// Copyright 2015 The Chromium Authors // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "sandbox/policy/linux/sandbox_debug_handling_linux.h" #include <errno.h> #include <signal.h> #include <stddef.h> #include <sys/prctl.h> #include <unistd.h> #include <tuple> #include "base/command_line.h" #include "base/logging.h" #include "base/strings/safe_sprintf.h" #include "sandbox/policy/switches.h" namespace sandbox { namespace policy { namespace { void DoChrootSignalHandler(int) { … } // This is a quick hack to allow testing sandbox crash reports in production // binaries. // This installs a signal handler for SIGUSR2 that performs a chroot(). // In most of our BPF policies, it is a "watched" system call which will // trigger a SIGSYS signal whose handler will crash. // This has been added during the investigation of https://crbug.com/415842. void InstallCrashTestHandler() { … } bool IsSandboxDebuggingEnabled() { … } } // namespace // static bool SandboxDebugHandling::SetDumpableStatusAndHandlers() { … } } // namespace policy } // namespace sandbox