Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "content/browser/browser_io_surface_manager_mac.h" | |
| 6 | |
| 7 #include <servers/bootstrap.h> | |
| 8 | |
| 9 #include <string> | |
| 10 | |
| 11 #include "base/logging.h" | |
| 12 #include "base/mac/foundation_util.h" | |
| 13 #include "base/mac/mach_logging.h" | |
| 14 #include "base/strings/stringprintf.h" | |
| 15 #include "content/browser/gpu/browser_gpu_channel_host_factory.h" | |
| 16 | |
| 17 namespace content { | |
| 18 namespace { | |
| 19 | |
| 20 // Returns the Mach port name to use when sending or receiving messages. |pid| | |
| 21 // is the process ID of the service. | |
| 22 std::string GetMachPortName(pid_t pid) { | |
| 23 return base::StringPrintf("%s.iosurfacemgr.%d", base::mac::BaseBundleID(), | |
| 24 pid); | |
| 25 } | |
| 26 | |
| 27 // Amount of time to wait before giving up when sending a reply message. | |
| 28 const int kSendReplyTimeoutMs = 100; | |
| 29 | |
| 30 } // namespace | |
| 31 | |
| 32 // static | |
| 33 BrowserIOSurfaceManager* BrowserIOSurfaceManager::GetInstance() { | |
| 34 return Singleton<BrowserIOSurfaceManager, | |
| 35 LeakySingletonTraits<BrowserIOSurfaceManager>>::get(); | |
| 36 } | |
| 37 | |
| 38 // static | |
| 39 base::mac::ScopedMachSendRight BrowserIOSurfaceManager::LookupServicePort( | |
| 40 pid_t pid) { | |
| 41 // Look up the named IOSurfaceManager port that's been registered with | |
| 42 // the bootstrap server. | |
| 43 mach_port_t port; | |
| 44 kern_return_t kr = | |
| 45 bootstrap_look_up(bootstrap_port, GetMachPortName(pid).c_str(), &port); | |
| 46 if (kr != KERN_SUCCESS) { | |
| 47 BOOTSTRAP_LOG(ERROR, kr) << "bootstrap_look_up"; | |
| 48 return base::mac::ScopedMachSendRight(); | |
| 49 } | |
| 50 | |
| 51 return base::mac::ScopedMachSendRight(port); | |
| 52 } | |
| 53 | |
| 54 bool BrowserIOSurfaceManager::RegisterIOSurface(int io_surface_id, | |
| 55 int client_id, | |
| 56 IOSurfaceRef io_surface) { | |
| 57 base::AutoLock lock(lock_); | |
| 58 | |
| 59 IOSurfaceMapKey key(io_surface_id, client_id); | |
| 60 DCHECK(io_surfaces_.find(key) == io_surfaces_.end()); | |
| 61 io_surfaces_.add(key, make_scoped_ptr(new base::mac::ScopedMachSendRight( | |
| 62 IOSurfaceCreateMachPort(io_surface)))); | |
| 63 return true; | |
| 64 } | |
| 65 | |
| 66 void BrowserIOSurfaceManager::UnregisterIOSurface(int io_surface_id, | |
| 67 int client_id) { | |
| 68 base::AutoLock lock(lock_); | |
| 69 | |
| 70 IOSurfaceMapKey key(io_surface_id, client_id); | |
| 71 DCHECK(io_surfaces_.find(key) != io_surfaces_.end()); | |
| 72 io_surfaces_.erase(key); | |
| 73 } | |
| 74 | |
| 75 IOSurfaceRef BrowserIOSurfaceManager::AcquireIOSurface(int io_surface_id) { | |
| 76 base::AutoLock lock(lock_); | |
| 77 | |
| 78 IOSurfaceMapKey key( | |
| 79 io_surface_id, | |
| 80 BrowserGpuChannelHostFactory::instance()->GetGpuChannelId()); | |
| 81 auto it = io_surfaces_.find(key); | |
| 82 if (it == io_surfaces_.end()) { | |
| 83 LOG(ERROR) << "Invalid Id for IOSurface " << io_surface_id; | |
| 84 return nullptr; | |
| 85 } | |
| 86 | |
| 87 return IOSurfaceLookupFromMachPort(it->second->get()); | |
| 88 } | |
| 89 | |
| 90 void BrowserIOSurfaceManager::EnsureRunning() { | |
| 91 base::AutoLock lock(lock_); | |
| 92 | |
| 93 if (initialized_) | |
| 94 return; | |
| 95 | |
| 96 // Do not attempt to reinitialize in the event of failure. | |
| 97 initialized_ = true; | |
| 98 | |
| 99 if (!Initialize()) { | |
| 100 LOG(ERROR) << "Failed to initialize the BrowserIOSurfaceManager"; | |
| 101 } | |
| 102 } | |
| 103 | |
| 104 IOSurfaceManagerToken BrowserIOSurfaceManager::GetGpuProcessToken() const { | |
| 105 return gpu_process_token_; | |
| 106 } | |
| 107 | |
| 108 IOSurfaceManagerToken BrowserIOSurfaceManager::GenerateChildProcessToken( | |
| 109 int child_process_id) { | |
| 110 base::AutoLock lock(lock_); | |
| 111 | |
| 112 IOSurfaceManagerToken token = IOSurfaceManagerToken::Generate(); | |
| 113 DCHECK(token.Verify()); | |
| 114 child_process_ids_[token] = child_process_id; | |
| 115 return token; | |
| 116 } | |
| 117 | |
| 118 void BrowserIOSurfaceManager::InvalidateChildProcessToken( | |
| 119 const IOSurfaceManagerToken& token) { | |
| 120 base::AutoLock lock(lock_); | |
| 121 | |
| 122 DCHECK(child_process_ids_.find(token) != child_process_ids_.end()); | |
| 123 child_process_ids_.erase(token); | |
| 124 } | |
| 125 | |
| 126 BrowserIOSurfaceManager::BrowserIOSurfaceManager() | |
| 127 : initialized_(false), | |
| 128 gpu_process_token_(IOSurfaceManagerToken::Generate()) { | |
| 129 DCHECK(gpu_process_token_.Verify()); | |
| 130 } | |
| 131 | |
| 132 BrowserIOSurfaceManager::~BrowserIOSurfaceManager() { | |
| 133 } | |
| 134 | |
| 135 bool BrowserIOSurfaceManager::Initialize() { | |
| 136 lock_.AssertAcquired(); | |
| 137 DCHECK(!server_port_.is_valid()); | |
| 138 | |
| 139 // Check in with launchd and publish the service name. | |
| 140 mach_port_t port; | |
| 141 kern_return_t kr = bootstrap_check_in( | |
| 142 bootstrap_port, GetMachPortName(getpid()).c_str(), &port); | |
| 143 if (kr != KERN_SUCCESS) { | |
| 144 BOOTSTRAP_LOG(ERROR, kr) << "bootstrap_check_in"; | |
| 145 return false; | |
| 146 } | |
| 147 server_port_.reset(port); | |
| 148 | |
| 149 // Start the dispatch source. | |
| 150 std::string queue_name = | |
| 151 base::StringPrintf("%s.IOSurfaceManager", base::mac::BaseBundleID()); | |
| 152 dispatch_source_.reset( | |
| 153 new base::DispatchSourceMach(queue_name.c_str(), server_port_.get(), ^{ | |
| 154 HandleRequest(); | |
| 155 })); | |
| 156 dispatch_source_->Resume(); | |
| 157 | |
| 158 return true; | |
| 159 } | |
| 160 | |
| 161 void BrowserIOSurfaceManager::HandleRequest() { | |
| 162 struct { | |
| 163 union { | |
| 164 mach_msg_header_t header; | |
| 165 IOSurfaceManagerHostMsg_RegisterIOSurface register_io_surface; | |
| 166 IOSurfaceManagerHostMsg_UnregisterIOSurface unregister_io_surface; | |
| 167 IOSurfaceManagerHostMsg_AcquireIOSurface acquire_io_surface; | |
| 168 } msg; | |
| 169 mach_msg_trailer_t trailer; | |
| 170 } request = {{{0}}}; | |
| 171 request.msg.header.msgh_size = sizeof(request); | |
| 172 request.msg.header.msgh_local_port = server_port_.get(); | |
| 173 | |
| 174 kern_return_t kr = | |
| 175 mach_msg(&request.msg.header, MACH_RCV_MSG, 0, sizeof(request), | |
| 176 server_port_, MACH_MSG_TIMEOUT_NONE, MACH_PORT_NULL); | |
| 177 if (kr != KERN_SUCCESS) { | |
| 178 MACH_LOG(ERROR, kr) << "mach_msg"; | |
| 179 return; | |
| 180 } | |
| 181 | |
| 182 union { | |
| 183 mach_msg_header_t header; | |
| 184 IOSurfaceManagerMsg_RegisterIOSurfaceReply register_io_surface; | |
| 185 IOSurfaceManagerMsg_AcquireIOSurfaceReply acquire_io_surface; | |
| 186 } reply = {{0}}; | |
| 187 | |
| 188 switch (request.msg.header.msgh_id) { | |
| 189 case IOSurfaceManagerHostMsg_RegisterIOSurface::ID: | |
| 190 if (!HandleRegisterIOSurfaceRequest(request.msg.register_io_surface, | |
| 191 &reply.register_io_surface)) { | |
| 192 return; | |
| 193 } | |
| 194 break; | |
| 195 case IOSurfaceManagerHostMsg_UnregisterIOSurface::ID: | |
| 196 HandleUnregisterIOSurfaceRequest(request.msg.unregister_io_surface); | |
| 197 // Unregister requests are asynchronous and do not require a reply as | |
| 198 // there is no guarantee for how quickly an IO surface is removed from | |
| 199 // the IOSurfaceManager instance after it has been deleted by a child | |
| 200 // process. | |
| 201 return; | |
| 202 case IOSurfaceManagerHostMsg_AcquireIOSurface::ID: | |
| 203 if (!HandleAcquireIOSurfaceRequest(request.msg.acquire_io_surface, | |
| 204 &reply.acquire_io_surface)) { | |
| 205 return; | |
| 206 } | |
| 207 break; | |
| 208 default: | |
| 209 LOG(ERROR) << "Unknown message received!"; | |
| 210 return; | |
| 211 } | |
| 212 | |
| 213 kr = mach_msg(&reply.header, MACH_SEND_MSG | MACH_SEND_TIMEOUT, | |
| 214 reply.header.msgh_size, 0, MACH_PORT_NULL, kSendReplyTimeoutMs, | |
| 215 MACH_PORT_NULL); | |
| 216 if (kr != KERN_SUCCESS) { | |
| 217 MACH_LOG(ERROR, kr) << "mach_msg"; | |
| 218 } | |
| 219 } | |
| 220 | |
| 221 bool BrowserIOSurfaceManager::HandleRegisterIOSurfaceRequest( | |
| 222 const IOSurfaceManagerHostMsg_RegisterIOSurface& request, | |
| 223 IOSurfaceManagerMsg_RegisterIOSurfaceReply* reply) { | |
| 224 base::AutoLock lock(lock_); | |
| 225 | |
| 226 IOSurfaceManagerToken token; | |
| 227 COMPILE_ASSERT(sizeof(request.token_name) == sizeof(token.name), | |
| 228 "Mach message token size doesn't match expectation."); | |
|
Avi (use Gerrit)
2015/06/03 21:31:53
COMPILE_ASSERT is just a wrapper around static_ass
reveman
2015/06/03 22:47:49
Done.
| |
| 229 token.SetName(request.token_name); | |
| 230 if (token != gpu_process_token_) { | |
| 231 LOG(ERROR) << "Illegal message from non-GPU process!"; | |
| 232 return false; | |
| 233 } | |
| 234 | |
| 235 IOSurfaceMapKey key(request.io_surface_id, request.client_id); | |
| 236 io_surfaces_.add(key, make_scoped_ptr(new base::mac::ScopedMachSendRight( | |
| 237 request.io_surface_port.name))); | |
| 238 | |
| 239 reply->header.msgh_bits = MACH_MSGH_BITS_REMOTE(request.header.msgh_bits); | |
| 240 reply->header.msgh_remote_port = request.header.msgh_remote_port; | |
| 241 reply->header.msgh_size = sizeof(*reply); | |
| 242 reply->result = true; | |
| 243 return true; | |
| 244 } | |
| 245 | |
| 246 bool BrowserIOSurfaceManager::HandleUnregisterIOSurfaceRequest( | |
| 247 const IOSurfaceManagerHostMsg_UnregisterIOSurface& request) { | |
| 248 base::AutoLock lock(lock_); | |
| 249 | |
| 250 IOSurfaceManagerToken token; | |
| 251 COMPILE_ASSERT(sizeof(request.token_name) == sizeof(token.name), | |
| 252 "Mach message token size doesn't match expectation."); | |
| 253 token.SetName(request.token_name); | |
| 254 if (token != gpu_process_token_) { | |
| 255 LOG(ERROR) << "Illegal message from non-GPU process!"; | |
| 256 return false; | |
| 257 } | |
| 258 | |
| 259 IOSurfaceMapKey key(request.io_surface_id, request.client_id); | |
| 260 io_surfaces_.erase(key); | |
| 261 return true; | |
| 262 } | |
| 263 | |
| 264 bool BrowserIOSurfaceManager::HandleAcquireIOSurfaceRequest( | |
| 265 const IOSurfaceManagerHostMsg_AcquireIOSurface& request, | |
| 266 IOSurfaceManagerMsg_AcquireIOSurfaceReply* reply) { | |
| 267 base::AutoLock lock(lock_); | |
| 268 | |
| 269 IOSurfaceManagerToken token; | |
| 270 COMPILE_ASSERT(sizeof(request.token_name) == sizeof(token.name), | |
| 271 "Mach message token size doesn't match expectation."); | |
| 272 token.SetName(request.token_name); | |
| 273 auto child_process_id_it = child_process_ids_.find(token); | |
| 274 if (child_process_id_it == child_process_ids_.end()) { | |
| 275 LOG(ERROR) << "Illegal message from non-child process!"; | |
| 276 return false; | |
| 277 } | |
| 278 | |
| 279 IOSurfaceMapKey key(request.io_surface_id, child_process_id_it->second); | |
| 280 auto it = io_surfaces_.find(key); | |
| 281 if (it == io_surfaces_.end()) { | |
| 282 LOG(ERROR) << "Invalid Id for IOSurface " << request.io_surface_id; | |
| 283 return false; | |
| 284 } | |
| 285 | |
| 286 reply->header.msgh_bits = | |
| 287 MACH_MSGH_BITS_REMOTE(request.header.msgh_bits) | MACH_MSGH_BITS_COMPLEX; | |
| 288 reply->header.msgh_remote_port = request.header.msgh_remote_port; | |
| 289 reply->header.msgh_size = sizeof(*reply); | |
| 290 reply->body.msgh_descriptor_count = 1; | |
| 291 reply->io_surface_port.name = it->second->get(); | |
| 292 reply->io_surface_port.disposition = MACH_MSG_TYPE_COPY_SEND; | |
| 293 reply->io_surface_port.type = MACH_MSG_PORT_DESCRIPTOR; | |
| 294 return true; | |
| 295 } | |
| 296 | |
| 297 } // namespace content | |
| OLD | NEW |