slackware-current/source/n/dhcpcd/patches/645c32dd1a511527b7eb88443a28dfe7704d5f52.patch
Patrick J Volkerding 8fe30c981e Sun Aug 28 19:16:39 UTC 2022
d/ccache-4.6.3-x86_64-1.txz:  Upgraded.
l/fmt-9.1.0-x86_64-1.txz:  Upgraded.
l/imagemagick-7.1.0_47-x86_64-1.txz:  Upgraded.
n/dhcpcd-9.4.1-x86_64-2.txz:  Rebuilt.
  [PATCH] privsep: Allow getrandom sysctl for newer glibc
  [PATCH] privsep: Allow newfstatat syscall as well
  Thanks to Roy Marples, marav, and nobodino.
t/texlive-2022.220801-x86_64-2.txz:  Rebuilt.
  Removed dangling texdoctk symlink.
  Thanks to Johannes Schoepfer and marav.
2022-08-29 07:00:18 +02:00

24 lines
732 B
Diff

From 645c32dd1a511527b7eb88443a28dfe7704d5f52 Mon Sep 17 00:00:00 2001
From: Roy Marples <roy@marples.name>
Date: Fri, 26 Aug 2022 09:08:36 +0100
Subject: [PATCH] privsep: Allow getrandom sysctl for newer glibc
Fixes #120
---
src/privsep-linux.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/src/privsep-linux.c b/src/privsep-linux.c
index c2de54ba..4d5c195d 100644
--- a/src/privsep-linux.c
+++ b/src/privsep-linux.c
@@ -325,6 +325,9 @@ static struct sock_filter ps_seccomp_filter[] = {
#ifdef __NR_getpid
SECCOMP_ALLOW(__NR_getpid),
#endif
+#ifdef __NR_getrandom
+ SECCOMP_ALLOW(__NR_getrandom),
+#endif
#ifdef __NR_getsockopt
/* For route socket overflow */
SECCOMP_ALLOW_ARG(__NR_getsockopt, 1, SOL_SOCKET),