| Index: components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc
|
| diff --git a/components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc b/components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc
|
| index 73adfd3503876be7af176e1189a684db574455e6..7999662e2ded7ce179b55abfb8f7dfe5f54597e0 100644
|
| --- a/components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc
|
| +++ b/components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc
|
| @@ -48,17 +48,17 @@ ErrorCode NaClBPFSandboxPolicy::EvaluateSyscall(
|
| switch (sysno) {
|
| // TODO(jln): NaCl's GDB debug stub uses the following socket system calls,
|
| // see if it can be restricted a bit.
|
| -#if defined(__x86_64__) || defined(__arm__)
|
| +#if defined(__x86_64__) || defined(__arm__) || defined(__mips__)
|
| // transport_common.cc needs this.
|
| case __NR_accept:
|
| case __NR_setsockopt:
|
| -#elif defined(__i386__)
|
| +#elif defined(__i386__) || defined(__mips__)
|
| case __NR_socketcall:
|
| #endif
|
| // trusted/service_runtime/linux/thread_suspension.c needs sigwait() and is
|
| // used by NaCl's GDB debug stub.
|
| case __NR_rt_sigtimedwait:
|
| -#if defined(__i386__)
|
| +#if defined(__i386__) || defined(__mips__)
|
| // Needed on i386 to set-up the custom segments.
|
| case __NR_modify_ldt:
|
| #endif
|
| @@ -67,7 +67,7 @@ ErrorCode NaClBPFSandboxPolicy::EvaluateSyscall(
|
| // NaCl uses custom signal stacks.
|
| case __NR_sigaltstack:
|
| // Below is fairly similar to the policy for a Chromium renderer.
|
| -#if defined(__i386__) || defined(__x86_64__)
|
| +#if defined(__i386__) || defined(__x86_64__) || defined(__mips__)
|
| case __NR_getrlimit:
|
| #endif
|
| #if defined(__i386__) || defined(__arm__)
|
| @@ -117,9 +117,7 @@ void RunSandboxSanityChecks() {
|
|
|
| #else
|
|
|
| -#if !defined(ARCH_CPU_MIPS_FAMILY)
|
| #error "Seccomp-bpf disabled on supported architecture!"
|
| -#endif
|
|
|
| #endif // defined(USE_SECCOMP_BPF)
|
|
|
|
|