OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef SANDBOX_LINUX_SECCOMP_BPF_SANDBOX_BPF_H_ | 5 #ifndef SANDBOX_LINUX_SECCOMP_BPF_SANDBOX_BPF_H_ |
6 #define SANDBOX_LINUX_SECCOMP_BPF_SANDBOX_BPF_H_ | 6 #define SANDBOX_LINUX_SECCOMP_BPF_SANDBOX_BPF_H_ |
7 | 7 |
8 #include <stdint.h> | 8 #include <stdint.h> |
9 | 9 |
10 #include "base/files/scoped_file.h" | 10 #include "base/files/scoped_file.h" |
11 #include "base/macros.h" | 11 #include "base/macros.h" |
12 #include "base/memory/scoped_ptr.h" | 12 #include "base/memory/scoped_ptr.h" |
13 #include "sandbox/linux/seccomp-bpf/codegen.h" | 13 #include "sandbox/linux/bpf_dsl/codegen.h" |
14 #include "sandbox/sandbox_export.h" | 14 #include "sandbox/sandbox_export.h" |
15 | 15 |
16 namespace sandbox { | 16 namespace sandbox { |
17 struct arch_seccomp_data; | 17 struct arch_seccomp_data; |
18 namespace bpf_dsl { | 18 namespace bpf_dsl { |
19 class Policy; | 19 class Policy; |
20 } | 20 } |
21 | 21 |
22 // This class can be used to apply a syscall sandboxing policy expressed in a | 22 // This class can be used to apply a syscall sandboxing policy expressed in a |
23 // bpf_dsl::Policy object to the current process. | 23 // bpf_dsl::Policy object to the current process. |
(...skipping 85 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
109 base::ScopedFD proc_task_fd_; | 109 base::ScopedFD proc_task_fd_; |
110 bool sandbox_has_started_; | 110 bool sandbox_has_started_; |
111 scoped_ptr<bpf_dsl::Policy> policy_; | 111 scoped_ptr<bpf_dsl::Policy> policy_; |
112 | 112 |
113 DISALLOW_COPY_AND_ASSIGN(SandboxBPF); | 113 DISALLOW_COPY_AND_ASSIGN(SandboxBPF); |
114 }; | 114 }; |
115 | 115 |
116 } // namespace sandbox | 116 } // namespace sandbox |
117 | 117 |
118 #endif // SANDBOX_LINUX_SECCOMP_BPF_SANDBOX_BPF_H_ | 118 #endif // SANDBOX_LINUX_SECCOMP_BPF_SANDBOX_BPF_H_ |
OLD | NEW |