Module Name: src Committed By: christos Date: Fri Mar 13 16:38:45 UTC 2020
Modified Files: src/external/bsd/blacklist/bin: conf.c Log Message: Re-enable the routing perm check now that the kernel has been fixed to return valid information. To generate a diff of this commit: cvs rdiff -u -r1.30 -r1.31 src/external/bsd/blacklist/bin/conf.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/external/bsd/blacklist/bin/conf.c diff -u src/external/bsd/blacklist/bin/conf.c:1.30 src/external/bsd/blacklist/bin/conf.c:1.31 --- src/external/bsd/blacklist/bin/conf.c:1.30 Thu Mar 12 15:47:32 2020 +++ src/external/bsd/blacklist/bin/conf.c Fri Mar 13 12:38:45 2020 @@ -1,4 +1,4 @@ -/* $NetBSD: conf.c,v 1.30 2020/03/12 19:47:32 christos Exp $ */ +/* $NetBSD: conf.c,v 1.31 2020/03/13 16:38:45 christos Exp $ */ /*- * Copyright (c) 2015 The NetBSD Foundation, Inc. @@ -33,7 +33,7 @@ #endif #include <sys/cdefs.h> -__RCSID("$NetBSD: conf.c,v 1.30 2020/03/12 19:47:32 christos Exp $"); +__RCSID("$NetBSD: conf.c,v 1.31 2020/03/13 16:38:45 christos Exp $"); #include <stdio.h> #ifdef HAVE_LIBUTIL_H @@ -1006,7 +1006,7 @@ confset_match(const struct confset *cs, static int conf_route_perm(int fd) { /* Disable for now, the access check in the routing socket uses curlwp */ -#if defined(RTM_IFANNOUNCE) && defined(RT_ROUNDUP) && 0 +#if defined(RTM_IFANNOUNCE) && defined(RT_ROUNDUP) /* * Send a routing message that is not supported to check for access * We expect EOPNOTSUPP for having access, since we are sending a