summaryrefslogtreecommitdiffstats
path: root/sandbox/linux/seccomp-bpf/sandbox_bpf.cc
diff options
context:
space:
mode:
authorjln@chromium.org <jln@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-12-20 01:28:52 +0000
committerjln@chromium.org <jln@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-12-20 01:28:52 +0000
commit1bf415567c28c5ea0cc3529f160496648ea162da (patch)
treee30dc17291040b51935bff4ab5f25619f87fb7af /sandbox/linux/seccomp-bpf/sandbox_bpf.cc
parent082261b9911da811ba57fa172dcad8677e716e35 (diff)
downloadchromium_src-1bf415567c28c5ea0cc3529f160496648ea162da.zip
chromium_src-1bf415567c28c5ea0cc3529f160496648ea162da.tar.gz
chromium_src-1bf415567c28c5ea0cc3529f160496648ea162da.tar.bz2
Linux Sandbox: get everything to compile on Android.
We define our own android_arm_ucontext.h file since signal.h doesn't define ucontext_t on Android. BUG=166704 NOTRY=true Review URL: https://chromiumcodereview.appspot.com/11618010 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@174070 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox/linux/seccomp-bpf/sandbox_bpf.cc')
-rw-r--r--sandbox/linux/seccomp-bpf/sandbox_bpf.cc12
1 files changed, 11 insertions, 1 deletions
diff --git a/sandbox/linux/seccomp-bpf/sandbox_bpf.cc b/sandbox/linux/seccomp-bpf/sandbox_bpf.cc
index 740320f..366706f 100644
--- a/sandbox/linux/seccomp-bpf/sandbox_bpf.cc
+++ b/sandbox/linux/seccomp-bpf/sandbox_bpf.cc
@@ -2,6 +2,10 @@
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
+#include <signal.h>
+#include <sys/prctl.h>
+#include <sys/syscall.h>
+
#ifndef SECCOMP_BPF_STANDALONE
#include "base/logging.h"
#include "base/posix/eintr_wrapper.h"
@@ -13,6 +17,11 @@
#include "sandbox/linux/seccomp-bpf/syscall_iterator.h"
#include "sandbox/linux/seccomp-bpf/verifier.h"
+// Android's signal.h doesn't define ucontext etc.
+#if defined(OS_ANDROID) && defined(__arm__)
+#include "sandbox/linux/services/android_arm_ucontext.h"
+#endif
+
namespace {
void WriteFailedStderrSetupMessage(int out_fd) {
@@ -40,7 +49,8 @@ void WriteFailedStderrSetupMessage(int out_fd) {
// way to mark a signal as allocated. So, the potential for collision is
// possibly even worse.
bool GetIsInSigHandler(const ucontext_t *ctx) {
- return sigismember(&ctx->uc_sigmask, SIGBUS);
+ // Note: on Android, sigismember does not take a pointer to const.
+ return sigismember(const_cast<sigset_t*>(&ctx->uc_sigmask), SIGBUS);
}
void SetIsInSigHandler() {