From 652935dc64c41a5889ea8d11d0e0b193d3dfee2e Mon Sep 17 00:00:00 2001 From: semarie <> Date: Mon, 2 May 2016 06:25:29 +0000 Subject: [PATCH] prepare userland for removing chroot(2) from allowed syscalls under pledge(2). for ntpd(8), removing the pledge call is a first step: futher redesign will occurs later. ok reyk@ benno@ --- src/usr.sbin/ntpd/ntpd.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/src/usr.sbin/ntpd/ntpd.c b/src/usr.sbin/ntpd/ntpd.c index 914027d8..1ba779cc 100644 --- a/src/usr.sbin/ntpd/ntpd.c +++ b/src/usr.sbin/ntpd/ntpd.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ntpd.c,v 1.106 2016/02/02 17:51:11 sthen Exp $ */ +/* $OpenBSD: ntpd.c,v 1.107 2016/05/02 06:25:29 semarie Exp $ */ /* * Copyright (c) 2003, 2004 Henning Brauer @@ -230,8 +230,10 @@ main(int argc, char *argv[]) * Constraint processes are forked with certificates in memory, * then privdrop into chroot before speaking to the outside world. */ +#if 0 if (pledge("stdio rpath inet settime proc id", NULL) == -1) err(1, "pledge"); +#endif while (quit == 0) { new_cnt = PFD_MAX + constraint_cnt;