| Index: sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h
|
| diff --git a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h
|
| index d557c5f3946d1465374e9cd2ea90748ee4b335bd..0ec396d534fe0083c665179e1b40200bc06f8067 100644
|
| --- a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h
|
| +++ b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h
|
| @@ -67,15 +67,6 @@ SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictFutex();
|
| // |target_pid| while calling setpriority(2) / getpriority(2).
|
| SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictGetSetpriority(pid_t target_pid);
|
|
|
| -// Restrict |clk_id| for clock_getres(), clock_gettime() and clock_settime().
|
| -// We allow accessing only CLOCK_MONOTONIC, CLOCK_PROCESS_CPUTIME_ID,
|
| -// CLOCK_REALTIME, and CLOCK_THREAD_CPUTIME_ID. In particular, this disallows
|
| -// access to arbitrary per-{process,thread} CPU-time clock IDs (such as those
|
| -// returned by {clock,pthread}_getcpuclockid), which can leak information
|
| -// about the state of the host OS.
|
| -// On Chrome OS, base::TimeTicks::kClockSystemTrace is also allowed.
|
| -SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictClockID();
|
| -
|
| // Restricts |pid| for sched_* syscalls which take a pid as the first argument.
|
| // We only allow calling these syscalls if the pid argument is equal to the pid
|
| // of the sandboxed process or 0 (indicating the current thread). The following
|
| @@ -95,6 +86,15 @@ SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictPrlimit64(pid_t target_pid);
|
| // process).
|
| SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictGetrusage();
|
|
|
| +// Restrict |clk_id| for clock_getres(), clock_gettime() and clock_settime().
|
| +// We allow accessing only CLOCK_MONOTONIC, CLOCK_PROCESS_CPUTIME_ID,
|
| +// CLOCK_REALTIME, and CLOCK_THREAD_CPUTIME_ID. In particular, this disallows
|
| +// access to arbitrary per-{process,thread} CPU-time clock IDs (such as those
|
| +// returned by {clock,pthread}_getcpuclockid), which can leak information
|
| +// about the state of the host OS.
|
| +// On Chrome OS, base::TimeTicks::kClockSystemTrace is also allowed.
|
| +SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictClockID();
|
| +
|
| } // namespace sandbox.
|
|
|
| #endif // SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_PARAMETERS_RESTRICTIONS_H_
|
|
|