diff options
author | rwatson <rwatson@FreeBSD.org> | 2007-07-02 14:03:29 +0000 |
---|---|---|
committer | rwatson <rwatson@FreeBSD.org> | 2007-07-02 14:03:29 +0000 |
commit | e95a48819f9b6d3b48a30f62ace338be6db7c580 (patch) | |
tree | e28ddcaae8bdad90bd226225f999a1a17bfbd4f6 /sys/kern/kern_priv.c | |
parent | 4d070b972fcf2147626a07d3004add6e891d61b3 (diff) | |
download | FreeBSD-src-e95a48819f9b6d3b48a30f62ace338be6db7c580.zip FreeBSD-src-e95a48819f9b6d3b48a30f62ace338be6db7c580.tar.gz |
Continue kernel privilege cleanup for 7.0: unstaticize suser_enabled and
stop declaring it in systm.h -- it's used only in kern_priv.c and is not
required elsewhere.
Approved by: re (kensmith)
Diffstat (limited to 'sys/kern/kern_priv.c')
-rw-r--r-- | sys/kern/kern_priv.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/sys/kern/kern_priv.c b/sys/kern/kern_priv.c index 307d134..1190cd4 100644 --- a/sys/kern/kern_priv.c +++ b/sys/kern/kern_priv.c @@ -51,7 +51,7 @@ * userland programs, and should not be done without careful consideration of * the consequences. */ -int suser_enabled = 1; +static int suser_enabled = 1; SYSCTL_INT(_security_bsd, OID_AUTO, suser_enabled, CTLFLAG_RW, &suser_enabled, 0, "processes with uid 0 have privilege"); TUNABLE_INT("security.bsd.suser_enabled", &suser_enabled); |