| Index: content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc
|
| diff --git a/content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc b/content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc
|
| index fed5af39a1a7e43a96ca3fdb04b8eec62f893970..231e3f6010584e87cbc4c9b31bda14cf6a0249e1 100644
|
| --- a/content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc
|
| +++ b/content/common/sandbox_linux/android/sandbox_bpf_base_policy_android.cc
|
| @@ -181,8 +181,8 @@ ResultExpr SandboxBPFBasePolicyAndroid::EvaluateSyscall(int sysno) const {
|
| }
|
|
|
| // https://crbug.com/682488
|
| - if (sysno == __NR_getsockopt || sysno == __NR_setsockopt) {
|
| - // The baseline policy applies other restrictions to these syscalls.
|
| + if (sysno == __NR_setsockopt) {
|
| + // The baseline policy applies other restrictions to setsockopt.
|
| const Arg<int> level(1);
|
| const Arg<int> option(2);
|
| return If(AllOf(level == SOL_SOCKET, option == SO_SNDTIMEO), Allow())
|
|
|