Add tunables for the existing sysctl twiddles for pipe and vm
enforcement so they can be disabled prior to kernel start. Obtained from: TrustedBSD Project Sponsored by: DARPA, Network Associates Laboratories
This commit is contained in:
parent
70d4d0c0f5
commit
c031391bd5
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=104236
@ -133,6 +133,7 @@ TUNABLE_INT("security.mac.enforce_network", &mac_enforce_network);
|
||||
static int mac_enforce_pipe = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_pipe, CTLFLAG_RW,
|
||||
&mac_enforce_pipe, 0, "Enforce MAC policy on pipe operations");
|
||||
TUNABLE_INT("security.mac.enforce_pipe", &mac_enforce_pipe);
|
||||
|
||||
static int mac_enforce_process = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_process, CTLFLAG_RW,
|
||||
@ -147,6 +148,7 @@ TUNABLE_INT("security.mac.enforce_socket", &mac_enforce_socket);
|
||||
static int mac_enforce_vm = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_vm, CTLFLAG_RW,
|
||||
&mac_enforce_vm, 0, "Enforce MAC policy on vm operations");
|
||||
TUNABLE_INT("security.mac.enforce_vm", &mac_enforce_vm);
|
||||
|
||||
static int mac_label_size = sizeof(struct mac);
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, label_size, CTLFLAG_RD,
|
||||
|
@ -133,6 +133,7 @@ TUNABLE_INT("security.mac.enforce_network", &mac_enforce_network);
|
||||
static int mac_enforce_pipe = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_pipe, CTLFLAG_RW,
|
||||
&mac_enforce_pipe, 0, "Enforce MAC policy on pipe operations");
|
||||
TUNABLE_INT("security.mac.enforce_pipe", &mac_enforce_pipe);
|
||||
|
||||
static int mac_enforce_process = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_process, CTLFLAG_RW,
|
||||
@ -147,6 +148,7 @@ TUNABLE_INT("security.mac.enforce_socket", &mac_enforce_socket);
|
||||
static int mac_enforce_vm = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_vm, CTLFLAG_RW,
|
||||
&mac_enforce_vm, 0, "Enforce MAC policy on vm operations");
|
||||
TUNABLE_INT("security.mac.enforce_vm", &mac_enforce_vm);
|
||||
|
||||
static int mac_label_size = sizeof(struct mac);
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, label_size, CTLFLAG_RD,
|
||||
|
@ -133,6 +133,7 @@ TUNABLE_INT("security.mac.enforce_network", &mac_enforce_network);
|
||||
static int mac_enforce_pipe = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_pipe, CTLFLAG_RW,
|
||||
&mac_enforce_pipe, 0, "Enforce MAC policy on pipe operations");
|
||||
TUNABLE_INT("security.mac.enforce_pipe", &mac_enforce_pipe);
|
||||
|
||||
static int mac_enforce_process = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_process, CTLFLAG_RW,
|
||||
@ -147,6 +148,7 @@ TUNABLE_INT("security.mac.enforce_socket", &mac_enforce_socket);
|
||||
static int mac_enforce_vm = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_vm, CTLFLAG_RW,
|
||||
&mac_enforce_vm, 0, "Enforce MAC policy on vm operations");
|
||||
TUNABLE_INT("security.mac.enforce_vm", &mac_enforce_vm);
|
||||
|
||||
static int mac_label_size = sizeof(struct mac);
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, label_size, CTLFLAG_RD,
|
||||
|
@ -133,6 +133,7 @@ TUNABLE_INT("security.mac.enforce_network", &mac_enforce_network);
|
||||
static int mac_enforce_pipe = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_pipe, CTLFLAG_RW,
|
||||
&mac_enforce_pipe, 0, "Enforce MAC policy on pipe operations");
|
||||
TUNABLE_INT("security.mac.enforce_pipe", &mac_enforce_pipe);
|
||||
|
||||
static int mac_enforce_process = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_process, CTLFLAG_RW,
|
||||
@ -147,6 +148,7 @@ TUNABLE_INT("security.mac.enforce_socket", &mac_enforce_socket);
|
||||
static int mac_enforce_vm = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_vm, CTLFLAG_RW,
|
||||
&mac_enforce_vm, 0, "Enforce MAC policy on vm operations");
|
||||
TUNABLE_INT("security.mac.enforce_vm", &mac_enforce_vm);
|
||||
|
||||
static int mac_label_size = sizeof(struct mac);
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, label_size, CTLFLAG_RD,
|
||||
|
@ -133,6 +133,7 @@ TUNABLE_INT("security.mac.enforce_network", &mac_enforce_network);
|
||||
static int mac_enforce_pipe = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_pipe, CTLFLAG_RW,
|
||||
&mac_enforce_pipe, 0, "Enforce MAC policy on pipe operations");
|
||||
TUNABLE_INT("security.mac.enforce_pipe", &mac_enforce_pipe);
|
||||
|
||||
static int mac_enforce_process = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_process, CTLFLAG_RW,
|
||||
@ -147,6 +148,7 @@ TUNABLE_INT("security.mac.enforce_socket", &mac_enforce_socket);
|
||||
static int mac_enforce_vm = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_vm, CTLFLAG_RW,
|
||||
&mac_enforce_vm, 0, "Enforce MAC policy on vm operations");
|
||||
TUNABLE_INT("security.mac.enforce_vm", &mac_enforce_vm);
|
||||
|
||||
static int mac_label_size = sizeof(struct mac);
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, label_size, CTLFLAG_RD,
|
||||
|
@ -133,6 +133,7 @@ TUNABLE_INT("security.mac.enforce_network", &mac_enforce_network);
|
||||
static int mac_enforce_pipe = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_pipe, CTLFLAG_RW,
|
||||
&mac_enforce_pipe, 0, "Enforce MAC policy on pipe operations");
|
||||
TUNABLE_INT("security.mac.enforce_pipe", &mac_enforce_pipe);
|
||||
|
||||
static int mac_enforce_process = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_process, CTLFLAG_RW,
|
||||
@ -147,6 +148,7 @@ TUNABLE_INT("security.mac.enforce_socket", &mac_enforce_socket);
|
||||
static int mac_enforce_vm = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_vm, CTLFLAG_RW,
|
||||
&mac_enforce_vm, 0, "Enforce MAC policy on vm operations");
|
||||
TUNABLE_INT("security.mac.enforce_vm", &mac_enforce_vm);
|
||||
|
||||
static int mac_label_size = sizeof(struct mac);
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, label_size, CTLFLAG_RD,
|
||||
|
@ -133,6 +133,7 @@ TUNABLE_INT("security.mac.enforce_network", &mac_enforce_network);
|
||||
static int mac_enforce_pipe = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_pipe, CTLFLAG_RW,
|
||||
&mac_enforce_pipe, 0, "Enforce MAC policy on pipe operations");
|
||||
TUNABLE_INT("security.mac.enforce_pipe", &mac_enforce_pipe);
|
||||
|
||||
static int mac_enforce_process = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_process, CTLFLAG_RW,
|
||||
@ -147,6 +148,7 @@ TUNABLE_INT("security.mac.enforce_socket", &mac_enforce_socket);
|
||||
static int mac_enforce_vm = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_vm, CTLFLAG_RW,
|
||||
&mac_enforce_vm, 0, "Enforce MAC policy on vm operations");
|
||||
TUNABLE_INT("security.mac.enforce_vm", &mac_enforce_vm);
|
||||
|
||||
static int mac_label_size = sizeof(struct mac);
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, label_size, CTLFLAG_RD,
|
||||
|
@ -133,6 +133,7 @@ TUNABLE_INT("security.mac.enforce_network", &mac_enforce_network);
|
||||
static int mac_enforce_pipe = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_pipe, CTLFLAG_RW,
|
||||
&mac_enforce_pipe, 0, "Enforce MAC policy on pipe operations");
|
||||
TUNABLE_INT("security.mac.enforce_pipe", &mac_enforce_pipe);
|
||||
|
||||
static int mac_enforce_process = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_process, CTLFLAG_RW,
|
||||
@ -147,6 +148,7 @@ TUNABLE_INT("security.mac.enforce_socket", &mac_enforce_socket);
|
||||
static int mac_enforce_vm = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_vm, CTLFLAG_RW,
|
||||
&mac_enforce_vm, 0, "Enforce MAC policy on vm operations");
|
||||
TUNABLE_INT("security.mac.enforce_vm", &mac_enforce_vm);
|
||||
|
||||
static int mac_label_size = sizeof(struct mac);
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, label_size, CTLFLAG_RD,
|
||||
|
@ -133,6 +133,7 @@ TUNABLE_INT("security.mac.enforce_network", &mac_enforce_network);
|
||||
static int mac_enforce_pipe = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_pipe, CTLFLAG_RW,
|
||||
&mac_enforce_pipe, 0, "Enforce MAC policy on pipe operations");
|
||||
TUNABLE_INT("security.mac.enforce_pipe", &mac_enforce_pipe);
|
||||
|
||||
static int mac_enforce_process = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_process, CTLFLAG_RW,
|
||||
@ -147,6 +148,7 @@ TUNABLE_INT("security.mac.enforce_socket", &mac_enforce_socket);
|
||||
static int mac_enforce_vm = 1;
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, enforce_vm, CTLFLAG_RW,
|
||||
&mac_enforce_vm, 0, "Enforce MAC policy on vm operations");
|
||||
TUNABLE_INT("security.mac.enforce_vm", &mac_enforce_vm);
|
||||
|
||||
static int mac_label_size = sizeof(struct mac);
|
||||
SYSCTL_INT(_security_mac, OID_AUTO, label_size, CTLFLAG_RD,
|
||||
|
Loading…
Reference in New Issue
Block a user