summaryrefslogtreecommitdiffstats
path: root/chrome/common
diff options
context:
space:
mode:
authorphajdan.jr@chromium.org <phajdan.jr@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-01-23 18:03:29 +0000
committerphajdan.jr@chromium.org <phajdan.jr@chromium.org@0039d316-1c4b-4281-b951-d872f2087c98>2009-01-23 18:03:29 +0000
commit569b1106f62d531c11f857f08961f41efe2b272e (patch)
treec9a4d93a65b16317604e544854f5ee9a15751896 /chrome/common
parent423bd5b84aee7a02b62e4e4d8a83d7df6c0943d9 (diff)
downloadchromium_src-569b1106f62d531c11f857f08961f41efe2b272e.zip
chromium_src-569b1106f62d531c11f857f08961f41efe2b272e.tar.gz
chromium_src-569b1106f62d531c11f857f08961f41efe2b272e.tar.bz2
Porting in chrome/
Review URL: http://codereview.chromium.org/18446 git-svn-id: svn://svn.chromium.org/chrome/trunk/src@8560 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'chrome/common')
-rw-r--r--chrome/common/common.scons7
-rw-r--r--chrome/common/process_watcher.cc78
-rw-r--r--chrome/common/security_filter_peer.h2
3 files changed, 40 insertions, 47 deletions
diff --git a/chrome/common/common.scons b/chrome/common/common.scons
index 7f2fd74..8761002 100644
--- a/chrome/common/common.scons
+++ b/chrome/common/common.scons
@@ -218,13 +218,8 @@ if not env.Bit('windows'):
'gfx/icon_util.cc',
'gfx/path.cc',
'ipc_logging.cc',
- 'jstemplate_builder.cc',
'os_exchange_data.cc',
'plugin_messages.cc',
- 'process_watcher.cc',
- 'security_filter_peer.cc',
- 'win_safe_util.cc',
- 'win_util.cc',
)
if not env.Bit('windows'):
@@ -235,6 +230,8 @@ if not env.Bit('windows'):
'gfx/chrome_font_win.cc',
'ipc_channel_win.cc',
'resource_bundle_win.cc',
+ 'win_safe_util.cc',
+ 'win_util.cc',
'$CHROME_DIR/tools/build/win/precompiled$OBJSUFFIX',
)
diff --git a/chrome/common/process_watcher.cc b/chrome/common/process_watcher.cc
index b43e2db..ceabaea2 100644
--- a/chrome/common/process_watcher.cc
+++ b/chrome/common/process_watcher.cc
@@ -4,9 +4,13 @@
#include "chrome/common/process_watcher.h"
+#include "base/basictypes.h"
#include "base/message_loop.h"
-#include "base/object_watcher.h"
+#include "base/process.h"
+#include "base/process_util.h"
#include "base/sys_info.h"
+#include "base/timer.h"
+#include "base/worker_pool.h"
#include "chrome/app/result_codes.h"
#include "chrome/common/env_vars.h"
@@ -15,80 +19,72 @@ static const int kWaitInterval = 2000;
namespace {
-class TimerExpiredTask : public Task, public base::ObjectWatcher::Delegate {
+class TerminatorTask : public Task {
public:
- explicit TimerExpiredTask(base::ProcessHandle process) : process_(process) {
- watcher_.StartWatching(process_, this);
+ explicit TerminatorTask(base::ProcessHandle process) : process_(process) {
+ timer_.Start(base::TimeDelta::FromMilliseconds(kWaitInterval),
+ this, &TerminatorTask::KillProcess);
}
- virtual ~TimerExpiredTask() {
+ virtual ~TerminatorTask() {
if (process_) {
KillProcess();
- DCHECK(!process_) << "Make sure to close the handle.";
+ DCHECK(!process_);
}
}
- // Task ---------------------------------------------------------------------
-
virtual void Run() {
+ base::WaitForSingleProcess(process_, kWaitInterval);
+ timer_.Stop();
if (process_)
KillProcess();
}
- // MessageLoop::Watcher -----------------------------------------------------
-
- virtual void OnObjectSignaled(HANDLE object) {
- // When we're called from KillProcess, the ObjectWatcher may still be
- // watching. the process handle, so make sure it has stopped.
- watcher_.StopWatching();
-
- CloseHandle(process_);
- process_ = NULL;
- }
-
private:
void KillProcess() {
if (base::SysInfo::HasEnvVar(env_vars::kHeadless)) {
- // If running the distributed tests, give the renderer a little time
- // to figure out that the channel is shutdown and unwind.
- if (WaitForSingleObject(process_, kWaitInterval) == WAIT_OBJECT_0) {
- OnObjectSignaled(process_);
- return;
- }
+ // If running the distributed tests, give the renderer a little time
+ // to figure out that the channel is shutdown and unwind.
+ if (base::WaitForSingleProcess(process_, kWaitInterval)) {
+ Cleanup();
+ return;
+ }
}
// OK, time to get frisky. We don't actually care when the process
- // terminates. We just care that it eventually terminates, and that's what
- // TerminateProcess should do for us. Don't check for the result code since
- // it fails quite often. This should be investigated eventually.
- TerminateProcess(process_, ResultCodes::HUNG);
+ // terminates. We just care that it eventually terminates.
+ base::KillProcess(base::Process(process_).pid(),
+ ResultCodes::HUNG,
+ false /* don't wait */);
- // Now, just cleanup as if the process exited normally.
- OnObjectSignaled(process_);
+ Cleanup();
+ }
+
+ void Cleanup() {
+ timer_.Stop();
+ base::CloseProcessHandle(process_);
+ process_ = NULL;
}
// The process that we are watching.
base::ProcessHandle process_;
- base::ObjectWatcher watcher_;
+ base::OneShotTimer<TerminatorTask> timer_;
- DISALLOW_EVIL_CONSTRUCTORS(TimerExpiredTask);
+ DISALLOW_COPY_AND_ASSIGN(TerminatorTask);
};
} // namespace
// static
void ProcessWatcher::EnsureProcessTerminated(base::ProcessHandle process) {
- DCHECK(process != GetCurrentProcess());
+ DCHECK(base::GetProcId(process) != base::GetCurrentProcId());
- // If already signaled, then we are done!
- if (WaitForSingleObject(process, 0) == WAIT_OBJECT_0) {
- CloseHandle(process);
+ // Check if the process has already exited.
+ if (base::WaitForSingleProcess(process, 0)) {
+ base::CloseProcessHandle(process);
return;
}
- MessageLoop::current()->PostDelayedTask(FROM_HERE,
- new TimerExpiredTask(process),
- kWaitInterval);
+ WorkerPool::PostTask(FROM_HERE, new TerminatorTask(process), true);
}
-
diff --git a/chrome/common/security_filter_peer.h b/chrome/common/security_filter_peer.h
index 616680d..ef19b71 100644
--- a/chrome/common/security_filter_peer.h
+++ b/chrome/common/security_filter_peer.h
@@ -50,8 +50,8 @@ class SecurityFilterPeer : public webkit_glue::ResourceLoaderBridge::Peer {
SecurityFilterPeer(webkit_glue::ResourceLoaderBridge* resource_loader_bridge,
webkit_glue::ResourceLoaderBridge::Peer* peer);
- webkit_glue::ResourceLoaderBridge* resource_loader_bridge_;
webkit_glue::ResourceLoaderBridge::Peer* original_peer_;
+ webkit_glue::ResourceLoaderBridge* resource_loader_bridge_;
private:
DISALLOW_EVIL_CONSTRUCTORS(SecurityFilterPeer);