diff options
author | thakis@chromium.org <thakis@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-12-02 01:48:37 +0000 |
---|---|---|
committer | thakis@chromium.org <thakis@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2010-12-02 01:48:37 +0000 |
commit | 802a13a0b2fd257938dcd0c7b7ff4f79565331c9 (patch) | |
tree | 26ee9878b7003dc7039ed5e3deb8bf888b596283 /chrome/common/sandbox_init_wrapper.h | |
parent | 22de011a33feedc8ac0faea4f0b5aa11683c36ff (diff) | |
download | chromium_src-802a13a0b2fd257938dcd0c7b7ff4f79565331c9.zip chromium_src-802a13a0b2fd257938dcd0c7b7ff4f79565331c9.tar.gz chromium_src-802a13a0b2fd257938dcd0c7b7ff4f79565331c9.tar.bz2 |
Mac: Scaffolding for sandboxing GPU process.
The sandbox config allows everything for now; I will put in restrictions in a follow-up CL (which should be small).
This CL should have no visible effect (other than changing a few LOG(WARNING) to LOG(ERROR)).
BUG=48607
TEST=GPU process still works
Review URL: http://codereview.chromium.org/5491001
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@67939 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/common/sandbox_init_wrapper.h')
-rw-r--r-- | chrome/common/sandbox_init_wrapper.h | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/chrome/common/sandbox_init_wrapper.h b/chrome/common/sandbox_init_wrapper.h index 56716fc..3c70a7a 100644 --- a/chrome/common/sandbox_init_wrapper.h +++ b/chrome/common/sandbox_init_wrapper.h @@ -32,8 +32,9 @@ class SandboxInitWrapper { sandbox::BrokerServices* BrokerServices() const { return broker_services_; } sandbox::TargetServices* TargetServices() const { return target_services_; } - // Initialize the sandbox for renderer and plug-in processes, depending on - // the command line flags. The browser process is not sandboxed. + // Initialize the sandbox for renderer, gpu, utility, worker, nacl, and + // plug-in processes, depending on the command line flags. The browser + // process is not sandboxed. // Returns true if the sandbox was initialized succesfully, false if an error // occurred. If process_type isn't one that needs sandboxing true is always // returned. |