OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ | 5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ |
6 #define CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ | 6 #define CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ |
7 | 7 |
8 namespace content { | 8 namespace content { |
9 | 9 |
10 // These form a bitmask which describes the conditions of the Linux sandbox. | 10 // These form a bitmask which describes the conditions of the Linux sandbox. |
11 enum { | 11 // Note: this doesn't strictly give you the current status, it states |
| 12 // what will be enabled when the relevant processes are initialized. |
| 13 enum LinuxSandboxStatus { |
12 // SUID sandbox active. | 14 // SUID sandbox active. |
13 kSandboxLinuxSUID = 1 << 0, | 15 kSandboxLinuxSUID = 1 << 0, |
14 | 16 |
15 // SUID sandbox is using the PID namespace. | 17 // SUID sandbox is using the PID namespace. |
16 kSandboxLinuxPIDNS = 1 << 1, | 18 kSandboxLinuxPIDNS = 1 << 1, |
17 | 19 |
18 //SUID sandbox is using the network namespace. | 20 // SUID sandbox is using the network namespace. |
19 kSandboxLinuxNetNS = 1 << 2, | 21 kSandboxLinuxNetNS = 1 << 2, |
20 | 22 |
21 // seccomp sandbox active. | 23 // seccomp-legacy sandbox active. |
22 kSandboxLinuxSeccomp = 1 << 3 | 24 kSandboxLinuxSeccomp = 1 << 3, |
23 }; | 25 }; |
24 | 26 |
25 } // namespace content | 27 } // namespace content |
26 | 28 |
27 #endif // CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ | 29 #endif // CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ |
OLD | NEW |