Chromium Embedded Framework (CEF)
130.1.2+g48f3ef6+chromium-130.0.6723.44
|
The sandbox is used to restrict sub-processes (renderer, GPU, etc) from directly accessing system resources. More...
Classes | |
class | CefScopedSandboxContext |
Scoped helper for managing the life span of a sandbox context handle. More... | |
Functions | |
CEF_EXPORT void * | cef_sandbox_initialize (int argc, char **argv) |
Initialize the sandbox for this process. More... | |
CEF_EXPORT void | cef_sandbox_destroy (void *sandbox_context) |
Destroy the specified sandbox context handle. More... | |
The sandbox is used to restrict sub-processes (renderer, GPU, etc) from directly accessing system resources.
This helps to protect the user from untrusted and potentially malicious Web content. See http://www.chromium.org/developers/design-documents/sandbox for complete details.
To enable the sandbox on macOS the following requirements must be met:
CEF_EXPORT void cef_sandbox_destroy | ( | void * | sandbox_context | ) |
Destroy the specified sandbox context handle.
CEF_EXPORT void* cef_sandbox_initialize | ( | int | argc, |
char ** | argv | ||
) |
Initialize the sandbox for this process.
Returns the sandbox context handle on success or NULL on failure. The returned handle should be passed to cef_sandbox_destroy() immediately before process termination.