Chromium Code Reviews| Index: content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc |
| diff --git a/content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc b/content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc |
| index dd7d1c58c6d8174c455dfcded219de3954fe97ae..a24b6862617b30d0dcf30c39169814c0583bbbf0 100644 |
| --- a/content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc |
| +++ b/content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc |
| @@ -82,7 +82,9 @@ ResultExpr SandboxBPFBasePolicyAndroid::EvaluateSyscall(int sysno) const { |
| #endif |
| case __NR_openat: |
| case __NR_pread64: |
| + case __NR_pwrite64: |
| case __NR_rt_sigtimedwait: |
| + case __NR_sched_getparam: |
|
mdempsky
2016/02/17 21:54:52
It is possible/reasonable to restrict which pids c
Robert Sesek
2016/02/17 22:50:11
No, because Bionic passes a TID to this in its pth
|
| case __NR_setpriority: |
| case __NR_set_tid_address: |
| case __NR_sigaltstack: |
| @@ -99,8 +101,9 @@ ResultExpr SandboxBPFBasePolicyAndroid::EvaluateSyscall(int sysno) const { |
| // is demultiplexed below. |
| #if defined(__x86_64__) || defined(__arm__) || defined(__aarch64__) || \ |
| defined(__mips__) |
| - case __NR_socket: |
| + case __NR_getsockopt: |
| case __NR_connect: |
| + case __NR_socket: |
| #endif |
| // Ptrace is allowed so the Breakpad Microdumper can fork in a renderer |
| @@ -129,6 +132,7 @@ ResultExpr SandboxBPFBasePolicyAndroid::EvaluateSyscall(int sysno) const { |
| .ElseIf(AllOf(socketcall == SYS_SOCKET, |
| RestrictSocketArguments(domain, type, protocol)), |
| Allow()) |
| + .ElseIf(socketcall == SYS_GETSOCKOPT, Allow()) |
| .Else(Error(EPERM)); |
| } |
| #endif |