Skip to content
Commit 4de1909e authored by Christian Ehrhardt's avatar Christian Ehrhardt Committed by Zbigniew Jędrzejewski-Szmek
Browse files

seccomp: use per arch shmat_syscall



At the beginning of seccomp_memory_deny_write_execute architectures
can set individual filter_syscall, block_syscall, shmat_syscall values.
The former two are then used in the call to add_seccomp_syscall_filter
but shmat_syscall is not.

Right now all shmat_syscall values are the same, so the change is a
no-op, but if ever an architecture is added/modified this would be a
subtle source for a mistake so fix it by using shmat_syscall later.

Signed-off-by: default avatarChristian Ehrhardt <christian.ehrhardt@canonical.com>
(cherry picked from commit 5ef3ed97)
parent d8301052
Loading
Loading
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment