| OLD | NEW |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ | 5 #ifndef SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ |
| 6 #define SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ | 6 #define SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ |
| 7 | 7 |
| 8 #include "base/basictypes.h" | 8 #include "base/basictypes.h" |
| 9 #include "build/build_config.h" | 9 #include "build/build_config.h" |
| 10 #include "sandbox/linux/sandbox_export.h" |
| 10 | 11 |
| 11 // These are helpers to build seccomp-bpf policies, i.e. policies for a | 12 // These are helpers to build seccomp-bpf policies, i.e. policies for a |
| 12 // sandbox that reduces the Linux kernel's attack surface. Given their | 13 // sandbox that reduces the Linux kernel's attack surface. Given their |
| 13 // nature, they don't have any clear semantics and are completely | 14 // nature, they don't have any clear semantics and are completely |
| 14 // "implementation-defined". | 15 // "implementation-defined". |
| 15 | 16 |
| 16 namespace sandbox { | 17 namespace sandbox { |
| 17 | 18 |
| 18 class SyscallSets { | 19 class SANDBOX_EXPORT SyscallSets { |
| 19 public: | 20 public: |
| 20 static bool IsKill(int sysno); | 21 static bool IsKill(int sysno); |
| 21 static bool IsAllowedGettime(int sysno); | 22 static bool IsAllowedGettime(int sysno); |
| 22 static bool IsCurrentDirectory(int sysno); | 23 static bool IsCurrentDirectory(int sysno); |
| 23 static bool IsUmask(int sysno); | 24 static bool IsUmask(int sysno); |
| 24 // System calls that directly access the file system. They might acquire | 25 // System calls that directly access the file system. They might acquire |
| 25 // a new file descriptor or otherwise perform an operation directly | 26 // a new file descriptor or otherwise perform an operation directly |
| 26 // via a path. | 27 // via a path. |
| 27 static bool IsFileSystem(int sysno); | 28 static bool IsFileSystem(int sysno); |
| 28 static bool IsAllowedFileSystemAccessViaFd(int sysno); | 29 static bool IsAllowedFileSystemAccessViaFd(int sysno); |
| (...skipping 67 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 96 static bool IsArmPciConfig(int sysno); | 97 static bool IsArmPciConfig(int sysno); |
| 97 static bool IsArmPrivate(int sysno); | 98 static bool IsArmPrivate(int sysno); |
| 98 #endif // defined(__arm__) | 99 #endif // defined(__arm__) |
| 99 private: | 100 private: |
| 100 DISALLOW_IMPLICIT_CONSTRUCTORS(SyscallSets); | 101 DISALLOW_IMPLICIT_CONSTRUCTORS(SyscallSets); |
| 101 }; | 102 }; |
| 102 | 103 |
| 103 } // namespace sandbox. | 104 } // namespace sandbox. |
| 104 | 105 |
| 105 #endif // SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ | 106 #endif // SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ |
| OLD | NEW |