mirror of
https://gitlab.isc.org/isc-projects/bind9
synced 2025-08-29 21:47:59 +00:00
On send, treat EPERM like ISC_R_HOSTUNREACH. send() seems to return EPERM
on Linux when firewall rules block the send.
This commit is contained in:
parent
9be4279a95
commit
3d37f10b91
@ -15,7 +15,7 @@
|
||||
* WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
|
||||
*/
|
||||
|
||||
/* $Id: socket.c,v 1.154 2000/08/10 00:05:43 bwelling Exp $ */
|
||||
/* $Id: socket.c,v 1.155 2000/08/10 21:47:46 bwelling Exp $ */
|
||||
|
||||
#include <config.h>
|
||||
|
||||
@ -913,6 +913,7 @@ doio_send(isc_socket_t *sock, isc_socketevent_t *dev) {
|
||||
ALWAYS_HARD(EHOSTUNREACH, ISC_R_HOSTUNREACH);
|
||||
ALWAYS_HARD(ENOBUFS, ISC_R_NORESOURCES);
|
||||
ALWAYS_HARD(EADDRNOTAVAIL, ISC_R_ADDRNOTAVAIL);
|
||||
ALWAYS_HARD(EPERM, ISC_R_HOSTUNREACH);
|
||||
|
||||
#undef SOFT_OR_HARD
|
||||
#undef ALWAYS_HARD
|
||||
|
Loading…
x
Reference in New Issue
Block a user