// Copyright 2014 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #ifndef SANDBOX_LINUX_SERVICES_PROC_UTIL_H_ #define SANDBOX_LINUX_SERVICES_PROC_UTIL_H_ #include "base/files/scoped_file.h" #include "base/macros.h" #include "sandbox/sandbox_export.h" namespace sandbox { class SANDBOX_EXPORT ProcUtil { public: // Returns the number of file descriptors in the current process's FD // table, excluding |proc_fd|, which should be a file descriptor for // /proc/. static int CountOpenFds(int proc_fd); // Checks whether the current process has any directory file descriptor open. // Directory file descriptors are "capabilities" that would let a process use // system calls such as openat() to bypass restrictions such as // DropFileSystemAccess(). // Sometimes it's useful to call HasOpenDirectory() after file system access // has been dropped. In this case, |proc_fd| should be a file descriptor to // /proc/. The file descriptor in |proc_fd| will be ignored by // HasOpenDirectory() and remains owned by the caller. It is very important // for the caller to close it. static bool HasOpenDirectory(int proc_fd) WARN_UNUSED_RESULT; static bool HasOpenDirectory() WARN_UNUSED_RESULT; // Open /proc/ or crash if not possible. static base::ScopedFD OpenProc(); private: DISALLOW_IMPLICIT_CONSTRUCTORS(ProcUtil); }; } // namespace sandbox #endif // SANDBOX_LINUX_SERVICES_PROC_UTIL_H_