Add scoped_ptr-safe base::Value to Dictionary/List conversion functions.
[chromium-blink-merge.git] / sandbox / linux / syscall_broker / broker_common.h
blob25aafa7ed2ac7a1aa762df63f2b926030be7606a
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #ifndef SANDBOX_LINUX_SYSCALL_BROKER_BROKER_COMMON_H_
6 #define SANDBOX_LINUX_SYSCALL_BROKER_BROKER_COMMON_H_
8 #include <fcntl.h>
9 #include <stddef.h>
11 namespace sandbox {
13 namespace syscall_broker {
15 const size_t kMaxMessageLength = 4096;
17 // Some flags are local to the current process and cannot be sent over a Unix
18 // socket. They need special treatment from the client.
19 // O_CLOEXEC is tricky because in theory another thread could call execve()
20 // before special treatment is made on the client, so a client needs to call
21 // recvmsg(2) with MSG_CMSG_CLOEXEC.
22 // To make things worse, there are two CLOEXEC related flags, FD_CLOEXEC (see
23 // F_GETFD in fcntl(2)) and O_CLOEXEC (see F_GETFL in fcntl(2)). O_CLOEXEC
24 // doesn't affect the semantics on execve(), it's merely a note that the
25 // descriptor was originally opened with O_CLOEXEC as a flag. And it is sent
26 // over unix sockets just fine, so a receiver that would (incorrectly) look at
27 // O_CLOEXEC instead of FD_CLOEXEC may be tricked in thinking that the file
28 // descriptor will or won't be closed on execve().
29 const int kCurrentProcessOpenFlagsMask = O_CLOEXEC;
31 enum IPCCommand {
32 COMMAND_INVALID = 0,
33 COMMAND_OPEN,
34 COMMAND_ACCESS,
37 } // namespace syscall_broker
39 } // namespace sandbox
41 #endif // SANDBOX_LINUX_SYSCALL_BROKER_BROKER_COMMON_H_