[File] Patch: whitelist madvise() system call in seccomp filter
Leandro Pereira
leandro.pereira at intel.com
Thu Feb 21 23:27:33 UTC 2019
On 2/21/19 2:30 PM, Leandro Pereira wrote:
>
> The attached patch whitelists the madvise() syscall so that file(1) can
> be executed on those systems with the seccomp filter enabled.
>
I apologize for this. The attachment was scrubbed by the corporate
email server.
Here's a copy of that patch[1].
[1]
https://gist.githubusercontent.com/lpereira/71315a2e7507a8bb8ce913d8dde684e6/raw/a219bb3063e66620262aeca730c99cb7871bb92e/gistfile1.txt
Thanks,
Leandro
More information about the File
mailing list