Index: content/public/common/sandboxed_process_launcher_delegate.h |
diff --git a/content/public/common/sandboxed_process_launcher_delegate.h b/content/public/common/sandboxed_process_launcher_delegate.h |
index 39e2cc88d263dd3fc7e3ce2930190cc3de4bcd4c..b7ec5555a0e0ab3547178a48b816d6197b9fef11 100644 |
--- a/content/public/common/sandboxed_process_launcher_delegate.h |
+++ b/content/public/common/sandboxed_process_launcher_delegate.h |
@@ -21,6 +21,13 @@ class TargetPolicy; |
namespace content { |
+#if defined(OS_LINUX) |
+class ZygoteCommunication; |
+using ZygoteHandle = ZygoteCommunication*; |
+#else |
+struct ZygoteHandle {}; |
+#endif |
+ |
// Allows a caller of StartSandboxedProcess or |
// BrowserChildProcessHost/ChildProcessLauncher to control the sandbox policy, |
// i.e. to loosen it if needed. |
@@ -51,7 +58,7 @@ class CONTENT_EXPORT SandboxedProcessLauncherDelegate { |
#elif defined(OS_POSIX) |
// Override this to return true to use the setuid sandbox. |
- virtual bool ShouldUseZygote(); |
+ virtual ZygoteHandle* GetZygote(); |
// Override this if the process needs a non-empty environment map. |
virtual base::EnvironmentMap GetEnvironment(); |