| Index: chrome/nacl/nacl_main_platform_delegate_linux.cc
|
| diff --git a/chrome/nacl/nacl_main_platform_delegate_linux.cc b/chrome/nacl/nacl_main_platform_delegate_linux.cc
|
| deleted file mode 100644
|
| index 583206a97019e4637082d1ff80cdd5373c9d3f30..0000000000000000000000000000000000000000
|
| --- a/chrome/nacl/nacl_main_platform_delegate_linux.cc
|
| +++ /dev/null
|
| @@ -1,51 +0,0 @@
|
| -// Copyright (c) 2012 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "chrome/nacl/nacl_main_platform_delegate.h"
|
| -
|
| -#include "base/command_line.h"
|
| -
|
| -NaClMainPlatformDelegate::NaClMainPlatformDelegate(
|
| - const content::MainFunctionParams& parameters)
|
| - : parameters_(parameters), sandbox_test_module_(NULL) {
|
| -}
|
| -
|
| -NaClMainPlatformDelegate::~NaClMainPlatformDelegate() {
|
| -}
|
| -
|
| -void NaClMainPlatformDelegate::PlatformInitialize() {
|
| -}
|
| -
|
| -void NaClMainPlatformDelegate::PlatformUninitialize() {
|
| -}
|
| -
|
| -void NaClMainPlatformDelegate::InitSandboxTests(bool no_sandbox) {
|
| - // The sandbox is started in the zygote process: zygote_main_linux.cc
|
| - // http://code.google.com/p/chromium/wiki/LinuxSUIDSandbox
|
| - return;
|
| -}
|
| -
|
| -void NaClMainPlatformDelegate::EnableSandbox() {
|
| - // The setuid sandbox is started in the zygote process: zygote_main_linux.cc
|
| - // http://code.google.com/p/chromium/wiki/LinuxSUIDSandbox
|
| - //
|
| - // The seccomp sandbox is started in the renderer.
|
| - // http://code.google.com/p/seccompsandbox/
|
| - // seccomp is currently disabled for nacl.
|
| - // http://code.google.com/p/chromium/issues/detail?id=59423
|
| - // See the code in chrome/renderer/renderer_main_platform_delegate_linux.cc
|
| - // for how to turn seccomp on.
|
| - //
|
| - // The seccomp sandbox should not be enabled for Native Client until
|
| - // all of these issues are fixed:
|
| - // http://code.google.com/p/nativeclient/issues/list?q=label:Seccomp
|
| - // At best, NaCl will not work. At worst, enabling the seccomp sandbox
|
| - // could create a hole in the NaCl sandbox.
|
| -}
|
| -
|
| -bool NaClMainPlatformDelegate::RunSandboxTests() {
|
| - // The sandbox is started in the zygote process: zygote_main_linux.cc
|
| - // http://code.google.com/p/chromium/wiki/LinuxSUIDSandbox
|
| - return true;
|
| -}
|
|
|