| OLD | NEW |
| 1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/shell/browser/shell_content_browser_client.h" | 5 #include "content/shell/browser/shell_content_browser_client.h" |
| 6 | 6 |
| 7 #include "base/base_switches.h" | 7 #include "base/base_switches.h" |
| 8 #include "base/command_line.h" | 8 #include "base/command_line.h" |
| 9 #include "base/files/file.h" | 9 #include "base/files/file.h" |
| 10 #include "base/files/file_util.h" | 10 #include "base/files/file_util.h" |
| (...skipping 334 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 345 ResourceContext* resource_context, | 345 ResourceContext* resource_context, |
| 346 const GURL& current_url, | 346 const GURL& current_url, |
| 347 const GURL& new_url) { | 347 const GURL& new_url) { |
| 348 return g_swap_processes_for_redirect; | 348 return g_swap_processes_for_redirect; |
| 349 } | 349 } |
| 350 | 350 |
| 351 #if defined(OS_POSIX) && !defined(OS_MACOSX) | 351 #if defined(OS_POSIX) && !defined(OS_MACOSX) |
| 352 void ShellContentBrowserClient::GetAdditionalMappedFilesForChildProcess( | 352 void ShellContentBrowserClient::GetAdditionalMappedFilesForChildProcess( |
| 353 const CommandLine& command_line, | 353 const CommandLine& command_line, |
| 354 int child_process_id, | 354 int child_process_id, |
| 355 std::vector<FileDescriptorInfo>* mappings) { | 355 FileDescriptorInfo* mappings) { |
| 356 #if defined(OS_ANDROID) | 356 #if defined(OS_ANDROID) |
| 357 int flags = base::File::FLAG_OPEN | base::File::FLAG_READ; | 357 int flags = base::File::FLAG_OPEN | base::File::FLAG_READ; |
| 358 base::FilePath pak_file; | 358 base::FilePath pak_file; |
| 359 bool r = PathService::Get(base::DIR_ANDROID_APP_DATA, &pak_file); | 359 bool r = PathService::Get(base::DIR_ANDROID_APP_DATA, &pak_file); |
| 360 CHECK(r); | 360 CHECK(r); |
| 361 pak_file = pak_file.Append(FILE_PATH_LITERAL("paks")); | 361 pak_file = pak_file.Append(FILE_PATH_LITERAL("paks")); |
| 362 pak_file = pak_file.Append(FILE_PATH_LITERAL("content_shell.pak")); | 362 pak_file = pak_file.Append(FILE_PATH_LITERAL("content_shell.pak")); |
| 363 | 363 |
| 364 base::File f(pak_file, flags); | 364 base::File f(pak_file, flags); |
| 365 if (!f.IsValid()) { | 365 if (!f.IsValid()) { |
| 366 NOTREACHED() << "Failed to open file when creating renderer process: " | 366 NOTREACHED() << "Failed to open file when creating renderer process: " |
| 367 << "content_shell.pak"; | 367 << "content_shell.pak"; |
| 368 } | 368 } |
| 369 mappings->push_back( | 369 |
| 370 FileDescriptorInfo(kShellPakDescriptor, base::FileDescriptor(f.Pass()))); | 370 mappings->Transfer(kShellPakDescriptor, base::ScopedFD(f.TakePlatformFile())); |
| 371 | 371 |
| 372 if (breakpad::IsCrashReporterEnabled()) { | 372 if (breakpad::IsCrashReporterEnabled()) { |
| 373 f = breakpad::CrashDumpManager::GetInstance()->CreateMinidumpFile( | 373 f = breakpad::CrashDumpManager::GetInstance()->CreateMinidumpFile( |
| 374 child_process_id); | 374 child_process_id); |
| 375 if (!f.IsValid()) { | 375 if (!f.IsValid()) { |
| 376 LOG(ERROR) << "Failed to create file for minidump, crash reporting will " | 376 LOG(ERROR) << "Failed to create file for minidump, crash reporting will " |
| 377 << "be disabled for this process."; | 377 << "be disabled for this process."; |
| 378 } else { | 378 } else { |
| 379 mappings->push_back( | 379 mappings->Transfer(kAndroidMinidumpDescriptor, |
| 380 FileDescriptorInfo(kAndroidMinidumpDescriptor, | 380 base::ScopedFD(f.TakePlatformFile())); |
| 381 base::FileDescriptor(f.Pass()))); | |
| 382 } | 381 } |
| 383 } | 382 } |
| 384 #else // !defined(OS_ANDROID) | 383 #else // !defined(OS_ANDROID) |
| 385 int crash_signal_fd = GetCrashSignalFD(command_line); | 384 int crash_signal_fd = GetCrashSignalFD(command_line); |
| 386 if (crash_signal_fd >= 0) { | 385 if (crash_signal_fd >= 0) { |
| 387 mappings->push_back(FileDescriptorInfo( | 386 mappings->Share(kCrashDumpSignal, crash_signal_fd); |
| 388 kCrashDumpSignal, base::FileDescriptor(crash_signal_fd, false))); | |
| 389 } | 387 } |
| 390 #endif // defined(OS_ANDROID) | 388 #endif // defined(OS_ANDROID) |
| 391 } | 389 } |
| 392 #endif // defined(OS_POSIX) && !defined(OS_MACOSX) | 390 #endif // defined(OS_POSIX) && !defined(OS_MACOSX) |
| 393 | 391 |
| 394 #if defined(OS_WIN) | 392 #if defined(OS_WIN) |
| 395 void ShellContentBrowserClient::PreSpawnRenderer(sandbox::TargetPolicy* policy, | 393 void ShellContentBrowserClient::PreSpawnRenderer(sandbox::TargetPolicy* policy, |
| 396 bool* success) { | 394 bool* success) { |
| 397 // Add sideloaded font files for testing. See also DIR_WINDOWS_FONTS | 395 // Add sideloaded font files for testing. See also DIR_WINDOWS_FONTS |
| 398 // addition in |StartSandboxedProcess|. | 396 // addition in |StartSandboxedProcess|. |
| (...skipping 24 matching lines...) Expand all Loading... |
| 423 ShellBrowserContext* | 421 ShellBrowserContext* |
| 424 ShellContentBrowserClient::ShellBrowserContextForBrowserContext( | 422 ShellContentBrowserClient::ShellBrowserContextForBrowserContext( |
| 425 BrowserContext* content_browser_context) { | 423 BrowserContext* content_browser_context) { |
| 426 if (content_browser_context == browser_context()) | 424 if (content_browser_context == browser_context()) |
| 427 return browser_context(); | 425 return browser_context(); |
| 428 DCHECK_EQ(content_browser_context, off_the_record_browser_context()); | 426 DCHECK_EQ(content_browser_context, off_the_record_browser_context()); |
| 429 return off_the_record_browser_context(); | 427 return off_the_record_browser_context(); |
| 430 } | 428 } |
| 431 | 429 |
| 432 } // namespace content | 430 } // namespace content |
| OLD | NEW |