From 4429e5f49d840d5ec6a4afb7dfc59faeff18dd87 Mon Sep 17 00:00:00 2001 From: CPunch Date: Mon, 27 Feb 2023 20:01:49 -0600 Subject: [PATCH] sandbox: allow newfstatat Testing on Arch x86_64, when connecting to the login server this syscall triggered the secomp filter --- src/sandbox/seccomp.cpp | 1 + 1 file changed, 1 insertion(+) diff --git a/src/sandbox/seccomp.cpp b/src/sandbox/seccomp.cpp index c179907..a4cbc8c 100644 --- a/src/sandbox/seccomp.cpp +++ b/src/sandbox/seccomp.cpp @@ -157,6 +157,7 @@ static sock_filter filter[] = { ALLOW_SYSCALL(stat), #endif ALLOW_SYSCALL(fstat), + ALLOW_SYSCALL(newfstatat), ALLOW_SYSCALL(fsync), // maybe #if __NR_creat ALLOW_SYSCALL(creat), // maybe; for DB journal