OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h" | 5 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h" |
6 | 6 |
7 #include <errno.h> | 7 #include <errno.h> |
8 #include <fcntl.h> | 8 #include <fcntl.h> |
9 #include <netinet/in.h> | 9 #include <netinet/in.h> |
10 #include <sched.h> | 10 #include <sched.h> |
(...skipping 317 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
328 } | 328 } |
329 | 329 |
330 BPF_DEATH_TEST_C(BaselinePolicy, | 330 BPF_DEATH_TEST_C(BaselinePolicy, |
331 ClockGettimeWithDisallowedClockCrashes, | 331 ClockGettimeWithDisallowedClockCrashes, |
332 DEATH_SEGV_MESSAGE(sandbox::GetErrorMessageContentForTests()), | 332 DEATH_SEGV_MESSAGE(sandbox::GetErrorMessageContentForTests()), |
333 BaselinePolicy) { | 333 BaselinePolicy) { |
334 struct timespec ts; | 334 struct timespec ts; |
335 clock_gettime(CLOCK_MONOTONIC_RAW, &ts); | 335 clock_gettime(CLOCK_MONOTONIC_RAW, &ts); |
336 } | 336 } |
337 | 337 |
338 #if defined(__x86_64__) | 338 #if !defined(__i386__) |
339 BPF_DEATH_TEST_C(BaselinePolicy, | 339 BPF_DEATH_TEST_C(BaselinePolicy, |
340 GetSockOptWrongLevelSigsys, | 340 GetSockOptWrongLevelSigsys, |
341 DEATH_SEGV_MESSAGE(sandbox::GetErrorMessageContentForTests()), | 341 DEATH_SEGV_MESSAGE(sandbox::GetErrorMessageContentForTests()), |
342 BaselinePolicy) { | 342 BaselinePolicy) { |
343 int fds[2]; | 343 int fds[2]; |
344 PCHECK(socketpair(AF_UNIX, SOCK_STREAM, 0, fds) == 0); | 344 PCHECK(socketpair(AF_UNIX, SOCK_STREAM, 0, fds) == 0); |
345 int id; | 345 int id; |
346 socklen_t peek_off_size = sizeof(id); | 346 socklen_t peek_off_size = sizeof(id); |
347 getsockopt(fds[0], IPPROTO_TCP, SO_PEEK_OFF, &id, &peek_off_size); | 347 getsockopt(fds[0], IPPROTO_TCP, SO_PEEK_OFF, &id, &peek_off_size); |
348 } | 348 } |
(...skipping 27 matching lines...) Expand all Loading... |
376 int fds[2]; | 376 int fds[2]; |
377 PCHECK(socketpair(AF_UNIX, SOCK_STREAM, 0, fds) == 0); | 377 PCHECK(socketpair(AF_UNIX, SOCK_STREAM, 0, fds) == 0); |
378 int id; | 378 int id; |
379 setsockopt(fds[0], SOL_SOCKET, SO_DEBUG, &id, sizeof(id)); | 379 setsockopt(fds[0], SOL_SOCKET, SO_DEBUG, &id, sizeof(id)); |
380 } | 380 } |
381 #endif | 381 #endif |
382 | 382 |
383 } // namespace | 383 } // namespace |
384 | 384 |
385 } // namespace sandbox | 385 } // namespace sandbox |
OLD | NEW |