GC a stray <sect3> from an earlier commit.
GC the sample policy modules section since there's nothing there yet. Obtained from: TrustedBSD Project Sponsored by: DARPA, Network Associates Laboratories
This commit is contained in:
parent
1d668180a6
commit
2b6ca199ef
Notes:
svn2git
2020-12-08 03:00:23 +00:00
svn path=/head/; revision=16613
2 changed files with 0 additions and 36 deletions
|
@ -7572,7 +7572,6 @@ Label destruction o</programlisting>
|
|||
calls are not permitted to fail (failure should be reported
|
||||
earlier in the relabel check).</para>
|
||||
|
||||
</sect3>
|
||||
</sect2>
|
||||
</sect1>
|
||||
|
||||
|
@ -7582,23 +7581,6 @@ Label destruction o</programlisting>
|
|||
<para>The userland API is still under development.</para>
|
||||
</sect1>
|
||||
|
||||
<sect1 id="mac-sample-modules">
|
||||
<title>Sample Policy Modules</title>
|
||||
|
||||
<para>The <filename>mac_none</filename> policy provides sample
|
||||
prototypes and registration of all available policy entry
|
||||
points.</para>
|
||||
|
||||
<para>The <filename>mac_seeotheruids</filename> policy provides
|
||||
a simple access control policy without the use of labeling,
|
||||
relying only on information already present in the kernel
|
||||
objects.</para>
|
||||
|
||||
<para>The <filename>mac_biba</filename> policy provides a sample
|
||||
information flow based labeled access control policy,
|
||||
assigning labels to all kernel objects.</para>
|
||||
</sect1>
|
||||
|
||||
<sect1 id="mac-conclusion">
|
||||
<title>Conclusion</title>
|
||||
|
||||
|
|
|
@ -7572,7 +7572,6 @@ Label destruction o</programlisting>
|
|||
calls are not permitted to fail (failure should be reported
|
||||
earlier in the relabel check).</para>
|
||||
|
||||
</sect3>
|
||||
</sect2>
|
||||
</sect1>
|
||||
|
||||
|
@ -7582,23 +7581,6 @@ Label destruction o</programlisting>
|
|||
<para>The userland API is still under development.</para>
|
||||
</sect1>
|
||||
|
||||
<sect1 id="mac-sample-modules">
|
||||
<title>Sample Policy Modules</title>
|
||||
|
||||
<para>The <filename>mac_none</filename> policy provides sample
|
||||
prototypes and registration of all available policy entry
|
||||
points.</para>
|
||||
|
||||
<para>The <filename>mac_seeotheruids</filename> policy provides
|
||||
a simple access control policy without the use of labeling,
|
||||
relying only on information already present in the kernel
|
||||
objects.</para>
|
||||
|
||||
<para>The <filename>mac_biba</filename> policy provides a sample
|
||||
information flow based labeled access control policy,
|
||||
assigning labels to all kernel objects.</para>
|
||||
</sect1>
|
||||
|
||||
<sect1 id="mac-conclusion">
|
||||
<title>Conclusion</title>
|
||||
|
||||
|
|
Loading…
Reference in a new issue