| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "sandbox/linux/seccomp-bpf/trap.h" | 5 #include "sandbox/linux/seccomp-bpf/trap.h" |
| 6 | 6 |
| 7 #include <errno.h> | 7 #include <errno.h> |
| 8 #include <signal.h> | 8 #include <signal.h> |
| 9 #include <string.h> | 9 #include <string.h> |
| 10 #include <sys/syscall.h> | 10 #include <sys/syscall.h> |
| 11 | 11 |
| 12 #include <algorithm> | 12 #include <algorithm> |
| 13 #include <limits> | 13 #include <limits> |
| 14 | 14 |
| 15 #include "base/logging.h" | 15 #include "base/logging.h" |
| 16 #include "build/build_config.h" | 16 #include "build/build_config.h" |
| 17 #include "sandbox/linux/bpf_dsl/seccomp_macros.h" |
| 17 #include "sandbox/linux/seccomp-bpf/die.h" | 18 #include "sandbox/linux/seccomp-bpf/die.h" |
| 18 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h" | |
| 19 #include "sandbox/linux/seccomp-bpf/syscall.h" | 19 #include "sandbox/linux/seccomp-bpf/syscall.h" |
| 20 #include "sandbox/linux/system_headers/linux_seccomp.h" |
| 20 | 21 |
| 21 // Android's signal.h doesn't define ucontext etc. | 22 // Android's signal.h doesn't define ucontext etc. |
| 22 #if defined(OS_ANDROID) | 23 #if defined(OS_ANDROID) |
| 23 #include "sandbox/linux/services/android_ucontext.h" | 24 #include "sandbox/linux/system_headers/android_ucontext.h" |
| 24 #endif | 25 #endif |
| 25 | 26 |
| 26 namespace { | 27 namespace { |
| 27 | 28 |
| 28 struct arch_sigsys { | 29 struct arch_sigsys { |
| 29 void* ip; | 30 void* ip; |
| 30 int nr; | 31 int nr; |
| 31 unsigned int arch; | 32 unsigned int arch; |
| 32 }; | 33 }; |
| 33 | 34 |
| (...skipping 345 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 379 "CHROME_SANDBOX_DEBUGGING is turned on first"); | 380 "CHROME_SANDBOX_DEBUGGING is turned on first"); |
| 380 } | 381 } |
| 381 } | 382 } |
| 382 // Returns the, possibly updated, value of has_unsafe_traps_. | 383 // Returns the, possibly updated, value of has_unsafe_traps_. |
| 383 return has_unsafe_traps_; | 384 return has_unsafe_traps_; |
| 384 } | 385 } |
| 385 | 386 |
| 386 Trap* Trap::global_trap_; | 387 Trap* Trap::global_trap_; |
| 387 | 388 |
| 388 } // namespace sandbox | 389 } // namespace sandbox |
| OLD | NEW |