diff options
author | 2018-08-05 08:16:24 +0000 | |
---|---|---|
committer | 2018-08-05 08:16:24 +0000 | |
commit | eea063d2bd2142b90b55603a38bc5656ba13d7ec (patch) | |
tree | 43c4201c1ec259d9eb3072ae6767ba6075adbe8d /usr.sbin/switchd/proc.c | |
parent | Revert back previous and remove cpath pledge(2) promise entirely. We decided (diff) | |
download | wireguard-openbsd-eea063d2bd2142b90b55603a38bc5656ba13d7ec.tar.xz wireguard-openbsd-eea063d2bd2142b90b55603a38bc5656ba13d7ec.zip |
Remove cpath pledge(2) promise. We decided that not deleting the unix control
sockets cause no harm and this way we close another attack surface by not
allowing the daemon to create/delete any more files.
OK akoshibe@ florian@
Diffstat (limited to 'usr.sbin/switchd/proc.c')
-rw-r--r-- | usr.sbin/switchd/proc.c | 5 |
1 files changed, 1 insertions, 4 deletions
diff --git a/usr.sbin/switchd/proc.c b/usr.sbin/switchd/proc.c index 94ee34bfe9f..6a69d458fa6 100644 --- a/usr.sbin/switchd/proc.c +++ b/usr.sbin/switchd/proc.c @@ -1,4 +1,4 @@ -/* $OpenBSD: proc.c,v 1.12 2017/05/29 12:56:26 benno Exp $ */ +/* $OpenBSD: proc.c,v 1.13 2018/08/05 08:16:24 mestre Exp $ */ /* * Copyright (c) 2010 - 2016 Reyk Floeter <reyk@openbsd.org> @@ -475,9 +475,6 @@ proc_shutdown(struct privsep_proc *p) { struct privsep *ps = p->p_ps; - if (p->p_id == PROC_CONTROL && ps) - control_cleanup(&ps->ps_csock); - if (p->p_shutdown != NULL) (*p->p_shutdown)(); |