Pin Chrome's shortcut to the Win10 Start menu on install and OS upgrade.
[chromium-blink-merge.git] / content / app / content_main_runner.cc
blob2906e77f0d2d805215b63bd2a352c525cf788f65
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "content/public/app/content_main_runner.h"
7 #include <stdlib.h>
9 #include "base/allocator/allocator_extension.h"
10 #include "base/at_exit.h"
11 #include "base/command_line.h"
12 #include "base/debug/debugger.h"
13 #include "base/files/file_path.h"
14 #include "base/i18n/icu_util.h"
15 #include "base/lazy_instance.h"
16 #include "base/logging.h"
17 #include "base/memory/scoped_ptr.h"
18 #include "base/memory/scoped_vector.h"
19 #include "base/metrics/statistics_recorder.h"
20 #include "base/path_service.h"
21 #include "base/process/launch.h"
22 #include "base/process/memory.h"
23 #include "base/process/process_handle.h"
24 #include "base/profiler/alternate_timer.h"
25 #include "base/profiler/scoped_tracker.h"
26 #include "base/strings/string_number_conversions.h"
27 #include "base/strings/string_util.h"
28 #include "base/strings/stringprintf.h"
29 #include "base/trace_event/trace_event.h"
30 #include "components/tracing/startup_tracing.h"
31 #include "content/browser/browser_main.h"
32 #include "content/common/set_process_title.h"
33 #include "content/common/url_schemes.h"
34 #include "content/gpu/in_process_gpu_thread.h"
35 #include "content/public/app/content_main.h"
36 #include "content/public/app/content_main_delegate.h"
37 #include "content/public/app/startup_helper_win.h"
38 #include "content/public/browser/content_browser_client.h"
39 #include "content/public/common/content_client.h"
40 #include "content/public/common/content_constants.h"
41 #include "content/public/common/content_paths.h"
42 #include "content/public/common/content_switches.h"
43 #include "content/public/common/main_function_params.h"
44 #include "content/public/common/sandbox_init.h"
45 #include "content/renderer/in_process_renderer_thread.h"
46 #include "content/utility/in_process_utility_thread.h"
47 #include "crypto/nss_util.h"
48 #include "ipc/ipc_descriptors.h"
49 #include "ipc/ipc_switches.h"
50 #include "media/base/media.h"
51 #include "sandbox/win/src/sandbox_types.h"
52 #include "ui/base/ui_base_paths.h"
53 #include "ui/base/ui_base_switches.h"
55 #ifdef V8_USE_EXTERNAL_STARTUP_DATA
56 #include "gin/v8_initializer.h"
57 #endif
59 #if defined(USE_TCMALLOC)
60 #include "third_party/tcmalloc/chromium/src/gperftools/malloc_extension.h"
61 #if defined(TYPE_PROFILING)
62 #include "base/allocator/type_profiler.h"
63 #include "base/allocator/type_profiler_tcmalloc.h"
64 #endif
65 #endif
67 #if !defined(OS_IOS)
68 #include "content/app/mojo/mojo_init.h"
69 #include "content/browser/gpu/gpu_process_host.h"
70 #include "content/browser/renderer_host/render_process_host_impl.h"
71 #include "content/browser/utility_process_host_impl.h"
72 #include "content/public/plugin/content_plugin_client.h"
73 #include "content/public/renderer/content_renderer_client.h"
74 #include "content/public/utility/content_utility_client.h"
75 #endif
77 #if defined(OS_WIN)
78 #include <malloc.h>
79 #include <cstring>
81 #include "base/strings/string_number_conversions.h"
82 #include "base/trace_event/trace_event_etw_export_win.h"
83 #include "ui/base/win/atl_module.h"
84 #include "ui/gfx/win/dpi.h"
85 #elif defined(OS_MACOSX)
86 #include "base/mac/scoped_nsautorelease_pool.h"
87 #if !defined(OS_IOS)
88 #include "base/power_monitor/power_monitor_device_source.h"
89 #include "content/app/mac/mac_init.h"
90 #include "content/browser/browser_io_surface_manager_mac.h"
91 #include "content/browser/mach_broker_mac.h"
92 #include "content/child/child_io_surface_manager_mac.h"
93 #include "content/common/sandbox_init_mac.h"
94 #endif // !OS_IOS
95 #endif // OS_WIN
97 #if defined(OS_POSIX)
98 #include <signal.h>
100 #include "base/posix/global_descriptors.h"
101 #include "content/public/common/content_descriptors.h"
103 #if !defined(OS_MACOSX)
104 #include "content/public/common/content_descriptors.h"
105 #include "content/public/common/zygote_fork_delegate_linux.h"
106 #endif
107 #if !defined(OS_MACOSX) && !defined(OS_ANDROID)
108 #include "content/zygote/zygote_main.h"
109 #endif
111 #endif // OS_POSIX
113 #if !defined(OS_MACOSX) && defined(USE_TCMALLOC)
114 extern "C" {
115 int tc_set_new_mode(int mode);
117 #endif
119 namespace content {
120 extern int GpuMain(const content::MainFunctionParams&);
121 #if defined(ENABLE_PLUGINS)
122 #if !defined(OS_LINUX)
123 extern int PluginMain(const content::MainFunctionParams&);
124 #endif
125 extern int PpapiPluginMain(const MainFunctionParams&);
126 extern int PpapiBrokerMain(const MainFunctionParams&);
127 #endif
128 extern int RendererMain(const content::MainFunctionParams&);
129 extern int UtilityMain(const MainFunctionParams&);
130 } // namespace content
132 namespace content {
134 #if !defined(CHROME_MULTIPLE_DLL_CHILD)
135 base::LazyInstance<ContentBrowserClient>
136 g_empty_content_browser_client = LAZY_INSTANCE_INITIALIZER;
137 #endif // !CHROME_MULTIPLE_DLL_CHILD
139 #if !defined(OS_IOS) && !defined(CHROME_MULTIPLE_DLL_BROWSER)
140 base::LazyInstance<ContentPluginClient>
141 g_empty_content_plugin_client = LAZY_INSTANCE_INITIALIZER;
142 base::LazyInstance<ContentRendererClient>
143 g_empty_content_renderer_client = LAZY_INSTANCE_INITIALIZER;
144 base::LazyInstance<ContentUtilityClient>
145 g_empty_content_utility_client = LAZY_INSTANCE_INITIALIZER;
146 #endif // !OS_IOS && !CHROME_MULTIPLE_DLL_BROWSER
148 #if defined(OS_WIN)
150 #endif // defined(OS_WIN)
152 #if defined(OS_POSIX) && !defined(OS_IOS)
154 // Setup signal-handling state: resanitize most signals, ignore SIGPIPE.
155 void SetupSignalHandlers() {
156 // Sanitise our signal handling state. Signals that were ignored by our
157 // parent will also be ignored by us. We also inherit our parent's sigmask.
158 sigset_t empty_signal_set;
159 CHECK(0 == sigemptyset(&empty_signal_set));
160 CHECK(0 == sigprocmask(SIG_SETMASK, &empty_signal_set, NULL));
162 struct sigaction sigact;
163 memset(&sigact, 0, sizeof(sigact));
164 sigact.sa_handler = SIG_DFL;
165 static const int signals_to_reset[] =
166 {SIGHUP, SIGINT, SIGQUIT, SIGILL, SIGABRT, SIGFPE, SIGSEGV,
167 SIGALRM, SIGTERM, SIGCHLD, SIGBUS, SIGTRAP}; // SIGPIPE is set below.
168 for (unsigned i = 0; i < arraysize(signals_to_reset); i++) {
169 CHECK(0 == sigaction(signals_to_reset[i], &sigact, NULL));
172 // Always ignore SIGPIPE. We check the return value of write().
173 CHECK(signal(SIGPIPE, SIG_IGN) != SIG_ERR);
176 #endif // OS_POSIX && !OS_IOS
178 void CommonSubprocessInit(const std::string& process_type) {
179 #if defined(OS_WIN)
180 // HACK: Let Windows know that we have started. This is needed to suppress
181 // the IDC_APPSTARTING cursor from being displayed for a prolonged period
182 // while a subprocess is starting.
183 PostThreadMessage(GetCurrentThreadId(), WM_NULL, 0, 0);
184 MSG msg;
185 PeekMessage(&msg, NULL, 0, 0, PM_REMOVE);
186 #endif
187 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_ANDROID)
188 // Various things break when you're using a locale where the decimal
189 // separator isn't a period. See e.g. bugs 22782 and 39964. For
190 // all processes except the browser process (where we call system
191 // APIs that may rely on the correct locale for formatting numbers
192 // when presenting them to the user), reset the locale for numeric
193 // formatting.
194 // Note that this is not correct for plugin processes -- they can
195 // surface UI -- but it's likely they get this wrong too so why not.
196 setlocale(LC_NUMERIC, "C");
197 #endif
200 // Only needed on Windows for creating stats tables.
201 #if defined(OS_WIN)
202 static base::ProcessId GetBrowserPid(const base::CommandLine& command_line) {
203 base::ProcessId browser_pid = base::GetCurrentProcId();
204 if (command_line.HasSwitch(switches::kProcessChannelID)) {
205 std::string channel_name =
206 command_line.GetSwitchValueASCII(switches::kProcessChannelID);
208 int browser_pid_int;
209 base::StringToInt(channel_name, &browser_pid_int);
210 browser_pid = static_cast<base::ProcessId>(browser_pid_int);
211 DCHECK_NE(browser_pid_int, 0);
213 return browser_pid;
215 #endif
217 class ContentClientInitializer {
218 public:
219 static void Set(const std::string& process_type,
220 ContentMainDelegate* delegate) {
221 ContentClient* content_client = GetContentClient();
222 #if !defined(CHROME_MULTIPLE_DLL_CHILD)
223 if (process_type.empty()) {
224 if (delegate)
225 content_client->browser_ = delegate->CreateContentBrowserClient();
226 if (!content_client->browser_)
227 content_client->browser_ = &g_empty_content_browser_client.Get();
229 #endif // !CHROME_MULTIPLE_DLL_CHILD
231 #if !defined(OS_IOS) && !defined(CHROME_MULTIPLE_DLL_BROWSER)
232 if (process_type == switches::kPluginProcess ||
233 process_type == switches::kPpapiPluginProcess) {
234 if (delegate)
235 content_client->plugin_ = delegate->CreateContentPluginClient();
236 if (!content_client->plugin_)
237 content_client->plugin_ = &g_empty_content_plugin_client.Get();
238 // Single process not supported in split dll mode.
239 } else if (process_type == switches::kRendererProcess ||
240 base::CommandLine::ForCurrentProcess()->HasSwitch(
241 switches::kSingleProcess)) {
242 if (delegate)
243 content_client->renderer_ = delegate->CreateContentRendererClient();
244 if (!content_client->renderer_)
245 content_client->renderer_ = &g_empty_content_renderer_client.Get();
248 if (process_type == switches::kUtilityProcess ||
249 base::CommandLine::ForCurrentProcess()->HasSwitch(
250 switches::kSingleProcess)) {
251 if (delegate)
252 content_client->utility_ = delegate->CreateContentUtilityClient();
253 // TODO(scottmg): http://crbug.com/237249 Should be in _child.
254 if (!content_client->utility_)
255 content_client->utility_ = &g_empty_content_utility_client.Get();
257 #endif // !OS_IOS && !CHROME_MULTIPLE_DLL_BROWSER
261 // We dispatch to a process-type-specific FooMain() based on a command-line
262 // flag. This struct is used to build a table of (flag, main function) pairs.
263 struct MainFunction {
264 const char* name;
265 int (*function)(const MainFunctionParams&);
268 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_ANDROID)
269 // On platforms that use the zygote, we have a special subset of
270 // subprocesses that are launched via the zygote. This function
271 // fills in some process-launching bits around ZygoteMain().
272 // Returns the exit code of the subprocess.
273 int RunZygote(const MainFunctionParams& main_function_params,
274 ContentMainDelegate* delegate) {
275 static const MainFunction kMainFunctions[] = {
276 { switches::kRendererProcess, RendererMain },
277 #if defined(ENABLE_PLUGINS)
278 { switches::kPpapiPluginProcess, PpapiPluginMain },
279 #endif
280 { switches::kUtilityProcess, UtilityMain },
283 ScopedVector<ZygoteForkDelegate> zygote_fork_delegates;
284 if (delegate) {
285 delegate->ZygoteStarting(&zygote_fork_delegates);
286 media::InitializeMediaLibrary();
289 // This function call can return multiple times, once per fork().
290 if (!ZygoteMain(main_function_params, zygote_fork_delegates.Pass()))
291 return 1;
293 if (delegate) delegate->ZygoteForked();
295 // Zygote::HandleForkRequest may have reallocated the command
296 // line so update it here with the new version.
297 const base::CommandLine& command_line =
298 *base::CommandLine::ForCurrentProcess();
299 std::string process_type =
300 command_line.GetSwitchValueASCII(switches::kProcessType);
301 ContentClientInitializer::Set(process_type, delegate);
303 MainFunctionParams main_params(command_line);
304 main_params.zygote_child = true;
306 for (size_t i = 0; i < arraysize(kMainFunctions); ++i) {
307 if (process_type == kMainFunctions[i].name)
308 return kMainFunctions[i].function(main_params);
311 if (delegate)
312 return delegate->RunProcess(process_type, main_params);
314 NOTREACHED() << "Unknown zygote process type: " << process_type;
315 return 1;
317 #endif // defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_ANDROID)
319 #if !defined(OS_IOS)
320 static void RegisterMainThreadFactories() {
321 #if !defined(CHROME_MULTIPLE_DLL_BROWSER) && !defined(CHROME_MULTIPLE_DLL_CHILD)
322 UtilityProcessHostImpl::RegisterUtilityMainThreadFactory(
323 CreateInProcessUtilityThread);
324 RenderProcessHostImpl::RegisterRendererMainThreadFactory(
325 CreateInProcessRendererThread);
326 GpuProcessHost::RegisterGpuMainThreadFactory(
327 CreateInProcessGpuThread);
328 #else
329 base::CommandLine& command_line = *base::CommandLine::ForCurrentProcess();
330 if (command_line.HasSwitch(switches::kSingleProcess)) {
331 LOG(FATAL) <<
332 "--single-process is not supported in chrome multiple dll browser.";
334 if (command_line.HasSwitch(switches::kInProcessGPU)) {
335 LOG(FATAL) <<
336 "--in-process-gpu is not supported in chrome multiple dll browser.";
338 #endif // !CHROME_MULTIPLE_DLL_BROWSER && !CHROME_MULTIPLE_DLL_CHILD
341 // Run the FooMain() for a given process type.
342 // If |process_type| is empty, runs BrowserMain().
343 // Returns the exit code for this process.
344 int RunNamedProcessTypeMain(
345 const std::string& process_type,
346 const MainFunctionParams& main_function_params,
347 ContentMainDelegate* delegate) {
348 static const MainFunction kMainFunctions[] = {
349 #if !defined(CHROME_MULTIPLE_DLL_CHILD)
350 { "", BrowserMain },
351 #endif
352 #if !defined(CHROME_MULTIPLE_DLL_BROWSER)
353 #if defined(ENABLE_PLUGINS)
354 #if !defined(OS_LINUX)
355 { switches::kPluginProcess, PluginMain },
356 #endif
357 { switches::kPpapiPluginProcess, PpapiPluginMain },
358 { switches::kPpapiBrokerProcess, PpapiBrokerMain },
359 #endif // ENABLE_PLUGINS
360 { switches::kUtilityProcess, UtilityMain },
361 { switches::kRendererProcess, RendererMain },
362 { switches::kGpuProcess, GpuMain },
363 #endif // !CHROME_MULTIPLE_DLL_BROWSER
366 RegisterMainThreadFactories();
368 for (size_t i = 0; i < arraysize(kMainFunctions); ++i) {
369 if (process_type == kMainFunctions[i].name) {
370 if (delegate) {
371 int exit_code = delegate->RunProcess(process_type,
372 main_function_params);
373 #if defined(OS_ANDROID)
374 // In Android's browser process, the negative exit code doesn't mean the
375 // default behavior should be used as the UI message loop is managed by
376 // the Java and the browser process's default behavior is always
377 // overridden.
378 if (process_type.empty())
379 return exit_code;
380 #endif
381 if (exit_code >= 0)
382 return exit_code;
384 return kMainFunctions[i].function(main_function_params);
388 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_ANDROID)
389 // Zygote startup is special -- see RunZygote comments above
390 // for why we don't use ZygoteMain directly.
391 if (process_type == switches::kZygoteProcess)
392 return RunZygote(main_function_params, delegate);
393 #endif
395 // If it's a process we don't know about, the embedder should know.
396 if (delegate)
397 return delegate->RunProcess(process_type, main_function_params);
399 NOTREACHED() << "Unknown process type: " << process_type;
400 return 1;
402 #endif // !OS_IOS
404 class ContentMainRunnerImpl : public ContentMainRunner {
405 public:
406 ContentMainRunnerImpl()
407 : is_initialized_(false),
408 is_shutdown_(false),
409 completed_basic_startup_(false),
410 delegate_(NULL),
411 ui_task_(NULL) {
412 #if defined(OS_WIN)
413 memset(&sandbox_info_, 0, sizeof(sandbox_info_));
414 #endif
417 ~ContentMainRunnerImpl() override {
418 if (is_initialized_ && !is_shutdown_)
419 Shutdown();
422 #if defined(USE_TCMALLOC)
423 static bool GetAllocatorWasteSizeThunk(size_t* size) {
424 size_t heap_size, allocated_bytes, unmapped_bytes;
425 MallocExtension* ext = MallocExtension::instance();
426 if (ext->GetNumericProperty("generic.heap_size", &heap_size) &&
427 ext->GetNumericProperty("generic.current_allocated_bytes",
428 &allocated_bytes) &&
429 ext->GetNumericProperty("tcmalloc.pageheap_unmapped_bytes",
430 &unmapped_bytes)) {
431 *size = heap_size - allocated_bytes - unmapped_bytes;
432 return true;
434 DCHECK(false);
435 return false;
438 static void GetStatsThunk(char* buffer, int buffer_length) {
439 MallocExtension::instance()->GetStats(buffer, buffer_length);
442 static void ReleaseFreeMemoryThunk() {
443 MallocExtension::instance()->ReleaseFreeMemory();
445 #endif
447 int Initialize(const ContentMainParams& params) override {
448 ui_task_ = params.ui_task;
450 base::EnableTerminationOnOutOfMemory();
451 #if defined(OS_WIN)
452 RegisterInvalidParamHandler();
453 ui::win::CreateATLModuleIfNeeded();
455 sandbox_info_ = *params.sandbox_info;
456 #else // !OS_WIN
458 #if defined(OS_ANDROID)
459 // See note at the initialization of ExitManager, below; basically,
460 // only Android builds have the ctor/dtor handlers set up to use
461 // TRACE_EVENT right away.
462 TRACE_EVENT0("startup", "ContentMainRunnerImpl::Initialize");
463 #endif // OS_ANDROID
465 // NOTE(willchan): One might ask why these TCMalloc-related calls are done
466 // here rather than in process_util_linux.cc with the definition of
467 // EnableTerminationOnOutOfMemory(). That's because base shouldn't have a
468 // dependency on TCMalloc. Really, we ought to have our allocator shim code
469 // implement this EnableTerminationOnOutOfMemory() function. Whateverz.
470 // This works for now.
471 #if !defined(OS_MACOSX) && defined(USE_TCMALLOC)
473 #if defined(TYPE_PROFILING)
474 base::type_profiler::InterceptFunctions::SetFunctions(
475 base::type_profiler::NewInterceptForTCMalloc,
476 base::type_profiler::DeleteInterceptForTCMalloc);
477 #endif
479 // For tcmalloc, we need to tell it to behave like new.
480 tc_set_new_mode(1);
482 // On windows, we've already set these thunks up in _heap_init()
483 base::allocator::SetGetAllocatorWasteSizeFunction(
484 GetAllocatorWasteSizeThunk);
485 base::allocator::SetGetStatsFunction(GetStatsThunk);
486 base::allocator::SetReleaseFreeMemoryFunction(ReleaseFreeMemoryThunk);
488 // Provide optional hook for monitoring allocation quantities on a
489 // per-thread basis. Only set the hook if the environment indicates this
490 // needs to be enabled.
491 const char* profiling = getenv(tracked_objects::kAlternateProfilerTime);
492 if (profiling &&
493 (atoi(profiling) == tracked_objects::TIME_SOURCE_TYPE_TCMALLOC)) {
494 tracked_objects::SetAlternateTimeSource(
495 MallocExtension::GetBytesAllocatedOnCurrentThread,
496 tracked_objects::TIME_SOURCE_TYPE_TCMALLOC);
498 #endif // !OS_MACOSX && USE_TCMALLOC
500 #if !defined(OS_IOS)
501 base::GlobalDescriptors* g_fds = base::GlobalDescriptors::GetInstance();
502 #endif
504 // On Android,
505 // - setlocale() is not supported.
506 // - We do not override the signal handlers so that we can get
507 // stack trace when crashing.
508 // - The ipc_fd is passed through the Java service.
509 // Thus, these are all disabled.
510 #if !defined(OS_ANDROID) && !defined(OS_IOS)
511 // Set C library locale to make sure CommandLine can parse argument values
512 // in correct encoding.
513 setlocale(LC_ALL, "");
515 SetupSignalHandlers();
516 g_fds->Set(kPrimaryIPCChannel,
517 kPrimaryIPCChannel + base::GlobalDescriptors::kBaseDescriptor);
518 #endif // !OS_ANDROID && !OS_IOS
520 #if defined(OS_LINUX) || defined(OS_OPENBSD)
521 g_fds->Set(kCrashDumpSignal,
522 kCrashDumpSignal + base::GlobalDescriptors::kBaseDescriptor);
523 #endif // OS_LINUX || OS_OPENBSD
526 #endif // !OS_WIN
528 is_initialized_ = true;
529 delegate_ = params.delegate;
531 // The exit manager is in charge of calling the dtors of singleton objects.
532 // On Android, AtExitManager is set up when library is loaded.
533 // On iOS, it's set up in main(), which can't call directly through to here.
534 // A consequence of this is that you can't use the ctor/dtor-based
535 // TRACE_EVENT methods on Linux or iOS builds till after we set this up.
536 #if !defined(OS_ANDROID) && !defined(OS_IOS)
537 if (!ui_task_) {
538 // When running browser tests, don't create a second AtExitManager as that
539 // interfers with shutdown when objects created before ContentMain is
540 // called are destructed when it returns.
541 exit_manager_.reset(new base::AtExitManager);
543 #endif // !OS_ANDROID && !OS_IOS
545 // Don't create this loop on iOS, since the outer loop is already handled
546 // and a loop that's destroyed in shutdown interleaves badly with the event
547 // loop pool on iOS.
548 #if defined(OS_MACOSX) && !defined(OS_IOS)
549 // We need this pool for all the objects created before we get to the
550 // event loop, but we don't want to leave them hanging around until the
551 // app quits. Each "main" needs to flush this pool right before it goes into
552 // its main event loop to get rid of the cruft.
553 autorelease_pool_.reset(new base::mac::ScopedNSAutoreleasePool());
554 InitializeMac();
555 #endif
557 // On Android, the command line is initialized when library is loaded and
558 // we have already started our TRACE_EVENT0.
559 #if !defined(OS_ANDROID)
560 // argc/argv are ignored on Windows and Android; see command_line.h for
561 // details.
562 int argc = 0;
563 const char** argv = NULL;
565 #if !defined(OS_WIN)
566 argc = params.argc;
567 argv = params.argv;
568 #endif
570 base::CommandLine::Init(argc, argv);
572 base::EnableTerminationOnHeapCorruption();
574 // TODO(yiyaoliu, vadimt): Remove this once crbug.com/453640 is fixed.
575 // Enable profiler recording right after command line is initialized so that
576 // browser startup can be instrumented.
577 if (delegate_ && delegate_->ShouldEnableProfilerRecording())
578 tracked_objects::ScopedTracker::Enable();
580 #if !defined(OS_IOS)
581 SetProcessTitleFromCommandLine(argv);
582 #endif
583 #endif // !OS_ANDROID
585 int exit_code = 0;
586 if (delegate_ && delegate_->BasicStartupComplete(&exit_code))
587 return exit_code;
589 completed_basic_startup_ = true;
591 const base::CommandLine& command_line =
592 *base::CommandLine::ForCurrentProcess();
593 std::string process_type =
594 command_line.GetSwitchValueASCII(switches::kProcessType);
596 #if !defined(OS_IOS)
597 // Initialize mojo here so that services can be registered.
598 InitializeMojo();
599 #endif
601 #if defined(OS_WIN)
602 bool init_device_scale_factor = true;
603 if (command_line.HasSwitch(switches::kDeviceScaleFactor)) {
604 std::string scale_factor_string = command_line.GetSwitchValueASCII(
605 switches::kDeviceScaleFactor);
606 double scale_factor = 0;
607 if (base::StringToDouble(scale_factor_string, &scale_factor)) {
608 init_device_scale_factor = false;
609 gfx::InitDeviceScaleFactor(scale_factor);
612 if (init_device_scale_factor)
613 gfx::InitDeviceScaleFactor(gfx::GetDPIScale());
614 #endif
616 if (!GetContentClient())
617 SetContentClient(&empty_content_client_);
618 ContentClientInitializer::Set(process_type, delegate_);
620 #if defined(OS_WIN)
621 // Route stdio to parent console (if any) or create one.
622 if (command_line.HasSwitch(switches::kEnableLogging))
623 base::RouteStdioToConsole();
624 #endif
626 // Enable startup tracing asap to avoid early TRACE_EVENT calls being
627 // ignored.
628 if (command_line.HasSwitch(switches::kTraceStartup)) {
629 base::trace_event::TraceConfig trace_config(
630 command_line.GetSwitchValueASCII(switches::kTraceStartup),
631 base::trace_event::RECORD_UNTIL_FULL);
632 base::trace_event::TraceLog::GetInstance()->SetEnabled(
633 trace_config,
634 base::trace_event::TraceLog::RECORDING_MODE);
635 } else if (process_type != switches::kZygoteProcess &&
636 process_type != switches::kRendererProcess) {
637 // There is no need to schedule stopping tracing in this case. Telemetry
638 // will stop tracing on demand later.
639 tracing::EnableStartupTracingIfConfigFileExists();
642 #if defined(OS_WIN)
643 // Enable exporting of events to ETW if requested on the command line.
644 if (command_line.HasSwitch(switches::kTraceExportEventsToETW))
645 base::trace_event::TraceEventETWExport::EnableETWExport();
646 #endif // OS_WIN
648 #if !defined(OS_ANDROID)
649 // Android tracing started at the beginning of the method.
650 // Other OSes have to wait till we get here in order for all the memory
651 // management setup to be completed.
652 TRACE_EVENT0("startup", "ContentMainRunnerImpl::Initialize");
653 #endif // !OS_ANDROID
655 #if defined(OS_MACOSX) && !defined(OS_IOS)
656 // We need to allocate the IO Ports before the Sandbox is initialized or
657 // the first instance of PowerMonitor is created.
658 // It's important not to allocate the ports for processes which don't
659 // register with the power monitor - see crbug.com/88867.
660 if (process_type.empty() ||
661 (delegate_ &&
662 delegate_->ProcessRegistersWithSystemProcess(process_type))) {
663 base::PowerMonitorDeviceSource::AllocateSystemIOPorts();
666 if (!process_type.empty() &&
667 (!delegate_ || delegate_->ShouldSendMachPort(process_type))) {
668 MachBroker::ChildSendTaskPortToParent();
671 if (!command_line.HasSwitch(switches::kSingleProcess) &&
672 !process_type.empty() && (process_type == switches::kRendererProcess ||
673 process_type == switches::kGpuProcess)) {
674 base::mac::ScopedMachSendRight service_port =
675 BrowserIOSurfaceManager::LookupServicePort(getppid());
676 if (service_port.is_valid()) {
677 ChildIOSurfaceManager::GetInstance()->set_service_port(
678 service_port.release());
679 IOSurfaceManager::SetInstance(ChildIOSurfaceManager::GetInstance());
682 #elif defined(OS_WIN)
683 SetupCRT(command_line);
684 #endif
686 #if defined(OS_POSIX)
687 if (!process_type.empty()) {
688 // When you hit Ctrl-C in a terminal running the browser
689 // process, a SIGINT is delivered to the entire process group.
690 // When debugging the browser process via gdb, gdb catches the
691 // SIGINT for the browser process (and dumps you back to the gdb
692 // console) but doesn't for the child processes, killing them.
693 // The fix is to have child processes ignore SIGINT; they'll die
694 // on their own when the browser process goes away.
696 // Note that we *can't* rely on BeingDebugged to catch this case because
697 // we are the child process, which is not being debugged.
698 // TODO(evanm): move this to some shared subprocess-init function.
699 if (!base::debug::BeingDebugged())
700 signal(SIGINT, SIG_IGN);
702 #endif
704 #if defined(USE_NSS_CERTS)
705 crypto::EarlySetupForNSSInit();
706 #endif
708 ui::RegisterPathProvider();
709 RegisterPathProvider();
710 RegisterContentSchemes(true);
712 #if defined(OS_ANDROID)
713 int icudata_fd = g_fds->MaybeGet(kAndroidICUDataDescriptor);
714 if (icudata_fd != -1) {
715 auto icudata_region = g_fds->GetRegion(kAndroidICUDataDescriptor);
716 CHECK(base::i18n::InitializeICUWithFileDescriptor(icudata_fd,
717 icudata_region));
718 } else {
719 CHECK(base::i18n::InitializeICU());
721 #else
722 CHECK(base::i18n::InitializeICU());
723 #endif // OS_ANDROID
725 base::StatisticsRecorder::Initialize();
727 #if defined(V8_USE_EXTERNAL_STARTUP_DATA)
728 #if defined(OS_POSIX) && !defined(OS_MACOSX)
729 #if !defined(OS_ANDROID)
730 // kV8NativesDataDescriptor and kV8SnapshotDataDescriptor could be shared
731 // with child processes via file descriptors. On Android they are set in
732 // ChildProcessService::InternalInitChildProcess, otherwise set them here.
733 if (command_line.HasSwitch(switches::kV8NativesPassedByFD)) {
734 g_fds->Set(
735 kV8NativesDataDescriptor,
736 kV8NativesDataDescriptor + base::GlobalDescriptors::kBaseDescriptor);
738 if (command_line.HasSwitch(switches::kV8SnapshotPassedByFD)) {
739 g_fds->Set(
740 kV8SnapshotDataDescriptor,
741 kV8SnapshotDataDescriptor + base::GlobalDescriptors::kBaseDescriptor);
743 #endif // !OS_ANDROID
744 int v8_natives_fd = g_fds->MaybeGet(kV8NativesDataDescriptor);
745 int v8_snapshot_fd = g_fds->MaybeGet(kV8SnapshotDataDescriptor);
746 if (v8_snapshot_fd != -1) {
747 auto v8_snapshot_region = g_fds->GetRegion(kV8SnapshotDataDescriptor);
748 gin::V8Initializer::LoadV8SnapshotFromFD(
749 v8_snapshot_fd, v8_snapshot_region.offset, v8_snapshot_region.size);
750 } else {
751 gin::V8Initializer::LoadV8Snapshot();
753 if (v8_natives_fd != -1) {
754 auto v8_natives_region = g_fds->GetRegion(kV8NativesDataDescriptor);
755 gin::V8Initializer::LoadV8NativesFromFD(
756 v8_natives_fd, v8_natives_region.offset, v8_natives_region.size);
757 } else {
758 gin::V8Initializer::LoadV8Natives();
760 #else
761 gin::V8Initializer::LoadV8Snapshot();
762 gin::V8Initializer::LoadV8Natives();
763 #endif // OS_POSIX && !OS_MACOSX
764 #endif // V8_USE_EXTERNAL_STARTUP_DATA
766 if (delegate_)
767 delegate_->PreSandboxStartup();
769 if (!process_type.empty())
770 CommonSubprocessInit(process_type);
772 #if defined(OS_WIN)
773 CHECK(InitializeSandbox(params.sandbox_info));
774 #elif defined(OS_MACOSX) && !defined(OS_IOS)
775 if (process_type == switches::kRendererProcess ||
776 process_type == switches::kPpapiPluginProcess ||
777 (delegate_ && delegate_->DelaySandboxInitialization(process_type))) {
778 // On OS X the renderer sandbox needs to be initialized later in the
779 // startup sequence in RendererMainPlatformDelegate::EnableSandbox().
780 } else {
781 CHECK(InitializeSandbox());
783 #endif
785 if (delegate_)
786 delegate_->SandboxInitialized(process_type);
788 // Return -1 to indicate no early termination.
789 return -1;
792 int Run() override {
793 DCHECK(is_initialized_);
794 DCHECK(!is_shutdown_);
795 const base::CommandLine& command_line =
796 *base::CommandLine::ForCurrentProcess();
797 std::string process_type =
798 command_line.GetSwitchValueASCII(switches::kProcessType);
800 MainFunctionParams main_params(command_line);
801 main_params.ui_task = ui_task_;
802 #if defined(OS_WIN)
803 main_params.sandbox_info = &sandbox_info_;
804 #elif defined(OS_MACOSX)
805 main_params.autorelease_pool = autorelease_pool_.get();
806 #endif
808 #if !defined(OS_IOS)
809 return RunNamedProcessTypeMain(process_type, main_params, delegate_);
810 #else
811 return 1;
812 #endif
815 void Shutdown() override {
816 DCHECK(is_initialized_);
817 DCHECK(!is_shutdown_);
819 if (completed_basic_startup_ && delegate_) {
820 const base::CommandLine& command_line =
821 *base::CommandLine::ForCurrentProcess();
822 std::string process_type =
823 command_line.GetSwitchValueASCII(switches::kProcessType);
825 delegate_->ProcessExiting(process_type);
828 #if defined(OS_WIN)
829 #ifdef _CRTDBG_MAP_ALLOC
830 _CrtDumpMemoryLeaks();
831 #endif // _CRTDBG_MAP_ALLOC
832 #endif // OS_WIN
834 #if defined(OS_MACOSX) && !defined(OS_IOS)
835 autorelease_pool_.reset(NULL);
836 #endif
838 exit_manager_.reset(NULL);
840 delegate_ = NULL;
841 is_shutdown_ = true;
844 private:
845 // True if the runner has been initialized.
846 bool is_initialized_;
848 // True if the runner has been shut down.
849 bool is_shutdown_;
851 // True if basic startup was completed.
852 bool completed_basic_startup_;
854 // Used if the embedder doesn't set one.
855 ContentClient empty_content_client_;
857 // The delegate will outlive this object.
858 ContentMainDelegate* delegate_;
860 scoped_ptr<base::AtExitManager> exit_manager_;
861 #if defined(OS_WIN)
862 sandbox::SandboxInterfaceInfo sandbox_info_;
863 #elif defined(OS_MACOSX)
864 scoped_ptr<base::mac::ScopedNSAutoreleasePool> autorelease_pool_;
865 #endif
867 base::Closure* ui_task_;
869 DISALLOW_COPY_AND_ASSIGN(ContentMainRunnerImpl);
872 // static
873 ContentMainRunner* ContentMainRunner::Create() {
874 return new ContentMainRunnerImpl();
877 } // namespace content