From 3a31172e334b6f8ba2f7157604236c1a254de372 Mon Sep 17 00:00:00 2001 From: Justus Winter <4winter@informatik.uni-hamburg.de> Date: Fri, 26 Sep 2014 15:30:22 +0200 Subject: fix? make_send_right.patch --- debian/patches/make_send_right.patch | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) (limited to 'debian') diff --git a/debian/patches/make_send_right.patch b/debian/patches/make_send_right.patch index 5ed3450..084342e 100644 --- a/debian/patches/make_send_right.patch +++ b/debian/patches/make_send_right.patch @@ -1,17 +1,21 @@ diff --git a/kern/bootstrap.c b/kern/bootstrap.c -index d919e90..fe17c80 100644 +index d919e90..5f82d19 100644 --- a/kern/bootstrap.c +++ b/kern/bootstrap.c -@@ -98,7 +98,7 @@ task_insert_send_right( +@@ -96,9 +96,11 @@ task_insert_send_right( + + for (name = 1;; name++) { kern_return_t kr; ++ mach_port_t sright; ++ sright = ipc_port_make_send(port); kr = mach_port_insert_right(task->itk_space, name, - port, MACH_MSG_TYPE_PORT_SEND); -+ port, MACH_MSG_TYPE_MAKE_SEND); ++ sright, MACH_MSG_TYPE_PORT_SEND); if (kr == KERN_SUCCESS) break; assert(kr == KERN_NAME_EXISTS); -@@ -155,13 +155,13 @@ void bootstrap_create(void) +@@ -155,13 +157,13 @@ void bootstrap_create(void) /* Initialize boot script variables. We leak these send rights. */ losers = boot_script_set_variable ("host-port", VAL_PORT, -- cgit v1.2.3