diff options
author | rwatson <rwatson@FreeBSD.org> | 2000-06-05 18:30:55 +0000 |
---|---|---|
committer | rwatson <rwatson@FreeBSD.org> | 2000-06-05 18:30:55 +0000 |
commit | 0b4c36a2ec9f11865986e9fa772847539fa0d5a3 (patch) | |
tree | 0c668bc7694b3c2865cf3a27789d7144bb295413 /sys/kern/kern_mib.c | |
parent | c2edee8c58862fb74d9655a3a5807c1466e0abc6 (diff) | |
download | FreeBSD-src-0b4c36a2ec9f11865986e9fa772847539fa0d5a3.zip FreeBSD-src-0b4c36a2ec9f11865986e9fa772847539fa0d5a3.tar.gz |
o bde suggested moving the SYSCTL from kern_mib to the more appropriate
kern_prot, which cleans up some namespace issues
o Don't need a special handler to limit un-setting, as suser is used to
protect suser_permitted, making it one-way by definition.
Suggested by: bde
Diffstat (limited to 'sys/kern/kern_mib.c')
-rw-r--r-- | sys/kern/kern_mib.c | 27 |
1 files changed, 0 insertions, 27 deletions
diff --git a/sys/kern/kern_mib.c b/sys/kern/kern_mib.c index bc480c3..2fdfde5 100644 --- a/sys/kern/kern_mib.c +++ b/sys/kern/kern_mib.c @@ -179,33 +179,6 @@ sysctl_kern_securelvl SYSCTL_HANDLER_ARGS return (error); } -SYSCTL_PROC(_kern, KERN_SECURELVL, securelevel, CTLTYPE_INT|CTLFLAG_RW, - 0, 0, sysctl_kern_securelvl, "I", "Current secure level"); - -int suser_permitted = 1; - -static int -sysctl_kern_suser_permitted SYSCTL_HANDLER_ARGS -{ - int error, flag; - - flag = suser_permitted; - - error = sysctl_handle_int(oidp, &flag, 0, req); - if (error || !req->newptr) - return (error); - if (flag != 0 && flag != 1) - return(EPERM); - if (!suser_permitted) - return(EPERM); - suser_permitted = flag; - return (0); -} - -SYSCTL_PROC(_kern, OID_AUTO, suser_permitted, - CTLTYPE_INT|CTLFLAG_RW, 0, 0, sysctl_kern_suser_permitted, "I", - "processes with uid 0 have privilege"); - char domainname[MAXHOSTNAMELEN]; SYSCTL_STRING(_kern, KERN_NISDOMAINNAME, domainname, CTLFLAG_RW, &domainname, sizeof(domainname), "Name of the current YP/NIS domain"); |