Index: content/public/common/sandboxed_process_launcher_delegate.h |
diff --git a/content/public/common/sandboxed_process_launcher_delegate.h b/content/public/common/sandboxed_process_launcher_delegate.h |
index a3aa4e06426534344883bdab2be7fe60536a296d..fdf5f5825b4d9919eb3a4c68e3dc6cf32989ccb2 100644 |
--- a/content/public/common/sandboxed_process_launcher_delegate.h |
+++ b/content/public/common/sandboxed_process_launcher_delegate.h |
@@ -22,6 +22,13 @@ class TargetPolicy; |
namespace content { |
+#if defined(OS_LINUX) |
+class ZygoteCommunication; |
+using ZygoteHandle = ZygoteCommunication*; |
+#else |
+using ZygoteHandle = std::nullptr_t; |
Avi (use Gerrit)
2016/01/06 19:07:56
#include <cstddef>
Greg K
2016/01/06 22:24:21
Done.
|
+#endif |
+ |
// Allows a caller of StartSandboxedProcess or |
// BrowserChildProcessHost/ChildProcessLauncher to control the sandbox policy, |
// i.e. to loosen it if needed. |
@@ -51,8 +58,10 @@ class CONTENT_EXPORT SandboxedProcessLauncherDelegate { |
virtual void PostSpawnTarget(base::ProcessHandle process) {} |
#elif defined(OS_POSIX) |
+#if !defined(OS_MACOSX) && !defined(OS_ANDROID) |
// Override this to return true to use the setuid sandbox. |
- virtual bool ShouldUseZygote(); |
+ virtual ZygoteHandle* GetZygote(); |
+#endif // !defined(OS_MACOSX) && !defined(OS_ANDROID) |
// Override this if the process needs a non-empty environment map. |
virtual base::EnvironmentMap GetEnvironment(); |