diff options
author | 2015-11-27 17:32:16 +0000 | |
---|---|---|
committer | 2015-11-27 17:32:16 +0000 | |
commit | 96f5b6085bee2524e53ef23070cfa284be3e84fa (patch) | |
tree | 714e0853638557677c4b526f35adad04f89eb782 | |
parent | spaces (diff) | |
download | wireguard-openbsd-96f5b6085bee2524e53ef23070cfa284be3e84fa.tar.xz wireguard-openbsd-96f5b6085bee2524e53ef23070cfa284be3e84fa.zip |
the rm code in mv inherited pledge from rm. it shoud be safe, but there
are cases when it is too strict. after pledge() we continue to run some
of the cp code which requires a very broad set of permissions.
remove pledge entirely for now, pending a complete analysis of needs.
-rw-r--r-- | bin/mv/rm.c | 4 |
1 files changed, 1 insertions, 3 deletions
diff --git a/bin/mv/rm.c b/bin/mv/rm.c index 5307d4e556c..afb60b8d72e 100644 --- a/bin/mv/rm.c +++ b/bin/mv/rm.c @@ -1,4 +1,4 @@ -/* $OpenBSD: rm.c,v 1.6 2015/11/17 19:39:18 tedu Exp $ */ +/* $OpenBSD: rm.c,v 1.7 2015/11/27 17:32:16 tedu Exp $ */ /* $NetBSD: rm.c,v 1.19 1995/09/07 06:48:50 jtc Exp $ */ /*- @@ -74,8 +74,6 @@ usage(void) int rmmain(int argc, char *argv[]) { - if (pledge("stdio rpath cpath getpw", NULL) == -1) - err(1, "pledge"); checkdot(argv); |