mirror of
https://git.hardenedbsd.org/hardenedbsd/HardenedBSD.git
synced 2025-01-11 17:04:19 +01:00
Continue kernel privilege cleanup for 7.0: unstaticize suser_enabled and
stop declaring it in systm.h -- it's used only in kern_priv.c and is not required elsewhere. Approved by: re (kensmith)
This commit is contained in:
parent
2c5d31d556
commit
bc6eca2432
Notes:
svn2git
2020-12-20 02:59:44 +00:00
svn path=/head/; revision=171156
@ -51,7 +51,7 @@
|
||||
* userland programs, and should not be done without careful consideration of
|
||||
* the consequences.
|
||||
*/
|
||||
int suser_enabled = 1;
|
||||
static int suser_enabled = 1;
|
||||
SYSCTL_INT(_security_bsd, OID_AUTO, suser_enabled, CTLFLAG_RW,
|
||||
&suser_enabled, 0, "processes with uid 0 have privilege");
|
||||
TUNABLE_INT("security.bsd.suser_enabled", &suser_enabled);
|
||||
|
@ -46,7 +46,6 @@
|
||||
#include <sys/stdint.h> /* for people using printf mainly */
|
||||
|
||||
extern int securelevel; /* system security level (see init(8)) */
|
||||
extern int suser_enabled; /* suser() is permitted to return 0 */
|
||||
|
||||
extern int cold; /* nonzero if we are doing a cold boot */
|
||||
extern int rebooting; /* boot() has been called. */
|
||||
|
Loading…
Reference in New Issue
Block a user