Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(81)

Side by Side Diff: sandbox/linux/seccomp-bpf/trap.cc

Issue 935333002: Update from https://crrev.com/316786 (Closed) Base URL: git@github.com:domokit/mojo.git@master
Patch Set: Created 5 years, 10 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « sandbox/linux/seccomp-bpf/syscall.cc ('k') | sandbox/linux/seccomp-bpf/verifier.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "sandbox/linux/seccomp-bpf/trap.h" 5 #include "sandbox/linux/seccomp-bpf/trap.h"
6 6
7 #include <errno.h> 7 #include <errno.h>
8 #include <signal.h> 8 #include <signal.h>
9 #include <string.h> 9 #include <string.h>
10 #include <sys/syscall.h> 10 #include <sys/syscall.h>
11 11
12 #include <algorithm> 12 #include <algorithm>
13 #include <limits> 13 #include <limits>
14 14
15 #include "base/logging.h" 15 #include "base/logging.h"
16 #include "build/build_config.h" 16 #include "build/build_config.h"
17 #include "sandbox/linux/bpf_dsl/seccomp_macros.h"
17 #include "sandbox/linux/seccomp-bpf/die.h" 18 #include "sandbox/linux/seccomp-bpf/die.h"
18 #include "sandbox/linux/seccomp-bpf/linux_seccomp.h"
19 #include "sandbox/linux/seccomp-bpf/syscall.h" 19 #include "sandbox/linux/seccomp-bpf/syscall.h"
20 #include "sandbox/linux/system_headers/linux_seccomp.h"
20 21
21 // Android's signal.h doesn't define ucontext etc. 22 // Android's signal.h doesn't define ucontext etc.
22 #if defined(OS_ANDROID) 23 #if defined(OS_ANDROID)
23 #include "sandbox/linux/services/android_ucontext.h" 24 #include "sandbox/linux/system_headers/android_ucontext.h"
24 #endif 25 #endif
25 26
26 namespace { 27 namespace {
27 28
28 struct arch_sigsys { 29 struct arch_sigsys {
29 void* ip; 30 void* ip;
30 int nr; 31 int nr;
31 unsigned int arch; 32 unsigned int arch;
32 }; 33 };
33 34
(...skipping 345 matching lines...) Expand 10 before | Expand all | Expand 10 after
379 "CHROME_SANDBOX_DEBUGGING is turned on first"); 380 "CHROME_SANDBOX_DEBUGGING is turned on first");
380 } 381 }
381 } 382 }
382 // Returns the, possibly updated, value of has_unsafe_traps_. 383 // Returns the, possibly updated, value of has_unsafe_traps_.
383 return has_unsafe_traps_; 384 return has_unsafe_traps_;
384 } 385 }
385 386
386 Trap* Trap::global_trap_; 387 Trap* Trap::global_trap_;
387 388
388 } // namespace sandbox 389 } // namespace sandbox
OLDNEW
« no previous file with comments | « sandbox/linux/seccomp-bpf/syscall.cc ('k') | sandbox/linux/seccomp-bpf/verifier.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698