Index: components/nacl/loader/nonsfi/nonsfi_sandbox.h |
diff --git a/components/nacl/loader/nonsfi/nonsfi_sandbox.h b/components/nacl/loader/nonsfi/nonsfi_sandbox.h |
new file mode 100644 |
index 0000000000000000000000000000000000000000..28e9cff8fe14e476006a5e03a088cd77140ed1f2 |
--- /dev/null |
+++ b/components/nacl/loader/nonsfi/nonsfi_sandbox.h |
@@ -0,0 +1,39 @@ |
+// Copyright 2014 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#ifndef COMPONENTS_NACL_LOADER_NONSFI_NONSFI_SANDBOX_H_ |
+#define COMPONENTS_NACL_LOADER_NONSFI_NONSFI_SANDBOX_H_ |
+ |
+#include "base/basictypes.h" |
+#include "sandbox/linux/seccomp-bpf/sandbox_bpf_policy.h" |
+ |
+namespace nacl { |
+namespace nonsfi { |
+ |
+// The seccomp sandbox policy for NaCl non-SFI mode. Note that this |
+// policy must be as strong as possible, as non-SFI mode heavily |
+// depends on seccomp sandbox. |
+class NaClNonSfiBPFSandboxPolicy : public sandbox::SandboxBPFPolicy { |
+ public: |
+ explicit NaClNonSfiBPFSandboxPolicy() {} |
+ virtual ~NaClNonSfiBPFSandboxPolicy() {} |
+ |
+ virtual sandbox::ErrorCode EvaluateSyscall(sandbox::SandboxBPF* sb, |
+ int sysno) const OVERRIDE; |
+ |
+ static sandbox::ErrorCode EvaluateSyscallImpl(sandbox::SandboxBPF* sb, |
+ int sysno, void*); |
+ |
+ private: |
+ DISALLOW_COPY_AND_ASSIGN(NaClNonSfiBPFSandboxPolicy); |
+}; |
+ |
+// Initializes seccomp-bpf sandbox for non-SFI NaCl. Returns false on |
+// failure. |
+bool InitializeBPFSandbox(); |
+ |
+} // namespace nonsfi |
+} // namespace nacl |
+ |
+#endif // COMPONENTS_NACL_LOADER_NONSFI_NONSFI_SANDBOX_H_ |