Remove unused content_main_runner.cc 56/222056/1
authorChandan Padhi <c.padhi@samsung.com>
Wed, 11 Dec 2019 10:40:18 +0000 (16:10 +0530)
committerChandan Padhi <c.padhi@samsung.com>
Thu, 9 Jan 2020 09:06:48 +0000 (09:06 +0000)
This file has been removed from upstream chromium
and is not part of the build. Removing the same.

Change-Id: Ic87f556e2b8bcc738f29f23d6a9217fb7a2cd525
Signed-off-by: Chandan Padhi <c.padhi@samsung.com>
(cherry picked from commit c4a3fbdb15d25964819adb8b0aac2435c4c4e34e)

content/app/content_main_runner.cc [deleted file]

diff --git a/content/app/content_main_runner.cc b/content/app/content_main_runner.cc
deleted file mode 100644 (file)
index 8f8b5be..0000000
+++ /dev/null
@@ -1,994 +0,0 @@
-// Copyright (c) 2012 The Chromium Authors. All rights reserved.
-// Use of this source code is governed by a BSD-style license that can be
-// found in the LICENSE file.
-
-#include "content/public/app/content_main_runner.h"
-
-#include <stddef.h>
-#include <stdlib.h>
-#include <string.h>
-
-#include <memory>
-#include <string>
-#include <utility>
-#include <vector>
-
-#include "base/allocator/allocator_check.h"
-#include "base/allocator/allocator_extension.h"
-#include "base/allocator/buildflags.h"
-#include "base/at_exit.h"
-#include "base/base_switches.h"
-#include "base/command_line.h"
-#include "base/debug/debugger.h"
-#include "base/debug/stack_trace.h"
-#include "base/feature_list.h"
-#include "base/files/file_path.h"
-#include "base/i18n/icu_util.h"
-#include "base/lazy_instance.h"
-#include "base/logging.h"
-#include "base/macros.h"
-#include "base/metrics/field_trial.h"
-#include "base/metrics/histogram_base.h"
-#include "base/path_service.h"
-#include "base/process/launch.h"
-#include "base/process/memory.h"
-#include "base/process/process.h"
-#include "base/process/process_handle.h"
-#include "base/strings/string_number_conversions.h"
-#include "base/strings/string_util.h"
-#include "base/strings/stringprintf.h"
-#include "base/trace_event/trace_event.h"
-#include "build/build_config.h"
-#include "components/tracing/common/trace_startup.h"
-#include "content/app/mojo/mojo_init.h"
-#include "content/common/url_schemes.h"
-#include "content/public/app/content_main.h"
-#include "content/public/app/content_main_delegate.h"
-#include "content/public/common/content_client.h"
-#include "content/public/common/content_constants.h"
-#include "content/public/common/content_descriptor_keys.h"
-#include "content/public/common/content_features.h"
-#include "content/public/common/content_paths.h"
-#include "content/public/common/content_switches.h"
-#include "content/public/common/main_function_params.h"
-#include "content/public/common/sandbox_init.h"
-#include "content/public/common/zygote_buildflags.h"
-#include "gin/v8_initializer.h"
-#include "media/base/media.h"
-#include "media/media_buildflags.h"
-#include "ppapi/buildflags/buildflags.h"
-#include "services/service_manager/embedder/switches.h"
-#include "services/service_manager/sandbox/sandbox_type.h"
-#include "ui/base/ui_base_paths.h"
-#include "ui/base/ui_base_switches.h"
-#include "ui/display/display_switches.h"
-#include "ui/gfx/switches.h"
-
-#if defined(OS_WIN)
-#include <malloc.h>
-#include <cstring>
-
-#include "base/trace_event/trace_event_etw_export_win.h"
-#include "sandbox/win/src/sandbox_types.h"
-#include "ui/display/win/dpi.h"
-#elif defined(OS_MACOSX)
-#include "base/mac/scoped_nsautorelease_pool.h"
-#include "base/power_monitor/power_monitor_device_source.h"
-#include "content/browser/mach_broker_mac.h"
-#endif  // OS_WIN
-
-#if defined(OS_POSIX)
-#include <signal.h>
-
-#include "base/file_descriptor_store.h"
-#include "base/posix/global_descriptors.h"
-#include "content/public/common/content_descriptors.h"
-
-#if !defined(OS_MACOSX)
-#include "content/public/common/zygote_fork_delegate_linux.h"
-#endif
-#if !defined(OS_MACOSX) && !defined(OS_ANDROID)
-#include "content/zygote/zygote_main.h"
-#include "sandbox/linux/services/libc_interceptor.h"
-#endif
-
-#endif  // OS_POSIX
-
-#if defined(OS_LINUX)
-#include "base/native_library.h"
-#include "base/rand_util.h"
-#include "content/common/font_config_ipc_linux.h"
-#include "content/public/common/common_sandbox_support_linux.h"
-#include "third_party/blink/public/platform/web_font_render_style.h"
-#include "third_party/boringssl/src/include/openssl/crypto.h"
-#include "third_party/boringssl/src/include/openssl/rand.h"
-#include "third_party/skia/include/ports/SkFontConfigInterface.h"
-#include "third_party/skia/include/ports/SkFontMgr.h"
-#include "third_party/skia/include/ports/SkFontMgr_android.h"
-
-#if BUILDFLAG(ENABLE_PLUGINS)
-#include "content/common/pepper_plugin_list.h"
-#include "content/public/common/pepper_plugin_info.h"
-#endif
-
-#if BUILDFLAG(ENABLE_LIBRARY_CDMS)
-#include "content/public/common/cdm_info.h"
-#include "content/public/common/content_client.h"
-#endif
-
-#if BUILDFLAG(ENABLE_WEBRTC)
-#include "third_party/webrtc_overrides/init_webrtc.h"  // nogncheck
-#endif
-#endif  // OS_LINUX
-
-#if !defined(CHROME_MULTIPLE_DLL_BROWSER)
-#include "content/public/gpu/content_gpu_client.h"
-#include "content/public/renderer/content_renderer_client.h"
-#include "content/public/utility/content_utility_client.h"
-#endif
-
-#if !defined(CHROME_MULTIPLE_DLL_CHILD)
-#include "content/browser/browser_main.h"
-#include "content/public/browser/content_browser_client.h"
-#endif
-
-#if !defined(CHROME_MULTIPLE_DLL_BROWSER) && !defined(CHROME_MULTIPLE_DLL_CHILD)
-#include "content/browser/gpu/gpu_main_thread_factory.h"
-#include "content/browser/renderer_host/render_process_host_impl.h"
-#include "content/browser/utility_process_host.h"
-#include "content/gpu/in_process_gpu_thread.h"
-#include "content/renderer/in_process_renderer_thread.h"
-#include "content/utility/in_process_utility_thread.h"
-#endif
-
-#if BUILDFLAG(USE_ZYGOTE_HANDLE)
-#include "content/browser/sandbox_host_linux.h"
-#include "content/browser/zygote_host/zygote_communication_linux.h"
-#include "content/browser/zygote_host/zygote_host_impl_linux.h"
-#include "content/public/common/common_sandbox_support_linux.h"
-#include "content/public/common/zygote_handle.h"
-#include "media/base/media_switches.h"
-#endif
-
-namespace content {
-extern int GpuMain(const content::MainFunctionParams&);
-#if BUILDFLAG(ENABLE_PLUGINS)
-#if !defined(OS_LINUX)
-extern int PluginMain(const content::MainFunctionParams&);
-#endif
-extern int PpapiPluginMain(const MainFunctionParams&);
-extern int PpapiBrokerMain(const MainFunctionParams&);
-#endif
-extern int RendererMain(const content::MainFunctionParams&);
-extern int UtilityMain(const MainFunctionParams&);
-}  // namespace content
-
-namespace content {
-
-namespace {
-
-#if defined(V8_USE_EXTERNAL_STARTUP_DATA) && defined(OS_ANDROID)
-#if defined __LP64__
-#define kV8SnapshotDataDescriptor kV8Snapshot64DataDescriptor
-#else
-#define kV8SnapshotDataDescriptor kV8Snapshot32DataDescriptor
-#endif
-#endif
-
-// This sets up two singletons responsible for managing field trials. The
-// |field_trial_list| singleton lives on the stack and must outlive the Run()
-// method of the process.
-void InitializeFieldTrialAndFeatureList(
-    std::unique_ptr<base::FieldTrialList>* field_trial_list) {
-  const base::CommandLine& command_line =
-      *base::CommandLine::ForCurrentProcess();
-
-  // Initialize statistical testing infrastructure.  We set the entropy
-  // provider to nullptr to disallow non-browser processes from creating
-  // their own one-time randomized trials; they should be created in the
-  // browser process.
-  field_trial_list->reset(new base::FieldTrialList(nullptr));
-
-  // Ensure any field trials in browser are reflected into the child
-  // process.
-#if defined(OS_POSIX)
-  // On POSIX systems that use the zygote, we get the trials from a shared
-  // memory segment backed by an fd instead of the command line.
-  base::FieldTrialList::CreateTrialsFromCommandLine(
-      command_line, switches::kFieldTrialHandle, kFieldTrialDescriptor);
-#else
-  base::FieldTrialList::CreateTrialsFromCommandLine(
-      command_line, switches::kFieldTrialHandle, -1);
-#endif
-
-  std::unique_ptr<base::FeatureList> feature_list(new base::FeatureList);
-  base::FieldTrialList::CreateFeaturesFromCommandLine(
-      command_line, switches::kEnableFeatures, switches::kDisableFeatures,
-      feature_list.get());
-  base::FeatureList::SetInstance(std::move(feature_list));
-}
-
-#if defined(V8_USE_EXTERNAL_STARTUP_DATA)
-void LoadV8SnapshotFile() {
-#if defined(USE_V8_CONTEXT_SNAPSHOT)
-  static constexpr gin::V8Initializer::V8SnapshotFileType kSnapshotType =
-      gin::V8Initializer::V8SnapshotFileType::kWithAdditionalContext;
-  static const char* snapshot_data_descriptor =
-      kV8ContextSnapshotDataDescriptor;
-#else
-  static constexpr gin::V8Initializer::V8SnapshotFileType kSnapshotType =
-      gin::V8Initializer::V8SnapshotFileType::kDefault;
-  static const char* snapshot_data_descriptor = kV8SnapshotDataDescriptor;
-#endif  // USE_V8_CONTEXT_SNAPSHOT
-  ALLOW_UNUSED_LOCAL(kSnapshotType);
-  ALLOW_UNUSED_LOCAL(snapshot_data_descriptor);
-
-#if defined(OS_POSIX) && !defined(OS_MACOSX)
-  base::FileDescriptorStore& file_descriptor_store =
-      base::FileDescriptorStore::GetInstance();
-  base::MemoryMappedFile::Region region;
-  base::ScopedFD fd =
-      file_descriptor_store.MaybeTakeFD(snapshot_data_descriptor, &region);
-  if (fd.is_valid()) {
-    gin::V8Initializer::LoadV8SnapshotFromFD(fd.get(), region.offset,
-                                             region.size, kSnapshotType);
-    return;
-  }
-#endif  // OS_POSIX && !OS_MACOSX
-
-#if !defined(CHROME_MULTIPLE_DLL_BROWSER)
-  gin::V8Initializer::LoadV8Snapshot(kSnapshotType);
-#endif  // !CHROME_MULTIPLE_DLL_BROWSER
-}
-
-void LoadV8NativesFile() {
-#if defined(OS_POSIX) && !defined(OS_MACOSX)
-  base::FileDescriptorStore& file_descriptor_store =
-      base::FileDescriptorStore::GetInstance();
-  base::MemoryMappedFile::Region region;
-  base::ScopedFD fd =
-      file_descriptor_store.MaybeTakeFD(kV8NativesDataDescriptor, &region);
-  if (fd.is_valid()) {
-    gin::V8Initializer::LoadV8NativesFromFD(fd.get(), region.offset,
-                                            region.size);
-    return;
-  }
-#endif  // OS_POSIX && !OS_MACOSX
-#if !defined(CHROME_MULTIPLE_DLL_BROWSER)
-  gin::V8Initializer::LoadV8Natives();
-#endif  // !CHROME_MULTIPLE_DLL_BROWSER
-}
-#endif  // V8_USE_EXTERNAL_STARTUP_DATA
-
-void InitializeV8IfNeeded(const base::CommandLine& command_line,
-                          const std::string& process_type) {
-  if (process_type == switches::kGpuProcess)
-    return;
-
-#if defined(V8_USE_EXTERNAL_STARTUP_DATA)
-  LoadV8SnapshotFile();
-  LoadV8NativesFile();
-#endif  // V8_USE_EXTERNAL_STARTUP_DATA
-}
-
-#if BUILDFLAG(USE_ZYGOTE_HANDLE)
-pid_t LaunchZygoteHelper(base::CommandLine* cmd_line,
-                         base::ScopedFD* control_fd) {
-  // Append any switches from the browser process that need to be forwarded on
-  // to the zygote/renderers.
-  static const char* const kForwardSwitches[] = {
-      switches::kAndroidFontsPath, switches::kClearKeyCdmPathForTesting,
-      switches::kEnableHeapProfiling,
-      switches::kEnableLogging,  // Support, e.g., --enable-logging=stderr.
-      // Need to tell the zygote that it is headless so that we don't try to use
-      // the wrong type of main delegate.
-      switches::kHeadless,
-      // Zygote process needs to know what resources to have loaded when it
-      // becomes a renderer process.
-      switches::kForceDeviceScaleFactor, switches::kLoggingLevel,
-      switches::kPpapiInProcess, switches::kRegisterPepperPlugins, switches::kV,
-      switches::kVModule,
-  };
-  cmd_line->CopySwitchesFrom(*base::CommandLine::ForCurrentProcess(),
-                             kForwardSwitches, arraysize(kForwardSwitches));
-
-  GetContentClient()->browser()->AppendExtraCommandLineSwitches(cmd_line, -1);
-
-  // Start up the sandbox host process and get the file descriptor for the
-  // sandboxed processes to talk to it.
-  base::FileHandleMappingVector additional_remapped_fds;
-  additional_remapped_fds.emplace_back(
-      SandboxHostLinux::GetInstance()->GetChildSocket(), GetSandboxFD());
-
-  return ZygoteHostImpl::GetInstance()->LaunchZygote(
-      cmd_line, control_fd, std::move(additional_remapped_fds));
-}
-
-// Initializes the Zygote sandbox host. No thread should be created before this
-// call, as InitializeZygoteSandboxForBrowserProcess() will end-up using fork().
-void InitializeZygoteSandboxForBrowserProcess(
-    const base::CommandLine& parsed_command_line) {
-  TRACE_EVENT0("startup", "SetupSandbox");
-  // SandboxHostLinux needs to be initialized even if the sandbox and
-  // zygote are both disabled. It initializes the sandboxed process socket.
-  SandboxHostLinux::GetInstance()->Init();
-#if defined(OS_TIZEN) && !defined(OS_TIZEN_TV_PRODUCT)
-  if (parsed_command_line.HasSwitch(switches::kSingleProcess))
-    return;
-#endif
-
-  if (parsed_command_line.HasSwitch(switches::kNoZygote) &&
-      !parsed_command_line.HasSwitch(switches::kNoSandbox)) {
-    LOG(ERROR) << "--no-sandbox should be used together with --no--zygote";
-    exit(EXIT_FAILURE);
-  }
-
-  // Tickle the zygote host so it forks now.
-  ZygoteHostImpl::GetInstance()->Init(parsed_command_line);
-  ZygoteHandle generic_zygote =
-      CreateGenericZygote(base::BindOnce(LaunchZygoteHelper));
-
-  // TODO(kerrnel): Investigate doing this without the ZygoteHostImpl as a
-  // proxy. It is currently done this way due to concerns about race
-  // conditions.
-  ZygoteHostImpl::GetInstance()->SetRendererSandboxStatus(
-      generic_zygote->GetSandboxStatus());
-}
-#endif  // BUILDFLAG(USE_ZYGOTE_HANDLE)
-
-#if defined(OS_LINUX)
-
-#if BUILDFLAG(ENABLE_PLUGINS)
-// Loads the (native) libraries but does not initialize them (i.e., does not
-// call PPP_InitializeModule). This is needed by the zygote on Linux to get
-// access to the plugins before entering the sandbox.
-void PreloadPepperPlugins() {
-  std::vector<PepperPluginInfo> plugins;
-  ComputePepperPluginList(&plugins);
-  for (const auto& plugin : plugins) {
-    if (!plugin.is_internal) {
-      base::NativeLibraryLoadError error;
-      base::NativeLibrary library =
-          base::LoadNativeLibrary(plugin.path, &error);
-      VLOG_IF(1, !library) << "Unable to load plugin " << plugin.path.value()
-                           << " " << error.ToString();
-
-      ignore_result(library);  // Prevent release-mode warning.
-    }
-  }
-}
-#endif
-
-#if BUILDFLAG(ENABLE_LIBRARY_CDMS)
-// Loads registered library CDMs but does not initialize them. This is needed by
-// the zygote on Linux to get access to the CDMs before entering the sandbox.
-void PreloadLibraryCdms() {
-  std::vector<CdmInfo> cdms;
-  GetContentClient()->AddContentDecryptionModules(&cdms, nullptr);
-  for (const auto& cdm : cdms) {
-    base::NativeLibraryLoadError error;
-    base::NativeLibrary library = base::LoadNativeLibrary(cdm.path, &error);
-    VLOG_IF(1, !library) << "Unable to load CDM " << cdm.path.value()
-                         << " (error: " << error.ToString() << ")";
-    ignore_result(library);  // Prevent release-mode warning.
-  }
-}
-#endif  // BUILDFLAG(ENABLE_LIBRARY_CDMS)
-
-#if BUILDFLAG(USE_ZYGOTE_HANDLE)
-void PreSandboxInit() {
-#if defined(ARCH_CPU_ARM_FAMILY)
-  // On ARM, BoringSSL requires access to /proc/cpuinfo to determine processor
-  // features. Query this before entering the sandbox.
-  CRYPTO_library_init();
-#endif
-
-  // Pass BoringSSL a copy of the /dev/urandom file descriptor so RAND_bytes
-  // will work inside the sandbox.
-  RAND_set_urandom_fd(base::GetUrandomFD());
-
-#if BUILDFLAG(ENABLE_PLUGINS)
-  // Ensure access to the Pepper plugins before the sandbox is turned on.
-  PreloadPepperPlugins();
-#endif
-#if BUILDFLAG(ENABLE_LIBRARY_CDMS)
-  // Ensure access to the library CDMs before the sandbox is turned on.
-  PreloadLibraryCdms();
-#endif
-#if BUILDFLAG(ENABLE_WEBRTC)
-  InitializeWebRtcModule();
-#endif
-
-  SkFontConfigInterface::SetGlobal(new FontConfigIPC(GetSandboxFD()))->unref();
-
-  // Set the android SkFontMgr for blink. We need to ensure this is done
-  // before the sandbox is initialized to allow the font manager to access
-  // font configuration files on disk.
-  if (base::CommandLine::ForCurrentProcess()->HasSwitch(
-          switches::kAndroidFontsPath)) {
-    std::string android_fonts_dir =
-        base::CommandLine::ForCurrentProcess()->GetSwitchValueASCII(
-            switches::kAndroidFontsPath);
-
-    if (android_fonts_dir.size() > 0 && android_fonts_dir.back() != '/')
-      android_fonts_dir += '/';
-
-    SkFontMgr_Android_CustomFonts custom;
-    custom.fSystemFontUse =
-        SkFontMgr_Android_CustomFonts::SystemFontUse::kOnlyCustom;
-    custom.fBasePath = android_fonts_dir.c_str();
-
-    std::string font_config;
-    std::string fallback_font_config;
-    if (android_fonts_dir.find("kitkat") != std::string::npos) {
-      font_config = android_fonts_dir + "system_fonts.xml";
-      fallback_font_config = android_fonts_dir + "fallback_fonts.xml";
-      custom.fFallbackFontsXml = fallback_font_config.c_str();
-    } else {
-      font_config = android_fonts_dir + "fonts.xml";
-      custom.fFallbackFontsXml = nullptr;
-    }
-    custom.fFontsXml = font_config.c_str();
-    custom.fIsolated = true;
-
-    blink::WebFontRenderStyle::SetSkiaFontManager(
-        SkFontMgr_New_Android(&custom));
-  }
-}
-#endif  // BUILDFLAG(USE_ZYGOTE_HANDLE)
-
-#endif  // OS_LINUX
-
-}  // namespace
-
-#if !defined(CHROME_MULTIPLE_DLL_CHILD)
-base::LazyInstance<ContentBrowserClient>::DestructorAtExit
-    g_empty_content_browser_client = LAZY_INSTANCE_INITIALIZER;
-#endif  //  !CHROME_MULTIPLE_DLL_CHILD
-
-#if !defined(CHROME_MULTIPLE_DLL_BROWSER)
-base::LazyInstance<ContentGpuClient>::DestructorAtExit
-    g_empty_content_gpu_client = LAZY_INSTANCE_INITIALIZER;
-base::LazyInstance<ContentRendererClient>::DestructorAtExit
-    g_empty_content_renderer_client = LAZY_INSTANCE_INITIALIZER;
-base::LazyInstance<ContentUtilityClient>::DestructorAtExit
-    g_empty_content_utility_client = LAZY_INSTANCE_INITIALIZER;
-#endif  // !CHROME_MULTIPLE_DLL_BROWSER
-
-class ContentClientInitializer {
- public:
-  static void Set(const std::string& process_type,
-                  ContentMainDelegate* delegate) {
-    ContentClient* content_client = GetContentClient();
-#if !defined(CHROME_MULTIPLE_DLL_CHILD)
-    if (process_type.empty()) {
-      if (delegate)
-        content_client->browser_ = delegate->CreateContentBrowserClient();
-      if (!content_client->browser_)
-        content_client->browser_ = &g_empty_content_browser_client.Get();
-    }
-#endif  // !CHROME_MULTIPLE_DLL_CHILD
-
-#if !defined(CHROME_MULTIPLE_DLL_BROWSER)
-    base::CommandLine* cmd = base::CommandLine::ForCurrentProcess();
-    if (process_type == switches::kGpuProcess ||
-        cmd->HasSwitch(switches::kSingleProcess) ||
-        (process_type.empty() && cmd->HasSwitch(switches::kInProcessGPU))) {
-      if (delegate)
-        content_client->gpu_ = delegate->CreateContentGpuClient();
-      if (!content_client->gpu_)
-        content_client->gpu_ = &g_empty_content_gpu_client.Get();
-    }
-
-    if (process_type == switches::kRendererProcess ||
-        cmd->HasSwitch(switches::kSingleProcess)) {
-      if (delegate)
-        content_client->renderer_ = delegate->CreateContentRendererClient();
-      if (!content_client->renderer_)
-        content_client->renderer_ = &g_empty_content_renderer_client.Get();
-    }
-
-    if (process_type == switches::kUtilityProcess ||
-        cmd->HasSwitch(switches::kSingleProcess)) {
-      if (delegate)
-        content_client->utility_ = delegate->CreateContentUtilityClient();
-      // TODO(scottmg): http://crbug.com/237249 Should be in _child.
-      if (!content_client->utility_)
-        content_client->utility_ = &g_empty_content_utility_client.Get();
-    }
-#endif  // !CHROME_MULTIPLE_DLL_BROWSER
-  }
-};
-
-// We dispatch to a process-type-specific FooMain() based on a command-line
-// flag.  This struct is used to build a table of (flag, main function) pairs.
-struct MainFunction {
-  const char* name;
-  int (*function)(const MainFunctionParams&);
-};
-
-#if BUILDFLAG(USE_ZYGOTE_HANDLE)
-// On platforms that use the zygote, we have a special subset of
-// subprocesses that are launched via the zygote.  This function
-// fills in some process-launching bits around ZygoteMain().
-// Returns the exit code of the subprocess.
-int RunZygote(ContentMainDelegate* delegate) {
-  static const MainFunction kMainFunctions[] = {
-    {switches::kRendererProcess, RendererMain},
-    {switches::kUtilityProcess, UtilityMain},
-#if BUILDFLAG(ENABLE_PLUGINS)
-    {switches::kPpapiPluginProcess, PpapiPluginMain},
-#endif
-  };
-
-  std::vector<std::unique_ptr<ZygoteForkDelegate>> zygote_fork_delegates;
-  if (delegate) {
-    delegate->ZygoteStarting(&zygote_fork_delegates);
-    media::InitializeMediaLibrary();
-  }
-
-#if defined(OS_LINUX)
-  PreSandboxInit();
-#endif
-
-  // This function call can return multiple times, once per fork().
-  if (!ZygoteMain(std::move(zygote_fork_delegates)))
-    return 1;
-
-  if (delegate)
-    delegate->ZygoteForked();
-
-  // Zygote::HandleForkRequest may have reallocated the command
-  // line so update it here with the new version.
-  const base::CommandLine& command_line =
-      *base::CommandLine::ForCurrentProcess();
-  std::string process_type =
-      command_line.GetSwitchValueASCII(switches::kProcessType);
-  ContentClientInitializer::Set(process_type, delegate);
-
-#if !defined(OS_ANDROID)
-  tracing::EnableStartupTracingIfNeeded();
-#endif  // !OS_ANDROID
-
-  MainFunctionParams main_params(command_line);
-  main_params.zygote_child = true;
-
-  std::unique_ptr<base::FieldTrialList> field_trial_list;
-  InitializeFieldTrialAndFeatureList(&field_trial_list);
-
-  service_manager::SandboxType sandbox_type =
-      service_manager::SandboxTypeFromCommandLine(command_line);
-  if (sandbox_type == service_manager::SANDBOX_TYPE_PROFILING)
-    sandbox::SetUseLocaltimeOverride(false);
-
-  for (size_t i = 0; i < arraysize(kMainFunctions); ++i) {
-    if (process_type == kMainFunctions[i].name)
-      return kMainFunctions[i].function(main_params);
-  }
-
-  if (delegate)
-    return delegate->RunProcess(process_type, main_params);
-
-  NOTREACHED() << "Unknown zygote process type: " << process_type;
-  return 1;
-}
-#endif  // BUILDFLAG(USE_ZYGOTE_HANDLE)
-
-static void RegisterMainThreadFactories() {
-#if !defined(CHROME_MULTIPLE_DLL_BROWSER) && !defined(CHROME_MULTIPLE_DLL_CHILD)
-  UtilityProcessHost::RegisterUtilityMainThreadFactory(
-      CreateInProcessUtilityThread);
-  RenderProcessHostImpl::RegisterRendererMainThreadFactory(
-      CreateInProcessRendererThread);
-  content::RegisterGpuMainThreadFactory(CreateInProcessGpuThread);
-#else
-  base::CommandLine& command_line = *base::CommandLine::ForCurrentProcess();
-  if (command_line.HasSwitch(switches::kSingleProcess)) {
-    LOG(FATAL) <<
-        "--single-process is not supported in chrome multiple dll browser.";
-  }
-  if (command_line.HasSwitch(switches::kInProcessGPU)) {
-    LOG(FATAL) <<
-        "--in-process-gpu is not supported in chrome multiple dll browser.";
-  }
-#endif  // !CHROME_MULTIPLE_DLL_BROWSER && !CHROME_MULTIPLE_DLL_CHILD
-}
-
-// Run the FooMain() for a given process type.
-// If |process_type| is empty, runs BrowserMain().
-// Returns the exit code for this process.
-int RunNamedProcessTypeMain(
-    const std::string& process_type,
-    const MainFunctionParams& main_function_params,
-    ContentMainDelegate* delegate) {
-  static const MainFunction kMainFunctions[] = {
-#if !defined(CHROME_MULTIPLE_DLL_CHILD)
-    { "",                            BrowserMain },
-#endif
-#if !defined(CHROME_MULTIPLE_DLL_BROWSER)
-#if BUILDFLAG(ENABLE_PLUGINS)
-    { switches::kPpapiPluginProcess, PpapiPluginMain },
-    { switches::kPpapiBrokerProcess, PpapiBrokerMain },
-#endif  // ENABLE_PLUGINS
-    { switches::kUtilityProcess,     UtilityMain },
-    { switches::kRendererProcess,    RendererMain },
-    { switches::kGpuProcess,         GpuMain },
-#endif  // !CHROME_MULTIPLE_DLL_BROWSER
-  };
-
-  RegisterMainThreadFactories();
-
-  for (size_t i = 0; i < arraysize(kMainFunctions); ++i) {
-    if (process_type == kMainFunctions[i].name) {
-      if (delegate) {
-        int exit_code = delegate->RunProcess(process_type,
-            main_function_params);
-#if defined(OS_ANDROID)
-        // In Android's browser process, the negative exit code doesn't mean the
-        // default behavior should be used as the UI message loop is managed by
-        // the Java and the browser process's default behavior is always
-        // overridden.
-        if (process_type.empty())
-          return exit_code;
-#endif
-        if (exit_code >= 0)
-          return exit_code;
-      }
-      return kMainFunctions[i].function(main_function_params);
-    }
-  }
-
-#if BUILDFLAG(USE_ZYGOTE_HANDLE)
-  // Zygote startup is special -- see RunZygote comments above
-  // for why we don't use ZygoteMain directly.
-  if (process_type == switches::kZygoteProcess
-#if defined(OS_TIZEN) && !defined(OS_TIZEN_TV_PRODUCT)
-      && !base::CommandLine::ForCurrentProcess()->HasSwitch(
-             switches::kSingleProcess)
-#endif
-          )
-    return RunZygote(delegate);
-#endif  // BUILDFLAG(USE_ZYGOTE_HANDLE)
-
-  // If it's a process we don't know about, the embedder should know.
-  if (delegate)
-    return delegate->RunProcess(process_type, main_function_params);
-
-  NOTREACHED() << "Unknown process type: " << process_type;
-  return 1;
-}
-
-class ContentMainRunnerImpl : public ContentMainRunner {
- public:
-  ContentMainRunnerImpl() {
-#if defined(OS_WIN)
-    memset(&sandbox_info_, 0, sizeof(sandbox_info_));
-#endif
-  }
-
-  ~ContentMainRunnerImpl() override {
-    if (is_initialized_ && !is_shutdown_)
-      Shutdown();
-  }
-
-  int TerminateForFatalInitializationError() {
-    if (delegate_)
-      return delegate_->TerminateForFatalInitializationError();
-
-    CHECK(false);
-    return 0;
-  }
-
-  int Initialize(const ContentMainParams& params) override {
-    ui_task_ = params.ui_task;
-    created_main_parts_closure_ = params.created_main_parts_closure;
-
-#if defined(OS_WIN)
-    sandbox_info_ = *params.sandbox_info;
-#else  // !OS_WIN
-
-#if defined(OS_MACOSX)
-    autorelease_pool_ = params.autorelease_pool;
-#endif  // defined(OS_MACOSX)
-
-#if defined(OS_ANDROID)
-    // See note at the initialization of ExitManager, below; basically,
-    // only Android builds have the ctor/dtor handlers set up to use
-    // TRACE_EVENT right away.
-    TRACE_EVENT0("startup,benchmark,rail", "ContentMainRunnerImpl::Initialize");
-#endif  // OS_ANDROID
-
-    base::GlobalDescriptors* g_fds = base::GlobalDescriptors::GetInstance();
-    ALLOW_UNUSED_LOCAL(g_fds);
-
-// On Android, the ipc_fd is passed through the Java service.
-#if !defined(OS_ANDROID)
-    g_fds->Set(kMojoIPCChannel,
-               kMojoIPCChannel + base::GlobalDescriptors::kBaseDescriptor);
-
-    g_fds->Set(
-        kFieldTrialDescriptor,
-        kFieldTrialDescriptor + base::GlobalDescriptors::kBaseDescriptor);
-#endif  // !OS_ANDROID
-
-#if defined(OS_LINUX) || defined(OS_OPENBSD)
-    g_fds->Set(kCrashDumpSignal,
-               kCrashDumpSignal + base::GlobalDescriptors::kBaseDescriptor);
-#endif  // OS_LINUX || OS_OPENBSD
-
-#endif  // !OS_WIN
-
-    is_initialized_ = true;
-    delegate_ = params.delegate;
-
-    // The exit manager is in charge of calling the dtors of singleton objects.
-    // On Android, AtExitManager is set up when library is loaded.
-    // A consequence of this is that you can't use the ctor/dtor-based
-    // TRACE_EVENT methods on Linux or iOS builds till after we set this up.
-#if !defined(OS_ANDROID)
-    if (!ui_task_) {
-      // When running browser tests, don't create a second AtExitManager as that
-      // interfers with shutdown when objects created before ContentMain is
-      // called are destructed when it returns.
-      exit_manager_.reset(new base::AtExitManager);
-    }
-#endif  // !OS_ANDROID
-
-    int exit_code = 0;
-    if (delegate_ && delegate_->BasicStartupComplete(&exit_code))
-      return exit_code;
-
-    completed_basic_startup_ = true;
-
-    const base::CommandLine& command_line =
-        *base::CommandLine::ForCurrentProcess();
-    std::string process_type =
-        command_line.GetSwitchValueASCII(switches::kProcessType);
-
-#if defined(OS_WIN)
-    if (command_line.HasSwitch(switches::kDeviceScaleFactor)) {
-      std::string scale_factor_string = command_line.GetSwitchValueASCII(
-          switches::kDeviceScaleFactor);
-      double scale_factor = 0;
-      if (base::StringToDouble(scale_factor_string, &scale_factor))
-        display::win::SetDefaultDeviceScaleFactor(scale_factor);
-    }
-#endif
-
-    if (!GetContentClient())
-      SetContentClient(&empty_content_client_);
-    ContentClientInitializer::Set(process_type, delegate_);
-
-#if !defined(OS_ANDROID)
-    // Enable startup tracing asap to avoid early TRACE_EVENT calls being
-    // ignored. For Android, startup tracing is enabled in an even earlier place
-    // content/app/android/library_loader_hooks.cc.
-    //
-    // Startup tracing flags are not (and should not) passed to Zygote
-    // processes. We will enable tracing when forked, if needed.
-    if (process_type != switches::kZygoteProcess)
-      tracing::EnableStartupTracingIfNeeded();
-#endif  // !OS_ANDROID
-
-#if defined(OS_WIN)
-    // Enable exporting of events to ETW if requested on the command line.
-    if (command_line.HasSwitch(switches::kTraceExportEventsToETW))
-      base::trace_event::TraceEventETWExport::EnableETWExport();
-#endif  // OS_WIN
-
-#if !defined(OS_ANDROID)
-    // Android tracing started at the beginning of the method.
-    // Other OSes have to wait till we get here in order for all the memory
-    // management setup to be completed.
-    TRACE_EVENT0("startup,benchmark,rail", "ContentMainRunnerImpl::Initialize");
-#endif  // !OS_ANDROID
-
-#if defined(OS_MACOSX)
-    // We need to allocate the IO Ports before the Sandbox is initialized or
-    // the first instance of PowerMonitor is created.
-    // It's important not to allocate the ports for processes which don't
-    // register with the power monitor - see crbug.com/88867.
-    if (process_type.empty() ||
-        (delegate_ &&
-         delegate_->ProcessRegistersWithSystemProcess(process_type))) {
-      base::PowerMonitorDeviceSource::AllocateSystemIOPorts();
-    }
-
-    if (!process_type.empty() &&
-        (!delegate_ || delegate_->ShouldSendMachPort(process_type))) {
-      MachBroker::ChildSendTaskPortToParent();
-    }
-#endif
-
-    // If we are on a platform where the default allocator is overridden (shim
-    // layer on windows, tcmalloc on Linux Desktop) smoke-tests that the
-    // overriding logic is working correctly. If not causes a hard crash, as its
-    // unexpected absence has security implications.
-    CHECK(base::allocator::IsAllocatorInitialized());
-
-#if defined(OS_POSIX)
-    if (!process_type.empty()) {
-      // When you hit Ctrl-C in a terminal running the browser
-      // process, a SIGINT is delivered to the entire process group.
-      // When debugging the browser process via gdb, gdb catches the
-      // SIGINT for the browser process (and dumps you back to the gdb
-      // console) but doesn't for the child processes, killing them.
-      // The fix is to have child processes ignore SIGINT; they'll die
-      // on their own when the browser process goes away.
-      //
-      // Note that we *can't* rely on BeingDebugged to catch this case because
-      // we are the child process, which is not being debugged.
-      // TODO(evanm): move this to some shared subprocess-init function.
-      if (!base::debug::BeingDebugged())
-        signal(SIGINT, SIG_IGN);
-    }
-#endif
-
-    RegisterPathProvider();
-    RegisterContentSchemes(true);
-
-#if defined(OS_ANDROID) && (ICU_UTIL_DATA_IMPL == ICU_UTIL_DATA_FILE)
-    int icudata_fd = g_fds->MaybeGet(kAndroidICUDataDescriptor);
-    if (icudata_fd != -1) {
-      auto icudata_region = g_fds->GetRegion(kAndroidICUDataDescriptor);
-      if (!base::i18n::InitializeICUWithFileDescriptor(icudata_fd,
-                                                       icudata_region))
-        return TerminateForFatalInitializationError();
-    } else {
-      if (!base::i18n::InitializeICU())
-        return TerminateForFatalInitializationError();
-    }
-#else
-    if (!base::i18n::InitializeICU())
-      return TerminateForFatalInitializationError();
-#endif  // OS_ANDROID && (ICU_UTIL_DATA_IMPL == ICU_UTIL_DATA_FILE)
-
-    InitializeV8IfNeeded(command_line, process_type);
-
-#if !defined(OFFICIAL_BUILD)
-#if defined(OS_WIN)
-    bool should_enable_stack_dump = !process_type.empty();
-#else
-    bool should_enable_stack_dump = true;
-#endif
-    // Print stack traces to stderr when crashes occur. This opens up security
-    // holes so it should never be enabled for official builds. This needs to
-    // happen before crash reporting is initialized (which for chrome happens in
-    // the call to PreSandboxStartup() on the delegate below), because otherwise
-    // this would interfere with signal handlers used by crash reporting.
-    if (should_enable_stack_dump &&
-        !command_line.HasSwitch(
-            service_manager::switches::kDisableInProcessStackTraces)) {
-      base::debug::EnableInProcessStackDumping();
-    }
-#endif  // !defined(OFFICIAL_BUILD)
-
-    if (delegate_)
-      delegate_->PreSandboxStartup();
-
-#if defined(OS_WIN)
-    if (!InitializeSandbox(
-            service_manager::SandboxTypeFromCommandLine(command_line),
-            params.sandbox_info))
-      return TerminateForFatalInitializationError();
-#elif defined(OS_MACOSX)
-    // Do not initialize the sandbox at this point if the V2
-    // sandbox is enabled for the process type.
-    bool v2_enabled = base::CommandLine::ForCurrentProcess()->HasSwitch(
-        switches::kEnableV2Sandbox);
-
-    if (process_type == switches::kRendererProcess ||
-        process_type == switches::kPpapiPluginProcess || v2_enabled ||
-        (delegate_ && delegate_->DelaySandboxInitialization(process_type))) {
-      // On OS X the renderer sandbox needs to be initialized later in the
-      // startup sequence in RendererMainPlatformDelegate::EnableSandbox().
-    } else {
-      if (!InitializeSandbox())
-        return TerminateForFatalInitializationError();
-    }
-#endif
-
-    if (delegate_)
-      delegate_->SandboxInitialized(process_type);
-
-#if BUILDFLAG(USE_ZYGOTE_HANDLE)
-    if (process_type.empty()) {
-      // The sandbox host needs to be initialized before forking a thread to
-      // start the ServiceManager, and after setting up the sandbox and invoking
-      // SandboxInitialized().
-      InitializeZygoteSandboxForBrowserProcess(
-          *base::CommandLine::ForCurrentProcess());
-    }
-#endif  // BUILDFLAG(USE_ZYGOTE_HANDLE)
-
-    // Return -1 to indicate no early termination.
-    return -1;
-  }
-
-  int Run() override {
-    DCHECK(is_initialized_);
-    DCHECK(!is_shutdown_);
-    const base::CommandLine& command_line =
-        *base::CommandLine::ForCurrentProcess();
-    std::string process_type =
-        command_line.GetSwitchValueASCII(switches::kProcessType);
-
-    // Run this logic on all child processes. Zygotes will run this at a later
-    // point in time when the command line has been updated.
-    std::unique_ptr<base::FieldTrialList> field_trial_list;
-    if (!process_type.empty() && process_type != switches::kZygoteProcess)
-      InitializeFieldTrialAndFeatureList(&field_trial_list);
-
-    MainFunctionParams main_params(command_line);
-    main_params.ui_task = ui_task_;
-    main_params.created_main_parts_closure = created_main_parts_closure_;
-#if defined(OS_WIN)
-    main_params.sandbox_info = &sandbox_info_;
-#elif defined(OS_MACOSX)
-    main_params.autorelease_pool = autorelease_pool_;
-#endif
-
-    return RunNamedProcessTypeMain(process_type, main_params, delegate_);
-  }
-
-  void Shutdown() override {
-    DCHECK(is_initialized_);
-    DCHECK(!is_shutdown_);
-
-    if (completed_basic_startup_ && delegate_) {
-      const base::CommandLine& command_line =
-          *base::CommandLine::ForCurrentProcess();
-      std::string process_type =
-          command_line.GetSwitchValueASCII(switches::kProcessType);
-
-      delegate_->ProcessExiting(process_type);
-    }
-
-#if defined(OS_WIN)
-#ifdef _CRTDBG_MAP_ALLOC
-    _CrtDumpMemoryLeaks();
-#endif  // _CRTDBG_MAP_ALLOC
-#endif  // OS_WIN
-
-    exit_manager_.reset(nullptr);
-
-    delegate_ = nullptr;
-    is_shutdown_ = true;
-  }
-
- private:
-  // True if the runner has been initialized.
-  bool is_initialized_ = false;
-
-  // True if the runner has been shut down.
-  bool is_shutdown_ = false;
-
-  // True if basic startup was completed.
-  bool completed_basic_startup_ = false;
-
-  // Used if the embedder doesn't set one.
-  ContentClient empty_content_client_;
-
-  // The delegate will outlive this object.
-  ContentMainDelegate* delegate_ = nullptr;
-
-  std::unique_ptr<base::AtExitManager> exit_manager_;
-#if defined(OS_WIN)
-  sandbox::SandboxInterfaceInfo sandbox_info_;
-#elif defined(OS_MACOSX)
-  base::mac::ScopedNSAutoreleasePool* autorelease_pool_ = nullptr;
-#endif
-
-  base::Closure* ui_task_ = nullptr;
-
-  CreatedMainPartsClosure* created_main_parts_closure_ = nullptr;
-
-  DISALLOW_COPY_AND_ASSIGN(ContentMainRunnerImpl);
-};
-
-// static
-ContentMainRunner* ContentMainRunner::Create() {
-  return new ContentMainRunnerImpl();
-}
-
-}  // namespace content