OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "content/zygote/zygote_main.h" | 5 #include "content/zygote/zygote_main.h" |
6 | 6 |
7 #include <dlfcn.h> | 7 #include <dlfcn.h> |
8 #include <fcntl.h> | 8 #include <fcntl.h> |
9 #include <pthread.h> | 9 #include <pthread.h> |
10 #include <signal.h> | 10 #include <signal.h> |
(...skipping 49 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
60 #include "content/common/pepper_plugin_list.h" | 60 #include "content/common/pepper_plugin_list.h" |
61 #include "content/public/common/pepper_plugin_info.h" | 61 #include "content/public/common/pepper_plugin_info.h" |
62 #endif | 62 #endif |
63 | 63 |
64 #if defined(ENABLE_WEBRTC) | 64 #if defined(ENABLE_WEBRTC) |
65 #include "third_party/libjingle/overrides/init_webrtc.h" | 65 #include "third_party/libjingle/overrides/init_webrtc.h" |
66 #endif | 66 #endif |
67 | 67 |
68 #if defined(SANITIZER_COVERAGE) | 68 #if defined(SANITIZER_COVERAGE) |
69 #include <sanitizer/common_interface_defs.h> | 69 #include <sanitizer/common_interface_defs.h> |
| 70 #include <sanitizer/coverage_interface.h> |
70 #endif | 71 #endif |
71 | 72 |
72 namespace content { | 73 namespace content { |
73 | 74 |
74 namespace { | 75 namespace { |
75 | 76 |
76 void CloseFds(const std::vector<int>& fds) { | 77 void CloseFds(const std::vector<int>& fds) { |
77 for (const auto& it : fds) { | 78 for (const auto& it : fds) { |
78 PCHECK(0 == IGNORE_EINTR(close(it))); | 79 PCHECK(0 == IGNORE_EINTR(close(it))); |
79 } | 80 } |
(...skipping 515 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
595 const bool namespace_sandbox_engaged = sandbox_flags & kSandboxLinuxUserNS; | 596 const bool namespace_sandbox_engaged = sandbox_flags & kSandboxLinuxUserNS; |
596 CHECK_EQ(using_namespace_sandbox, namespace_sandbox_engaged); | 597 CHECK_EQ(using_namespace_sandbox, namespace_sandbox_engaged); |
597 | 598 |
598 Zygote zygote(sandbox_flags, fork_delegates.Pass(), extra_children, | 599 Zygote zygote(sandbox_flags, fork_delegates.Pass(), extra_children, |
599 extra_fds); | 600 extra_fds); |
600 // This function call can return multiple times, once per fork(). | 601 // This function call can return multiple times, once per fork(). |
601 return zygote.ProcessRequests(); | 602 return zygote.ProcessRequests(); |
602 } | 603 } |
603 | 604 |
604 } // namespace content | 605 } // namespace content |
OLD | NEW |