summaryrefslogtreecommitdiff
path: root/chromium/content/browser/ppapi_plugin_process_host.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/content/browser/ppapi_plugin_process_host.cc')
-rw-r--r--chromium/content/browser/ppapi_plugin_process_host.cc33
1 files changed, 16 insertions, 17 deletions
diff --git a/chromium/content/browser/ppapi_plugin_process_host.cc b/chromium/content/browser/ppapi_plugin_process_host.cc
index 09f2cabf4c3..f93b4199d2b 100644
--- a/chromium/content/browser/ppapi_plugin_process_host.cc
+++ b/chromium/content/browser/ppapi_plugin_process_host.cc
@@ -36,16 +36,16 @@
#include "content/public/common/zygote/zygote_buildflags.h"
#include "ppapi/proxy/ppapi_messages.h"
#include "ppapi/shared_impl/ppapi_permissions.h"
+#include "sandbox/policy/sandbox_type.h"
+#include "sandbox/policy/switches.h"
#include "services/network/public/cpp/network_connection_tracker.h"
-#include "services/service_manager/sandbox/sandbox_type.h"
-#include "services/service_manager/sandbox/switches.h"
#include "ui/base/ui_base_switches.h"
#if defined(OS_WIN)
#include "base/win/windows_version.h"
+#include "sandbox/policy/win/sandbox_win.h"
#include "sandbox/win/src/process_mitigations.h"
#include "sandbox/win/src/sandbox_policy.h"
-#include "services/service_manager/sandbox/win/sandbox_win.h"
#include "ui/display/win/dpi.h"
#include "ui/gfx/font_render_params.h"
#endif
@@ -94,10 +94,9 @@ class PpapiPluginSandboxedProcessLauncherDelegate
#if !defined(NACL_WIN64)
// We don't support PPAPI win32k lockdown prior to Windows 10.
- if (base::win::GetVersion() >= base::win::Version::WIN10 &&
- service_manager::IsWin32kLockdownEnabled()) {
+ if (base::win::GetVersion() >= base::win::Version::WIN10) {
result =
- service_manager::SandboxWin::AddWin32kLockdownPolicy(policy, true);
+ sandbox::policy::SandboxWin::AddWin32kLockdownPolicy(policy, true);
if (result != sandbox::SBOX_ALL_OK)
return false;
}
@@ -105,7 +104,7 @@ class PpapiPluginSandboxedProcessLauncherDelegate
const base::string16& sid =
browser_client->GetAppContainerSidForSandboxType(GetSandboxType());
if (!sid.empty())
- service_manager::SandboxWin::AddAppContainerPolicy(policy, sid.c_str());
+ sandbox::policy::SandboxWin::AddAppContainerPolicy(policy, sid.c_str());
// Only Flash needs to be able to execute dynamic code.
if (!permissions_.HasPermission(ppapi::PERMISSION_FLASH)) {
@@ -131,15 +130,15 @@ class PpapiPluginSandboxedProcessLauncherDelegate
}
#endif // BUILDFLAG(USE_ZYGOTE_HANDLE)
- service_manager::SandboxType GetSandboxType() override {
+ sandbox::policy::SandboxType GetSandboxType() override {
#if defined(OS_WIN)
if (is_broker_)
- return service_manager::SandboxType::kNoSandbox;
+ return sandbox::policy::SandboxType::kNoSandbox;
#endif // OS_WIN
- return service_manager::SandboxType::kPpapi;
+ return sandbox::policy::SandboxType::kPpapi;
}
-#if defined(OS_MACOSX)
+#if defined(OS_MAC)
bool DisclaimResponsibility() override { return true; }
#endif
@@ -365,10 +364,10 @@ bool PpapiPluginProcessHost::Init(const PepperPluginInfo& info) {
base::CommandLine::StringType plugin_launcher =
browser_command_line.GetSwitchValueNative(switches::kPpapiPluginLauncher);
-#if defined(OS_LINUX)
+#if defined(OS_LINUX) || defined(OS_CHROMEOS)
int flags = plugin_launcher.empty() ? ChildProcessHost::CHILD_ALLOW_SELF :
ChildProcessHost::CHILD_NORMAL;
-#elif defined(OS_MACOSX)
+#elif defined(OS_MAC)
// Flash needs to JIT, but other plugins do not.
int flags = permissions_.HasPermission(ppapi::PERMISSION_FLASH)
? ChildProcessHost::CHILD_PLUGIN
@@ -404,10 +403,10 @@ bool PpapiPluginProcessHost::Init(const PepperPluginInfo& info) {
if (!is_broker_) {
static const char* const kPluginForwardSwitches[] = {
- service_manager::switches::kDisableSeccompFilterSandbox,
- service_manager::switches::kNoSandbox,
-#if defined(OS_MACOSX)
- service_manager::switches::kEnableSandboxLogging,
+ sandbox::policy::switches::kDisableSeccompFilterSandbox,
+ sandbox::policy::switches::kNoSandbox,
+#if defined(OS_MAC)
+ sandbox::policy::switches::kEnableSandboxLogging,
#endif
switches::kPpapiStartupDialog,
};