Blame openssh-7.5p1-sandbox.patch
|
Jakub Jelen |
09320c |
diff --git a/sandbox-seccomp-filter.c b/sandbox-seccomp-filter.c
|
|
Jakub Jelen |
09320c |
index 3a1aedce72c2..a8d472a63ccb 100644
|
|
Jakub Jelen |
09320c |
--- a/sandbox-seccomp-filter.c
|
|
Jakub Jelen |
09320c |
+++ b/sandbox-seccomp-filter.c
|
|
Jakub Jelen |
fb74d1 |
@@ -50,6 +50,9 @@
|
|
Jakub Jelen |
fb74d1 |
#include <elf.h>
|
|
Jakub Jelen |
fb74d1 |
|
|
Jakub Jelen |
fb74d1 |
#include <asm/unistd.h>
|
|
Jakub Jelen |
fb74d1 |
+#ifdef __s390__
|
|
Jakub Jelen |
fb74d1 |
+#include <asm/zcrypt.h>
|
|
Jakub Jelen |
fb74d1 |
+#endif
|
|
Jakub Jelen |
fb74d1 |
|
|
Jakub Jelen |
fb74d1 |
#include <errno.h>
|
|
Jakub Jelen |
fb74d1 |
#include <signal.h>
|
|
Jakub Jelen |
09320c |
@@ -235,7 +235,7 @@ static const struct sock_filter preauth_insns[] = {
|
|
Jakub Jelen |
09320c |
* x86-64 syscall under some circumstances, e.g.
|
|
Jakub Jelen |
09320c |
* https://bugs.debian.org/849923
|
|
Jakub Jelen |
09320c |
*/
|
|
Jakub Jelen |
09320c |
- SC_ALLOW(__NR_clock_gettime & ~__X32_SYSCALL_BIT);
|
|
Jakub Jelen |
09320c |
+ SC_ALLOW(__NR_clock_gettime & ~__X32_SYSCALL_BIT),
|
|
Jakub Jelen |
09320c |
#endif
|
|
Jakub Jelen |
09320c |
|
|
Jakub Jelen |
09320c |
/* Default deny */
|