diff options
| author | 2018-08-05 08:16:24 +0000 | |
|---|---|---|
| committer | 2018-08-05 08:16:24 +0000 | |
| commit | eea063d2bd2142b90b55603a38bc5656ba13d7ec (patch) | |
| tree | 43c4201c1ec259d9eb3072ae6767ba6075adbe8d /usr.sbin/switchd/proc.h | |
| parent | Revert back previous and remove cpath pledge(2) promise entirely. We decided (diff) | |
| download | wireguard-openbsd-eea063d2bd2142b90b55603a38bc5656ba13d7ec.tar.xz wireguard-openbsd-eea063d2bd2142b90b55603a38bc5656ba13d7ec.zip | |
Remove cpath pledge(2) promise. We decided that not deleting the unix control
sockets cause no harm and this way we close another attack surface by not
allowing the daemon to create/delete any more files.
OK akoshibe@ florian@
Diffstat (limited to 'usr.sbin/switchd/proc.h')
| -rw-r--r-- | usr.sbin/switchd/proc.h | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/usr.sbin/switchd/proc.h b/usr.sbin/switchd/proc.h index f219d1c379d..db857b68107 100644 --- a/usr.sbin/switchd/proc.h +++ b/usr.sbin/switchd/proc.h @@ -1,4 +1,4 @@ -/* $OpenBSD: proc.h,v 1.6 2017/01/09 14:49:22 reyk Exp $ */ +/* $OpenBSD: proc.h,v 1.7 2018/08/05 08:16:24 mestre Exp $ */ /* * Copyright (c) 2010-2015 Reyk Floeter <reyk@openbsd.org> @@ -160,7 +160,6 @@ int proc_flush_imsg(struct privsep *, enum privsep_procid, int); /* control.c */ int control_init(struct privsep *, struct control_sock *); int control_listen(struct control_sock *); -void control_cleanup(struct control_sock *); struct ctl_conn *control_connbyfd(int); void control(struct privsep *, struct privsep_proc *); |
