Bug 1061085 - Clean up misused export macros from bug 1041886. r=glandium
authorJed Davis <jld@mozilla.com>
Sun, 31 Aug 2014 23:23:00 +0200
changeset 203214 f75925c6b161ec1b51890caacc970aa543affe55
parent 203213 8cc63a38bfc7506e6dcaf678cdbf47f5363d2034
child 203215 296fe203e6fd0835f02b6aa2037eaa490e1424ed
push id48611
push usercbook@mozilla.com
push dateWed, 03 Sep 2014 08:45:15 +0000
treeherdermozilla-inbound@f7f7e8683a87 [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewersglandium
bugs1061085, 1041886
milestone35.0a1
first release with
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
last release without
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
Bug 1061085 - Clean up misused export macros from bug 1041886. r=glandium
security/sandbox/linux/Sandbox.h
--- a/security/sandbox/linux/Sandbox.h
+++ b/security/sandbox/linux/Sandbox.h
@@ -16,20 +16,20 @@ namespace mozilla {
 // attempted, any failure to enable it is fatal.
 //
 // If sandboxing is disabled for a process type with the corresponding
 // environment variable, Set*Sandbox() does nothing and CanSandbox*()
 // returns true.
 
 #ifdef MOZ_CONTENT_SANDBOX
 // Disabled by setting env var MOZ_DISABLE_CONTENT_SANDBOX.
-MFBT_API bool CanSandboxContentProcess();
-MFBT_API void SetContentProcessSandbox();
+MOZ_EXPORT bool CanSandboxContentProcess();
+MOZ_EXPORT void SetContentProcessSandbox();
 #endif
 #ifdef MOZ_GMP_SANDBOX
 // Disabled by setting env var MOZ_DISABLE_GMP_SANDBOX.
-MFBT_API bool CanSandboxMediaPlugin();
-MFBT_API void SetMediaPluginSandbox(const char *aFilePath);
+MOZ_EXPORT bool CanSandboxMediaPlugin();
+MOZ_EXPORT void SetMediaPluginSandbox(const char *aFilePath);
 #endif
 
 } // namespace mozilla
 
 #endif // mozilla_Sandbox_h