Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(252)

Side by Side Diff: content/common/sandbox_linux/bpf_gpu_policy_linux.cc

Issue 921563002: Linux Sandbox: reorganize (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fix android_futex includes. Created 5 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "content/common/sandbox_linux/bpf_gpu_policy_linux.h" 5 #include "content/common/sandbox_linux/bpf_gpu_policy_linux.h"
6 6
7 #include <dlfcn.h> 7 #include <dlfcn.h>
8 #include <errno.h> 8 #include <errno.h>
9 #include <fcntl.h> 9 #include <fcntl.h>
10 #include <sys/socket.h> 10 #include <sys/socket.h>
(...skipping 10 matching lines...) Expand all
21 #include "base/logging.h" 21 #include "base/logging.h"
22 #include "base/memory/scoped_ptr.h" 22 #include "base/memory/scoped_ptr.h"
23 #include "build/build_config.h" 23 #include "build/build_config.h"
24 #include "content/common/sandbox_linux/sandbox_bpf_base_policy_linux.h" 24 #include "content/common/sandbox_linux/sandbox_bpf_base_policy_linux.h"
25 #include "content/common/sandbox_linux/sandbox_seccomp_bpf_linux.h" 25 #include "content/common/sandbox_linux/sandbox_seccomp_bpf_linux.h"
26 #include "content/common/set_process_title.h" 26 #include "content/common/set_process_title.h"
27 #include "content/public/common/content_switches.h" 27 #include "content/public/common/content_switches.h"
28 #include "sandbox/linux/bpf_dsl/bpf_dsl.h" 28 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
29 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h" 29 #include "sandbox/linux/seccomp-bpf-helpers/syscall_parameters_restrictions.h"
30 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h" 30 #include "sandbox/linux/seccomp-bpf-helpers/syscall_sets.h"
31 #include "sandbox/linux/services/linux_syscalls.h"
32 #include "sandbox/linux/syscall_broker/broker_file_permission.h" 31 #include "sandbox/linux/syscall_broker/broker_file_permission.h"
33 #include "sandbox/linux/syscall_broker/broker_process.h" 32 #include "sandbox/linux/syscall_broker/broker_process.h"
33 #include "sandbox/linux/system_headers/linux_syscalls.h"
34 34
35 using sandbox::arch_seccomp_data; 35 using sandbox::arch_seccomp_data;
36 using sandbox::bpf_dsl::Allow; 36 using sandbox::bpf_dsl::Allow;
37 using sandbox::bpf_dsl::ResultExpr; 37 using sandbox::bpf_dsl::ResultExpr;
38 using sandbox::bpf_dsl::Trap; 38 using sandbox::bpf_dsl::Trap;
39 using sandbox::syscall_broker::BrokerFilePermission; 39 using sandbox::syscall_broker::BrokerFilePermission;
40 using sandbox::syscall_broker::BrokerProcess; 40 using sandbox::syscall_broker::BrokerProcess;
41 using sandbox::SyscallSets; 41 using sandbox::SyscallSets;
42 42
43 namespace content { 43 namespace content {
(...skipping 304 matching lines...) Expand 10 before | Expand all | Expand 10 after
348 } 348 }
349 349
350 broker_process_ = new BrokerProcess(GetFSDeniedErrno(), permissions); 350 broker_process_ = new BrokerProcess(GetFSDeniedErrno(), permissions);
351 // The initialization callback will perform generic initialization and then 351 // The initialization callback will perform generic initialization and then
352 // call broker_sandboxer_callback. 352 // call broker_sandboxer_callback.
353 CHECK(broker_process_->Init(base::Bind(&UpdateProcessTypeAndEnableSandbox, 353 CHECK(broker_process_->Init(base::Bind(&UpdateProcessTypeAndEnableSandbox,
354 broker_sandboxer_allocator))); 354 broker_sandboxer_allocator)));
355 } 355 }
356 356
357 } // namespace content 357 } // namespace content
OLDNEW
« no previous file with comments | « content/common/sandbox_linux/bpf_cros_arm_gpu_policy_linux.cc ('k') | content/common/sandbox_linux/bpf_ppapi_policy_linux.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698