| Index: content/common/sandbox_linux/bpf_gpu_policy_linux.h
|
| diff --git a/content/common/sandbox_linux/bpf_gpu_policy_linux.h b/content/common/sandbox_linux/bpf_gpu_policy_linux.h
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..6b1ba4a4c318520ceefc06f872559cfd33a6b352
|
| --- /dev/null
|
| +++ b/content/common/sandbox_linux/bpf_gpu_policy_linux.h
|
| @@ -0,0 +1,57 @@
|
| +// Copyright 2013 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +#ifndef CONTENT_COMMON_SANDBOX_LINUX_BPF_GPU_POLICY_LINUX_H_
|
| +#define CONTENT_COMMON_SANDBOX_LINUX_BPF_GPU_POLICY_LINUX_H_
|
| +
|
| +#include <string>
|
| +#include <vector>
|
| +
|
| +#include "content/common/sandbox_linux/sandbox_bpf_base_policy_linux.h"
|
| +
|
| +namespace sandbox {
|
| +class BrokerProcess;
|
| +}
|
| +
|
| +namespace content {
|
| +
|
| +class GpuProcessPolicy : public SandboxBPFBasePolicy {
|
| + public:
|
| + GpuProcessPolicy();
|
| + virtual ~GpuProcessPolicy();
|
| +
|
| + virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
|
| + int system_call_number) const OVERRIDE;
|
| +
|
| + virtual bool PreSandboxHook() OVERRIDE;
|
| +
|
| + protected:
|
| + // Start a broker process to handle open() inside the sandbox.
|
| + // |broker_sandboxer_callback| is a callback that will enable a suitable
|
| + // sandbox for the broker process itself.
|
| + // |read_whitelist_extra| and |write_whitelist_extra| are lists of file
|
| + // names that should be whitelisted by the broker process, in addition to
|
| + // the basic ones.
|
| + void InitGpuBrokerProcess(
|
| + bool (*broker_sandboxer_callback)(void),
|
| + const std::vector<std::string>& read_whitelist_extra,
|
| + const std::vector<std::string>& write_whitelist_extra);
|
| +
|
| + sandbox::BrokerProcess* broker_process() { return broker_process_; }
|
| +
|
| + private:
|
| + // A BrokerProcess is a helper that is started before the sandbox is engaged
|
| + // and will serve requests to access files over an IPC channel. The client of
|
| + // this runs from a SIGSYS handler triggered by the seccomp-bpf sandbox.
|
| + // This should never be destroyed, as after the sandbox is started it is
|
| + // vital to the process.
|
| + // This is allocated by InitGpuBrokerProcess, called from PreSandboxHook(),
|
| + // which executes iff the sandbox is going to be enabled afterwards.
|
| + sandbox::BrokerProcess* broker_process_;
|
| + DISALLOW_COPY_AND_ASSIGN(GpuProcessPolicy);
|
| +};
|
| +
|
| +} // namespace content
|
| +
|
| +#endif // CONTENT_COMMON_SANDBOX_LINUX_BPF_GPU_POLICY_LINUX_H_
|
|
|