OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ | 5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ |
6 #define CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ | 6 #define CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ |
7 | 7 |
8 namespace content { | 8 namespace content { |
9 | 9 |
10 // These form a bitmask which describes the conditions of the Linux sandbox. | 10 // These form a bitmask which describes the conditions of the Linux sandbox. |
11 enum { | 11 enum LinuxSandboxStatus { |
12 // SUID sandbox active. | 12 // SUID sandbox active. |
13 kSandboxLinuxSUID = 1 << 0, | 13 kSandboxLinuxSUID = 1 << 0, |
14 | 14 |
15 // SUID sandbox is using the PID namespace. | 15 // SUID sandbox is using the PID namespace. |
16 kSandboxLinuxPIDNS = 1 << 1, | 16 kSandboxLinuxPIDNS = 1 << 1, |
17 | 17 |
18 //SUID sandbox is using the network namespace. | 18 // SUID sandbox is using the network namespace. |
19 kSandboxLinuxNetNS = 1 << 2, | 19 kSandboxLinuxNetNS = 1 << 2, |
20 | 20 |
21 // seccomp sandbox active. | 21 // seccomp-legacy sandbox active. |
22 kSandboxLinuxSeccomp = 1 << 3 | 22 kSandboxLinuxSeccomp = 1 << 3, |
23 }; | 23 }; |
24 | 24 |
25 } // namespace content | 25 } // namespace content |
26 | 26 |
27 #endif // CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ | 27 #endif // CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ |
OLD | NEW |