On 24 March 2018 at 20:12, Victor Kamensky <[email protected]> wrote: > Here is another crazy idea how to deal with it, just > brainstorming what options are on the table: disable > renameat2 with help of seccomp and force coreutils to > use other calls. Something along the lines that were > suggested with intercept of syscall function call, but > let kernel to do interception work.
Wow, that's impressively magic. Does this depend on kernel options or specific recent versions? Ross -- _______________________________________________ Openembedded-core mailing list [email protected] http://lists.openembedded.org/mailman/listinfo/openembedded-core
