Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(88)

Side by Side Diff: content/public/common/sandboxed_process_launcher_delegate.cc

Issue 1532423003: Have each SandboxedProcessLauncherDelegate maintain a zygote. (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Load and initialize all zygotes on browser startup. Created 4 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2014 The Chromium Authors. All rights reserved. 1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "build/build_config.h" 5 #include "build/build_config.h"
6 #include "content/public/common/sandboxed_process_launcher_delegate.h" 6 #include "content/public/common/sandboxed_process_launcher_delegate.h"
7 7
8 namespace content { 8 namespace content {
9 9
10 #if defined(OS_WIN) 10 #if defined(OS_WIN)
11 bool SandboxedProcessLauncherDelegate::ShouldLaunchElevated() { 11 bool SandboxedProcessLauncherDelegate::ShouldLaunchElevated() {
12 return false; 12 return false;
13 } 13 }
14 14
15 bool SandboxedProcessLauncherDelegate::ShouldSandbox() { 15 bool SandboxedProcessLauncherDelegate::ShouldSandbox() {
16 return true; 16 return true;
17 } 17 }
18 18
19 bool SandboxedProcessLauncherDelegate::DisableDefaultPolicy() { 19 bool SandboxedProcessLauncherDelegate::DisableDefaultPolicy() {
20 return false; 20 return false;
21 } 21 }
22 22
23 bool SandboxedProcessLauncherDelegate::PreSpawnTarget( 23 bool SandboxedProcessLauncherDelegate::PreSpawnTarget(
24 sandbox::TargetPolicy* policy) { 24 sandbox::TargetPolicy* policy) {
25 return true; 25 return true;
26 } 26 }
27 27
28 #elif(OS_POSIX) 28 #elif(OS_POSIX)
29 bool SandboxedProcessLauncherDelegate::ShouldUseZygote() { 29 #if !defined(OS_MACOSX) && !defined(OS_ANDROID)
30 return false; 30 ZygoteHandle* SandboxedProcessLauncherDelegate::GetZygote() {
31 return nullptr;
31 } 32 }
33 #endif // !defined(OS_MACOSX) && !defined(OS_ANDROID)
32 34
33 base::EnvironmentMap SandboxedProcessLauncherDelegate::GetEnvironment() { 35 base::EnvironmentMap SandboxedProcessLauncherDelegate::GetEnvironment() {
34 return base::EnvironmentMap(); 36 return base::EnvironmentMap();
35 } 37 }
36 #endif 38 #endif
37 39
38 SandboxType SandboxedProcessLauncherDelegate::GetSandboxType() { 40 SandboxType SandboxedProcessLauncherDelegate::GetSandboxType() {
39 return SANDBOX_TYPE_INVALID; 41 return SANDBOX_TYPE_INVALID;
40 } 42 }
41 43
42 } // namespace content 44 } // namespace content
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698