/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
namespace sandbox { class BrokerServices; class TargetServices;
} // namespace sandbox
// Things that use this file will probably want access to the IsSandboxedProcess // function defined in one of the Chromium sandbox cc files. extern"C"bool IsSandboxedProcess();
namespace mozilla { // Note the Chromium code just uses a bare sandbox namespace, which makes using // sandbox for our namespace painful. namespace sandboxing {
/** * Initializes (if required) and returns the Chromium sandbox TargetServices. * * @return the TargetServices or null if the creation or initialization failed.
*/
sandbox::TargetServices* GetInitializedTargetServices();
/** * Lowers the permissions on the process sandbox. * Provided because the GMP sandbox needs to be lowered from the executable.
*/ void LowerSandbox();
/** * Initializes (if required) and returns the Chromium sandbox BrokerServices. * * @return the BrokerServices or null if the creation or initialization failed.
*/
sandbox::BrokerServices* GetInitializedBrokerServices();
/** * Apply mitigations for parent processes.
*/ void ApplyParentProcessMitigations();
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung und die Messung sind noch experimentell.