-/* $OpenBSD: main.c,v 1.61 2015/10/10 00:10:07 deraadt Exp $ */
+/* $OpenBSD: main.c,v 1.62 2015/10/10 20:35:00 deraadt Exp $ */
/*
* startup, main loop, environments and error handling
kshname = argv[0];
#ifndef MKNOD
- if (pledge("stdio rpath wpath cpath getpw fattr proc exec tty", NULL) == -1)
+ if (pledge("stdio rpath wpath cpath fattr getpw proc exec tty", NULL) == -1)
perror("pledge");
#endif
-/* $OpenBSD: comsat.c,v 1.42 2015/10/09 17:09:06 deraadt Exp $ */
+/* $OpenBSD: comsat.c,v 1.43 2015/10/10 20:35:00 deraadt Exp $ */
/*
* Copyright (c) 1980, 1993
char msgbuf[100];
sigset_t sigset;
- if (pledge("stdio rpath wpath tty proc", NULL) == -1)
+ if (pledge("stdio rpath wpath proc tty", NULL) == -1)
err(1, "pledge");
/* verify proper invocation */
-/* $OpenBSD: find.c,v 1.19 2015/10/09 01:37:07 deraadt Exp $ */
+/* $OpenBSD: find.c,v 1.20 2015/10/10 20:35:00 deraadt Exp $ */
/*-
* Copyright (c) 1991, 1993
PLAN *p;
if (mayexecve == 0)
- if (pledge("stdio getpw rpath", NULL) == -1)
+ if (pledge("stdio rpath getpw", NULL) == -1)
err(1, "pledge");
rval = 0;
-/* $OpenBSD: finger.c,v 1.22 2015/10/09 01:37:07 deraadt Exp $ */
+/* $OpenBSD: finger.c,v 1.23 2015/10/10 20:35:00 deraadt Exp $ */
/*
* Copyright (c) 1989 The Regents of the University of California.
mflag++;
}
- if (pledge("stdio getpw rpath inet", NULL) == -1)
+ if (pledge("stdio rpath getpw inet", NULL) == -1)
err(1, "pledge");
(void)time(&now);
* not selected. Force the -s BEFORE we get names so proper
* screening will be done.
*/
- if (pledge("stdio getpw rpath", NULL) == -1)
+ if (pledge("stdio rpath getpw", NULL) == -1)
err(1, "pledge");
if (!lflag)
sflag = 1; /* if -l not explicit, force -s */
goto net;
if (nettail == &nethead)
- if (pledge("stdio getpw rpath", NULL) == -1)
+ if (pledge("stdio rpath getpw", NULL) == -1)
err(1, "pledge");
/*
-/* $OpenBSD: kdump.c,v 1.114 2015/10/10 19:19:46 deraadt Exp $ */
+/* $OpenBSD: kdump.c,v 1.115 2015/10/10 20:35:00 deraadt Exp $ */
/*-
* Copyright (c) 1988, 1993
if (argc > optind)
usage();
- if (pledge("stdio getpw rpath", NULL) == -1)
+ if (pledge("stdio rpath getpw", NULL) == -1)
err(1, "pledge");
m = malloc(size = 1025);
-/* $OpenBSD: lock.c,v 1.30 2015/10/09 01:37:08 deraadt Exp $ */
+/* $OpenBSD: lock.c,v 1.31 2015/10/10 20:35:01 deraadt Exp $ */
/* $NetBSD: lock.c,v 1.8 1996/05/07 18:32:31 jtc Exp $ */
/*
usemine = 0;
no_timeout = 0;
- if (pledge("stdio getpw rpath wpath tty", NULL) == -1)
+ if (pledge("stdio rpath wpath getpw tty", NULL) == -1)
err(1, "pledge");
if (!(pw = getpwuid(getuid())))
-/* $OpenBSD: rcsprog.c,v 1.157 2015/10/10 18:58:53 deraadt Exp $ */
+/* $OpenBSD: rcsprog.c,v 1.158 2015/10/10 20:35:01 deraadt Exp $ */
/*
* Copyright (c) 2005 Jean-Francois Brousseau <jfb@openbsd.org>
* All rights reserved.
char **cmd_argv;
int ret, cmd_argc;
- if (pledge("stdio getpw rpath wpath cpath fattr", NULL) == -1)
+ if (pledge("stdio rpath wpath cpath fattr getpw", NULL) == -1)
err(1, "pledge");
ret = -1;
-/* $OpenBSD: sendbug.c,v 1.70 2015/10/10 19:10:20 deraadt Exp $ */
+/* $OpenBSD: sendbug.c,v 1.71 2015/10/10 20:35:01 deraadt Exp $ */
/*
* Written by Ray Lai <ray@cyth.net>.
time_t mtime;
FILE *fp;
- if (pledge("stdio getpw rpath wpath cpath tmppath proc exec", NULL) == -1)
+ if (pledge("stdio rpath wpath cpath tmppath getpw proc exec", NULL) == -1)
err(1, "pledge");
while ((ch = getopt(argc, argv, "DEPV")) != -1)
-/* $OpenBSD: stat.c,v 1.20 2015/10/09 01:37:08 deraadt Exp $ */
+/* $OpenBSD: stat.c,v 1.21 2015/10/10 20:35:01 deraadt Exp $ */
/* $NetBSD: stat.c,v 1.19 2004/06/20 22:20:16 jmc Exp $ */
/*
int lsF, fmtchar, usestat, fn, nonl, quiet;
char *statfmt, *options, *synopsis;
- if (pledge("stdio getpw rpath", NULL) == -1)
+ if (pledge("stdio rpath getpw", NULL) == -1)
err(1, "pledge");
lsF = 0;
-/* $OpenBSD: syslogd.c,v 1.194 2015/10/09 16:58:25 bluhm Exp $ */
+/* $OpenBSD: syslogd.c,v 1.195 2015/10/10 20:35:01 deraadt Exp $ */
/*
* Copyright (c) 1983, 1988, 1993, 1994
if (priv_init(ConfFile, NoDNS, lockpipe[1], nullfd, argv) < 0)
errx(1, "unable to privsep");
- if (pledge("stdio rpath unix inet recvfd proc", NULL) == -1)
+ if (pledge("stdio rpath unix inet proc recvfd", NULL) == -1)
err(1, "pledge");
/* Process is now unprivileged and inside a chroot */