CVSROOT: /cvs Module name: src Changes by: dera...@cvs.openbsd.org 2015/10/19 19:44:00
Modified files: sys/sys : pledge.h sys/kern : kern_pledge.c uipc_syscalls.c Log message: Always allow the setsockopt & getsockopt system calls... however, in the default case only allows SOL_SOCKET SO_RCVBUF which is very common in network-facing daemons. Many of them manage this on a socket after dropping abilities which can get them _new_ sockets.. syslogd, bgpd, relayd, etc etc. Other sockopts still require specific pledges. Tested by bluhm.