Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(580)

Unified Diff: content/common/sandbox_seccomp_bpf_linux.cc

Issue 11411254: SECCOMP-BPF: Added supported for inspection system call arguments from BPF filters. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Another attempt at fixing the rebase Created 8 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | sandbox/linux/seccomp-bpf/bpf_tests.h » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: content/common/sandbox_seccomp_bpf_linux.cc
diff --git a/content/common/sandbox_seccomp_bpf_linux.cc b/content/common/sandbox_seccomp_bpf_linux.cc
index 8761e896447f7daed93724160748c41d1b0baaea..7c58fc3cdc4dbfbbddea2fee300b7e18b5226c19 100644
--- a/content/common/sandbox_seccomp_bpf_linux.cc
+++ b/content/common/sandbox_seccomp_bpf_linux.cc
@@ -1297,7 +1297,7 @@ ErrorCode FlashProcessPolicy(int sysno, void *) {
}
ErrorCode BlacklistDebugAndNumaPolicy(int sysno, void *) {
- if (!Sandbox::isValidSyscallNumber(sysno)) {
+ if (!Sandbox::IsValidSyscallNumber(sysno)) {
// TODO(jln) we should not have to do that in a trivial policy.
return ErrorCode(ENOSYS);
}
@@ -1312,7 +1312,7 @@ ErrorCode BlacklistDebugAndNumaPolicy(int sysno, void *) {
// This will still deny x32 or IA32 calls in 64 bits mode or
// 64 bits system calls in compatibility mode.
ErrorCode AllowAllPolicy(int sysno, void *) {
- if (!Sandbox::isValidSyscallNumber(sysno)) {
+ if (!Sandbox::IsValidSyscallNumber(sysno)) {
// TODO(jln) we should not have to do that in a trivial policy.
return ErrorCode(ENOSYS);
} else {
@@ -1402,8 +1402,8 @@ Sandbox::EvaluateSyscall GetProcessSyscallPolicy(
void StartSandboxWithPolicy(Sandbox::EvaluateSyscall syscall_policy,
BrokerProcess* broker_process) {
- Sandbox::setSandboxPolicy(syscall_policy, broker_process);
- Sandbox::startSandbox();
+ Sandbox::SetSandboxPolicy(syscall_policy, broker_process);
+ Sandbox::StartSandbox();
}
// Initialize the seccomp-bpf sandbox.
@@ -1456,7 +1456,7 @@ bool SandboxSeccompBpf::SupportsSandbox() {
// TODO(jln): pass the saved proc_fd_ from the LinuxSandbox singleton
// here.
Sandbox::SandboxStatus bpf_sandbox_status =
- Sandbox::supportsSeccompSandbox(-1);
+ Sandbox::SupportsSeccompSandbox(-1);
// Kernel support is what we are interested in here. Other status
// such as STATUS_UNAVAILABLE (has threads) still indicate kernel support.
// We make this a negative check, since if there is a bug, we would rather
« no previous file with comments | « no previous file | sandbox/linux/seccomp-bpf/bpf_tests.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698