author Jed Davis <>
Mon, 20 Nov 2017 10:47:54 -0700
changeset 447508 3b11a0bf7ae7a7fe0ed508583cf07441b68bab78
parent 151964 f55906cadf07a9ef44cc4ce2574fe35f3dc85672
permissions -rw-r--r--
Bug 1409895 - Deny getcwd in the Linux content process sandbox. r=gcp getcwd won't do anything useful once we start chroot()ing to remove filesystem access; with this patch it will at least fail the same way regardless of whether user namespaces are available or if other factors prevent complete FS isolation. Bonus fix: improve the comments for this group of syscalls. MozReview-Commit-ID: KueZzly2mlO

/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
/* This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at */

/* Memory reporting infrastructure. */

#ifndef mozilla_MemoryReporting_h
#define mozilla_MemoryReporting_h

#include <stddef.h>

#ifdef __cplusplus

namespace mozilla {

 * This is for functions that are like malloc_usable_size.  Such functions are
 * used for measuring the size of data structures.
typedef size_t (*MallocSizeOf)(const void* p);

} /* namespace mozilla */

#endif /* __cplusplus */

typedef size_t (*MozMallocSizeOf)(const void* p);

#endif /* mozilla_MemoryReporting_h */