summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorrwatson <rwatson@FreeBSD.org>2007-07-02 14:03:29 +0000
committerrwatson <rwatson@FreeBSD.org>2007-07-02 14:03:29 +0000
commite95a48819f9b6d3b48a30f62ace338be6db7c580 (patch)
treee28ddcaae8bdad90bd226225f999a1a17bfbd4f6
parent4d070b972fcf2147626a07d3004add6e891d61b3 (diff)
downloadFreeBSD-src-e95a48819f9b6d3b48a30f62ace338be6db7c580.zip
FreeBSD-src-e95a48819f9b6d3b48a30f62ace338be6db7c580.tar.gz
Continue kernel privilege cleanup for 7.0: unstaticize suser_enabled and
stop declaring it in systm.h -- it's used only in kern_priv.c and is not required elsewhere. Approved by: re (kensmith)
-rw-r--r--sys/kern/kern_priv.c2
-rw-r--r--sys/sys/systm.h1
2 files changed, 1 insertions, 2 deletions
diff --git a/sys/kern/kern_priv.c b/sys/kern/kern_priv.c
index 307d134..1190cd4 100644
--- a/sys/kern/kern_priv.c
+++ b/sys/kern/kern_priv.c
@@ -51,7 +51,7 @@
* userland programs, and should not be done without careful consideration of
* the consequences.
*/
-int suser_enabled = 1;
+static int suser_enabled = 1;
SYSCTL_INT(_security_bsd, OID_AUTO, suser_enabled, CTLFLAG_RW,
&suser_enabled, 0, "processes with uid 0 have privilege");
TUNABLE_INT("security.bsd.suser_enabled", &suser_enabled);
diff --git a/sys/sys/systm.h b/sys/sys/systm.h
index c523378..13b7ef7 100644
--- a/sys/sys/systm.h
+++ b/sys/sys/systm.h
@@ -46,7 +46,6 @@
#include <sys/stdint.h> /* for people using printf mainly */
extern int securelevel; /* system security level (see init(8)) */
-extern int suser_enabled; /* suser() is permitted to return 0 */
extern int cold; /* nonzero if we are doing a cold boot */
extern int rebooting; /* boot() has been called. */
OpenPOWER on IntegriCloud