Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(13)

Side by Side Diff: content/public/browser/content_browser_client.h

Issue 18254010: IPC fuzzer child process component (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: missed some files Created 7 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ 5 #ifndef CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_
6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ 6 #define CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_
7 7
8 #include <map> 8 #include <map>
9 #include <string> 9 #include <string>
10 #include <utility> 10 #include <utility>
(...skipping 558 matching lines...) Expand 10 before | Expand all | Expand 10 after
569 virtual void GetAdditionalFileSystemBackends( 569 virtual void GetAdditionalFileSystemBackends(
570 const base::FilePath& storage_partition_path, 570 const base::FilePath& storage_partition_path,
571 quota::SpecialStoragePolicy* special_storage_policy, 571 quota::SpecialStoragePolicy* special_storage_policy,
572 fileapi::ExternalMountPoints* external_mount_points, 572 fileapi::ExternalMountPoints* external_mount_points,
573 ScopedVector<fileapi::FileSystemBackend>* additional_backends) {} 573 ScopedVector<fileapi::FileSystemBackend>* additional_backends) {}
574 574
575 // Allows an embedder to return its own LocationProvider implementation. 575 // Allows an embedder to return its own LocationProvider implementation.
576 // Return NULL to use the default one for the platform to be created. 576 // Return NULL to use the default one for the platform to be created.
577 virtual LocationProvider* OverrideSystemLocationProvider(); 577 virtual LocationProvider* OverrideSystemLocationProvider();
578 578
579 // Allows an embedder to decide whether a child process should be killed
580 // if it sends a bad IPC message.
Tom Sepez 2013/07/12 18:47:20 Comment about "apart from testing, it is an incred
aedla 2013/07/15 16:12:08 Done.
581 virtual bool ShouldKillChildOnBadMessage();
582
579 #if defined(OS_POSIX) && !defined(OS_MACOSX) 583 #if defined(OS_POSIX) && !defined(OS_MACOSX)
580 // Populates |mappings| with all files that need to be mapped before launching 584 // Populates |mappings| with all files that need to be mapped before launching
581 // a child process. 585 // a child process.
582 virtual void GetAdditionalMappedFilesForChildProcess( 586 virtual void GetAdditionalMappedFilesForChildProcess(
583 const CommandLine& command_line, 587 const CommandLine& command_line,
584 int child_process_id, 588 int child_process_id,
585 std::vector<FileDescriptorInfo>* mappings) {} 589 std::vector<FileDescriptorInfo>* mappings) {}
586 #endif 590 #endif
587 591
588 #if defined(OS_WIN) 592 #if defined(OS_WIN)
(...skipping 12 matching lines...) Expand all
601 // This is called on a worker thread. 605 // This is called on a worker thread.
602 virtual 606 virtual
603 crypto::CryptoModuleBlockingPasswordDelegate* GetCryptoPasswordDelegate( 607 crypto::CryptoModuleBlockingPasswordDelegate* GetCryptoPasswordDelegate(
604 const GURL& url); 608 const GURL& url);
605 #endif 609 #endif
606 }; 610 };
607 611
608 } // namespace content 612 } // namespace content
609 613
610 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_ 614 #endif // CONTENT_PUBLIC_BROWSER_CONTENT_BROWSER_CLIENT_H_
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698