| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/browser/zygote_host/zygote_host_impl_linux.h" | 5 #include "content/browser/zygote_host/zygote_host_impl_linux.h" |
| 6 | 6 |
| 7 #include <sys/socket.h> | 7 #include <sys/socket.h> |
| 8 #include <sys/stat.h> | 8 #include <sys/stat.h> |
| 9 #include <sys/types.h> | 9 #include <sys/types.h> |
| 10 #include <unistd.h> | 10 #include <unistd.h> |
| (...skipping 87 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 98 switches::kEnableLogging, // Support, e.g., --enable-logging=stderr. | 98 switches::kEnableLogging, // Support, e.g., --enable-logging=stderr. |
| 99 switches::kV, | 99 switches::kV, |
| 100 switches::kVModule, | 100 switches::kVModule, |
| 101 switches::kRegisterPepperPlugins, | 101 switches::kRegisterPepperPlugins, |
| 102 switches::kDisableSeccompSandbox, | 102 switches::kDisableSeccompSandbox, |
| 103 switches::kDisableSeccompFilterSandbox, | 103 switches::kDisableSeccompFilterSandbox, |
| 104 switches::kEnableSeccompSandbox, | 104 switches::kEnableSeccompSandbox, |
| 105 // Zygote process needs to know what resources to have loaded when it | 105 // Zygote process needs to know what resources to have loaded when it |
| 106 // becomes a renderer process. | 106 // becomes a renderer process. |
| 107 switches::kForceDeviceScaleFactor, | 107 switches::kForceDeviceScaleFactor, |
| 108 switches::kLoad2xResources, | |
| 109 switches::kNoSandbox, | 108 switches::kNoSandbox, |
| 110 }; | 109 }; |
| 111 cmd_line.CopySwitchesFrom(browser_command_line, kForwardSwitches, | 110 cmd_line.CopySwitchesFrom(browser_command_line, kForwardSwitches, |
| 112 arraysize(kForwardSwitches)); | 111 arraysize(kForwardSwitches)); |
| 113 | 112 |
| 114 content::GetContentClient()->browser()->AppendExtraCommandLineSwitches( | 113 content::GetContentClient()->browser()->AppendExtraCommandLineSwitches( |
| 115 &cmd_line, -1); | 114 &cmd_line, -1); |
| 116 | 115 |
| 117 sandbox_binary_ = sandbox_cmd.c_str(); | 116 sandbox_binary_ = sandbox_cmd.c_str(); |
| 118 | 117 |
| (...skipping 359 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 478 | 477 |
| 479 pid_t ZygoteHostImpl::GetSandboxHelperPid() const { | 478 pid_t ZygoteHostImpl::GetSandboxHelperPid() const { |
| 480 return RenderSandboxHostLinux::GetInstance()->pid(); | 479 return RenderSandboxHostLinux::GetInstance()->pid(); |
| 481 } | 480 } |
| 482 | 481 |
| 483 int ZygoteHostImpl::GetSandboxStatus() const { | 482 int ZygoteHostImpl::GetSandboxStatus() const { |
| 484 if (have_read_sandbox_status_word_) | 483 if (have_read_sandbox_status_word_) |
| 485 return sandbox_status_; | 484 return sandbox_status_; |
| 486 return 0; | 485 return 0; |
| 487 } | 486 } |
| OLD | NEW |