author | Jed Davis <jld@mozilla.com> |
Sun, 31 Aug 2014 23:23:00 +0200 | |
changeset 203214 | f75925c6b161ec1b51890caacc970aa543affe55 |
parent 203213 | 8cc63a38bfc7506e6dcaf678cdbf47f5363d2034 |
child 203215 | 296fe203e6fd0835f02b6aa2037eaa490e1424ed |
push id | 48611 |
push user | cbook@mozilla.com |
push date | Wed, 03 Sep 2014 08:45:15 +0000 |
treeherder | mozilla-inbound@f7f7e8683a87 [default view] [failures only] |
perfherder | [talos] [build metrics] [platform microbench] (compared to previous push) |
reviewers | glandium |
bugs | 1061085, 1041886 |
milestone | 35.0a1 |
first release with | nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
|
last release without | nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
|
--- a/security/sandbox/linux/Sandbox.h +++ b/security/sandbox/linux/Sandbox.h @@ -16,20 +16,20 @@ namespace mozilla { // attempted, any failure to enable it is fatal. // // If sandboxing is disabled for a process type with the corresponding // environment variable, Set*Sandbox() does nothing and CanSandbox*() // returns true. #ifdef MOZ_CONTENT_SANDBOX // Disabled by setting env var MOZ_DISABLE_CONTENT_SANDBOX. -MFBT_API bool CanSandboxContentProcess(); -MFBT_API void SetContentProcessSandbox(); +MOZ_EXPORT bool CanSandboxContentProcess(); +MOZ_EXPORT void SetContentProcessSandbox(); #endif #ifdef MOZ_GMP_SANDBOX // Disabled by setting env var MOZ_DISABLE_GMP_SANDBOX. -MFBT_API bool CanSandboxMediaPlugin(); -MFBT_API void SetMediaPluginSandbox(const char *aFilePath); +MOZ_EXPORT bool CanSandboxMediaPlugin(); +MOZ_EXPORT void SetMediaPluginSandbox(const char *aFilePath); #endif } // namespace mozilla #endif // mozilla_Sandbox_h