Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(285)

Side by Side Diff: content/common/sandbox_linux/sandbox_linux.h

Issue 1308823002: Move Singleton and related structs to namespace base (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: ToT Created 5 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_LINUX_H_ 5 #ifndef CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_LINUX_H_
6 #define CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_LINUX_H_ 6 #define CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_LINUX_H_
7 7
8 #include <string> 8 #include <string>
9 #include <vector> 9 #include <vector>
10 10
11 #include "base/basictypes.h" 11 #include "base/basictypes.h"
12 #include "base/logging.h" 12 #include "base/logging.h"
13 #include "base/memory/scoped_ptr.h" 13 #include "base/memory/scoped_ptr.h"
14 #include "content/public/common/sandbox_linux.h" 14 #include "content/public/common/sandbox_linux.h"
15 15
16 #if defined(ADDRESS_SANITIZER) || defined(MEMORY_SANITIZER) || \ 16 #if defined(ADDRESS_SANITIZER) || defined(MEMORY_SANITIZER) || \
17 defined(THREAD_SANITIZER) || defined(LEAK_SANITIZER) || \ 17 defined(THREAD_SANITIZER) || defined(LEAK_SANITIZER) || \
18 defined(UNDEFINED_SANITIZER) || defined(SANITIZER_COVERAGE) 18 defined(UNDEFINED_SANITIZER) || defined(SANITIZER_COVERAGE)
19 #include <sanitizer/common_interface_defs.h> 19 #include <sanitizer/common_interface_defs.h>
20 #define ANY_OF_AMTLU_SANITIZER 1 20 #define ANY_OF_AMTLU_SANITIZER 1
21 #endif 21 #endif
22 22
23 template <typename T> struct DefaultSingletonTraits;
24 namespace base { 23 namespace base {
24 template <typename T>
25 struct DefaultSingletonTraits;
25 class Thread; 26 class Thread;
26 } 27 }
27 namespace sandbox { class SetuidSandboxClient; } 28 namespace sandbox { class SetuidSandboxClient; }
28 29
29 namespace content { 30 namespace content {
30 31
31 // A singleton class to represent and change our sandboxing state for the 32 // A singleton class to represent and change our sandboxing state for the
32 // three main Linux sandboxes. 33 // three main Linux sandboxes.
33 // The sandboxing model allows using two layers of sandboxing. The first layer 34 // The sandboxing model allows using two layers of sandboxing. The first layer
34 // can be implemented either with unprivileged namespaces or with the setuid 35 // can be implemented either with unprivileged namespaces or with the setuid
(...skipping 91 matching lines...) Expand 10 before | Expand all | Expand 10 after
126 return proc_fd_; 127 return proc_fd_;
127 } 128 }
128 129
129 #if defined(ANY_OF_AMTLU_SANITIZER) 130 #if defined(ANY_OF_AMTLU_SANITIZER)
130 __sanitizer_sandbox_arguments* sanitizer_args() const { 131 __sanitizer_sandbox_arguments* sanitizer_args() const {
131 return sanitizer_args_.get(); 132 return sanitizer_args_.get();
132 }; 133 };
133 #endif 134 #endif
134 135
135 private: 136 private:
136 friend struct DefaultSingletonTraits<LinuxSandbox>; 137 friend struct base::DefaultSingletonTraits<LinuxSandbox>;
137 138
138 LinuxSandbox(); 139 LinuxSandbox();
139 ~LinuxSandbox(); 140 ~LinuxSandbox();
140 141
141 // Some methods are static and get an instance of the Singleton. These 142 // Some methods are static and get an instance of the Singleton. These
142 // are the non-static implementations. 143 // are the non-static implementations.
143 bool InitializeSandboxImpl(); 144 bool InitializeSandboxImpl();
144 void StopThreadImpl(base::Thread* thread); 145 void StopThreadImpl(base::Thread* thread);
145 // We must have been pre_initialized_ before using these. 146 // We must have been pre_initialized_ before using these.
146 bool seccomp_bpf_supported() const; 147 bool seccomp_bpf_supported() const;
(...skipping 29 matching lines...) Expand all
176 #if defined(ANY_OF_AMTLU_SANITIZER) 177 #if defined(ANY_OF_AMTLU_SANITIZER)
177 scoped_ptr<__sanitizer_sandbox_arguments> sanitizer_args_; 178 scoped_ptr<__sanitizer_sandbox_arguments> sanitizer_args_;
178 #endif 179 #endif
179 180
180 DISALLOW_COPY_AND_ASSIGN(LinuxSandbox); 181 DISALLOW_COPY_AND_ASSIGN(LinuxSandbox);
181 }; 182 };
182 183
183 } // namespace content 184 } // namespace content
184 185
185 #endif // CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_LINUX_H_ 186 #endif // CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_LINUX_H_
OLDNEW
« no previous file with comments | « content/common/font_cache_dispatcher_win.cc ('k') | content/common/sandbox_linux/sandbox_linux.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698