Module Name: src
Committed By: christos
Date: Fri Mar 13 16:38:45 UTC 2020
Modified Files:
src/external/bsd/blacklist/bin: conf.c
Log Message:
Re-enable the routing perm check now that the kernel has been fixed to return
valid information.
To generate a diff of this commit:
cvs rdiff -u -r1.30 -r1.31 src/external/bsd/blacklist/bin/conf.c
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: src/external/bsd/blacklist/bin/conf.c
diff -u src/external/bsd/blacklist/bin/conf.c:1.30 src/external/bsd/blacklist/bin/conf.c:1.31
--- src/external/bsd/blacklist/bin/conf.c:1.30 Thu Mar 12 15:47:32 2020
+++ src/external/bsd/blacklist/bin/conf.c Fri Mar 13 12:38:45 2020
@@ -1,4 +1,4 @@
-/* $NetBSD: conf.c,v 1.30 2020/03/12 19:47:32 christos Exp $ */
+/* $NetBSD: conf.c,v 1.31 2020/03/13 16:38:45 christos Exp $ */
/*-
* Copyright (c) 2015 The NetBSD Foundation, Inc.
@@ -33,7 +33,7 @@
#endif
#include <sys/cdefs.h>
-__RCSID("$NetBSD: conf.c,v 1.30 2020/03/12 19:47:32 christos Exp $");
+__RCSID("$NetBSD: conf.c,v 1.31 2020/03/13 16:38:45 christos Exp $");
#include <stdio.h>
#ifdef HAVE_LIBUTIL_H
@@ -1006,7 +1006,7 @@ confset_match(const struct confset *cs,
static int
conf_route_perm(int fd) {
/* Disable for now, the access check in the routing socket uses curlwp */
-#if defined(RTM_IFANNOUNCE) && defined(RT_ROUNDUP) && 0
+#if defined(RTM_IFANNOUNCE) && defined(RT_ROUNDUP)
/*
* Send a routing message that is not supported to check for access
* We expect EOPNOTSUPP for having access, since we are sending a