Date: Thu, 25 Oct 2001 17:27:16 +1000 (EST) From: Bruce Evans <bde@zeta.org.au> To: John Baldwin <jhb@FreeBSD.org> Cc: Robert Watson <rwatson@FreeBSD.org>, <cvs-all@FreeBSD.org>, <cvs-committers@FreeBSD.org> Subject: RE: cvs commit: src/sys/sys socketvar.h Message-ID: <20011025172521.P77131-100000@delplex.bde.org> In-Reply-To: <XFMail.011024193708.jhb@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 24 Oct 2001, John Baldwin wrote: > On 25-Oct-01 Robert Watson wrote: > > rwatson 2001/10/24 19:03:37 PDT > > > > Modified files: > > sys/sys socketvar.h > > Log: > > o Remove extern showallsockets, defunct as of the change to > > kern.security.seeotheruids_permitted. This was missed in the > > commit that made this change elsewhere. > > As a somewhat unrelated sidenote: can you trim the name of that sysctl to > kern.security.seeotheruids, or perhaps to kern.security.see_other_uids (which > is easier on my eyes at least). It would seem that the '_permitted' is > redundant and not needed just as the old ps syctl was ps_showallprocs, not > ps_showallprocs_permitted. Please also trim the corresponding kernel variable name, and other long names. Index: kern_prot.c =================================================================== RCS file: /home/ncvs/src/sys/kern/kern_prot.c,v retrieving revision 1.115 diff -u -2 -r1.115 kern_prot.c --- kern_prot.c 11 Oct 2001 23:38:15 -0000 1.115 +++ kern_prot.c 12 Oct 2001 10:25:13 -0000 @@ -1351,8 +1297,10 @@ * of processes and sockets with credentials holding different real uid's * is possible using a variety of system MIBs. + * XXX: this variable is disgustingly verbosely named. + * XXX: data declarations should be together near the beginning of the file. */ static int kern_security_seeotheruids_permitted = 1; -SYSCTL_INT(_kern_security, OID_AUTO, seeotheruids_permitted, - CTLFLAG_RW, &kern_security_seeotheruids_permitted, 0, +SYSCTL_INT(_kern_security, OID_AUTO, seeotheruids_permitted, CTLFLAG_RW, + &kern_security_seeotheruids_permitted, 0, "Unprivileged processes may see subjects/objects with different real uid"); @@ -1516,4 +1463,8 @@ * * XXX: Should modifying and reading this variable require locking? + * XXX: this variable is disgustingly verbosely named, yet is not verbose + * enough to completely match the corresponding sysctl name which begins + * with `kern_security' instead of `kern'. + * XXX: data declarations should be together near the beginning of the file. */ static int kern_unprivileged_procdebug_permitted = 1; To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011025172521.P77131-100000>