From 060c4d4504efd3fe47de40e5366947847803232d Mon Sep 17 00:00:00 2001 From: Christian Brauner Date: Wed, 8 Apr 2020 14:42:05 +0200 Subject: [PATCH] seccomp: newer kernels require the buffer to be zeroed Signed-off-by: Christian Brauner --- src/lxc/seccomp.c | 1 + 1 file changed, 1 insertion(+) diff --git a/src/lxc/seccomp.c b/src/lxc/seccomp.c index 081d315ab..7820db8b2 100644 --- a/src/lxc/seccomp.c +++ b/src/lxc/seccomp.c @@ -1354,6 +1354,7 @@ int seccomp_notify_handler(int fd, uint32_t events, void *data, char *cookie = conf->seccomp.notifier.cookie; uint64_t req_id; + memset(req, 0, sizeof(*req)); ret = seccomp_notify_receive(fd, req); if (ret) { SYSERROR("Failed to read seccomp notification"); -- 2.47.2