Remove sysctl security.jail.list_allowed.

This functionality was a misfeature, sysctl was added and turned off by
default just to check if nobody complains.

Reviewed by:	rwatson
This commit is contained in:
Pawel Jakub Dawidek 2004-03-15 12:10:34 +00:00
parent 498e55436a
commit 7f4704c01d

View File

@ -59,11 +59,6 @@ SYSCTL_INT(_security_jail, OID_AUTO, getfsstate_getfsstatroot_only, CTLFLAG_RW,
&jail_getfsstatroot_only, 0,
"Processes see only their root file system in getfsstat()");
int jail_list_allowed = 0;
SYSCTL_INT(_security_jail, OID_AUTO, list_allowed, CTLFLAG_RW,
&jail_list_allowed, 0,
"Processes in jail can access system jail list");
/* allprison, lastprid, and prisoncount are protected by allprison_mtx. */
struct prisonlist allprison;
struct mtx allprison_mtx;
@ -451,7 +446,7 @@ sysctl_jail_list(SYSCTL_HANDLER_ARGS)
int count, error;
mtx_assert(&Giant, MA_OWNED);
if (jailed(req->td->td_ucred) && !jail_list_allowed)
if (jailed(req->td->td_ucred))
return (0);
retry:
mtx_lock(&allprison_mtx);