mirror of
https://github.com/google/sandboxed-api.git
synced 2024-03-22 13:11:30 +08:00
Include-what-you-use fix
PiperOrigin-RevId: 613568060 Change-Id: Ic81d933b7d16a2dc2ec06d3c2fd127713e608602
This commit is contained in:
parent
c6bab97690
commit
64ed644f73
|
@ -58,6 +58,7 @@
|
|||
#include "sandboxed_api/sandbox2/allow_all_syscalls.h"
|
||||
#include "sandboxed_api/sandbox2/allow_unrestricted_networking.h"
|
||||
#include "sandboxed_api/sandbox2/namespace.h"
|
||||
#include "sandboxed_api/sandbox2/network_proxy/filtering.h"
|
||||
#include "sandboxed_api/sandbox2/policy.h"
|
||||
#include "sandboxed_api/sandbox2/syscall.h"
|
||||
#include "sandboxed_api/sandbox2/trace_all_syscalls.h"
|
||||
|
|
|
@ -548,8 +548,7 @@ class PolicyBuilder final {
|
|||
PolicyBuilder& AllowStaticStartup();
|
||||
|
||||
// In addition to syscalls allowed by AllowStaticStartup, also allow reading,
|
||||
// seeking, mmapping and closing files. It does not allow opening them, as
|
||||
// the mechanism for doing so depends on whether GetFs-checks are used or not.
|
||||
// seeking, mmap()-ing and closing files.
|
||||
PolicyBuilder& AllowDynamicStartup();
|
||||
|
||||
// Appends a policy, which will be run on the specified syscall.
|
||||
|
|
Loading…
Reference in New Issue
Block a user