OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ | 5 #ifndef CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ |
6 #define CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ | 6 #define CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ |
7 | 7 |
8 namespace content { | 8 namespace content { |
9 | 9 |
10 // These form a bitmask which describes the conditions of the Linux sandbox. | 10 // These form a bitmask which describes the conditions of the Linux sandbox. |
11 // Note: this doesn't strictly give you the current status, it states | 11 enum { |
12 // what will be enabled when the relevant processes are initialized. | |
13 enum LinuxSandboxStatus { | |
14 // SUID sandbox active. | 12 // SUID sandbox active. |
15 kSandboxLinuxSUID = 1 << 0, | 13 kSandboxLinuxSUID = 1 << 0, |
16 | 14 |
17 // SUID sandbox is using the PID namespace. | 15 // SUID sandbox is using the PID namespace. |
18 kSandboxLinuxPIDNS = 1 << 1, | 16 kSandboxLinuxPIDNS = 1 << 1, |
19 | 17 |
20 // SUID sandbox is using the network namespace. | 18 //SUID sandbox is using the network namespace. |
21 kSandboxLinuxNetNS = 1 << 2, | 19 kSandboxLinuxNetNS = 1 << 2, |
22 | 20 |
23 // seccomp-legacy sandbox active. | 21 // seccomp sandbox active. |
24 kSandboxLinuxSeccomp = 1 << 3, | 22 kSandboxLinuxSeccomp = 1 << 3 |
25 }; | 23 }; |
26 | 24 |
27 } // namespace content | 25 } // namespace content |
28 | 26 |
29 #endif // CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ | 27 #endif // CONTENT_PUBLIC_COMMON_SANDBOX_LINUX_H_ |
OLD | NEW |