• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 // Represents the browser side of the browser <--> renderer communication
6 // channel. There will be one RenderProcessHost per renderer process.
7 
8 #include "content/browser/renderer_host/render_process_host_impl.h"
9 
10 #include <algorithm>
11 #include <limits>
12 #include <vector>
13 
14 #if defined(OS_POSIX)
15 #include <utility>  // for pair<>
16 #endif
17 
18 #include "base/base_switches.h"
19 #include "base/bind.h"
20 #include "base/bind_helpers.h"
21 #include "base/callback.h"
22 #include "base/command_line.h"
23 #include "base/debug/trace_event.h"
24 #include "base/files/file.h"
25 #include "base/lazy_instance.h"
26 #include "base/logging.h"
27 #include "base/metrics/field_trial.h"
28 #include "base/metrics/histogram.h"
29 #include "base/numerics/safe_math.h"
30 #include "base/path_service.h"
31 #include "base/rand_util.h"
32 #include "base/stl_util.h"
33 #include "base/strings/string_number_conversions.h"
34 #include "base/strings/string_util.h"
35 #include "base/supports_user_data.h"
36 #include "base/sys_info.h"
37 #include "base/threading/thread.h"
38 #include "base/threading/thread_restrictions.h"
39 #include "base/tracked_objects.h"
40 #include "cc/base/switches.h"
41 #include "content/browser/appcache/appcache_dispatcher_host.h"
42 #include "content/browser/appcache/chrome_appcache_service.h"
43 #include "content/browser/battery_status/battery_status_message_filter.h"
44 #include "content/browser/browser_child_process_host_impl.h"
45 #include "content/browser/browser_main.h"
46 #include "content/browser/browser_main_loop.h"
47 #include "content/browser/browser_plugin/browser_plugin_message_filter.h"
48 #include "content/browser/child_process_security_policy_impl.h"
49 #include "content/browser/device_sensors/device_motion_message_filter.h"
50 #include "content/browser/device_sensors/device_orientation_message_filter.h"
51 #include "content/browser/dom_storage/dom_storage_context_wrapper.h"
52 #include "content/browser/dom_storage/dom_storage_message_filter.h"
53 #include "content/browser/download/mhtml_generation_manager.h"
54 #include "content/browser/fileapi/chrome_blob_storage_context.h"
55 #include "content/browser/fileapi/fileapi_message_filter.h"
56 #include "content/browser/frame_host/render_frame_message_filter.h"
57 #include "content/browser/gpu/compositor_util.h"
58 #include "content/browser/gpu/gpu_data_manager_impl.h"
59 #include "content/browser/gpu/gpu_process_host.h"
60 #include "content/browser/gpu/shader_disk_cache.h"
61 #include "content/browser/histogram_message_filter.h"
62 #include "content/browser/indexed_db/indexed_db_context_impl.h"
63 #include "content/browser/indexed_db/indexed_db_dispatcher_host.h"
64 #include "content/browser/loader/resource_message_filter.h"
65 #include "content/browser/loader/resource_scheduler_filter.h"
66 #include "content/browser/media/capture/audio_mirroring_manager.h"
67 #include "content/browser/media/media_internals.h"
68 #include "content/browser/media/midi_host.h"
69 #include "content/browser/message_port_message_filter.h"
70 #include "content/browser/mime_registry_message_filter.h"
71 #include "content/browser/mojo/mojo_application_host.h"
72 #include "content/browser/plugin_service_impl.h"
73 #include "content/browser/profiler_message_filter.h"
74 #include "content/browser/push_messaging_message_filter.h"
75 #include "content/browser/quota_dispatcher_host.h"
76 #include "content/browser/renderer_host/clipboard_message_filter.h"
77 #include "content/browser/renderer_host/database_message_filter.h"
78 #include "content/browser/renderer_host/file_utilities_message_filter.h"
79 #include "content/browser/renderer_host/gamepad_browser_message_filter.h"
80 #include "content/browser/renderer_host/gpu_message_filter.h"
81 #include "content/browser/renderer_host/media/audio_input_renderer_host.h"
82 #include "content/browser/renderer_host/media/audio_renderer_host.h"
83 #include "content/browser/renderer_host/media/device_request_message_filter.h"
84 #include "content/browser/renderer_host/media/media_stream_dispatcher_host.h"
85 #include "content/browser/renderer_host/media/peer_connection_tracker_host.h"
86 #include "content/browser/renderer_host/media/video_capture_host.h"
87 #include "content/browser/renderer_host/memory_benchmark_message_filter.h"
88 #include "content/browser/renderer_host/p2p/socket_dispatcher_host.h"
89 #include "content/browser/renderer_host/pepper/pepper_message_filter.h"
90 #include "content/browser/renderer_host/pepper/pepper_renderer_connection.h"
91 #include "content/browser/renderer_host/render_message_filter.h"
92 #include "content/browser/renderer_host/render_view_host_delegate.h"
93 #include "content/browser/renderer_host/render_view_host_impl.h"
94 #include "content/browser/renderer_host/render_widget_helper.h"
95 #include "content/browser/renderer_host/render_widget_host_impl.h"
96 #include "content/browser/renderer_host/socket_stream_dispatcher_host.h"
97 #include "content/browser/renderer_host/text_input_client_message_filter.h"
98 #include "content/browser/renderer_host/websocket_dispatcher_host.h"
99 #include "content/browser/resolve_proxy_msg_helper.h"
100 #include "content/browser/service_worker/service_worker_context_wrapper.h"
101 #include "content/browser/service_worker/service_worker_dispatcher_host.h"
102 #include "content/browser/shared_worker/shared_worker_message_filter.h"
103 #include "content/browser/speech/speech_recognition_dispatcher_host.h"
104 #include "content/browser/storage_partition_impl.h"
105 #include "content/browser/streams/stream_context.h"
106 #include "content/browser/tracing/trace_message_filter.h"
107 #include "content/browser/vibration/vibration_message_filter.h"
108 #include "content/browser/webui/web_ui_controller_factory_registry.h"
109 #include "content/browser/worker_host/worker_message_filter.h"
110 #include "content/browser/worker_host/worker_storage_partition.h"
111 #include "content/common/child_process_host_impl.h"
112 #include "content/common/child_process_messages.h"
113 #include "content/common/content_switches_internal.h"
114 #include "content/common/gpu/client/gpu_memory_buffer_impl.h"
115 #include "content/common/gpu/client/gpu_memory_buffer_impl_shm.h"
116 #include "content/common/gpu/gpu_messages.h"
117 #include "content/common/mojo/mojo_messages.h"
118 #include "content/common/resource_messages.h"
119 #include "content/common/view_messages.h"
120 #include "content/public/browser/browser_context.h"
121 #include "content/public/browser/content_browser_client.h"
122 #include "content/public/browser/notification_service.h"
123 #include "content/public/browser/notification_types.h"
124 #include "content/public/browser/render_process_host_factory.h"
125 #include "content/public/browser/render_process_host_observer.h"
126 #include "content/public/browser/render_widget_host.h"
127 #include "content/public/browser/render_widget_host_iterator.h"
128 #include "content/public/browser/render_widget_host_view_frame_subscriber.h"
129 #include "content/public/browser/resource_context.h"
130 #include "content/public/browser/user_metrics.h"
131 #include "content/public/browser/worker_service.h"
132 #include "content/public/common/content_constants.h"
133 #include "content/public/common/content_switches.h"
134 #include "content/public/common/process_type.h"
135 #include "content/public/common/result_codes.h"
136 #include "content/public/common/sandboxed_process_launcher_delegate.h"
137 #include "content/public/common/url_constants.h"
138 #include "gpu/command_buffer/service/gpu_switches.h"
139 #include "ipc/ipc_channel.h"
140 #include "ipc/ipc_logging.h"
141 #include "ipc/ipc_switches.h"
142 #include "media/base/media_switches.h"
143 #include "mojo/common/common_type_converters.h"
144 #include "net/url_request/url_request_context_getter.h"
145 #include "ppapi/shared_impl/ppapi_switches.h"
146 #include "third_party/skia/include/core/SkBitmap.h"
147 #include "ui/base/ui_base_switches.h"
148 #include "ui/events/event_switches.h"
149 #include "ui/gfx/switches.h"
150 #include "ui/gl/gl_switches.h"
151 #include "ui/native_theme/native_theme_switches.h"
152 #include "webkit/browser/fileapi/sandbox_file_system_backend.h"
153 #include "webkit/common/resource_type.h"
154 
155 #if defined(OS_ANDROID)
156 #include "content/browser/media/android/browser_demuxer_android.h"
157 #include "content/browser/renderer_host/compositor_impl_android.h"
158 #include "content/common/gpu/client/gpu_memory_buffer_impl_surface_texture.h"
159 #endif
160 
161 #if defined(OS_MACOSX)
162 #include "content/common/gpu/client/gpu_memory_buffer_impl_io_surface.h"
163 #endif
164 
165 #if defined(OS_WIN)
166 #include "base/strings/string_number_conversions.h"
167 #include "base/win/scoped_com_initializer.h"
168 #include "content/common/font_cache_dispatcher_win.h"
169 #include "content/common/sandbox_win.h"
170 #include "ui/gfx/win/dpi.h"
171 #endif
172 
173 #if defined(OS_MACOSX)
174 #include "content/public/common/sandbox_type_mac.h"
175 #endif
176 
177 #if defined(ENABLE_WEBRTC)
178 #include "content/browser/media/webrtc_internals.h"
179 #include "content/browser/renderer_host/media/media_stream_track_metrics_host.h"
180 #include "content/browser/renderer_host/media/webrtc_identity_service_host.h"
181 #include "content/common/media/aec_dump_messages.h"
182 #include "content/common/media/media_stream_messages.h"
183 #endif
184 
185 extern bool g_exited_main_message_loop;
186 
187 static const char* kSiteProcessMapKeyName = "content_site_process_map";
188 
189 namespace content {
190 namespace {
191 
CacheShaderInfo(int32 id,base::FilePath path)192 void CacheShaderInfo(int32 id, base::FilePath path) {
193   ShaderCacheFactory::GetInstance()->SetCacheInfo(id, path);
194 }
195 
RemoveShaderInfo(int32 id)196 void RemoveShaderInfo(int32 id) {
197   ShaderCacheFactory::GetInstance()->RemoveCacheInfo(id);
198 }
199 
GetRequestContext(scoped_refptr<net::URLRequestContextGetter> request_context,scoped_refptr<net::URLRequestContextGetter> media_request_context,ResourceType::Type resource_type)200 net::URLRequestContext* GetRequestContext(
201     scoped_refptr<net::URLRequestContextGetter> request_context,
202     scoped_refptr<net::URLRequestContextGetter> media_request_context,
203     ResourceType::Type resource_type) {
204   // If the request has resource type of ResourceType::MEDIA, we use a request
205   // context specific to media for handling it because these resources have
206   // specific needs for caching.
207   if (resource_type == ResourceType::MEDIA)
208     return media_request_context->GetURLRequestContext();
209   return request_context->GetURLRequestContext();
210 }
211 
GetContexts(ResourceContext * resource_context,scoped_refptr<net::URLRequestContextGetter> request_context,scoped_refptr<net::URLRequestContextGetter> media_request_context,const ResourceHostMsg_Request & request,ResourceContext ** resource_context_out,net::URLRequestContext ** request_context_out)212 void GetContexts(
213     ResourceContext* resource_context,
214     scoped_refptr<net::URLRequestContextGetter> request_context,
215     scoped_refptr<net::URLRequestContextGetter> media_request_context,
216     const ResourceHostMsg_Request& request,
217     ResourceContext** resource_context_out,
218     net::URLRequestContext** request_context_out) {
219   *resource_context_out = resource_context;
220   *request_context_out =
221       GetRequestContext(request_context, media_request_context,
222                         request.resource_type);
223 }
224 
225 #if defined(ENABLE_WEBRTC)
226 // Creates a file used for diagnostic echo canceller recordings for handing
227 // over to the renderer.
CreateAecDumpFileForProcess(base::FilePath file_path,base::ProcessHandle process)228 IPC::PlatformFileForTransit CreateAecDumpFileForProcess(
229     base::FilePath file_path,
230     base::ProcessHandle process) {
231   DCHECK_CURRENTLY_ON(BrowserThread::FILE);
232   base::File dump_file(file_path,
233                        base::File::FLAG_OPEN_ALWAYS | base::File::FLAG_APPEND);
234   if (!dump_file.IsValid()) {
235     VLOG(1) << "Could not open AEC dump file, error=" <<
236                dump_file.error_details();
237     return IPC::InvalidPlatformFileForTransit();
238   }
239   return IPC::TakeFileHandleForProcess(dump_file.Pass(), process);
240 }
241 
242 // Does nothing. Just to avoid races between enable and disable.
DisableAecDumpOnFileThread()243 void DisableAecDumpOnFileThread() {
244   DCHECK_CURRENTLY_ON(BrowserThread::FILE);
245 }
246 #endif
247 
248 // the global list of all renderer processes
249 base::LazyInstance<IDMap<RenderProcessHost> >::Leaky
250     g_all_hosts = LAZY_INSTANCE_INITIALIZER;
251 
252 // Map of site to process, to ensure we only have one RenderProcessHost per
253 // site in process-per-site mode.  Each map is specific to a BrowserContext.
254 class SiteProcessMap : public base::SupportsUserData::Data {
255  public:
256   typedef base::hash_map<std::string, RenderProcessHost*> SiteToProcessMap;
SiteProcessMap()257   SiteProcessMap() {}
258 
RegisterProcess(const std::string & site,RenderProcessHost * process)259   void RegisterProcess(const std::string& site, RenderProcessHost* process) {
260     map_[site] = process;
261   }
262 
FindProcess(const std::string & site)263   RenderProcessHost* FindProcess(const std::string& site) {
264     SiteToProcessMap::iterator i = map_.find(site);
265     if (i != map_.end())
266       return i->second;
267     return NULL;
268   }
269 
RemoveProcess(RenderProcessHost * host)270   void RemoveProcess(RenderProcessHost* host) {
271     // Find all instances of this process in the map, then separately remove
272     // them.
273     std::set<std::string> sites;
274     for (SiteToProcessMap::const_iterator i = map_.begin();
275          i != map_.end();
276          i++) {
277       if (i->second == host)
278         sites.insert(i->first);
279     }
280     for (std::set<std::string>::iterator i = sites.begin();
281          i != sites.end();
282          i++) {
283       SiteToProcessMap::iterator iter = map_.find(*i);
284       if (iter != map_.end()) {
285         DCHECK_EQ(iter->second, host);
286         map_.erase(iter);
287       }
288     }
289   }
290 
291  private:
292   SiteToProcessMap map_;
293 };
294 
295 // Find the SiteProcessMap specific to the given context.
GetSiteProcessMapForBrowserContext(BrowserContext * context)296 SiteProcessMap* GetSiteProcessMapForBrowserContext(BrowserContext* context) {
297   DCHECK(context);
298   SiteProcessMap* map = static_cast<SiteProcessMap*>(
299       context->GetUserData(kSiteProcessMapKeyName));
300   if (!map) {
301     map = new SiteProcessMap();
302     context->SetUserData(kSiteProcessMapKeyName, map);
303   }
304   return map;
305 }
306 
307 // NOTE: changes to this class need to be reviewed by the security team.
308 class RendererSandboxedProcessLauncherDelegate
309     : public content::SandboxedProcessLauncherDelegate {
310  public:
RendererSandboxedProcessLauncherDelegate(IPC::ChannelProxy * channel)311   RendererSandboxedProcessLauncherDelegate(IPC::ChannelProxy* channel)
312 #if defined(OS_POSIX)
313        : ipc_fd_(channel->TakeClientFileDescriptor())
314 #endif  // OS_POSIX
315   {}
316 
~RendererSandboxedProcessLauncherDelegate()317   virtual ~RendererSandboxedProcessLauncherDelegate() {}
318 
319 #if defined(OS_WIN)
PreSpawnTarget(sandbox::TargetPolicy * policy,bool * success)320   virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
321                               bool* success) {
322     AddBaseHandleClosePolicy(policy);
323     GetContentClient()->browser()->PreSpawnRenderer(policy, success);
324   }
325 
326 #elif defined(OS_POSIX)
ShouldUseZygote()327   virtual bool ShouldUseZygote() OVERRIDE {
328     const CommandLine& browser_command_line = *CommandLine::ForCurrentProcess();
329     CommandLine::StringType renderer_prefix =
330         browser_command_line.GetSwitchValueNative(switches::kRendererCmdPrefix);
331     return renderer_prefix.empty();
332   }
GetIpcFd()333   virtual int GetIpcFd() OVERRIDE {
334     return ipc_fd_;
335   }
336 #if defined(OS_MACOSX)
GetSandboxType()337   virtual SandboxType GetSandboxType() OVERRIDE {
338     return SANDBOX_TYPE_RENDERER;
339   }
340 #endif
341 #endif  // OS_WIN
342 
343  private:
344 #if defined(OS_POSIX)
345   int ipc_fd_;
346 #endif  // OS_POSIX
347 };
348 
349 #if defined(OS_MACOSX)
AddBooleanValue(CFMutableDictionaryRef dictionary,const CFStringRef key,bool value)350 void AddBooleanValue(CFMutableDictionaryRef dictionary,
351                      const CFStringRef key,
352                      bool value) {
353   CFDictionaryAddValue(
354       dictionary, key, value ? kCFBooleanTrue : kCFBooleanFalse);
355 }
356 
AddIntegerValue(CFMutableDictionaryRef dictionary,const CFStringRef key,int32 value)357 void AddIntegerValue(CFMutableDictionaryRef dictionary,
358                      const CFStringRef key,
359                      int32 value) {
360   base::ScopedCFTypeRef<CFNumberRef> number(
361       CFNumberCreate(NULL, kCFNumberSInt32Type, &value));
362   CFDictionaryAddValue(dictionary, key, number.get());
363 }
364 #endif
365 
366 const char kSessionStorageHolderKey[] = "kSessionStorageHolderKey";
367 
368 class SessionStorageHolder : public base::SupportsUserData::Data {
369  public:
SessionStorageHolder()370   SessionStorageHolder() {}
~SessionStorageHolder()371   virtual ~SessionStorageHolder() {}
372 
Hold(const SessionStorageNamespaceMap & sessions,int view_route_id)373   void Hold(const SessionStorageNamespaceMap& sessions, int view_route_id) {
374     session_storage_namespaces_awaiting_close_[view_route_id] = sessions;
375   }
376 
Release(int old_route_id)377   void Release(int old_route_id) {
378     session_storage_namespaces_awaiting_close_.erase(old_route_id);
379   }
380 
381  private:
382   std::map<int, SessionStorageNamespaceMap >
383       session_storage_namespaces_awaiting_close_;
384   DISALLOW_COPY_AND_ASSIGN(SessionStorageHolder);
385 };
386 
387 }  // namespace
388 
389 RendererMainThreadFactoryFunction g_renderer_main_thread_factory = NULL;
390 
391 base::MessageLoop* g_in_process_thread;
392 
393 base::MessageLoop*
GetInProcessRendererThreadForTesting()394     RenderProcessHostImpl::GetInProcessRendererThreadForTesting() {
395   return g_in_process_thread;
396 }
397 
398 // Stores the maximum number of renderer processes the content module can
399 // create.
400 static size_t g_max_renderer_count_override = 0;
401 
402 // static
GetMaxRendererProcessCount()403 size_t RenderProcessHost::GetMaxRendererProcessCount() {
404   if (g_max_renderer_count_override)
405     return g_max_renderer_count_override;
406 
407   // Defines the maximum number of renderer processes according to the
408   // amount of installed memory as reported by the OS. The calculation
409   // assumes that you want the renderers to use half of the installed
410   // RAM and assuming that each WebContents uses ~40MB.
411   // If you modify this assumption, you need to adjust the
412   // ThirtyFourTabs test to match the expected number of processes.
413   //
414   // With the given amounts of installed memory below on a 32-bit CPU,
415   // the maximum renderer count will roughly be as follows:
416   //
417   //   128 MB -> 3
418   //   512 MB -> 6
419   //  1024 MB -> 12
420   //  4096 MB -> 51
421   // 16384 MB -> 82 (kMaxRendererProcessCount)
422 
423   static size_t max_count = 0;
424   if (!max_count) {
425     const size_t kEstimatedWebContentsMemoryUsage =
426 #if defined(ARCH_CPU_64_BITS)
427         60;  // In MB
428 #else
429         40;  // In MB
430 #endif
431     max_count = base::SysInfo::AmountOfPhysicalMemoryMB() / 2;
432     max_count /= kEstimatedWebContentsMemoryUsage;
433 
434     const size_t kMinRendererProcessCount = 3;
435     max_count = std::max(max_count, kMinRendererProcessCount);
436     max_count = std::min(max_count, kMaxRendererProcessCount);
437   }
438   return max_count;
439 }
440 
441 // static
442 bool g_run_renderer_in_process_ = false;
443 
444 // static
SetMaxRendererProcessCount(size_t count)445 void RenderProcessHost::SetMaxRendererProcessCount(size_t count) {
446   g_max_renderer_count_override = count;
447 }
448 
RenderProcessHostImpl(BrowserContext * browser_context,StoragePartitionImpl * storage_partition_impl,bool is_isolated_guest)449 RenderProcessHostImpl::RenderProcessHostImpl(
450     BrowserContext* browser_context,
451     StoragePartitionImpl* storage_partition_impl,
452     bool is_isolated_guest)
453     : fast_shutdown_started_(false),
454       deleting_soon_(false),
455 #ifndef NDEBUG
456       is_self_deleted_(false),
457 #endif
458       pending_views_(0),
459       mojo_activation_required_(false),
460       visible_widgets_(0),
461       backgrounded_(true),
462       is_initialized_(false),
463       id_(ChildProcessHostImpl::GenerateChildProcessUniqueId()),
464       browser_context_(browser_context),
465       storage_partition_impl_(storage_partition_impl),
466       sudden_termination_allowed_(true),
467       ignore_input_events_(false),
468       is_isolated_guest_(is_isolated_guest),
469       gpu_observer_registered_(false),
470       delayed_cleanup_needed_(false),
471       within_process_died_observer_(false),
472       power_monitor_broadcaster_(this),
473       worker_ref_count_(0),
474       weak_factory_(this) {
475   widget_helper_ = new RenderWidgetHelper();
476 
477   ChildProcessSecurityPolicyImpl::GetInstance()->Add(GetID());
478 
479   CHECK(!g_exited_main_message_loop);
480   RegisterHost(GetID(), this);
481   g_all_hosts.Get().set_check_on_null_data(true);
482   // Initialize |child_process_activity_time_| to a reasonable value.
483   mark_child_process_activity_time();
484 
485   if (!GetBrowserContext()->IsOffTheRecord() &&
486       !CommandLine::ForCurrentProcess()->HasSwitch(
487           switches::kDisableGpuShaderDiskCache)) {
488     BrowserThread::PostTask(BrowserThread::IO, FROM_HERE,
489                             base::Bind(&CacheShaderInfo, GetID(),
490                                        storage_partition_impl_->GetPath()));
491   }
492 
493   // Note: When we create the RenderProcessHostImpl, it's technically
494   //       backgrounded, because it has no visible listeners.  But the process
495   //       doesn't actually exist yet, so we'll Background it later, after
496   //       creation.
497 }
498 
499 // static
ShutDownInProcessRenderer()500 void RenderProcessHostImpl::ShutDownInProcessRenderer() {
501   DCHECK(g_run_renderer_in_process_);
502 
503   switch (g_all_hosts.Pointer()->size()) {
504     case 0:
505       return;
506     case 1: {
507       RenderProcessHostImpl* host = static_cast<RenderProcessHostImpl*>(
508           AllHostsIterator().GetCurrentValue());
509       FOR_EACH_OBSERVER(RenderProcessHostObserver,
510                         host->observers_,
511                         RenderProcessHostDestroyed(host));
512 #ifndef NDEBUG
513       host->is_self_deleted_ = true;
514 #endif
515       delete host;
516       return;
517     }
518     default:
519       NOTREACHED() << "There should be only one RenderProcessHost when running "
520                    << "in-process.";
521   }
522 }
523 
RegisterRendererMainThreadFactory(RendererMainThreadFactoryFunction create)524 void RenderProcessHostImpl::RegisterRendererMainThreadFactory(
525     RendererMainThreadFactoryFunction create) {
526   g_renderer_main_thread_factory = create;
527 }
528 
~RenderProcessHostImpl()529 RenderProcessHostImpl::~RenderProcessHostImpl() {
530 #ifndef NDEBUG
531   DCHECK(is_self_deleted_)
532       << "RenderProcessHostImpl is destroyed by something other than itself";
533 #endif
534 
535   // Make sure to clean up the in-process renderer before the channel, otherwise
536   // it may still run and have its IPCs fail, causing asserts.
537   in_process_renderer_.reset();
538 
539   ChildProcessSecurityPolicyImpl::GetInstance()->Remove(GetID());
540 
541   if (gpu_observer_registered_) {
542     GpuDataManagerImpl::GetInstance()->RemoveObserver(this);
543     gpu_observer_registered_ = false;
544   }
545 
546   // We may have some unsent messages at this point, but that's OK.
547   channel_.reset();
548   while (!queued_messages_.empty()) {
549     delete queued_messages_.front();
550     queued_messages_.pop();
551   }
552 
553   UnregisterHost(GetID());
554 
555   if (!CommandLine::ForCurrentProcess()->HasSwitch(
556       switches::kDisableGpuShaderDiskCache)) {
557     BrowserThread::PostTask(BrowserThread::IO, FROM_HERE,
558                             base::Bind(&RemoveShaderInfo, GetID()));
559   }
560 
561 #if defined(OS_ANDROID)
562   CompositorImpl::DestroyAllSurfaceTextures(GetID());
563 #endif
564 }
565 
EnableSendQueue()566 void RenderProcessHostImpl::EnableSendQueue() {
567   is_initialized_ = false;
568 }
569 
Init()570 bool RenderProcessHostImpl::Init() {
571   // calling Init() more than once does nothing, this makes it more convenient
572   // for the view host which may not be sure in some cases
573   if (channel_)
574     return true;
575 
576   CommandLine::StringType renderer_prefix;
577 #if defined(OS_POSIX)
578   // A command prefix is something prepended to the command line of the spawned
579   // process. It is supported only on POSIX systems.
580   const CommandLine& browser_command_line = *CommandLine::ForCurrentProcess();
581   renderer_prefix =
582       browser_command_line.GetSwitchValueNative(switches::kRendererCmdPrefix);
583 #endif  // defined(OS_POSIX)
584 
585 #if defined(OS_LINUX)
586   int flags = renderer_prefix.empty() ? ChildProcessHost::CHILD_ALLOW_SELF :
587                                         ChildProcessHost::CHILD_NORMAL;
588 #else
589   int flags = ChildProcessHost::CHILD_NORMAL;
590 #endif
591 
592   // Find the renderer before creating the channel so if this fails early we
593   // return without creating the channel.
594   base::FilePath renderer_path = ChildProcessHost::GetChildPath(flags);
595   if (renderer_path.empty())
596     return false;
597 
598   // Setup the IPC channel.
599   const std::string channel_id =
600       IPC::Channel::GenerateVerifiedChannelID(std::string());
601   channel_ = IPC::ChannelProxy::Create(
602       channel_id,
603       IPC::Channel::MODE_SERVER,
604       this,
605       BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO).get());
606 
607   // Setup the Mojo channel.
608   mojo_application_host_.reset(new MojoApplicationHost());
609   mojo_application_host_->Init();
610 
611   // Call the embedder first so that their IPC filters have priority.
612   GetContentClient()->browser()->RenderProcessWillLaunch(this);
613 
614   CreateMessageFilters();
615 
616   if (run_renderer_in_process()) {
617     DCHECK(g_renderer_main_thread_factory);
618     // Crank up a thread and run the initialization there.  With the way that
619     // messages flow between the browser and renderer, this thread is required
620     // to prevent a deadlock in single-process mode.  Since the primordial
621     // thread in the renderer process runs the WebKit code and can sometimes
622     // make blocking calls to the UI thread (i.e. this thread), they need to run
623     // on separate threads.
624     in_process_renderer_.reset(g_renderer_main_thread_factory(channel_id));
625 
626     base::Thread::Options options;
627 #if defined(OS_WIN) && !defined(OS_MACOSX)
628     // In-process plugins require this to be a UI message loop.
629     options.message_loop_type = base::MessageLoop::TYPE_UI;
630 #else
631     // We can't have multiple UI loops on Linux and Android, so we don't support
632     // in-process plugins.
633     options.message_loop_type = base::MessageLoop::TYPE_DEFAULT;
634 #endif
635     in_process_renderer_->StartWithOptions(options);
636 
637     g_in_process_thread = in_process_renderer_->message_loop();
638 
639     OnProcessLaunched();  // Fake a callback that the process is ready.
640   } else {
641     // Build command line for renderer.  We call AppendRendererCommandLine()
642     // first so the process type argument will appear first.
643     CommandLine* cmd_line = new CommandLine(renderer_path);
644     if (!renderer_prefix.empty())
645       cmd_line->PrependWrapper(renderer_prefix);
646     AppendRendererCommandLine(cmd_line);
647     cmd_line->AppendSwitchASCII(switches::kProcessChannelID, channel_id);
648 
649     // Spawn the child process asynchronously to avoid blocking the UI thread.
650     // As long as there's no renderer prefix, we can use the zygote process
651     // at this stage.
652     child_process_launcher_.reset(new ChildProcessLauncher(
653         new RendererSandboxedProcessLauncherDelegate(channel_.get()),
654         cmd_line,
655         GetID(),
656         this));
657 
658     fast_shutdown_started_ = false;
659   }
660 
661   if (!gpu_observer_registered_) {
662     gpu_observer_registered_ = true;
663     GpuDataManagerImpl::GetInstance()->AddObserver(this);
664   }
665 
666   is_initialized_ = true;
667   return true;
668 }
669 
MaybeActivateMojo()670 void RenderProcessHostImpl::MaybeActivateMojo() {
671   // TODO(darin): Following security review, we can unconditionally initialize
672   // Mojo in all renderers. We will then be able to directly call Activate()
673   // from OnProcessLaunched.
674   if (!mojo_activation_required_)
675     return;  // Waiting on someone to require Mojo.
676 
677   if (!GetHandle())
678     return;  // Waiting on renderer startup.
679 
680   if (!mojo_application_host_->did_activate())
681     mojo_application_host_->Activate(this, GetHandle());
682 }
683 
CreateMessageFilters()684 void RenderProcessHostImpl::CreateMessageFilters() {
685   DCHECK_CURRENTLY_ON(BrowserThread::UI);
686   AddFilter(new ResourceSchedulerFilter(GetID()));
687   MediaInternals* media_internals = MediaInternals::GetInstance();
688   media::AudioManager* audio_manager =
689       BrowserMainLoop::GetInstance()->audio_manager();
690   // Add BrowserPluginMessageFilter to ensure it gets the first stab at messages
691   // from guests.
692   scoped_refptr<BrowserPluginMessageFilter> bp_message_filter(
693       new BrowserPluginMessageFilter(GetID()));
694   AddFilter(bp_message_filter.get());
695 
696   scoped_refptr<RenderMessageFilter> render_message_filter(
697       new RenderMessageFilter(
698           GetID(),
699 #if defined(ENABLE_PLUGINS)
700           PluginServiceImpl::GetInstance(),
701 #else
702           NULL,
703 #endif
704           GetBrowserContext(),
705           GetBrowserContext()->GetRequestContextForRenderProcess(GetID()),
706           widget_helper_.get(),
707           audio_manager,
708           media_internals,
709           storage_partition_impl_->GetDOMStorageContext()));
710   AddFilter(render_message_filter.get());
711   AddFilter(
712       new RenderFrameMessageFilter(GetID(), widget_helper_.get()));
713   BrowserContext* browser_context = GetBrowserContext();
714   ResourceContext* resource_context = browser_context->GetResourceContext();
715 
716   scoped_refptr<net::URLRequestContextGetter> request_context(
717       browser_context->GetRequestContextForRenderProcess(GetID()));
718   scoped_refptr<net::URLRequestContextGetter> media_request_context(
719       browser_context->GetMediaRequestContextForRenderProcess(GetID()));
720 
721   ResourceMessageFilter::GetContextsCallback get_contexts_callback(
722       base::Bind(&GetContexts, browser_context->GetResourceContext(),
723                  request_context, media_request_context));
724 
725   ResourceMessageFilter* resource_message_filter = new ResourceMessageFilter(
726       GetID(), PROCESS_TYPE_RENDERER,
727       storage_partition_impl_->GetAppCacheService(),
728       ChromeBlobStorageContext::GetFor(browser_context),
729       storage_partition_impl_->GetFileSystemContext(),
730       storage_partition_impl_->GetServiceWorkerContext(),
731       get_contexts_callback);
732 
733   AddFilter(resource_message_filter);
734   MediaStreamManager* media_stream_manager =
735       BrowserMainLoop::GetInstance()->media_stream_manager();
736   AddFilter(new AudioInputRendererHost(
737       audio_manager,
738       media_stream_manager,
739       BrowserMainLoop::GetInstance()->audio_mirroring_manager(),
740       BrowserMainLoop::GetInstance()->user_input_monitor()));
741   // The AudioRendererHost needs to be available for lookup, so it's
742   // stashed in a member variable.
743   audio_renderer_host_ = new AudioRendererHost(
744       GetID(),
745       audio_manager,
746       BrowserMainLoop::GetInstance()->audio_mirroring_manager(),
747       media_internals,
748       media_stream_manager);
749   AddFilter(audio_renderer_host_);
750   AddFilter(
751       new MidiHost(GetID(), BrowserMainLoop::GetInstance()->midi_manager()));
752   AddFilter(new VideoCaptureHost(media_stream_manager));
753   AddFilter(new AppCacheDispatcherHost(
754       storage_partition_impl_->GetAppCacheService(),
755       GetID()));
756   AddFilter(new ClipboardMessageFilter);
757   AddFilter(new DOMStorageMessageFilter(
758       GetID(),
759       storage_partition_impl_->GetDOMStorageContext()));
760   AddFilter(new IndexedDBDispatcherHost(
761       GetID(),
762       storage_partition_impl_->GetURLRequestContext(),
763       storage_partition_impl_->GetIndexedDBContext(),
764       ChromeBlobStorageContext::GetFor(browser_context)));
765 
766   gpu_message_filter_ = new GpuMessageFilter(GetID(), widget_helper_.get());
767   AddFilter(gpu_message_filter_);
768 #if defined(ENABLE_WEBRTC)
769   AddFilter(new WebRTCIdentityServiceHost(
770       GetID(), storage_partition_impl_->GetWebRTCIdentityStore()));
771   peer_connection_tracker_host_ = new PeerConnectionTrackerHost(GetID());
772   AddFilter(peer_connection_tracker_host_.get());
773   AddFilter(new MediaStreamDispatcherHost(
774       GetID(),
775       browser_context->GetResourceContext()->GetMediaDeviceIDSalt(),
776       media_stream_manager,
777       resource_context));
778   AddFilter(new DeviceRequestMessageFilter(
779       resource_context, media_stream_manager, GetID()));
780   AddFilter(new MediaStreamTrackMetricsHost());
781 #endif
782 #if defined(ENABLE_PLUGINS)
783   AddFilter(new PepperRendererConnection(GetID()));
784 #endif
785   AddFilter(new SpeechRecognitionDispatcherHost(
786       GetID(), storage_partition_impl_->GetURLRequestContext()));
787   AddFilter(new FileAPIMessageFilter(
788       GetID(),
789       storage_partition_impl_->GetURLRequestContext(),
790       storage_partition_impl_->GetFileSystemContext(),
791       ChromeBlobStorageContext::GetFor(browser_context),
792       StreamContext::GetFor(browser_context)));
793   AddFilter(new FileUtilitiesMessageFilter(GetID()));
794   AddFilter(new MimeRegistryMessageFilter());
795   AddFilter(new DatabaseMessageFilter(
796       storage_partition_impl_->GetDatabaseTracker()));
797 #if defined(OS_MACOSX)
798   AddFilter(new TextInputClientMessageFilter(GetID()));
799 #elif defined(OS_WIN)
800   // The FontCacheDispatcher is required only when we're using GDI rendering.
801   // TODO(scottmg): pdf/ppapi still require the renderer to be able to precache
802   // GDI fonts (http://crbug.com/383227), even when using DirectWrite. This
803   // should eventually be if (!ShouldUseDirectWrite()) guarded.
804   channel_->AddFilter(new FontCacheDispatcher());
805 #elif defined(OS_ANDROID)
806   browser_demuxer_android_ = new BrowserDemuxerAndroid();
807   AddFilter(browser_demuxer_android_);
808 #endif
809 
810   SocketStreamDispatcherHost::GetRequestContextCallback
811       request_context_callback(
812           base::Bind(&GetRequestContext, request_context,
813                      media_request_context));
814 
815   SocketStreamDispatcherHost* socket_stream_dispatcher_host =
816       new SocketStreamDispatcherHost(
817           GetID(), request_context_callback, resource_context);
818   AddFilter(socket_stream_dispatcher_host);
819 
820   WebSocketDispatcherHost::GetRequestContextCallback
821       websocket_request_context_callback(
822           base::Bind(&GetRequestContext, request_context,
823                      media_request_context, ResourceType::SUB_RESOURCE));
824 
825   AddFilter(
826       new WebSocketDispatcherHost(GetID(), websocket_request_context_callback));
827 
828   message_port_message_filter_ = new MessagePortMessageFilter(
829       base::Bind(&RenderWidgetHelper::GetNextRoutingID,
830                  base::Unretained(widget_helper_.get())));
831   AddFilter(message_port_message_filter_);
832 
833   scoped_refptr<ServiceWorkerDispatcherHost> service_worker_filter =
834       new ServiceWorkerDispatcherHost(GetID(), message_port_message_filter_);
835   service_worker_filter->Init(
836       storage_partition_impl_->GetServiceWorkerContext());
837   AddFilter(service_worker_filter);
838 
839   // If "--enable-embedded-shared-worker" is set, we use
840   // SharedWorkerMessageFilter in stead of WorkerMessageFilter.
841   if (WorkerService::EmbeddedSharedWorkerEnabled()) {
842     AddFilter(new SharedWorkerMessageFilter(
843         GetID(),
844         resource_context,
845         WorkerStoragePartition(
846             storage_partition_impl_->GetURLRequestContext(),
847             storage_partition_impl_->GetMediaURLRequestContext(),
848             storage_partition_impl_->GetAppCacheService(),
849             storage_partition_impl_->GetQuotaManager(),
850             storage_partition_impl_->GetFileSystemContext(),
851             storage_partition_impl_->GetDatabaseTracker(),
852             storage_partition_impl_->GetIndexedDBContext(),
853             storage_partition_impl_->GetServiceWorkerContext()),
854         message_port_message_filter_));
855   } else {
856     AddFilter(new WorkerMessageFilter(
857         GetID(),
858         resource_context,
859         WorkerStoragePartition(
860             storage_partition_impl_->GetURLRequestContext(),
861             storage_partition_impl_->GetMediaURLRequestContext(),
862             storage_partition_impl_->GetAppCacheService(),
863             storage_partition_impl_->GetQuotaManager(),
864             storage_partition_impl_->GetFileSystemContext(),
865             storage_partition_impl_->GetDatabaseTracker(),
866             storage_partition_impl_->GetIndexedDBContext(),
867             storage_partition_impl_->GetServiceWorkerContext()),
868         message_port_message_filter_));
869   }
870 
871 #if defined(ENABLE_WEBRTC)
872   p2p_socket_dispatcher_host_ = new P2PSocketDispatcherHost(
873       resource_context,
874       browser_context->GetRequestContextForRenderProcess(GetID()));
875   AddFilter(p2p_socket_dispatcher_host_);
876 #endif
877 
878   AddFilter(new TraceMessageFilter());
879   AddFilter(new ResolveProxyMsgHelper(
880       browser_context->GetRequestContextForRenderProcess(GetID())));
881   AddFilter(new QuotaDispatcherHost(
882       GetID(),
883       storage_partition_impl_->GetQuotaManager(),
884       GetContentClient()->browser()->CreateQuotaPermissionContext()));
885   AddFilter(new GamepadBrowserMessageFilter());
886   AddFilter(new DeviceMotionMessageFilter());
887   AddFilter(new DeviceOrientationMessageFilter());
888   AddFilter(new ProfilerMessageFilter(PROCESS_TYPE_RENDERER));
889   AddFilter(new HistogramMessageFilter());
890 #if defined(USE_TCMALLOC) && (defined(OS_LINUX) || defined(OS_ANDROID))
891   if (CommandLine::ForCurrentProcess()->HasSwitch(
892       switches::kEnableMemoryBenchmarking))
893     AddFilter(new MemoryBenchmarkMessageFilter());
894 #endif
895   AddFilter(new VibrationMessageFilter());
896   AddFilter(new PushMessagingMessageFilter(GetID()));
897   AddFilter(new BatteryStatusMessageFilter());
898 }
899 
GetNextRoutingID()900 int RenderProcessHostImpl::GetNextRoutingID() {
901   return widget_helper_->GetNextRoutingID();
902 }
903 
904 
ResumeDeferredNavigation(const GlobalRequestID & request_id)905 void RenderProcessHostImpl::ResumeDeferredNavigation(
906     const GlobalRequestID& request_id) {
907   widget_helper_->ResumeDeferredNavigation(request_id);
908 }
909 
NotifyTimezoneChange()910 void RenderProcessHostImpl::NotifyTimezoneChange() {
911   Send(new ViewMsg_TimezoneChange());
912 }
913 
AddRoute(int32 routing_id,IPC::Listener * listener)914 void RenderProcessHostImpl::AddRoute(
915     int32 routing_id,
916     IPC::Listener* listener) {
917   listeners_.AddWithID(listener, routing_id);
918 }
919 
RemoveRoute(int32 routing_id)920 void RenderProcessHostImpl::RemoveRoute(int32 routing_id) {
921   DCHECK(listeners_.Lookup(routing_id) != NULL);
922   listeners_.Remove(routing_id);
923 
924 #if defined(OS_WIN)
925   // Dump the handle table if handle auditing is enabled.
926   const CommandLine& browser_command_line =
927       *CommandLine::ForCurrentProcess();
928   if (browser_command_line.HasSwitch(switches::kAuditHandles) ||
929       browser_command_line.HasSwitch(switches::kAuditAllHandles)) {
930     DumpHandles();
931 
932     // We wait to close the channels until the child process has finished
933     // dumping handles and sends us ChildProcessHostMsg_DumpHandlesDone.
934     return;
935   }
936 #endif
937   // Keep the one renderer thread around forever in single process mode.
938   if (!run_renderer_in_process())
939     Cleanup();
940 }
941 
AddObserver(RenderProcessHostObserver * observer)942 void RenderProcessHostImpl::AddObserver(RenderProcessHostObserver* observer) {
943   observers_.AddObserver(observer);
944 }
945 
RemoveObserver(RenderProcessHostObserver * observer)946 void RenderProcessHostImpl::RemoveObserver(
947     RenderProcessHostObserver* observer) {
948   observers_.RemoveObserver(observer);
949 }
950 
WaitForBackingStoreMsg(int render_widget_id,const base::TimeDelta & max_delay,IPC::Message * msg)951 bool RenderProcessHostImpl::WaitForBackingStoreMsg(
952     int render_widget_id,
953     const base::TimeDelta& max_delay,
954     IPC::Message* msg) {
955   // The post task to this thread with the process id could be in queue, and we
956   // don't want to dispatch a message before then since it will need the handle.
957   if (child_process_launcher_.get() && child_process_launcher_->IsStarting())
958     return false;
959 
960   return widget_helper_->WaitForBackingStoreMsg(render_widget_id,
961                                                 max_delay, msg);
962 }
963 
ReceivedBadMessage()964 void RenderProcessHostImpl::ReceivedBadMessage() {
965   CommandLine* command_line = CommandLine::ForCurrentProcess();
966   if (command_line->HasSwitch(switches::kDisableKillAfterBadIPC))
967     return;
968 
969   if (run_renderer_in_process()) {
970     // In single process mode it is better if we don't suicide but just
971     // crash.
972     CHECK(false);
973   }
974   // We kill the renderer but don't include a NOTREACHED, because we want the
975   // browser to try to survive when it gets illegal messages from the renderer.
976   base::KillProcess(GetHandle(), RESULT_CODE_KILLED_BAD_MESSAGE,
977                     false);
978 }
979 
WidgetRestored()980 void RenderProcessHostImpl::WidgetRestored() {
981   // Verify we were properly backgrounded.
982   DCHECK_EQ(backgrounded_, (visible_widgets_ == 0));
983   visible_widgets_++;
984   SetBackgrounded(false);
985 }
986 
WidgetHidden()987 void RenderProcessHostImpl::WidgetHidden() {
988   // On startup, the browser will call Hide
989   if (backgrounded_)
990     return;
991 
992   DCHECK_EQ(backgrounded_, (visible_widgets_ == 0));
993   visible_widgets_--;
994   DCHECK_GE(visible_widgets_, 0);
995   if (visible_widgets_ == 0) {
996     DCHECK(!backgrounded_);
997     SetBackgrounded(true);
998   }
999 }
1000 
VisibleWidgetCount() const1001 int RenderProcessHostImpl::VisibleWidgetCount() const {
1002   return visible_widgets_;
1003 }
1004 
IsIsolatedGuest() const1005 bool RenderProcessHostImpl::IsIsolatedGuest() const {
1006   return is_isolated_guest_;
1007 }
1008 
GetStoragePartition() const1009 StoragePartition* RenderProcessHostImpl::GetStoragePartition() const {
1010   return storage_partition_impl_;
1011 }
1012 
AppendCompositorCommandLineFlags(CommandLine * command_line)1013 static void AppendCompositorCommandLineFlags(CommandLine* command_line) {
1014   if (IsPinchVirtualViewportEnabled())
1015     command_line->AppendSwitch(cc::switches::kEnablePinchVirtualViewport);
1016 
1017   if (IsThreadedCompositingEnabled())
1018     command_line->AppendSwitch(switches::kEnableThreadedCompositing);
1019 
1020   if (IsDelegatedRendererEnabled())
1021     command_line->AppendSwitch(switches::kEnableDelegatedRenderer);
1022 
1023   if (IsImplSidePaintingEnabled())
1024     command_line->AppendSwitch(switches::kEnableImplSidePainting);
1025 
1026   if (content::IsGpuRasterizationEnabled())
1027     command_line->AppendSwitch(switches::kEnableGpuRasterization);
1028 
1029   if (content::IsForceGpuRasterizationEnabled())
1030     command_line->AppendSwitch(switches::kForceGpuRasterization);
1031 
1032   // Appending disable-gpu-feature switches due to software rendering list.
1033   GpuDataManagerImpl* gpu_data_manager = GpuDataManagerImpl::GetInstance();
1034   DCHECK(gpu_data_manager);
1035   gpu_data_manager->AppendRendererCommandLine(command_line);
1036 }
1037 
AppendRendererCommandLine(CommandLine * command_line) const1038 void RenderProcessHostImpl::AppendRendererCommandLine(
1039     CommandLine* command_line) const {
1040   // Pass the process type first, so it shows first in process listings.
1041   command_line->AppendSwitchASCII(switches::kProcessType,
1042                                   switches::kRendererProcess);
1043 
1044   // Now send any options from our own command line we want to propagate.
1045   const CommandLine& browser_command_line = *CommandLine::ForCurrentProcess();
1046   PropagateBrowserCommandLineToRenderer(browser_command_line, command_line);
1047 
1048   // Pass on the browser locale.
1049   const std::string locale =
1050       GetContentClient()->browser()->GetApplicationLocale();
1051   command_line->AppendSwitchASCII(switches::kLang, locale);
1052 
1053   // If we run base::FieldTrials, we want to pass to their state to the
1054   // renderer so that it can act in accordance with each state, or record
1055   // histograms relating to the base::FieldTrial states.
1056   std::string field_trial_states;
1057   base::FieldTrialList::StatesToString(&field_trial_states);
1058   if (!field_trial_states.empty()) {
1059     command_line->AppendSwitchASCII(switches::kForceFieldTrials,
1060                                     field_trial_states);
1061   }
1062 
1063   GetContentClient()->browser()->AppendExtraCommandLineSwitches(
1064       command_line, GetID());
1065 
1066   if (content::IsPinchToZoomEnabled())
1067     command_line->AppendSwitch(switches::kEnablePinch);
1068 
1069 #if defined(OS_WIN)
1070   command_line->AppendSwitchASCII(switches::kDeviceScaleFactor,
1071                                   base::DoubleToString(gfx::GetDPIScale()));
1072 #endif
1073 
1074   AppendCompositorCommandLineFlags(command_line);
1075 }
1076 
PropagateBrowserCommandLineToRenderer(const CommandLine & browser_cmd,CommandLine * renderer_cmd) const1077 void RenderProcessHostImpl::PropagateBrowserCommandLineToRenderer(
1078     const CommandLine& browser_cmd,
1079     CommandLine* renderer_cmd) const {
1080   // Propagate the following switches to the renderer command line (along
1081   // with any associated values) if present in the browser command line.
1082   static const char* const kSwitchNames[] = {
1083     switches::kAllowInsecureWebSocketFromHttpsOrigin,
1084     switches::kAllowLoopbackInPeerConnection,
1085     switches::kAudioBufferSize,
1086     switches::kAuditAllHandles,
1087     switches::kAuditHandles,
1088     switches::kBlinkPlatformLogChannels,
1089     switches::kBlockCrossSiteDocuments,
1090     switches::kDefaultTileWidth,
1091     switches::kDefaultTileHeight,
1092     switches::kDisable3DAPIs,
1093     switches::kDisableAcceleratedFixedRootBackground,
1094     switches::kDisableAcceleratedOverflowScroll,
1095     switches::kDisableAcceleratedVideoDecode,
1096     switches::kDisableApplicationCache,
1097     switches::kDisableBreakpad,
1098     switches::kDisableCompositingForFixedPosition,
1099     switches::kDisableCompositingForTransition,
1100     switches::kDisableDatabases,
1101     switches::kDisableDesktopNotifications,
1102     switches::kDisableDirectNPAPIRequests,
1103     switches::kDisableDistanceFieldText,
1104     switches::kDisableFastTextAutosizing,
1105     switches::kDisableFileSystem,
1106     switches::kDisableGpuCompositing,
1107     switches::kDisableGpuVsync,
1108     switches::kDisableLowResTiling,
1109     switches::kDisableHistogramCustomizer,
1110     switches::kDisableLCDText,
1111     switches::kDisableLayerSquashing,
1112     switches::kDisableLocalStorage,
1113     switches::kDisableLogging,
1114     switches::kDisableMediaSource,
1115     switches::kDisableOverlayScrollbar,
1116     switches::kDisablePinch,
1117     switches::kDisablePrefixedEncryptedMedia,
1118     switches::kDisableRepaintAfterLayout,
1119     switches::kDisableSeccompFilterSandbox,
1120     switches::kDisableSessionStorage,
1121     switches::kDisableSharedWorkers,
1122     switches::kDisableTouchAdjustment,
1123     switches::kDisableTouchDragDrop,
1124     switches::kDisableTouchEditing,
1125     switches::kDisableZeroCopy,
1126     switches::kDomAutomationController,
1127     switches::kEnableAcceleratedFixedRootBackground,
1128     switches::kEnableAcceleratedOverflowScroll,
1129     switches::kEnableBeginFrameScheduling,
1130     switches::kEnableBleedingEdgeRenderingFastPaths,
1131     switches::kEnableCompositingForFixedPosition,
1132     switches::kEnableCompositingForTransition,
1133     switches::kEnableDeferredImageDecoding,
1134     switches::kEnableDistanceFieldText,
1135     switches::kEnableEncryptedMedia,
1136     switches::kEnableExperimentalCanvasFeatures,
1137     switches::kEnableExperimentalWebPlatformFeatures,
1138     switches::kEnableFastTextAutosizing,
1139     switches::kEnableGPUClientLogging,
1140     switches::kEnableGpuClientTracing,
1141     switches::kEnableGPUServiceLogging,
1142     switches::kEnableHighDpiCompositingForFixedPosition,
1143     switches::kEnableLowResTiling,
1144     switches::kEnableInbandTextTracks,
1145     switches::kEnableLCDText,
1146     switches::kEnableLayerSquashing,
1147     switches::kEnableLogging,
1148     switches::kEnableMemoryBenchmarking,
1149     switches::kEnableOneCopy,
1150     switches::kEnableOverlayFullscreenVideo,
1151     switches::kEnableOverlayScrollbar,
1152     switches::kEnableOverscrollNotifications,
1153     switches::kEnablePinch,
1154     switches::kEnablePreciseMemoryInfo,
1155     switches::kEnablePreparsedJsCaching,
1156     switches::kEnableRepaintAfterLayout,
1157     switches::kEnableSeccompFilterSandbox,
1158     switches::kEnableServiceWorker,
1159     switches::kEnableSkiaBenchmarking,
1160     switches::kEnableSpeechSynthesis,
1161     switches::kEnableStatsTable,
1162     switches::kEnableStrictSiteIsolation,
1163     switches::kEnableTargetedStyleRecalc,
1164     switches::kEnableTouchDragDrop,
1165     switches::kEnableTouchEditing,
1166     switches::kEnableViewport,
1167     switches::kEnableViewportMeta,
1168     switches::kMainFrameResizesAreOrientationChanges,
1169     switches::kEnableVtune,
1170     switches::kEnableWebAnimationsSVG,
1171     switches::kEnableWebGLDraftExtensions,
1172     switches::kEnableWebGLImageChromium,
1173     switches::kEnableWebMIDI,
1174     switches::kEnableZeroCopy,
1175     switches::kForceDeviceScaleFactor,
1176     switches::kFullMemoryCrashReport,
1177     switches::kIgnoreResolutionLimitsForAcceleratedVideoDecode,
1178     switches::kIPCConnectionTimeout,
1179     switches::kJavaScriptFlags,
1180     switches::kLoggingLevel,
1181     switches::kMaxUntiledLayerWidth,
1182     switches::kMaxUntiledLayerHeight,
1183     switches::kMemoryMetrics,
1184     switches::kNoReferrers,
1185     switches::kNoSandbox,
1186     switches::kNumRasterThreads,
1187     switches::kPpapiInProcess,
1188     switches::kProfilerTiming,
1189     switches::kReduceSecurityForTesting,
1190     switches::kRegisterPepperPlugins,
1191     switches::kRendererAssertTest,
1192     switches::kRendererStartupDialog,
1193     switches::kShowPaintRects,
1194     switches::kSitePerProcess,
1195     switches::kStatsCollectionController,
1196     switches::kTestType,
1197     switches::kTouchEvents,
1198     switches::kTraceToConsole,
1199     switches::kUseDiscardableMemory,
1200     // This flag needs to be propagated to the renderer process for
1201     // --in-process-webgl.
1202     switches::kUseGL,
1203     switches::kUseMobileUserAgent,
1204     switches::kV,
1205     switches::kVideoThreads,
1206     switches::kVModule,
1207     // Please keep these in alphabetical order. Compositor switches here should
1208     // also be added to chrome/browser/chromeos/login/chrome_restart_request.cc.
1209     cc::switches::kCompositeToMailbox,
1210     cc::switches::kDisableCompositedAntialiasing,
1211     cc::switches::kDisableCompositorTouchHitTesting,
1212     cc::switches::kDisableMainFrameBeforeActivation,
1213     cc::switches::kDisableMainFrameBeforeDraw,
1214     cc::switches::kDisableThreadedAnimation,
1215     cc::switches::kEnableGpuBenchmarking,
1216     cc::switches::kEnableMainFrameBeforeActivation,
1217     cc::switches::kEnableTopControlsPositionCalculation,
1218     cc::switches::kMaxTilesForInterestArea,
1219     cc::switches::kMaxUnusedResourceMemoryUsagePercentage,
1220     cc::switches::kShowCompositedLayerBorders,
1221     cc::switches::kShowFPSCounter,
1222     cc::switches::kShowLayerAnimationBounds,
1223     cc::switches::kShowNonOccludingRects,
1224     cc::switches::kShowOccludingRects,
1225     cc::switches::kShowPropertyChangedRects,
1226     cc::switches::kShowReplicaScreenSpaceRects,
1227     cc::switches::kShowScreenSpaceRects,
1228     cc::switches::kShowSurfaceDamageRects,
1229     cc::switches::kSlowDownRasterScaleFactor,
1230     cc::switches::kStrictLayerPropertyChangeChecking,
1231     cc::switches::kTopControlsHeight,
1232     cc::switches::kTopControlsHideThreshold,
1233     cc::switches::kTopControlsShowThreshold,
1234 #if defined(ENABLE_PLUGINS)
1235     switches::kEnablePepperTesting,
1236 #endif
1237 #if defined(ENABLE_WEBRTC)
1238     switches::kDisableAudioTrackProcessing,
1239     switches::kDisableDeviceEnumeration,
1240     switches::kDisableWebRtcHWDecoding,
1241     switches::kDisableWebRtcHWEncoding,
1242     switches::kEnableWebRtcHWVp8Encoding,
1243 #endif
1244 #if defined(OS_ANDROID)
1245     switches::kDisableGestureRequirementForMediaPlayback,
1246     switches::kDisableLowEndDeviceMode,
1247     switches::kDisableWebRTC,
1248     switches::kEnableLowEndDeviceMode,
1249     switches::kEnableSpeechRecognition,
1250     switches::kMediaDrmEnableNonCompositing,
1251     switches::kNetworkCountryIso,
1252     switches::kDisableWebAudio,
1253 #endif
1254 #if defined(OS_MACOSX)
1255     // Allow this to be set when invoking the browser and relayed along.
1256     switches::kEnableSandboxLogging,
1257 #endif
1258 #if defined(OS_WIN)
1259     switches::kDisableDirectWrite,
1260     switches::kEnableHighResolutionTime,
1261 #endif
1262   };
1263   renderer_cmd->CopySwitchesFrom(browser_cmd, kSwitchNames,
1264                                  arraysize(kSwitchNames));
1265 
1266   if (browser_cmd.HasSwitch(switches::kTraceStartup) &&
1267       BrowserMainLoop::GetInstance()->is_tracing_startup()) {
1268     // Pass kTraceStartup switch to renderer only if startup tracing has not
1269     // finished.
1270     renderer_cmd->AppendSwitchASCII(
1271         switches::kTraceStartup,
1272         browser_cmd.GetSwitchValueASCII(switches::kTraceStartup));
1273   }
1274 
1275   // Disable databases in incognito mode.
1276   if (GetBrowserContext()->IsOffTheRecord() &&
1277       !browser_cmd.HasSwitch(switches::kDisableDatabases)) {
1278     renderer_cmd->AppendSwitch(switches::kDisableDatabases);
1279   }
1280 
1281   // Enforce the extra command line flags for impl-side painting.
1282   if (IsImplSidePaintingEnabled() &&
1283       !browser_cmd.HasSwitch(switches::kEnableDeferredImageDecoding))
1284     renderer_cmd->AppendSwitch(switches::kEnableDeferredImageDecoding);
1285 }
1286 
GetHandle() const1287 base::ProcessHandle RenderProcessHostImpl::GetHandle() const {
1288   if (run_renderer_in_process())
1289     return base::Process::Current().handle();
1290 
1291   if (!child_process_launcher_.get() || child_process_launcher_->IsStarting())
1292     return base::kNullProcessHandle;
1293 
1294   return child_process_launcher_->GetHandle();
1295 }
1296 
FastShutdownIfPossible()1297 bool RenderProcessHostImpl::FastShutdownIfPossible() {
1298   if (run_renderer_in_process())
1299     return false;  // Single process mode never shutdown the renderer.
1300 
1301   if (!GetContentClient()->browser()->IsFastShutdownPossible())
1302     return false;
1303 
1304   if (!child_process_launcher_.get() ||
1305       child_process_launcher_->IsStarting() ||
1306       !GetHandle())
1307     return false;  // Render process hasn't started or is probably crashed.
1308 
1309   // Test if there's an unload listener.
1310   // NOTE: It's possible that an onunload listener may be installed
1311   // while we're shutting down, so there's a small race here.  Given that
1312   // the window is small, it's unlikely that the web page has much
1313   // state that will be lost by not calling its unload handlers properly.
1314   if (!SuddenTerminationAllowed())
1315     return false;
1316 
1317   if (worker_ref_count_ != 0) {
1318     if (survive_for_worker_start_time_.is_null())
1319       survive_for_worker_start_time_ = base::TimeTicks::Now();
1320     return false;
1321   }
1322 
1323   // Set this before ProcessDied() so observers can tell if the render process
1324   // died due to fast shutdown versus another cause.
1325   fast_shutdown_started_ = true;
1326 
1327   ProcessDied(false /* already_dead */);
1328   return true;
1329 }
1330 
DumpHandles()1331 void RenderProcessHostImpl::DumpHandles() {
1332 #if defined(OS_WIN)
1333   Send(new ChildProcessMsg_DumpHandles());
1334 #else
1335   NOTIMPLEMENTED();
1336 #endif
1337 }
1338 
Send(IPC::Message * msg)1339 bool RenderProcessHostImpl::Send(IPC::Message* msg) {
1340   TRACE_EVENT0("renderer_host", "RenderProcessHostImpl::Send");
1341   if (!channel_) {
1342     if (!is_initialized_) {
1343       queued_messages_.push(msg);
1344       return true;
1345     } else {
1346       delete msg;
1347       return false;
1348     }
1349   }
1350 
1351   if (child_process_launcher_.get() && child_process_launcher_->IsStarting()) {
1352     queued_messages_.push(msg);
1353     return true;
1354   }
1355 
1356   return channel_->Send(msg);
1357 }
1358 
OnMessageReceived(const IPC::Message & msg)1359 bool RenderProcessHostImpl::OnMessageReceived(const IPC::Message& msg) {
1360   // If we're about to be deleted, or have initiated the fast shutdown sequence,
1361   // we ignore incoming messages.
1362 
1363   if (deleting_soon_ || fast_shutdown_started_)
1364     return false;
1365 
1366   mark_child_process_activity_time();
1367   if (msg.routing_id() == MSG_ROUTING_CONTROL) {
1368     // Dispatch control messages.
1369     IPC_BEGIN_MESSAGE_MAP(RenderProcessHostImpl, msg)
1370       IPC_MESSAGE_HANDLER(ChildProcessHostMsg_ShutdownRequest,
1371                           OnShutdownRequest)
1372       IPC_MESSAGE_HANDLER(ChildProcessHostMsg_DumpHandlesDone,
1373                           OnDumpHandlesDone)
1374       IPC_MESSAGE_HANDLER(ViewHostMsg_SuddenTerminationChanged,
1375                           SuddenTerminationChanged)
1376       IPC_MESSAGE_HANDLER(ViewHostMsg_UserMetricsRecordAction,
1377                           OnUserMetricsRecordAction)
1378       IPC_MESSAGE_HANDLER(ViewHostMsg_SavedPageAsMHTML, OnSavedPageAsMHTML)
1379       IPC_MESSAGE_HANDLER_DELAY_REPLY(
1380           ChildProcessHostMsg_SyncAllocateGpuMemoryBuffer,
1381           OnAllocateGpuMemoryBuffer)
1382       IPC_MESSAGE_HANDLER(ViewHostMsg_Close_ACK, OnCloseACK)
1383 #if defined(ENABLE_WEBRTC)
1384       IPC_MESSAGE_HANDLER(AecDumpMsg_RegisterAecDumpConsumer,
1385                           OnRegisterAecDumpConsumer)
1386       IPC_MESSAGE_HANDLER(AecDumpMsg_UnregisterAecDumpConsumer,
1387                           OnUnregisterAecDumpConsumer)
1388 #endif
1389       // Adding single handlers for your service here is fine, but once your
1390       // service needs more than one handler, please extract them into a new
1391       // message filter and add that filter to CreateMessageFilters().
1392     IPC_END_MESSAGE_MAP()
1393 
1394     return true;
1395   }
1396 
1397   // Dispatch incoming messages to the appropriate IPC::Listener.
1398   IPC::Listener* listener = listeners_.Lookup(msg.routing_id());
1399   if (!listener) {
1400     if (msg.is_sync()) {
1401       // The listener has gone away, so we must respond or else the caller will
1402       // hang waiting for a reply.
1403       IPC::Message* reply = IPC::SyncMessage::GenerateReply(&msg);
1404       reply->set_reply_error();
1405       Send(reply);
1406     }
1407 
1408     // If this is a SwapBuffers, we need to ack it if we're not going to handle
1409     // it so that the GPU process doesn't get stuck in unscheduled state.
1410     IPC_BEGIN_MESSAGE_MAP(RenderProcessHostImpl, msg)
1411       IPC_MESSAGE_HANDLER(ViewHostMsg_CompositorSurfaceBuffersSwapped,
1412                           OnCompositorSurfaceBuffersSwappedNoHost)
1413     IPC_END_MESSAGE_MAP()
1414     return true;
1415   }
1416   return listener->OnMessageReceived(msg);
1417 }
1418 
OnChannelConnected(int32 peer_pid)1419 void RenderProcessHostImpl::OnChannelConnected(int32 peer_pid) {
1420 #if defined(IPC_MESSAGE_LOG_ENABLED)
1421   Send(new ChildProcessMsg_SetIPCLoggingEnabled(
1422       IPC::Logging::GetInstance()->Enabled()));
1423 #endif
1424 
1425   tracked_objects::ThreadData::Status status =
1426       tracked_objects::ThreadData::status();
1427   Send(new ChildProcessMsg_SetProfilerStatus(status));
1428 }
1429 
OnChannelError()1430 void RenderProcessHostImpl::OnChannelError() {
1431   ProcessDied(true /* already_dead */);
1432 }
1433 
OnBadMessageReceived(const IPC::Message & message)1434 void RenderProcessHostImpl::OnBadMessageReceived(const IPC::Message& message) {
1435   // Message de-serialization failed. We consider this a capital crime. Kill the
1436   // renderer if we have one.
1437   LOG(ERROR) << "bad message " << message.type() << " terminating renderer.";
1438   BrowserChildProcessHostImpl::HistogramBadMessageTerminated(
1439       PROCESS_TYPE_RENDERER);
1440   ReceivedBadMessage();
1441 }
1442 
GetBrowserContext() const1443 BrowserContext* RenderProcessHostImpl::GetBrowserContext() const {
1444   return browser_context_;
1445 }
1446 
InSameStoragePartition(StoragePartition * partition) const1447 bool RenderProcessHostImpl::InSameStoragePartition(
1448     StoragePartition* partition) const {
1449   return storage_partition_impl_ == partition;
1450 }
1451 
GetID() const1452 int RenderProcessHostImpl::GetID() const {
1453   return id_;
1454 }
1455 
HasConnection() const1456 bool RenderProcessHostImpl::HasConnection() const {
1457   return channel_.get() != NULL;
1458 }
1459 
SetIgnoreInputEvents(bool ignore_input_events)1460 void RenderProcessHostImpl::SetIgnoreInputEvents(bool ignore_input_events) {
1461   ignore_input_events_ = ignore_input_events;
1462 }
1463 
IgnoreInputEvents() const1464 bool RenderProcessHostImpl::IgnoreInputEvents() const {
1465   return ignore_input_events_;
1466 }
1467 
Cleanup()1468 void RenderProcessHostImpl::Cleanup() {
1469   // If within_process_died_observer_ is true, one of our observers performed an
1470   // action that caused us to die (e.g. http://crbug.com/339504). Therefore,
1471   // delay the destruction until all of the observer callbacks have been made,
1472   // and guarantee that the RenderProcessHostDestroyed observer callback is
1473   // always the last callback fired.
1474   if (within_process_died_observer_) {
1475     delayed_cleanup_needed_ = true;
1476     return;
1477   }
1478   delayed_cleanup_needed_ = false;
1479 
1480   // Records the time when the process starts surviving for workers for UMA.
1481   if (listeners_.IsEmpty() && worker_ref_count_ > 0 &&
1482       survive_for_worker_start_time_.is_null()) {
1483     survive_for_worker_start_time_ = base::TimeTicks::Now();
1484   }
1485 
1486   // When there are no other owners of this object, we can delete ourselves.
1487   if (listeners_.IsEmpty() && worker_ref_count_ == 0) {
1488     if (!survive_for_worker_start_time_.is_null()) {
1489       UMA_HISTOGRAM_LONG_TIMES(
1490           "SharedWorker.RendererSurviveForWorkerTime",
1491           base::TimeTicks::Now() - survive_for_worker_start_time_);
1492     }
1493     // We cannot clean up twice; if this fails, there is an issue with our
1494     // control flow.
1495     DCHECK(!deleting_soon_);
1496 
1497     DCHECK_EQ(0, pending_views_);
1498     FOR_EACH_OBSERVER(RenderProcessHostObserver,
1499                       observers_,
1500                       RenderProcessHostDestroyed(this));
1501     NotificationService::current()->Notify(
1502         NOTIFICATION_RENDERER_PROCESS_TERMINATED,
1503         Source<RenderProcessHost>(this),
1504         NotificationService::NoDetails());
1505 
1506 #ifndef NDEBUG
1507     is_self_deleted_ = true;
1508 #endif
1509     base::MessageLoop::current()->DeleteSoon(FROM_HERE, this);
1510     deleting_soon_ = true;
1511     // It's important not to wait for the DeleteTask to delete the channel
1512     // proxy. Kill it off now. That way, in case the profile is going away, the
1513     // rest of the objects attached to this RenderProcessHost start going
1514     // away first, since deleting the channel proxy will post a
1515     // OnChannelClosed() to IPC::ChannelProxy::Context on the IO thread.
1516     channel_.reset();
1517     gpu_message_filter_ = NULL;
1518     message_port_message_filter_ = NULL;
1519     RemoveUserData(kSessionStorageHolderKey);
1520 
1521     // Remove ourself from the list of renderer processes so that we can't be
1522     // reused in between now and when the Delete task runs.
1523     UnregisterHost(GetID());
1524   }
1525 }
1526 
AddPendingView()1527 void RenderProcessHostImpl::AddPendingView() {
1528   pending_views_++;
1529 }
1530 
RemovePendingView()1531 void RenderProcessHostImpl::RemovePendingView() {
1532   DCHECK(pending_views_);
1533   pending_views_--;
1534 }
1535 
SetSuddenTerminationAllowed(bool enabled)1536 void RenderProcessHostImpl::SetSuddenTerminationAllowed(bool enabled) {
1537   sudden_termination_allowed_ = enabled;
1538 }
1539 
SuddenTerminationAllowed() const1540 bool RenderProcessHostImpl::SuddenTerminationAllowed() const {
1541   return sudden_termination_allowed_;
1542 }
1543 
GetChildProcessIdleTime() const1544 base::TimeDelta RenderProcessHostImpl::GetChildProcessIdleTime() const {
1545   return base::TimeTicks::Now() - child_process_activity_time_;
1546 }
1547 
ResumeRequestsForView(int route_id)1548 void RenderProcessHostImpl::ResumeRequestsForView(int route_id) {
1549   widget_helper_->ResumeRequestsForView(route_id);
1550 }
1551 
FilterURL(bool empty_allowed,GURL * url)1552 void RenderProcessHostImpl::FilterURL(bool empty_allowed, GURL* url) {
1553   FilterURL(this, empty_allowed, url);
1554 }
1555 
1556 #if defined(ENABLE_WEBRTC)
EnableAecDump(const base::FilePath & file)1557 void RenderProcessHostImpl::EnableAecDump(const base::FilePath& file) {
1558   DCHECK_CURRENTLY_ON(BrowserThread::UI);
1559   // Enable AEC dump for each registered consumer.
1560   for (std::vector<int>::iterator it = aec_dump_consumers_.begin();
1561        it != aec_dump_consumers_.end(); ++it) {
1562     EnableAecDumpForId(file, *it);
1563   }
1564 }
1565 
DisableAecDump()1566 void RenderProcessHostImpl::DisableAecDump() {
1567   DCHECK_CURRENTLY_ON(BrowserThread::UI);
1568   // Posting on the FILE thread and then replying back on the UI thread is only
1569   // for avoiding races between enable and disable. Nothing is done on the FILE
1570   // thread.
1571   BrowserThread::PostTaskAndReply(
1572       BrowserThread::FILE, FROM_HERE,
1573       base::Bind(&DisableAecDumpOnFileThread),
1574       base::Bind(&RenderProcessHostImpl::SendDisableAecDumpToRenderer,
1575                  weak_factory_.GetWeakPtr()));
1576 }
1577 
SetWebRtcLogMessageCallback(base::Callback<void (const std::string &)> callback)1578 void RenderProcessHostImpl::SetWebRtcLogMessageCallback(
1579     base::Callback<void(const std::string&)> callback) {
1580   webrtc_log_message_callback_ = callback;
1581 }
1582 
1583 RenderProcessHostImpl::WebRtcStopRtpDumpCallback
StartRtpDump(bool incoming,bool outgoing,const WebRtcRtpPacketCallback & packet_callback)1584 RenderProcessHostImpl::StartRtpDump(
1585     bool incoming,
1586     bool outgoing,
1587     const WebRtcRtpPacketCallback& packet_callback) {
1588   if (!p2p_socket_dispatcher_host_)
1589     return WebRtcStopRtpDumpCallback();
1590 
1591   BrowserThread::PostTask(BrowserThread::IO,
1592                           FROM_HERE,
1593                           base::Bind(&P2PSocketDispatcherHost::StartRtpDump,
1594                                      p2p_socket_dispatcher_host_,
1595                                      incoming,
1596                                      outgoing,
1597                                      packet_callback));
1598 
1599   if (stop_rtp_dump_callback_.is_null()) {
1600     stop_rtp_dump_callback_ =
1601         base::Bind(&P2PSocketDispatcherHost::StopRtpDumpOnUIThread,
1602                    p2p_socket_dispatcher_host_);
1603   }
1604   return stop_rtp_dump_callback_;
1605 }
1606 #endif
1607 
GetChannel()1608 IPC::ChannelProxy* RenderProcessHostImpl::GetChannel() {
1609   return channel_.get();
1610 }
1611 
AddFilter(BrowserMessageFilter * filter)1612 void RenderProcessHostImpl::AddFilter(BrowserMessageFilter* filter) {
1613   channel_->AddFilter(filter->GetFilter());
1614 }
1615 
FastShutdownForPageCount(size_t count)1616 bool RenderProcessHostImpl::FastShutdownForPageCount(size_t count) {
1617   if (static_cast<size_t>(GetActiveViewCount()) == count)
1618     return FastShutdownIfPossible();
1619   return false;
1620 }
1621 
FastShutdownStarted() const1622 bool RenderProcessHostImpl::FastShutdownStarted() const {
1623   return fast_shutdown_started_;
1624 }
1625 
1626 // static
RegisterHost(int host_id,RenderProcessHost * host)1627 void RenderProcessHostImpl::RegisterHost(int host_id, RenderProcessHost* host) {
1628   g_all_hosts.Get().AddWithID(host, host_id);
1629 }
1630 
1631 // static
UnregisterHost(int host_id)1632 void RenderProcessHostImpl::UnregisterHost(int host_id) {
1633   RenderProcessHost* host = g_all_hosts.Get().Lookup(host_id);
1634   if (!host)
1635     return;
1636 
1637   g_all_hosts.Get().Remove(host_id);
1638 
1639   // Look up the map of site to process for the given browser_context,
1640   // in case we need to remove this process from it.  It will be registered
1641   // under any sites it rendered that use process-per-site mode.
1642   SiteProcessMap* map =
1643       GetSiteProcessMapForBrowserContext(host->GetBrowserContext());
1644   map->RemoveProcess(host);
1645 }
1646 
1647 // static
FilterURL(RenderProcessHost * rph,bool empty_allowed,GURL * url)1648 void RenderProcessHostImpl::FilterURL(RenderProcessHost* rph,
1649                                       bool empty_allowed,
1650                                       GURL* url) {
1651   ChildProcessSecurityPolicyImpl* policy =
1652       ChildProcessSecurityPolicyImpl::GetInstance();
1653 
1654   if (empty_allowed && url->is_empty())
1655     return;
1656 
1657   // The browser process should never hear the swappedout:// URL from any
1658   // of the renderer's messages.  Check for this in debug builds, but don't
1659   // let it crash a release browser.
1660   DCHECK(GURL(kSwappedOutURL) != *url);
1661 
1662   if (!url->is_valid()) {
1663     // Have to use about:blank for the denied case, instead of an empty GURL.
1664     // This is because the browser treats navigation to an empty GURL as a
1665     // navigation to the home page. This is often a privileged page
1666     // (chrome://newtab/) which is exactly what we don't want.
1667     *url = GURL(url::kAboutBlankURL);
1668     RecordAction(base::UserMetricsAction("FilterURLTermiate_Invalid"));
1669     return;
1670   }
1671 
1672   if (url->SchemeIs(url::kAboutScheme)) {
1673     // The renderer treats all URLs in the about: scheme as being about:blank.
1674     // Canonicalize about: URLs to about:blank.
1675     *url = GURL(url::kAboutBlankURL);
1676     RecordAction(base::UserMetricsAction("FilterURLTermiate_About"));
1677   }
1678 
1679   // Do not allow browser plugin guests to navigate to non-web URLs, since they
1680   // cannot swap processes or grant bindings.
1681   bool non_web_url_in_guest = rph->IsIsolatedGuest() &&
1682       !(url->is_valid() && policy->IsWebSafeScheme(url->scheme()));
1683 
1684   if (non_web_url_in_guest || !policy->CanRequestURL(rph->GetID(), *url)) {
1685     // If this renderer is not permitted to request this URL, we invalidate the
1686     // URL.  This prevents us from storing the blocked URL and becoming confused
1687     // later.
1688     VLOG(1) << "Blocked URL " << url->spec();
1689     *url = GURL(url::kAboutBlankURL);
1690     RecordAction(base::UserMetricsAction("FilterURLTermiate_Blocked"));
1691   }
1692 }
1693 
1694 // static
IsSuitableHost(RenderProcessHost * host,BrowserContext * browser_context,const GURL & site_url)1695 bool RenderProcessHostImpl::IsSuitableHost(
1696     RenderProcessHost* host,
1697     BrowserContext* browser_context,
1698     const GURL& site_url) {
1699   if (run_renderer_in_process())
1700     return true;
1701 
1702   if (host->GetBrowserContext() != browser_context)
1703     return false;
1704 
1705   // Do not allow sharing of guest hosts. This is to prevent bugs where guest
1706   // and non-guest storage gets mixed. In the future, we might consider enabling
1707   // the sharing of guests, in this case this check should be removed and
1708   // InSameStoragePartition should handle the possible sharing.
1709   if (host->IsIsolatedGuest())
1710     return false;
1711 
1712   // Check whether the given host and the intended site_url will be using the
1713   // same StoragePartition, since a RenderProcessHost can only support a single
1714   // StoragePartition.  This is relevant for packaged apps and isolated sites.
1715   StoragePartition* dest_partition =
1716       BrowserContext::GetStoragePartitionForSite(browser_context, site_url);
1717   if (!host->InSameStoragePartition(dest_partition))
1718     return false;
1719 
1720   if (ChildProcessSecurityPolicyImpl::GetInstance()->HasWebUIBindings(
1721           host->GetID()) !=
1722       WebUIControllerFactoryRegistry::GetInstance()->UseWebUIBindingsForURL(
1723           browser_context, site_url)) {
1724     return false;
1725   }
1726 
1727   return GetContentClient()->browser()->IsSuitableHost(host, site_url);
1728 }
1729 
1730 // static
run_renderer_in_process()1731 bool RenderProcessHost::run_renderer_in_process() {
1732   return g_run_renderer_in_process_;
1733 }
1734 
1735 // static
SetRunRendererInProcess(bool value)1736 void RenderProcessHost::SetRunRendererInProcess(bool value) {
1737   g_run_renderer_in_process_ = value;
1738 
1739   CommandLine* command_line = CommandLine::ForCurrentProcess();
1740   if (value) {
1741     if (!command_line->HasSwitch(switches::kLang)) {
1742       // Modify the current process' command line to include the browser locale,
1743       // as the renderer expects this flag to be set.
1744       const std::string locale =
1745           GetContentClient()->browser()->GetApplicationLocale();
1746       command_line->AppendSwitchASCII(switches::kLang, locale);
1747     }
1748     // TODO(piman): we should really send configuration through bools rather
1749     // than by parsing strings, i.e. sending an IPC rather than command line
1750     // args. crbug.com/314909
1751     AppendCompositorCommandLineFlags(command_line);
1752   }
1753 }
1754 
1755 // static
AllHostsIterator()1756 RenderProcessHost::iterator RenderProcessHost::AllHostsIterator() {
1757   DCHECK_CURRENTLY_ON(BrowserThread::UI);
1758   return iterator(g_all_hosts.Pointer());
1759 }
1760 
1761 // static
FromID(int render_process_id)1762 RenderProcessHost* RenderProcessHost::FromID(int render_process_id) {
1763   DCHECK_CURRENTLY_ON(BrowserThread::UI);
1764   return g_all_hosts.Get().Lookup(render_process_id);
1765 }
1766 
1767 // static
ShouldTryToUseExistingProcessHost(BrowserContext * browser_context,const GURL & url)1768 bool RenderProcessHost::ShouldTryToUseExistingProcessHost(
1769     BrowserContext* browser_context, const GURL& url) {
1770   // Experimental:
1771   // If --enable-strict-site-isolation or --site-per-process is enabled, do not
1772   // try to reuse renderer processes when over the limit.  (We could allow pages
1773   // from the same site to share, if we knew what the given process was
1774   // dedicated to.  Allowing no sharing is simpler for now.)  This may cause
1775   // resource exhaustion issues if too many sites are open at once.
1776   const CommandLine& command_line = *CommandLine::ForCurrentProcess();
1777   if (command_line.HasSwitch(switches::kEnableStrictSiteIsolation) ||
1778       command_line.HasSwitch(switches::kSitePerProcess))
1779     return false;
1780 
1781   if (run_renderer_in_process())
1782     return true;
1783 
1784   // NOTE: Sometimes it's necessary to create more render processes than
1785   //       GetMaxRendererProcessCount(), for instance when we want to create
1786   //       a renderer process for a browser context that has no existing
1787   //       renderers. This is OK in moderation, since the
1788   //       GetMaxRendererProcessCount() is conservative.
1789   if (g_all_hosts.Get().size() >= GetMaxRendererProcessCount())
1790     return true;
1791 
1792   return GetContentClient()->browser()->
1793       ShouldTryToUseExistingProcessHost(browser_context, url);
1794 }
1795 
1796 // static
GetExistingProcessHost(BrowserContext * browser_context,const GURL & site_url)1797 RenderProcessHost* RenderProcessHost::GetExistingProcessHost(
1798     BrowserContext* browser_context,
1799     const GURL& site_url) {
1800   // First figure out which existing renderers we can use.
1801   std::vector<RenderProcessHost*> suitable_renderers;
1802   suitable_renderers.reserve(g_all_hosts.Get().size());
1803 
1804   iterator iter(AllHostsIterator());
1805   while (!iter.IsAtEnd()) {
1806     if (GetContentClient()->browser()->MayReuseHost(iter.GetCurrentValue()) &&
1807         RenderProcessHostImpl::IsSuitableHost(
1808             iter.GetCurrentValue(),
1809             browser_context, site_url)) {
1810       suitable_renderers.push_back(iter.GetCurrentValue());
1811     }
1812     iter.Advance();
1813   }
1814 
1815   // Now pick a random suitable renderer, if we have any.
1816   if (!suitable_renderers.empty()) {
1817     int suitable_count = static_cast<int>(suitable_renderers.size());
1818     int random_index = base::RandInt(0, suitable_count - 1);
1819     return suitable_renderers[random_index];
1820   }
1821 
1822   return NULL;
1823 }
1824 
1825 // static
ShouldUseProcessPerSite(BrowserContext * browser_context,const GURL & url)1826 bool RenderProcessHost::ShouldUseProcessPerSite(
1827     BrowserContext* browser_context,
1828     const GURL& url) {
1829   // Returns true if we should use the process-per-site model.  This will be
1830   // the case if the --process-per-site switch is specified, or in
1831   // process-per-site-instance for particular sites (e.g., WebUI).
1832   // Note that --single-process is handled in ShouldTryToUseExistingProcessHost.
1833   const CommandLine& command_line = *CommandLine::ForCurrentProcess();
1834   if (command_line.HasSwitch(switches::kProcessPerSite))
1835     return true;
1836 
1837   // We want to consolidate particular sites like WebUI even when we are using
1838   // the process-per-tab or process-per-site-instance models.
1839   // Note: DevTools pages have WebUI type but should not reuse the same host.
1840   if (WebUIControllerFactoryRegistry::GetInstance()->UseWebUIForURL(
1841           browser_context, url) &&
1842       !url.SchemeIs(kChromeDevToolsScheme)) {
1843     return true;
1844   }
1845 
1846   // Otherwise let the content client decide, defaulting to false.
1847   return GetContentClient()->browser()->ShouldUseProcessPerSite(browser_context,
1848                                                                 url);
1849 }
1850 
1851 // static
GetProcessHostForSite(BrowserContext * browser_context,const GURL & url)1852 RenderProcessHost* RenderProcessHostImpl::GetProcessHostForSite(
1853     BrowserContext* browser_context,
1854     const GURL& url) {
1855   // Look up the map of site to process for the given browser_context.
1856   SiteProcessMap* map =
1857       GetSiteProcessMapForBrowserContext(browser_context);
1858 
1859   // See if we have an existing process with appropriate bindings for this site.
1860   // If not, the caller should create a new process and register it.
1861   std::string site = SiteInstance::GetSiteForURL(browser_context, url)
1862       .possibly_invalid_spec();
1863   RenderProcessHost* host = map->FindProcess(site);
1864   if (host && (!GetContentClient()->browser()->MayReuseHost(host) ||
1865                !IsSuitableHost(host, browser_context, url))) {
1866     // The registered process does not have an appropriate set of bindings for
1867     // the url.  Remove it from the map so we can register a better one.
1868     RecordAction(
1869         base::UserMetricsAction("BindingsMismatch_GetProcessHostPerSite"));
1870     map->RemoveProcess(host);
1871     host = NULL;
1872   }
1873 
1874   return host;
1875 }
1876 
RegisterProcessHostForSite(BrowserContext * browser_context,RenderProcessHost * process,const GURL & url)1877 void RenderProcessHostImpl::RegisterProcessHostForSite(
1878     BrowserContext* browser_context,
1879     RenderProcessHost* process,
1880     const GURL& url) {
1881   // Look up the map of site to process for the given browser_context.
1882   SiteProcessMap* map =
1883       GetSiteProcessMapForBrowserContext(browser_context);
1884 
1885   // Only register valid, non-empty sites.  Empty or invalid sites will not
1886   // use process-per-site mode.  We cannot check whether the process has
1887   // appropriate bindings here, because the bindings have not yet been granted.
1888   std::string site = SiteInstance::GetSiteForURL(browser_context, url)
1889       .possibly_invalid_spec();
1890   if (!site.empty())
1891     map->RegisterProcess(site, process);
1892 }
1893 
ProcessDied(bool already_dead)1894 void RenderProcessHostImpl::ProcessDied(bool already_dead) {
1895   // Our child process has died.  If we didn't expect it, it's a crash.
1896   // In any case, we need to let everyone know it's gone.
1897   // The OnChannelError notification can fire multiple times due to nested sync
1898   // calls to a renderer. If we don't have a valid channel here it means we
1899   // already handled the error.
1900 
1901   // It should not be possible for us to be called re-entrantly.
1902   DCHECK(!within_process_died_observer_);
1903 
1904   // It should not be possible for a process death notification to come in while
1905   // we are dying.
1906   DCHECK(!deleting_soon_);
1907 
1908   // child_process_launcher_ can be NULL in single process mode or if fast
1909   // termination happened.
1910   int exit_code = 0;
1911   base::TerminationStatus status =
1912       child_process_launcher_.get() ?
1913       child_process_launcher_->GetChildTerminationStatus(already_dead,
1914                                                          &exit_code) :
1915       base::TERMINATION_STATUS_NORMAL_TERMINATION;
1916 
1917   RendererClosedDetails details(GetHandle(), status, exit_code);
1918   within_process_died_observer_ = true;
1919   NotificationService::current()->Notify(
1920       NOTIFICATION_RENDERER_PROCESS_CLOSED,
1921       Source<RenderProcessHost>(this),
1922       Details<RendererClosedDetails>(&details));
1923   FOR_EACH_OBSERVER(RenderProcessHostObserver,
1924                     observers_,
1925                     RenderProcessExited(this, GetHandle(), status, exit_code));
1926   within_process_died_observer_ = false;
1927 
1928   child_process_launcher_.reset();
1929   channel_.reset();
1930   gpu_message_filter_ = NULL;
1931   message_port_message_filter_ = NULL;
1932   RemoveUserData(kSessionStorageHolderKey);
1933 
1934   IDMap<IPC::Listener>::iterator iter(&listeners_);
1935   while (!iter.IsAtEnd()) {
1936     iter.GetCurrentValue()->OnMessageReceived(
1937         ViewHostMsg_RenderProcessGone(iter.GetCurrentKey(),
1938                                       static_cast<int>(status),
1939                                       exit_code));
1940     iter.Advance();
1941   }
1942 
1943   mojo_application_host_.reset();
1944 
1945   // It's possible that one of the calls out to the observers might have caused
1946   // this object to be no longer needed.
1947   if (delayed_cleanup_needed_)
1948     Cleanup();
1949 
1950   // This object is not deleted at this point and might be reused later.
1951   // TODO(darin): clean this up
1952 }
1953 
GetActiveViewCount()1954 int RenderProcessHostImpl::GetActiveViewCount() {
1955   int num_active_views = 0;
1956   scoped_ptr<RenderWidgetHostIterator> widgets(
1957       RenderWidgetHost::GetRenderWidgetHosts());
1958   while (RenderWidgetHost* widget = widgets->GetNextHost()) {
1959     // Count only RenderWidgetHosts in this process.
1960     if (widget->GetProcess()->GetID() == GetID())
1961       num_active_views++;
1962   }
1963   return num_active_views;
1964 }
1965 
1966 // Frame subscription API for this class is for accelerated composited path
1967 // only. These calls are redirected to GpuMessageFilter.
BeginFrameSubscription(int route_id,scoped_ptr<RenderWidgetHostViewFrameSubscriber> subscriber)1968 void RenderProcessHostImpl::BeginFrameSubscription(
1969     int route_id,
1970     scoped_ptr<RenderWidgetHostViewFrameSubscriber> subscriber) {
1971   if (!gpu_message_filter_)
1972     return;
1973   BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, base::Bind(
1974       &GpuMessageFilter::BeginFrameSubscription,
1975       gpu_message_filter_,
1976       route_id, base::Passed(&subscriber)));
1977 }
1978 
EndFrameSubscription(int route_id)1979 void RenderProcessHostImpl::EndFrameSubscription(int route_id) {
1980   if (!gpu_message_filter_)
1981     return;
1982   BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, base::Bind(
1983       &GpuMessageFilter::EndFrameSubscription,
1984       gpu_message_filter_,
1985       route_id));
1986 }
1987 
1988 #if defined(ENABLE_WEBRTC)
WebRtcLogMessage(const std::string & message)1989 void RenderProcessHostImpl::WebRtcLogMessage(const std::string& message) {
1990   DCHECK_CURRENTLY_ON(BrowserThread::UI);
1991   if (!webrtc_log_message_callback_.is_null())
1992     webrtc_log_message_callback_.Run(message);
1993 }
1994 #endif
1995 
ReleaseOnCloseACK(RenderProcessHost * host,const SessionStorageNamespaceMap & sessions,int view_route_id)1996 void RenderProcessHostImpl::ReleaseOnCloseACK(
1997     RenderProcessHost* host,
1998     const SessionStorageNamespaceMap& sessions,
1999     int view_route_id) {
2000   DCHECK(host);
2001   if (sessions.empty())
2002     return;
2003   SessionStorageHolder* holder = static_cast<SessionStorageHolder*>
2004       (host->GetUserData(kSessionStorageHolderKey));
2005   if (!holder) {
2006     holder = new SessionStorageHolder();
2007     host->SetUserData(
2008         kSessionStorageHolderKey,
2009         holder);
2010   }
2011   holder->Hold(sessions, view_route_id);
2012 }
2013 
OnShutdownRequest()2014 void RenderProcessHostImpl::OnShutdownRequest() {
2015   // Don't shut down if there are active RenderViews, or if there are pending
2016   // RenderViews being swapped back in.
2017   // In single process mode, we never shutdown the renderer.
2018   int num_active_views = GetActiveViewCount();
2019   if (pending_views_ || num_active_views > 0 || run_renderer_in_process())
2020     return;
2021 
2022   // Notify any contents that might have swapped out renderers from this
2023   // process. They should not attempt to swap them back in.
2024   NotificationService::current()->Notify(
2025       NOTIFICATION_RENDERER_PROCESS_CLOSING,
2026       Source<RenderProcessHost>(this),
2027       NotificationService::NoDetails());
2028 
2029   Send(new ChildProcessMsg_Shutdown());
2030 }
2031 
SuddenTerminationChanged(bool enabled)2032 void RenderProcessHostImpl::SuddenTerminationChanged(bool enabled) {
2033   SetSuddenTerminationAllowed(enabled);
2034 }
2035 
OnDumpHandlesDone()2036 void RenderProcessHostImpl::OnDumpHandlesDone() {
2037   Cleanup();
2038 }
2039 
SetBackgrounded(bool backgrounded)2040 void RenderProcessHostImpl::SetBackgrounded(bool backgrounded) {
2041   // Note: we always set the backgrounded_ value.  If the process is NULL
2042   // (and hence hasn't been created yet), we will set the process priority
2043   // later when we create the process.
2044   backgrounded_ = backgrounded;
2045   if (!child_process_launcher_.get() || child_process_launcher_->IsStarting())
2046     return;
2047 
2048   // Don't background processes which have active audio streams.
2049   if (backgrounded_ && audio_renderer_host_->HasActiveAudio())
2050     return;
2051 
2052 #if defined(OS_WIN)
2053   // The cbstext.dll loads as a global GetMessage hook in the browser process
2054   // and intercepts/unintercepts the kernel32 API SetPriorityClass in a
2055   // background thread. If the UI thread invokes this API just when it is
2056   // intercepted the stack is messed up on return from the interceptor
2057   // which causes random crashes in the browser process. Our hack for now
2058   // is to not invoke the SetPriorityClass API if the dll is loaded.
2059   if (GetModuleHandle(L"cbstext.dll"))
2060     return;
2061 #endif  // OS_WIN
2062 
2063   // Notify the child process of background state.
2064   Send(new ChildProcessMsg_SetProcessBackgrounded(backgrounded));
2065 
2066 #if !defined(OS_WIN)
2067   // Backgrounding may require elevated privileges not available to renderer
2068   // processes, so control backgrounding from the process host.
2069 
2070   // Windows Vista+ has a fancy process backgrounding mode that can only be set
2071   // from within the process.
2072   child_process_launcher_->SetProcessBackgrounded(backgrounded);
2073 #endif  // !OS_WIN
2074 }
2075 
OnProcessLaunched()2076 void RenderProcessHostImpl::OnProcessLaunched() {
2077   // No point doing anything, since this object will be destructed soon.  We
2078   // especially don't want to send the RENDERER_PROCESS_CREATED notification,
2079   // since some clients might expect a RENDERER_PROCESS_TERMINATED afterwards to
2080   // properly cleanup.
2081   if (deleting_soon_)
2082     return;
2083 
2084   if (child_process_launcher_) {
2085     if (!child_process_launcher_->GetHandle()) {
2086       OnChannelError();
2087       return;
2088     }
2089 
2090     SetBackgrounded(backgrounded_);
2091   }
2092 
2093   // NOTE: This needs to be before sending queued messages because
2094   // ExtensionService uses this notification to initialize the renderer process
2095   // with state that must be there before any JavaScript executes.
2096   //
2097   // The queued messages contain such things as "navigate". If this notification
2098   // was after, we can end up executing JavaScript before the initialization
2099   // happens.
2100   NotificationService::current()->Notify(
2101       NOTIFICATION_RENDERER_PROCESS_CREATED,
2102       Source<RenderProcessHost>(this),
2103       NotificationService::NoDetails());
2104 
2105   // Allow Mojo to be setup before the renderer sees any Chrome IPC messages.
2106   // This way, Mojo can be safely used from the renderer in response to any
2107   // Chrome IPC message.
2108   MaybeActivateMojo();
2109 
2110   while (!queued_messages_.empty()) {
2111     Send(queued_messages_.front());
2112     queued_messages_.pop();
2113   }
2114 
2115 #if defined(ENABLE_WEBRTC)
2116   if (WebRTCInternals::GetInstance()->aec_dump_enabled())
2117     EnableAecDump(WebRTCInternals::GetInstance()->aec_dump_file_path());
2118 #endif
2119 }
2120 
2121 scoped_refptr<AudioRendererHost>
audio_renderer_host() const2122 RenderProcessHostImpl::audio_renderer_host() const {
2123   return audio_renderer_host_;
2124 }
2125 
OnUserMetricsRecordAction(const std::string & action)2126 void RenderProcessHostImpl::OnUserMetricsRecordAction(
2127     const std::string& action) {
2128   RecordComputedAction(action);
2129 }
2130 
OnCloseACK(int old_route_id)2131 void RenderProcessHostImpl::OnCloseACK(int old_route_id) {
2132   SessionStorageHolder* holder = static_cast<SessionStorageHolder*>
2133       (GetUserData(kSessionStorageHolderKey));
2134   if (!holder)
2135     return;
2136   holder->Release(old_route_id);
2137 }
2138 
OnSavedPageAsMHTML(int job_id,int64 data_size)2139 void RenderProcessHostImpl::OnSavedPageAsMHTML(int job_id, int64 data_size) {
2140   MHTMLGenerationManager::GetInstance()->MHTMLGenerated(job_id, data_size);
2141 }
2142 
OnCompositorSurfaceBuffersSwappedNoHost(const ViewHostMsg_CompositorSurfaceBuffersSwapped_Params & params)2143 void RenderProcessHostImpl::OnCompositorSurfaceBuffersSwappedNoHost(
2144       const ViewHostMsg_CompositorSurfaceBuffersSwapped_Params& params) {
2145   TRACE_EVENT0("renderer_host",
2146                "RenderWidgetHostImpl::OnCompositorSurfaceBuffersSwappedNoHost");
2147   if (!ui::LatencyInfo::Verify(params.latency_info,
2148                                "ViewHostMsg_CompositorSurfaceBuffersSwapped"))
2149     return;
2150   AcceleratedSurfaceMsg_BufferPresented_Params ack_params;
2151   ack_params.sync_point = 0;
2152   RenderWidgetHostImpl::AcknowledgeBufferPresent(params.route_id,
2153                                                  params.gpu_process_host_id,
2154                                                  ack_params);
2155 }
2156 
OnGpuSwitching()2157 void RenderProcessHostImpl::OnGpuSwitching() {
2158   // We are updating all widgets including swapped out ones.
2159   scoped_ptr<RenderWidgetHostIterator> widgets(
2160       RenderWidgetHostImpl::GetAllRenderWidgetHosts());
2161   while (RenderWidgetHost* widget = widgets->GetNextHost()) {
2162     if (!widget->IsRenderView())
2163       continue;
2164 
2165     // Skip widgets in other processes.
2166     if (widget->GetProcess()->GetID() != GetID())
2167       continue;
2168 
2169     RenderViewHost* rvh = RenderViewHost::From(widget);
2170     rvh->UpdateWebkitPreferences(rvh->GetWebkitPreferences());
2171   }
2172 }
2173 
2174 #if defined(ENABLE_WEBRTC)
OnRegisterAecDumpConsumer(int id)2175 void RenderProcessHostImpl::OnRegisterAecDumpConsumer(int id) {
2176   BrowserThread::PostTask(
2177       BrowserThread::UI,
2178       FROM_HERE,
2179       base::Bind(
2180           &RenderProcessHostImpl::RegisterAecDumpConsumerOnUIThread,
2181           weak_factory_.GetWeakPtr(),
2182           id));
2183 }
2184 
OnUnregisterAecDumpConsumer(int id)2185 void RenderProcessHostImpl::OnUnregisterAecDumpConsumer(int id) {
2186   BrowserThread::PostTask(
2187       BrowserThread::UI,
2188       FROM_HERE,
2189       base::Bind(
2190           &RenderProcessHostImpl::UnregisterAecDumpConsumerOnUIThread,
2191           weak_factory_.GetWeakPtr(),
2192           id));
2193 }
2194 
RegisterAecDumpConsumerOnUIThread(int id)2195 void RenderProcessHostImpl::RegisterAecDumpConsumerOnUIThread(int id) {
2196   DCHECK_CURRENTLY_ON(BrowserThread::UI);
2197   aec_dump_consumers_.push_back(id);
2198   if (WebRTCInternals::GetInstance()->aec_dump_enabled()) {
2199     EnableAecDumpForId(WebRTCInternals::GetInstance()->aec_dump_file_path(),
2200                        id);
2201   }
2202 }
2203 
UnregisterAecDumpConsumerOnUIThread(int id)2204 void RenderProcessHostImpl::UnregisterAecDumpConsumerOnUIThread(int id) {
2205   DCHECK_CURRENTLY_ON(BrowserThread::UI);
2206   for (std::vector<int>::iterator it = aec_dump_consumers_.begin();
2207        it != aec_dump_consumers_.end(); ++it) {
2208     if (*it == id) {
2209       aec_dump_consumers_.erase(it);
2210       break;
2211     }
2212   }
2213 }
2214 
2215 #if defined(OS_WIN)
2216 #define IntToStringType base::IntToString16
2217 #else
2218 #define IntToStringType base::IntToString
2219 #endif
2220 
EnableAecDumpForId(const base::FilePath & file,int id)2221 void RenderProcessHostImpl::EnableAecDumpForId(const base::FilePath& file,
2222                                                int id) {
2223   DCHECK_CURRENTLY_ON(BrowserThread::UI);
2224   base::FilePath unique_file =
2225       file.AddExtension(IntToStringType(GetID()))
2226           .AddExtension(IntToStringType(id));
2227   BrowserThread::PostTaskAndReplyWithResult(
2228       BrowserThread::FILE, FROM_HERE,
2229       base::Bind(&CreateAecDumpFileForProcess, unique_file, GetHandle()),
2230       base::Bind(&RenderProcessHostImpl::SendAecDumpFileToRenderer,
2231                  weak_factory_.GetWeakPtr(),
2232                  id));
2233 }
2234 
2235 #undef IntToStringType
2236 
SendAecDumpFileToRenderer(int id,IPC::PlatformFileForTransit file_for_transit)2237 void RenderProcessHostImpl::SendAecDumpFileToRenderer(
2238     int id,
2239     IPC::PlatformFileForTransit file_for_transit) {
2240   if (file_for_transit == IPC::InvalidPlatformFileForTransit())
2241     return;
2242   Send(new AecDumpMsg_EnableAecDump(id, file_for_transit));
2243 }
2244 
SendDisableAecDumpToRenderer()2245 void RenderProcessHostImpl::SendDisableAecDumpToRenderer() {
2246   Send(new AecDumpMsg_DisableAecDump());
2247 }
2248 #endif
2249 
IncrementWorkerRefCount()2250 void RenderProcessHostImpl::IncrementWorkerRefCount() {
2251   DCHECK_CURRENTLY_ON(BrowserThread::UI);
2252   ++worker_ref_count_;
2253 }
2254 
DecrementWorkerRefCount()2255 void RenderProcessHostImpl::DecrementWorkerRefCount() {
2256   DCHECK_CURRENTLY_ON(BrowserThread::UI);
2257   DCHECK_GT(worker_ref_count_, 0);
2258   --worker_ref_count_;
2259   if (worker_ref_count_ == 0)
2260     Cleanup();
2261 }
2262 
ConnectTo(const base::StringPiece & service_name,mojo::ScopedMessagePipeHandle handle)2263 void RenderProcessHostImpl::ConnectTo(
2264     const base::StringPiece& service_name,
2265     mojo::ScopedMessagePipeHandle handle) {
2266   mojo_activation_required_ = true;
2267   MaybeActivateMojo();
2268 
2269   mojo_application_host_->service_provider()->ConnectToService(
2270       mojo::String::From(service_name),
2271       std::string(),
2272       handle.Pass(),
2273       mojo::String());
2274 }
2275 
OnAllocateGpuMemoryBuffer(uint32 width,uint32 height,uint32 internalformat,uint32 usage,IPC::Message * reply)2276 void RenderProcessHostImpl::OnAllocateGpuMemoryBuffer(uint32 width,
2277                                                       uint32 height,
2278                                                       uint32 internalformat,
2279                                                       uint32 usage,
2280                                                       IPC::Message* reply) {
2281   DCHECK_CURRENTLY_ON(BrowserThread::UI);
2282   if (!GpuMemoryBufferImpl::IsFormatValid(internalformat) ||
2283       !GpuMemoryBufferImpl::IsUsageValid(usage)) {
2284     GpuMemoryBufferAllocated(reply, gfx::GpuMemoryBufferHandle());
2285     return;
2286   }
2287   base::CheckedNumeric<int> size = width;
2288   size *= height;
2289   if (!size.IsValid()) {
2290     GpuMemoryBufferAllocated(reply, gfx::GpuMemoryBufferHandle());
2291     return;
2292   }
2293 
2294 #if defined(OS_MACOSX)
2295   // TODO(reveman): This should be moved to
2296   // GpuMemoryBufferImpl::AllocateForChildProcess and
2297   // GpuMemoryBufferImplIOSurface. crbug.com/325045, crbug.com/323304
2298   if (GpuMemoryBufferImplIOSurface::IsConfigurationSupported(internalformat,
2299                                                              usage)) {
2300     base::ScopedCFTypeRef<CFMutableDictionaryRef> properties;
2301     properties.reset(
2302         CFDictionaryCreateMutable(kCFAllocatorDefault,
2303                                   0,
2304                                   &kCFTypeDictionaryKeyCallBacks,
2305                                   &kCFTypeDictionaryValueCallBacks));
2306     AddIntegerValue(properties, kIOSurfaceWidth, width);
2307     AddIntegerValue(properties, kIOSurfaceHeight, height);
2308     AddIntegerValue(properties,
2309                     kIOSurfaceBytesPerElement,
2310                     GpuMemoryBufferImpl::BytesPerPixel(internalformat));
2311     AddIntegerValue(
2312         properties,
2313         kIOSurfacePixelFormat,
2314         GpuMemoryBufferImplIOSurface::PixelFormat(internalformat));
2315     // TODO(reveman): Remove this when using a mach_port_t to transfer
2316     // IOSurface to renderer process. crbug.com/323304
2317     AddBooleanValue(
2318         properties, kIOSurfaceIsGlobal, true);
2319 
2320     base::ScopedCFTypeRef<IOSurfaceRef> io_surface(IOSurfaceCreate(properties));
2321     if (io_surface) {
2322       gfx::GpuMemoryBufferHandle handle;
2323       handle.type = gfx::IO_SURFACE_BUFFER;
2324       handle.io_surface_id = IOSurfaceGetID(io_surface);
2325 
2326       // TODO(reveman): This makes the assumption that the renderer will
2327       // grab a reference to the surface before sending another message.
2328       // crbug.com/325045
2329       last_io_surface_ = io_surface;
2330       GpuMemoryBufferAllocated(reply, handle);
2331       return;
2332     }
2333   }
2334 #endif
2335 
2336 #if defined(OS_ANDROID)
2337   // TODO(reveman): This should be moved to
2338   // GpuMemoryBufferImpl::AllocateForChildProcess and
2339   // GpuMemoryBufferImplSurfaceTexture when adding support for out-of-process
2340   // GPU service. crbug.com/368716
2341   if (GpuMemoryBufferImplSurfaceTexture::IsConfigurationSupported(
2342           internalformat, usage)) {
2343     // Each surface texture is associated with a render process id. This allows
2344     // the GPU service and Java Binder IPC to verify that a renderer is not
2345     // trying to use a surface texture it doesn't own.
2346     int surface_texture_id = CompositorImpl::CreateSurfaceTexture(GetID());
2347     if (surface_texture_id != -1) {
2348       gfx::GpuMemoryBufferHandle handle;
2349       handle.type = gfx::SURFACE_TEXTURE_BUFFER;
2350       handle.surface_texture_id =
2351           gfx::SurfaceTextureId(surface_texture_id, GetID());
2352       GpuMemoryBufferAllocated(reply, handle);
2353       return;
2354     }
2355   }
2356 #endif
2357 
2358   GpuMemoryBufferImpl::AllocateForChildProcess(
2359       gfx::Size(width, height),
2360       internalformat,
2361       usage,
2362       GetHandle(),
2363       base::Bind(&RenderProcessHostImpl::GpuMemoryBufferAllocated,
2364                  weak_factory_.GetWeakPtr(),
2365                  reply));
2366 }
2367 
GpuMemoryBufferAllocated(IPC::Message * reply,const gfx::GpuMemoryBufferHandle & handle)2368 void RenderProcessHostImpl::GpuMemoryBufferAllocated(
2369     IPC::Message* reply,
2370     const gfx::GpuMemoryBufferHandle& handle) {
2371   DCHECK_CURRENTLY_ON(BrowserThread::UI);
2372   ChildProcessHostMsg_SyncAllocateGpuMemoryBuffer::WriteReplyParams(reply,
2373                                                                     handle);
2374   Send(reply);
2375 }
2376 
2377 }  // namespace content
2378