OLD | NEW |
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ | 5 #ifndef SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ |
6 #define SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ | 6 #define SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ |
7 | 7 |
8 #include "base/basictypes.h" | 8 #include "base/basictypes.h" |
9 #include "build/build_config.h" | 9 #include "build/build_config.h" |
| 10 #include "sandbox/linux/sandbox_export.h" |
10 | 11 |
11 // These are helpers to build seccomp-bpf policies, i.e. policies for a | 12 // These are helpers to build seccomp-bpf policies, i.e. policies for a |
12 // sandbox that reduces the Linux kernel's attack surface. Given their | 13 // sandbox that reduces the Linux kernel's attack surface. Given their |
13 // nature, they don't have any clear semantics and are completely | 14 // nature, they don't have any clear semantics and are completely |
14 // "implementation-defined". | 15 // "implementation-defined". |
15 | 16 |
16 namespace sandbox { | 17 namespace sandbox { |
17 | 18 |
18 class SyscallSets { | 19 class SANDBOX_EXPORT SyscallSets { |
19 public: | 20 public: |
20 static bool IsKill(int sysno); | 21 static bool IsKill(int sysno); |
21 static bool IsAllowedGettime(int sysno); | 22 static bool IsAllowedGettime(int sysno); |
22 static bool IsCurrentDirectory(int sysno); | 23 static bool IsCurrentDirectory(int sysno); |
23 static bool IsUmask(int sysno); | 24 static bool IsUmask(int sysno); |
24 // System calls that directly access the file system. They might acquire | 25 // System calls that directly access the file system. They might acquire |
25 // a new file descriptor or otherwise perform an operation directly | 26 // a new file descriptor or otherwise perform an operation directly |
26 // via a path. | 27 // via a path. |
27 static bool IsFileSystem(int sysno); | 28 static bool IsFileSystem(int sysno); |
28 static bool IsAllowedFileSystemAccessViaFd(int sysno); | 29 static bool IsAllowedFileSystemAccessViaFd(int sysno); |
(...skipping 67 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
96 static bool IsArmPciConfig(int sysno); | 97 static bool IsArmPciConfig(int sysno); |
97 static bool IsArmPrivate(int sysno); | 98 static bool IsArmPrivate(int sysno); |
98 #endif // defined(__arm__) | 99 #endif // defined(__arm__) |
99 private: | 100 private: |
100 DISALLOW_IMPLICIT_CONSTRUCTORS(SyscallSets); | 101 DISALLOW_IMPLICIT_CONSTRUCTORS(SyscallSets); |
101 }; | 102 }; |
102 | 103 |
103 } // namespace sandbox. | 104 } // namespace sandbox. |
104 | 105 |
105 #endif // SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ | 106 #endif // SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ |
OLD | NEW |