| Index: sandbox/linux/seccomp-bpf/sandbox_bpf.h
|
| diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf.h b/sandbox/linux/seccomp-bpf/sandbox_bpf.h
|
| index 51f2f2469fffe4530fbdf5a9213fc34ad882eeb2..870e8a0d9cabde1bdfa159bb6dec19662e9f0775 100644
|
| --- a/sandbox/linux/seccomp-bpf/sandbox_bpf.h
|
| +++ b/sandbox/linux/seccomp-bpf/sandbox_bpf.h
|
| @@ -130,6 +130,10 @@ class SANDBOX_EXPORT SandboxBPF {
|
| // entire sandbox should be considered compromised.
|
| ErrorCode UnsafeTrap(Trap::TrapFnc fnc, const void* aux);
|
|
|
| + // UnsafeTraps require some syscalls to always be allowed.
|
| + // This helper function returns true for these calls.
|
| + static bool IsRequiredForUnsafeTrap(int sysno);
|
| +
|
| // From within an UnsafeTrap() it is often useful to be able to execute
|
| // the system call that triggered the trap. The ForwardSyscall() method
|
| // makes this easy. It is more efficient than calling glibc's syscall()
|
|
|