From 6d5107b8266f06e6fdf6daf2ffc8191dbe171466 Mon Sep 17 00:00:00 2001 From: Stephen Hemminger Date: Thu, 17 Jun 2010 10:05:01 -0700 Subject: Remove AUDIT_SHELL option The concept of logging shell commands through audit subsystem is not useful because it is too hard to configure, requires special privledges, doesn't handle background commands, and is missing the necessary information... --- flags.c | 6 ------ 1 file changed, 6 deletions(-) (limited to 'flags.c') diff --git a/flags.c b/flags.c index e50d6dc..0c0868b 100644 --- a/flags.c +++ b/flags.c @@ -142,12 +142,6 @@ int restricted = 0; /* currently restricted */ int restricted_shell = 0; /* shell was started in restricted mode. */ #endif /* RESTRICTED_SHELL */ -#if defined (AUDIT_SHELL) -/* Non-zero means that this shell is audited. An audited shell records - each command that the root user executes. */ -int audited = 0; /* shell was started in audit mode. */ -#endif /* AUDIT_SHELL */ - /* Non-zero means that this shell is running in `privileged' mode. This is required if the shell is to run setuid. If the `-p' option is not supplied at startup, and the real and effective uids or gids -- cgit v1.2.3