// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "content/public/app/content_main_runner.h" #include #include #include #include #include #include #include #include "base/allocator/allocator_check.h" #include "base/allocator/allocator_extension.h" #include "base/allocator/buildflags.h" #include "base/at_exit.h" #include "base/base_switches.h" #include "base/command_line.h" #include "base/debug/debugger.h" #include "base/debug/stack_trace.h" #include "base/feature_list.h" #include "base/files/file_path.h" #include "base/i18n/icu_util.h" #include "base/lazy_instance.h" #include "base/logging.h" #include "base/macros.h" #include "base/metrics/field_trial.h" #include "base/metrics/histogram_base.h" #include "base/path_service.h" #include "base/process/launch.h" #include "base/process/memory.h" #include "base/process/process.h" #include "base/process/process_handle.h" #include "base/strings/string_number_conversions.h" #include "base/strings/string_util.h" #include "base/strings/stringprintf.h" #include "base/trace_event/trace_event.h" #include "build/build_config.h" #include "components/tracing/common/trace_startup.h" #include "content/app/mojo/mojo_init.h" #include "content/common/url_schemes.h" #include "content/public/app/content_main.h" #include "content/public/app/content_main_delegate.h" #include "content/public/common/content_client.h" #include "content/public/common/content_constants.h" #include "content/public/common/content_descriptor_keys.h" #include "content/public/common/content_features.h" #include "content/public/common/content_paths.h" #include "content/public/common/content_switches.h" #include "content/public/common/main_function_params.h" #include "content/public/common/sandbox_init.h" #include "content/public/common/zygote_buildflags.h" #include "gin/v8_initializer.h" #include "media/base/media.h" #include "media/media_buildflags.h" #include "ppapi/buildflags/buildflags.h" #include "services/service_manager/embedder/switches.h" #include "services/service_manager/sandbox/sandbox_type.h" #include "ui/base/ui_base_paths.h" #include "ui/base/ui_base_switches.h" #include "ui/display/display_switches.h" #include "ui/gfx/switches.h" #if defined(OS_WIN) #include #include #include "base/trace_event/trace_event_etw_export_win.h" #include "sandbox/win/src/sandbox_types.h" #include "ui/display/win/dpi.h" #elif defined(OS_MACOSX) #include "base/mac/scoped_nsautorelease_pool.h" #include "base/power_monitor/power_monitor_device_source.h" #include "content/browser/mach_broker_mac.h" #endif // OS_WIN #if defined(OS_POSIX) #include #include "base/file_descriptor_store.h" #include "base/posix/global_descriptors.h" #include "content/public/common/content_descriptors.h" #if !defined(OS_MACOSX) #include "content/public/common/zygote_fork_delegate_linux.h" #endif #if !defined(OS_MACOSX) && !defined(OS_ANDROID) #include "content/zygote/zygote_main.h" #include "sandbox/linux/services/libc_interceptor.h" #endif #endif // OS_POSIX #if defined(OS_LINUX) #include "base/native_library.h" #include "base/rand_util.h" #include "content/common/font_config_ipc_linux.h" #include "content/public/common/common_sandbox_support_linux.h" #include "third_party/blink/public/platform/web_font_render_style.h" #include "third_party/boringssl/src/include/openssl/crypto.h" #include "third_party/boringssl/src/include/openssl/rand.h" #include "third_party/skia/include/ports/SkFontConfigInterface.h" #include "third_party/skia/include/ports/SkFontMgr.h" #include "third_party/skia/include/ports/SkFontMgr_android.h" #if BUILDFLAG(ENABLE_PLUGINS) #include "content/common/pepper_plugin_list.h" #include "content/public/common/pepper_plugin_info.h" #endif #if BUILDFLAG(ENABLE_LIBRARY_CDMS) #include "content/public/common/cdm_info.h" #include "content/public/common/content_client.h" #endif #if BUILDFLAG(ENABLE_WEBRTC) #include "third_party/webrtc_overrides/init_webrtc.h" // nogncheck #endif #endif // OS_LINUX #if !defined(CHROME_MULTIPLE_DLL_BROWSER) #include "content/public/gpu/content_gpu_client.h" #include "content/public/renderer/content_renderer_client.h" #include "content/public/utility/content_utility_client.h" #endif #if !defined(CHROME_MULTIPLE_DLL_CHILD) #include "content/browser/browser_main.h" #include "content/public/browser/content_browser_client.h" #endif #if !defined(CHROME_MULTIPLE_DLL_BROWSER) && !defined(CHROME_MULTIPLE_DLL_CHILD) #include "content/browser/gpu/gpu_main_thread_factory.h" #include "content/browser/renderer_host/render_process_host_impl.h" #include "content/browser/utility_process_host.h" #include "content/gpu/in_process_gpu_thread.h" #include "content/renderer/in_process_renderer_thread.h" #include "content/utility/in_process_utility_thread.h" #endif #if BUILDFLAG(USE_ZYGOTE_HANDLE) #include "content/browser/sandbox_host_linux.h" #include "content/browser/zygote_host/zygote_communication_linux.h" #include "content/browser/zygote_host/zygote_host_impl_linux.h" #include "content/public/common/common_sandbox_support_linux.h" #include "content/public/common/zygote_handle.h" #include "media/base/media_switches.h" #endif namespace content { extern int GpuMain(const content::MainFunctionParams&); #if BUILDFLAG(ENABLE_PLUGINS) #if !defined(OS_LINUX) extern int PluginMain(const content::MainFunctionParams&); #endif extern int PpapiPluginMain(const MainFunctionParams&); extern int PpapiBrokerMain(const MainFunctionParams&); #endif extern int RendererMain(const content::MainFunctionParams&); extern int UtilityMain(const MainFunctionParams&); } // namespace content namespace content { namespace { #if defined(V8_USE_EXTERNAL_STARTUP_DATA) && defined(OS_ANDROID) #if defined __LP64__ #define kV8SnapshotDataDescriptor kV8Snapshot64DataDescriptor #else #define kV8SnapshotDataDescriptor kV8Snapshot32DataDescriptor #endif #endif // This sets up two singletons responsible for managing field trials. The // |field_trial_list| singleton lives on the stack and must outlive the Run() // method of the process. void InitializeFieldTrialAndFeatureList( std::unique_ptr* field_trial_list) { const base::CommandLine& command_line = *base::CommandLine::ForCurrentProcess(); // Initialize statistical testing infrastructure. We set the entropy // provider to nullptr to disallow non-browser processes from creating // their own one-time randomized trials; they should be created in the // browser process. field_trial_list->reset(new base::FieldTrialList(nullptr)); // Ensure any field trials in browser are reflected into the child // process. #if defined(OS_POSIX) // On POSIX systems that use the zygote, we get the trials from a shared // memory segment backed by an fd instead of the command line. base::FieldTrialList::CreateTrialsFromCommandLine( command_line, switches::kFieldTrialHandle, kFieldTrialDescriptor); #else base::FieldTrialList::CreateTrialsFromCommandLine( command_line, switches::kFieldTrialHandle, -1); #endif std::unique_ptr feature_list(new base::FeatureList); base::FieldTrialList::CreateFeaturesFromCommandLine( command_line, switches::kEnableFeatures, switches::kDisableFeatures, feature_list.get()); base::FeatureList::SetInstance(std::move(feature_list)); } #if defined(V8_USE_EXTERNAL_STARTUP_DATA) void LoadV8SnapshotFile() { #if defined(USE_V8_CONTEXT_SNAPSHOT) static constexpr gin::V8Initializer::V8SnapshotFileType kSnapshotType = gin::V8Initializer::V8SnapshotFileType::kWithAdditionalContext; static const char* snapshot_data_descriptor = kV8ContextSnapshotDataDescriptor; #else static constexpr gin::V8Initializer::V8SnapshotFileType kSnapshotType = gin::V8Initializer::V8SnapshotFileType::kDefault; static const char* snapshot_data_descriptor = kV8SnapshotDataDescriptor; #endif // USE_V8_CONTEXT_SNAPSHOT ALLOW_UNUSED_LOCAL(kSnapshotType); ALLOW_UNUSED_LOCAL(snapshot_data_descriptor); #if defined(OS_POSIX) && !defined(OS_MACOSX) base::FileDescriptorStore& file_descriptor_store = base::FileDescriptorStore::GetInstance(); base::MemoryMappedFile::Region region; base::ScopedFD fd = file_descriptor_store.MaybeTakeFD(snapshot_data_descriptor, ®ion); if (fd.is_valid()) { gin::V8Initializer::LoadV8SnapshotFromFD(fd.get(), region.offset, region.size, kSnapshotType); return; } #endif // OS_POSIX && !OS_MACOSX #if !defined(CHROME_MULTIPLE_DLL_BROWSER) gin::V8Initializer::LoadV8Snapshot(kSnapshotType); #endif // !CHROME_MULTIPLE_DLL_BROWSER } void LoadV8NativesFile() { #if defined(OS_POSIX) && !defined(OS_MACOSX) base::FileDescriptorStore& file_descriptor_store = base::FileDescriptorStore::GetInstance(); base::MemoryMappedFile::Region region; base::ScopedFD fd = file_descriptor_store.MaybeTakeFD(kV8NativesDataDescriptor, ®ion); if (fd.is_valid()) { gin::V8Initializer::LoadV8NativesFromFD(fd.get(), region.offset, region.size); return; } #endif // OS_POSIX && !OS_MACOSX #if !defined(CHROME_MULTIPLE_DLL_BROWSER) gin::V8Initializer::LoadV8Natives(); #endif // !CHROME_MULTIPLE_DLL_BROWSER } #endif // V8_USE_EXTERNAL_STARTUP_DATA void InitializeV8IfNeeded(const base::CommandLine& command_line, const std::string& process_type) { if (process_type == switches::kGpuProcess) return; #if defined(V8_USE_EXTERNAL_STARTUP_DATA) LoadV8SnapshotFile(); LoadV8NativesFile(); #endif // V8_USE_EXTERNAL_STARTUP_DATA } #if BUILDFLAG(USE_ZYGOTE_HANDLE) pid_t LaunchZygoteHelper(base::CommandLine* cmd_line, base::ScopedFD* control_fd) { // Append any switches from the browser process that need to be forwarded on // to the zygote/renderers. static const char* const kForwardSwitches[] = { switches::kAndroidFontsPath, switches::kClearKeyCdmPathForTesting, switches::kEnableHeapProfiling, switches::kEnableLogging, // Support, e.g., --enable-logging=stderr. // Need to tell the zygote that it is headless so that we don't try to use // the wrong type of main delegate. switches::kHeadless, // Zygote process needs to know what resources to have loaded when it // becomes a renderer process. switches::kForceDeviceScaleFactor, switches::kLoggingLevel, switches::kPpapiInProcess, switches::kRegisterPepperPlugins, switches::kV, switches::kVModule, }; cmd_line->CopySwitchesFrom(*base::CommandLine::ForCurrentProcess(), kForwardSwitches, arraysize(kForwardSwitches)); GetContentClient()->browser()->AppendExtraCommandLineSwitches(cmd_line, -1); // Start up the sandbox host process and get the file descriptor for the // sandboxed processes to talk to it. base::FileHandleMappingVector additional_remapped_fds; additional_remapped_fds.emplace_back( SandboxHostLinux::GetInstance()->GetChildSocket(), GetSandboxFD()); return ZygoteHostImpl::GetInstance()->LaunchZygote( cmd_line, control_fd, std::move(additional_remapped_fds)); } // Initializes the Zygote sandbox host. No thread should be created before this // call, as InitializeZygoteSandboxForBrowserProcess() will end-up using fork(). void InitializeZygoteSandboxForBrowserProcess( const base::CommandLine& parsed_command_line) { TRACE_EVENT0("startup", "SetupSandbox"); // SandboxHostLinux needs to be initialized even if the sandbox and // zygote are both disabled. It initializes the sandboxed process socket. SandboxHostLinux::GetInstance()->Init(); if (parsed_command_line.HasSwitch(switches::kSingleProcess)) return; if (parsed_command_line.HasSwitch(switches::kNoZygote) && !parsed_command_line.HasSwitch(switches::kNoSandbox)) { LOG(ERROR) << "--no-sandbox should be used together with --no--zygote"; exit(EXIT_FAILURE); } // Tickle the zygote host so it forks now. ZygoteHostImpl::GetInstance()->Init(parsed_command_line); ZygoteHandle generic_zygote = CreateGenericZygote(base::BindOnce(LaunchZygoteHelper)); // TODO(kerrnel): Investigate doing this without the ZygoteHostImpl as a // proxy. It is currently done this way due to concerns about race // conditions. ZygoteHostImpl::GetInstance()->SetRendererSandboxStatus( generic_zygote->GetSandboxStatus()); } #endif // BUILDFLAG(USE_ZYGOTE_HANDLE) #if defined(OS_LINUX) #if BUILDFLAG(ENABLE_PLUGINS) // Loads the (native) libraries but does not initialize them (i.e., does not // call PPP_InitializeModule). This is needed by the zygote on Linux to get // access to the plugins before entering the sandbox. void PreloadPepperPlugins() { std::vector plugins; ComputePepperPluginList(&plugins); for (const auto& plugin : plugins) { if (!plugin.is_internal) { base::NativeLibraryLoadError error; base::NativeLibrary library = base::LoadNativeLibrary(plugin.path, &error); VLOG_IF(1, !library) << "Unable to load plugin " << plugin.path.value() << " " << error.ToString(); ignore_result(library); // Prevent release-mode warning. } } } #endif #if BUILDFLAG(ENABLE_LIBRARY_CDMS) // Loads registered library CDMs but does not initialize them. This is needed by // the zygote on Linux to get access to the CDMs before entering the sandbox. void PreloadLibraryCdms() { std::vector cdms; GetContentClient()->AddContentDecryptionModules(&cdms, nullptr); for (const auto& cdm : cdms) { base::NativeLibraryLoadError error; base::NativeLibrary library = base::LoadNativeLibrary(cdm.path, &error); VLOG_IF(1, !library) << "Unable to load CDM " << cdm.path.value() << " (error: " << error.ToString() << ")"; ignore_result(library); // Prevent release-mode warning. } } #endif // BUILDFLAG(ENABLE_LIBRARY_CDMS) #if BUILDFLAG(USE_ZYGOTE_HANDLE) void PreSandboxInit() { #if defined(ARCH_CPU_ARM_FAMILY) // On ARM, BoringSSL requires access to /proc/cpuinfo to determine processor // features. Query this before entering the sandbox. CRYPTO_library_init(); #endif // Pass BoringSSL a copy of the /dev/urandom file descriptor so RAND_bytes // will work inside the sandbox. RAND_set_urandom_fd(base::GetUrandomFD()); #if BUILDFLAG(ENABLE_PLUGINS) // Ensure access to the Pepper plugins before the sandbox is turned on. PreloadPepperPlugins(); #endif #if BUILDFLAG(ENABLE_LIBRARY_CDMS) // Ensure access to the library CDMs before the sandbox is turned on. PreloadLibraryCdms(); #endif #if BUILDFLAG(ENABLE_WEBRTC) InitializeWebRtcModule(); #endif SkFontConfigInterface::SetGlobal(new FontConfigIPC(GetSandboxFD()))->unref(); // Set the android SkFontMgr for blink. We need to ensure this is done // before the sandbox is initialized to allow the font manager to access // font configuration files on disk. if (base::CommandLine::ForCurrentProcess()->HasSwitch( switches::kAndroidFontsPath)) { std::string android_fonts_dir = base::CommandLine::ForCurrentProcess()->GetSwitchValueASCII( switches::kAndroidFontsPath); if (android_fonts_dir.size() > 0 && android_fonts_dir.back() != '/') android_fonts_dir += '/'; SkFontMgr_Android_CustomFonts custom; custom.fSystemFontUse = SkFontMgr_Android_CustomFonts::SystemFontUse::kOnlyCustom; custom.fBasePath = android_fonts_dir.c_str(); std::string font_config; std::string fallback_font_config; if (android_fonts_dir.find("kitkat") != std::string::npos) { font_config = android_fonts_dir + "system_fonts.xml"; fallback_font_config = android_fonts_dir + "fallback_fonts.xml"; custom.fFallbackFontsXml = fallback_font_config.c_str(); } else { font_config = android_fonts_dir + "fonts.xml"; custom.fFallbackFontsXml = nullptr; } custom.fFontsXml = font_config.c_str(); custom.fIsolated = true; blink::WebFontRenderStyle::SetSkiaFontManager( SkFontMgr_New_Android(&custom)); } } #endif // BUILDFLAG(USE_ZYGOTE_HANDLE) #endif // OS_LINUX } // namespace #if !defined(CHROME_MULTIPLE_DLL_CHILD) base::LazyInstance::DestructorAtExit g_empty_content_browser_client = LAZY_INSTANCE_INITIALIZER; #endif // !CHROME_MULTIPLE_DLL_CHILD #if !defined(CHROME_MULTIPLE_DLL_BROWSER) base::LazyInstance::DestructorAtExit g_empty_content_gpu_client = LAZY_INSTANCE_INITIALIZER; base::LazyInstance::DestructorAtExit g_empty_content_renderer_client = LAZY_INSTANCE_INITIALIZER; base::LazyInstance::DestructorAtExit g_empty_content_utility_client = LAZY_INSTANCE_INITIALIZER; #endif // !CHROME_MULTIPLE_DLL_BROWSER class ContentClientInitializer { public: static void Set(const std::string& process_type, ContentMainDelegate* delegate) { ContentClient* content_client = GetContentClient(); #if !defined(CHROME_MULTIPLE_DLL_CHILD) if (process_type.empty()) { if (delegate) content_client->browser_ = delegate->CreateContentBrowserClient(); if (!content_client->browser_) content_client->browser_ = &g_empty_content_browser_client.Get(); } #endif // !CHROME_MULTIPLE_DLL_CHILD #if !defined(CHROME_MULTIPLE_DLL_BROWSER) base::CommandLine* cmd = base::CommandLine::ForCurrentProcess(); if (process_type == switches::kGpuProcess || cmd->HasSwitch(switches::kSingleProcess) || (process_type.empty() && cmd->HasSwitch(switches::kInProcessGPU))) { if (delegate) content_client->gpu_ = delegate->CreateContentGpuClient(); if (!content_client->gpu_) content_client->gpu_ = &g_empty_content_gpu_client.Get(); } if (process_type == switches::kRendererProcess || cmd->HasSwitch(switches::kSingleProcess)) { if (delegate) content_client->renderer_ = delegate->CreateContentRendererClient(); if (!content_client->renderer_) content_client->renderer_ = &g_empty_content_renderer_client.Get(); } if (process_type == switches::kUtilityProcess || cmd->HasSwitch(switches::kSingleProcess)) { if (delegate) content_client->utility_ = delegate->CreateContentUtilityClient(); // TODO(scottmg): http://crbug.com/237249 Should be in _child. if (!content_client->utility_) content_client->utility_ = &g_empty_content_utility_client.Get(); } #endif // !CHROME_MULTIPLE_DLL_BROWSER } }; // We dispatch to a process-type-specific FooMain() based on a command-line // flag. This struct is used to build a table of (flag, main function) pairs. struct MainFunction { const char* name; int (*function)(const MainFunctionParams&); }; #if BUILDFLAG(USE_ZYGOTE_HANDLE) // On platforms that use the zygote, we have a special subset of // subprocesses that are launched via the zygote. This function // fills in some process-launching bits around ZygoteMain(). // Returns the exit code of the subprocess. int RunZygote(ContentMainDelegate* delegate) { static const MainFunction kMainFunctions[] = { {switches::kRendererProcess, RendererMain}, {switches::kUtilityProcess, UtilityMain}, #if BUILDFLAG(ENABLE_PLUGINS) {switches::kPpapiPluginProcess, PpapiPluginMain}, #endif }; std::vector> zygote_fork_delegates; if (delegate) { delegate->ZygoteStarting(&zygote_fork_delegates); media::InitializeMediaLibrary(); } #if defined(OS_LINUX) PreSandboxInit(); #endif // This function call can return multiple times, once per fork(). if (!ZygoteMain(std::move(zygote_fork_delegates))) return 1; if (delegate) delegate->ZygoteForked(); // Zygote::HandleForkRequest may have reallocated the command // line so update it here with the new version. const base::CommandLine& command_line = *base::CommandLine::ForCurrentProcess(); std::string process_type = command_line.GetSwitchValueASCII(switches::kProcessType); ContentClientInitializer::Set(process_type, delegate); #if !defined(OS_ANDROID) tracing::EnableStartupTracingIfNeeded(); #endif // !OS_ANDROID MainFunctionParams main_params(command_line); main_params.zygote_child = true; std::unique_ptr field_trial_list; InitializeFieldTrialAndFeatureList(&field_trial_list); service_manager::SandboxType sandbox_type = service_manager::SandboxTypeFromCommandLine(command_line); if (sandbox_type == service_manager::SANDBOX_TYPE_PROFILING) sandbox::SetUseLocaltimeOverride(false); for (size_t i = 0; i < arraysize(kMainFunctions); ++i) { if (process_type == kMainFunctions[i].name) return kMainFunctions[i].function(main_params); } if (delegate) return delegate->RunProcess(process_type, main_params); NOTREACHED() << "Unknown zygote process type: " << process_type; return 1; } #endif // BUILDFLAG(USE_ZYGOTE_HANDLE) static void RegisterMainThreadFactories() { #if !defined(CHROME_MULTIPLE_DLL_BROWSER) && !defined(CHROME_MULTIPLE_DLL_CHILD) UtilityProcessHost::RegisterUtilityMainThreadFactory( CreateInProcessUtilityThread); RenderProcessHostImpl::RegisterRendererMainThreadFactory( CreateInProcessRendererThread); content::RegisterGpuMainThreadFactory(CreateInProcessGpuThread); #else base::CommandLine& command_line = *base::CommandLine::ForCurrentProcess(); if (command_line.HasSwitch(switches::kSingleProcess)) { LOG(FATAL) << "--single-process is not supported in chrome multiple dll browser."; } if (command_line.HasSwitch(switches::kInProcessGPU)) { LOG(FATAL) << "--in-process-gpu is not supported in chrome multiple dll browser."; } #endif // !CHROME_MULTIPLE_DLL_BROWSER && !CHROME_MULTIPLE_DLL_CHILD } // Run the FooMain() for a given process type. // If |process_type| is empty, runs BrowserMain(). // Returns the exit code for this process. int RunNamedProcessTypeMain( const std::string& process_type, const MainFunctionParams& main_function_params, ContentMainDelegate* delegate) { static const MainFunction kMainFunctions[] = { #if !defined(CHROME_MULTIPLE_DLL_CHILD) { "", BrowserMain }, #endif #if !defined(CHROME_MULTIPLE_DLL_BROWSER) #if BUILDFLAG(ENABLE_PLUGINS) { switches::kPpapiPluginProcess, PpapiPluginMain }, { switches::kPpapiBrokerProcess, PpapiBrokerMain }, #endif // ENABLE_PLUGINS { switches::kUtilityProcess, UtilityMain }, { switches::kRendererProcess, RendererMain }, { switches::kGpuProcess, GpuMain }, #endif // !CHROME_MULTIPLE_DLL_BROWSER }; RegisterMainThreadFactories(); for (size_t i = 0; i < arraysize(kMainFunctions); ++i) { if (process_type == kMainFunctions[i].name) { if (delegate) { int exit_code = delegate->RunProcess(process_type, main_function_params); #if defined(OS_ANDROID) // In Android's browser process, the negative exit code doesn't mean the // default behavior should be used as the UI message loop is managed by // the Java and the browser process's default behavior is always // overridden. if (process_type.empty()) return exit_code; #endif if (exit_code >= 0) return exit_code; } return kMainFunctions[i].function(main_function_params); } } #if BUILDFLAG(USE_ZYGOTE_HANDLE) // Zygote startup is special -- see RunZygote comments above // for why we don't use ZygoteMain directly. if (process_type == switches::kZygoteProcess) return RunZygote(delegate); #endif // BUILDFLAG(USE_ZYGOTE_HANDLE) // If it's a process we don't know about, the embedder should know. if (delegate) return delegate->RunProcess(process_type, main_function_params); NOTREACHED() << "Unknown process type: " << process_type; return 1; } class ContentMainRunnerImpl : public ContentMainRunner { public: ContentMainRunnerImpl() { #if defined(OS_WIN) memset(&sandbox_info_, 0, sizeof(sandbox_info_)); #endif } ~ContentMainRunnerImpl() override { if (is_initialized_ && !is_shutdown_) Shutdown(); } int TerminateForFatalInitializationError() { if (delegate_) return delegate_->TerminateForFatalInitializationError(); CHECK(false); return 0; } int Initialize(const ContentMainParams& params) override { ui_task_ = params.ui_task; created_main_parts_closure_ = params.created_main_parts_closure; #if defined(OS_WIN) sandbox_info_ = *params.sandbox_info; #else // !OS_WIN #if defined(OS_MACOSX) && !defined(TOOLKIT_QT) autorelease_pool_ = params.autorelease_pool; #endif // defined(OS_MACOSX) #if defined(OS_ANDROID) // See note at the initialization of ExitManager, below; basically, // only Android builds have the ctor/dtor handlers set up to use // TRACE_EVENT right away. TRACE_EVENT0("startup,benchmark,rail", "ContentMainRunnerImpl::Initialize"); #endif // OS_ANDROID base::GlobalDescriptors* g_fds = base::GlobalDescriptors::GetInstance(); ALLOW_UNUSED_LOCAL(g_fds); // On Android, the ipc_fd is passed through the Java service. #if !defined(OS_ANDROID) g_fds->Set(kMojoIPCChannel, kMojoIPCChannel + base::GlobalDescriptors::kBaseDescriptor); g_fds->Set( kFieldTrialDescriptor, kFieldTrialDescriptor + base::GlobalDescriptors::kBaseDescriptor); #endif // !OS_ANDROID #if defined(OS_LINUX) || defined(OS_OPENBSD) g_fds->Set(kCrashDumpSignal, kCrashDumpSignal + base::GlobalDescriptors::kBaseDescriptor); #endif // OS_LINUX || OS_OPENBSD #endif // !OS_WIN is_initialized_ = true; delegate_ = params.delegate; // The exit manager is in charge of calling the dtors of singleton objects. // On Android, AtExitManager is set up when library is loaded. // A consequence of this is that you can't use the ctor/dtor-based // TRACE_EVENT methods on Linux or iOS builds till after we set this up. #if !defined(OS_ANDROID) if (!ui_task_) { // When running browser tests, don't create a second AtExitManager as that // interfers with shutdown when objects created before ContentMain is // called are destructed when it returns. exit_manager_.reset(new base::AtExitManager); } #endif // !OS_ANDROID int exit_code = 0; if (delegate_ && delegate_->BasicStartupComplete(&exit_code)) return exit_code; completed_basic_startup_ = true; const base::CommandLine& command_line = *base::CommandLine::ForCurrentProcess(); std::string process_type = command_line.GetSwitchValueASCII(switches::kProcessType); #if defined(OS_WIN) if (command_line.HasSwitch(switches::kDeviceScaleFactor)) { std::string scale_factor_string = command_line.GetSwitchValueASCII( switches::kDeviceScaleFactor); double scale_factor = 0; if (base::StringToDouble(scale_factor_string, &scale_factor)) display::win::SetDefaultDeviceScaleFactor(scale_factor); } #endif if (!GetContentClient()) SetContentClient(&empty_content_client_); ContentClientInitializer::Set(process_type, delegate_); #if !defined(OS_ANDROID) // Enable startup tracing asap to avoid early TRACE_EVENT calls being // ignored. For Android, startup tracing is enabled in an even earlier place // content/app/android/library_loader_hooks.cc. // // Startup tracing flags are not (and should not) passed to Zygote // processes. We will enable tracing when forked, if needed. if (process_type != switches::kZygoteProcess) tracing::EnableStartupTracingIfNeeded(); #endif // !OS_ANDROID #if defined(OS_WIN) // Enable exporting of events to ETW if requested on the command line. if (command_line.HasSwitch(switches::kTraceExportEventsToETW)) base::trace_event::TraceEventETWExport::EnableETWExport(); #endif // OS_WIN #if !defined(OS_ANDROID) // Android tracing started at the beginning of the method. // Other OSes have to wait till we get here in order for all the memory // management setup to be completed. TRACE_EVENT0("startup,benchmark,rail", "ContentMainRunnerImpl::Initialize"); #endif // !OS_ANDROID #if defined(OS_MACOSX) // We need to allocate the IO Ports before the Sandbox is initialized or // the first instance of PowerMonitor is created. // It's important not to allocate the ports for processes which don't // register with the power monitor - see crbug.com/88867. if (process_type.empty() || (delegate_ && delegate_->ProcessRegistersWithSystemProcess(process_type))) { base::PowerMonitorDeviceSource::AllocateSystemIOPorts(); } if (!process_type.empty() && (!delegate_ || delegate_->ShouldSendMachPort(process_type))) { MachBroker::ChildSendTaskPortToParent(); } #endif // If we are on a platform where the default allocator is overridden (shim // layer on windows, tcmalloc on Linux Desktop) smoke-tests that the // overriding logic is working correctly. If not causes a hard crash, as its // unexpected absence has security implications. CHECK(base::allocator::IsAllocatorInitialized()); #if defined(OS_POSIX) if (!process_type.empty()) { // When you hit Ctrl-C in a terminal running the browser // process, a SIGINT is delivered to the entire process group. // When debugging the browser process via gdb, gdb catches the // SIGINT for the browser process (and dumps you back to the gdb // console) but doesn't for the child processes, killing them. // The fix is to have child processes ignore SIGINT; they'll die // on their own when the browser process goes away. // // Note that we *can't* rely on BeingDebugged to catch this case because // we are the child process, which is not being debugged. // TODO(evanm): move this to some shared subprocess-init function. if (!base::debug::BeingDebugged()) signal(SIGINT, SIG_IGN); } #endif RegisterPathProvider(); RegisterContentSchemes(true); #if defined(OS_ANDROID) && (ICU_UTIL_DATA_IMPL == ICU_UTIL_DATA_FILE) int icudata_fd = g_fds->MaybeGet(kAndroidICUDataDescriptor); if (icudata_fd != -1) { auto icudata_region = g_fds->GetRegion(kAndroidICUDataDescriptor); if (!base::i18n::InitializeICUWithFileDescriptor(icudata_fd, icudata_region)) return TerminateForFatalInitializationError(); } else { if (!base::i18n::InitializeICU()) return TerminateForFatalInitializationError(); } #else if (!base::i18n::InitializeICU()) return TerminateForFatalInitializationError(); #endif // OS_ANDROID && (ICU_UTIL_DATA_IMPL == ICU_UTIL_DATA_FILE) InitializeV8IfNeeded(command_line, process_type); #if !defined(OFFICIAL_BUILD) #if defined(OS_WIN) bool should_enable_stack_dump = !process_type.empty(); #else bool should_enable_stack_dump = true; #endif // Print stack traces to stderr when crashes occur. This opens up security // holes so it should never be enabled for official builds. This needs to // happen before crash reporting is initialized (which for chrome happens in // the call to PreSandboxStartup() on the delegate below), because otherwise // this would interfere with signal handlers used by crash reporting. if (should_enable_stack_dump && !command_line.HasSwitch( service_manager::switches::kDisableInProcessStackTraces)) { base::debug::EnableInProcessStackDumping(); } #endif // !defined(OFFICIAL_BUILD) if (delegate_) delegate_->PreSandboxStartup(); #if defined(OS_WIN) if (!InitializeSandbox( service_manager::SandboxTypeFromCommandLine(command_line), params.sandbox_info)) return TerminateForFatalInitializationError(); #elif defined(OS_MACOSX) // Do not initialize the sandbox at this point if the V2 // sandbox is enabled for the process type. bool v2_enabled = base::CommandLine::ForCurrentProcess()->HasSwitch( switches::kEnableV2Sandbox); if (process_type == switches::kRendererProcess || process_type == switches::kPpapiPluginProcess || v2_enabled || (delegate_ && delegate_->DelaySandboxInitialization(process_type))) { // On OS X the renderer sandbox needs to be initialized later in the // startup sequence in RendererMainPlatformDelegate::EnableSandbox(). } else { if (!InitializeSandbox()) return TerminateForFatalInitializationError(); } #endif if (delegate_) delegate_->SandboxInitialized(process_type); #if BUILDFLAG(USE_ZYGOTE_HANDLE) if (process_type.empty()) { // The sandbox host needs to be initialized before forking a thread to // start the ServiceManager, and after setting up the sandbox and invoking // SandboxInitialized(). InitializeZygoteSandboxForBrowserProcess( *base::CommandLine::ForCurrentProcess()); } #endif // BUILDFLAG(USE_ZYGOTE_HANDLE) // Return -1 to indicate no early termination. return -1; } int Run() override { DCHECK(is_initialized_); DCHECK(!is_shutdown_); const base::CommandLine& command_line = *base::CommandLine::ForCurrentProcess(); std::string process_type = command_line.GetSwitchValueASCII(switches::kProcessType); // Run this logic on all child processes. Zygotes will run this at a later // point in time when the command line has been updated. std::unique_ptr field_trial_list; if (!process_type.empty() && process_type != switches::kZygoteProcess) InitializeFieldTrialAndFeatureList(&field_trial_list); MainFunctionParams main_params(command_line); main_params.ui_task = ui_task_; main_params.created_main_parts_closure = created_main_parts_closure_; #if defined(OS_WIN) main_params.sandbox_info = &sandbox_info_; #elif defined(OS_MACOSX) && !defined(TOOLKIT_QT) main_params.autorelease_pool = autorelease_pool_; #endif return RunNamedProcessTypeMain(process_type, main_params, delegate_); } void Shutdown() override { DCHECK(is_initialized_); DCHECK(!is_shutdown_); if (completed_basic_startup_ && delegate_) { const base::CommandLine& command_line = *base::CommandLine::ForCurrentProcess(); std::string process_type = command_line.GetSwitchValueASCII(switches::kProcessType); delegate_->ProcessExiting(process_type); } #if defined(OS_WIN) #ifdef _CRTDBG_MAP_ALLOC _CrtDumpMemoryLeaks(); #endif // _CRTDBG_MAP_ALLOC #endif // OS_WIN exit_manager_.reset(nullptr); delegate_ = nullptr; is_shutdown_ = true; } private: // True if the runner has been initialized. bool is_initialized_ = false; // True if the runner has been shut down. bool is_shutdown_ = false; // True if basic startup was completed. bool completed_basic_startup_ = false; // Used if the embedder doesn't set one. ContentClient empty_content_client_; // The delegate will outlive this object. ContentMainDelegate* delegate_ = nullptr; std::unique_ptr exit_manager_; #if defined(OS_WIN) sandbox::SandboxInterfaceInfo sandbox_info_; #elif defined(OS_MACOSX) && !defined(TOOLKIT_QT) base::mac::ScopedNSAutoreleasePool* autorelease_pool_ = nullptr; #endif base::Closure* ui_task_ = nullptr; CreatedMainPartsClosure* created_main_parts_closure_ = nullptr; DISALLOW_COPY_AND_ASSIGN(ContentMainRunnerImpl); }; // static ContentMainRunner* ContentMainRunner::Create() { return new ContentMainRunnerImpl(); } } // namespace content