summaryrefslogtreecommitdiffstats
path: root/chrome/common/sandbox_init_wrapper.h
diff options
context:
space:
mode:
authorthakis@chromium.org <thakis@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-12-02 01:48:37 +0000
committerthakis@chromium.org <thakis@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2010-12-02 01:48:37 +0000
commit802a13a0b2fd257938dcd0c7b7ff4f79565331c9 (patch)
tree26ee9878b7003dc7039ed5e3deb8bf888b596283 /chrome/common/sandbox_init_wrapper.h
parent22de011a33feedc8ac0faea4f0b5aa11683c36ff (diff)
downloadchromium_src-802a13a0b2fd257938dcd0c7b7ff4f79565331c9.zip
chromium_src-802a13a0b2fd257938dcd0c7b7ff4f79565331c9.tar.gz
chromium_src-802a13a0b2fd257938dcd0c7b7ff4f79565331c9.tar.bz2
Mac: Scaffolding for sandboxing GPU process.
The sandbox config allows everything for now; I will put in restrictions in a follow-up CL (which should be small). This CL should have no visible effect (other than changing a few LOG(WARNING) to LOG(ERROR)). BUG=48607 TEST=GPU process still works Review URL: http://codereview.chromium.org/5491001 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@67939 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/common/sandbox_init_wrapper.h')
-rw-r--r--chrome/common/sandbox_init_wrapper.h5
1 files changed, 3 insertions, 2 deletions
diff --git a/chrome/common/sandbox_init_wrapper.h b/chrome/common/sandbox_init_wrapper.h
index 56716fc..3c70a7a 100644
--- a/chrome/common/sandbox_init_wrapper.h
+++ b/chrome/common/sandbox_init_wrapper.h
@@ -32,8 +32,9 @@ class SandboxInitWrapper {
sandbox::BrokerServices* BrokerServices() const { return broker_services_; }
sandbox::TargetServices* TargetServices() const { return target_services_; }
- // Initialize the sandbox for renderer and plug-in processes, depending on
- // the command line flags. The browser process is not sandboxed.
+ // Initialize the sandbox for renderer, gpu, utility, worker, nacl, and
+ // plug-in processes, depending on the command line flags. The browser
+ // process is not sandboxed.
// Returns true if the sandbox was initialized succesfully, false if an error
// occurred. If process_type isn't one that needs sandboxing true is always
// returned.