2022-05-07 19:39:10 +00:00
|
|
|
--- a/security/sandbox/linux/SandboxFilter.cpp
|
|
|
|
+++ b/security/sandbox/linux/SandboxFilter.cpp
|
2022-05-07 20:11:04 +00:00
|
|
|
@@ -1992,20 +1992,23 @@
|
|
|
|
Arg<uintptr_t> new_limit(2);
|
|
|
|
return If(AllOf(pid == 0, new_limit == 0), Allow())
|
|
|
|
.Else(InvalidSyscall());
|
|
|
|
}
|
|
|
|
#endif // DESKTOP
|
|
|
|
|
|
|
|
// Bug 1640612
|
2022-05-07 19:39:10 +00:00
|
|
|
case __NR_uname:
|
|
|
|
return Allow();
|
|
|
|
|
|
|
|
+ CASES_FOR_select:
|
|
|
|
+ return Allow();
|
|
|
|
+
|
|
|
|
default:
|
|
|
|
return SandboxPolicyCommon::EvaluateSyscall(sysno);
|
|
|
|
}
|
2022-05-07 20:11:04 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
UniquePtr<sandbox::bpf_dsl::Policy> GetSocketProcessSandboxPolicy(
|
|
|
|
SandboxBrokerClient* aMaybeBroker) {
|
|
|
|
return UniquePtr<sandbox::bpf_dsl::Policy>(
|
|
|
|
new SocketProcessSandboxPolicy(aMaybeBroker));
|