diff options
author | fanquake <fanquake@gmail.com> | 2021-10-07 12:35:02 +0800 |
---|---|---|
committer | fanquake <fanquake@gmail.com> | 2021-10-07 12:36:02 +0800 |
commit | 0500a22d8c78cb8514bb1b9b3648f163447e46ac (patch) | |
tree | 947b3d448fe7021e7b545a5c42874f7525db0b57 /src | |
parent | a68de12c0ebfaa9a1dd7f347c7a3aff0e07ae9b9 (diff) | |
parent | fab360aa0027a274681eff3f00ac1972bcfa126c (diff) | |
download | bitcoin-0500a22d8c78cb8514bb1b9b3648f163447e46ac.tar.xz |
Merge bitcoin/bitcoin#23208: util: Add mremap syscall to AllowAddressSpaceAccess
fab360aa0027a274681eff3f00ac1972bcfa126c util: Add mremap syscall to AllowAddressSpaceAccess (MarcoFalke)
Pull request description:
Fixes https://github.com/bitcoin/bitcoin/issues/23206
ACKs for top commit:
practicalswift:
cr ACK fab360aa0027a274681eff3f00ac1972bcfa126c
laanwj:
Code review ACK fab360aa0027a274681eff3f00ac1972bcfa126c
fanquake:
ACK fab360aa0027a274681eff3f00ac1972bcfa126c - confirmed that the GUIX build is working with this change:
Tree-SHA512: 9cf808b3e04830e87bca49b27914993929be3c27eb674d89739b8ea5e5c848c87713d638506c1cd2b80b0129c3dff0c488eb240eef3bbf3d7508ece3c934fb54
Diffstat (limited to 'src')
-rw-r--r-- | src/util/syscall_sandbox.cpp | 15 |
1 files changed, 8 insertions, 7 deletions
diff --git a/src/util/syscall_sandbox.cpp b/src/util/syscall_sandbox.cpp index 6d62864a4a..746feb0835 100644 --- a/src/util/syscall_sandbox.cpp +++ b/src/util/syscall_sandbox.cpp @@ -523,14 +523,15 @@ public: void AllowAddressSpaceAccess() { - allowed_syscalls.insert(__NR_brk); // change data segment size - allowed_syscalls.insert(__NR_madvise); // give advice about use of memory + allowed_syscalls.insert(__NR_brk); // change data segment size + allowed_syscalls.insert(__NR_madvise); // give advice about use of memory allowed_syscalls.insert(__NR_membarrier); // issue memory barriers on a set of threads - allowed_syscalls.insert(__NR_mlock); // lock memory - allowed_syscalls.insert(__NR_mmap); // map files or devices into memory - allowed_syscalls.insert(__NR_mprotect); // set protection on a region of memory - allowed_syscalls.insert(__NR_munlock); // unlock memory - allowed_syscalls.insert(__NR_munmap); // unmap files or devices into memory + allowed_syscalls.insert(__NR_mlock); // lock memory + allowed_syscalls.insert(__NR_mmap); // map files or devices into memory + allowed_syscalls.insert(__NR_mprotect); // set protection on a region of memory + allowed_syscalls.insert(__NR_mremap); // remap a file in memory + allowed_syscalls.insert(__NR_munlock); // unlock memory + allowed_syscalls.insert(__NR_munmap); // unmap files or devices into memory } void AllowEpoll() |