Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(170)

Side by Side Diff: content/common/sandbox_linux.h

Issue 101773003: Linux sandbox: cleanup sandbox-bpf naming. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Address namespace sandbox nits. Created 7 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « content/common/sandbox_init_linux.cc ('k') | content/common/sandbox_linux.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_COMMON_SANDBOX_LINUX_H_ 5 #ifndef CONTENT_COMMON_SANDBOX_LINUX_H_
6 #define CONTENT_COMMON_SANDBOX_LINUX_H_ 6 #define CONTENT_COMMON_SANDBOX_LINUX_H_
7 7
8 #include <string> 8 #include <string>
9 9
10 #include "base/basictypes.h" 10 #include "base/basictypes.h"
(...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after
62 62
63 // Simple accessor for our instance of the setuid sandbox. Will never return 63 // Simple accessor for our instance of the setuid sandbox. Will never return
64 // NULL. 64 // NULL.
65 // There is no StartSetuidSandbox(), the SetuidSandboxClient instance should 65 // There is no StartSetuidSandbox(), the SetuidSandboxClient instance should
66 // be used directly. 66 // be used directly.
67 sandbox::SetuidSandboxClient* setuid_sandbox_client() const; 67 sandbox::SetuidSandboxClient* setuid_sandbox_client() const;
68 68
69 // Check the policy and eventually start the seccomp-bpf sandbox. This should 69 // Check the policy and eventually start the seccomp-bpf sandbox. This should
70 // never be called with threads started. If we detect that threads have 70 // never be called with threads started. If we detect that threads have
71 // started we will crash. 71 // started we will crash.
72 bool StartSeccompBpf(const std::string& process_type); 72 bool StartSeccompBPF(const std::string& process_type);
73 73
74 // Limit the address space of the current process (and its children). 74 // Limit the address space of the current process (and its children).
75 // to make some vulnerabilities harder to exploit. 75 // to make some vulnerabilities harder to exploit.
76 bool LimitAddressSpace(const std::string& process_type); 76 bool LimitAddressSpace(const std::string& process_type);
77 77
78 private: 78 private:
79 friend struct DefaultSingletonTraits<LinuxSandbox>; 79 friend struct DefaultSingletonTraits<LinuxSandbox>;
80 80
81 // We must have been pre_initialized_ before using this. 81 // We must have been pre_initialized_ before using this.
82 bool seccomp_bpf_supported() const; 82 bool seccomp_bpf_supported() const;
(...skipping 16 matching lines...) Expand all
99 scoped_ptr<sandbox::SetuidSandboxClient> setuid_sandbox_client_; 99 scoped_ptr<sandbox::SetuidSandboxClient> setuid_sandbox_client_;
100 100
101 ~LinuxSandbox(); 101 ~LinuxSandbox();
102 DISALLOW_IMPLICIT_CONSTRUCTORS(LinuxSandbox); 102 DISALLOW_IMPLICIT_CONSTRUCTORS(LinuxSandbox);
103 }; 103 };
104 104
105 } // namespace content 105 } // namespace content
106 106
107 #endif // CONTENT_COMMON_SANDBOX_LINUX_H_ 107 #endif // CONTENT_COMMON_SANDBOX_LINUX_H_
108 108
OLDNEW
« no previous file with comments | « content/common/sandbox_init_linux.cc ('k') | content/common/sandbox_linux.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698