Browse Source

transmission: add syscalls to seccomp filter

Syscalls observered when running on arm32. Add them to seccomp rule.

Signed-off-by: Daniel Golle <daniel@makrotopia.org>
lilik-openwrt-22.03
Daniel Golle 5 years ago
parent
commit
3724ed3d68
2 changed files with 8 additions and 1 deletions
  1. +1
    -1
      net/transmission/Makefile
  2. +7
    -0
      net/transmission/files/transmission-daemon.json

+ 1
- 1
net/transmission/Makefile View File

@ -9,7 +9,7 @@ include $(TOPDIR)/rules.mk
PKG_NAME:=transmission
PKG_VERSION:=2.94
PKG_RELEASE:=12
PKG_RELEASE:=13
PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.xz
PKG_SOURCE_URL:=@GITHUB/transmission/transmission-releases/master


+ 7
- 0
net/transmission/files/transmission-daemon.json View File

@ -1,5 +1,6 @@
{
"whitelist": [
"accept",
"accept4",
"access",
"arm_fadvise64_64",
@ -27,6 +28,7 @@
"getpid",
"getsockname",
"getsockopt",
"getuid32",
"ioctl",
"listen",
"_llseek",
@ -37,6 +39,7 @@
"mmap",
"mmap2",
"mprotect",
"mremap",
"munmap",
"nanosleep",
"_newselect",
@ -47,6 +50,7 @@
"pread64",
"prlimit64",
"pwrite64",
"quotactl",
"read",
"readlink",
"readv",
@ -64,9 +68,12 @@
"socket",
"stat",
"stat64",
"socketpair",
"umask",
"uname",
"unlink",
"statfs64",
"umask",
"write",
"writev"
],


Loading…
Cancel
Save