1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
|
// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "content/app/android/sandboxed_process_service.h"
#include "base/android/jni_array.h"
#include "base/global_descriptors_posix.h"
#include "base/logging.h"
#include "content/common/android/surface_texture_peer.h"
#include "content/public/app/android_library_loader_hooks.h"
#include "content/public/common/content_descriptors.h"
#include "ipc/ipc_descriptors.h"
#include "jni/SandboxedProcessService_jni.h"
using base::android::AttachCurrentThread;
using base::android::CheckException;
using base::android::JavaIntArrayToIntVector;
namespace {
class SurfaceTexturePeerSandboxedImpl : public content::SurfaceTexturePeer {
public:
// |service| is the instance of
// org.chromium.content.app.SandboxedProcessService.
SurfaceTexturePeerSandboxedImpl(jobject service)
: service_(service) {
}
virtual ~SurfaceTexturePeerSandboxedImpl() {
}
virtual void EstablishSurfaceTexturePeer(base::ProcessHandle pid,
SurfaceTextureTarget type,
jobject j_surface_texture,
int primary_id,
int secondary_id) {
JNIEnv* env = base::android::AttachCurrentThread();
content::Java_SandboxedProcessService_establishSurfaceTexturePeer(
env, service_, pid, type, j_surface_texture, primary_id, secondary_id);
CheckException(env);
}
private:
// The instance of org.chromium.content.app.SandboxedProcessService.
jobject service_;
DISALLOW_COPY_AND_ASSIGN(SurfaceTexturePeerSandboxedImpl);
};
// Chrome actually uses the renderer code path for all of its sandboxed
// processes such as renderers, plugins, etc.
void InternalInitSandboxedProcess(const std::vector<int>& file_ids,
const std::vector<int>& file_fds,
JNIEnv* env,
jclass clazz,
jobject context,
jobject service) {
// Register the file descriptors.
// This includes the IPC channel, the crash dump signals and resource related
// files.
DCHECK(file_fds.size() == file_ids.size());
for (size_t i = 0; i < file_ids.size(); ++i)
base::GlobalDescriptors::GetInstance()->Set(file_ids[i], file_fds[i]);
content::SurfaceTexturePeer::InitInstance(
new SurfaceTexturePeerSandboxedImpl(service));
}
} // namespace <anonymous>
namespace content {
void InitSandboxedProcess(JNIEnv* env,
jclass clazz,
jobject context,
jobject service,
jintArray j_file_ids,
jintArray j_file_fds) {
std::vector<int> file_ids;
std::vector<int> file_fds;
JavaIntArrayToIntVector(env, j_file_ids, &file_ids);
JavaIntArrayToIntVector(env, j_file_fds, &file_fds);
InternalInitSandboxedProcess(
file_ids, file_fds, env, clazz, context, service);
}
void ExitSandboxedProcess(JNIEnv* env, jclass clazz) {
LOG(INFO) << "SandboxedProcessService: Exiting sandboxed process.";
LibraryLoaderExitHook();
_exit(0);
}
bool RegisterSandboxedProcessService(JNIEnv* env) {
return RegisterNativesImpl(env);
}
} // namespace content
|