Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(248)

Side by Side Diff: sandbox/linux/services/syscall_wrappers.h

Issue 1124763003: Update from https://crrev.com/327068 (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: update nacl, buildtools, fix display_change_notifier_unittest Created 5 years, 7 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef SANDBOX_LINUX_SERVICES_SYSCALL_WRAPPERS_H_ 5 #ifndef SANDBOX_LINUX_SERVICES_SYSCALL_WRAPPERS_H_
6 #define SANDBOX_LINUX_SERVICES_SYSCALL_WRAPPERS_H_ 6 #define SANDBOX_LINUX_SERVICES_SYSCALL_WRAPPERS_H_
7 7
8 #include <signal.h>
8 #include <stdint.h> 9 #include <stdint.h>
9 #include <sys/types.h> 10 #include <sys/types.h>
10 11
11 #include "sandbox/sandbox_export.h" 12 #include "sandbox/sandbox_export.h"
12 13
13 struct sock_fprog; 14 struct sock_fprog;
14 struct rlimit64; 15 struct rlimit64;
15 struct cap_hdr; 16 struct cap_hdr;
16 struct cap_data; 17 struct cap_data;
17 18
(...skipping 31 matching lines...) Expand 10 before | Expand all | Expand 10 after
49 int resource, 50 int resource,
50 const struct rlimit64* new_limit, 51 const struct rlimit64* new_limit,
51 struct rlimit64* old_limit); 52 struct rlimit64* old_limit);
52 53
53 // Some libcs do not expose capget/capset wrappers. We want to use these 54 // Some libcs do not expose capget/capset wrappers. We want to use these
54 // directly in order to avoid pulling in libcap2. 55 // directly in order to avoid pulling in libcap2.
55 SANDBOX_EXPORT int sys_capget(struct cap_hdr* hdrp, struct cap_data* datap); 56 SANDBOX_EXPORT int sys_capget(struct cap_hdr* hdrp, struct cap_data* datap);
56 SANDBOX_EXPORT int sys_capset(struct cap_hdr* hdrp, 57 SANDBOX_EXPORT int sys_capset(struct cap_hdr* hdrp,
57 const struct cap_data* datap); 58 const struct cap_data* datap);
58 59
60 // Some libcs do not expose getresuid/getresgid wrappers.
61 SANDBOX_EXPORT int sys_getresuid(uid_t* ruid, uid_t* euid, uid_t* suid);
62 SANDBOX_EXPORT int sys_getresgid(gid_t* rgid, gid_t* egid, gid_t* sgid);
63
64 // Some libcs do not expose a chroot wrapper.
65 SANDBOX_EXPORT int sys_chroot(const char* path);
66
67 // Some libcs do not expose a unshare wrapper.
68 SANDBOX_EXPORT int sys_unshare(int flags);
69
70 // Some libcs do not expose a sigprocmask. Note that oldset must be a nullptr,
71 // because of some ABI gap between toolchain's and Linux's.
72 SANDBOX_EXPORT int sys_sigprocmask(int how,
73 const sigset_t* set,
74 decltype(nullptr) oldset);
75
76 // Some libcs do not expose a sigaction().
77 SANDBOX_EXPORT int sys_sigaction(int signum,
78 const struct sigaction* act,
79 struct sigaction* oldact);
80
59 } // namespace sandbox 81 } // namespace sandbox
60 82
61 #endif // SANDBOX_LINUX_SERVICES_SYSCALL_WRAPPERS_H_ 83 #endif // SANDBOX_LINUX_SERVICES_SYSCALL_WRAPPERS_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698