summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authordtucker <dtucker@openbsd.org>2013-04-17 09:04:09 +0000
committerdtucker <dtucker@openbsd.org>2013-04-17 09:04:09 +0000
commitea2cbbacbc7e4e2fdd452c24cb0c5e3a9a27c858 (patch)
tree03011342fb5f33cd952e7fad24080334e2858a01
parent%zu format for size_t. (diff)
downloadwireguard-openbsd-ea2cbbacbc7e4e2fdd452c24cb0c5e3a9a27c858.tar.xz
wireguard-openbsd-ea2cbbacbc7e4e2fdd452c24cb0c5e3a9a27c858.zip
revert rev 1.262; it fails because uid is already set here. ok djm@
-rw-r--r--usr.bin/ssh/session.c7
1 files changed, 2 insertions, 5 deletions
diff --git a/usr.bin/ssh/session.c b/usr.bin/ssh/session.c
index 5bc944093b9..8052f8e58d9 100644
--- a/usr.bin/ssh/session.c
+++ b/usr.bin/ssh/session.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: session.c,v 1.262 2013/03/06 23:35:23 djm Exp $ */
+/* $OpenBSD: session.c,v 1.263 2013/04/17 09:04:09 dtucker Exp $ */
/*
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
* All rights reserved
@@ -1216,10 +1216,7 @@ do_setusercontext(struct passwd *pw)
perror("unable to set user context (setuser)");
exit(1);
}
- } else if (options.chroot_directory != NULL &&
- strcasecmp(options.chroot_directory, "none") != 0)
- fatal("server lacks privileges to chroot to ChrootDirectory");
-
+ }
if (getuid() != pw->pw_uid || geteuid() != pw->pw_uid)
fatal("Failed to set uids to %u.", (u_int) pw->pw_uid);
}