| OLD | NEW |
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ | 5 #ifndef SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ |
| 6 #define SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ | 6 #define SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ |
| 7 | 7 |
| 8 #include "base/basictypes.h" | 8 #include "base/basictypes.h" |
| 9 #include "build/build_config.h" | 9 #include "build/build_config.h" |
| 10 #include "sandbox/linux/sandbox_export.h" | 10 #include "sandbox/linux/sandbox_export.h" |
| (...skipping 19 matching lines...) Expand all Loading... |
| 30 static bool IsDeniedFileSystemAccessViaFd(int sysno); | 30 static bool IsDeniedFileSystemAccessViaFd(int sysno); |
| 31 static bool IsGetSimpleId(int sysno); | 31 static bool IsGetSimpleId(int sysno); |
| 32 static bool IsProcessPrivilegeChange(int sysno); | 32 static bool IsProcessPrivilegeChange(int sysno); |
| 33 static bool IsProcessGroupOrSession(int sysno); | 33 static bool IsProcessGroupOrSession(int sysno); |
| 34 static bool IsAllowedSignalHandling(int sysno); | 34 static bool IsAllowedSignalHandling(int sysno); |
| 35 static bool IsAllowedOperationOnFd(int sysno); | 35 static bool IsAllowedOperationOnFd(int sysno); |
| 36 static bool IsKernelInternalApi(int sysno); | 36 static bool IsKernelInternalApi(int sysno); |
| 37 // This should be thought through in conjunction with IsFutex(). | 37 // This should be thought through in conjunction with IsFutex(). |
| 38 static bool IsAllowedProcessStartOrDeath(int sysno); | 38 static bool IsAllowedProcessStartOrDeath(int sysno); |
| 39 // It's difficult to restrict those, but there is attack surface here. | 39 // It's difficult to restrict those, but there is attack surface here. |
| 40 static bool IsFutex(int sysno); | 40 static bool IsAllowedFutex(int sysno); |
| 41 static bool IsAllowedEpoll(int sysno); | 41 static bool IsAllowedEpoll(int sysno); |
| 42 static bool IsAllowedGetOrModifySocket(int sysno); | 42 static bool IsAllowedGetOrModifySocket(int sysno); |
| 43 static bool IsDeniedGetOrModifySocket(int sysno); | 43 static bool IsDeniedGetOrModifySocket(int sysno); |
| 44 | 44 |
| 45 #if defined(__i386__) | 45 #if defined(__i386__) |
| 46 // Big multiplexing system call for sockets. | 46 // Big multiplexing system call for sockets. |
| 47 static bool IsSocketCall(int sysno); | 47 static bool IsSocketCall(int sysno); |
| 48 #endif | 48 #endif |
| 49 | 49 |
| 50 #if defined(__x86_64__) || defined(__arm__) | 50 #if defined(__x86_64__) || defined(__arm__) |
| (...skipping 46 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 97 static bool IsArmPciConfig(int sysno); | 97 static bool IsArmPciConfig(int sysno); |
| 98 static bool IsArmPrivate(int sysno); | 98 static bool IsArmPrivate(int sysno); |
| 99 #endif // defined(__arm__) | 99 #endif // defined(__arm__) |
| 100 private: | 100 private: |
| 101 DISALLOW_IMPLICIT_CONSTRUCTORS(SyscallSets); | 101 DISALLOW_IMPLICIT_CONSTRUCTORS(SyscallSets); |
| 102 }; | 102 }; |
| 103 | 103 |
| 104 } // namespace sandbox. | 104 } // namespace sandbox. |
| 105 | 105 |
| 106 #endif // SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ | 106 #endif // SANDBOX_LINUX_SECCOMP_BPF_HELPERS_SYSCALL_SETS_H_ |
| OLD | NEW |