Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(451)

Side by Side Diff: content/common/sandbox_linux/sandbox_bpf_base_policy_linux.h

Issue 590213003: Linux sandbox: Allow restricting sched_* on other processes. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Created 6 years, 3 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2013 The Chromium Authors. All rights reserved. 1 // Copyright 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_BPF_BASE_POLICY_LINUX_H_ 5 #ifndef CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_BPF_BASE_POLICY_LINUX_H_
6 #define CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_BPF_BASE_POLICY_LINUX_H_ 6 #define CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_BPF_BASE_POLICY_LINUX_H_
7 7
8 #include "base/basictypes.h" 8 #include "base/basictypes.h"
9 #include "base/memory/scoped_ptr.h" 9 #include "base/memory/scoped_ptr.h"
10 #include "sandbox/linux/bpf_dsl/bpf_dsl.h" 10 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
(...skipping 18 matching lines...) Expand all
29 // is passed to the BPF compiler and the sandbox is engaged. 29 // is passed to the BPF compiler and the sandbox is engaged.
30 // If PreSandboxHook() returns true, the sandbox is guaranteed to be 30 // If PreSandboxHook() returns true, the sandbox is guaranteed to be
31 // engaged afterwards. 31 // engaged afterwards.
32 // This will be used when enabling the sandbox though 32 // This will be used when enabling the sandbox though
33 // SandboxSeccompBPF::StartSandbox(). 33 // SandboxSeccompBPF::StartSandbox().
34 virtual bool PreSandboxHook(); 34 virtual bool PreSandboxHook();
35 35
36 // Get the errno(3) to return for filesystem errors. 36 // Get the errno(3) to return for filesystem errors.
37 static int GetFSDeniedErrno(); 37 static int GetFSDeniedErrno();
38 38
39 // Returns the pid of the process being sandboxed.
40 pid_t GetCurrentPid() const;
jln (very slow on Chromium) 2014/09/22 21:56:44 I don't think you need this here. We can add it wh
rickyz (no longer on Chrome) 2014/09/23 06:03:20 Done.
41
39 private: 42 private:
40 // Compose the BaselinePolicy from sandbox/. 43 // Compose the BaselinePolicy from sandbox/.
41 scoped_ptr<sandbox::BaselinePolicy> baseline_policy_; 44 scoped_ptr<sandbox::BaselinePolicy> baseline_policy_;
42 DISALLOW_COPY_AND_ASSIGN(SandboxBPFBasePolicy); 45 DISALLOW_COPY_AND_ASSIGN(SandboxBPFBasePolicy);
43 }; 46 };
44 47
45 } // namespace content 48 } // namespace content
46 49
47 #endif // CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_BPF_BASE_POLICY_LINUX_H_ 50 #endif // CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_BPF_BASE_POLICY_LINUX_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698