Index: sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h |
diff --git a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h |
index d557c5f3946d1465374e9cd2ea90748ee4b335bd..0ec396d534fe0083c665179e1b40200bc06f8067 100644 |
--- a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h |
+++ b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h |
@@ -67,15 +67,6 @@ SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictFutex(); |
// |target_pid| while calling setpriority(2) / getpriority(2). |
SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictGetSetpriority(pid_t target_pid); |
-// Restrict |clk_id| for clock_getres(), clock_gettime() and clock_settime(). |
-// We allow accessing only CLOCK_MONOTONIC, CLOCK_PROCESS_CPUTIME_ID, |
-// CLOCK_REALTIME, and CLOCK_THREAD_CPUTIME_ID. In particular, this disallows |
-// access to arbitrary per-{process,thread} CPU-time clock IDs (such as those |
-// returned by {clock,pthread}_getcpuclockid), which can leak information |
-// about the state of the host OS. |
-// On Chrome OS, base::TimeTicks::kClockSystemTrace is also allowed. |
-SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictClockID(); |
- |
// Restricts |pid| for sched_* syscalls which take a pid as the first argument. |
// We only allow calling these syscalls if the pid argument is equal to the pid |
// of the sandboxed process or 0 (indicating the current thread). The following |
@@ -95,6 +86,15 @@ SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictPrlimit64(pid_t target_pid); |
// process). |
SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictGetrusage(); |
+// Restrict |clk_id| for clock_getres(), clock_gettime() and clock_settime(). |
+// We allow accessing only CLOCK_MONOTONIC, CLOCK_PROCESS_CPUTIME_ID, |
+// CLOCK_REALTIME, and CLOCK_THREAD_CPUTIME_ID. In particular, this disallows |
+// access to arbitrary per-{process,thread} CPU-time clock IDs (such as those |
+// returned by {clock,pthread}_getcpuclockid), which can leak information |
+// about the state of the host OS. |
+// On Chrome OS, base::TimeTicks::kClockSystemTrace is also allowed. |
+SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictClockID(); |
+ |
} // namespace sandbox. |
#endif // SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_PARAMETERS_RESTRICTIONS_H_ |