| Index: sandbox/linux/seccomp-bpf/bpf_tests.cc
|
| diff --git a/sandbox/linux/seccomp-bpf/bpf_tests.cc b/sandbox/linux/seccomp-bpf/bpf_tests.cc
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..efe4020b4e3e0c4e3fa181e61d2266f53a5e45cf
|
| --- /dev/null
|
| +++ b/sandbox/linux/seccomp-bpf/bpf_tests.cc
|
| @@ -0,0 +1,35 @@
|
| +// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#include "sandbox/linux/seccomp-bpf/bpf_tests.h"
|
| +
|
| +using playground2::Die;
|
| +using playground2::Sandbox;
|
| +
|
| +namespace sandbox {
|
| +
|
| +void BpfTests::TestWrapper(void *void_arg) {
|
| + TestArgs *arg = reinterpret_cast<TestArgs *>(void_arg);
|
| + Die::EnableSimpleExit();
|
| + if (Sandbox::supportsSeccompSandbox(-1) ==
|
| + Sandbox::STATUS_AVAILABLE) {
|
| + // Ensure the the sandbox is actually available at this time
|
| + int proc_fd;
|
| + BPF_ASSERT((proc_fd = open("/proc", O_RDONLY|O_DIRECTORY)) >= 0);
|
| + BPF_ASSERT(Sandbox::supportsSeccompSandbox(proc_fd) ==
|
| + Sandbox::STATUS_AVAILABLE);
|
| +
|
| + // Initialize and then start the sandbox with our custom policy
|
| + Sandbox::setProcFd(proc_fd);
|
| + Sandbox::setSandboxPolicy(arg->policy(), NULL);
|
| + Sandbox::startSandbox();
|
| + arg->test()();
|
| + } else {
|
| + // TODO(markus): (crbug.com/141545) Call the compiler and verify the
|
| + // policy. That's the least we can do, if we don't have kernel support.
|
| + Sandbox::setSandboxPolicy(arg->policy(), NULL);
|
| + }
|
| +}
|
| +
|
| +} // namespace
|
|
|