diff options
author | Patrick McLean <chutzpah@gentoo.org> | 2016-06-10 10:04:57 -0700 |
---|---|---|
committer | Patrick McLean <chutzpah@gentoo.org> | 2016-06-10 10:04:57 -0700 |
commit | f3f6a28b7a6969de5040c5694757192d2413db1e (patch) | |
tree | d6977acc6a65ddbfeb4c1b77df26de0dc7c84ce0 /net-misc/lldpd/files | |
parent | net-nds/389-ds-base: live ebuild for upstream's git repo Live ebuild for buil... (diff) | |
download | gentoo-f3f6a28b7a6969de5040c5694757192d2413db1e.tar.gz gentoo-f3f6a28b7a6969de5040c5694757192d2413db1e.tar.bz2 gentoo-f3f6a28b7a6969de5040c5694757192d2413db1e.zip |
net-misc/lldpd: Revision bump, update seccomp patch to add missing syscalls
Gentoo-bug: 564566
Package-Manager: portage-2.3.0_rc1
Diffstat (limited to 'net-misc/lldpd/files')
-rw-r--r-- | net-misc/lldpd/files/lldpd-0.9-seccomp-missing-syscalls.patch | 9 |
1 files changed, 7 insertions, 2 deletions
diff --git a/net-misc/lldpd/files/lldpd-0.9-seccomp-missing-syscalls.patch b/net-misc/lldpd/files/lldpd-0.9-seccomp-missing-syscalls.patch index be7d341e25ba..183306a90482 100644 --- a/net-misc/lldpd/files/lldpd-0.9-seccomp-missing-syscalls.patch +++ b/net-misc/lldpd/files/lldpd-0.9-seccomp-missing-syscalls.patch @@ -1,8 +1,13 @@ diff --git a/src/daemon/priv-seccomp.c b/src/daemon/priv-seccomp.c -index bccd378..7cd8e7d 100644 +index bccd378..4f9e6e6 100644 --- a/src/daemon/priv-seccomp.c +++ b/src/daemon/priv-seccomp.c -@@ -152,6 +152,7 @@ priv_seccomp_init(int remote, int child) +@@ -148,10 +148,12 @@ priv_seccomp_init(int remote, int child) + if ((rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(read), 0)) < 0 || + (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(write), 0)) < 0 || /* write needed for */ + (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(open), 0)) < 0 || ++ (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(fcntl), 0)) < 0 || + (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(kill), 0)) < 0 || (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(socket), 0)) < 0 || (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(bind), 0)) < 0 || (rc = seccomp_rule_add(ctx, SCMP_ACT_ALLOW, SCMP_SYS(setsockopt), 0)) < 0 || |