diff options
author | jschuh@chromium.org <jschuh@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-10-11 18:22:04 +0000 |
---|---|---|
committer | jschuh@chromium.org <jschuh@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2011-10-11 18:22:04 +0000 |
commit | 7ebf38e02262bd845bce5bf45eae31f2f998877f (patch) | |
tree | a3c9aea09b9dd7acbe04426bd6f4aa4378a67972 /content/common/sandbox_policy.cc | |
parent | c1b8cfa0648f1b83ce5f19f1a59bac958628a313 (diff) | |
download | chromium_src-7ebf38e02262bd845bce5bf45eae31f2f998877f.zip chromium_src-7ebf38e02262bd845bce5bf45eae31f2f998877f.tar.gz chromium_src-7ebf38e02262bd845bce5bf45eae31f2f998877f.tar.bz2 |
SetIntegrity and SetDelayedIntegrity are flipped between GPU modes
BUG=99840
TEST=Verify GPU performance tests.
Review URL: http://codereview.chromium.org/8230017
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@104924 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'content/common/sandbox_policy.cc')
-rw-r--r-- | content/common/sandbox_policy.cc | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/content/common/sandbox_policy.cc b/content/common/sandbox_policy.cc index a591f4c..0e29af7 100644 --- a/content/common/sandbox_policy.cc +++ b/content/common/sandbox_policy.cc @@ -303,7 +303,7 @@ bool AddPolicyForGPU(CommandLine* cmd_line, sandbox::TargetPolicy* policy) { if (cmd_line->GetSwitchValueASCII(switches::kUseGL) == gfx::kGLImplementationDesktopName) { policy->SetJobLevel(sandbox::JOB_UNPROTECTED, 0); - policy->SetIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW); + policy->SetDelayedIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW); } else { // UI restrictions break when we access Windows from outside our job. // However, we don't want a proxy window in this process because it can @@ -316,7 +316,7 @@ bool AddPolicyForGPU(CommandLine* cmd_line, sandbox::TargetPolicy* policy) { JOB_OBJECT_UILIMIT_DESKTOP | JOB_OBJECT_UILIMIT_EXITWINDOWS | JOB_OBJECT_UILIMIT_DISPLAYSETTINGS); - policy->SetDelayedIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW); + policy->SetIntegrityLevel(sandbox::INTEGRITY_LEVEL_LOW); } } else { policy->SetJobLevel(sandbox::JOB_UNPROTECTED, 0); |