Add a stub __cxa_demangle to disable LLVM's demangler.
[chromium-blink-merge.git] / content / common / sandbox_init_mac.cc
blob2597a75f14d8da8768168c426dd773f79b7684f7
1 // Copyright (c) 2011 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "content/public/common/sandbox_init.h"
7 #include "base/command_line.h"
8 #include "base/files/file_path.h"
9 #include "base/logging.h"
10 #include "content/common/sandbox_mac.h"
11 #include "content/public/common/content_switches.h"
13 namespace content {
15 bool InitializeSandbox(int sandbox_type, const base::FilePath& allowed_dir) {
16 // Warm up APIs before turning on the sandbox.
17 Sandbox::SandboxWarmup(sandbox_type);
19 // Actually sandbox the process.
20 return Sandbox::EnableSandbox(sandbox_type, allowed_dir);
23 // Fill in |sandbox_type| and |allowed_dir| based on the command line, returns
24 // false if the current process type doesn't need to be sandboxed or if the
25 // sandbox was disabled from the command line.
26 bool GetSandboxTypeFromCommandLine(int* sandbox_type,
27 base::FilePath* allowed_dir) {
28 DCHECK(sandbox_type);
29 DCHECK(allowed_dir);
31 *sandbox_type = -1;
32 *allowed_dir = base::FilePath(); // Empty by default.
34 const base::CommandLine& command_line =
35 *base::CommandLine::ForCurrentProcess();
36 if (command_line.HasSwitch(switches::kNoSandbox))
37 return false;
39 std::string process_type =
40 command_line.GetSwitchValueASCII(switches::kProcessType);
41 if (process_type.empty()) {
42 // Browser process isn't sandboxed.
43 return false;
44 } else if (process_type == switches::kRendererProcess) {
45 *sandbox_type = SANDBOX_TYPE_RENDERER;
46 } else if (process_type == switches::kUtilityProcess) {
47 // Utility process sandbox.
48 *sandbox_type = SANDBOX_TYPE_UTILITY;
49 *allowed_dir =
50 command_line.GetSwitchValuePath(switches::kUtilityProcessAllowedDir);
51 } else if (process_type == switches::kGpuProcess) {
52 if (command_line.HasSwitch(switches::kDisableGpuSandbox))
53 return false;
54 *sandbox_type = SANDBOX_TYPE_GPU;
55 } else if ((process_type == switches::kPluginProcess) ||
56 (process_type == switches::kPpapiBrokerProcess)) {
57 return false;
58 } else if (process_type == switches::kPpapiPluginProcess) {
59 *sandbox_type = SANDBOX_TYPE_PPAPI;
60 } else {
61 // This is a process which we don't know about, i.e. an embedder-defined
62 // process. If the embedder wants it sandboxed, they have a chance to return
63 // the sandbox profile in ContentClient::GetSandboxProfileForSandboxType.
64 return false;
66 return true;
69 bool InitializeSandbox() {
70 int sandbox_type = 0;
71 base::FilePath allowed_dir;
72 if (!GetSandboxTypeFromCommandLine(&sandbox_type, &allowed_dir))
73 return true;
74 return InitializeSandbox(sandbox_type, allowed_dir);
77 bool BrokerDuplicateSharedMemoryHandle(
78 const base::SharedMemoryHandle& source_handle,
79 base::ProcessId target_process_id,
80 base::SharedMemoryHandle* target_handle) {
81 *target_handle = base::SharedMemory::DuplicateHandle(source_handle);
82 return base::SharedMemory::IsHandleValid(*target_handle);
85 extern const char kBootstrapPortNameForNPAPIPlugins[] =
86 "org.chromium.sandbox.real_bootstrap_server";
88 } // namespace content