Compare commits
2 Commits
11fcfc5398
...
98cd752a28
Author | SHA1 | Date |
---|---|---|
Felipe Sateler | 98cd752a28 | |
Leonid Evdokimov | 6e3c443b56 |
|
@ -1199,7 +1199,7 @@ static int bump_rlimit_memlock(struct rlimit *saved_rlimit) {
|
|||
int r;
|
||||
|
||||
/* BPF_MAP_TYPE_LPM_TRIE bpf maps are charged against RLIMIT_MEMLOCK, even if we have CAP_IPC_LOCK which should
|
||||
* normally disable such checks. We need them to implement IPAccessAllow= and IPAccessDeny=, hence let's bump
|
||||
* normally disable such checks. We need them to implement IPAddressAllow= and IPAddressDeny=, hence let's bump
|
||||
* the value high enough for our user. */
|
||||
|
||||
/* Using MAX() on resource limits only is safe if RLIM_INFINITY is > 0. POSIX declares that rlim_t
|
||||
|
|
|
@ -689,7 +689,7 @@ static void test_condition_test_group(void) {
|
|||
condition_free(condition);
|
||||
free(gid);
|
||||
|
||||
groupname = (char*)(geteuid() == 0 ? NOBODY_GROUP_NAME : "root");
|
||||
groupname = (char*)(getegid() == 0 ? NOBODY_GROUP_NAME : "root");
|
||||
condition = condition_new(CONDITION_GROUP, groupname, false, false);
|
||||
assert_se(condition);
|
||||
r = condition_test(condition);
|
||||
|
|
Loading…
Reference in New Issue