Chromium Code Reviews| Index: sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h |
| diff --git a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h |
| index d2a6faadb6ddb36c9beb18a665353f0a5606febd..cc916d6ea70bd380d893e9e8c6da25b10ce465d5 100644 |
| --- a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h |
| +++ b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h |
| @@ -98,6 +98,11 @@ SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictClockID(); |
| // GRND_NONBLOCK. |
| SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictGetRandom(); |
| +// Restrict the new_limit argument to prlimit64() to NULL, and the pid argument |
|
Jorge Lucangeli Obes
2016/11/22 16:06:39
"only allow only" -> "only allow"
|
| +// to the current process (or 0), to only allow only getting rlimits on the |
| +// current process. Otherwise, fail gracefully; see crbug.com/160157. |
| +SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictPrlimitToGetrlimit(pid_t target_pid); |
| + |
| } // namespace sandbox. |
| #endif // SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_PARAMETERS_RESTRICTIONS_H_ |