Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(106)

Side by Side Diff: chrome/common/sandbox_mac.h

Issue 5491001: Mac: Sandbox GPU process. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: make tests work for now Created 10 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2010 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2010 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CHROME_COMMON_SANDBOX_MAC_H_ 5 #ifndef CHROME_COMMON_SANDBOX_MAC_H_
6 #define CHROME_COMMON_SANDBOX_MAC_H_ 6 #define CHROME_COMMON_SANDBOX_MAC_H_
7 #pragma once 7 #pragma once
8 8
9 #include <string> 9 #include <string>
10 10
(...skipping 57 matching lines...) Expand 10 before | Expand all | Expand 10 after
68 // following symlinks) are permitted. 68 // following symlinks) are permitted.
69 SANDBOX_TYPE_WORKER, 69 SANDBOX_TYPE_WORKER,
70 70
71 // Utility process is as restrictive as the worker process except full 71 // Utility process is as restrictive as the worker process except full
72 // access is allowed to one configurable directory. 72 // access is allowed to one configurable directory.
73 SANDBOX_TYPE_UTILITY, 73 SANDBOX_TYPE_UTILITY,
74 74
75 // Native Client sandbox for the user's untrusted code. 75 // Native Client sandbox for the user's untrusted code.
76 SANDBOX_TYPE_NACL_LOADER, 76 SANDBOX_TYPE_NACL_LOADER,
77 77
78 // GPU process.
79 SANDBOX_TYPE_GPU,
80
78 SANDBOX_AFTER_TYPE_LAST_TYPE, // Placeholder to ease iteration. 81 SANDBOX_AFTER_TYPE_LAST_TYPE, // Placeholder to ease iteration.
79 }; 82 };
80 83
81 // Warm up System APIs that empirically need to be accessed before the Sandbox 84 // Warm up System APIs that empirically need to be accessed before the Sandbox
82 // is turned on. 85 // is turned on.
83 static void SandboxWarmup(); 86 static void SandboxWarmup();
84 87
85 // Turns on the OS X sandbox for this process. 88 // Turns on the OS X sandbox for this process.
86 // |sandbox_type| - type of Sandbox to use. 89 // |sandbox_type| - type of Sandbox to use.
87 // |allowed_dir| - directory to allow access to, currently the only sandbox 90 // |allowed_dir| - directory to allow access to, currently the only sandbox
(...skipping 80 matching lines...) Expand 10 before | Expand all | Expand 10 after
168 FRIEND_TEST(MacDirAccessSandboxTest, StringEscape); 171 FRIEND_TEST(MacDirAccessSandboxTest, StringEscape);
169 FRIEND_TEST(MacDirAccessSandboxTest, RegexEscape); 172 FRIEND_TEST(MacDirAccessSandboxTest, RegexEscape);
170 FRIEND_TEST(MacDirAccessSandboxTest, SandboxAccess); 173 FRIEND_TEST(MacDirAccessSandboxTest, SandboxAccess);
171 174
172 DISALLOW_IMPLICIT_CONSTRUCTORS(Sandbox); 175 DISALLOW_IMPLICIT_CONSTRUCTORS(Sandbox);
173 }; 176 };
174 177
175 } // namespace sandbox 178 } // namespace sandbox
176 179
177 #endif // CHROME_COMMON_SANDBOX_MAC_H_ 180 #endif // CHROME_COMMON_SANDBOX_MAC_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698