[File] Patch: whitelist madvise() system call in seccomp filter

Leandro Pereira leandro.pereira at intel.com
Thu Feb 21 23:27:33 UTC 2019


On 2/21/19 2:30 PM, Leandro Pereira wrote:
> 
> The attached patch whitelists the madvise() syscall so that file(1) can
> be executed on those systems with the seccomp filter enabled.
> 

I apologize for this.  The attachment was scrubbed by the corporate
email server.

Here's a copy of that patch[1].

[1]
https://gist.githubusercontent.com/lpereira/71315a2e7507a8bb8ce913d8dde684e6/raw/a219bb3063e66620262aeca730c99cb7871bb92e/gistfile1.txt


Thanks,
	Leandro


More information about the File mailing list