OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 // ASan internally uses some syscalls which non-SFI NaCl disallows. | 5 // ASan internally uses some syscalls which non-SFI NaCl disallows. |
6 // Seccomp-BPF tests die under TSan v2. See http://crbug.com/356588 | 6 // Seccomp-BPF tests die under TSan v2. See http://crbug.com/356588 |
7 #if !defined(ADDRESS_SANITIZER) && !defined(THREAD_SANITIZER) | 7 #if !defined(ADDRESS_SANITIZER) && !defined(THREAD_SANITIZER) |
8 | 8 |
9 #include "components/nacl/loader/nonsfi/nonsfi_sandbox.h" | 9 #include "components/nacl/loader/nonsfi/nonsfi_sandbox.h" |
10 | 10 |
(...skipping 15 matching lines...) Expand all Loading... |
26 | 26 |
27 #include "base/bind.h" | 27 #include "base/bind.h" |
28 #include "base/callback.h" | 28 #include "base/callback.h" |
29 #include "base/compiler_specific.h" | 29 #include "base/compiler_specific.h" |
30 #include "base/files/scoped_file.h" | 30 #include "base/files/scoped_file.h" |
31 #include "base/logging.h" | 31 #include "base/logging.h" |
32 #include "base/posix/eintr_wrapper.h" | 32 #include "base/posix/eintr_wrapper.h" |
33 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" | 33 #include "sandbox/linux/seccomp-bpf-helpers/sigsys_handlers.h" |
34 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" | 34 #include "sandbox/linux/seccomp-bpf/bpf_tests.h" |
35 | 35 |
36 // This is a hack. TODO(hamaji), fix crbug.com/364751. | |
37 namespace sandbox { | |
38 extern const bool kAllowForkWithThreads = true; | |
39 } | |
40 | |
41 namespace { | 36 namespace { |
42 | 37 |
43 void DoPipe(base::ScopedFD* fds) { | 38 void DoPipe(base::ScopedFD* fds) { |
44 int tmp_fds[2]; | 39 int tmp_fds[2]; |
45 BPF_ASSERT_EQ(0, pipe(tmp_fds)); | 40 BPF_ASSERT_EQ(0, pipe(tmp_fds)); |
46 fds[0].reset(tmp_fds[0]); | 41 fds[0].reset(tmp_fds[0]); |
47 fds[1].reset(tmp_fds[1]); | 42 fds[1].reset(tmp_fds[1]); |
48 } | 43 } |
49 | 44 |
50 void DoSocketpair(base::ScopedFD* fds) { | 45 void DoSocketpair(base::ScopedFD* fds) { |
(...skipping 335 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
386 RESTRICT_SYSCALL_EPERM_TEST(open); | 381 RESTRICT_SYSCALL_EPERM_TEST(open); |
387 RESTRICT_SYSCALL_EPERM_TEST(ptrace); | 382 RESTRICT_SYSCALL_EPERM_TEST(ptrace); |
388 RESTRICT_SYSCALL_EPERM_TEST(set_robust_list); | 383 RESTRICT_SYSCALL_EPERM_TEST(set_robust_list); |
389 #if defined(__i386__) || defined(__x86_64__) | 384 #if defined(__i386__) || defined(__x86_64__) |
390 RESTRICT_SYSCALL_EPERM_TEST(time); | 385 RESTRICT_SYSCALL_EPERM_TEST(time); |
391 #endif | 386 #endif |
392 | 387 |
393 } // namespace | 388 } // namespace |
394 | 389 |
395 #endif // !ADDRESS_SANITIZER && !THREAD_SANITIZER | 390 #endif // !ADDRESS_SANITIZER && !THREAD_SANITIZER |
OLD | NEW |