Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(179)

Unified Diff: sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc

Issue 568533002: Linux sandbox: allow sigaltstack in Android baseline policy. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 6 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc
diff --git a/sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc b/sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc
index 913d4f691b8e5a290ffacef9ba48d198c6ac265a..45de129e24be031c0a2e729f2a8e07af31e56572 100644
--- a/sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc
+++ b/sandbox/linux/seccomp-bpf-helpers/baseline_policy.cc
@@ -120,10 +120,9 @@ ResultExpr EvaluateSyscallImpl(int fs_denied_errno,
return Allow();
}
-#if defined(__aarch64__)
- // These are needed for thread creation.
- // TODO(leecam): Check jln's fix for this and remove these 'allows'.
- if (sysno == __NR_sigaltstack || sysno == __NR_setpriority)
+#if defined(OS_ANDROID)
+ // Needed for thread creation.
+ if (sysno == __NR_sigaltstack)
return Allow();
#endif
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698