summaryrefslogtreecommitdiffstats
path: root/content/app/android/sandboxed_process_service.cc
blob: e7118ffcc6ffd7b8982cfd94d14735ec8e217f05 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.

#include "content/app/android/sandboxed_process_service.h"

#include <cpu-features.h>

#include "base/android/jni_array.h"
#include "base/logging.h"
#include "base/posix/global_descriptors.h"
#include "content/common/android/surface_texture_peer.h"
#include "content/common/child_process.h"
#include "content/common/child_thread.h"
#include "content/public/app/android_library_loader_hooks.h"
#include "content/public/common/content_descriptors.h"
#include "ipc/ipc_descriptors.h"
#include "jni/SandboxedProcessService_jni.h"

using base::android::AttachCurrentThread;
using base::android::CheckException;
using base::android::JavaIntArrayToIntVector;

namespace {

class SurfaceTexturePeerSandboxedImpl : public content::SurfaceTexturePeer {
 public:
  // |service| is the instance of
  // org.chromium.content.app.SandboxedProcessService.
  SurfaceTexturePeerSandboxedImpl(jobject service)
      : service_(service) {
  }

  virtual ~SurfaceTexturePeerSandboxedImpl() {
  }

  virtual void EstablishSurfaceTexturePeer(
      base::ProcessHandle pid,
      scoped_refptr<content::SurfaceTextureBridge> surface_texture_bridge,
      int primary_id,
      int secondary_id) {
    JNIEnv* env = base::android::AttachCurrentThread();
    content::Java_SandboxedProcessService_establishSurfaceTexturePeer(
        env, service_, pid,
        surface_texture_bridge->j_surface_texture().obj(), primary_id,
        secondary_id);
    CheckException(env);
  }

 private:
  // The instance of org.chromium.content.app.SandboxedProcessService.
  jobject service_;

  DISALLOW_COPY_AND_ASSIGN(SurfaceTexturePeerSandboxedImpl);
};

// Chrome actually uses the renderer code path for all of its sandboxed
// processes such as renderers, plugins, etc.
void InternalInitSandboxedProcess(const std::vector<int>& file_ids,
                                  const std::vector<int>& file_fds,
                                  JNIEnv* env,
                                  jclass clazz,
                                  jobject context,
                                  jobject service,
                                  jint cpu_count,
                                  jlong cpu_features) {
  // Set the CPU properties.
  android_setCpu(cpu_count, cpu_features);
  // Register the file descriptors.
  // This includes the IPC channel, the crash dump signals and resource related
  // files.
  DCHECK(file_fds.size() == file_ids.size());
  for (size_t i = 0; i < file_ids.size(); ++i)
    base::GlobalDescriptors::GetInstance()->Set(file_ids[i], file_fds[i]);

  content::SurfaceTexturePeer::InitInstance(
      new SurfaceTexturePeerSandboxedImpl(service));

}

void QuitSandboxMainThreadMessageLoop() {
  MessageLoop::current()->Quit();
}

}  // namespace <anonymous>

namespace content {

void InitSandboxedProcess(JNIEnv* env,
                          jclass clazz,
                          jobject context,
                          jobject service,
                          jintArray j_file_ids,
                          jintArray j_file_fds,
                          jint cpu_count,
                          jlong cpu_features) {
  std::vector<int> file_ids;
  std::vector<int> file_fds;
  JavaIntArrayToIntVector(env, j_file_ids, &file_ids);
  JavaIntArrayToIntVector(env, j_file_fds, &file_fds);

  InternalInitSandboxedProcess(
      file_ids, file_fds, env, clazz, context, service,
      cpu_count, cpu_features);
}

void ExitSandboxedProcess(JNIEnv* env, jclass clazz) {
  LOG(INFO) << "SandboxedProcessService: Exiting sandboxed process.";
  LibraryLoaderExitHook();
  _exit(0);
}

bool RegisterSandboxedProcessService(JNIEnv* env) {
  return RegisterNativesImpl(env);
}

void ShutdownSandboxMainThread(JNIEnv* env, jobject obj) {
  ChildProcess* current_process = ChildProcess::current();
  if (!current_process)
    return;
  ChildThread* main_child_thread = current_process->main_thread();
  if (main_child_thread && main_child_thread->message_loop())
    main_child_thread->message_loop()->PostTask(FROM_HERE,
        base::Bind(&QuitSandboxMainThreadMessageLoop));
}

}  // namespace content