platform_bionic/libc/seccomp
Paul Lawrence 65b47c9fe0 Fix problem that we don't block syscalls below min value
The check that we are not below the lowest permitted syscall was
off by one, so we always allowed them, rather than always denying
them

Test: Check arm64 boots, chrome and maps work
      mips and mips64 emulators boot
      Note that arm, x86 and x86_64 already allow syscall 0 so there
      will be no functional change there

Change-Id: I85873f1d04124e634e648bd47c027f280f1d6dbd
2017-03-22 09:48:17 -07:00
..
include Generate both static and shared libseccomp_policy. 2017-03-02 18:57:44 -08:00
Android.bp Support all architectures in seccomp 2017-03-13 18:26:50 +00:00
arm64_policy.cpp Fix problem that we don't block syscalls below min value 2017-03-22 09:48:17 -07:00
arm_policy.cpp Fix problem that we don't block syscalls below min value 2017-03-22 09:48:17 -07:00
mips64_policy.cpp Fix problem that we don't block syscalls below min value 2017-03-22 09:48:17 -07:00
mips_policy.cpp Fix problem that we don't block syscalls below min value 2017-03-22 09:48:17 -07:00
seccomp_bpfs.h Support all architectures in seccomp 2017-03-13 18:26:50 +00:00
seccomp_policy.cpp Support all architectures in seccomp 2017-03-13 18:26:50 +00:00
x86_64_policy.cpp Fix problem that we don't block syscalls below min value 2017-03-22 09:48:17 -07:00
x86_policy.cpp Fix problem that we don't block syscalls below min value 2017-03-22 09:48:17 -07:00