| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h" | 5 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h" |
| 6 | 6 |
| 7 #include <errno.h> | 7 #include <errno.h> |
| 8 #include <fcntl.h> | 8 #include <fcntl.h> |
| 9 #include <netinet/in.h> | 9 #include <netinet/in.h> |
| 10 #include <sched.h> | 10 #include <sched.h> |
| (...skipping 317 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 328 } | 328 } |
| 329 | 329 |
| 330 BPF_DEATH_TEST_C(BaselinePolicy, | 330 BPF_DEATH_TEST_C(BaselinePolicy, |
| 331 ClockGettimeWithDisallowedClockCrashes, | 331 ClockGettimeWithDisallowedClockCrashes, |
| 332 DEATH_SEGV_MESSAGE(sandbox::GetErrorMessageContentForTests()), | 332 DEATH_SEGV_MESSAGE(sandbox::GetErrorMessageContentForTests()), |
| 333 BaselinePolicy) { | 333 BaselinePolicy) { |
| 334 struct timespec ts; | 334 struct timespec ts; |
| 335 clock_gettime(CLOCK_MONOTONIC_RAW, &ts); | 335 clock_gettime(CLOCK_MONOTONIC_RAW, &ts); |
| 336 } | 336 } |
| 337 | 337 |
| 338 #if defined(__x86_64__) | 338 #if !defined(__i386__) |
| 339 BPF_DEATH_TEST_C(BaselinePolicy, | 339 BPF_DEATH_TEST_C(BaselinePolicy, |
| 340 GetSockOptWrongLevelSigsys, | 340 GetSockOptWrongLevelSigsys, |
| 341 DEATH_SEGV_MESSAGE(sandbox::GetErrorMessageContentForTests()), | 341 DEATH_SEGV_MESSAGE(sandbox::GetErrorMessageContentForTests()), |
| 342 BaselinePolicy) { | 342 BaselinePolicy) { |
| 343 int fds[2]; | 343 int fds[2]; |
| 344 PCHECK(socketpair(AF_UNIX, SOCK_STREAM, 0, fds) == 0); | 344 PCHECK(socketpair(AF_UNIX, SOCK_STREAM, 0, fds) == 0); |
| 345 int id; | 345 int id; |
| 346 socklen_t peek_off_size = sizeof(id); | 346 socklen_t peek_off_size = sizeof(id); |
| 347 getsockopt(fds[0], IPPROTO_TCP, SO_PEEK_OFF, &id, &peek_off_size); | 347 getsockopt(fds[0], IPPROTO_TCP, SO_PEEK_OFF, &id, &peek_off_size); |
| 348 } | 348 } |
| (...skipping 27 matching lines...) Expand all Loading... |
| 376 int fds[2]; | 376 int fds[2]; |
| 377 PCHECK(socketpair(AF_UNIX, SOCK_STREAM, 0, fds) == 0); | 377 PCHECK(socketpair(AF_UNIX, SOCK_STREAM, 0, fds) == 0); |
| 378 int id; | 378 int id; |
| 379 setsockopt(fds[0], SOL_SOCKET, SO_DEBUG, &id, sizeof(id)); | 379 setsockopt(fds[0], SOL_SOCKET, SO_DEBUG, &id, sizeof(id)); |
| 380 } | 380 } |
| 381 #endif | 381 #endif |
| 382 | 382 |
| 383 } // namespace | 383 } // namespace |
| 384 | 384 |
| 385 } // namespace sandbox | 385 } // namespace sandbox |
| OLD | NEW |