chromium/sandbox/linux/syscall_broker/syscall_dispatcher.cc

// Copyright 2020 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#ifdef UNSAFE_BUFFERS_BUILD
// TODO(crbug.com/351564777): Remove this and convert code to safer constructs.
#pragma allow_unsafe_buffers
#endif

#include "sandbox/linux/syscall_broker/syscall_dispatcher.h"

#include <fcntl.h>

#include "base/check.h"
#include "base/logging.h"
#include "sandbox/linux/system_headers/linux_syscalls.h"

namespace sandbox {
namespace syscall_broker {

#if defined(MEMORY_SANITIZER)
#define BROKER_UNPOISON_STRING
#else
#define BROKER_UNPOISON_STRING(x)
#endif

int SyscallDispatcher::DefaultStatForTesting(const char* pathname,
                                             bool follow_links,
                                             default_stat_struct* sb) {}

int SyscallDispatcher::PerformStatat(const arch_seccomp_data& args,
                                     bool stat64) {}

int SyscallDispatcher::PerformUnlinkat(const arch_seccomp_data& args) {}

int SyscallDispatcher::DispatchSyscall(const arch_seccomp_data& args) {}

}  // namespace syscall_broker
}  // namespace sandbox