| Index: content/common/sandbox_win.h
|
| diff --git a/content/common/sandbox_win.h b/content/common/sandbox_win.h
|
| index f2800fd5d2804503a237ffbacbfb6e83ea3a43da..c3afea96824fd45811e80ed1ae5252ba4eae92af 100644
|
| --- a/content/common/sandbox_win.h
|
| +++ b/content/common/sandbox_win.h
|
| @@ -7,40 +7,17 @@
|
|
|
| #include <stdint.h>
|
|
|
| -#include "content/common/content_export.h"
|
| -#include "sandbox/win/src/security_level.h"
|
| -
|
| -namespace base {
|
| -class CommandLine;
|
| -}
|
| +#include <windows.h>
|
|
|
| -namespace sandbox {
|
| -class BrokerServices;
|
| -class TargetPolicy;
|
| -class TargetServices;
|
| -}
|
| +#include "content/common/content_export.h"
|
|
|
| namespace content {
|
|
|
| -// Wrapper around sandbox::TargetPolicy::SetJobLevel that checks if the sandbox
|
| -// should be let to run without a job object assigned.
|
| -void SetJobLevel(const base::CommandLine& cmd_line,
|
| - sandbox::JobLevel job_level,
|
| - uint32_t ui_exceptions,
|
| - sandbox::TargetPolicy* policy);
|
| -
|
| -// Closes handles that are opened at process creation and initialization.
|
| -void AddBaseHandleClosePolicy(sandbox::TargetPolicy* policy);
|
| -
|
| -// Add AppContainer policy for |sid| on supported OS.
|
| -void AddAppContainerPolicy(sandbox::TargetPolicy* policy, const wchar_t* sid);
|
| -
|
| -// Add the win32k lockdown policy on supported OS.
|
| -bool AddWin32kLockdownPolicy(sandbox::TargetPolicy* policy);
|
| -
|
| -bool InitBrokerServices(sandbox::BrokerServices* broker_services);
|
| -
|
| -bool InitTargetServices(sandbox::TargetServices* target_services);
|
| +bool BrokerDuplicateHandle(HANDLE source_handle,
|
| + DWORD target_process_id,
|
| + HANDLE* target_handle,
|
| + DWORD desired_access,
|
| + DWORD options);
|
|
|
| } // namespace content
|
|
|
|
|