File: partially-deployed-mseal-syscall.patch

package info (click to toggle)
chromium 134.0.6998.35-1~deb12u1
  • links: PTS, VCS
  • area: main
  • in suites: bookworm
  • size: 5,929,812 kB
  • sloc: cpp: 34,189,808; ansic: 7,041,458; javascript: 4,034,221; python: 1,459,275; asm: 846,276; xml: 726,550; pascal: 178,372; sh: 104,683; objc: 91,089; perl: 88,388; sql: 48,244; cs: 43,980; makefile: 28,768; fortran: 24,137; php: 20,829; ruby: 17,806; tcl: 10,142; yacc: 8,631; lisp: 3,097; lex: 1,327; ada: 727; awk: 329; jsp: 228; sed: 36
file content (15 lines) | stat: -rw-r--r-- 615 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Index: chromium-130.0.6723.58/sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc
===================================================================
--- chromium-130.0.6723.58.orig/sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc
+++ chromium-130.0.6723.58/sandbox/linux/seccomp-bpf-helpers/syscall_sets.cc
@@ -548,7 +548,10 @@ bool SyscallSets::IsAllowedAddressSpaceA
     case __NR_mlock:
     case __NR_munlock:
     case __NR_munmap:
+// Older Debian kernels are missing this syscall
+#if !defined(__powerpc64__)
     case __NR_mseal:
+#endif
       return true;
     case __NR_madvise:
     case __NR_mincore: