| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ | 5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ |
| 6 #define CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ | 6 #define CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ |
| 7 | 7 |
| 8 namespace content { | 8 namespace content { |
| 9 | 9 |
| 10 // These form a bitmask which describes the conditions of the Linux sandbox. | 10 // These form a bitmask which describes the conditions of the Linux sandbox. |
| 11 enum { | 11 enum LinuxSandboxStatus { |
| 12 // SUID sandbox active. | 12 // SUID sandbox active. |
| 13 kSandboxLinuxSUID = 1 << 0, | 13 kSandboxLinuxSUID = 1 << 0, |
| 14 | 14 |
| 15 // SUID sandbox is using the PID namespace. | 15 // SUID sandbox is using the PID namespace. |
| 16 kSandboxLinuxPIDNS = 1 << 1, | 16 kSandboxLinuxPIDNS = 1 << 1, |
| 17 | 17 |
| 18 //SUID sandbox is using the network namespace. | 18 // SUID sandbox is using the network namespace. |
| 19 kSandboxLinuxNetNS = 1 << 2, | 19 kSandboxLinuxNetNS = 1 << 2, |
| 20 | 20 |
| 21 // seccomp sandbox active. | 21 // seccomp-legacy sandbox active. |
| 22 kSandboxLinuxSeccomp = 1 << 3 | 22 kSandboxLinuxSeccomp = 1 << 3, |
| 23 }; | 23 }; |
| 24 | 24 |
| 25 } // namespace content | 25 } // namespace content |
| 26 | 26 |
| 27 #endif // CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ | 27 #endif // CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ |
| OLD | NEW |