OLD | NEW |
(Empty) | |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #ifndef SANDBOX_LINUX_SERVICES_NAMESPACE_UTILS_H_ |
| 6 #define SANDBOX_LINUX_SERVICES_NAMESPACE_UTILS_H_ |
| 7 |
| 8 #include <sys/types.h> |
| 9 |
| 10 #include "base/macros.h" |
| 11 #include "base/template_util.h" |
| 12 #include "sandbox/sandbox_export.h" |
| 13 |
| 14 namespace sandbox { |
| 15 |
| 16 // Utility functions for using Linux namepaces. |
| 17 class SANDBOX_EXPORT NamespaceUtils { |
| 18 public: |
| 19 COMPILE_ASSERT((base::is_same<uid_t, gid_t>::value), UidAndGidAreSameType); |
| 20 // generic_id_t can be used for either uid_t or gid_t. |
| 21 typedef uid_t generic_id_t; |
| 22 |
| 23 // Write a uid or gid mapping from |id| to |id| in |map_file|. |
| 24 static bool WriteToIdMapFile(const char* map_file, generic_id_t id); |
| 25 |
| 26 // Returns true if unprivileged namespaces of type |type| is supported |
| 27 // (meaning that both CLONE_NEWUSER and type are are supported). |type| must |
| 28 // be one of CLONE_NEWIPC, CLONE_NEWNET, CLONE_NEWNS, CLONE_NEWPID, |
| 29 // CLONE_NEWUSER, or CLONE_NEWUTS. This relies on access to /proc, so it will |
| 30 // not work from within a sandbox. |
| 31 static bool KernelSupportsUnprivilegedNamespace(int type); |
| 32 |
| 33 private: |
| 34 DISALLOW_IMPLICIT_CONSTRUCTORS(NamespaceUtils); |
| 35 }; |
| 36 |
| 37 } // namespace sandbox |
| 38 |
| 39 #endif // SANDBOX_LINUX_SERVICES_NAMESPACE_UTILS_H_ |
OLD | NEW |