Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(310)

Side by Side Diff: mojo/shell/runner/host/child_process_host.cc

Issue 1877753003: Move mojo\shell to services\shell (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@62scan
Patch Set: . Created 4 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "mojo/shell/runner/host/child_process_host.h"
6
7 #include <stdint.h>
8
9 #include <utility>
10
11 #include "base/bind.h"
12 #include "base/command_line.h"
13 #include "base/location.h"
14 #include "base/logging.h"
15 #include "base/macros.h"
16 #include "base/message_loop/message_loop.h"
17 #include "base/process/kill.h"
18 #include "base/process/launch.h"
19 #include "base/synchronization/lock.h"
20 #include "base/task_runner.h"
21 #include "base/thread_task_runner_handle.h"
22 #include "mojo/edk/embedder/embedder.h"
23 #include "mojo/public/cpp/bindings/interface_ptr_info.h"
24 #include "mojo/public/cpp/system/core.h"
25 #include "mojo/shell/native_runner_delegate.h"
26 #include "mojo/shell/runner/common/client_util.h"
27 #include "mojo/shell/runner/common/switches.h"
28
29 #if defined(OS_LINUX) && !defined(OS_ANDROID)
30 #include "sandbox/linux/services/namespace_sandbox.h"
31 #endif
32
33 #if defined(OS_WIN)
34 #include "base/win/windows_version.h"
35 #endif
36
37 #if defined(OS_MACOSX)
38 #include "mojo/shell/runner/host/mach_broker.h"
39 #endif
40
41 namespace mojo {
42 namespace shell {
43
44 ChildProcessHost::ChildProcessHost(base::TaskRunner* launch_process_runner,
45 NativeRunnerDelegate* delegate,
46 bool start_sandboxed,
47 const Identity& target,
48 const base::FilePath& app_path)
49 : launch_process_runner_(launch_process_runner),
50 delegate_(delegate),
51 start_sandboxed_(start_sandboxed),
52 target_(target),
53 app_path_(app_path),
54 start_child_process_event_(false, false),
55 weak_factory_(this) {
56 }
57
58 ChildProcessHost::~ChildProcessHost() {
59 if (!app_path_.empty()) {
60 CHECK(!mojo_ipc_channel_)
61 << "Destroying ChildProcessHost before calling Join";
62 }
63 }
64
65 mojom::ShellClientPtr ChildProcessHost::Start(
66 const Identity& target,
67 const ProcessReadyCallback& callback,
68 const base::Closure& quit_closure) {
69 DCHECK(!child_process_.IsValid());
70
71 const base::CommandLine* parent_command_line =
72 base::CommandLine::ForCurrentProcess();
73 base::FilePath target_path = parent_command_line->GetProgram();
74 // |app_path_| can be empty in tests.
75 if (!app_path_.MatchesExtension(FILE_PATH_LITERAL(".mojo")) &&
76 !app_path_.empty()) {
77 target_path = app_path_;
78 }
79
80 scoped_ptr<base::CommandLine> child_command_line(
81 new base::CommandLine(target_path));
82
83 child_command_line->AppendArguments(*parent_command_line, false);
84
85 #ifndef NDEBUG
86 child_command_line->AppendSwitchASCII("n", target.name());
87 child_command_line->AppendSwitchASCII("u", target.user_id());
88 #endif
89
90 if (target_path != app_path_)
91 child_command_line->AppendSwitchPath(switches::kChildProcess, app_path_);
92
93 if (start_sandboxed_)
94 child_command_line->AppendSwitch(switches::kEnableSandbox);
95
96 mojo_ipc_channel_.reset(new edk::PlatformChannelPair);
97 mojo_ipc_channel_->PrepareToPassClientHandleToChildProcess(
98 child_command_line.get(), &handle_passing_info_);
99
100 mojom::ShellClientPtr client =
101 PassShellClientRequestOnCommandLine(child_command_line.get());
102 launch_process_runner_->PostTaskAndReply(
103 FROM_HERE,
104 base::Bind(&ChildProcessHost::DoLaunch, base::Unretained(this),
105 base::Passed(&child_command_line)),
106 base::Bind(&ChildProcessHost::DidStart,
107 weak_factory_.GetWeakPtr(), callback));
108 return client;
109 }
110
111 void ChildProcessHost::Join() {
112 if (mojo_ipc_channel_)
113 start_child_process_event_.Wait();
114 mojo_ipc_channel_.reset();
115 if (child_process_.IsValid()) {
116 int rv = -1;
117 LOG_IF(ERROR, !child_process_.WaitForExit(&rv))
118 << "Failed to wait for child process";
119 child_process_.Close();
120 }
121 }
122
123 void ChildProcessHost::DidStart(const ProcessReadyCallback& callback) {
124 if (child_process_.IsValid()) {
125 callback.Run(child_process_.Pid());
126 } else {
127 LOG(ERROR) << "Failed to start child process";
128 mojo_ipc_channel_.reset();
129 }
130 }
131
132 void ChildProcessHost::DoLaunch(
133 scoped_ptr<base::CommandLine> child_command_line) {
134 if (delegate_) {
135 delegate_->AdjustCommandLineArgumentsForTarget(target_,
136 child_command_line.get());
137 }
138
139 base::LaunchOptions options;
140 #if defined(OS_WIN)
141 options.handles_to_inherit = &handle_passing_info_;
142 #if defined(OFFICIAL_BUILD)
143 CHECK(false) << "Launching mojo process with inherit_handles is insecure!";
144 #endif
145 options.inherit_handles = true;
146 options.stdin_handle = INVALID_HANDLE_VALUE;
147 options.stdout_handle = GetStdHandle(STD_OUTPUT_HANDLE);
148 options.stderr_handle = GetStdHandle(STD_ERROR_HANDLE);
149 // Always inherit stdout/stderr as a pair.
150 if (!options.stdout_handle || !options.stdin_handle)
151 options.stdin_handle = options.stdout_handle = nullptr;
152
153 // Pseudo handles are used when stdout and stderr redirect to the console. In
154 // that case, they're automatically inherited by child processes. See
155 // https://msdn.microsoft.com/en-us/library/windows/desktop/ms682075.aspx
156 // Trying to add them to the list of handles to inherit causes CreateProcess
157 // to fail. When this process is launched from Python
158 // (i.e. by apptest_runner.py) then a real handle is used. In that case, we do
159 // want to add it to the list of handles that is inherited.
160 if (options.stdout_handle &&
161 GetFileType(options.stdout_handle) != FILE_TYPE_CHAR) {
162 handle_passing_info_.push_back(options.stdout_handle);
163 }
164 if (options.stderr_handle &&
165 GetFileType(options.stderr_handle) != FILE_TYPE_CHAR &&
166 options.stdout_handle != options.stderr_handle) {
167 handle_passing_info_.push_back(options.stderr_handle);
168 }
169 #elif defined(OS_POSIX)
170 handle_passing_info_.push_back(std::make_pair(STDIN_FILENO, STDIN_FILENO));
171 handle_passing_info_.push_back(std::make_pair(STDOUT_FILENO, STDOUT_FILENO));
172 handle_passing_info_.push_back(std::make_pair(STDERR_FILENO, STDERR_FILENO));
173 options.fds_to_remap = &handle_passing_info_;
174 #endif
175 DVLOG(2) << "Launching child with command line: "
176 << child_command_line->GetCommandLineString();
177 #if defined(OS_LINUX) && !defined(OS_ANDROID)
178 if (start_sandboxed_) {
179 child_process_ =
180 sandbox::NamespaceSandbox::LaunchProcess(*child_command_line, options);
181 if (!child_process_.IsValid()) {
182 LOG(ERROR) << "Starting the process with a sandbox failed. Missing kernel"
183 << " support.";
184 }
185 } else
186 #endif
187 {
188 #if defined(OS_MACOSX)
189 MachBroker* mach_broker = MachBroker::GetInstance();
190 base::AutoLock locker(mach_broker->GetLock());
191 #endif
192 LOG(WARNING) << "PATH: " << app_path_.value();
193 child_process_ = base::LaunchProcess(*child_command_line, options);
194 #if defined(OS_MACOSX)
195 mach_broker->ExpectPid(child_process_.Handle());
196 #endif
197 }
198
199 if (child_process_.IsValid()) {
200 if (mojo_ipc_channel_.get()) {
201 mojo_ipc_channel_->ChildProcessLaunched();
202 mojo::edk::ChildProcessLaunched(
203 child_process_.Handle(),
204 mojo::edk::ScopedPlatformHandle(mojo::edk::PlatformHandle(
205 mojo_ipc_channel_->PassServerHandle().release().handle)));
206 }
207 }
208 start_child_process_event_.Signal();
209 }
210
211 } // namespace shell
212 } // namespace mojo
OLDNEW
« no previous file with comments | « mojo/shell/runner/host/child_process_host.h ('k') | mojo/shell/runner/host/child_process_host_unittest.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698