1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
|
// Copyright (c) 2009 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "chrome/common/child_process_info.h"
#include <limits>
#include "app/l10n_util.h"
#include "base/atomicops.h"
#include "base/logging.h"
#include "base/process_util.h"
#include "base/rand_util.h"
#include "base/string_util.h"
#include "grit/generated_resources.h"
ChildProcessInfo::ChildProcessInfo(const ChildProcessInfo& original)
: type_(original.type_),
name_(original.name_),
id_(original.id_),
process_(original.process_) {
}
ChildProcessInfo::~ChildProcessInfo() {
}
ChildProcessInfo& ChildProcessInfo::operator=(
const ChildProcessInfo& original) {
if (&original != this) {
type_ = original.type_;
name_ = original.name_;
id_ = original.id_;
process_ = original.process_;
}
return *this;
}
std::wstring ChildProcessInfo::GetTypeNameInEnglish(
ChildProcessInfo::ProcessType type) {
switch (type) {
case BROWSER_PROCESS:
return L"Browser";
case RENDER_PROCESS:
return L"Tab";
case PLUGIN_PROCESS:
return L"Plug-in";
case WORKER_PROCESS:
return L"Web Worker";
case UTILITY_PROCESS:
return L"Utility";
case PROFILE_IMPORT_PROCESS:
return L"Profile Import helper";
case ZYGOTE_PROCESS:
return L"Zygote";
case SANDBOX_HELPER_PROCESS:
return L"Sandbox helper";
case NACL_PROCESS:
return L"Native Client module";
case UNKNOWN_PROCESS:
default:
DCHECK(false) << "Unknown child process type!";
return L"Unknown";
}
}
std::wstring ChildProcessInfo::GetLocalizedTitle() const {
std::wstring title = name_;
if (type_ == ChildProcessInfo::PLUGIN_PROCESS && title.empty())
title = l10n_util::GetString(IDS_TASK_MANAGER_UNKNOWN_PLUGIN_NAME);
int message_id;
if (type_ == ChildProcessInfo::PLUGIN_PROCESS) {
message_id = IDS_TASK_MANAGER_PLUGIN_PREFIX;
} else if (type_ == ChildProcessInfo::WORKER_PROCESS) {
message_id = IDS_TASK_MANAGER_WORKER_PREFIX;
} else if (type_ == ChildProcessInfo::UTILITY_PROCESS) {
message_id = IDS_TASK_MANAGER_UTILITY_PREFIX;
} else if (type_ == ChildProcessInfo::PROFILE_IMPORT_PROCESS) {
message_id = IDS_TASK_MANAGER_PROFILE_IMPORT_PREFIX;
} else if (type_ == ChildProcessInfo::NACL_PROCESS) {
message_id = IDS_TASK_MANAGER_NACL_PREFIX;
} else {
DCHECK(false) << "Need localized name for child process type.";
return title;
}
// Explicitly mark name as LTR if there is no strong RTL character,
// to avoid the wrong concatenation result similar to "!Yahoo! Mail: the
// best web-based Email: NIGULP", in which "NIGULP" stands for the Hebrew
// or Arabic word for "plugin".
l10n_util::AdjustStringForLocaleDirection(title, &title);
return l10n_util::GetStringF(message_id, title);
}
ChildProcessInfo::ChildProcessInfo(ProcessType type, int id) : type_(type) {
if (id == -1)
id_ = GenerateChildProcessUniqueId();
else
id_ = id;
}
std::string ChildProcessInfo::GenerateRandomChannelID(void* instance) {
// Note: the string must start with the current process id, this is how
// child processes determine the pid of the parent.
// Build the channel ID. This is composed of a unique identifier for the
// parent browser process, an identifier for the child instance, and a random
// component. We use a random component so that a hacked child process can't
// cause denial of service by causing future named pipe creation to fail.
return StringPrintf("%d.%x.%d",
base::GetCurrentProcId(), instance,
base::RandInt(0, std::numeric_limits<int>::max()));
}
// static
int ChildProcessInfo::GenerateChildProcessUniqueId() {
// This function must be threadsafe.
static base::subtle::Atomic32 last_unique_child_id = 0;
return base::subtle::NoBarrier_AtomicIncrement(&last_unique_child_id, 1);
}
|