| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "sandbox/linux/seccomp-bpf/trap.h" | 5 #include "sandbox/linux/seccomp-bpf/trap.h" |
| 6 | 6 |
| 7 #include <errno.h> | 7 #include <errno.h> |
| 8 #include <signal.h> | 8 #include <signal.h> |
| 9 #include <string.h> | 9 #include <string.h> |
| 10 #include <sys/syscall.h> | 10 #include <sys/syscall.h> |
| 11 | 11 |
| 12 #include <algorithm> | 12 #include <algorithm> |
| 13 #include <limits> | 13 #include <limits> |
| 14 | 14 |
| 15 #include "base/logging.h" | 15 #include "base/logging.h" |
| 16 #include "build/build_config.h" | 16 #include "build/build_config.h" |
| 17 #include "sandbox/linux/seccomp-bpf/die.h" | 17 #include "sandbox/linux/seccomp-bpf/die.h" |
| 18 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" | 18 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" |
| 19 #include "sandbox/linux/seccomp-bpf/syscall.h" | 19 #include "sandbox/linux/seccomp-bpf/syscall.h" |
| 20 | 20 |
| 21 // Android's signal.h doesn't define ucontext etc. | 21 // Android's signal.h doesn't define ucontext etc. |
| 22 #if defined(OS_ANDROID) | 22 #if defined(OS_ANDROID) |
| 23 #include "sandbox/linux/services/android_ucontext.h" | 23 #include "sandbox/linux/system_headers/android_ucontext.h" |
| 24 #endif | 24 #endif |
| 25 | 25 |
| 26 namespace { | 26 namespace { |
| 27 | 27 |
| 28 struct arch_sigsys { | 28 struct arch_sigsys { |
| 29 void* ip; | 29 void* ip; |
| 30 int nr; | 30 int nr; |
| 31 unsigned int arch; | 31 unsigned int arch; |
| 32 }; | 32 }; |
| 33 | 33 |
| (...skipping 345 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 379 "CHROME_SANDBOX_DEBUGGING is turned on first"); | 379 "CHROME_SANDBOX_DEBUGGING is turned on first"); |
| 380 } | 380 } |
| 381 } | 381 } |
| 382 // Returns the, possibly updated, value of has_unsafe_traps_. | 382 // Returns the, possibly updated, value of has_unsafe_traps_. |
| 383 return has_unsafe_traps_; | 383 return has_unsafe_traps_; |
| 384 } | 384 } |
| 385 | 385 |
| 386 Trap* Trap::global_trap_; | 386 Trap* Trap::global_trap_; |
| 387 | 387 |
| 388 } // namespace sandbox | 388 } // namespace sandbox |
| OLD | NEW |