From patchwork Tue Oct 8 12:24:24 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adolf Belka X-Patchwork-Id: 8162 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mail01.haj.ipfire.org", Issuer "R10" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4XNFZW197qz3wmx for ; Tue, 8 Oct 2024 12:24:35 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) client-signature ECDSA (secp384r1)) (Client CN "mail02.haj.ipfire.org", Issuer "E6" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4XNFZQ1Zmjznj; Tue, 8 Oct 2024 12:24:30 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4XNFZQ12pbz349N; Tue, 8 Oct 2024 12:24:30 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature RSA-PSS (4096 bits)) (Client CN "mail01.haj.ipfire.org", Issuer "R10" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4XNFZM71z0z33cL for ; Tue, 8 Oct 2024 12:24:27 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4XNFZM2Vwpzc4; Tue, 8 Oct 2024 12:24:27 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1728390267; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=HjCHwiBHeqljRN4Yu7G/rTPqurfCZJSSAYJeL7urknI=; b=jjCYEJ0Gz5LdCcs046qDX9Y51tmMw1BioDUqG2BvxzxGG4k6w0RpSGjuNN74UdpV01801U twCz0+tIqBP8ScAA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1728390267; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=HjCHwiBHeqljRN4Yu7G/rTPqurfCZJSSAYJeL7urknI=; b=HmczV0rA5e5nG+2Cayk2NMONg7Q9ljm6p3bJilwjfxyCP1RppC2teHGVtjyG0o9Xz3AHRJ dZtD7oPLdPzYWSFxOEOEw+w0PhAdEaWHLbNRChtJWl9JoZbm0J65hJBlY/CFXVIruvar06 xIInh5m9ZWhhdQqVTja+S2dMtCfMBvam6ONb5wfl23FbfC5wAp6R1UxWsb5kGinnbk5e1r dg+3yyphLeEEJ39WSScIPJOyLoL/2ckUJNEkMp6Fme13OCtpq9sicSAY1l67j8Ft1bqLKC 1B1t6B8BOCtGhIbAl9BDG+XesYciNyY+JGfeBAbecfXy1sKSZeuBtDQx3/8vmw== From: Adolf Belka To: development@lists.ipfire.org Subject: [PATCH] ppp: Update to version 2.5.1 Date: Tue, 8 Oct 2024 14:24:24 +0200 Message-ID: <20241008122424.3413238-1-adolf.belka@ipfire.org> MIME-Version: 1.0 Message-ID-Hash: EIYKA5HIB5XW6CAW4JL4PLAESLCBDFPY X-Message-ID-Hash: EIYKA5HIB5XW6CAW4JL4PLAESLCBDFPY X-MailFrom: adolf.belka@ipfire.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.8 Precedence: list List-Id: IPFire development talk Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: - Update from version commit e1266c7 to 2.5.1 - Version 2.5.1 has around 34 additional commits from e1266c7. To me all look minor changes, some related to other system types such as Solaris that we don't use. - Update of rootfile - They have added example to the configuration files to prevent accidental overwriting of configuration systems. - Changelog - There is no longer any changelog provided. Even the one that used to exist for version 2.5.0 has been removed. The only option now is to look through the commits - https://github.com/ppp-project/ppp/commits/master/?before=d5aeec65752d4a9b3bb46771d0b221c4a4a6539e+35 - Some of the patches had to be updated as the changes were enough that some hunks did not get found for patching. Patch file number 6 has been removed as the sed lines are no longer to be found in the configure file. The other files that patched successfully were renamed to 2.5.1 Signed-off-by: Adolf Belka --- config/rootfiles/common/ppp | 55 +++++++++--------- lfs/ppp | 17 +++--- ...-configure-to-handle-cflags-properly.patch | 18 ------ ...don-t-want-to-accidentally-leak-fds.patch} | 56 +++++++++--------- ...2.5.1-2-everywhere-O_CLOEXEC-harder.patch} | 57 ++++++++----------- ...e-SOCK_CLOEXEC-when-creating-socket.patch} | 0 ...-2.5.1-4-increase-max-padi-attempts.patch} | 0 ....9.patch => ppp-2.5.1-5-headers_4.9.patch} | 0 8 files changed, 90 insertions(+), 113 deletions(-) delete mode 100644 src/patches/ppp/ppp-2.5.0-6-patch-configure-to-handle-cflags-properly.patch rename src/patches/ppp/{ppp-2.5.0-1-we-don-t-want-to-accidentally-leak-fds.patch => ppp-2.5.1-1-we-don-t-want-to-accidentally-leak-fds.patch} (79%) rename src/patches/ppp/{ppp-e1266c7-2-everywhere-O_CLOEXEC-harder.patch => ppp-2.5.1-2-everywhere-O_CLOEXEC-harder.patch} (75%) rename src/patches/ppp/{ppp-2.5.0-3-everywhere-use-SOCK_CLOEXEC-when-creating-socket.patch => ppp-2.5.1-3-everywhere-use-SOCK_CLOEXEC-when-creating-socket.patch} (100%) rename src/patches/ppp/{ppp-2.5.0-4-increase-max-padi-attempts.patch => ppp-2.5.1-4-increase-max-padi-attempts.patch} (100%) rename src/patches/ppp/{ppp-2.5.0-5-headers_4.9.patch => ppp-2.5.1-5-headers_4.9.patch} (100%) diff --git a/config/rootfiles/common/ppp b/config/rootfiles/common/ppp index 6a27af3e7..dc24e9791 100644 --- a/config/rootfiles/common/ppp +++ b/config/rootfiles/common/ppp @@ -1,15 +1,18 @@ #etc/ppp etc/ppp/chap-secrets +etc/ppp/chap-secrets.example etc/ppp/demonloginscript etc/ppp/dialer -#etc/ppp/eaptls-client -#etc/ppp/eaptls-server +#etc/ppp/eaptls-client.example +#etc/ppp/eaptls-server.example etc/ppp/ioptions etc/ppp/ip-down etc/ppp/ip-up -#etc/ppp/openssl.cnf +#etc/ppp/openssl.cnf.example etc/ppp/options +etc/ppp/options.example etc/ppp/pap-secrets +etc/ppp/pap-secrets.example etc/ppp/standardloginscript #usr/include/pppd #usr/include/pppd/cbcp.h @@ -35,29 +38,29 @@ etc/ppp/standardloginscript #usr/include/pppd/upap.h #usr/lib/pkgconfig/pppd.pc usr/lib/pppd -#usr/lib/pppd/2.5.1-dev -#usr/lib/pppd/2.5.1-dev/minconn.la -usr/lib/pppd/2.5.1-dev/minconn.so -#usr/lib/pppd/2.5.1-dev/openl2tp.la -usr/lib/pppd/2.5.1-dev/openl2tp.so -#usr/lib/pppd/2.5.1-dev/passprompt.la -usr/lib/pppd/2.5.1-dev/passprompt.so -#usr/lib/pppd/2.5.1-dev/passwordfd.la -usr/lib/pppd/2.5.1-dev/passwordfd.so -#usr/lib/pppd/2.5.1-dev/pppoatm.la -usr/lib/pppd/2.5.1-dev/pppoatm.so -#usr/lib/pppd/2.5.1-dev/pppoe.la -usr/lib/pppd/2.5.1-dev/pppoe.so -#usr/lib/pppd/2.5.1-dev/pppol2tp.la -usr/lib/pppd/2.5.1-dev/pppol2tp.so -#usr/lib/pppd/2.5.1-dev/radattr.la -usr/lib/pppd/2.5.1-dev/radattr.so -#usr/lib/pppd/2.5.1-dev/radius.la -usr/lib/pppd/2.5.1-dev/radius.so -#usr/lib/pppd/2.5.1-dev/radrealms.la -usr/lib/pppd/2.5.1-dev/radrealms.so -#usr/lib/pppd/2.5.1-dev/winbind.la -usr/lib/pppd/2.5.1-dev/winbind.so +usr/lib/pppd/2.5.1 +#usr/lib/pppd/2.5.1/minconn.la +usr/lib/pppd/2.5.1/minconn.so +#usr/lib/pppd/2.5.1/openl2tp.la +usr/lib/pppd/2.5.1/openl2tp.so +#usr/lib/pppd/2.5.1/passprompt.la +usr/lib/pppd/2.5.1/passprompt.so +#usr/lib/pppd/2.5.1/passwordfd.la +usr/lib/pppd/2.5.1/passwordfd.so +#usr/lib/pppd/2.5.1/pppoatm.la +usr/lib/pppd/2.5.1/pppoatm.so +#usr/lib/pppd/2.5.1/pppoe.la +usr/lib/pppd/2.5.1/pppoe.so +#usr/lib/pppd/2.5.1/pppol2tp.la +usr/lib/pppd/2.5.1/pppol2tp.so +#usr/lib/pppd/2.5.1/radattr.la +usr/lib/pppd/2.5.1/radattr.so +#usr/lib/pppd/2.5.1/radius.la +usr/lib/pppd/2.5.1/radius.so +#usr/lib/pppd/2.5.1/radrealms.la +usr/lib/pppd/2.5.1/radrealms.so +#usr/lib/pppd/2.5.1/winbind.la +usr/lib/pppd/2.5.1/winbind.so usr/sbin/chat usr/sbin/pppd usr/sbin/pppdump diff --git a/lfs/ppp b/lfs/ppp index 9290a7c41..a83dd10c6 100644 --- a/lfs/ppp +++ b/lfs/ppp @@ -24,7 +24,9 @@ include Config -VER = e1266c7 +VER = 2.5.1 + +# Download source file from https://download.samba.org/pub/ppp/ THISAPP = ppp-$(VER) DL_FILE = $(THISAPP).tar.gz @@ -42,7 +44,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = be60fadeed632ae2511e2d60148905da9868bd4271139b4fecab6b4b93e4a403e645d84204f907a8661748fb1a18b59c893925d91565520b9af791a45b0aaf4f +$(DL_FILE)_BLAKE2 = e3ece873ea25bde5ddffd0da168ffe6ba890693f20fb9f1d6a48f365331abdb4cf517fd0b3004d26a0c778ad4d750e39e38486544e2771b23223469db13c239c install : $(TARGET) @@ -73,12 +75,11 @@ $(TARGET) : $(patsubst %,$(DIR_DL)/%,$(objects)) @$(PREBUILD) @rm -rf $(DIR_APP) && cd $(DIR_SRC) && tar zxf $(DIR_DL)/$(DL_FILE) cd $(DIR_APP) && autoreconf -vfi - cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/ppp/ppp-2.5.0-1-we-don-t-want-to-accidentally-leak-fds.patch - cd $(DIR_APP) && patch -Np1 -i $(DIR_SRC)/src/patches/ppp/ppp-e1266c7-2-everywhere-O_CLOEXEC-harder.patch - cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/ppp/ppp-2.5.0-3-everywhere-use-SOCK_CLOEXEC-when-creating-socket.patch - cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/ppp/ppp-2.5.0-4-increase-max-padi-attempts.patch - cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/ppp/ppp-2.5.0-5-headers_4.9.patch - cd $(DIR_APP) && patch -Np1 -i $(DIR_SRC)/src/patches/ppp/ppp-2.5.0-6-patch-configure-to-handle-cflags-properly.patch + cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/ppp/ppp-2.5.1-1-we-don-t-want-to-accidentally-leak-fds.patch + cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/ppp/ppp-2.5.1-2-everywhere-O_CLOEXEC-harder.patch + cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/ppp/ppp-2.5.1-3-everywhere-use-SOCK_CLOEXEC-when-creating-socket.patch + cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/ppp/ppp-2.5.1-4-increase-max-padi-attempts.patch + cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/ppp/ppp-2.5.1-5-headers_4.9.patch cd $(DIR_APP) && ./configure \ --prefix=/usr \ --sysconfdir=/etc \ diff --git a/src/patches/ppp/ppp-2.5.0-6-patch-configure-to-handle-cflags-properly.patch b/src/patches/ppp/ppp-2.5.0-6-patch-configure-to-handle-cflags-properly.patch deleted file mode 100644 index 0e9eab6ed..000000000 --- a/src/patches/ppp/ppp-2.5.0-6-patch-configure-to-handle-cflags-properly.patch +++ /dev/null @@ -1,18 +0,0 @@ -diff -Naur ppp-2.5.0.orig/configure ppp-2.5.0/configure ---- ppp-2.5.0.orig/configure 2023-03-25 05:38:36.000000000 +0100 -+++ ppp-2.5.0/configure 2023-06-30 14:05:14.773950477 +0200 -@@ -17774,10 +17774,10 @@ - rm -f $2 - if [ -f $1 ]; then - echo " $2 <= $1" -- sed -e "s,@DESTDIR@,$prefix,g" \ -- -e "s,@SYSCONF@,$sysconfdir,g" \ -- -e "s,@CC@,$CC,g" \ -- -e "s|@CFLAGS@|$CFLAGS|g" $1 > $2 -+ sed -e "s#@DESTDIR@#$prefix#g" \ -+ -e "s#@SYSCONF@#$sysconfdir#g" \ -+ -e "s#@CC@#$CC#g" \ -+ -e "s#@CFLAGS@#$CFLAGS#g" $1 > $2 - fi - } - diff --git a/src/patches/ppp/ppp-2.5.0-1-we-don-t-want-to-accidentally-leak-fds.patch b/src/patches/ppp/ppp-2.5.1-1-we-don-t-want-to-accidentally-leak-fds.patch similarity index 79% rename from src/patches/ppp/ppp-2.5.0-1-we-don-t-want-to-accidentally-leak-fds.patch rename to src/patches/ppp/ppp-2.5.1-1-we-don-t-want-to-accidentally-leak-fds.patch index 98ab03119..d755b89c3 100644 --- a/src/patches/ppp/ppp-2.5.0-1-we-don-t-want-to-accidentally-leak-fds.patch +++ b/src/patches/ppp/ppp-2.5.1-1-we-don-t-want-to-accidentally-leak-fds.patch @@ -1,7 +1,7 @@ diff -Naur pppd.orig/auth.c pppd/auth.c ---- pppd.orig/auth.c 2023-03-25 05:38:30.000000000 +0100 -+++ pppd/auth.c 2023-06-30 12:38:13.748482796 +0200 -@@ -518,7 +518,7 @@ +--- pppd.orig/auth.c 2024-09-18 06:30:31.000000000 +0200 ++++ pppd/auth.c 2024-10-07 16:12:09.202924555 +0200 +@@ -529,7 +529,7 @@ free(fname); return 0; } @@ -10,8 +10,8 @@ diff -Naur pppd.orig/auth.c pppd/auth.c if (seteuid(euid) == -1) fatal("unable to regain privileges: %m"); if (ufile == NULL) { -@@ -1535,7 +1535,7 @@ - filename = PPP_PATH_UPAPFILE; +@@ -1552,7 +1552,7 @@ + filename = path_upapfile; addrs = opts = NULL; ret = UPAP_AUTHNAK; - f = fopen(filename, "r"); @@ -19,43 +19,43 @@ diff -Naur pppd.orig/auth.c pppd/auth.c if (f == NULL) { error("Can't open PAP password file %s: %m", filename); -@@ -1635,7 +1635,7 @@ +@@ -1652,7 +1652,7 @@ if (ret <= 0) { - filename = PPP_PATH_UPAPFILE; + filename = path_upapfile; addrs = NULL; - f = fopen(filename, "r"); + f = fopen(filename, "re"); if (f == NULL) return 0; check_access(f, filename); -@@ -1681,7 +1681,7 @@ +@@ -1698,7 +1698,7 @@ } - filename = PPP_PATH_UPAPFILE; + filename = path_upapfile; - f = fopen(filename, "r"); + f = fopen(filename, "re"); if (f == NULL) return 0; check_access(f, filename); -@@ -1718,7 +1718,7 @@ +@@ -1735,7 +1735,7 @@ } - filename = PPP_PATH_UPAPFILE; + filename = path_upapfile; - f = fopen(filename, "r"); + f = fopen(filename, "re"); if (f == NULL) return 0; -@@ -1760,7 +1760,7 @@ +@@ -1777,7 +1777,7 @@ } - filename = PPP_PATH_CHAPFILE; + filename = path_chapfile; - f = fopen(filename, "r"); + f = fopen(filename, "re"); if (f == NULL) return 0; -@@ -1798,7 +1798,7 @@ +@@ -1815,7 +1815,7 @@ struct wordlist *addrs; filename = PPP_PATH_SRPFILE; @@ -64,7 +64,7 @@ diff -Naur pppd.orig/auth.c pppd/auth.c if (f == NULL) return 0; -@@ -1849,7 +1849,7 @@ +@@ -1866,7 +1866,7 @@ addrs = NULL; secbuf[0] = 0; @@ -73,7 +73,7 @@ diff -Naur pppd.orig/auth.c pppd/auth.c if (f == NULL) { error("Can't open chap secret file %s: %m", filename); return 0; -@@ -1902,7 +1902,7 @@ +@@ -1919,7 +1919,7 @@ filename = PPP_PATH_SRPFILE; addrs = NULL; @@ -82,7 +82,7 @@ diff -Naur pppd.orig/auth.c pppd/auth.c if (fp == NULL) { error("Can't open srp secret file %s: %m", filename); return 0; -@@ -2291,7 +2291,7 @@ +@@ -2309,7 +2309,7 @@ */ if (word[0] == '@' && word[1] == '/') { strlcpy(atfile, word+1, sizeof(atfile)); @@ -91,7 +91,7 @@ diff -Naur pppd.orig/auth.c pppd/auth.c warn("can't open indirect secret file %s", atfile); continue; } -@@ -2461,7 +2461,7 @@ +@@ -2479,7 +2479,7 @@ char pkfile[MAXWORDLEN]; filename = PPP_PATH_EAPTLSSERVFILE; @@ -100,7 +100,7 @@ diff -Naur pppd.orig/auth.c pppd/auth.c if (f == NULL) return 0; -@@ -2518,7 +2518,7 @@ +@@ -2536,7 +2536,7 @@ return 1; filename = PPP_PATH_EAPTLSCLIFILE; @@ -109,7 +109,7 @@ diff -Naur pppd.orig/auth.c pppd/auth.c if (f == NULL) return 0; -@@ -2738,7 +2738,7 @@ +@@ -2756,7 +2756,7 @@ filename = (am_server ? PPP_PATH_EAPTLSSERVFILE : PPP_PATH_EAPTLSCLIFILE); addrs = NULL; @@ -119,9 +119,9 @@ diff -Naur pppd.orig/auth.c pppd/auth.c { error("Can't open eap-tls secret file %s: %m", filename); diff -Naur pppd.orig/options.c pppd/options.c ---- pppd.orig/options.c 2023-03-25 05:38:30.000000000 +0100 -+++ pppd/options.c 2023-06-30 12:42:19.262593140 +0200 -@@ -555,7 +555,7 @@ +--- pppd.orig/options.c 2024-09-18 06:30:31.000000000 +0200 ++++ pppd/options.c 2024-10-07 16:12:40.217129032 +0200 +@@ -572,7 +572,7 @@ ppp_option_error("unable to drop privileges to open %s: %m", filename); return 0; } @@ -131,9 +131,9 @@ diff -Naur pppd.orig/options.c pppd/options.c if (check_prot && seteuid(euid) == -1) fatal("unable to regain privileges"); diff -Naur pppd.orig/sys-linux.c pppd/sys-linux.c ---- pppd.orig/sys-linux.c 2023-03-10 02:50:41.000000000 +0100 -+++ pppd/sys-linux.c 2023-06-30 12:43:20.634453475 +0200 -@@ -1978,7 +1978,7 @@ +--- pppd.orig/sys-linux.c 2024-09-18 06:30:31.000000000 +0200 ++++ pppd/sys-linux.c 2024-10-07 16:13:35.002001250 +0200 +@@ -1970,7 +1970,7 @@ /* Default the mount location of /proc */ strlcpy (proc_path, "/proc", sizeof(proc_path)); proc_path_len = 5; @@ -142,7 +142,7 @@ diff -Naur pppd.orig/sys-linux.c pppd/sys-linux.c if (fp != NULL) { while ((mntent = getmntent(fp)) != NULL) { if (strcmp(mntent->mnt_type, MNTTYPE_IGNORE) == 0) -@@ -2038,7 +2038,7 @@ +@@ -2030,7 +2030,7 @@ close_route_table(); path = path_to_procfs("/net/route"); @@ -151,7 +151,7 @@ diff -Naur pppd.orig/sys-linux.c pppd/sys-linux.c if (route_fd == NULL) { error("can't open routing table %s: %m", path); return 0; -@@ -2322,7 +2322,7 @@ +@@ -2330,7 +2330,7 @@ close_route_table(); path = path_to_procfs("/net/ipv6_route"); diff --git a/src/patches/ppp/ppp-e1266c7-2-everywhere-O_CLOEXEC-harder.patch b/src/patches/ppp/ppp-2.5.1-2-everywhere-O_CLOEXEC-harder.patch similarity index 75% rename from src/patches/ppp/ppp-e1266c7-2-everywhere-O_CLOEXEC-harder.patch rename to src/patches/ppp/ppp-2.5.1-2-everywhere-O_CLOEXEC-harder.patch index b6fd842a7..72102b74d 100644 --- a/src/patches/ppp/ppp-e1266c7-2-everywhere-O_CLOEXEC-harder.patch +++ b/src/patches/ppp/ppp-2.5.1-2-everywhere-O_CLOEXEC-harder.patch @@ -1,6 +1,6 @@ -diff -Naur ppp-e1266c7-orig/pppd/eap.c ppp-e1266c7/pppd/eap.c ---- ppp-e1266c7-orig/pppd/eap.c 2024-02-13 10:40:56.000000000 +0100 -+++ ppp-e1266c7/pppd/eap.c 2024-03-15 10:40:53.637190252 +0100 +diff -Naur pppd.orig/eap.c pppd/eap.c +--- pppd.orig/eap.c 2024-09-18 06:30:31.000000000 +0200 ++++ pppd/eap.c 2024-10-07 16:18:53.077603533 +0200 @@ -1542,7 +1542,7 @@ if ((path = name_of_pn_file()) == NULL) @@ -10,10 +10,10 @@ diff -Naur ppp-e1266c7-orig/pppd/eap.c ppp-e1266c7/pppd/eap.c err = errno; free(path); errno = err; -diff -Naur ppp-e1266c7-orig/pppd/main.c ppp-e1266c7/pppd/main.c ---- ppp-e1266c7-orig/pppd/main.c 2024-02-13 10:40:56.000000000 +0100 -+++ ppp-e1266c7/pppd/main.c 2024-03-15 10:41:43.842037617 +0100 -@@ -480,7 +480,7 @@ +diff -Naur pppd.orig/main.c pppd/main.c +--- pppd.orig/main.c 2024-09-18 06:30:31.000000000 +0200 ++++ pppd/main.c 2024-10-07 16:19:34.702106298 +0200 +@@ -491,7 +491,7 @@ die(0); /* Make sure fds 0, 1, 2 are open to somewhere. */ @@ -22,10 +22,10 @@ diff -Naur ppp-e1266c7-orig/pppd/main.c ppp-e1266c7/pppd/main.c if (fd_devnull < 0) fatal("Couldn't open %s: %m", PPP_DEVNULL); while (fd_devnull <= 2) { -diff -Naur ppp-e1266c7-orig/pppd/options.c ppp-e1266c7/pppd/options.c ---- ppp-e1266c7-orig/pppd/options.c 2024-02-13 10:40:56.000000000 +0100 -+++ ppp-e1266c7/pppd/options.c 2024-03-15 10:43:02.867753370 +0100 -@@ -1719,9 +1719,9 @@ +diff -Naur pppd.orig/options.c pppd/options.c +--- pppd.orig/options.c 2024-09-18 06:30:31.000000000 +0200 ++++ pppd/options.c 2024-10-07 16:21:04.207954343 +0200 +@@ -1736,9 +1736,9 @@ ppp_option_error("unable to drop permissions to open %s: %m", *argv); return 0; } @@ -37,9 +37,9 @@ diff -Naur ppp-e1266c7-orig/pppd/options.c ppp-e1266c7/pppd/options.c err = errno; if (!privileged_option && seteuid(euid) == -1) fatal("unable to regain privileges: %m"); -diff -Naur ppp-e1266c7-orig/pppd/sys-linux.c ppp-e1266c7/pppd/sys-linux.c ---- ppp-e1266c7-orig/pppd/sys-linux.c 2024-02-13 10:40:56.000000000 +0100 -+++ ppp-e1266c7/pppd/sys-linux.c 2024-03-15 10:49:59.310297165 +0100 +diff -Naur pppd.orig/sys-linux.c pppd/sys-linux.c +--- pppd.orig/sys-linux.c 2024-09-18 06:30:31.000000000 +0200 ++++ pppd/sys-linux.c 2024-10-07 16:27:42.282472415 +0200 @@ -656,7 +656,7 @@ goto err; } @@ -135,10 +135,10 @@ diff -Naur ppp-e1266c7-orig/pppd/sys-linux.c ppp-e1266c7/pppd/sys-linux.c if (sfd >= 0) { ret = fchown(sfd, uid, -1); if (ret != 0) { -diff -Naur ppp-e1266c7-orig/pppd/tdb.c ppp-e1266c7/pppd/tdb.c ---- ppp-e1266c7-orig/pppd/tdb.c 2024-02-13 10:40:56.000000000 +0100 -+++ ppp-e1266c7/pppd/tdb.c 2024-03-15 10:51:25.182882191 +0100 -@@ -1732,7 +1732,7 @@ +diff -Naur pppd.orig/tdb.c pppd/tdb.c +--- pppd.orig/tdb.c 2024-09-18 06:30:31.000000000 +0200 ++++ pppd/tdb.c 2024-10-07 16:30:04.033122023 +0200 +@@ -1276,7 +1276,7 @@ } again: @@ -147,18 +147,9 @@ diff -Naur ppp-e1266c7-orig/pppd/tdb.c ppp-e1266c7/pppd/tdb.c if ((open_flags & O_CREAT) && errno == ENOENT && mkdir_recursive(PPP_PATH_VARRUN) == 0) goto again; -@@ -1979,7 +1979,7 @@ - } - if (close(tdb->fd) != 0) - TDB_LOG((tdb, 0, "tdb_reopen: WARNING closing tdb->fd failed!\n")); -- tdb->fd = open(tdb->name, tdb->open_flags & ~(O_CREAT|O_TRUNC), 0); -+ tdb->fd = open(tdb->name, (tdb->open_flags & ~(O_CREAT|O_TRUNC)) | O_CLOEXEC, 0); - if (tdb->fd == -1) { - TDB_LOG((tdb, 0, "tdb_reopen: open failed (%s)\n", strerror(errno))); - goto fail; -diff -Naur ppp-e1266c7-orig/pppd/tty.c ppp-e1266c7/pppd/tty.c ---- ppp-e1266c7-orig/pppd/tty.c 2024-02-13 10:40:56.000000000 +0100 -+++ ppp-e1266c7/pppd/tty.c 2024-03-15 10:52:35.828341901 +0100 +diff -Naur pppd.orig/tty.c pppd/tty.c +--- pppd.orig/tty.c 2024-09-18 06:30:31.000000000 +0200 ++++ pppd/tty.c 2024-10-07 16:31:11.161674911 +0200 @@ -621,7 +621,7 @@ ppp_set_status(EXIT_OPEN_FAILED); goto errret; @@ -177,9 +168,9 @@ diff -Naur ppp-e1266c7-orig/pppd/tty.c ppp-e1266c7/pppd/tty.c break; if (errno != EINTR) { error("Failed to reopen %s: %m", devnam); -diff -Naur ppp-e1266c7-orig/pppd/utils.c ppp-e1266c7/pppd/utils.c ---- ppp-e1266c7-orig/pppd/utils.c 2024-02-13 10:40:56.000000000 +0100 -+++ ppp-e1266c7/pppd/utils.c 2024-03-15 10:55:27.176832115 +0100 +diff -Naur pppd.orig/utils.c pppd/utils.c +--- pppd.orig/utils.c 2024-09-18 06:30:31.000000000 +0200 ++++ pppd/utils.c 2024-10-07 16:32:37.780775463 +0200 @@ -926,14 +926,14 @@ slprintf(lock_file, sizeof(lock_file), "%s/LCK..%s", PPP_PATH_LOCKDIR, dev); #endif diff --git a/src/patches/ppp/ppp-2.5.0-3-everywhere-use-SOCK_CLOEXEC-when-creating-socket.patch b/src/patches/ppp/ppp-2.5.1-3-everywhere-use-SOCK_CLOEXEC-when-creating-socket.patch similarity index 100% rename from src/patches/ppp/ppp-2.5.0-3-everywhere-use-SOCK_CLOEXEC-when-creating-socket.patch rename to src/patches/ppp/ppp-2.5.1-3-everywhere-use-SOCK_CLOEXEC-when-creating-socket.patch diff --git a/src/patches/ppp/ppp-2.5.0-4-increase-max-padi-attempts.patch b/src/patches/ppp/ppp-2.5.1-4-increase-max-padi-attempts.patch similarity index 100% rename from src/patches/ppp/ppp-2.5.0-4-increase-max-padi-attempts.patch rename to src/patches/ppp/ppp-2.5.1-4-increase-max-padi-attempts.patch diff --git a/src/patches/ppp/ppp-2.5.0-5-headers_4.9.patch b/src/patches/ppp/ppp-2.5.1-5-headers_4.9.patch similarity index 100% rename from src/patches/ppp/ppp-2.5.0-5-headers_4.9.patch rename to src/patches/ppp/ppp-2.5.1-5-headers_4.9.patch