diff options
author | Michael Mair-Keimberger <m.mairkeimberger@gmail.com> | 2019-12-06 12:06:28 +0100 |
---|---|---|
committer | Aaron Bauman <bman@gentoo.org> | 2019-12-06 10:38:31 -0500 |
commit | 14d456b24053c1d2f1f06a2c2282e17df8b779eb (patch) | |
tree | ba56a46274c42049c3938b2d4fce8c2eb0587430 /net-misc/lldpd | |
parent | sys-boot/elilo: remove unused patches (diff) | |
download | gentoo-14d456b24053c1d2f1f06a2c2282e17df8b779eb.tar.gz gentoo-14d456b24053c1d2f1f06a2c2282e17df8b779eb.tar.bz2 gentoo-14d456b24053c1d2f1f06a2c2282e17df8b779eb.zip |
net-misc/lldpd: remove unused patch
Signed-off-by: Michael Mair-Keimberger <m.mairkeimberger@gmail.com>
Closes: https://github.com/gentoo/gentoo/pull/13892
Signed-off-by: Aaron Bauman <bman@gentoo.org>
Diffstat (limited to 'net-misc/lldpd')
-rw-r--r-- | net-misc/lldpd/files/lldpd-0.9-seccomp-missing-syscalls.patch | 17 |
1 files changed, 0 insertions, 17 deletions
diff --git a/net-misc/lldpd/files/lldpd-0.9-seccomp-missing-syscalls.patch b/net-misc/lldpd/files/lldpd-0.9-seccomp-missing-syscalls.patch deleted file mode 100644 index 183306a90482..000000000000 --- a/net-misc/lldpd/files/lldpd-0.9-seccomp-missing-syscalls.patch +++ /dev/null @@ -1,17 +0,0 @@ -diff --git a/src/daemon/priv-seccomp.c b/src/daemon/priv-seccomp.c -index bccd378..4f9e6e6 100644 ---- a/src/daemon/priv-seccomp.c -+++ b/src/daemon/priv-seccomp.c -@@ -148,10 +148,12 @@ priv_seccomp_init(int remote, int child) - if ((rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 0)) < 0 || - (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(write), 0)) < 0 || /* write needed for */ - (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(open), 0)) < 0 || -+ (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(fcntl), 0)) < 0 || - (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(kill), 0)) < 0 || - (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(socket), 0)) < 0 || - (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(bind), 0)) < 0 || - (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(setsockopt), 0)) < 0 || -+ (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(getsockname), 0)) < 0 || - (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(uname), 0)) < 0 || - (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(unlink), 0)) < 0 || - (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(ioctl), 0)) < 0 || |