summaryrefslogtreecommitdiffstats
path: root/security/sandbox/win/SandboxInitialization.h
blob: 1d49c0d89947c9df5d3b7138862c2eef9d2bec76 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */

#ifndef mozilla_sandboxing_SandboxInitialization_h
#define mozilla_sandboxing_SandboxInitialization_h

namespace sandbox {
class BrokerServices;
class TargetServices;
}  // namespace sandbox

// Things that use this file will probably want access to the IsSandboxedProcess
// function defined in one of the Chromium sandbox cc files.
extern "C" bool IsSandboxedProcess();

namespace mozilla {
// Note the Chromium code just uses a bare sandbox namespace, which makes using
// sandbox for our namespace painful.
namespace sandboxing {

/**
 * Initializes (if required) and returns the Chromium sandbox TargetServices.
 *
 * @return the TargetServices or null if the creation or initialization failed.
 */
sandbox::TargetServices* GetInitializedTargetServices();

/**
 * Lowers the permissions on the process sandbox.
 * Provided because the GMP sandbox needs to be lowered from the executable.
 */
void LowerSandbox();

/**
 * Initializes (if required) and returns the Chromium sandbox BrokerServices.
 *
 * @return the BrokerServices or null if the creation or initialization failed.
 */
sandbox::BrokerServices* GetInitializedBrokerServices();

/**
 * Apply mitigations for parent processes.
 */
void ApplyParentProcessMitigations();

}  // namespace sandboxing
}  // namespace mozilla

#endif  // mozilla_sandboxing_SandboxInitialization_h