summaryrefslogtreecommitdiffstats
path: root/content/common/sandbox_policy.cc
diff options
context:
space:
mode:
authorjschuh@chromium.org <jschuh@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-10-11 18:22:04 +0000
committerjschuh@chromium.org <jschuh@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2011-10-11 18:22:04 +0000
commit7ebf38e02262bd845bce5bf45eae31f2f998877f (patch)
treea3c9aea09b9dd7acbe04426bd6f4aa4378a67972 /content/common/sandbox_policy.cc
parentc1b8cfa0648f1b83ce5f19f1a59bac958628a313 (diff)
downloadchromium_src-7ebf38e02262bd845bce5bf45eae31f2f998877f.zip
chromium_src-7ebf38e02262bd845bce5bf45eae31f2f998877f.tar.gz
chromium_src-7ebf38e02262bd845bce5bf45eae31f2f998877f.tar.bz2
SetIntegrity and SetDelayedIntegrity are flipped between GPU modes
BUG=99840 TEST=Verify GPU performance tests. Review URL: http://codereview.chromium.org/8230017 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@104924 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'content/common/sandbox_policy.cc')
-rw-r--r--content/common/sandbox_policy.cc4
1 files changed, 2 insertions, 2 deletions
diff --git a/content/common/sandbox_policy.cc b/content/common/sandbox_policy.cc
index a591f4c..0e29af7 100644
--- a/content/common/sandbox_policy.cc
+++ b/content/common/sandbox_policy.cc
@@ -303,7 +303,7 @@ bool AddPolicyForGPU(CommandLine* cmd_line, sandbox::TargetPolicy* policy) {
if (cmd_line->GetSwitchValueASCII(switches::kUseGL) ==
gfx::kGLImplementationDesktopName) {
policy->SetJobLevel(sandbox::JOB_UNPROTECTED, 0);
- policy->SetIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW);
+ policy->SetDelayedIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW);
} else {
// UI restrictions break when we access Windows from outside our job.
// However, we don't want a proxy window in this process because it can
@@ -316,7 +316,7 @@ bool AddPolicyForGPU(CommandLine* cmd_line, sandbox::TargetPolicy* policy) {
JOB_OBJECT_UILIMIT_DESKTOP |
JOB_OBJECT_UILIMIT_EXITWINDOWS |
JOB_OBJECT_UILIMIT_DISPLAYSETTINGS);
- policy->SetDelayedIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW);
+ policy->SetIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW);
}
} else {
policy->SetJobLevel(sandbox::JOB_UNPROTECTED, 0);