| Index: src/trusted/desc/linux/nacl_desc_sysv_shm.h
|
| diff --git a/src/trusted/desc/linux/nacl_desc_sysv_shm.h b/src/trusted/desc/linux/nacl_desc_sysv_shm.h
|
| deleted file mode 100644
|
| index 3ac48a32bd0b3e08d92f3051b9cc727acf3deddf..0000000000000000000000000000000000000000
|
| --- a/src/trusted/desc/linux/nacl_desc_sysv_shm.h
|
| +++ /dev/null
|
| @@ -1,74 +0,0 @@
|
| -/*
|
| - * Copyright (c) 2011 The Native Client Authors. All rights reserved.
|
| - * Use of this source code is governed by a BSD-style license that can be
|
| - * found in the LICENSE file.
|
| - */
|
| -
|
| -/*
|
| - * NaCl service runtime. Transferrable shared memory objects.
|
| - */
|
| -#ifndef NATIVE_CLIENT_SRC_TRUSTED_DESC_NACL_DESC_LINUX_SYSV_SHM_H_
|
| -#define NATIVE_CLIENT_SRC_TRUSTED_DESC_NACL_DESC_LINUX_SYSV_SHM_H_
|
| -
|
| -#include "native_client/src/include/portability.h"
|
| -#include "native_client/src/include/nacl_base.h"
|
| -
|
| -#include "native_client/src/trusted/desc/nacl_desc_base.h"
|
| -
|
| -EXTERN_C_BEGIN
|
| -
|
| -struct NaClDescEffector;
|
| -struct NaClDescXferState;
|
| -struct NaClMessageHeader;
|
| -struct nacl_abi_stat;
|
| -
|
| -/*
|
| - * Since the SysV shared memory abstraction does not permit mapping in
|
| - * only a portion of the shared memory object (offset==0), the SysV
|
| - * shm objects have their own fstat object type. The user code should
|
| - * not encounter SysV shm objects normally and is unable to create any
|
| - * SysV shm objects; the only source of SysV shm objects is in the
|
| - * context of Pepper2d, and the Pepper2d library code should hide
|
| - * this implementation detail.
|
| - */
|
| -extern struct NaClDescVtbl const kNaClDescSysvShmVtbl;
|
| -
|
| -/*
|
| - * SysV shared memory objects have weird semantics. There is no way
|
| - * for untrusted code to create one. These are normally imported --
|
| - * from the GPU process when we are embedded in Chrome -- and the shm
|
| - * object is externally owned, and we do not have to worry about its
|
| - * lifetime. The normal Ctor is here primarily for completeness.
|
| - * Note, however, the following semantics: the process that Ctor'd the
|
| - * SysV shm object is the owner; the SysV shm object may be
|
| - * externalized (its ID sent) and internalized in another process;
|
| - * however, there is no sharing of ownership nor reference counting --
|
| - * the receiving process can access the SysV shm object as long as it
|
| - * is live, but when the owner Dtors its object, the ID will get
|
| - * invalidated, and the receiving process's accesses will fail. The
|
| - * RMID only occurs in the Dtor of the owner, not in the processes
|
| - * that internalized the SysV shm object in a nrd xfer.
|
| - */
|
| -struct NaClDescSysvShm {
|
| - struct NaClDesc base NACL_IS_REFCOUNT_SUBCLASS;
|
| - int id;
|
| - size_t size;
|
| - int rmid_in_dtor;
|
| -};
|
| -
|
| -int NaClDescSysvShmInternalize(struct NaClDesc **baseptr,
|
| - struct NaClDescXferState *xfer,
|
| - struct NaClDescQuotaInterface *quota_interface)
|
| - NACL_WUR;
|
| -
|
| -
|
| -int NaClDescSysvShmImportCtor(struct NaClDescSysvShm *self,
|
| - int id,
|
| - nacl_off64_t size) NACL_WUR;
|
| -
|
| -int NaClDescSysvShmCtor(struct NaClDescSysvShm *self,
|
| - nacl_off64_t size) NACL_WUR;
|
| -
|
| -EXTERN_C_END
|
| -
|
| -#endif /* NATIVE_CLIENT_SRC_TRUSTED_DESC_LINUX_NACL_DESC_SYSV_SHM_H_ */
|
|
|