OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/nacl/nacl_main_platform_delegate.h" | 5 #include "components/nacl/loader/nacl_main_platform_delegate.h" |
6 | 6 |
7 #include "base/command_line.h" | 7 #include "base/command_line.h" |
8 | 8 |
9 NaClMainPlatformDelegate::NaClMainPlatformDelegate( | 9 NaClMainPlatformDelegate::NaClMainPlatformDelegate( |
10 const content::MainFunctionParams& parameters) | 10 const content::MainFunctionParams& parameters) |
11 : parameters_(parameters), sandbox_test_module_(NULL) { | 11 : parameters_(parameters), sandbox_test_module_(NULL) { |
12 } | 12 } |
13 | 13 |
14 NaClMainPlatformDelegate::~NaClMainPlatformDelegate() { | 14 NaClMainPlatformDelegate::~NaClMainPlatformDelegate() { |
15 } | 15 } |
(...skipping 26 matching lines...) Expand all Loading... |
42 // http://code.google.com/p/nativeclient/issues/list?q=label:Seccomp | 42 // http://code.google.com/p/nativeclient/issues/list?q=label:Seccomp |
43 // At best, NaCl will not work. At worst, enabling the seccomp sandbox | 43 // At best, NaCl will not work. At worst, enabling the seccomp sandbox |
44 // could create a hole in the NaCl sandbox. | 44 // could create a hole in the NaCl sandbox. |
45 } | 45 } |
46 | 46 |
47 bool NaClMainPlatformDelegate::RunSandboxTests() { | 47 bool NaClMainPlatformDelegate::RunSandboxTests() { |
48 // The sandbox is started in the zygote process: zygote_main_linux.cc | 48 // The sandbox is started in the zygote process: zygote_main_linux.cc |
49 // http://code.google.com/p/chromium/wiki/LinuxSUIDSandbox | 49 // http://code.google.com/p/chromium/wiki/LinuxSUIDSandbox |
50 return true; | 50 return true; |
51 } | 51 } |
OLD | NEW |