1// Copyright 2013 The Chromium Authors. All rights reserved. 2// Use of this source code is governed by a BSD-style license that can be 3// found in the LICENSE file. 4 5#ifndef CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_BPF_BASE_POLICY_LINUX_H_ 6#define CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_BPF_BASE_POLICY_LINUX_H_ 7 8#include "base/basictypes.h" 9#include "base/memory/scoped_ptr.h" 10#include "sandbox/linux/bpf_dsl/bpf_dsl.h" 11#include "sandbox/linux/seccomp-bpf-helpers/baseline_policy.h" 12 13namespace content { 14 15// The "baseline" BPF policy for content/. Any content/ seccomp-bpf policy 16// should inherit from it. 17// It implements the main SandboxBPFDSLPolicy interface. Due to its nature 18// as a "kernel attack surface reduction" layer, it's implementation-defined. 19class SandboxBPFBasePolicy : public sandbox::bpf_dsl::SandboxBPFDSLPolicy { 20 public: 21 SandboxBPFBasePolicy(); 22 virtual ~SandboxBPFBasePolicy(); 23 24 virtual sandbox::bpf_dsl::ResultExpr EvaluateSyscall( 25 int system_call_number) const OVERRIDE; 26 virtual sandbox::bpf_dsl::ResultExpr InvalidSyscall() const OVERRIDE; 27 28 // A policy can implement this hook to run code right before the policy 29 // is passed to the BPF compiler and the sandbox is engaged. 30 // If PreSandboxHook() returns true, the sandbox is guaranteed to be 31 // engaged afterwards. 32 // This will be used when enabling the sandbox though 33 // SandboxSeccompBPF::StartSandbox(). 34 virtual bool PreSandboxHook(); 35 36 // Get the errno(3) to return for filesystem errors. 37 static int GetFSDeniedErrno(); 38 39 private: 40 // Compose the BaselinePolicy from sandbox/. 41 scoped_ptr<sandbox::BaselinePolicy> baseline_policy_; 42 DISALLOW_COPY_AND_ASSIGN(SandboxBPFBasePolicy); 43}; 44 45} // namespace content 46 47#endif // CONTENT_COMMON_SANDBOX_LINUX_SANDBOX_BPF_BASE_POLICY_LINUX_H_ 48