OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef CONTENT_COMMON_SANDBOX_LINUX_H_ | 5 #ifndef CONTENT_COMMON_SANDBOX_LINUX_H_ |
6 #define CONTENT_COMMON_SANDBOX_LINUX_H_ | 6 #define CONTENT_COMMON_SANDBOX_LINUX_H_ |
7 | 7 |
8 #include <string> | 8 #include <string> |
9 | 9 |
10 #include "base/basictypes.h" | 10 #include "base/basictypes.h" |
(...skipping 51 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
62 | 62 |
63 // Simple accessor for our instance of the setuid sandbox. Will never return | 63 // Simple accessor for our instance of the setuid sandbox. Will never return |
64 // NULL. | 64 // NULL. |
65 // There is no StartSetuidSandbox(), the SetuidSandboxClient instance should | 65 // There is no StartSetuidSandbox(), the SetuidSandboxClient instance should |
66 // be used directly. | 66 // be used directly. |
67 sandbox::SetuidSandboxClient* setuid_sandbox_client() const; | 67 sandbox::SetuidSandboxClient* setuid_sandbox_client() const; |
68 | 68 |
69 // Check the policy and eventually start the seccomp-bpf sandbox. This should | 69 // Check the policy and eventually start the seccomp-bpf sandbox. This should |
70 // never be called with threads started. If we detect that threads have | 70 // never be called with threads started. If we detect that threads have |
71 // started we will crash. | 71 // started we will crash. |
72 bool StartSeccompBpf(const std::string& process_type); | 72 bool StartSeccompBPF(const std::string& process_type); |
73 | 73 |
74 // Limit the address space of the current process (and its children). | 74 // Limit the address space of the current process (and its children). |
75 // to make some vulnerabilities harder to exploit. | 75 // to make some vulnerabilities harder to exploit. |
76 bool LimitAddressSpace(const std::string& process_type); | 76 bool LimitAddressSpace(const std::string& process_type); |
77 | 77 |
78 private: | 78 private: |
79 friend struct DefaultSingletonTraits<LinuxSandbox>; | 79 friend struct DefaultSingletonTraits<LinuxSandbox>; |
80 | 80 |
81 // We must have been pre_initialized_ before using this. | 81 // We must have been pre_initialized_ before using this. |
82 bool seccomp_bpf_supported() const; | 82 bool seccomp_bpf_supported() const; |
(...skipping 16 matching lines...) Expand all Loading... |
99 scoped_ptr<sandbox::SetuidSandboxClient> setuid_sandbox_client_; | 99 scoped_ptr<sandbox::SetuidSandboxClient> setuid_sandbox_client_; |
100 | 100 |
101 ~LinuxSandbox(); | 101 ~LinuxSandbox(); |
102 DISALLOW_IMPLICIT_CONSTRUCTORS(LinuxSandbox); | 102 DISALLOW_IMPLICIT_CONSTRUCTORS(LinuxSandbox); |
103 }; | 103 }; |
104 | 104 |
105 } // namespace content | 105 } // namespace content |
106 | 106 |
107 #endif // CONTENT_COMMON_SANDBOX_LINUX_H_ | 107 #endif // CONTENT_COMMON_SANDBOX_LINUX_H_ |
108 | 108 |
OLD | NEW |