// Copyright 2012 The Chromium Authors // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #ifndef SANDBOX_LINUX_SECCOMP_BPF_SANDBOX_BPF_H_ #define SANDBOX_LINUX_SECCOMP_BPF_SANDBOX_BPF_H_ #include <stdint.h> #include <memory> #include "base/files/scoped_file.h" #include "sandbox/linux/bpf_dsl/codegen.h" #include "sandbox/linux/bpf_dsl/policy.h" #include "sandbox/sandbox_export.h" struct arch_seccomp_data; namespace sandbox { // This class can be used to apply a syscall sandboxing policy expressed in a // bpf_dsl::Policy object to the current process. // Syscall sandboxing policies get inherited by subprocesses and, once applied, // can never be removed for the lifetime of the process. class SANDBOX_EXPORT SandboxBPF { … }; } // namespace sandbox #endif // SANDBOX_LINUX_SECCOMP_BPF_SANDBOX_BPF_H_