[ppp/f13] rebuild with fd_leak patch of F14 (#664123)
Jiri Skala
jskala at fedoraproject.org
Mon Jun 6 13:13:50 UTC 2011
commit 082acf628cfb51bf636c8f8e52b8f271ad53a386
Author: Jiri Skala <jskala at redhat.com>
Date: Mon Jun 6 15:13:37 2011 +0200
rebuild with fd_leak patch of F14 (#664123)
ppp-2.4.4-fd_leak.patch | 100 +++++++++++++++++++++++++++++++++++++++++++++++
ppp.spec | 5 ++-
2 files changed, 104 insertions(+), 1 deletions(-)
---
diff --git a/ppp-2.4.4-fd_leak.patch b/ppp-2.4.4-fd_leak.patch
index 6f94b25..7c3c060 100644
--- a/ppp-2.4.4-fd_leak.patch
+++ b/ppp-2.4.4-fd_leak.patch
@@ -513,3 +513,103 @@ diff -up ppp-2.4.4/pppd/utils.c.fd_leak ppp-2.4.4/pppd/utils.c
if (fd < 0) {
error("Couldn't reopen lock file %s: %m", lock_file);
lock_file[0] = 0;
+diff -up ppp-2.4.5/pppd/plugins/pppoatm/pppoatm.c.test ppp-2.4.5/pppd/plugins/pppoatm/pppoatm.c
+--- ppp-2.4.5/pppd/plugins/pppoatm/pppoatm.c.test 2010-11-16 09:56:56.083707000 +0100
++++ ppp-2.4.5/pppd/plugins/pppoatm/pppoatm.c 2010-11-16 09:56:59.382707272 +0100
+@@ -137,7 +137,11 @@ static int connect_pppoatm(void)
+
+ if (!device_got_set)
+ no_device_given_pppoatm();
++#ifdef SOCK_CLOEXEC
++ fd = socket(AF_ATMPVC, SOCK_DGRAM | SOCK_CLOEXEC, 0);
++#else
+ fd = socket(AF_ATMPVC, SOCK_DGRAM, 0);
++#endif
+ if (fd < 0)
+ fatal("failed to create socket: %m");
+ memset(&qos, 0, sizeof qos);
+diff -up ppp-2.4.5/pppd/plugins/pppol2tp/openl2tp.c.test ppp-2.4.5/pppd/plugins/pppol2tp/openl2tp.c
+--- ppp-2.4.5/pppd/plugins/pppol2tp/openl2tp.c.test 2010-11-16 09:58:17.499711288 +0100
++++ ppp-2.4.5/pppd/plugins/pppol2tp/openl2tp.c 2010-11-16 10:00:15.791706960 +0100
+@@ -83,7 +83,11 @@ static int openl2tp_client_create(void)
+ int result;
+
+ if (openl2tp_fd < 0) {
++#ifdef SOCK_CLOEXEC
++ openl2tp_fd = socket(PF_UNIX, SOCK_DGRAM | SOCK_CLOEXEC, 0);
++#else
+ openl2tp_fd = socket(PF_UNIX, SOCK_DGRAM, 0);
++#endif
+ if (openl2tp_fd < 0) {
+ error("openl2tp connection create: %m");
+ return -ENOTCONN;
+diff -up ppp-2.4.5/pppd/plugins/pppol2tp/pppol2tp.c.test ppp-2.4.5/pppd/plugins/pppol2tp/pppol2tp.c
+--- ppp-2.4.5/pppd/plugins/pppol2tp/pppol2tp.c.test 2010-11-16 09:57:44.448709467 +0100
++++ ppp-2.4.5/pppd/plugins/pppol2tp/pppol2tp.c 2010-11-16 09:59:32.877707001 +0100
+@@ -208,7 +208,11 @@ static void send_config_pppol2tp(int mtu
+ struct ifreq ifr;
+ int fd;
+
++#ifdef SOCK_CLOEXEC
++ fd = socket(AF_INET, SOCK_DGRAM | SOCK_CLOEXEC, 0);
++#else
+ fd = socket(AF_INET, SOCK_DGRAM, 0);
++#endif
+ if (fd >= 0) {
+ memset (&ifr, '\0', sizeof (ifr));
+ strlcpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name));
+diff -up ppp-2.4.5/pppd/plugins/rp-pppoe/if.c.test ppp-2.4.5/pppd/plugins/rp-pppoe/if.c
+--- ppp-2.4.5/pppd/plugins/rp-pppoe/if.c.test 2009-11-16 23:26:07.000000000 +0100
++++ ppp-2.4.5/pppd/plugins/rp-pppoe/if.c 2010-11-16 09:54:03.973706239 +0100
+@@ -116,6 +116,10 @@ openInterface(char const *ifname, UINT16
+ stype = SOCK_PACKET;
+ #endif
+
++#ifdef SOCK_CLOEXEC
++ stype |= SOCK_CLOEXEC;
++#endif
++
+ if ((fd = socket(domain, stype, htons(type))) < 0) {
+ /* Give a more helpful message for the common error case */
+ if (errno == EPERM) {
+diff -up ppp-2.4.5/pppd/plugins/rp-pppoe/plugin.c.test ppp-2.4.5/pppd/plugins/rp-pppoe/plugin.c
+--- ppp-2.4.5/pppd/plugins/rp-pppoe/plugin.c.test 2009-11-16 23:26:07.000000000 +0100
++++ ppp-2.4.5/pppd/plugins/rp-pppoe/plugin.c 2010-11-16 09:40:23.355707001 +0100
+@@ -158,7 +158,11 @@ PPPOEConnectDevice(void)
+ ppp_session_number = ntohs(conn->session);
+
+ /* Make the session socket */
++#ifdef SOCK_CLOEXEC
++ conn->sessionSocket = socket(AF_PPPOX, SOCK_STREAM | SOCK_CLOEXEC, PX_PROTO_OE);
++#else
+ conn->sessionSocket = socket(AF_PPPOX, SOCK_STREAM, PX_PROTO_OE);
++#endif
+ if (conn->sessionSocket < 0) {
+ error("Failed to create PPPoE socket: %m");
+ goto errout;
+@@ -289,7 +293,11 @@ PPPoEDevnameHook(char *cmd, char **argv,
+ }
+
+ /* Open a socket */
++#ifdef SOCK_CLOEXEC
++ if ((fd = socket(PF_PACKET, SOCK_RAW | SOCK_CLOEXEC, 0)) < 0) {
++#else
+ if ((fd = socket(PF_PACKET, SOCK_RAW, 0)) < 0) {
++#endif
+ r = 0;
+ }
+
+diff -up ppp-2.4.5/pppd/plugins/rp-pppoe/pppoe-discovery.c.test ppp-2.4.5/pppd/plugins/rp-pppoe/pppoe-discovery.c
+--- ppp-2.4.5/pppd/plugins/rp-pppoe/pppoe-discovery.c.test 2009-11-16 23:26:07.000000000 +0100
++++ ppp-2.4.5/pppd/plugins/rp-pppoe/pppoe-discovery.c 2010-11-16 09:55:08.726707003 +0100
+@@ -121,6 +121,10 @@ openInterface(char const *ifname, UINT16
+ stype = SOCK_PACKET;
+ #endif
+
++#ifdef SOCK_CLOEXEC
++ stype |= SOCK_CLOEXEC;
++#endif
++
+ if ((fd = socket(domain, stype, htons(type))) < 0) {
+ /* Give a more helpful message for the common error case */
+ if (errno == EPERM) {
diff --git a/ppp.spec b/ppp.spec
index 350dcaa..e002185 100644
--- a/ppp.spec
+++ b/ppp.spec
@@ -1,7 +1,7 @@
Summary: The Point-to-Point Protocol daemon
Name: ppp
Version: 2.4.5
-Release: 10%{?dist}
+Release: 11%{?dist}
License: BSD and LGPLv2+ and GPLv2+ and Public Domain
Group: System Environment/Daemons
URL: http://www.samba.org/ppp
@@ -139,6 +139,9 @@ rm -rf $RPM_BUILD_ROOT
%doc PLUGINS
%changelog
+* Mon Jun 06 2011 Jiri Skala <jskala at redhat.com> - 2.4.5-11
+- rebuild with fd_leak patch of F14 (#664123)
+
* Thu Aug 05 2010 Jiri Skala <jskala at redhat.com> - 2.4.5-10
- fixes #572174 - pppol2tp plugins not installed
- removed proprietary if_pppol2tp.h
More information about the scm-commits
mailing list