diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-08-28 19:16:39 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-08-29 07:00:18 +0200 |
commit | 8fe30c981e3bc1da5586505695ee1880d1a257c8 (patch) | |
tree | dfceb3d814afa5c626ded36913d5f1989b988ed8 /source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch | |
parent | b6e39b8bd0a0b423978f04cdfa3d4604e35f5ad6 (diff) | |
download | current-8fe30c981e3bc1da5586505695ee1880d1a257c8.tar.gz current-8fe30c981e3bc1da5586505695ee1880d1a257c8.tar.xz |
Sun Aug 28 19:16:39 UTC 202220220828191639
d/ccache-4.6.3-x86_64-1.txz: Upgraded.
l/fmt-9.1.0-x86_64-1.txz: Upgraded.
l/imagemagick-7.1.0_47-x86_64-1.txz: Upgraded.
n/dhcpcd-9.4.1-x86_64-2.txz: Rebuilt.
[PATCH] privsep: Allow getrandom sysctl for newer glibc
[PATCH] privsep: Allow newfstatat syscall as well
Thanks to Roy Marples, marav, and nobodino.
t/texlive-2022.220801-x86_64-2.txz: Rebuilt.
Removed dangling texdoctk symlink.
Thanks to Johannes Schoepfer and marav.
Diffstat (limited to 'source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch')
-rw-r--r-- | source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch b/source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch new file mode 100644 index 000000000..c61920309 --- /dev/null +++ b/source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch @@ -0,0 +1,24 @@ +From 645c32dd1a511527b7eb88443a28dfe7704d5f52 Mon Sep 17 00:00:00 2001 +From: Roy Marples <roy@marples.name> +Date: Fri, 26 Aug 2022 09:08:36 +0100 +Subject: [PATCH] privsep: Allow getrandom sysctl for newer glibc + +Fixes #120 +--- + src/privsep-linux.c | 3 +++ + 1 file changed, 3 insertions(+) + +diff --git a/src/privsep-linux.c b/src/privsep-linux.c +index c2de54ba..4d5c195d 100644 +--- a/src/privsep-linux.c ++++ b/src/privsep-linux.c +@@ -325,6 +325,9 @@ static struct sock_filter ps_seccomp_filter[] = { + #ifdef __NR_getpid + SECCOMP_ALLOW(__NR_getpid), + #endif ++#ifdef __NR_getrandom ++ SECCOMP_ALLOW(__NR_getrandom), ++#endif + #ifdef __NR_getsockopt + /* For route socket overflow */ + SECCOMP_ALLOW_ARG(__NR_getsockopt, 1, SOL_SOCKET), |