1// Copyright 2013 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5#ifndef CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_BPF_BASE_POLICY_LINUX_H_
6#define CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_BPF_BASE_POLICY_LINUX_H_
7
8#include "base/basictypes.h"
9#include "base/memory/scoped_ptr.h"
10#include "sandbox/linux/bpf_dsl/bpf_dsl.h"
11#include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h"
12
13namespace content {
14
15// The "baseline" BPF policy for content/. Any content/ seccomp-bpf policy
16// should inherit from it.
17// It implements the main SandboxBPFDSLPolicy interface. Due to its nature
18// as a "kernel attack surface reduction" layer, it's implementation-defined.
19class SandboxBPFBasePolicy : public sandbox::bpf_dsl::SandboxBPFDSLPolicy {
20 public:
21  SandboxBPFBasePolicy();
22  virtual ~SandboxBPFBasePolicy();
23
24  virtual sandbox::bpf_dsl::ResultExpr EvaluateSyscall(
25      int system_call_number) const OVERRIDE;
26  virtual sandbox::bpf_dsl::ResultExpr InvalidSyscall() const OVERRIDE;
27
28  // A policy can implement this hook to run code right before the policy
29  // is passed to the BPF compiler and the sandbox is engaged.
30  // If PreSandboxHook() returns true, the sandbox is guaranteed to be
31  // engaged afterwards.
32  // This will be used when enabling the sandbox though
33  // SandboxSeccompBPF::StartSandbox().
34  virtual bool PreSandboxHook();
35
36  // Get the errno(3) to return for filesystem errors.
37  static int GetFSDeniedErrno();
38
39 private:
40  // Compose the BaselinePolicy from sandbox/.
41  scoped_ptr<sandbox::BaselinePolicy> baseline_policy_;
42  DISALLOW_COPY_AND_ASSIGN(SandboxBPFBasePolicy);
43};
44
45}  // namespace content
46
47#endif  // CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_BPF_BASE_POLICY_LINUX_H_
48