 +0 -42 src/sys/security/mac/mac_socket.c 1.108 +0 -55 src/sys/security/mac/mac_system.c 1.6 +0 -27 src/sys/security/mac/mac_sysv_msg.c 1.5 +0 -14 src/sys/security/mac/mac_sysv_sem.c 1.4 +0 -18 src/sys/security/mac/mac_sysv_shm.c 1.116 +0 -110 src/sys/security/mac/mac_vfs.c