| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/browser/zygote_host/zygote_host_impl_linux.h" | 5 #include "content/browser/zygote_host/zygote_host_impl_linux.h" |
| 6 | 6 |
| 7 #include <sys/socket.h> | 7 #include <sys/socket.h> |
| 8 #include <sys/stat.h> | 8 #include <sys/stat.h> |
| 9 #include <sys/types.h> | 9 #include <sys/types.h> |
| 10 #include <unistd.h> | 10 #include <unistd.h> |
| (...skipping 89 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 100 switches::kLoggingLevel, | 100 switches::kLoggingLevel, |
| 101 switches::kEnableLogging, // Support, e.g., --enable-logging=stderr. | 101 switches::kEnableLogging, // Support, e.g., --enable-logging=stderr. |
| 102 switches::kV, | 102 switches::kV, |
| 103 switches::kVModule, | 103 switches::kVModule, |
| 104 switches::kRegisterPepperPlugins, | 104 switches::kRegisterPepperPlugins, |
| 105 switches::kDisableSeccompFilterSandbox, | 105 switches::kDisableSeccompFilterSandbox, |
| 106 | 106 |
| 107 // Zygote process needs to know what resources to have loaded when it | 107 // Zygote process needs to know what resources to have loaded when it |
| 108 // becomes a renderer process. | 108 // becomes a renderer process. |
| 109 switches::kForceDeviceScaleFactor, | 109 switches::kForceDeviceScaleFactor, |
| 110 switches::kTouchOptimizedUI, | |
| 111 | 110 |
| 112 switches::kNoSandbox, | 111 switches::kNoSandbox, |
| 113 }; | 112 }; |
| 114 cmd_line.CopySwitchesFrom(browser_command_line, kForwardSwitches, | 113 cmd_line.CopySwitchesFrom(browser_command_line, kForwardSwitches, |
| 115 arraysize(kForwardSwitches)); | 114 arraysize(kForwardSwitches)); |
| 116 | 115 |
| 117 GetContentClient()->browser()->AppendExtraCommandLineSwitches(&cmd_line, -1); | 116 GetContentClient()->browser()->AppendExtraCommandLineSwitches(&cmd_line, -1); |
| 118 | 117 |
| 119 sandbox_binary_ = sandbox_cmd.c_str(); | 118 sandbox_binary_ = sandbox_cmd.c_str(); |
| 120 | 119 |
| (...skipping 385 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 506 return RenderSandboxHostLinux::GetInstance()->pid(); | 505 return RenderSandboxHostLinux::GetInstance()->pid(); |
| 507 } | 506 } |
| 508 | 507 |
| 509 int ZygoteHostImpl::GetSandboxStatus() const { | 508 int ZygoteHostImpl::GetSandboxStatus() const { |
| 510 if (have_read_sandbox_status_word_) | 509 if (have_read_sandbox_status_word_) |
| 511 return sandbox_status_; | 510 return sandbox_status_; |
| 512 return 0; | 511 return 0; |
| 513 } | 512 } |
| 514 | 513 |
| 515 } // namespace content | 514 } // namespace content |
| OLD | NEW |