DescriptionAndroid handler: inject the application loading part from the shell .so.
To properly set thunks in the application being loaded, we need make_thunks() to
be called from an .so that has them set itself.
This patch extracts the application loading logic from the bootstrapping library
to the Mojo Shell .so. When an application is being bootstrapped, we inject the
loading function by passing a function pointer.
BUG=436508
R=qsr@chromium.org
Committed: https://chromium.googlesource.com/external/mojo/+/78ab413bd886107700215fe0acdc3e1adb11aae4
Patch Set 1 : #
Total comments: 3
Patch Set 2 : Rebase. #Patch Set 3 : Address Ben's comment. #
Total comments: 2
Patch Set 4 : Address Ben's comment. #Patch Set 5 : Fix a typo. #Patch Set 6 : Rebase. #
Messages
Total messages: 11 (4 generated)
|