Index: sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h |
diff --git a/sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h b/sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..31f30208dc687130741da3ad80faf51e9ffc3ede |
--- /dev/null |
+++ b/sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h |
@@ -0,0 +1,81 @@ |
+// Copyright (c) 2013 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#ifndef SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SIGSYS_HANDLERS_H_ |
+#define SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SIGSYS_HANDLERS_H_ |
+ |
+#include "base/basictypes.h" |
+#include "build/build_config.h" |
+#include "sandbox/linux/bpf_dsl/bpf_dsl.h" |
+#include "sandbox/sandbox_export.h" |
+ |
+// The handlers are suitable for use in Trap() error codes. They are |
+// guaranteed to be async-signal safe. |
+// See sandbox/linux/seccomp-bpf/trap.h to see how they work. |
+ |
+namespace sandbox { |
+ |
+struct arch_seccomp_data; |
+ |
+// This handler will crash the currently running process. The crashing address |
+// will be the number of the current system call, extracted from |args|. |
+// This handler will also print to stderr the number of the crashing syscall. |
+SANDBOX_EXPORT intptr_t |
+ CrashSIGSYS_Handler(const struct arch_seccomp_data& args, void* aux); |
+ |
+// The following three handlers are suitable to report failures with the |
+// clone(), prctl() and ioctl() system calls respectively. |
+ |
+// The crashing address will be (clone_flags & 0xFFFFFF), where clone_flags is |
+// the clone(2) argument, extracted from |args|. |
+SANDBOX_EXPORT intptr_t |
+ SIGSYSCloneFailure(const struct arch_seccomp_data& args, void* aux); |
+// The crashing address will be (option & 0xFFF), where option is the prctl(2) |
+// argument. |
+SANDBOX_EXPORT intptr_t |
+ SIGSYSPrctlFailure(const struct arch_seccomp_data& args, void* aux); |
+// The crashing address will be request & 0xFFFF, where request is the ioctl(2) |
+// argument. |
+SANDBOX_EXPORT intptr_t |
+ SIGSYSIoctlFailure(const struct arch_seccomp_data& args, void* aux); |
+// The crashing address will be (pid & 0xFFF), where pid is the first |
+// argument (and can be a tid). |
+SANDBOX_EXPORT intptr_t |
+ SIGSYSKillFailure(const struct arch_seccomp_data& args, void* aux); |
+// The crashing address will be (op & 0xFFF), where op is the second |
+// argument. |
+SANDBOX_EXPORT intptr_t |
+ SIGSYSFutexFailure(const struct arch_seccomp_data& args, void* aux); |
+// If the syscall is not being called on the current tid, crashes in the same |
+// way as CrashSIGSYS_Handler. Otherwise, returns the result of calling the |
+// syscall with the pid argument set to 0 (which for these calls means the |
+// current thread). The following syscalls are supported: |
+// |
+// sched_getaffinity(), sched_getattr(), sched_getparam(), sched_getscheduler(), |
+// sched_rr_get_interval(), sched_setaffinity(), sched_setattr(), |
+// sched_setparam(), sched_setscheduler() |
+SANDBOX_EXPORT intptr_t |
+ SIGSYSSchedHandler(const struct arch_seccomp_data& args, void* aux); |
+ |
+// Variants of the above functions for use with bpf_dsl. |
+SANDBOX_EXPORT bpf_dsl::ResultExpr CrashSIGSYS(); |
+SANDBOX_EXPORT bpf_dsl::ResultExpr CrashSIGSYSClone(); |
+SANDBOX_EXPORT bpf_dsl::ResultExpr CrashSIGSYSPrctl(); |
+SANDBOX_EXPORT bpf_dsl::ResultExpr CrashSIGSYSIoctl(); |
+SANDBOX_EXPORT bpf_dsl::ResultExpr CrashSIGSYSKill(); |
+SANDBOX_EXPORT bpf_dsl::ResultExpr CrashSIGSYSFutex(); |
+SANDBOX_EXPORT bpf_dsl::ResultExpr RewriteSchedSIGSYS(); |
+ |
+// Following four functions return substrings of error messages used |
+// in the above four functions. They are useful in death tests. |
+SANDBOX_EXPORT const char* GetErrorMessageContentForTests(); |
+SANDBOX_EXPORT const char* GetCloneErrorMessageContentForTests(); |
+SANDBOX_EXPORT const char* GetPrctlErrorMessageContentForTests(); |
+SANDBOX_EXPORT const char* GetIoctlErrorMessageContentForTests(); |
+SANDBOX_EXPORT const char* GetKillErrorMessageContentForTests(); |
+SANDBOX_EXPORT const char* GetFutexErrorMessageContentForTests(); |
+ |
+} // namespace sandbox. |
+ |
+#endif // SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SIGSYS_HANDLERS_H_ |