| Index: content/common/sandbox_policy.cc
|
| ===================================================================
|
| --- content/common/sandbox_policy.cc (revision 112315)
|
| +++ content/common/sandbox_policy.cc (working copy)
|
| @@ -16,10 +16,10 @@
|
| #include "base/stringprintf.h"
|
| #include "base/string_util.h"
|
| #include "base/win/windows_version.h"
|
| -#include "content/common/child_process_info.h"
|
| #include "content/common/debug_flags.h"
|
| #include "content/public/common/content_client.h"
|
| #include "content/public/common/content_switches.h"
|
| +#include "content/public/common/process_type.h"
|
| #include "sandbox/src/sandbox.h"
|
| #include "ui/gfx/gl/gl_switches.h"
|
|
|
| @@ -384,26 +384,26 @@
|
| const FilePath& exposed_dir) {
|
| base::ProcessHandle process = 0;
|
| const CommandLine& browser_command_line = *CommandLine::ForCurrentProcess();
|
| - ChildProcessInfo::ProcessType type;
|
| + content::ProcessType type;
|
| std::string type_str = cmd_line->GetSwitchValueASCII(switches::kProcessType);
|
| if (type_str == switches::kRendererProcess) {
|
| - type = ChildProcessInfo::RENDER_PROCESS;
|
| + type = content::PROCESS_TYPE_RENDERER;
|
| } else if (type_str == switches::kPluginProcess) {
|
| - type = ChildProcessInfo::PLUGIN_PROCESS;
|
| + type = content::PROCESS_TYPE_PLUGIN;
|
| } else if (type_str == switches::kWorkerProcess) {
|
| - type = ChildProcessInfo::WORKER_PROCESS;
|
| + type = content::PROCESS_TYPE_WORKER;
|
| } else if (type_str == switches::kNaClLoaderProcess) {
|
| - type = ChildProcessInfo::NACL_LOADER_PROCESS;
|
| + type = content::PROCESS_TYPE_NACL_LOADER;
|
| } else if (type_str == switches::kUtilityProcess) {
|
| - type = ChildProcessInfo::UTILITY_PROCESS;
|
| + type = content::PROCESS_TYPE_UTILITY;
|
| } else if (type_str == switches::kNaClBrokerProcess) {
|
| - type = ChildProcessInfo::NACL_BROKER_PROCESS;
|
| + type = content::PROCESS_TYPE_NACL_BROKER;
|
| } else if (type_str == switches::kGpuProcess) {
|
| - type = ChildProcessInfo::GPU_PROCESS;
|
| + type = content::PROCESS_TYPE_GPU;
|
| } else if (type_str == switches::kPpapiPluginProcess) {
|
| - type = ChildProcessInfo::PPAPI_PLUGIN_PROCESS;
|
| + type = content::PROCESS_TYPE_PPAPI_PLUGIN;
|
| } else if (type_str == switches::kPpapiBrokerProcess) {
|
| - type = ChildProcessInfo::PPAPI_BROKER_PROCESS;
|
| + type = content::PROCESS_TYPE_PPAPI_BROKER;
|
| } else {
|
| NOTREACHED();
|
| return 0;
|
| @@ -415,12 +415,12 @@
|
| // First case: all process types except the nacl broker, and the plugin
|
| // process are sandboxed by default.
|
| bool in_sandbox =
|
| - (type != ChildProcessInfo::NACL_BROKER_PROCESS) &&
|
| - (type != ChildProcessInfo::PLUGIN_PROCESS) &&
|
| - (type != ChildProcessInfo::PPAPI_BROKER_PROCESS);
|
| + (type != content::PROCESS_TYPE_NACL_BROKER) &&
|
| + (type != content::PROCESS_TYPE_PLUGIN) &&
|
| + (type != content::PROCESS_TYPE_PPAPI_BROKER);
|
|
|
| // If it is the GPU process then it can be disabled by a command line flag.
|
| - if ((type == ChildProcessInfo::GPU_PROCESS) &&
|
| + if ((type == content::PROCESS_TYPE_GPU) &&
|
| (browser_command_line.HasSwitch(switches::kDisableGpuSandbox))) {
|
| in_sandbox = false;
|
| DVLOG(1) << "GPU sandbox is disabled";
|
| @@ -465,7 +465,7 @@
|
| sandbox::TargetPolicy* policy = g_broker_services->CreatePolicy();
|
|
|
| #if !defined(NACL_WIN64) // We don't need this code on win nacl64.
|
| - if (type == ChildProcessInfo::PLUGIN_PROCESS &&
|
| + if (type == content::PROCESS_TYPE_PLUGIN &&
|
| !browser_command_line.HasSwitch(switches::kNoSandbox) &&
|
| content::GetContentClient()->SandboxPlugin(cmd_line, policy)) {
|
| in_sandbox = true;
|
| @@ -478,21 +478,21 @@
|
| return process;
|
| }
|
|
|
| - if (type == ChildProcessInfo::PLUGIN_PROCESS) {
|
| + if (type == content::PROCESS_TYPE_PLUGIN) {
|
| AddGenericDllEvictionPolicy(policy);
|
| AddPluginDllEvictionPolicy(policy);
|
| - } else if (type == ChildProcessInfo::GPU_PROCESS) {
|
| + } else if (type == content::PROCESS_TYPE_GPU) {
|
| if (!AddPolicyForGPU(cmd_line, policy))
|
| return 0;
|
| - } else if (type == ChildProcessInfo::PPAPI_PLUGIN_PROCESS) {
|
| + } else if (type == content::PROCESS_TYPE_PPAPI_PLUGIN) {
|
| if (!AddPolicyForPepperPlugin(policy))
|
| return 0;
|
| } else {
|
| AddPolicyForRenderer(policy);
|
| // TODO(jschuh): Need get these restrictions applied to NaCl and Pepper.
|
| // Just have to figure out what needs to be warmed up first.
|
| - if (type == ChildProcessInfo::RENDER_PROCESS ||
|
| - type == ChildProcessInfo::WORKER_PROCESS) {
|
| + if (type == content::PROCESS_TYPE_RENDERER ||
|
| + type == content::PROCESS_TYPE_WORKER) {
|
| AddBaseHandleClosePolicy(policy);
|
| }
|
|
|
| @@ -545,7 +545,7 @@
|
| // scanning the address space using VirtualQuery.
|
| // TODO(bbudge) Handle the --no-sandbox case.
|
| // http://code.google.com/p/nativeclient/issues/detail?id=2131
|
| - if (type == ChildProcessInfo::NACL_LOADER_PROCESS &&
|
| + if (type == content::PROCESS_TYPE_NACL_LOADER &&
|
| (base::win::OSInfo::GetInstance()->wow64_status() ==
|
| base::win::OSInfo::WOW64_DISABLED)) {
|
| const SIZE_T kOneGigabyte = 1 << 30;
|
|
|