Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(77)

Side by Side Diff: content/common/sandbox_init_mac.h

Issue 303293002: Initialize the bootstrap sandbox in the browser process. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Rename constant Created 6 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
« no previous file with comments | « content/browser/plugin_process_host.cc ('k') | content/common/sandbox_init_mac.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #ifndef CONTENT_COMMON_SANDBOX_INIT_MAC_H_ 5 #ifndef CONTENT_COMMON_SANDBOX_INIT_MAC_H_
6 #define CONTENT_COMMON_SANDBOX_INIT_MAC_H_ 6 #define CONTENT_COMMON_SANDBOX_INIT_MAC_H_
7 7
8 namespace content { 8 namespace content {
9 9
10 // Initialize the sandbox for renderer, gpu, utility, worker, and plug-in 10 // Initialize the sandbox for renderer, gpu, utility, worker, and plug-in
11 // processes, depending on the command line flags. For the browser process which 11 // processes, depending on the command line flags. For the browser process which
12 // is not sandboxed, this call is a no-op. 12 // is not sandboxed, this call is a no-op.
13 // Returns true if the sandbox was initialized succesfully, false if an error 13 // Returns true if the sandbox was initialized succesfully, false if an error
14 // occurred. If process_type isn't one that needs sandboxing, true is always 14 // occurred. If process_type isn't one that needs sandboxing, true is always
15 // returned. 15 // returned.
16 bool InitializeSandbox(); 16 bool InitializeSandbox();
17 17
18 // The bootstrap server name of the real bootstrap port. This is never used
19 // with bootstrap_register, but is instead used with a POLICY_SUBSTITUTE_PORT
20 // in the bootstrap sandbox. In child processes, the the launchd/bootstrap
21 // sandbox will have replaced the bootstrap port with one controlled by the
22 // interception server. This server name can be used to request the original
23 // server, from the browser, in NPAPI plugins.
24 extern const char kBootstrapPortNameForNPAPIPlugins[];
25
18 } // namespace content 26 } // namespace content
19 27
20 #endif // CONTENT_COMMON_SANDBOX_INIT_MAC_H_ 28 #endif // CONTENT_COMMON_SANDBOX_INIT_MAC_H_
OLDNEW
« no previous file with comments | « content/browser/plugin_process_host.cc ('k') | content/common/sandbox_init_mac.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698