aboutsummaryrefslogtreecommitdiff
path: root/plugins-root/check_icmp.c
diff options
context:
space:
mode:
authorGravatar Jan Wagner <waja@cyconet.org> 2014-07-06 12:58:04 +0200
committerGravatar Jan Wagner <waja@cyconet.org> 2014-07-06 13:29:24 +0200
commitba21e26443385dd283d08e0419ff6ff25fedd0e8 (patch)
treef4b531a4b6a39bfc195c23c23fd80d7fbae176cd /plugins-root/check_icmp.c
parent1a0467f672ae7a3cb8ecf35e9cbedc0cb4c6124e (diff)
downloadmonitoring-plugins-ba21e26443385dd283d08e0419ff6ff25fedd0e8.tar.gz
check_icmp/check_dhcp: disable check, if we are root
As it is possible to use capabilities(7) on linux or solaris privileges for example, it is not necessary in all cases to have those binaries making use of setuid.
Diffstat (limited to 'plugins-root/check_icmp.c')
-rw-r--r--plugins-root/check_icmp.c3
1 files changed, 0 insertions, 3 deletions
diff --git a/plugins-root/check_icmp.c b/plugins-root/check_icmp.c
index 4b4197d8..8b563e40 100644
--- a/plugins-root/check_icmp.c
+++ b/plugins-root/check_icmp.c
@@ -383,9 +383,6 @@ main(int argc, char **argv)
bindtextdomain (PACKAGE, LOCALEDIR);
textdomain (PACKAGE);
- /* print a helpful error message if geteuid != 0 */
- np_warn_if_not_root();
-
/* we only need to be setsuid when we get the sockets, so do
* that before pointer magic (esp. on network data) */
icmp_sockerrno = udp_sockerrno = tcp_sockerrno = sockets = 0;