Home | History | Annotate | Download | only in sandbox_linux
      1 // Copyright 2013 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 #ifndef CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_BPF_BASE_POLICY_LINUX_H_
      6 #define CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_BPF_BASE_POLICY_LINUX_H_
      7 
      8 #include "base/basictypes.h"
      9 #include "base/memory/scoped_ptr.h"
     10 #include "sandbox/linux/bpf_dsl/bpf_dsl.h"
     11 #include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h"
     12 
     13 namespace content {
     14 
     15 // The "baseline" BPF policy for content/. Any content/ seccomp-bpf policy
     16 // should inherit from it.
     17 // It implements the main SandboxBPFDSLPolicy interface. Due to its nature
     18 // as a "kernel attack surface reduction" layer, it's implementation-defined.
     19 class SandboxBPFBasePolicy : public sandbox::bpf_dsl::SandboxBPFDSLPolicy {
     20  public:
     21   SandboxBPFBasePolicy();
     22   virtual ~SandboxBPFBasePolicy();
     23 
     24   virtual sandbox::bpf_dsl::ResultExpr EvaluateSyscall(
     25       int system_call_number) const OVERRIDE;
     26   virtual sandbox::bpf_dsl::ResultExpr InvalidSyscall() const OVERRIDE;
     27 
     28   // A policy can implement this hook to run code right before the policy
     29   // is passed to the BPF compiler and the sandbox is engaged.
     30   // If PreSandboxHook() returns true, the sandbox is guaranteed to be
     31   // engaged afterwards.
     32   // This will be used when enabling the sandbox though
     33   // SandboxSeccompBPF::StartSandbox().
     34   virtual bool PreSandboxHook();
     35 
     36   // Get the errno(3) to return for filesystem errors.
     37   static int GetFSDeniedErrno();
     38 
     39  private:
     40   // Compose the BaselinePolicy from sandbox/.
     41   scoped_ptr<sandbox::BaselinePolicy> baseline_policy_;
     42   DISALLOW_COPY_AND_ASSIGN(SandboxBPFBasePolicy);
     43 };
     44 
     45 }  // namespace content
     46 
     47 #endif  // CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_BPF_BASE_POLICY_LINUX_H_
     48