Here's a possible systemtap-based band-aid, until the patched kernels are installed:
stap -g -e 'probe syscall.vmsplice { printf("blocking vmsplice (%s) uid %d pid %d exec %s\n", argstr, uid(), pid(), execname()) $nr_segs = 0 }'
Here's a possible systemtap-based band-aid, until the patched kernels are installed:
stap -g -e 'probe syscall.vmsplice {
printf("blocking vmsplice (%s) uid %d pid %d exec %s\n", argstr, uid(),
pid(), execname())
$nr_segs = 0
}'