Index: content/public/common/sandbox_init.h |
diff --git a/content/public/common/sandbox_init.h b/content/public/common/sandbox_init.h |
index 88c6d83991315dd44a11a0fbde722557978f068e..a7511f963754141a05e1b13c29e8d7199609be02 100644 |
--- a/content/public/common/sandbox_init.h |
+++ b/content/public/common/sandbox_init.h |
@@ -6,6 +6,7 @@ |
#define CONTENT_PUBLIC_COMMON_SANDBOX_INIT_H_ |
#pragma once |
+#include "base/process.h" |
#include "build/build_config.h" |
#include "content/common/content_export.h" |
@@ -20,6 +21,7 @@ class FilePath; |
namespace content { |
#if defined(OS_WIN) |
+ |
// Initialize the sandbox for renderer, gpu, utility, worker, nacl, and plug-in |
// processes, depending on the command line flags. Although The browser process |
// is not sandboxed, this also needs to be called because it will initialize |
@@ -29,7 +31,15 @@ namespace content { |
// returned. |
CONTENT_EXPORT bool InitializeSandbox( |
sandbox::SandboxInterfaceInfo* sandbox_info); |
+ |
+CONTENT_EXPORT bool BrokerDuplicateHandle(HANDLE source_handle, |
jschuh
2012/04/14 19:59:53
I hate to nit, but does sandbox_init.h really make
|
+ DWORD target_process_id, |
+ HANDLE* target_handle, |
+ DWORD desired_access, |
+ DWORD options); |
+ |
#elif defined(OS_MACOSX) |
+ |
// Initialize the sandbox of the given |sandbox_type|, optionally specifying a |
// directory to allow access to. Note specifying a directory needs to be |
// supported by the sandbox profile associated with the given |sandbox_type|. |
@@ -46,6 +56,7 @@ CONTENT_EXPORT bool InitializeSandbox( |
// taken and true is always returned. |
CONTENT_EXPORT bool InitializeSandbox(int sandbox_type, |
const FilePath& allowed_path); |
+ |
#endif |
} // namespace content |