| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 package org.chromium.content.browser; | |
| 6 | |
| 7 import android.content.Context; | |
| 8 import android.os.RemoteException; | |
| 9 import android.util.Log; | |
| 10 import android.view.Surface; | |
| 11 | |
| 12 import java.util.ArrayList; | |
| 13 import java.util.Map; | |
| 14 import java.util.concurrent.ConcurrentHashMap; | |
| 15 | |
| 16 import org.chromium.base.CalledByNative; | |
| 17 import org.chromium.base.JNINamespace; | |
| 18 import org.chromium.base.ThreadUtils; | |
| 19 import org.chromium.content.app.LibraryLoader; | |
| 20 import org.chromium.content.common.CommandLine; | |
| 21 import org.chromium.content.common.ISandboxedProcessCallback; | |
| 22 import org.chromium.content.common.ISandboxedProcessService; | |
| 23 | |
| 24 /** | |
| 25 * This class provides the method to start/stop SandboxedProcess called by | |
| 26 * native. | |
| 27 */ | |
| 28 @JNINamespace("content") | |
| 29 public class SandboxedProcessLauncher { | |
| 30 private static String TAG = "SandboxedProcessLauncher"; | |
| 31 | |
| 32 // The upper limit on the number of simultaneous service process instances s
upported. | |
| 33 // This must not exceed total number of SandboxedProcessServiceX classes dec
lared in | |
| 34 // this package, and defined as services in the embedding application's mani
fest file. | |
| 35 // (See {@link SandboxedProcessService} for more details on defining the ser
vices.) | |
| 36 /* package */ static final int MAX_REGISTERED_SERVICES = 6; | |
| 37 private static final SandboxedProcessConnection[] mConnections = | |
| 38 new SandboxedProcessConnection[MAX_REGISTERED_SERVICES]; | |
| 39 // The list of free slots in mConnections. When looking for a free connecti
on, | |
| 40 // the first index in that list should be used. When a connection is freed,
its index | |
| 41 // is added to the end of the list. This is so that we avoid immediately reu
sing a freed | |
| 42 // connection (see bug crbug.com/164069): the framework might keep a service
process alive | |
| 43 // when it's been unbound for a short time. If a connection to that same se
rvice is bound | |
| 44 // at that point, the process is reused and bad things happen (mostly static
variables are | |
| 45 // set when we don't expect them to). | |
| 46 // SHOULD BE ACCESSED WITH THE mConnections LOCK. | |
| 47 private static final ArrayList<Integer> mFreeConnectionIndices = | |
| 48 new ArrayList<Integer>(MAX_REGISTERED_SERVICES); | |
| 49 static { | |
| 50 for (int i = 0; i < MAX_REGISTERED_SERVICES; i++) { | |
| 51 mFreeConnectionIndices.add(i); | |
| 52 } | |
| 53 } | |
| 54 | |
| 55 private static SandboxedProcessConnection allocateConnection(Context context
) { | |
| 56 SandboxedProcessConnection.DeathCallback deathCallback = | |
| 57 new SandboxedProcessConnection.DeathCallback() { | |
| 58 @Override | |
| 59 public void onSandboxedProcessDied(int pid) { | |
| 60 stop(pid); | |
| 61 } | |
| 62 }; | |
| 63 synchronized (mConnections) { | |
| 64 if (mFreeConnectionIndices.isEmpty()) { | |
| 65 Log.w(TAG, "Ran out of sandboxed services."); | |
| 66 return null; | |
| 67 } | |
| 68 int slot = mFreeConnectionIndices.remove(0); | |
| 69 assert mConnections[slot] == null; | |
| 70 mConnections[slot] = new SandboxedProcessConnection(context, slot, d
eathCallback); | |
| 71 return mConnections[slot]; | |
| 72 } | |
| 73 } | |
| 74 | |
| 75 private static SandboxedProcessConnection allocateBoundConnection(Context co
ntext, | |
| 76 String[] commandLine) { | |
| 77 SandboxedProcessConnection connection = allocateConnection(context); | |
| 78 if (connection != null) { | |
| 79 String libraryName = LibraryLoader.getLibraryToLoad(); | |
| 80 assert libraryName != null : "Attempting to launch a sandbox process
without first " | |
| 81 + "calling LibraryLoader.setLibraryToLoad"; | |
| 82 connection.bind(libraryName, commandLine); | |
| 83 } | |
| 84 return connection; | |
| 85 } | |
| 86 | |
| 87 private static void freeConnection(SandboxedProcessConnection connection) { | |
| 88 if (connection == null) { | |
| 89 return; | |
| 90 } | |
| 91 int slot = connection.getServiceNumber(); | |
| 92 synchronized (mConnections) { | |
| 93 if (mConnections[slot] != connection) { | |
| 94 int occupier = mConnections[slot] == null ? | |
| 95 -1 : mConnections[slot].getServiceNumber(); | |
| 96 Log.e(TAG, "Unable to find connection to free in slot: " + slot
+ | |
| 97 " already occupied by service: " + occupier); | |
| 98 assert false; | |
| 99 } else { | |
| 100 mConnections[slot] = null; | |
| 101 assert !mFreeConnectionIndices.contains(slot); | |
| 102 mFreeConnectionIndices.add(slot); | |
| 103 } | |
| 104 } | |
| 105 } | |
| 106 | |
| 107 public static int getNumberOfConnections() { | |
| 108 synchronized (mConnections) { | |
| 109 return mFreeConnectionIndices.size(); | |
| 110 } | |
| 111 } | |
| 112 | |
| 113 // Represents an invalid process handle; same as base/process.h kNullProcess
Handle. | |
| 114 private static final int NULL_PROCESS_HANDLE = 0; | |
| 115 | |
| 116 // Map from pid to SandboxedService connection. | |
| 117 private static Map<Integer, SandboxedProcessConnection> mServiceMap = | |
| 118 new ConcurrentHashMap<Integer, SandboxedProcessConnection>(); | |
| 119 | |
| 120 // A pre-allocated and pre-bound connection ready for connection setup, or n
ull. | |
| 121 static SandboxedProcessConnection mSpareConnection = null; | |
| 122 | |
| 123 /** | |
| 124 * Returns the sandboxed process service interface for the given pid. This m
ay be called on | |
| 125 * any thread, but the caller must assume that the service can disconnect at
any time. All | |
| 126 * service calls should catch and handle android.os.RemoteException. | |
| 127 * | |
| 128 * @param pid The pid (process handle) of the service obtained from {@link #
start}. | |
| 129 * @return The ISandboxedProcessService or null if the service no longer exi
sts. | |
| 130 */ | |
| 131 public static ISandboxedProcessService getSandboxedService(int pid) { | |
| 132 SandboxedProcessConnection connection = mServiceMap.get(pid); | |
| 133 if (connection != null) { | |
| 134 return connection.getService(); | |
| 135 } | |
| 136 return null; | |
| 137 } | |
| 138 | |
| 139 /** | |
| 140 * Should be called early in startup so the work needed to spawn the sandbox
ed process can | |
| 141 * be done in parallel to other startup work. Must not be called on the UI t
hread. | |
| 142 * @param context the application context used for the connection. | |
| 143 */ | |
| 144 public static synchronized void warmUp(Context context) { | |
| 145 assert !ThreadUtils.runningOnUiThread(); | |
| 146 if (mSpareConnection == null) { | |
| 147 mSpareConnection = allocateBoundConnection(context, null); | |
| 148 } | |
| 149 } | |
| 150 | |
| 151 /** | |
| 152 * Spawns and connects to a sandboxed process. May be called on any thread.
It will not | |
| 153 * block, but will instead callback to {@link #nativeOnSandboxedProcessStart
ed} when the | |
| 154 * connection is established. Note this callback will not necessarily be fro
m the same thread | |
| 155 * (currently it always comes from the main thread). | |
| 156 * | |
| 157 * @param context Context used to obtain the application context. | |
| 158 * @param commandLine The sandboxed process command line argv. | |
| 159 * @param file_ids The ID that should be used when mapping files in the crea
ted process. | |
| 160 * @param file_fds The file descriptors that should be mapped in the created
process. | |
| 161 * @param file_auto_close Whether the file descriptors should be closed once
they were passed to | |
| 162 * the created process. | |
| 163 * @param clientContext Arbitrary parameter used by the client to distinguis
h this connection. | |
| 164 */ | |
| 165 @CalledByNative | |
| 166 static void start( | |
| 167 Context context, | |
| 168 final String[] commandLine, | |
| 169 int[] fileIds, | |
| 170 int[] fileFds, | |
| 171 boolean[] fileAutoClose, | |
| 172 final int clientContext) { | |
| 173 assert fileIds.length == fileFds.length && fileFds.length == fileAutoClo
se.length; | |
| 174 FileDescriptorInfo[] filesToBeMapped = new FileDescriptorInfo[fileFds.le
ngth]; | |
| 175 for (int i = 0; i < fileFds.length; i++) { | |
| 176 filesToBeMapped[i] = | |
| 177 new FileDescriptorInfo(fileIds[i], fileFds[i], fileAutoClose
[i]); | |
| 178 } | |
| 179 assert clientContext != 0; | |
| 180 SandboxedProcessConnection allocatedConnection; | |
| 181 synchronized (SandboxedProcessLauncher.class) { | |
| 182 allocatedConnection = mSpareConnection; | |
| 183 mSpareConnection = null; | |
| 184 } | |
| 185 if (allocatedConnection == null) { | |
| 186 allocatedConnection = allocateBoundConnection(context, commandLine); | |
| 187 if (allocatedConnection == null) { | |
| 188 // Notify the native code so it can free the heap allocated call
back. | |
| 189 nativeOnSandboxedProcessStarted(clientContext, 0); | |
| 190 return; | |
| 191 } | |
| 192 } | |
| 193 final SandboxedProcessConnection connection = allocatedConnection; | |
| 194 Log.d(TAG, "Setting up connection to process: slot=" + connection.getSer
viceNumber()); | |
| 195 // Note: This runnable will be executed when the sandboxed connection is
setup. | |
| 196 final Runnable onConnect = new Runnable() { | |
| 197 @Override | |
| 198 public void run() { | |
| 199 final int pid = connection.getPid(); | |
| 200 Log.d(TAG, "on connect callback, pid=" + pid + " context=" + cli
entContext); | |
| 201 if (pid != NULL_PROCESS_HANDLE) { | |
| 202 mServiceMap.put(pid, connection); | |
| 203 } else { | |
| 204 freeConnection(connection); | |
| 205 } | |
| 206 nativeOnSandboxedProcessStarted(clientContext, pid); | |
| 207 } | |
| 208 }; | |
| 209 connection.setupConnection(commandLine, filesToBeMapped, createCallback(
), onConnect); | |
| 210 } | |
| 211 | |
| 212 /** | |
| 213 * Terminates a sandboxed process. This may be called from any thread. | |
| 214 * | |
| 215 * @param pid The pid (process handle) of the service connection obtained fr
om {@link #start}. | |
| 216 */ | |
| 217 @CalledByNative | |
| 218 static void stop(int pid) { | |
| 219 Log.d(TAG, "stopping sandboxed connection: pid=" + pid); | |
| 220 | |
| 221 SandboxedProcessConnection connection = mServiceMap.remove(pid); | |
| 222 if (connection == null) { | |
| 223 Log.w(TAG, "Tried to stop non-existent connection to pid: " + pid); | |
| 224 return; | |
| 225 } | |
| 226 connection.unbind(); | |
| 227 freeConnection(connection); | |
| 228 } | |
| 229 | |
| 230 /** | |
| 231 * Bind a sandboxed process as a high priority process so that it has the sa
me | |
| 232 * priority as the main process. This can be used for the foreground rendere
r | |
| 233 * process to distinguish it from the the background renderer process. | |
| 234 * | |
| 235 * @param pid The process handle of the service connection obtained from {@l
ink #start}. | |
| 236 */ | |
| 237 static void bindAsHighPriority(int pid) { | |
| 238 SandboxedProcessConnection connection = mServiceMap.get(pid); | |
| 239 if (connection == null) { | |
| 240 Log.w(TAG, "Tried to bind a non-existent connection to pid: " + pid)
; | |
| 241 return; | |
| 242 } | |
| 243 connection.bindHighPriority(); | |
| 244 } | |
| 245 | |
| 246 /** | |
| 247 * Unbind a high priority process which is bound by {@link #bindAsHighPriori
ty}. | |
| 248 * | |
| 249 * @param pid The process handle of the service obtained from {@link #start}
. | |
| 250 */ | |
| 251 static void unbindAsHighPriority(int pid) { | |
| 252 SandboxedProcessConnection connection = mServiceMap.get(pid); | |
| 253 if (connection == null) { | |
| 254 Log.w(TAG, "Tried to unbind non-existent connection to pid: " + pid)
; | |
| 255 return; | |
| 256 } | |
| 257 connection.unbindHighPriority(false); | |
| 258 } | |
| 259 | |
| 260 /** | |
| 261 * This implementation is used to receive callbacks from the remote service. | |
| 262 */ | |
| 263 private static ISandboxedProcessCallback createCallback() { | |
| 264 return new ISandboxedProcessCallback.Stub() { | |
| 265 /** | |
| 266 * This is called by the remote service regularly to tell us about | |
| 267 * new values. Note that IPC calls are dispatched through a thread | |
| 268 * pool running in each process, so the code executing here will | |
| 269 * NOT be running in our main thread -- so, to update the UI, we nee
d | |
| 270 * to use a Handler. | |
| 271 */ | |
| 272 public void establishSurfacePeer( | |
| 273 int pid, Surface surface, int primaryID, int secondaryID) { | |
| 274 // TODO(sievers): This should call into native and pass the Surf
ace to the | |
| 275 // right media player instance. | |
| 276 } | |
| 277 }; | |
| 278 }; | |
| 279 | |
| 280 private static native void nativeOnSandboxedProcessStarted(int clientContext
, int pid); | |
| 281 } | |
| OLD | NEW |