Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(334)

Side by Side Diff: sandbox/linux/bpf_dsl/trap_registry.h

Issue 670183003: Update from chromium 62675d9fb31fb8cedc40f68e78e8445a74f362e7 (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Created 6 years, 2 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « sandbox/linux/bpf_dsl/policy_compiler.cc ('k') | sandbox/linux/sandbox_linux.gypi » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
(Empty)
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #ifndef SANDBOX_LINUX_BPF_DSL_TRAP_REGISTRY_H_
6 #define SANDBOX_LINUX_BPF_DSL_TRAP_REGISTRY_H_
7
8 #include <stdint.h>
9
10 #include "base/macros.h"
11 #include "sandbox/sandbox_export.h"
12
13 namespace sandbox {
14
15 // This must match the kernel's seccomp_data structure.
16 struct arch_seccomp_data {
17 int nr;
18 uint32_t arch;
19 uint64_t instruction_pointer;
20 uint64_t args[6];
21 };
22
23 namespace bpf_dsl {
24
25 // TrapRegistry provides an interface for registering "trap handlers"
26 // by associating them with non-zero 16-bit trap IDs. Trap IDs should
27 // remain valid for the lifetime of the trap registry.
28 class SANDBOX_EXPORT TrapRegistry {
29 public:
30 // TrapFnc is a pointer to a function that fulfills the trap handler
31 // function signature.
32 //
33 // Trap handlers follow the calling convention of native system
34 // calls; e.g., to report an error, they return an exit code in the
35 // range -1..-4096 instead of directly modifying errno. However,
36 // modifying errno is harmless, as the original value will be
37 // restored afterwards.
38 //
39 // Trap handlers are executed from signal context and possibly an
40 // async-signal context, so they must be async-signal safe:
41 // http://pubs.opengroup.org/onlinepubs/009695399/functions/xsh_chap02_04.html
42 typedef intptr_t (*TrapFnc)(const struct arch_seccomp_data& args, void* aux);
43
44 // Add registers the specified trap handler tuple and returns a
45 // non-zero trap ID that uniquely identifies the tuple for the life
46 // time of the trap registry. If the same tuple is registered
47 // multiple times, the same value will be returned each time.
48 virtual uint16_t Add(TrapFnc fnc, const void* aux, bool safe) = 0;
49
50 // EnableUnsafeTraps tries to enable unsafe traps and returns
51 // whether it was successful. This is a one-way operation.
52 virtual bool EnableUnsafeTraps() = 0;
53
54 protected:
55 TrapRegistry() {}
56 ~TrapRegistry() {}
57
58 DISALLOW_COPY_AND_ASSIGN(TrapRegistry);
59 };
60
61 } // namespace bpf_dsl
62 } // namespace sandbox
63
64 #endif // SANDBOX_LINUX_BPF_DSL_TRAP_REGISTRY_H_
OLDNEW
« no previous file with comments | « sandbox/linux/bpf_dsl/policy_compiler.cc ('k') | sandbox/linux/sandbox_linux.gypi » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698