diff options
Diffstat (limited to 'source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch')
-rw-r--r-- | source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch | 24 |
1 files changed, 24 insertions, 0 deletions
diff --git a/source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch b/source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch new file mode 100644 index 000000000..c61920309 --- /dev/null +++ b/source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch @@ -0,0 +1,24 @@ +From 645c32dd1a511527b7eb88443a28dfe7704d5f52 Mon Sep 17 00:00:00 2001 +From: Roy Marples <roy@marples.name> +Date: Fri, 26 Aug 2022 09:08:36 +0100 +Subject: [PATCH] privsep: Allow getrandom sysctl for newer glibc + +Fixes #120 +--- + src/privsep-linux.c | 3 +++ + 1 file changed, 3 insertions(+) + +diff --git a/src/privsep-linux.c b/src/privsep-linux.c +index c2de54ba..4d5c195d 100644 +--- a/src/privsep-linux.c ++++ b/src/privsep-linux.c +@@ -325,6 +325,9 @@ static struct sock_filter ps_seccomp_filter[] = { + #ifdef __NR_getpid + SECCOMP_ALLOW(__NR_getpid), + #endif ++#ifdef __NR_getrandom ++ SECCOMP_ALLOW(__NR_getrandom), ++#endif + #ifdef __NR_getsockopt + /* For route socket overflow */ + SECCOMP_ALLOW_ARG(__NR_getsockopt, 1, SOL_SOCKET), |