summaryrefslogtreecommitdiff
path: root/sys/kern/kern_exec.c
diff options
context:
space:
mode:
authorTheo de Raadt <deraadt@cvs.openbsd.org>1998-06-27 07:32:14 +0000
committerTheo de Raadt <deraadt@cvs.openbsd.org>1998-06-27 07:32:14 +0000
commitbf9928833e266260436d77a345724aa6ce1d7edd (patch)
tree8c791c77e8eb8bbfc725388b2ae8239c0e1aa26f /sys/kern/kern_exec.c
parent8887c4463087928913ef641714aab0e3fdfd7a98 (diff)
securelevels do NOT protect running binaries; only filesystem activity
Diffstat (limited to 'sys/kern/kern_exec.c')
-rw-r--r--sys/kern/kern_exec.c4
1 files changed, 1 insertions, 3 deletions
diff --git a/sys/kern/kern_exec.c b/sys/kern/kern_exec.c
index 8e198fc5105..1c7ccd95528 100644
--- a/sys/kern/kern_exec.c
+++ b/sys/kern/kern_exec.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: kern_exec.c,v 1.18 1998/06/09 17:23:04 deraadt Exp $ */
+/* $OpenBSD: kern_exec.c,v 1.19 1998/06/27 07:32:12 deraadt Exp $ */
/* $NetBSD: kern_exec.c,v 1.75 1996/02/09 18:59:28 christos Exp $ */
/*-
@@ -127,8 +127,6 @@ check_exec(p, epp)
if ((vp->v_mount->mnt_flag & MNT_NOSUID) ||
(p->p_flag & P_TRACED) || p->p_fd->fd_refcnt > 1)
epp->ep_vap->va_mode &= ~(VSUID | VSGID);
- if (p->p_flag & P_TRACED && (epp->ep_vap->va_flags & IMMUTABLE))
- goto bad1;
/* check access. for root we have to see if any exec bit on */
if ((error = VOP_ACCESS(vp, VEXEC, p->p_ucred, p)) != 0)