[File] Patch: whitelist madvise() system call in seccomp filter

Christos Zoulas christos at zoulas.com
Sun Feb 24 18:12:24 UTC 2019


On Feb 21,  3:27pm, leandro.pereira at intel.com (Leandro Pereira) wrote:
-- Subject: Re: [File] Patch: whitelist madvise() system call in seccomp filt

| On 2/21/19 2:30 PM, Leandro Pereira wrote:
| > 
| > The attached patch whitelists the madvise() syscall so that file(1) can
| > be executed on those systems with the seccomp filter enabled.
| > 
| 
| I apologize for this.  The attachment was scrubbed by the corporate
| email server.
| 
| Here's a copy of that patch[1].
| 
| [1]
| https://gist.githubusercontent.com/lpereira/71315a2e7507a8bb8ce913d8dde684e6/raw/a219bb3063e66620262aeca730c99cb7871bb92e/gistfile1.txt
| 

Applied, thanks!

christos


More information about the File mailing list