diff options
author | jam@chromium.org <jam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2013-03-20 00:30:18 +0000 |
---|---|---|
committer | jam@chromium.org <jam@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2013-03-20 00:30:18 +0000 |
commit | 34f4868ad60ff1f8aa0374aee947cec4960d4670 (patch) | |
tree | 3ed90336e8c85d9548a2e479c47477192d54dd1b /chrome_frame | |
parent | 13ee68abf3ddb40c7a9eaa54ef6afbc21cdc37ff (diff) | |
download | chromium_src-34f4868ad60ff1f8aa0374aee947cec4960d4670.zip chromium_src-34f4868ad60ff1f8aa0374aee947cec4960d4670.tar.gz chromium_src-34f4868ad60ff1f8aa0374aee947cec4960d4670.tar.bz2 |
Refactor sandbox_policy.cc so that it doesn't contain the sandbox policies for all processes. Instead have whoever creates a sandboxed process set this data. This allows us to clean a few NaCl related changes in content:
-remove NaCl sandbox rules from content
-remove the hack for ifdef'ing out the GPU policy since it didn't link for nacl64.exe
-remove the 1GB memory reservation for the NaCl loader process out of content
Other cleanup:
-renamed sandbox_policy.* to sandbox_win.* to match the other platform-specific sandbox files
-moved BrokerGetFileHandleForProcess to internal content files since it's not called from outside
-remove AddGpuDllEvictionPolicy since it was redundant (the one dll it removed was already listed in the generic list)
There's still more cleanup to be done in the sandbox code (i.e. remove chrome frame switch, nacl process type switch etc). I will do that in future changes.
BUG=191682
Review URL: https://codereview.chromium.org/12805004
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@189175 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome_frame')
-rw-r--r-- | chrome_frame/test/net/fake_external_tab.cc | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/chrome_frame/test/net/fake_external_tab.cc b/chrome_frame/test/net/fake_external_tab.cc index 97adf3f..464f0a0 100644 --- a/chrome_frame/test/net/fake_external_tab.cc +++ b/chrome_frame/test/net/fake_external_tab.cc @@ -967,8 +967,7 @@ int main(int argc, char** argv) { watchdog.AddObserver(&credentials, "Windows Security", ""); sandbox::SandboxInterfaceInfo sandbox_info = {0}; - // This would normally be done, but is probably not needed for these tests. - // content::InitializeSandboxInfo(&sandbox_info); + content::InitializeSandboxInfo(&sandbox_info); FakeMainDelegate delegate; content::ContentMain( reinterpret_cast<HINSTANCE>(GetModuleHandle(NULL)), |