summaryrefslogtreecommitdiffstats
path: root/chrome/browser/chrome_content_browser_client.cc
diff options
context:
space:
mode:
authorcreis@chromium.org <creis@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-12-03 22:09:03 +0000
committercreis@chromium.org <creis@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2012-12-03 22:09:03 +0000
commitc8ce6c67a40398862de5f80b48b9b34fb579da7b (patch)
tree713268a4d288baea67427231ed0ad8ddf6023a14 /chrome/browser/chrome_content_browser_client.cc
parent1be078651308e7de8e5fb7a23dfcc21596cc5051 (diff)
downloadchromium_src-c8ce6c67a40398862de5f80b48b9b34fb579da7b.zip
chromium_src-c8ce6c67a40398862de5f80b48b9b34fb579da7b.tar.gz
chromium_src-c8ce6c67a40398862de5f80b48b9b34fb579da7b.tar.bz2
Experimental: Fix HasWrongProcessForURL in --site-per-process mode.
The experimental --site-per-process and --enable-strict-site-isolation modes disable reuse of renderer processes to improve security. The previous approach of making IsSuitableHost return false was breaking HasWrongProcessForURL, so we now return false in ShouldTryToReuseExistingProcessHost instead. BUG=160671 TEST=none Review URL: https://chromiumcodereview.appspot.com/11421179 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@170821 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/browser/chrome_content_browser_client.cc')
-rw-r--r--chrome/browser/chrome_content_browser_client.cc12
1 files changed, 0 insertions, 12 deletions
diff --git a/chrome/browser/chrome_content_browser_client.cc b/chrome/browser/chrome_content_browser_client.cc
index 223739f..2c9ea56 100644
--- a/chrome/browser/chrome_content_browser_client.cc
+++ b/chrome/browser/chrome_content_browser_client.cc
@@ -717,18 +717,6 @@ bool ChromeContentBrowserClient::IsSuitableHost(
if (!service || !process_map)
return true;
- // Experimental:
- // If --enable-strict-site-isolation or --site-per-process is enabled, do not
- // allow non-WebUI pages to share a renderer process. (We could allow pages
- // from the same site or extensions of the same type to share, if we knew what
- // the given process was dedicated to. Allowing no sharing is simpler for
- // now.) This may cause resource exhaustion issues if too many sites are open
- // at once.
- const CommandLine& command_line = *CommandLine::ForCurrentProcess();
- if (command_line.HasSwitch(switches::kEnableStrictSiteIsolation) ||
- command_line.HasSwitch(switches::kSitePerProcess))
- return false;
-
// Otherwise, just make sure the process privilege matches the privilege
// required by the site.
RenderProcessHostPrivilege privilege_required =