summaryrefslogtreecommitdiffstats
path: root/sandbox/linux
diff options
context:
space:
mode:
authoragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-09-04 21:34:05 +0000
committeragl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-09-04 21:34:05 +0000
commitbaf556aa12ddfb301f2a54f5c741505b55bad18c (patch)
treee738f95ccf34d908305acfad8d6c957a805df422 /sandbox/linux
parent7b29027a3a491c28a3e1db30b849ce0d1eda6931 (diff)
downloadchromium_src-baf556aa12ddfb301f2a54f5c741505b55bad18c.zip
chromium_src-baf556aa12ddfb301f2a54f5c741505b55bad18c.tar.gz
chromium_src-baf556aa12ddfb301f2a54f5c741505b55bad18c.tar.bz2
On Linux, move the passing of filedescriptors to a dedicated socketpair().
(Patch by Markus) This allows the fast path to use read()/write() instead of recvmsg()/sendmsg() which is much cheaper for the Seccomp sandbox. Also, fixed minor seccomp sandbox issues discovered by this change. BUG=19120 ISSUE=164373 http://codereview.chromium.org/177049 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@25518 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox/linux')
-rw-r--r--sandbox/linux/seccomp/syscall.cc2
1 files changed, 1 insertions, 1 deletions
diff --git a/sandbox/linux/seccomp/syscall.cc b/sandbox/linux/seccomp/syscall.cc
index b25146b..8b14b30 100644
--- a/sandbox/linux/seccomp/syscall.cc
+++ b/sandbox/linux/seccomp/syscall.cc
@@ -203,7 +203,7 @@ void* Sandbox::defaultSystemCallHandler(int syscallNum, void* arg0, void* arg1,
// the exact instruction sequence in libc, we might not be able to reliably
// filter out these system calls at the time when we instrument the code.
SysCalls sys;
- unsigned long rc;
+ long rc;
switch (syscallNum) {
case __NR_read:
Debug::syscall(syscallNum, "Allowing unrestricted system call");