chromium/sandbox/linux/suid/common/sandbox.h

// Copyright 2012 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#ifndef SANDBOX_LINUX_SUID_COMMON_SANDBOX_H_
#define SANDBOX_LINUX_SUID_COMMON_SANDBOX_H_

#if defined(__cplusplus)
namespace sandbox {
#endif

// These are command line switches that may be used by other programs
// (e.g. Chrome) to construct a command line for the sandbox.
static const char kSuidSandboxGetApiSwitch[] =;
static const char kAdjustOOMScoreSwitch[] =;

static const char kSandboxDescriptorEnvironmentVarName[] =;
static const char kSandboxHelperPidEnvironmentVarName[] =;

static const int kSUIDSandboxApiNumber =;
static const char kSandboxEnvironmentApiRequest[] =;
static const char kSandboxEnvironmentApiProvides[] =;

// This number must be kept in sync with common/zygote_commands_linux.h
static const int kZygoteIdFd =;

// These are the magic byte values which the sandboxed process uses to request
// that it be chrooted.
static const char kMsgChrootMe =;
static const char kMsgChrootSuccessful =;

// These are set if we have respectively switched to a new PID or NET namespace
// by going through the setuid binary helper.
static const char kSandboxPIDNSEnvironmentVarName[] =;
static const char kSandboxNETNSEnvironmentVarName[] =;

#if defined(__cplusplus)
}  // namespace sandbox
#endif

#endif  // SANDBOX_LINUX_SUID_COMMON_SANDBOX_H_