Index: components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc |
diff --git a/components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc b/components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc |
index af3b3f1336aa5cc107766b1a6fb0cf7924df1178..7939077e180c0ec20d15604f65ea0527f3ab122b 100644 |
--- a/components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc |
+++ b/components/nacl/loader/sandbox_linux/nacl_bpf_sandbox_linux.cc |
@@ -51,7 +51,7 @@ sandbox::ErrorCode NaClBPFSandboxPolicy::EvaluateSyscall( |
switch (sysno) { |
// TODO(jln): NaCl's GDB debug stub uses the following socket system calls, |
// see if it can be restricted a bit. |
-#if defined(__x86_64__) || defined(__arm__) |
+#if defined(__x86_64__) || defined(__arm__) || defined(__mips__) |
// transport_common.cc needs this. |
case __NR_accept: |
case __NR_setsockopt: |
@@ -61,7 +61,7 @@ sandbox::ErrorCode NaClBPFSandboxPolicy::EvaluateSyscall( |
// trusted/service_runtime/linux/thread_suspension.c needs sigwait() and is |
// used by NaCl's GDB debug stub. |
case __NR_rt_sigtimedwait: |
-#if defined(__i386__) |
+#if defined(__i386__) || defined(__mips__) |
// Needed on i386 to set-up the custom segments. |
case __NR_modify_ldt: |
#endif |
@@ -70,7 +70,7 @@ sandbox::ErrorCode NaClBPFSandboxPolicy::EvaluateSyscall( |
// NaCl uses custom signal stacks. |
case __NR_sigaltstack: |
// Below is fairly similar to the policy for a Chromium renderer. |
-#if defined(__i386__) || defined(__x86_64__) |
+#if defined(__i386__) || defined(__x86_64__) || defined(__mips__) |
case __NR_getrlimit: |
#endif |
#if defined(__i386__) || defined(__arm__) |
@@ -120,9 +120,7 @@ void RunSandboxSanityChecks() { |
#else |
-#if !defined(ARCH_CPU_MIPS_FAMILY) |
#error "Seccomp-bpf disabled on supported architecture!" |
-#endif // !defined(ARCH_CPU_MIPS_FAMILY) |
#endif // defined(USE_SECCOMP_BPF) |