Index: content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc |
diff --git a/content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc b/content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc |
index c3b1605fc7dc6f091ae5456aad0371bcf2ee7c1a..0c760606f51a66e89d8f438efa9eb8c987957a3a 100644 |
--- a/content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc |
+++ b/content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc |
@@ -30,8 +30,10 @@ ResultExpr SandboxBPFBasePolicyAndroid::EvaluateSyscall(int sysno) const { |
case __NR_flock: |
#if defined(__x86_64__) || defined(__aarch64__) |
case __NR_newfstatat: |
+ case __NR_getdents64: |
#elif defined(__i386__) || defined(__arm__) || defined(__mips__) |
case __NR_fstatat64: |
+ case __NR_getdents: |
#endif |
case __NR_getpriority: |
case __NR_ioctl: |
@@ -56,6 +58,15 @@ ResultExpr SandboxBPFBasePolicyAndroid::EvaluateSyscall(int sysno) const { |
case __NR_getrlimit: |
#endif |
case __NR_uname: |
+ |
+ // Permit socket operations so that renderers can connect to logd and |
+ // debuggerd. |
+ case __NR_socket: |
mdempsky
2016/02/05 18:31:46
These seem scary. Is there anything in place to p
Robert Sesek
2016/02/05 19:57:12
Yeah, I wasn't wild about having to add these, but
|
+ case __NR_connect: |
+ |
+ // Ptrace is allowed so the Breakpad Microdumper can fork in a renderer |
+ // and then ptrace the parent. |
+ case __NR_ptrace: |
override_and_allow = true; |
break; |
} |