| OLD | NEW | 
|---|
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be | 
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. | 
| 4 | 4 | 
| 5 #ifndef SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_PARAMETERS_RESTRICTIONS_H_ | 5 #ifndef SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_PARAMETERS_RESTRICTIONS_H_ | 
| 6 #define SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_PARAMETERS_RESTRICTIONS_H_ | 6 #define SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_PARAMETERS_RESTRICTIONS_H_ | 
| 7 | 7 | 
| 8 #include <unistd.h> | 8 #include <unistd.h> | 
| 9 | 9 | 
| 10 #include "build/build_config.h" | 10 #include "build/build_config.h" | 
| (...skipping 69 matching lines...) Expand 10 before | Expand all | Expand 10 after  Loading... | 
| 80 // We only allow calling these syscalls if the pid argument is equal to the pid | 80 // We only allow calling these syscalls if the pid argument is equal to the pid | 
| 81 // of the sandboxed process or 0 (indicating the current thread).  The following | 81 // of the sandboxed process or 0 (indicating the current thread).  The following | 
| 82 // syscalls are supported: | 82 // syscalls are supported: | 
| 83 // | 83 // | 
| 84 // sched_getaffinity(), sched_getattr(), sched_getparam(), sched_getscheduler(), | 84 // sched_getaffinity(), sched_getattr(), sched_getparam(), sched_getscheduler(), | 
| 85 // sched_rr_get_interval(), sched_setaffinity(), sched_setattr(), | 85 // sched_rr_get_interval(), sched_setaffinity(), sched_setattr(), | 
| 86 // sched_setparam(), sched_setscheduler() | 86 // sched_setparam(), sched_setscheduler() | 
| 87 SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictSchedTarget(pid_t target_pid, | 87 SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictSchedTarget(pid_t target_pid, | 
| 88                                                        int sysno); | 88                                                        int sysno); | 
| 89 | 89 | 
|  | 90 // Restricts the |pid| argument of prlimit64 to 0 (meaning the calling process) | 
|  | 91 // or target_pid. | 
|  | 92 SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictPrlimit64(pid_t target_pid); | 
|  | 93 | 
| 90 }  // namespace sandbox. | 94 }  // namespace sandbox. | 
| 91 | 95 | 
| 92 #endif  // SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_PARAMETERS_RESTRICTIONS_H_ | 96 #endif  // SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_PARAMETERS_RESTRICTIONS_H_ | 
| OLD | NEW | 
|---|