| Index: sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc
|
| diff --git a/sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc b/sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc
|
| index 5b8badf8300d7fb9744bc4c12698181db9749805..a9fb1044778dd8ab28424bbc8afe1b2191b9f921 100644
|
| --- a/sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc
|
| +++ b/sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc
|
| @@ -36,7 +36,6 @@ bool IsBaselinePolicyAllowed(int sysno) {
|
| SyscallSets::IsAllowedGeneralIo(sysno) ||
|
| SyscallSets::IsAllowedGetOrModifySocket(sysno) ||
|
| SyscallSets::IsAllowedGettime(sysno) ||
|
| - SyscallSets::IsAllowedPrctl(sysno) ||
|
| SyscallSets::IsAllowedProcessStartOrDeath(sysno) ||
|
| SyscallSets::IsAllowedSignalHandling(sysno) ||
|
| SyscallSets::IsGetSimpleId(sysno) ||
|
| @@ -71,6 +70,7 @@ bool IsBaselinePolicyWatched(int sysno) {
|
| SyscallSets::IsNetworkSocketInformation(sysno) ||
|
| #endif
|
| SyscallSets::IsNuma(sysno) ||
|
| + SyscallSets::IsPrctl(sysno) ||
|
| SyscallSets::IsProcessGroupOrSession(sysno) ||
|
| #if defined(__i386__)
|
| SyscallSets::IsSocketCall(sysno) ||
|
| @@ -145,6 +145,9 @@ ErrorCode EvaluateSyscallImpl(int fs_denied_errno,
|
| if (sysno == __NR_mprotect)
|
| return RestrictMprotectFlags(sandbox);
|
|
|
| + if (sysno == __NR_prctl)
|
| + return sandbox::RestrictPrctl(sandbox);
|
| +
|
| #if defined(__x86_64__) || defined(__arm__)
|
| if (sysno == __NR_socketpair) {
|
| // Only allow AF_UNIX, PF_UNIX. Crash if anything else is seen.
|
|
|