summaryrefslogtreecommitdiffstats
path: root/usr.sbin/switchd/proc.h
diff options
context:
space:
mode:
authormestre <mestre@openbsd.org>2018-08-05 08:16:24 +0000
committermestre <mestre@openbsd.org>2018-08-05 08:16:24 +0000
commiteea063d2bd2142b90b55603a38bc5656ba13d7ec (patch)
tree43c4201c1ec259d9eb3072ae6767ba6075adbe8d /usr.sbin/switchd/proc.h
parentRevert back previous and remove cpath pledge(2) promise entirely. We decided (diff)
downloadwireguard-openbsd-eea063d2bd2142b90b55603a38bc5656ba13d7ec.tar.xz
wireguard-openbsd-eea063d2bd2142b90b55603a38bc5656ba13d7ec.zip
Remove cpath pledge(2) promise. We decided that not deleting the unix control
sockets cause no harm and this way we close another attack surface by not allowing the daemon to create/delete any more files. OK akoshibe@ florian@
Diffstat (limited to 'usr.sbin/switchd/proc.h')
-rw-r--r--usr.sbin/switchd/proc.h3
1 files changed, 1 insertions, 2 deletions
diff --git a/usr.sbin/switchd/proc.h b/usr.sbin/switchd/proc.h
index f219d1c379d..db857b68107 100644
--- a/usr.sbin/switchd/proc.h
+++ b/usr.sbin/switchd/proc.h
@@ -1,4 +1,4 @@
-/* $OpenBSD: proc.h,v 1.6 2017/01/09 14:49:22 reyk Exp $ */
+/* $OpenBSD: proc.h,v 1.7 2018/08/05 08:16:24 mestre Exp $ */
/*
* Copyright (c) 2010-2015 Reyk Floeter <reyk@openbsd.org>
@@ -160,7 +160,6 @@ int proc_flush_imsg(struct privsep *, enum privsep_procid, int);
/* control.c */
int control_init(struct privsep *, struct control_sock *);
int control_listen(struct control_sock *);
-void control_cleanup(struct control_sock *);
struct ctl_conn
*control_connbyfd(int);
void control(struct privsep *, struct privsep_proc *);