Merge "Allow failing app through seccomp policy"
This commit is contained in:
commit
d0ff90afef
1 changed files with 7 additions and 3 deletions
|
@ -208,17 +208,21 @@ bool set_seccomp_filter() {
|
|||
AllowSyscall(f, 190); // __NR_vfork
|
||||
|
||||
// Needed for strace
|
||||
AllowSyscall(f, 238); // __NR_tkill
|
||||
AllowSyscall(f, 238); // __NR_tkill
|
||||
|
||||
// Needed for kernel to restart syscalls
|
||||
AllowSyscall(f, 0); // __NR_restart_syscall
|
||||
AllowSyscall(f, 0); // __NR_restart_syscall
|
||||
|
||||
// Needed for debugging 32-bit Chrome
|
||||
AllowSyscall(f, 42); // __NR_pipe
|
||||
AllowSyscall(f, 42); // __NR_pipe
|
||||
|
||||
// b/34732712
|
||||
AllowSyscall(f, 364); // __NR_perf_event_open
|
||||
|
||||
// b/34651972
|
||||
AllowSyscall(f, 33); // __NR_access
|
||||
AllowSyscall(f, 195); // __NR_stat64
|
||||
|
||||
// arm32-on-arm64 only filter - autogenerated from bionic syscall usage
|
||||
for (size_t i = 0; i < arm_filter_size; ++i)
|
||||
f.push_back(arm_filter[i]);
|
||||
|
|
Loading…
Reference in a new issue