blob: 795c550fecd03f5ea52d71e9d32609d226d891a6 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
|
// SPDX-License-Identifier: 0BSD
///////////////////////////////////////////////////////////////////////////////
//
/// \file sandbox.h
/// \brief Sandbox support
//
// Author: Lasse Collin
//
///////////////////////////////////////////////////////////////////////////////
#if defined(HAVE_PLEDGE) || defined(HAVE_LINUX_LANDLOCK_H) \
|| defined(HAVE_CAP_RIGHTS_LIMIT)
# define ENABLE_SANDBOX 1
#endif
/// \brief Enables early sandboxing that can always be enabled
///
/// This requires that tuklib_progname() and io_init() have been called.
extern void sandbox_init(void);
/// \brief Tell sandboxing code that strict sandboxing can be used
///
/// This function only sets a flag which will be read by
/// sandbox_enable_strict_if_allowed().
extern void sandbox_allow_strict(void);
/// \brief Enable sandboxing that allows reading from one file
///
/// This does nothing if sandbox_allow_strict() hasn't been called.
///
/// \param src_fd File descriptor open for reading
/// \param pipe_event_fd user_abort_pipe[0] from file_io.c
/// \param pipe_write_fd user_abort_pipe[1] from file_io.c
extern void sandbox_enable_strict_if_allowed(
int src_fd, int pipe_event_fd, int pipe_write_fd);
|