| OLD | NEW |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_PARAMETERS_RESTRICTIONS_H_ | 5 #ifndef SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_PARAMETERS_RESTRICTIONS_H_ |
| 6 #define SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_PARAMETERS_RESTRICTIONS_H_ | 6 #define SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_PARAMETERS_RESTRICTIONS_H_ |
| 7 | 7 |
| 8 #include <unistd.h> | 8 #include <unistd.h> |
| 9 | 9 |
| 10 #include "build/build_config.h" | 10 #include "build/build_config.h" |
| (...skipping 69 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 80 // We only allow calling these syscalls if the pid argument is equal to the pid | 80 // We only allow calling these syscalls if the pid argument is equal to the pid |
| 81 // of the sandboxed process or 0 (indicating the current thread). The following | 81 // of the sandboxed process or 0 (indicating the current thread). The following |
| 82 // syscalls are supported: | 82 // syscalls are supported: |
| 83 // | 83 // |
| 84 // sched_getaffinity(), sched_getattr(), sched_getparam(), sched_getscheduler(), | 84 // sched_getaffinity(), sched_getattr(), sched_getparam(), sched_getscheduler(), |
| 85 // sched_rr_get_interval(), sched_setaffinity(), sched_setattr(), | 85 // sched_rr_get_interval(), sched_setaffinity(), sched_setattr(), |
| 86 // sched_setparam(), sched_setscheduler() | 86 // sched_setparam(), sched_setscheduler() |
| 87 SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictSchedTarget(pid_t target_pid, | 87 SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictSchedTarget(pid_t target_pid, |
| 88 int sysno); | 88 int sysno); |
| 89 | 89 |
| 90 // Restricts the |pid| argument of prlimit64 to 0 (meaning the calling process) |
| 91 // or target_pid. |
| 92 SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictPrlimit64(pid_t target_pid); |
| 93 |
| 90 } // namespace sandbox. | 94 } // namespace sandbox. |
| 91 | 95 |
| 92 #endif // SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_PARAMETERS_RESTRICTIONS_H_ | 96 #endif // SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_PARAMETERS_RESTRICTIONS_H_ |
| OLD | NEW |