1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "content/public/app/content_main_runner.h"
9 #include "base/allocator/allocator_extension.h"
10 #include "base/at_exit.h"
11 #include "base/command_line.h"
12 #include "base/debug/debugger.h"
13 #include "base/debug/trace_event.h"
14 #include "base/files/file_path.h"
15 #include "base/i18n/icu_util.h"
16 #include "base/lazy_instance.h"
17 #include "base/logging.h"
18 #include "base/memory/scoped_ptr.h"
19 #include "base/memory/scoped_vector.h"
20 #include "base/metrics/stats_table.h"
21 #include "base/path_service.h"
22 #include "base/process/launch.h"
23 #include "base/process/memory.h"
24 #include "base/process/process_handle.h"
25 #include "base/profiler/alternate_timer.h"
26 #include "base/strings/string_number_conversions.h"
27 #include "base/strings/string_util.h"
28 #include "base/strings/stringprintf.h"
29 #include "content/browser/browser_main.h"
30 #include "content/common/set_process_title.h"
31 #include "content/common/url_schemes.h"
32 #include "content/gpu/in_process_gpu_thread.h"
33 #include "content/public/app/content_main.h"
34 #include "content/public/app/content_main_delegate.h"
35 #include "content/public/app/startup_helper_win.h"
36 #include "content/public/browser/content_browser_client.h"
37 #include "content/public/common/content_client.h"
38 #include "content/public/common/content_constants.h"
39 #include "content/public/common/content_paths.h"
40 #include "content/public/common/content_switches.h"
41 #include "content/public/common/main_function_params.h"
42 #include "content/public/common/sandbox_init.h"
43 #include "content/renderer/in_process_renderer_thread.h"
44 #include "content/utility/in_process_utility_thread.h"
45 #include "crypto/nss_util.h"
46 #include "ipc/ipc_descriptors.h"
47 #include "ipc/ipc_switches.h"
48 #include "media/base/media.h"
49 #include "sandbox/win/src/sandbox_types.h"
50 #include "ui/base/ui_base_paths.h"
51 #include "ui/base/ui_base_switches.h"
53 #if defined(OS_ANDROID)
54 #include "content/public/common/content_descriptors.h"
57 #if defined(USE_TCMALLOC)
58 #include "third_party/tcmalloc/chromium/src/gperftools/malloc_extension.h"
59 #if defined(TYPE_PROFILING)
60 #include "base/allocator/type_profiler.h"
61 #include "base/allocator/type_profiler_tcmalloc.h"
66 #include "content/app/mojo/mojo_init.h"
67 #include "content/browser/gpu/gpu_process_host.h"
68 #include "content/browser/renderer_host/render_process_host_impl.h"
69 #include "content/browser/utility_process_host_impl.h"
70 #include "content/public/plugin/content_plugin_client.h"
71 #include "content/public/renderer/content_renderer_client.h"
72 #include "content/public/utility/content_utility_client.h"
79 #include "base/strings/string_number_conversions.h"
80 #include "ui/base/win/atl_module.h"
81 #include "ui/base/win/dpi_setup.h"
82 #include "ui/gfx/win/dpi.h"
83 #elif defined(OS_MACOSX)
84 #include "base/mac/scoped_nsautorelease_pool.h"
86 #include "base/power_monitor/power_monitor_device_source.h"
87 #include "content/browser/mach_broker_mac.h"
88 #include "content/common/sandbox_init_mac.h"
95 #include "base/posix/global_descriptors.h"
96 #include "content/public/common/content_descriptors.h"
98 #if !defined(OS_MACOSX)
99 #include "content/public/common/zygote_fork_delegate_linux.h"
101 #if !defined(OS_MACOSX) && !defined(OS_ANDROID)
102 #include "content/zygote/zygote_main.h"
107 #if !defined(OS_MACOSX) && defined(USE_TCMALLOC)
109 int tc_set_new_mode(int mode
);
114 extern int GpuMain(const content::MainFunctionParams
&);
115 #if defined(ENABLE_PLUGINS)
116 #if !defined(OS_LINUX)
117 extern int PluginMain(const content::MainFunctionParams
&);
119 extern int PpapiPluginMain(const MainFunctionParams
&);
120 extern int PpapiBrokerMain(const MainFunctionParams
&);
122 extern int RendererMain(const content::MainFunctionParams
&);
123 extern int UtilityMain(const MainFunctionParams
&);
124 extern int WorkerMain(const MainFunctionParams
&);
125 } // namespace content
129 base::LazyInstance
<ContentBrowserClient
>
130 g_empty_content_browser_client
= LAZY_INSTANCE_INITIALIZER
;
131 #if !defined(OS_IOS) && !defined(CHROME_MULTIPLE_DLL_BROWSER)
132 base::LazyInstance
<ContentPluginClient
>
133 g_empty_content_plugin_client
= LAZY_INSTANCE_INITIALIZER
;
134 base::LazyInstance
<ContentRendererClient
>
135 g_empty_content_renderer_client
= LAZY_INSTANCE_INITIALIZER
;
136 base::LazyInstance
<ContentUtilityClient
>
137 g_empty_content_utility_client
= LAZY_INSTANCE_INITIALIZER
;
138 #endif // !OS_IOS && !CHROME_MULTIPLE_DLL_BROWSER
142 #endif // defined(OS_WIN)
144 #if defined(OS_POSIX) && !defined(OS_IOS)
146 // Setup signal-handling state: resanitize most signals, ignore SIGPIPE.
147 void SetupSignalHandlers() {
148 // Sanitise our signal handling state. Signals that were ignored by our
149 // parent will also be ignored by us. We also inherit our parent's sigmask.
150 sigset_t empty_signal_set
;
151 CHECK(0 == sigemptyset(&empty_signal_set
));
152 CHECK(0 == sigprocmask(SIG_SETMASK
, &empty_signal_set
, NULL
));
154 struct sigaction sigact
;
155 memset(&sigact
, 0, sizeof(sigact
));
156 sigact
.sa_handler
= SIG_DFL
;
157 static const int signals_to_reset
[] =
158 {SIGHUP
, SIGINT
, SIGQUIT
, SIGILL
, SIGABRT
, SIGFPE
, SIGSEGV
,
159 SIGALRM
, SIGTERM
, SIGCHLD
, SIGBUS
, SIGTRAP
}; // SIGPIPE is set below.
160 for (unsigned i
= 0; i
< arraysize(signals_to_reset
); i
++) {
161 CHECK(0 == sigaction(signals_to_reset
[i
], &sigact
, NULL
));
164 // Always ignore SIGPIPE. We check the return value of write().
165 CHECK(signal(SIGPIPE
, SIG_IGN
) != SIG_ERR
);
168 #endif // OS_POSIX && !OS_IOS
170 void CommonSubprocessInit(const std::string
& process_type
) {
172 // HACK: Let Windows know that we have started. This is needed to suppress
173 // the IDC_APPSTARTING cursor from being displayed for a prolonged period
174 // while a subprocess is starting.
175 PostThreadMessage(GetCurrentThreadId(), WM_NULL
, 0, 0);
177 PeekMessage(&msg
, NULL
, 0, 0, PM_REMOVE
);
179 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_ANDROID)
180 // Various things break when you're using a locale where the decimal
181 // separator isn't a period. See e.g. bugs 22782 and 39964. For
182 // all processes except the browser process (where we call system
183 // APIs that may rely on the correct locale for formatting numbers
184 // when presenting them to the user), reset the locale for numeric
186 // Note that this is not correct for plugin processes -- they can
187 // surface UI -- but it's likely they get this wrong too so why not.
188 setlocale(LC_NUMERIC
, "C");
192 // Only needed on Windows for creating stats tables.
194 static base::ProcessId
GetBrowserPid(const CommandLine
& command_line
) {
195 base::ProcessId browser_pid
= base::GetCurrentProcId();
196 if (command_line
.HasSwitch(switches::kProcessChannelID
)) {
197 std::string channel_name
=
198 command_line
.GetSwitchValueASCII(switches::kProcessChannelID
);
201 base::StringToInt(channel_name
, &browser_pid_int
);
202 browser_pid
= static_cast<base::ProcessId
>(browser_pid_int
);
203 DCHECK_NE(browser_pid_int
, 0);
209 static void InitializeStatsTable(const CommandLine
& command_line
) {
210 // Initialize the Stats Counters table. With this initialized,
211 // the StatsViewer can be utilized to read counters outside of
212 // Chrome. These lines can be commented out to effectively turn
213 // counters 'off'. The table is created and exists for the life
214 // of the process. It is not cleaned up.
215 if (command_line
.HasSwitch(switches::kEnableStatsTable
)) {
216 // NOTIMPLEMENTED: we probably need to shut this down correctly to avoid
217 // leaking shared memory regions on posix platforms.
218 #if defined(OS_POSIX)
219 // Stats table is in the global file descriptors table on Posix.
220 base::GlobalDescriptors
* global_descriptors
=
221 base::GlobalDescriptors::GetInstance();
222 base::FileDescriptor table_ident
;
223 if (global_descriptors
->MaybeGet(kStatsTableSharedMemFd
) != -1) {
224 // Open the shared memory file descriptor passed by the browser process.
225 table_ident
= base::FileDescriptor(
226 global_descriptors
->Get(kStatsTableSharedMemFd
), false);
228 #elif defined(OS_WIN)
229 // Stats table is in a named segment on Windows. Use the PID to make this
230 // unique on the system.
231 std::string table_ident
=
232 base::StringPrintf("%s-%u", kStatsFilename
,
233 static_cast<unsigned int>(GetBrowserPid(command_line
)));
235 base::StatsTable
* stats_table
=
236 new base::StatsTable(table_ident
, kStatsMaxThreads
, kStatsMaxCounters
);
237 base::StatsTable::set_current(stats_table
);
241 class ContentClientInitializer
{
243 static void Set(const std::string
& process_type
,
244 ContentMainDelegate
* delegate
) {
245 ContentClient
* content_client
= GetContentClient();
246 if (process_type
.empty()) {
248 content_client
->browser_
= delegate
->CreateContentBrowserClient();
249 if (!content_client
->browser_
)
250 content_client
->browser_
= &g_empty_content_browser_client
.Get();
253 #if !defined(OS_IOS) && !defined(CHROME_MULTIPLE_DLL_BROWSER)
254 if (process_type
== switches::kPluginProcess
||
255 process_type
== switches::kPpapiPluginProcess
) {
257 content_client
->plugin_
= delegate
->CreateContentPluginClient();
258 if (!content_client
->plugin_
)
259 content_client
->plugin_
= &g_empty_content_plugin_client
.Get();
260 // Single process not supported in split dll mode.
261 } else if (process_type
== switches::kRendererProcess
||
262 CommandLine::ForCurrentProcess()->HasSwitch(
263 switches::kSingleProcess
)) {
265 content_client
->renderer_
= delegate
->CreateContentRendererClient();
266 if (!content_client
->renderer_
)
267 content_client
->renderer_
= &g_empty_content_renderer_client
.Get();
270 if (process_type
== switches::kUtilityProcess
||
271 CommandLine::ForCurrentProcess()->HasSwitch(
272 switches::kSingleProcess
)) {
274 content_client
->utility_
= delegate
->CreateContentUtilityClient();
275 // TODO(scottmg): http://crbug.com/237249 Should be in _child.
276 if (!content_client
->utility_
)
277 content_client
->utility_
= &g_empty_content_utility_client
.Get();
279 #endif // !OS_IOS && !CHROME_MULTIPLE_DLL_BROWSER
283 // We dispatch to a process-type-specific FooMain() based on a command-line
284 // flag. This struct is used to build a table of (flag, main function) pairs.
285 struct MainFunction
{
287 int (*function
)(const MainFunctionParams
&);
290 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_ANDROID)
291 // On platforms that use the zygote, we have a special subset of
292 // subprocesses that are launched via the zygote. This function
293 // fills in some process-launching bits around ZygoteMain().
294 // Returns the exit code of the subprocess.
295 int RunZygote(const MainFunctionParams
& main_function_params
,
296 ContentMainDelegate
* delegate
) {
297 static const MainFunction kMainFunctions
[] = {
298 { switches::kRendererProcess
, RendererMain
},
299 { switches::kWorkerProcess
, WorkerMain
},
300 #if defined(ENABLE_PLUGINS)
301 { switches::kPpapiPluginProcess
, PpapiPluginMain
},
303 { switches::kUtilityProcess
, UtilityMain
},
306 ScopedVector
<ZygoteForkDelegate
> zygote_fork_delegates
;
308 delegate
->ZygoteStarting(&zygote_fork_delegates
);
309 // Each Renderer we spawn will re-attempt initialization of the media
310 // libraries, at which point failure will be detected and handled, so
311 // we do not need to cope with initialization failures here.
312 base::FilePath media_path
;
313 if (PathService::Get(DIR_MEDIA_LIBS
, &media_path
))
314 media::InitializeMediaLibrary(media_path
);
317 // This function call can return multiple times, once per fork().
318 if (!ZygoteMain(main_function_params
, zygote_fork_delegates
.Pass()))
321 if (delegate
) delegate
->ZygoteForked();
323 // Zygote::HandleForkRequest may have reallocated the command
324 // line so update it here with the new version.
325 const CommandLine
& command_line
= *CommandLine::ForCurrentProcess();
326 std::string process_type
=
327 command_line
.GetSwitchValueASCII(switches::kProcessType
);
328 ContentClientInitializer::Set(process_type
, delegate
);
330 // The StatsTable must be initialized in each process; we already
331 // initialized for the browser process, now we need to initialize
332 // within the new processes as well.
333 InitializeStatsTable(command_line
);
335 MainFunctionParams
main_params(command_line
);
336 main_params
.zygote_child
= true;
338 for (size_t i
= 0; i
< arraysize(kMainFunctions
); ++i
) {
339 if (process_type
== kMainFunctions
[i
].name
)
340 return kMainFunctions
[i
].function(main_params
);
344 return delegate
->RunProcess(process_type
, main_params
);
346 NOTREACHED() << "Unknown zygote process type: " << process_type
;
349 #endif // defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_ANDROID)
352 static void RegisterMainThreadFactories() {
353 #if !defined(CHROME_MULTIPLE_DLL_BROWSER)
354 UtilityProcessHostImpl::RegisterUtilityMainThreadFactory(
355 CreateInProcessUtilityThread
);
356 RenderProcessHostImpl::RegisterRendererMainThreadFactory(
357 CreateInProcessRendererThread
);
358 GpuProcessHost::RegisterGpuMainThreadFactory(
359 CreateInProcessGpuThread
);
361 CommandLine
& command_line
= *CommandLine::ForCurrentProcess();
362 if (command_line
.HasSwitch(switches::kSingleProcess
)) {
364 "--single-process is not supported in chrome multiple dll browser.";
366 if (command_line
.HasSwitch(switches::kInProcessGPU
)) {
368 "--in-process-gpu is not supported in chrome multiple dll browser.";
373 // Run the FooMain() for a given process type.
374 // If |process_type| is empty, runs BrowserMain().
375 // Returns the exit code for this process.
376 int RunNamedProcessTypeMain(
377 const std::string
& process_type
,
378 const MainFunctionParams
& main_function_params
,
379 ContentMainDelegate
* delegate
) {
380 static const MainFunction kMainFunctions
[] = {
381 #if !defined(CHROME_MULTIPLE_DLL_CHILD)
384 #if !defined(CHROME_MULTIPLE_DLL_BROWSER)
385 #if defined(ENABLE_PLUGINS)
386 #if !defined(OS_LINUX)
387 { switches::kPluginProcess
, PluginMain
},
389 { switches::kWorkerProcess
, WorkerMain
},
390 { switches::kPpapiPluginProcess
, PpapiPluginMain
},
391 { switches::kPpapiBrokerProcess
, PpapiBrokerMain
},
392 #endif // ENABLE_PLUGINS
393 { switches::kUtilityProcess
, UtilityMain
},
394 { switches::kRendererProcess
, RendererMain
},
395 { switches::kGpuProcess
, GpuMain
},
396 #endif // !CHROME_MULTIPLE_DLL_BROWSER
399 RegisterMainThreadFactories();
401 for (size_t i
= 0; i
< arraysize(kMainFunctions
); ++i
) {
402 if (process_type
== kMainFunctions
[i
].name
) {
404 int exit_code
= delegate
->RunProcess(process_type
,
405 main_function_params
);
406 #if defined(OS_ANDROID)
407 // In Android's browser process, the negative exit code doesn't mean the
408 // default behavior should be used as the UI message loop is managed by
409 // the Java and the browser process's default behavior is always
411 if (process_type
.empty())
417 return kMainFunctions
[i
].function(main_function_params
);
421 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_ANDROID)
422 // Zygote startup is special -- see RunZygote comments above
423 // for why we don't use ZygoteMain directly.
424 if (process_type
== switches::kZygoteProcess
)
425 return RunZygote(main_function_params
, delegate
);
428 // If it's a process we don't know about, the embedder should know.
430 return delegate
->RunProcess(process_type
, main_function_params
);
432 NOTREACHED() << "Unknown process type: " << process_type
;
437 class ContentMainRunnerImpl
: public ContentMainRunner
{
439 ContentMainRunnerImpl()
440 : is_initialized_(false),
442 completed_basic_startup_(false),
446 memset(&sandbox_info_
, 0, sizeof(sandbox_info_
));
450 virtual ~ContentMainRunnerImpl() {
451 if (is_initialized_
&& !is_shutdown_
)
455 #if defined(USE_TCMALLOC)
456 static bool GetAllocatorWasteSizeThunk(size_t* size
) {
457 size_t heap_size
, allocated_bytes
, unmapped_bytes
;
458 MallocExtension
* ext
= MallocExtension::instance();
459 if (ext
->GetNumericProperty("generic.heap_size", &heap_size
) &&
460 ext
->GetNumericProperty("generic.current_allocated_bytes",
462 ext
->GetNumericProperty("tcmalloc.pageheap_unmapped_bytes",
464 *size
= heap_size
- allocated_bytes
- unmapped_bytes
;
471 static void GetStatsThunk(char* buffer
, int buffer_length
) {
472 MallocExtension::instance()->GetStats(buffer
, buffer_length
);
475 static void ReleaseFreeMemoryThunk() {
476 MallocExtension::instance()->ReleaseFreeMemory();
480 virtual int Initialize(const ContentMainParams
& params
) OVERRIDE
{
481 ui_task_
= params
.ui_task
;
484 RegisterInvalidParamHandler();
485 ui::win::CreateATLModuleIfNeeded();
487 sandbox_info_
= *params
.sandbox_info
;
490 #if defined(OS_ANDROID)
491 // See note at the initialization of ExitManager, below; basically,
492 // only Android builds have the ctor/dtor handlers set up to use
493 // TRACE_EVENT right away.
494 TRACE_EVENT0("startup", "ContentMainRunnerImpl::Initialize");
497 // NOTE(willchan): One might ask why these TCMalloc-related calls are done
498 // here rather than in process_util_linux.cc with the definition of
499 // EnableTerminationOnOutOfMemory(). That's because base shouldn't have a
500 // dependency on TCMalloc. Really, we ought to have our allocator shim code
501 // implement this EnableTerminationOnOutOfMemory() function. Whateverz.
502 // This works for now.
503 #if !defined(OS_MACOSX) && defined(USE_TCMALLOC)
505 #if defined(TYPE_PROFILING)
506 base::type_profiler::InterceptFunctions::SetFunctions(
507 base::type_profiler::NewInterceptForTCMalloc
,
508 base::type_profiler::DeleteInterceptForTCMalloc
);
511 // For tcmalloc, we need to tell it to behave like new.
514 // On windows, we've already set these thunks up in _heap_init()
515 base::allocator::SetGetAllocatorWasteSizeFunction(
516 GetAllocatorWasteSizeThunk
);
517 base::allocator::SetGetStatsFunction(GetStatsThunk
);
518 base::allocator::SetReleaseFreeMemoryFunction(ReleaseFreeMemoryThunk
);
520 // Provide optional hook for monitoring allocation quantities on a
521 // per-thread basis. Only set the hook if the environment indicates this
522 // needs to be enabled.
523 const char* profiling
= getenv(tracked_objects::kAlternateProfilerTime
);
525 (atoi(profiling
) == tracked_objects::TIME_SOURCE_TYPE_TCMALLOC
)) {
526 tracked_objects::SetAlternateTimeSource(
527 MallocExtension::GetBytesAllocatedOnCurrentThread
,
528 tracked_objects::TIME_SOURCE_TYPE_TCMALLOC
);
530 #endif // !OS_MACOSX && USE_TCMALLOC
533 // - setlocale() is not supported.
534 // - We do not override the signal handlers so that we can get
535 // stack trace when crashing.
536 // - The ipc_fd is passed through the Java service.
537 // Thus, these are all disabled.
538 #if !defined(OS_ANDROID) && !defined(OS_IOS)
539 // Set C library locale to make sure CommandLine can parse argument values
540 // in correct encoding.
541 setlocale(LC_ALL
, "");
543 SetupSignalHandlers();
545 base::GlobalDescriptors
* g_fds
= base::GlobalDescriptors::GetInstance();
546 g_fds
->Set(kPrimaryIPCChannel
,
547 kPrimaryIPCChannel
+ base::GlobalDescriptors::kBaseDescriptor
);
548 #endif // !OS_ANDROID && !OS_IOS
550 #if defined(OS_LINUX) || defined(OS_OPENBSD)
551 g_fds
->Set(kCrashDumpSignal
,
552 kCrashDumpSignal
+ base::GlobalDescriptors::kBaseDescriptor
);
557 is_initialized_
= true;
558 delegate_
= params
.delegate
;
560 base::EnableTerminationOnHeapCorruption();
561 base::EnableTerminationOnOutOfMemory();
563 // The exit manager is in charge of calling the dtors of singleton objects.
564 // On Android, AtExitManager is set up when library is loaded.
565 // On iOS, it's set up in main(), which can't call directly through to here.
566 // A consequence of this is that you can't use the ctor/dtor-based
567 // TRACE_EVENT methods on Linux or iOS builds till after we set this up.
568 #if !defined(OS_ANDROID) && !defined(OS_IOS)
570 // When running browser tests, don't create a second AtExitManager as that
571 // interfers with shutdown when objects created before ContentMain is
572 // called are destructed when it returns.
573 exit_manager_
.reset(new base::AtExitManager
);
575 #endif // !OS_ANDROID && !OS_IOS
577 #if defined(OS_MACOSX)
578 // We need this pool for all the objects created before we get to the
579 // event loop, but we don't want to leave them hanging around until the
580 // app quits. Each "main" needs to flush this pool right before it goes into
581 // its main event loop to get rid of the cruft.
582 autorelease_pool_
.reset(new base::mac::ScopedNSAutoreleasePool());
585 // On Android, the command line is initialized when library is loaded and
586 // we have already started our TRACE_EVENT0.
587 #if !defined(OS_ANDROID)
588 // argc/argv are ignored on Windows and Android; see command_line.h for
591 const char** argv
= NULL
;
598 CommandLine::Init(argc
, argv
);
601 SetProcessTitleFromCommandLine(argv
);
603 #endif // !OS_ANDROID
606 if (delegate_
&& delegate_
->BasicStartupComplete(&exit_code
))
609 completed_basic_startup_
= true;
611 const CommandLine
& command_line
= *CommandLine::ForCurrentProcess();
612 std::string process_type
=
613 command_line
.GetSwitchValueASCII(switches::kProcessType
);
616 // Initialize mojo here so that services can be registered.
620 if (!GetContentClient())
621 SetContentClient(&empty_content_client_
);
622 ContentClientInitializer::Set(process_type
, delegate_
);
625 // Route stdio to parent console (if any) or create one.
626 if (command_line
.HasSwitch(switches::kEnableLogging
))
627 base::RouteStdioToConsole();
630 // Enable startup tracing asap to avoid early TRACE_EVENT calls being
632 if (command_line
.HasSwitch(switches::kTraceStartup
)) {
633 base::debug::CategoryFilter
category_filter(
634 command_line
.GetSwitchValueASCII(switches::kTraceStartup
));
635 base::debug::TraceLog::GetInstance()->SetEnabled(
637 base::debug::TraceLog::RECORDING_MODE
,
638 base::debug::TraceLog::RECORD_UNTIL_FULL
);
640 #if !defined(OS_ANDROID)
641 // Android tracing started at the beginning of the method.
642 // Other OSes have to wait till we get here in order for all the memory
643 // management setup to be completed.
644 TRACE_EVENT0("startup", "ContentMainRunnerImpl::Initialize");
645 #endif // !OS_ANDROID
647 #if defined(OS_MACOSX) && !defined(OS_IOS)
648 // We need to allocate the IO Ports before the Sandbox is initialized or
649 // the first instance of PowerMonitor is created.
650 // It's important not to allocate the ports for processes which don't
651 // register with the power monitor - see crbug.com/88867.
652 if (process_type
.empty() ||
654 delegate_
->ProcessRegistersWithSystemProcess(process_type
))) {
655 base::PowerMonitorDeviceSource::AllocateSystemIOPorts();
658 if (!process_type
.empty() &&
659 (!delegate_
|| delegate_
->ShouldSendMachPort(process_type
))) {
660 MachBroker::ChildSendTaskPortToParent();
662 #elif defined(OS_WIN)
663 if (command_line
.HasSwitch(switches::kEnableHighResolutionTime
))
664 base::TimeTicks::SetNowIsHighResNowIfSupported();
666 bool init_device_scale_factor
= true;
667 if (command_line
.HasSwitch(switches::kDeviceScaleFactor
)) {
668 std::string scale_factor_string
= command_line
.GetSwitchValueASCII(
669 switches::kDeviceScaleFactor
);
670 double scale_factor
= 0;
671 if (base::StringToDouble(scale_factor_string
, &scale_factor
)) {
672 init_device_scale_factor
= false;
673 gfx::InitDeviceScaleFactor(scale_factor
);
676 if (init_device_scale_factor
)
677 ui::win::InitDeviceScaleFactor();
679 SetupCRT(command_line
);
682 #if defined(OS_POSIX)
683 if (!process_type
.empty()) {
684 // When you hit Ctrl-C in a terminal running the browser
685 // process, a SIGINT is delivered to the entire process group.
686 // When debugging the browser process via gdb, gdb catches the
687 // SIGINT for the browser process (and dumps you back to the gdb
688 // console) but doesn't for the child processes, killing them.
689 // The fix is to have child processes ignore SIGINT; they'll die
690 // on their own when the browser process goes away.
692 // Note that we *can't* rely on BeingDebugged to catch this case because
693 // we are the child process, which is not being debugged.
694 // TODO(evanm): move this to some shared subprocess-init function.
695 if (!base::debug::BeingDebugged())
696 signal(SIGINT
, SIG_IGN
);
701 crypto::EarlySetupForNSSInit();
704 ui::RegisterPathProvider();
705 RegisterPathProvider();
706 RegisterContentSchemes(true);
708 #if defined(OS_ANDROID)
709 int icudata_fd
= base::GlobalDescriptors::GetInstance()->MaybeGet(
710 kAndroidICUDataDescriptor
);
711 if (icudata_fd
!= -1)
712 CHECK(base::i18n::InitializeICUWithFileDescriptor(icudata_fd
));
714 CHECK(base::i18n::InitializeICU());
716 CHECK(base::i18n::InitializeICU());
719 InitializeStatsTable(command_line
);
722 delegate_
->PreSandboxStartup();
724 if (!process_type
.empty())
725 CommonSubprocessInit(process_type
);
728 CHECK(InitializeSandbox(params
.sandbox_info
));
729 #elif defined(OS_MACOSX) && !defined(OS_IOS)
730 if (process_type
== switches::kRendererProcess
||
731 process_type
== switches::kPpapiPluginProcess
||
732 (delegate_
&& delegate_
->DelaySandboxInitialization(process_type
))) {
733 // On OS X the renderer sandbox needs to be initialized later in the
734 // startup sequence in RendererMainPlatformDelegate::EnableSandbox().
736 CHECK(InitializeSandbox());
741 delegate_
->SandboxInitialized(process_type
);
743 // Return -1 to indicate no early termination.
747 virtual int Run() OVERRIDE
{
748 DCHECK(is_initialized_
);
749 DCHECK(!is_shutdown_
);
750 const CommandLine
& command_line
= *CommandLine::ForCurrentProcess();
751 std::string process_type
=
752 command_line
.GetSwitchValueASCII(switches::kProcessType
);
754 MainFunctionParams
main_params(command_line
);
755 main_params
.ui_task
= ui_task_
;
757 main_params
.sandbox_info
= &sandbox_info_
;
758 #elif defined(OS_MACOSX)
759 main_params
.autorelease_pool
= autorelease_pool_
.get();
763 return RunNamedProcessTypeMain(process_type
, main_params
, delegate_
);
769 virtual void Shutdown() OVERRIDE
{
770 DCHECK(is_initialized_
);
771 DCHECK(!is_shutdown_
);
773 if (completed_basic_startup_
&& delegate_
) {
774 const CommandLine
& command_line
= *CommandLine::ForCurrentProcess();
775 std::string process_type
=
776 command_line
.GetSwitchValueASCII(switches::kProcessType
);
778 delegate_
->ProcessExiting(process_type
);
782 #ifdef _CRTDBG_MAP_ALLOC
783 _CrtDumpMemoryLeaks();
784 #endif // _CRTDBG_MAP_ALLOC
787 #if defined(OS_MACOSX)
788 autorelease_pool_
.reset(NULL
);
791 exit_manager_
.reset(NULL
);
798 // True if the runner has been initialized.
799 bool is_initialized_
;
801 // True if the runner has been shut down.
804 // True if basic startup was completed.
805 bool completed_basic_startup_
;
807 // Used if the embedder doesn't set one.
808 ContentClient empty_content_client_
;
810 // The delegate will outlive this object.
811 ContentMainDelegate
* delegate_
;
813 scoped_ptr
<base::AtExitManager
> exit_manager_
;
815 sandbox::SandboxInterfaceInfo sandbox_info_
;
816 #elif defined(OS_MACOSX)
817 scoped_ptr
<base::mac::ScopedNSAutoreleasePool
> autorelease_pool_
;
820 base::Closure
* ui_task_
;
822 DISALLOW_COPY_AND_ASSIGN(ContentMainRunnerImpl
);
826 ContentMainRunner
* ContentMainRunner::Create() {
827 return new ContentMainRunnerImpl();
830 } // namespace content