GC a stray <sect3> from an earlier commit.

GC the sample policy modules section since there's nothing there yet.

Obtained from:	TrustedBSD Project
Sponsored by:	DARPA, Network Associates Laboratories
This commit is contained in:
Robert Watson 2003-04-20 04:17:22 +00:00
parent 1d668180a6
commit 2b6ca199ef
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=16613
2 changed files with 0 additions and 36 deletions

View file

@ -7572,7 +7572,6 @@ Label destruction o</programlisting>
calls are not permitted to fail (failure should be reported
earlier in the relabel check).</para>
</sect3>
</sect2>
</sect1>
@ -7582,23 +7581,6 @@ Label destruction o</programlisting>
<para>The userland API is still under development.</para>
</sect1>
<sect1 id="mac-sample-modules">
<title>Sample Policy Modules</title>
<para>The <filename>mac_none</filename> policy provides sample
prototypes and registration of all available policy entry
points.</para>
<para>The <filename>mac_seeotheruids</filename> policy provides
a simple access control policy without the use of labeling,
relying only on information already present in the kernel
objects.</para>
<para>The <filename>mac_biba</filename> policy provides a sample
information flow based labeled access control policy,
assigning labels to all kernel objects.</para>
</sect1>
<sect1 id="mac-conclusion">
<title>Conclusion</title>

View file

@ -7572,7 +7572,6 @@ Label destruction o</programlisting>
calls are not permitted to fail (failure should be reported
earlier in the relabel check).</para>
</sect3>
</sect2>
</sect1>
@ -7582,23 +7581,6 @@ Label destruction o</programlisting>
<para>The userland API is still under development.</para>
</sect1>
<sect1 id="mac-sample-modules">
<title>Sample Policy Modules</title>
<para>The <filename>mac_none</filename> policy provides sample
prototypes and registration of all available policy entry
points.</para>
<para>The <filename>mac_seeotheruids</filename> policy provides
a simple access control policy without the use of labeling,
relying only on information already present in the kernel
objects.</para>
<para>The <filename>mac_biba</filename> policy provides a sample
information flow based labeled access control policy,
assigning labels to all kernel objects.</para>
</sect1>
<sect1 id="mac-conclusion">
<title>Conclusion</title>