Index: content/browser/child_process_security_policy_impl.cc |
diff --git a/content/browser/child_process_security_policy_impl.cc b/content/browser/child_process_security_policy_impl.cc |
index 91a74935c53185aa4e7db44c77cd41e9142f0e13..dbda8685d807275b0925a17d650978e6d4fafe8a 100644 |
--- a/content/browser/child_process_security_policy_impl.cc |
+++ b/content/browser/child_process_security_policy_impl.cc |
@@ -38,6 +38,7 @@ const int kReadFilePermissions = |
const int kWriteFilePermissions = |
base::PLATFORM_FILE_OPEN | |
base::PLATFORM_FILE_WRITE | |
+ base::PLATFORM_FILE_APPEND | |
base::PLATFORM_FILE_EXCLUSIVE_WRITE | |
base::PLATFORM_FILE_ASYNC | |
base::PLATFORM_FILE_WRITE_ATTRIBUTES; |
@@ -50,7 +51,7 @@ const int kEnumerateDirectoryPermissions = |
base::PLATFORM_FILE_ENUMERATE; |
// TODO(tommycli): These flag sets need some work to make more obvious. |
-// Why for instance, does Create|Write != Create|Write? http://crbug.com/263150 |
+// Why for instance, does Create|Write != CreateWrite? http://crbug.com/263150 |
const int kCreateReadWriteFilePermissions = |
kReadFilePermissions | |
kWriteFilePermissions | |