diff options
author | Carlos Garnacho <carlosg@gnome.org> | 2016-12-15 17:58:31 +0100 |
---|---|---|
committer | Carlos Garnacho <carlosg@gnome.org> | 2016-12-16 01:39:53 +0100 |
commit | 4d25dff2d258481b2cc2dc786410db159151799c (patch) | |
tree | 0413752891382b21e03b530a5090886a4ae123b6 | |
parent | a344fd8587b1dff253b768ff7c74610ae6b0c7e2 (diff) | |
download | tracker-4d25dff2d258481b2cc2dc786410db159151799c.tar.gz |
libtracker-common: Whitelist more syscalls used on non-x86_64 arches
These ones were spotted after compiling Tracker on i686.
https://bugzilla.gnome.org/show_bug.cgi?id=776117
-rw-r--r-- | src/libtracker-common/tracker-seccomp.c | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/src/libtracker-common/tracker-seccomp.c b/src/libtracker-common/tracker-seccomp.c index 4f0a3baab..b052cbc83 100644 --- a/src/libtracker-common/tracker-seccomp.c +++ b/src/libtracker-common/tracker-seccomp.c @@ -52,6 +52,7 @@ tracker_seccomp_init (void) /* Memory management */ ALLOW_RULE (brk); ALLOW_RULE (mmap); + ALLOW_RULE (mmap2); ALLOW_RULE (munmap); ALLOW_RULE (mremap); ALLOW_RULE (mprotect); @@ -59,7 +60,9 @@ tracker_seccomp_init (void) /* Process management */ ALLOW_RULE (exit_group); ALLOW_RULE (getuid); + ALLOW_RULE (getuid32); ALLOW_RULE (geteuid); + ALLOW_RULE (geteuid32); ALLOW_RULE (getppid); ALLOW_RULE (gettid); ALLOW_RULE (exit); @@ -78,6 +81,7 @@ tracker_seccomp_init (void) ALLOW_RULE (readlink); ALLOW_RULE (readlinkat); ALLOW_RULE (utime); + ALLOW_RULE (time); ALLOW_RULE (fsync); /* Processes and threads */ ALLOW_RULE (clone); @@ -92,6 +96,8 @@ tracker_seccomp_init (void) ALLOW_RULE (poll); ALLOW_RULE (ppoll); ALLOW_RULE (fcntl); + ALLOW_RULE (fcntl64); + ALLOW_RULE (eventfd); ALLOW_RULE (eventfd2); ALLOW_RULE (pipe); ALLOW_RULE (pipe2); @@ -105,6 +111,7 @@ tracker_seccomp_init (void) ALLOW_RULE (read); ALLOW_RULE (pread64); ALLOW_RULE (lseek); + ALLOW_RULE (_llseek); ALLOW_RULE (fadvise64); ALLOW_RULE (write); ALLOW_RULE (writev); |