diff options
author | agl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-09-04 21:34:05 +0000 |
---|---|---|
committer | agl@chromium.org <agl@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2009-09-04 21:34:05 +0000 |
commit | baf556aa12ddfb301f2a54f5c741505b55bad18c (patch) | |
tree | e738f95ccf34d908305acfad8d6c957a805df422 /sandbox | |
parent | 7b29027a3a491c28a3e1db30b849ce0d1eda6931 (diff) | |
download | chromium_src-baf556aa12ddfb301f2a54f5c741505b55bad18c.zip chromium_src-baf556aa12ddfb301f2a54f5c741505b55bad18c.tar.gz chromium_src-baf556aa12ddfb301f2a54f5c741505b55bad18c.tar.bz2 |
On Linux, move the passing of filedescriptors to a dedicated socketpair().
(Patch by Markus)
This allows the fast path to use read()/write() instead of recvmsg()/sendmsg()
which is much cheaper for the Seccomp sandbox.
Also, fixed minor seccomp sandbox issues discovered by this change.
BUG=19120
ISSUE=164373
http://codereview.chromium.org/177049
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@25518 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'sandbox')
-rw-r--r-- | sandbox/linux/seccomp/syscall.cc | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/sandbox/linux/seccomp/syscall.cc b/sandbox/linux/seccomp/syscall.cc index b25146b..8b14b30 100644 --- a/sandbox/linux/seccomp/syscall.cc +++ b/sandbox/linux/seccomp/syscall.cc @@ -203,7 +203,7 @@ void* Sandbox::defaultSystemCallHandler(int syscallNum, void* arg0, void* arg1, // the exact instruction sequence in libc, we might not be able to reliably // filter out these system calls at the time when we instrument the code. SysCalls sys; - unsigned long rc; + long rc; switch (syscallNum) { case __NR_read: Debug::syscall(syscallNum, "Allowing unrestricted system call"); |