diff options
author | 2016-05-02 06:21:26 +0000 | |
---|---|---|
committer | 2016-05-02 06:21:26 +0000 | |
commit | f51c152c2d88dc501b5151f6da465864da75b9db (patch) | |
tree | 80c84c3fd431c0f7471a4256c9c26485bcd1b540 | |
parent | add support for changing the bus width to ommmc and set the 4-bit mode (diff) | |
download | wireguard-openbsd-f51c152c2d88dc501b5151f6da465864da75b9db.tar.xz wireguard-openbsd-f51c152c2d88dc501b5151f6da465864da75b9db.zip |
prepare userland for removing chroot(2) from allowed syscalls under pledge(2).
in rebound(8), the worker is still chrooted (and pledged). The supervisor
process remains unpledged in order to create workers.
ok tedu@
-rw-r--r-- | usr.sbin/rebound/rebound.c | 5 |
1 files changed, 1 insertions, 4 deletions
diff --git a/usr.sbin/rebound/rebound.c b/usr.sbin/rebound/rebound.c index a3addaf22c2..83f6b349d9a 100644 --- a/usr.sbin/rebound/rebound.c +++ b/usr.sbin/rebound/rebound.c @@ -1,4 +1,4 @@ -/* $OpenBSD: rebound.c,v 1.60 2016/01/03 18:15:17 tedu Exp $ */ +/* $OpenBSD: rebound.c,v 1.61 2016/05/02 06:21:26 semarie Exp $ */ /* * Copyright (c) 2015 Ted Unangst <tedu@openbsd.org> * @@ -607,9 +607,6 @@ main(int argc, char **argv) const char *confname = "/etc/rebound.conf"; FILE *conf; - if (pledge("stdio rpath getpw inet proc id", NULL) == -1) - logerr("pledge failed"); - while ((ch = getopt(argc, argv, "c:d")) != -1) { switch (ch) { case 'c': |