Module Name:    src
Committed By:   christos
Date:           Fri Mar 13 16:38:45 UTC 2020

Modified Files:
        src/external/bsd/blacklist/bin: conf.c

Log Message:
Re-enable the routing perm check now that the kernel has been fixed to return
valid information.


To generate a diff of this commit:
cvs rdiff -u -r1.30 -r1.31 src/external/bsd/blacklist/bin/conf.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/external/bsd/blacklist/bin/conf.c
diff -u src/external/bsd/blacklist/bin/conf.c:1.30 src/external/bsd/blacklist/bin/conf.c:1.31
--- src/external/bsd/blacklist/bin/conf.c:1.30	Thu Mar 12 15:47:32 2020
+++ src/external/bsd/blacklist/bin/conf.c	Fri Mar 13 12:38:45 2020
@@ -1,4 +1,4 @@
-/*	$NetBSD: conf.c,v 1.30 2020/03/12 19:47:32 christos Exp $	*/
+/*	$NetBSD: conf.c,v 1.31 2020/03/13 16:38:45 christos Exp $	*/
 
 /*-
  * Copyright (c) 2015 The NetBSD Foundation, Inc.
@@ -33,7 +33,7 @@
 #endif
 
 #include <sys/cdefs.h>
-__RCSID("$NetBSD: conf.c,v 1.30 2020/03/12 19:47:32 christos Exp $");
+__RCSID("$NetBSD: conf.c,v 1.31 2020/03/13 16:38:45 christos Exp $");
 
 #include <stdio.h>
 #ifdef HAVE_LIBUTIL_H
@@ -1006,7 +1006,7 @@ confset_match(const struct confset *cs, 
 static int
 conf_route_perm(int fd) {
 /* Disable for now, the access check in the routing socket uses curlwp */
-#if defined(RTM_IFANNOUNCE) && defined(RT_ROUNDUP) && 0
+#if defined(RTM_IFANNOUNCE) && defined(RT_ROUNDUP)
 	/*
 	 * Send a routing message that is not supported to check for access
 	 * We expect EOPNOTSUPP for having access, since we are sending a

Reply via email to