Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(845)

Side by Side Diff: sandbox/linux/services/syscall_wrappers.h

Issue 787803004: Update from https://crrev.com/307664 (Closed) Base URL: https://github.com/domokit/mojo.git@master
Patch Set: Rebase. Created 6 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef SANDBOX_LINUX_SERVICES_SYSCALL_WRAPPERS_H_ 5 #ifndef SANDBOX_LINUX_SERVICES_SYSCALL_WRAPPERS_H_
6 #define SANDBOX_LINUX_SERVICES_SYSCALL_WRAPPERS_H_ 6 #define SANDBOX_LINUX_SERVICES_SYSCALL_WRAPPERS_H_
7 7
8 #include <sys/types.h> 8 #include <sys/types.h>
9 9
10 #include "sandbox/sandbox_export.h" 10 #include "sandbox/sandbox_export.h"
11 11
12 struct sock_fprog; 12 struct sock_fprog;
13 struct rlimit64;
13 14
14 namespace sandbox { 15 namespace sandbox {
15 16
16 // Provide direct system call wrappers for a few common system calls. 17 // Provide direct system call wrappers for a few common system calls.
17 // These are guaranteed to perform a system call and do not rely on things such 18 // These are guaranteed to perform a system call and do not rely on things such
18 // as caching the current pid (c.f. getpid()). 19 // as caching the current pid (c.f. getpid()).
19 20
20 SANDBOX_EXPORT pid_t sys_getpid(void); 21 SANDBOX_EXPORT pid_t sys_getpid(void);
21 22
22 SANDBOX_EXPORT pid_t sys_gettid(void); 23 SANDBOX_EXPORT pid_t sys_gettid(void);
23 24
24 SANDBOX_EXPORT long sys_clone(unsigned long flags); 25 SANDBOX_EXPORT long sys_clone(unsigned long flags);
25 26
26 // |regs| is not supported and must be passed as nullptr. 27 // |regs| is not supported and must be passed as nullptr.
27 SANDBOX_EXPORT long sys_clone(unsigned long flags, 28 SANDBOX_EXPORT long sys_clone(unsigned long flags,
28 void* child_stack, 29 void* child_stack,
29 pid_t* ptid, 30 pid_t* ptid,
30 pid_t* ctid, 31 pid_t* ctid,
31 decltype(nullptr) regs); 32 decltype(nullptr) regs);
32 33
33 SANDBOX_EXPORT void sys_exit_group(int status); 34 SANDBOX_EXPORT void sys_exit_group(int status);
34 35
35 // The official system call takes |args| as void* (in order to be extensible), 36 // The official system call takes |args| as void* (in order to be extensible),
36 // but add more typing for the cases that are currently used. 37 // but add more typing for the cases that are currently used.
37 SANDBOX_EXPORT int sys_seccomp(unsigned int operation, 38 SANDBOX_EXPORT int sys_seccomp(unsigned int operation,
38 unsigned int flags, 39 unsigned int flags,
39 const struct sock_fprog* args); 40 const struct sock_fprog* args);
40 41
42 // Some libcs do not expose a prlimit64 wrapper.
43 SANDBOX_EXPORT int sys_prlimit64(pid_t pid,
44 int resource,
45 const struct rlimit64* new_limit,
46 struct rlimit64* old_limit);
47
41 } // namespace sandbox 48 } // namespace sandbox
42 49
43 #endif // SANDBOX_LINUX_SERVICES_SYSCALL_WRAPPERS_H_ 50 #endif // SANDBOX_LINUX_SERVICES_SYSCALL_WRAPPERS_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698