fune/security/sandbox/linux/SandboxChrootProto.h
Thinker Li e9554bb05d Bug 1470591 - Part 2: Provide methods to recreate a delegated forker. r=gsvelto
With a fork server, the parameters to fork a new content process are
passed through a socket.  This patch does following tasks to adapt
sandbox to work with a fork server,

 - passing a FD of a chroot server,
 - passing flags of SandboxFork, and
 - setting LaunchOptions and its fork_delegate field at a fork server.

Depends on D46878

Differential Revision: https://phabricator.services.mozilla.com/D46879

--HG--
extra : moz-landing-system : lando
2019-12-05 00:03:52 +00:00

24 lines
815 B
C++

/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this file,
* You can obtain one at http://mozilla.org/MPL/2.0/. */
#ifndef mozilla_SandboxChrootProto_h
#define mozilla_SandboxChrootProto_h
#include "mozilla/Types.h"
namespace mozilla {
static const int kSandboxChrootClientFd = 6;
#if defined(MOZ_ENABLE_FORKSERVER)
static const int kSandboxChrootServerFd = 10;
#endif
static const char kSandboxChrootRequest = 'C';
static const char kSandboxChrootResponse = 'O';
static const char kSandboxChrootEnvFlag[] = "MOZ_SANDBOX_USE_CHROOT";
} // namespace mozilla
#endif // mozilla_SandboxChrootProto_h