Chromium Code Reviews| Index: sandbox/linux/seccomp-bpf/syscall.h |
| diff --git a/sandbox/linux/seccomp-bpf/syscall.h b/sandbox/linux/seccomp-bpf/syscall.h |
| index 932e398015881d710759dd9295cc9fdabccb41fd..56771ca71bd94339edb6a6e16c99eab539c87e6b 100644 |
| --- a/sandbox/linux/seccomp-bpf/syscall.h |
| +++ b/sandbox/linux/seccomp-bpf/syscall.h |
| @@ -5,7 +5,6 @@ |
| #ifndef SANDBOX_LINUX_SECCOMP_BPF_SYSCALL_H__ |
| #define SANDBOX_LINUX_SECCOMP_BPF_SYSCALL_H__ |
| -#include <signal.h> |
| #include <stdint.h> |
| namespace playground2 { |
| @@ -16,7 +15,104 @@ namespace playground2 { |
| // that also b) can be invoked in a way that computes this return address. |
| // Passing "nr" as "-1" computes the "magic" return address. Passing any |
| // other value invokes the appropriate system call. |
| -intptr_t SandboxSyscall(int nr, ...); |
| +intptr_t SandboxSyscall(int nr, |
| + intptr_t p0, intptr_t p1, intptr_t p2, |
|
Jeffrey Yasskin
2012/12/03 22:27:35
The way StrCat() and RE2 do this is to define a cl
Markus (顧孟勤)
2012/12/04 00:54:39
Yes, that would have worked too. I don't think it
Jeffrey Yasskin
2012/12/04 01:18:48
Nope, what you have is fine with me.
On 2012/12/0
|
| + intptr_t p3, intptr_t p4, intptr_t p5); |
| + |
| + |
| +// System calls can take up to six parameters. Traditionally, glibc |
| +// implements this property by using variadic argument lists. This works, but |
| +// confuses modern tools such as valgrind, because we are nominally passing |
| +// uninitialized data whenever we call through this function and pass less |
| +// than the full six arguments. |
| +// So, instead, we use C++'s template system to achieve a very similar |
| +// effect. C++ automatically sets the unused parameters to zero for us, and |
| +// it also does the correct type expansion (e.g. from 32bit to 64bit) where |
| +// necessary. |
| +// We have to use C-style cast operators as we want to be able to accept both |
|
Jeffrey Yasskin
2012/12/03 22:27:35
You could use reinterpret_cast<intptr_t>(p0), etc.
Markus (顧孟勤)
2012/12/04 00:54:39
I am not sure, I fully understand your comment.
I
Jeffrey Yasskin
2012/12/04 01:18:48
Ah, yes, reinterpret_cast can't convert between di
|
| +// integer and pointer types. |
| +#if __cplusplus >= 201103 // C++11 |
| + |
| +template<class T0 = intptr_t, class T1 = intptr_t, class T2 = intptr_t, |
| + class T3 = intptr_t, class T4 = intptr_t, class T5 = intptr_t> |
| +inline intptr_t SandboxSyscall(int nr, |
| + T0 p0 = 0, T1 p1 = 0, T2 p2 = 0, |
| + T3 p3 = 0, T4 p4 = 0, T5 p5 = 0) |
| + __attribute__((always_inline)); |
|
Jeffrey Yasskin
2012/12/03 22:27:35
Is there a semantic reason this attribute is neede
Markus (顧孟勤)
2012/12/04 00:54:39
I'll add a comment. It is merely for the convenien
|
| + |
| +template<class T0, class T1, class T2, class T3, class T4, class T5> |
| +inline intptr_t SandboxSyscall(int nr, |
| + T0 p0, T1 p1, T2 p2, T3 p3, T4 p4, T5 p5) { |
| + return SandboxSyscall(nr, |
| + (intptr_t)p0, (intptr_t)p1, (intptr_t)p2, |
| + (intptr_t)p3, (intptr_t)p4, (intptr_t)p5); |
| +} |
| + |
| +#else // Pre-C++11 |
| + |
| +// TODO(markus): C++11 has a much more concise and readable solution for |
| +// expressing what we are doing here. Delete the fall-back code for older |
| +// compilers as soon as we have fully switched to C++11 |
| + |
| +template<class T0, class T1, class T2, class T3, class T4, class T5> |
| +inline intptr_t SandboxSyscall(int nr, |
| + T0 p0, T1 p1, T2 p2, T3 p3, T4 p4, T5 p5) |
| + __attribute__((always_inline)); |
| +template<class T0, class T1, class T2, class T3, class T4, class T5> |
| +inline intptr_t SandboxSyscall(int nr, |
| + T0 p0, T1 p1, T2 p2, T3 p3, T4 p4, T5 p5) { |
| + return SandboxSyscall(nr, |
| + (intptr_t)p0, (intptr_t)p1, (intptr_t)p2, |
| + (intptr_t)p3, (intptr_t)p4, (intptr_t)p5); |
| +} |
| + |
| +template<class T0, class T1, class T2, class T3, class T4> |
| +inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3, T4 p4) |
| + __attribute__((always_inline)); |
| +template<class T0, class T1, class T2, class T3, class T4> |
| +inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3, T4 p4) { |
| + return SandboxSyscall(nr, p0, p1, p2, p3, p4, 0); |
| +} |
| + |
| +template<class T0, class T1, class T2, class T3> |
| +inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3) |
| + __attribute__((always_inline)); |
| +template<class T0, class T1, class T2, class T3> |
| +inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2, T3 p3) { |
| + return SandboxSyscall(nr, p0, p1, p2, p3, 0, 0); |
| +} |
| + |
| +template<class T0, class T1, class T2> |
| +inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2) |
| + __attribute__((always_inline)); |
| +template<class T0, class T1, class T2> |
| +inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1, T2 p2) { |
| + return SandboxSyscall(nr, p0, p1, p2, 0, 0, 0); |
| +} |
| + |
| +template<class T0, class T1> |
| +inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1) |
| + __attribute__((always_inline)); |
| +template<class T0, class T1> |
| +inline intptr_t SandboxSyscall(int nr, T0 p0, T1 p1) { |
| + return SandboxSyscall(nr, p0, p1, 0, 0, 0, 0); |
| +} |
| + |
| +template<class T0> |
| +inline intptr_t SandboxSyscall(int nr, T0 p0) |
| + __attribute__((always_inline)); |
| +template<class T0> |
| +inline intptr_t SandboxSyscall(int nr, T0 p0) { |
| + return SandboxSyscall(nr, p0, 0, 0, 0, 0, 0); |
| +} |
| + |
| +inline intptr_t SandboxSyscall(int nr) |
| + __attribute__((always_inline)); |
| +inline intptr_t SandboxSyscall(int nr) { |
| + return SandboxSyscall(nr, 0, 0, 0, 0, 0, 0); |
| +} |
| + |
| +#endif // Pre-C++11 |
| } // namespace |