diff options
author | markus@chromium.org <markus@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-05-18 20:54:46 +0000 |
---|---|---|
committer | markus@chromium.org <markus@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-05-18 20:54:46 +0000 |
commit | 8a93e3822b23897bde15cf0e2a7cdee5973fd5a2 (patch) | |
tree | 554c22cd6c5a41b159a82edceb853d405e806ab7 /sandbox/linux/seccomp/trusted_thread.cc | |
parent | 5f74571613bed65f1bc527289ddfd8fbaee2bc89 (diff) | |
download | chromium_src-8a93e3822b23897bde15cf0e2a7cdee5973fd5a2.zip chromium_src-8a93e3822b23897bde15cf0e2a7cdee5973fd5a2.tar.gz chromium_src-8a93e3822b23897bde15cf0e2a7cdee5973fd5a2.tar.bz2 |
Add support for calling {rt_,}sigaction(), and for invoking signal handlers
from within the sandbox.
Added tests for the new functionality and merged the tests for sigreturn()
that had previously been committed to the standalone version of the sandbox
(on Google Code)
TEST=run "make test"
BUG=37728
Review URL: http://codereview.chromium.org/2074003
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@47561 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox/linux/seccomp/trusted_thread.cc')
-rw-r--r-- | sandbox/linux/seccomp/trusted_thread.cc | 2 |
1 files changed, 2 insertions, 0 deletions
diff --git a/sandbox/linux/seccomp/trusted_thread.cc b/sandbox/linux/seccomp/trusted_thread.cc index 5819b0a..6d6a3f5 100644 --- a/sandbox/linux/seccomp/trusted_thread.cc +++ b/sandbox/linux/seccomp/trusted_thread.cc @@ -128,6 +128,7 @@ void Sandbox::createTrustedThread(int processFdPub, int cloneFdPub, // 0x4C: number of consecutive calls to a time fnc (not used on x86-64) // 0x50: nesting level of system calls (for debugging purposes only) // 0x54: signal mask + // 0x5C: in SEGV handler // We use the %fs register for accessing the secure read-only page, and // the untrusted scratch space immediately following it. The segment @@ -852,6 +853,7 @@ void Sandbox::createTrustedThread(int processFdPub, int cloneFdPub, // 0x30: number of consecutive calls to a time fnc. (e.g. gettimeofday) // 0x34: nesting level of system calls (for debugging purposes only) // 0x38: signal mask + // 0x40: in SEGV handler "0:xor %%esp, %%esp\n" "mov $2, %%eax\n" // %mm2 = initial sequence number |