diff options
Diffstat (limited to 'ipc/glue/GeckoChildProcessHost.cpp')
-rw-r--r-- | ipc/glue/GeckoChildProcessHost.cpp | 46 |
1 files changed, 0 insertions, 46 deletions
diff --git a/ipc/glue/GeckoChildProcessHost.cpp b/ipc/glue/GeckoChildProcessHost.cpp index 9e83a8729..a14be5693 100644 --- a/ipc/glue/GeckoChildProcessHost.cpp +++ b/ipc/glue/GeckoChildProcessHost.cpp @@ -47,17 +47,6 @@ using mozilla::MonitorAutoLock; using mozilla::ipc::GeckoChildProcessHost; -#ifdef ANDROID -// Like its predecessor in nsExceptionHandler.cpp, this is -// the magic number of a file descriptor remapping we must -// preserve for the child process. -static const int kMagicAndroidSystemPropFd = 5; -#endif - -#ifdef MOZ_WIDGET_ANDROID -#include "AndroidBridge.h" -#endif - static const bool kLowRightsSubprocesses = // We only attempted to drop privileges on gonk, because it // had no plugins or extensions to worry about breaking. @@ -170,17 +159,7 @@ GeckoChildProcessHost::GetPathToBinary(FilePath& exePath, GeckoProcessType proce exePath = exePath.DirName(); } -#ifdef MOZ_WIDGET_ANDROID - exePath = exePath.AppendASCII("lib"); - - // We must use the PIE binary on 5.0 and higher - const char* processName = mozilla::AndroidBridge::Bridge()->GetAPIVersion() >= 21 ? - MOZ_CHILD_PROCESS_NAME_PIE : MOZ_CHILD_PROCESS_NAME; - - exePath = exePath.AppendASCII(processName); -#else exePath = exePath.AppendASCII(MOZ_CHILD_PROCESS_NAME); -#endif return BinaryPathType::PluginContainer; } @@ -622,9 +601,6 @@ GeckoChildProcessHost::PerformAsyncLaunchInternal(std::vector<std::string>& aExt nsCString path; NS_CopyUnicodeToNative(nsDependentString(gGREBinPath), path); # if defined(OS_LINUX) || defined(OS_BSD) -# if defined(MOZ_WIDGET_ANDROID) - path += "/lib"; -# endif // MOZ_WIDGET_ANDROID const char *ld_library_path = PR_GetEnv("LD_LIBRARY_PATH"); nsCString new_ld_lib_path(path.get()); @@ -668,28 +644,6 @@ GeckoChildProcessHost::PerformAsyncLaunchInternal(std::vector<std::string>& aExt FilePath exePath; BinaryPathType pathType = GetPathToBinary(exePath, mProcessType); -#ifdef MOZ_WIDGET_ANDROID - // The java wrapper unpacks this for us but can't make it executable - chmod(exePath.value().c_str(), 0700); -#endif // MOZ_WIDGET_ANDROID - -#ifdef ANDROID - // Remap the Android property workspace to a well-known int, - // and update the environment to reflect the new value for the - // child process. - const char *apws = getenv("ANDROID_PROPERTY_WORKSPACE"); - if (apws) { - int fd = atoi(apws); - mFileMap.push_back(std::pair<int, int>(fd, kMagicAndroidSystemPropFd)); - - char buf[32]; - char *szptr = strchr(apws, ','); - - snprintf(buf, sizeof(buf), "%d%s", kMagicAndroidSystemPropFd, szptr); - newEnvVars["ANDROID_PROPERTY_WORKSPACE"] = buf; - } -#endif // ANDROID - // remap the IPC socket fd to a well-known int, as the OS does for // STDOUT_FILENO, for example int srcChannelFd, dstChannelFd; |