Chromium Code Reviews| Index: content/browser/utility_process_host_impl.h |
| diff --git a/content/browser/utility_process_host_impl.h b/content/browser/utility_process_host_impl.h |
| index 039e20f8c509c7487985535af442eada990adc05..fb6d6ea6707021320546ce4879b4691b3a1a72bf 100644 |
| --- a/content/browser/utility_process_host_impl.h |
| +++ b/content/browser/utility_process_host_impl.h |
| @@ -40,6 +40,9 @@ class CONTENT_EXPORT UtilityProcessHostImpl |
| virtual void SetExposedDir(const base::FilePath& dir) OVERRIDE; |
| virtual void EnableMDns() OVERRIDE; |
| virtual void DisableSandbox() OVERRIDE; |
| +#if defined(OS_WIN) |
| + virtual void ElevatePrivileges() OVERRIDE; |
| +#endif |
| virtual void EnableZygote() OVERRIDE; |
| virtual const ChildProcessData& GetData() OVERRIDE; |
| #if defined(OS_POSIX) |
| @@ -72,6 +75,11 @@ class CONTENT_EXPORT UtilityProcessHostImpl |
| // Whether to pass switches::kNoSandbox to the child. |
| bool no_sandbox_; |
| +#if defined(OS_WIN) |
| + // Whether to launche the process with elevated permissions. |
|
mef
2013/12/18 21:02:10
nit: launche
Drew Haven
2014/01/09 01:15:14
Done.
|
| + bool run_elevated_; |
| +#endif |
| + |
| // Flags defined in ChildProcessHost with which to start the process. |
| int child_flags_; |