Chromium Code Reviews| Index: mojo/shell/runner/host/linux_sandbox.cc |
| diff --git a/mojo/shell/runner/host/linux_sandbox.cc b/mojo/shell/runner/host/linux_sandbox.cc |
| index 545511e0c14ab337d22633da262f5e6c3e1dbaee..1142cb8b6b2cd4c7b66152d55cf5b998136d956e 100644 |
| --- a/mojo/shell/runner/host/linux_sandbox.cc |
| +++ b/mojo/shell/runner/host/linux_sandbox.cc |
| @@ -77,15 +77,18 @@ class SandboxPolicy : public sandbox::BaselinePolicy { |
| sandbox::bpf_dsl::ResultExpr EvaluateSyscall(int sysno) const override { |
| // This policy is only advisory/for noticing FS access for the moment. |
| switch (sysno) { |
| +#if !defined(__aarch64__) |
|
Elliot Glaysher
2016/02/11 18:39:05
So I'm not an expert on this, but doesn't this mea
mdempsky
2016/02/11 18:48:13
__NR_access and __NR_open don't exist on ARM64. T
|
| case __NR_access: |
| case __NR_open: |
| +#endif |
| case __NR_faccessat: |
| case __NR_openat: |
| return sandbox::bpf_dsl::Trap(SandboxSIGSYSHandler, broker_process_); |
| case __NR_sched_getaffinity: |
| return sandbox::RestrictSchedTarget(policy_pid(), sysno); |
| case __NR_ftruncate: |
| -#if defined(__i386__) || defined(__x86_64__) || defined(__mips__) |
| +#if defined(__i386__) || defined(__x86_64__) || defined(__mips__) || \ |
| + defined(__aarch64__) |
| // Per #ifdefs in |
| // content/common/sandbox_linux/bpf_renderer_policy_linux.cc |
| case __NR_getrlimit: |