summaryrefslogtreecommitdiff
path: root/src/shared
diff options
context:
space:
mode:
authorZbigniew Jędrzejewski-Szmek <zbyszek@in.waw.pl>2021-11-13 16:08:25 +0100
committerYu Watanabe <watanabe.yu+github@gmail.com>2021-11-14 13:53:50 +0900
commit4728625490b70ac4a686b1655c08ad3fe7b97359 (patch)
treeed16bd9d1999688d116db368acdf3ec7c88135f7 /src/shared
parent311956ccd91614a7d5fb8cbb458fb8dc6fdfcf97 (diff)
downloadsystemd-4728625490b70ac4a686b1655c08ad3fe7b97359.tar.gz
seccomp: move mprotect to @default
With glibc-2.34.9000-17.fc36.x86_64, dynamically programs newly fail in early init with a restrictive syscall filter that does not include @system-service. I think this is caused by 2dd87703d4386f2776c5b5f375a494c91d7f9fe4: Author: Florian Weimer <fweimer@redhat.com> Date: Mon May 10 10:31:41 2021 +0200 nptl: Move changing of stack permissions into ld.so All the stack lists are now in _rtld_global, so it is possible to change stack permissions directly from there, instead of calling into libpthread to do the change. It seems that this call will now be very widely used, so let's just move it to default to avoid too many failures.
Diffstat (limited to 'src/shared')
-rw-r--r--src/shared/seccomp-util.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/shared/seccomp-util.c b/src/shared/seccomp-util.c
index ff90af538b..7d2c52e188 100644
--- a/src/shared/seccomp-util.c
+++ b/src/shared/seccomp-util.c
@@ -324,6 +324,7 @@ const SyscallFilterSet syscall_filter_sets[_SYSCALL_FILTER_SET_MAX] = {
"membarrier\0"
"mmap\0"
"mmap2\0"
+ "mprotect\0"
"munmap\0"
"nanosleep\0"
"pause\0"
@@ -864,7 +865,6 @@ const SyscallFilterSet syscall_filter_sets[_SYSCALL_FILTER_SET_MAX] = {
"ioprio_get\0"
"kcmp\0"
"madvise\0"
- "mprotect\0"
"mremap\0"
"name_to_handle_at\0"
"oldolduname\0"