Index: content/common/sandbox_bpf_base_policy_linux.cc |
diff --git a/content/common/sandbox_bpf_base_policy_linux.cc b/content/common/sandbox_bpf_base_policy_linux.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..4341e921fa97344bc471d50fb7e4ea320932b873 |
--- /dev/null |
+++ b/content/common/sandbox_bpf_base_policy_linux.cc |
@@ -0,0 +1,36 @@ |
+// Copyright 2013 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "content/common/sandbox_bpf_base_policy_linux.h" |
+ |
+#include <errno.h> |
+ |
+#include "base/logging.h" |
+#include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h" |
+ |
+namespace content { |
+ |
+namespace { |
+ |
+// The errno used for denied file system access system calls, such as open(2). |
+static const int kFSDeniedErrno = EPERM; |
+ |
+} // namespace. |
+ |
+SandboxBPFBasePolicy::SandboxBPFBasePolicy() |
+ : baseline_policy_(new sandbox::BaselinePolicy(kFSDeniedErrno)) {} |
+SandboxBPFBasePolicy::~SandboxBPFBasePolicy() {} |
+ |
+ErrorCode SandboxBPFBasePolicy::EvaluateSyscall(SandboxBPF* sandbox_compiler, |
+ int system_call_number) const { |
+ DCHECK(baseline_policy_); |
+ return baseline_policy_->EvaluateSyscall(sandbox_compiler, |
+ system_call_number); |
+} |
+ |
+int SandboxBPFBasePolicy::GetFSDeniedErrno() { |
+ return kFSDeniedErrno; |
+} |
+ |
+} // namespace content. |