From 3d37f10b91b05b6b34ffd0b4154d3592f7662bac Mon Sep 17 00:00:00 2001 From: Brian Wellington Date: Thu, 10 Aug 2000 21:47:46 +0000 Subject: [PATCH] On send, treat EPERM like ISC_R_HOSTUNREACH. send() seems to return EPERM on Linux when firewall rules block the send. --- lib/isc/unix/socket.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/lib/isc/unix/socket.c b/lib/isc/unix/socket.c index 428205b969..fd5e34a40c 100644 --- a/lib/isc/unix/socket.c +++ b/lib/isc/unix/socket.c @@ -15,7 +15,7 @@ * WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. */ -/* $Id: socket.c,v 1.154 2000/08/10 00:05:43 bwelling Exp $ */ +/* $Id: socket.c,v 1.155 2000/08/10 21:47:46 bwelling Exp $ */ #include @@ -913,6 +913,7 @@ doio_send(isc_socket_t *sock, isc_socketevent_t *dev) { ALWAYS_HARD(EHOSTUNREACH, ISC_R_HOSTUNREACH); ALWAYS_HARD(ENOBUFS, ISC_R_NORESOURCES); ALWAYS_HARD(EADDRNOTAVAIL, ISC_R_ADDRNOTAVAIL); + ALWAYS_HARD(EPERM, ISC_R_HOSTUNREACH); #undef SOFT_OR_HARD #undef ALWAYS_HARD