diff options
author | nsylvain@chromium.org <nsylvain@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-08-31 01:16:35 +0000 |
---|---|---|
committer | nsylvain@chromium.org <nsylvain@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-08-31 01:16:35 +0000 |
commit | fb7b5328a5fd3aecfc27f765dea94b961c657597 (patch) | |
tree | 84adc617db0031a881265e95f9c569de66fa733d /sandbox/linux/seccomp/syscall_table.h | |
parent | 7302ea910ce937d482780649d6a84bbfff4ac521 (diff) | |
download | chromium_src-fb7b5328a5fd3aecfc27f765dea94b961c657597.zip chromium_src-fb7b5328a5fd3aecfc27f765dea94b961c657597.tar.gz chromium_src-fb7b5328a5fd3aecfc27f765dea94b961c657597.tar.bz2 |
Revert 57921 - Pull seccomp-sandbox in via DEPS rather than using an in-tree copy
This means changes to the sandbox won't have to be committed twice, to
both trees.
BUG=none
TEST=smoke test of running chromium with --enable-seccomp-sandbox
Review URL: http://codereview.chromium.org/3249003
TBR=mseaborn@chromium.org
Review URL: http://codereview.chromium.org/3245011
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@57933 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox/linux/seccomp/syscall_table.h')
-rw-r--r-- | sandbox/linux/seccomp/syscall_table.h | 43 |
1 files changed, 43 insertions, 0 deletions
diff --git a/sandbox/linux/seccomp/syscall_table.h b/sandbox/linux/seccomp/syscall_table.h new file mode 100644 index 0000000..5bd6791 --- /dev/null +++ b/sandbox/linux/seccomp/syscall_table.h @@ -0,0 +1,43 @@ +// Copyright (c) 2010 The Chromium Authors. All rights reserved. +// Use of this source code is governed by a BSD-style license that can be +// found in the LICENSE file. + +#ifndef SYSCALL_TABLE_H__ +#define SYSCALL_TABLE_H__ + +#include <sys/types.h> + +#ifdef __cplusplus +#include "securemem.h" +extern "C" { +namespace playground { +#define SecureMemArgs SecureMem::Args +#else +#define SecureMemArgs void +#define bool int +#endif + #define UNRESTRICTED_SYSCALL ((void *)1) + + struct SyscallTable { + void *handler; + bool (*trustedProcess)(int parentMapsFd, int sandboxFd, int threadFdPub, + int threadFd, SecureMemArgs* mem); + }; + extern const struct SyscallTable syscallTable[] + asm("playground$syscallTable") +#if defined(__x86_64__) + __attribute__((visibility("internal"))) +#endif + ; + extern const unsigned maxSyscall + asm("playground$maxSyscall") +#if defined(__x86_64__) + __attribute__((visibility("internal"))) +#endif + ; +#ifdef __cplusplus +} // namespace +} +#endif + +#endif // SYSCALL_TABLE_H__ |