summaryrefslogtreecommitdiffstats
path: root/sys/kern/kern_prot.c
diff options
context:
space:
mode:
authorrwatson <rwatson@FreeBSD.org>2001-11-30 21:33:16 +0000
committerrwatson <rwatson@FreeBSD.org>2001-11-30 21:33:16 +0000
commit68b9d3708b5fb244dc13d9b8d4182585e3ea9b5b (patch)
treecb060a94309ce3a0485369d831d220f792fa8bfd /sys/kern/kern_prot.c
parenta9aad3d379fc94cc2c75cafaabac7e261d0ad3cd (diff)
downloadFreeBSD-src-68b9d3708b5fb244dc13d9b8d4182585e3ea9b5b.zip
FreeBSD-src-68b9d3708b5fb244dc13d9b8d4182585e3ea9b5b.tar.gz
o Further sysctl name simplification, generally stripping 'permitted',
using '_'s more consistently. Discussed with: bde, jhb Obtained from: TrustedBSD Project Sponsored by: DARPA, NAI Labs
Diffstat (limited to 'sys/kern/kern_prot.c')
-rw-r--r--sys/kern/kern_prot.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/sys/kern/kern_prot.c b/sys/kern/kern_prot.c
index 17ee58b..96d81b2 100644
--- a/sys/kern/kern_prot.c
+++ b/sys/kern/kern_prot.c
@@ -1357,13 +1357,13 @@ securelevel_ge(struct ucred *cr, int level)
}
/*
- * 'seeotheruids_permitted' determines whether or not visibility of processes
+ * 'see_other_uids' determines whether or not visibility of processes
* and sockets with credentials holding different real uid's is possible
* using a variety of system MIBs.
*/
-static int seeotheruids_permitted = 1;
-SYSCTL_INT(_kern_security_bsd, OID_AUTO, seeotheruids_permitted,
- CTLFLAG_RW, &seeotheruids_permitted, 0,
+static int see_other_uids = 1;
+SYSCTL_INT(_kern_security_bsd, OID_AUTO, see_other_uids,
+ CTLFLAG_RW, &see_other_uids, 0,
"Unprivileged processes may see subjects/objects with different real uid");
/*-
@@ -1381,7 +1381,7 @@ cr_cansee(struct ucred *u1, struct ucred *u2)
if ((error = prison_check(u1, u2)))
return (error);
- if (!seeotheruids_permitted && u1->cr_ruid != u2->cr_ruid) {
+ if (!see_other_uids && u1->cr_ruid != u2->cr_ruid) {
if (suser_xxx(u1, NULL, PRISON_ROOT) != 0)
return (ESRCH);
}
@@ -1525,9 +1525,9 @@ p_cansched(struct proc *p1, struct proc *p2)
*
* XXX: Should modifying and reading this variable require locking?
*/
-static int unprivileged_procdebug_permitted = 1;
-SYSCTL_INT(_kern_security_bsd, OID_AUTO, unprivileged_procdebug_permitted,
- CTLFLAG_RW, &unprivileged_procdebug_permitted, 0,
+static int unprivileged_proc_debug = 1;
+SYSCTL_INT(_kern_security_bsd, OID_AUTO, unprivileged_proc_debug,
+ CTLFLAG_RW, &unprivileged_proc_debug, 0,
"Unprivileged processes may use process debugging facilities");
/*-
@@ -1543,7 +1543,7 @@ p_candebug(struct proc *p1, struct proc *p2)
{
int error, i, grpsubset, uidsubset, credentialchanged;
- if (!unprivileged_procdebug_permitted) {
+ if (!unprivileged_proc_debug) {
error = suser_xxx(NULL, p1, PRISON_ROOT);
if (error)
return (error);
OpenPOWER on IntegriCloud