blob: 1d49c0d89947c9df5d3b7138862c2eef9d2bec76 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
#ifndef mozilla_sandboxing_SandboxInitialization_h
#define mozilla_sandboxing_SandboxInitialization_h
namespace sandbox {
class BrokerServices;
class TargetServices;
} // namespace sandbox
// Things that use this file will probably want access to the IsSandboxedProcess
// function defined in one of the Chromium sandbox cc files.
extern "C" bool IsSandboxedProcess();
namespace mozilla {
// Note the Chromium code just uses a bare sandbox namespace, which makes using
// sandbox for our namespace painful.
namespace sandboxing {
/**
* Initializes (if required) and returns the Chromium sandbox TargetServices.
*
* @return the TargetServices or null if the creation or initialization failed.
*/
sandbox::TargetServices* GetInitializedTargetServices();
/**
* Lowers the permissions on the process sandbox.
* Provided because the GMP sandbox needs to be lowered from the executable.
*/
void LowerSandbox();
/**
* Initializes (if required) and returns the Chromium sandbox BrokerServices.
*
* @return the BrokerServices or null if the creation or initialization failed.
*/
sandbox::BrokerServices* GetInitializedBrokerServices();
/**
* Apply mitigations for parent processes.
*/
void ApplyParentProcessMitigations();
} // namespace sandboxing
} // namespace mozilla
#endif // mozilla_sandboxing_SandboxInitialization_h
|