chromium/sandbox/policy/linux/sandbox_debug_handling_linux.cc

// Copyright 2015 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "sandbox/policy/linux/sandbox_debug_handling_linux.h"

#include <errno.h>
#include <signal.h>
#include <stddef.h>
#include <sys/prctl.h>
#include <unistd.h>

#include <tuple>

#include "base/command_line.h"
#include "base/logging.h"
#include "base/strings/safe_sprintf.h"
#include "sandbox/policy/switches.h"

namespace sandbox {
namespace policy {

namespace {

void DoChrootSignalHandler(int) {}

// This is a quick hack to allow testing sandbox crash reports in production
// binaries.
// This installs a signal handler for SIGUSR2 that performs a chroot().
// In most of our BPF policies, it is a "watched" system call which will
// trigger a SIGSYS signal whose handler will crash.
// This has been added during the investigation of https://crbug.com/415842.
void InstallCrashTestHandler() {}

bool IsSandboxDebuggingEnabled() {}

}  // namespace

// static
bool SandboxDebugHandling::SetDumpableStatusAndHandlers() {}

}  // namespace policy
}  // namespace sandbox