Home | History | Annotate | Download | only in seccomp-bpf
      1 // Copyright 2013 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 #ifndef SANDBOX_LINUX_SECCOMP_BPF_SANDBOX_BPF_POLICY_H_
      6 #define SANDBOX_LINUX_SECCOMP_BPF_SANDBOX_BPF_POLICY_H_
      7 
      8 #include "base/basictypes.h"
      9 
     10 namespace sandbox {
     11 
     12 class ErrorCode;
     13 class SandboxBPF;
     14 
     15 // This is the interface to implement to define a BPF sandbox policy.
     16 class SandboxBPFPolicy {
     17  public:
     18   SandboxBPFPolicy() {}
     19   virtual ~SandboxBPFPolicy() {}
     20 
     21   // The EvaluateSyscall method is called with the system call number. It can
     22   // decide to allow the system call unconditionally by returning ERR_ALLOWED;
     23   // it can deny the system call unconditionally by returning an appropriate
     24   // "errno" value; or it can request inspection of system call argument(s) by
     25   // returning a suitable ErrorCode.
     26   virtual ErrorCode EvaluateSyscall(SandboxBPF* sandbox_compiler,
     27                                     int system_call_number) const = 0;
     28 
     29  private:
     30   DISALLOW_COPY_AND_ASSIGN(SandboxBPFPolicy);
     31 };
     32 
     33 }  // namespace sandbox
     34 
     35 #endif  // SANDBOX_LINUX_SECCOMP_BPF_SANDBOX_BPF_POLICY_H_
     36