Commit a75e8729 authored by rickyz's avatar rickyz Committed by Commit bot

Linux sandbox: Disallow get_robust_list and set_robust_list.

These are only used for futexes that are shared between processes, which should not be happening in Chromium.
BUG=413855

Review URL: https://codereview.chromium.org/569713004

Cr-Commit-Position: refs/heads/master@{#294986}
parent 7bf3d6dc
...@@ -153,6 +153,9 @@ ResultExpr EvaluateSyscallImpl(int fs_denied_errno, ...@@ -153,6 +153,9 @@ ResultExpr EvaluateSyscallImpl(int fs_denied_errno,
if (sysno == __NR_futex) if (sysno == __NR_futex)
return RestrictFutex(); return RestrictFutex();
if (sysno == __NR_set_robust_list)
return Error(EPERM);
if (sysno == __NR_getpriority || sysno ==__NR_setpriority) if (sysno == __NR_getpriority || sysno ==__NR_setpriority)
return RestrictGetSetpriority(current_pid); return RestrictGetSetpriority(current_pid);
......
...@@ -402,7 +402,6 @@ bool SyscallSets::IsAllowedFutex(int sysno) { ...@@ -402,7 +402,6 @@ bool SyscallSets::IsAllowedFutex(int sysno) {
switch (sysno) { switch (sysno) {
case __NR_get_robust_list: case __NR_get_robust_list:
case __NR_set_robust_list: case __NR_set_robust_list:
return true;
case __NR_futex: case __NR_futex:
default: default:
return false; return false;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment