Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(199)

Side by Side Diff: components/nacl/loader/nonsfi/nonsfi_sandbox_unittest.cc

Issue 921563002: Linux Sandbox: reorganize (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fix android_futex includes. Created 5 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 // Sanitizers internally use some syscalls which non-SFI NaCl disallows. 5 // Sanitizers internally use some syscalls which non-SFI NaCl disallows.
6 #if !defined(ADDRESS_SANITIZER) && !defined(THREAD_SANITIZER) && \ 6 #if !defined(ADDRESS_SANITIZER) && !defined(THREAD_SANITIZER) && \
7 !defined(MEMORY_SANITIZER) && !defined(LEAK_SANITIZER) 7 !defined(MEMORY_SANITIZER) && !defined(LEAK_SANITIZER)
8 8
9 #include "components/nacl/loader/nonsfi/nonsfi_sandbox.h" 9 #include "components/nacl/loader/nonsfi/nonsfi_sandbox.h"
10 10
(...skipping 21 matching lines...) Expand all
32 #include "base/files/scoped_file.h" 32 #include "base/files/scoped_file.h"
33 #include "base/logging.h" 33 #include "base/logging.h"
34 #include "base/posix/eintr_wrapper.h" 34 #include "base/posix/eintr_wrapper.h"
35 #include "base/sys_info.h" 35 #include "base/sys_info.h"
36 #include "base/threading/thread.h" 36 #include "base/threading/thread.h"
37 #include "base/time/time.h" 37 #include "base/time/time.h"
38 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" 38 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h"
39 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" 39 #include "sandbox/linux/seccomp-bpf/bpf_tests.h"
40 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h" 40 #include "sandbox/linux/seccomp-bpf/sandbox_bpf.h"
41 #include "sandbox/linux/seccomp-bpf/syscall.h" 41 #include "sandbox/linux/seccomp-bpf/syscall.h"
42 #include "sandbox/linux/services/linux_syscalls.h" 42 #include "sandbox/linux/system_headers/linux_syscalls.h"
43 #include "third_party/lss/linux_syscall_support.h" // for MAKE_PROCESS_CPUCLOCK 43 #include "third_party/lss/linux_syscall_support.h" // for MAKE_PROCESS_CPUCLOCK
44 44
45 namespace { 45 namespace {
46 46
47 void DoPipe(base::ScopedFD* fds) { 47 void DoPipe(base::ScopedFD* fds) {
48 int tmp_fds[2]; 48 int tmp_fds[2];
49 BPF_ASSERT_EQ(0, pipe(tmp_fds)); 49 BPF_ASSERT_EQ(0, pipe(tmp_fds));
50 fds[0].reset(tmp_fds[0]); 50 fds[0].reset(tmp_fds[0]);
51 fds[1].reset(tmp_fds[1]); 51 fds[1].reset(tmp_fds[1]);
52 } 52 }
(...skipping 443 matching lines...) Expand 10 before | Expand all | Expand 10 after
496 RESTRICT_SYSCALL_EPERM_TEST(ptrace); 496 RESTRICT_SYSCALL_EPERM_TEST(ptrace);
497 RESTRICT_SYSCALL_EPERM_TEST(set_robust_list); 497 RESTRICT_SYSCALL_EPERM_TEST(set_robust_list);
498 #if defined(__i386__) || defined(__x86_64__) 498 #if defined(__i386__) || defined(__x86_64__)
499 RESTRICT_SYSCALL_EPERM_TEST(time); 499 RESTRICT_SYSCALL_EPERM_TEST(time);
500 #endif 500 #endif
501 501
502 } // namespace 502 } // namespace
503 503
504 #endif // !ADDRESS_SANITIZER && !THREAD_SANITIZER && 504 #endif // !ADDRESS_SANITIZER && !THREAD_SANITIZER &&
505 // !MEMORY_SANITIZER && !LEAK_SANITIZER 505 // !MEMORY_SANITIZER && !LEAK_SANITIZER
OLDNEW
« no previous file with comments | « components/nacl/loader/nonsfi/nonsfi_sandbox.cc ('k') | components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698