28 #if defined(HAVE_SECCOMP_H) && defined(__linux__) 29 #define USE_LIBSECCOMP 32 struct sandbox_cfg_elem;
42 #include <sys/ucontext.h> 61 typedef struct smp_param {
80 struct sandbox_cfg_elem {
88 struct sandbox_cfg_elem *next;
92 typedef int (*sandbox_filter_func_t)(scmp_filter_ctx ctx,
98 sandbox_filter_func_t *filter_func;
106 #ifdef USE_LIBSECCOMP 108 int sandbox_add_addrinfo(
const char *addr);
113 const struct addrinfo *hints,
114 struct addrinfo **res);
115 void sandbox_freeaddrinfo(
struct addrinfo *addrinfo);
116 void sandbox_free_getaddrinfo_cache(
void);
118 #define sandbox_getaddrinfo(name, servname, hints, res) \ 119 getaddrinfo((name),(servname), (hints),(res)) 120 #define sandbox_add_addrinfo(name) \ 122 #define sandbox_freeaddrinfo(addrinfo) \ 123 freeaddrinfo((addrinfo)) 124 #define sandbox_free_getaddrinfo_cache() 127 #ifdef USE_LIBSECCOMP 131 const char* sandbox_intern_string(
const char *param);
133 #define sandbox_intern_string(s) (s) 146 int sandbox_cfg_allow_chmod_filename(
sandbox_cfg_t **cfg,
char *file);
147 int sandbox_cfg_allow_chown_filename(
sandbox_cfg_t **cfg,
char *file);
150 int sandbox_cfg_allow_rename(
sandbox_cfg_t **cfg,
char *file1,
char *file2);
171 void sandbox_disable_getaddrinfo_cache(
void);
struct sandbox_cfg_elem sandbox_cfg_t
Definition: sandbox.h:35
int sandbox_is_active(void)
Definition: sandbox.c:1967
int sandbox_cfg_allow_stat_filename(sandbox_cfg_t **cfg, char *file)
Definition: sandbox.c:1939
int sandbox_init(sandbox_cfg_t *cfg)
Definition: sandbox.c:1901
int sandbox_cfg_allow_open_filename(sandbox_cfg_t **cfg, char *file)
Definition: sandbox.c:1925
Header file to define uint32_t and friends.
int sandbox_cfg_allow_openat_filename(sandbox_cfg_t **cfg, char *file)
Definition: sandbox.c:1932
#define sandbox_getaddrinfo(name, servname, hints, res)
Definition: sandbox.h:118
sandbox_cfg_t * sandbox_cfg_new(void)
Definition: sandbox.c:1895