OLD | NEW |
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/common/sandbox_policy.h" | 5 #include "chrome/common/sandbox_policy.h" |
6 | 6 |
7 #include <string> | 7 #include <string> |
8 | 8 |
9 #include "app/win_util.h" | 9 #include "app/win_util.h" |
10 #include "base/command_line.h" | 10 #include "base/command_line.h" |
(...skipping 457 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
468 } else if (type_str == switches::kWorkerProcess) { | 468 } else if (type_str == switches::kWorkerProcess) { |
469 type = ChildProcessInfo::WORKER_PROCESS; | 469 type = ChildProcessInfo::WORKER_PROCESS; |
470 } else if (type_str == switches::kNaClLoaderProcess) { | 470 } else if (type_str == switches::kNaClLoaderProcess) { |
471 type = ChildProcessInfo::NACL_LOADER_PROCESS; | 471 type = ChildProcessInfo::NACL_LOADER_PROCESS; |
472 } else if (type_str == switches::kUtilityProcess) { | 472 } else if (type_str == switches::kUtilityProcess) { |
473 type = ChildProcessInfo::UTILITY_PROCESS; | 473 type = ChildProcessInfo::UTILITY_PROCESS; |
474 } else if (type_str == switches::kNaClBrokerProcess) { | 474 } else if (type_str == switches::kNaClBrokerProcess) { |
475 type = ChildProcessInfo::NACL_BROKER_PROCESS; | 475 type = ChildProcessInfo::NACL_BROKER_PROCESS; |
476 } else if (type_str == switches::kGpuProcess) { | 476 } else if (type_str == switches::kGpuProcess) { |
477 type = ChildProcessInfo::GPU_PROCESS; | 477 type = ChildProcessInfo::GPU_PROCESS; |
| 478 } else if (type_str == switches::kPpapiPluginProcess) { |
| 479 type = ChildProcessInfo::PPAPI_PLUGIN_PROCESS; |
478 } else { | 480 } else { |
479 NOTREACHED(); | 481 NOTREACHED(); |
480 return 0; | 482 return 0; |
481 } | 483 } |
482 | 484 |
483 TRACE_EVENT_BEGIN("StartProcessWithAccess", 0, type_str); | 485 TRACE_EVENT_BEGIN("StartProcessWithAccess", 0, type_str); |
484 | 486 |
485 bool in_sandbox = | 487 bool in_sandbox = |
486 (type != ChildProcessInfo::NACL_BROKER_PROCESS) && | 488 (type != ChildProcessInfo::NACL_BROKER_PROCESS) && |
487 !browser_command_line.HasSwitch(switches::kNoSandbox) && | 489 !browser_command_line.HasSwitch(switches::kNoSandbox) && |
(...skipping 90 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
578 | 580 |
579 // Help the process a little. It can't start the debugger by itself if | 581 // Help the process a little. It can't start the debugger by itself if |
580 // the process is in a sandbox. | 582 // the process is in a sandbox. |
581 if (child_needs_help) | 583 if (child_needs_help) |
582 base::debug::SpawnDebuggerOnProcess(target.dwProcessId); | 584 base::debug::SpawnDebuggerOnProcess(target.dwProcessId); |
583 | 585 |
584 return process; | 586 return process; |
585 } | 587 } |
586 | 588 |
587 } // namespace sandbox | 589 } // namespace sandbox |
OLD | NEW |