[File] Patch: whitelist madvise() system call in seccomp filter
Leandro Pereira
leandro.pereira at intel.com
Thu Feb 21 22:30:00 UTC 2019
Hi.
Some malloc implementations will call madvise() to enable the use of
huge pages, and if a memory allocation in file triggers the threshold
in the allocator, file(1) receives an untrappable SIGSYS.
The attached patch whitelists the madvise() syscall so that file(1) can
be executed on those systems with the seccomp filter enabled.
Cheers,
Leandro
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0001-seccomp-Allow-madvise-system-call.patch
Type: text/x-patch
Size: 861 bytes
Desc: not available
URL: <https://mailman.astron.com/pipermail/file/attachments/20190221/a577fe1e/attachment.bin>
More information about the File
mailing list