| Index: sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h
|
| diff --git a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h
|
| index ec30511b256be0f96ecfeffb0b057a8793c0a797..8bde616bd6d12cce8e0d9a6123a14f84745dc1cb 100644
|
| --- a/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h
|
| +++ b/sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h
|
| @@ -87,6 +87,10 @@ SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictClockID();
|
| SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictSchedTarget(pid_t target_pid,
|
| int sysno);
|
|
|
| +// Restricts the |pid| argument of prlimit64 to 0 (meaning the calling process)
|
| +// or target_pid.
|
| +SANDBOX_EXPORT bpf_dsl::ResultExpr RestrictPrlimit64(pid_t target_pid);
|
| +
|
| } // namespace sandbox.
|
|
|
| #endif // SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_PARAMETERS_RESTRICTIONS_H_
|
|
|