diff options
author | arr <arr@FreeBSD.org> | 2002-01-16 06:55:30 +0000 |
---|---|---|
committer | arr <arr@FreeBSD.org> | 2002-01-16 06:55:30 +0000 |
commit | 1ae1e4e3f2015a0dd28a67d111327bf8b681ba37 (patch) | |
tree | e1d5ce61a8174cc7c8b01d4bdcaed7af9b80f626 /sys/kern/kern_jail.c | |
parent | 0ed7ba2c7402bdcb1b7ec738e669b00eefaed2b0 (diff) | |
download | FreeBSD-src-1ae1e4e3f2015a0dd28a67d111327bf8b681ba37.zip FreeBSD-src-1ae1e4e3f2015a0dd28a67d111327bf8b681ba37.tar.gz |
- Attempt to help declutter kern. sysctl by moving security out from
beneath it.
Reviewed by: rwatson
Diffstat (limited to 'sys/kern/kern_jail.c')
-rw-r--r-- | sys/kern/kern_jail.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/sys/kern/kern_jail.c b/sys/kern/kern_jail.c index 01ddc1e..0ae8d3f 100644 --- a/sys/kern/kern_jail.c +++ b/sys/kern/kern_jail.c @@ -28,24 +28,24 @@ MALLOC_DEFINE(M_PRISON, "prison", "Prison structures"); -SYSCTL_DECL(_kern_security); -SYSCTL_NODE(_kern_security, OID_AUTO, jail, CTLFLAG_RW, 0, +SYSCTL_DECL(_security); +SYSCTL_NODE(_security, OID_AUTO, jail, CTLFLAG_RW, 0, "Jail rules"); mp_fixme("these variables need a lock") int jail_set_hostname_allowed = 1; -SYSCTL_INT(_kern_security_jail, OID_AUTO, set_hostname_allowed, CTLFLAG_RW, +SYSCTL_INT(_security_jail, OID_AUTO, set_hostname_allowed, CTLFLAG_RW, &jail_set_hostname_allowed, 0, "Processes in jail can set their hostnames"); int jail_socket_unixiproute_only = 1; -SYSCTL_INT(_kern_security_jail, OID_AUTO, socket_unixiproute_only, CTLFLAG_RW, +SYSCTL_INT(_security_jail, OID_AUTO, socket_unixiproute_only, CTLFLAG_RW, &jail_socket_unixiproute_only, 0, "Processes in jail are limited to creating UNIX/IPv4/route sockets only"); int jail_sysvipc_allowed = 0; -SYSCTL_INT(_kern_security_jail, OID_AUTO, sysvipc_allowed, CTLFLAG_RW, +SYSCTL_INT(_security_jail, OID_AUTO, sysvipc_allowed, CTLFLAG_RW, &jail_sysvipc_allowed, 0, "Processes in jail can use System V IPC primitives"); |