| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #ifndef SANDBOX_LINUX_SERVICES_SCOPED_PROCESS_H_ | 5 #ifndef SANDBOX_LINUX_SERVICES_SCOPED_PROCESS_H_ |
| 6 #define SANDBOX_LINUX_SERVICES_SCOPED_PROCESS_H_ | 6 #define SANDBOX_LINUX_SERVICES_SCOPED_PROCESS_H_ |
| 7 | 7 |
| 8 #include "base/basictypes.h" | |
| 9 #include "base/callback_forward.h" | 8 #include "base/callback_forward.h" |
| 9 #include "base/macros.h" |
| 10 #include "base/process/process_handle.h" | 10 #include "base/process/process_handle.h" |
| 11 #include "sandbox/sandbox_export.h" | 11 #include "sandbox/sandbox_export.h" |
| 12 | 12 |
| 13 namespace sandbox { | 13 namespace sandbox { |
| 14 | 14 |
| 15 // fork() a child process that will run a Closure. | 15 // fork() a child process that will run a Closure. |
| 16 // After the Closure has run, the child will pause forever. If this object | 16 // After the Closure has run, the child will pause forever. If this object |
| 17 // is detroyed, the child will be destroyed, even if the closure did not | 17 // is detroyed, the child will be destroyed, even if the closure did not |
| 18 // finish running. It's ok to signal the child from outside of this class to | 18 // finish running. It's ok to signal the child from outside of this class to |
| 19 // destroy it. | 19 // destroy it. |
| (...skipping 26 matching lines...) Expand all Loading... |
| 46 | 46 |
| 47 base::ProcessId child_process_id_; | 47 base::ProcessId child_process_id_; |
| 48 base::ProcessId process_id_; | 48 base::ProcessId process_id_; |
| 49 int pipe_fds_[2]; | 49 int pipe_fds_[2]; |
| 50 DISALLOW_COPY_AND_ASSIGN(ScopedProcess); | 50 DISALLOW_COPY_AND_ASSIGN(ScopedProcess); |
| 51 }; | 51 }; |
| 52 | 52 |
| 53 } // namespace sandbox | 53 } // namespace sandbox |
| 54 | 54 |
| 55 #endif // SANDBOX_LINUX_SERVICES_SCOPED_PROCESS_H_ | 55 #endif // SANDBOX_LINUX_SERVICES_SCOPED_PROCESS_H_ |
| OLD | NEW |