blob: c71837a0ca78caeb15e30ed36bd8acd685a02413 [file] [log] [blame]
;;
;; Copyright (c) 2011 The Chromium Authors. All rights reserved.
;; Use of this source code is governed by a BSD-style license that can be
;; found in the LICENSE file.
;;
; This is the Sandbox configuration file used for safeguarding the utility
; process which is used for performing sandboxed operations that need to touch
; the filesystem like decoding theme images and unpacking extensions.
;
; This configuration locks everything down, except access to one configurable
; directory. This is different from other sandbox configuration files where
; file system access is entireley restricted.
; *** The contents of common.sb are implicitly included here. ***
; No additional resource access needed.
; This is available in 10.15+, and rolled out as a Finch experiment.
(if (param-true? filter-syscalls-debug)
(when (defined? 'syscall-unix)
(deny syscall-unix (with send-signal SIGSYS))
(allow syscall-unix
(syscall-number SYS_psynch_cvwait)
(syscall-number SYS_sendto)
(syscall-number SYS_socketpair)
)))