diff options
author | aberent@chromium.org <aberent@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-03-13 11:35:15 +0000 |
---|---|---|
committer | aberent@chromium.org <aberent@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98> | 2014-03-13 11:35:15 +0000 |
commit | 121e6138b0b543c38ec66cf0033af96dc75b49a0 (patch) | |
tree | d0a17305b9fb96bf52cef7b87feae4737cc02e97 /content/common/sandbox_win.cc | |
parent | 33fcc33ec9ef57d98a20911a6cd6f64f91a5d375 (diff) | |
download | chromium_src-121e6138b0b543c38ec66cf0033af96dc75b49a0.zip chromium_src-121e6138b0b543c38ec66cf0033af96dc75b49a0.tar.gz chromium_src-121e6138b0b543c38ec66cf0033af96dc75b49a0.tar.bz2 |
Refactor configuration of sandboxes - first steps
See
https://docs.google.com/document/d/1H-hCsIcMsAEP0fWHimbuiNA-Hc9eXEmR94eb-2RQAhA/edit?usp=sharing
for background.
This moves all process type dependent decisions on how to create
Linux processes (not how to sandbox them once created, not Android)
into the launch delegates and makes the arguments to the
ChildProcessLauncher constructor and
BrowserChildProcessHostImpl::Launch OS independent.
BUG=none
Review URL: https://codereview.chromium.org/177863002
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@256802 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'content/common/sandbox_win.cc')
-rw-r--r-- | content/common/sandbox_win.cc | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/content/common/sandbox_win.cc b/content/common/sandbox_win.cc index 6be38a2..a73296c 100644 --- a/content/common/sandbox_win.cc +++ b/content/common/sandbox_win.cc @@ -576,7 +576,7 @@ base::ProcessHandle StartSandboxedProcess( bool in_sandbox = true; if (delegate) - delegate->ShouldSandbox(&in_sandbox); + in_sandbox = delegate->ShouldSandbox(); if (browser_command_line.HasSwitch(switches::kNoSandbox) || cmd_line->HasSwitch(switches::kNoSandbox)) { |