1// Copyright (c) 2012 The Chromium Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
5// Represents the browser side of the browser <--> renderer communication
6// channel. There will be one RenderProcessHost per renderer process.
7
8#include "content/browser/renderer_host/render_process_host_impl.h"
9
10#include <algorithm>
11#include <limits>
12#include <vector>
13
14#if defined(OS_POSIX)
15#include <utility>  // for pair<>
16#endif
17
18#include "base/base_switches.h"
19#include "base/bind.h"
20#include "base/bind_helpers.h"
21#include "base/callback.h"
22#include "base/command_line.h"
23#include "base/debug/trace_event.h"
24#include "base/files/file.h"
25#include "base/lazy_instance.h"
26#include "base/logging.h"
27#include "base/metrics/field_trial.h"
28#include "base/metrics/histogram.h"
29#include "base/numerics/safe_math.h"
30#include "base/path_service.h"
31#include "base/rand_util.h"
32#include "base/stl_util.h"
33#include "base/strings/string_number_conversions.h"
34#include "base/strings/string_util.h"
35#include "base/supports_user_data.h"
36#include "base/sys_info.h"
37#include "base/threading/thread.h"
38#include "base/threading/thread_restrictions.h"
39#include "base/tracked_objects.h"
40#include "cc/base/switches.h"
41#include "content/browser/appcache/appcache_dispatcher_host.h"
42#include "content/browser/appcache/chrome_appcache_service.h"
43#include "content/browser/battery_status/battery_status_message_filter.h"
44#include "content/browser/browser_child_process_host_impl.h"
45#include "content/browser/browser_main.h"
46#include "content/browser/browser_main_loop.h"
47#include "content/browser/browser_plugin/browser_plugin_message_filter.h"
48#include "content/browser/child_process_security_policy_impl.h"
49#include "content/browser/device_sensors/device_motion_message_filter.h"
50#include "content/browser/device_sensors/device_orientation_message_filter.h"
51#include "content/browser/dom_storage/dom_storage_context_wrapper.h"
52#include "content/browser/dom_storage/dom_storage_message_filter.h"
53#include "content/browser/download/mhtml_generation_manager.h"
54#include "content/browser/fileapi/chrome_blob_storage_context.h"
55#include "content/browser/fileapi/fileapi_message_filter.h"
56#include "content/browser/frame_host/render_frame_message_filter.h"
57#include "content/browser/gpu/compositor_util.h"
58#include "content/browser/gpu/gpu_data_manager_impl.h"
59#include "content/browser/gpu/gpu_process_host.h"
60#include "content/browser/gpu/shader_disk_cache.h"
61#include "content/browser/histogram_message_filter.h"
62#include "content/browser/indexed_db/indexed_db_context_impl.h"
63#include "content/browser/indexed_db/indexed_db_dispatcher_host.h"
64#include "content/browser/loader/resource_message_filter.h"
65#include "content/browser/loader/resource_scheduler_filter.h"
66#include "content/browser/media/capture/audio_mirroring_manager.h"
67#include "content/browser/media/media_internals.h"
68#include "content/browser/media/midi_host.h"
69#include "content/browser/message_port_message_filter.h"
70#include "content/browser/mime_registry_message_filter.h"
71#include "content/browser/mojo/mojo_application_host.h"
72#include "content/browser/plugin_service_impl.h"
73#include "content/browser/profiler_message_filter.h"
74#include "content/browser/push_messaging_message_filter.h"
75#include "content/browser/quota_dispatcher_host.h"
76#include "content/browser/renderer_host/clipboard_message_filter.h"
77#include "content/browser/renderer_host/database_message_filter.h"
78#include "content/browser/renderer_host/file_utilities_message_filter.h"
79#include "content/browser/renderer_host/gamepad_browser_message_filter.h"
80#include "content/browser/renderer_host/gpu_message_filter.h"
81#include "content/browser/renderer_host/media/audio_input_renderer_host.h"
82#include "content/browser/renderer_host/media/audio_renderer_host.h"
83#include "content/browser/renderer_host/media/device_request_message_filter.h"
84#include "content/browser/renderer_host/media/media_stream_dispatcher_host.h"
85#include "content/browser/renderer_host/media/peer_connection_tracker_host.h"
86#include "content/browser/renderer_host/media/video_capture_host.h"
87#include "content/browser/renderer_host/memory_benchmark_message_filter.h"
88#include "content/browser/renderer_host/p2p/socket_dispatcher_host.h"
89#include "content/browser/renderer_host/pepper/pepper_message_filter.h"
90#include "content/browser/renderer_host/pepper/pepper_renderer_connection.h"
91#include "content/browser/renderer_host/render_message_filter.h"
92#include "content/browser/renderer_host/render_view_host_delegate.h"
93#include "content/browser/renderer_host/render_view_host_impl.h"
94#include "content/browser/renderer_host/render_widget_helper.h"
95#include "content/browser/renderer_host/render_widget_host_impl.h"
96#include "content/browser/renderer_host/socket_stream_dispatcher_host.h"
97#include "content/browser/renderer_host/text_input_client_message_filter.h"
98#include "content/browser/renderer_host/websocket_dispatcher_host.h"
99#include "content/browser/resolve_proxy_msg_helper.h"
100#include "content/browser/service_worker/service_worker_context_wrapper.h"
101#include "content/browser/service_worker/service_worker_dispatcher_host.h"
102#include "content/browser/shared_worker/shared_worker_message_filter.h"
103#include "content/browser/speech/speech_recognition_dispatcher_host.h"
104#include "content/browser/storage_partition_impl.h"
105#include "content/browser/streams/stream_context.h"
106#include "content/browser/tracing/trace_message_filter.h"
107#include "content/browser/vibration/vibration_message_filter.h"
108#include "content/browser/webui/web_ui_controller_factory_registry.h"
109#include "content/browser/worker_host/worker_message_filter.h"
110#include "content/browser/worker_host/worker_storage_partition.h"
111#include "content/common/child_process_host_impl.h"
112#include "content/common/child_process_messages.h"
113#include "content/common/content_switches_internal.h"
114#include "content/common/gpu/client/gpu_memory_buffer_impl.h"
115#include "content/common/gpu/client/gpu_memory_buffer_impl_shm.h"
116#include "content/common/gpu/gpu_messages.h"
117#include "content/common/mojo/mojo_messages.h"
118#include "content/common/resource_messages.h"
119#include "content/common/view_messages.h"
120#include "content/public/browser/browser_context.h"
121#include "content/public/browser/content_browser_client.h"
122#include "content/public/browser/notification_service.h"
123#include "content/public/browser/notification_types.h"
124#include "content/public/browser/render_process_host_factory.h"
125#include "content/public/browser/render_process_host_observer.h"
126#include "content/public/browser/render_widget_host.h"
127#include "content/public/browser/render_widget_host_iterator.h"
128#include "content/public/browser/render_widget_host_view_frame_subscriber.h"
129#include "content/public/browser/resource_context.h"
130#include "content/public/browser/user_metrics.h"
131#include "content/public/browser/worker_service.h"
132#include "content/public/common/content_constants.h"
133#include "content/public/common/content_switches.h"
134#include "content/public/common/process_type.h"
135#include "content/public/common/result_codes.h"
136#include "content/public/common/sandboxed_process_launcher_delegate.h"
137#include "content/public/common/url_constants.h"
138#include "gpu/command_buffer/service/gpu_switches.h"
139#include "ipc/ipc_channel.h"
140#include "ipc/ipc_logging.h"
141#include "ipc/ipc_switches.h"
142#include "media/base/media_switches.h"
143#include "mojo/common/common_type_converters.h"
144#include "net/url_request/url_request_context_getter.h"
145#include "ppapi/shared_impl/ppapi_switches.h"
146#include "third_party/skia/include/core/SkBitmap.h"
147#include "ui/base/ui_base_switches.h"
148#include "ui/events/event_switches.h"
149#include "ui/gfx/switches.h"
150#include "ui/gl/gl_switches.h"
151#include "ui/native_theme/native_theme_switches.h"
152#include "webkit/browser/fileapi/sandbox_file_system_backend.h"
153#include "webkit/common/resource_type.h"
154
155#if defined(OS_ANDROID)
156#include "content/browser/media/android/browser_demuxer_android.h"
157#include "content/browser/renderer_host/compositor_impl_android.h"
158#include "content/common/gpu/client/gpu_memory_buffer_impl_surface_texture.h"
159#endif
160
161#if defined(OS_MACOSX)
162#include "content/common/gpu/client/gpu_memory_buffer_impl_io_surface.h"
163#endif
164
165#if defined(OS_WIN)
166#include "base/strings/string_number_conversions.h"
167#include "base/win/scoped_com_initializer.h"
168#include "content/common/font_cache_dispatcher_win.h"
169#include "content/common/sandbox_win.h"
170#include "ui/gfx/win/dpi.h"
171#endif
172
173#if defined(OS_MACOSX)
174#include "content/public/common/sandbox_type_mac.h"
175#endif
176
177#if defined(ENABLE_WEBRTC)
178#include "content/browser/media/webrtc_internals.h"
179#include "content/browser/renderer_host/media/media_stream_track_metrics_host.h"
180#include "content/browser/renderer_host/media/webrtc_identity_service_host.h"
181#include "content/common/media/aec_dump_messages.h"
182#include "content/common/media/media_stream_messages.h"
183#endif
184
185extern bool g_exited_main_message_loop;
186
187static const char* kSiteProcessMapKeyName = "content_site_process_map";
188
189namespace content {
190namespace {
191
192void CacheShaderInfo(int32 id, base::FilePath path) {
193  ShaderCacheFactory::GetInstance()->SetCacheInfo(id, path);
194}
195
196void RemoveShaderInfo(int32 id) {
197  ShaderCacheFactory::GetInstance()->RemoveCacheInfo(id);
198}
199
200net::URLRequestContext* GetRequestContext(
201    scoped_refptr<net::URLRequestContextGetter> request_context,
202    scoped_refptr<net::URLRequestContextGetter> media_request_context,
203    ResourceType::Type resource_type) {
204  // If the request has resource type of ResourceType::MEDIA, we use a request
205  // context specific to media for handling it because these resources have
206  // specific needs for caching.
207  if (resource_type == ResourceType::MEDIA)
208    return media_request_context->GetURLRequestContext();
209  return request_context->GetURLRequestContext();
210}
211
212void GetContexts(
213    ResourceContext* resource_context,
214    scoped_refptr<net::URLRequestContextGetter> request_context,
215    scoped_refptr<net::URLRequestContextGetter> media_request_context,
216    const ResourceHostMsg_Request& request,
217    ResourceContext** resource_context_out,
218    net::URLRequestContext** request_context_out) {
219  *resource_context_out = resource_context;
220  *request_context_out =
221      GetRequestContext(request_context, media_request_context,
222                        request.resource_type);
223}
224
225#if defined(ENABLE_WEBRTC)
226// Creates a file used for diagnostic echo canceller recordings for handing
227// over to the renderer.
228IPC::PlatformFileForTransit CreateAecDumpFileForProcess(
229    base::FilePath file_path,
230    base::ProcessHandle process) {
231  DCHECK_CURRENTLY_ON(BrowserThread::FILE);
232  base::File dump_file(file_path,
233                       base::File::FLAG_OPEN_ALWAYS | base::File::FLAG_APPEND);
234  if (!dump_file.IsValid()) {
235    VLOG(1) << "Could not open AEC dump file, error=" <<
236               dump_file.error_details();
237    return IPC::InvalidPlatformFileForTransit();
238  }
239  return IPC::TakeFileHandleForProcess(dump_file.Pass(), process);
240}
241
242// Does nothing. Just to avoid races between enable and disable.
243void DisableAecDumpOnFileThread() {
244  DCHECK_CURRENTLY_ON(BrowserThread::FILE);
245}
246#endif
247
248// the global list of all renderer processes
249base::LazyInstance<IDMap<RenderProcessHost> >::Leaky
250    g_all_hosts = LAZY_INSTANCE_INITIALIZER;
251
252// Map of site to process, to ensure we only have one RenderProcessHost per
253// site in process-per-site mode.  Each map is specific to a BrowserContext.
254class SiteProcessMap : public base::SupportsUserData::Data {
255 public:
256  typedef base::hash_map<std::string, RenderProcessHost*> SiteToProcessMap;
257  SiteProcessMap() {}
258
259  void RegisterProcess(const std::string& site, RenderProcessHost* process) {
260    map_[site] = process;
261  }
262
263  RenderProcessHost* FindProcess(const std::string& site) {
264    SiteToProcessMap::iterator i = map_.find(site);
265    if (i != map_.end())
266      return i->second;
267    return NULL;
268  }
269
270  void RemoveProcess(RenderProcessHost* host) {
271    // Find all instances of this process in the map, then separately remove
272    // them.
273    std::set<std::string> sites;
274    for (SiteToProcessMap::const_iterator i = map_.begin();
275         i != map_.end();
276         i++) {
277      if (i->second == host)
278        sites.insert(i->first);
279    }
280    for (std::set<std::string>::iterator i = sites.begin();
281         i != sites.end();
282         i++) {
283      SiteToProcessMap::iterator iter = map_.find(*i);
284      if (iter != map_.end()) {
285        DCHECK_EQ(iter->second, host);
286        map_.erase(iter);
287      }
288    }
289  }
290
291 private:
292  SiteToProcessMap map_;
293};
294
295// Find the SiteProcessMap specific to the given context.
296SiteProcessMap* GetSiteProcessMapForBrowserContext(BrowserContext* context) {
297  DCHECK(context);
298  SiteProcessMap* map = static_cast<SiteProcessMap*>(
299      context->GetUserData(kSiteProcessMapKeyName));
300  if (!map) {
301    map = new SiteProcessMap();
302    context->SetUserData(kSiteProcessMapKeyName, map);
303  }
304  return map;
305}
306
307// NOTE: changes to this class need to be reviewed by the security team.
308class RendererSandboxedProcessLauncherDelegate
309    : public content::SandboxedProcessLauncherDelegate {
310 public:
311  RendererSandboxedProcessLauncherDelegate(IPC::ChannelProxy* channel)
312#if defined(OS_POSIX)
313       : ipc_fd_(channel->TakeClientFileDescriptor())
314#endif  // OS_POSIX
315  {}
316
317  virtual ~RendererSandboxedProcessLauncherDelegate() {}
318
319#if defined(OS_WIN)
320  virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
321                              bool* success) {
322    AddBaseHandleClosePolicy(policy);
323    GetContentClient()->browser()->PreSpawnRenderer(policy, success);
324  }
325
326#elif defined(OS_POSIX)
327  virtual bool ShouldUseZygote() OVERRIDE {
328    const CommandLine& browser_command_line = *CommandLine::ForCurrentProcess();
329    CommandLine::StringType renderer_prefix =
330        browser_command_line.GetSwitchValueNative(switches::kRendererCmdPrefix);
331    return renderer_prefix.empty();
332  }
333  virtual int GetIpcFd() OVERRIDE {
334    return ipc_fd_;
335  }
336#if defined(OS_MACOSX)
337  virtual SandboxType GetSandboxType() OVERRIDE {
338    return SANDBOX_TYPE_RENDERER;
339  }
340#endif
341#endif  // OS_WIN
342
343 private:
344#if defined(OS_POSIX)
345  int ipc_fd_;
346#endif  // OS_POSIX
347};
348
349#if defined(OS_MACOSX)
350void AddBooleanValue(CFMutableDictionaryRef dictionary,
351                     const CFStringRef key,
352                     bool value) {
353  CFDictionaryAddValue(
354      dictionary, key, value ? kCFBooleanTrue : kCFBooleanFalse);
355}
356
357void AddIntegerValue(CFMutableDictionaryRef dictionary,
358                     const CFStringRef key,
359                     int32 value) {
360  base::ScopedCFTypeRef<CFNumberRef> number(
361      CFNumberCreate(NULL, kCFNumberSInt32Type, &value));
362  CFDictionaryAddValue(dictionary, key, number.get());
363}
364#endif
365
366const char kSessionStorageHolderKey[] = "kSessionStorageHolderKey";
367
368class SessionStorageHolder : public base::SupportsUserData::Data {
369 public:
370  SessionStorageHolder() {}
371  virtual ~SessionStorageHolder() {}
372
373  void Hold(const SessionStorageNamespaceMap& sessions, int view_route_id) {
374    session_storage_namespaces_awaiting_close_[view_route_id] = sessions;
375  }
376
377  void Release(int old_route_id) {
378    session_storage_namespaces_awaiting_close_.erase(old_route_id);
379  }
380
381 private:
382  std::map<int, SessionStorageNamespaceMap >
383      session_storage_namespaces_awaiting_close_;
384  DISALLOW_COPY_AND_ASSIGN(SessionStorageHolder);
385};
386
387}  // namespace
388
389RendererMainThreadFactoryFunction g_renderer_main_thread_factory = NULL;
390
391base::MessageLoop* g_in_process_thread;
392
393base::MessageLoop*
394    RenderProcessHostImpl::GetInProcessRendererThreadForTesting() {
395  return g_in_process_thread;
396}
397
398// Stores the maximum number of renderer processes the content module can
399// create.
400static size_t g_max_renderer_count_override = 0;
401
402// static
403size_t RenderProcessHost::GetMaxRendererProcessCount() {
404  if (g_max_renderer_count_override)
405    return g_max_renderer_count_override;
406
407  // Defines the maximum number of renderer processes according to the
408  // amount of installed memory as reported by the OS. The calculation
409  // assumes that you want the renderers to use half of the installed
410  // RAM and assuming that each WebContents uses ~40MB.
411  // If you modify this assumption, you need to adjust the
412  // ThirtyFourTabs test to match the expected number of processes.
413  //
414  // With the given amounts of installed memory below on a 32-bit CPU,
415  // the maximum renderer count will roughly be as follows:
416  //
417  //   128 MB -> 3
418  //   512 MB -> 6
419  //  1024 MB -> 12
420  //  4096 MB -> 51
421  // 16384 MB -> 82 (kMaxRendererProcessCount)
422
423  static size_t max_count = 0;
424  if (!max_count) {
425    const size_t kEstimatedWebContentsMemoryUsage =
426#if defined(ARCH_CPU_64_BITS)
427        60;  // In MB
428#else
429        40;  // In MB
430#endif
431    max_count = base::SysInfo::AmountOfPhysicalMemoryMB() / 2;
432    max_count /= kEstimatedWebContentsMemoryUsage;
433
434    const size_t kMinRendererProcessCount = 3;
435    max_count = std::max(max_count, kMinRendererProcessCount);
436    max_count = std::min(max_count, kMaxRendererProcessCount);
437  }
438  return max_count;
439}
440
441// static
442bool g_run_renderer_in_process_ = false;
443
444// static
445void RenderProcessHost::SetMaxRendererProcessCount(size_t count) {
446  g_max_renderer_count_override = count;
447}
448
449RenderProcessHostImpl::RenderProcessHostImpl(
450    BrowserContext* browser_context,
451    StoragePartitionImpl* storage_partition_impl,
452    bool is_isolated_guest)
453    : fast_shutdown_started_(false),
454      deleting_soon_(false),
455#ifndef NDEBUG
456      is_self_deleted_(false),
457#endif
458      pending_views_(0),
459      mojo_activation_required_(false),
460      visible_widgets_(0),
461      backgrounded_(true),
462      is_initialized_(false),
463      id_(ChildProcessHostImpl::GenerateChildProcessUniqueId()),
464      browser_context_(browser_context),
465      storage_partition_impl_(storage_partition_impl),
466      sudden_termination_allowed_(true),
467      ignore_input_events_(false),
468      is_isolated_guest_(is_isolated_guest),
469      gpu_observer_registered_(false),
470      delayed_cleanup_needed_(false),
471      within_process_died_observer_(false),
472      power_monitor_broadcaster_(this),
473      worker_ref_count_(0),
474      weak_factory_(this) {
475  widget_helper_ = new RenderWidgetHelper();
476
477  ChildProcessSecurityPolicyImpl::GetInstance()->Add(GetID());
478
479  CHECK(!g_exited_main_message_loop);
480  RegisterHost(GetID(), this);
481  g_all_hosts.Get().set_check_on_null_data(true);
482  // Initialize |child_process_activity_time_| to a reasonable value.
483  mark_child_process_activity_time();
484
485  if (!GetBrowserContext()->IsOffTheRecord() &&
486      !CommandLine::ForCurrentProcess()->HasSwitch(
487          switches::kDisableGpuShaderDiskCache)) {
488    BrowserThread::PostTask(BrowserThread::IO, FROM_HERE,
489                            base::Bind(&CacheShaderInfo, GetID(),
490                                       storage_partition_impl_->GetPath()));
491  }
492
493  // Note: When we create the RenderProcessHostImpl, it's technically
494  //       backgrounded, because it has no visible listeners.  But the process
495  //       doesn't actually exist yet, so we'll Background it later, after
496  //       creation.
497}
498
499// static
500void RenderProcessHostImpl::ShutDownInProcessRenderer() {
501  DCHECK(g_run_renderer_in_process_);
502
503  switch (g_all_hosts.Pointer()->size()) {
504    case 0:
505      return;
506    case 1: {
507      RenderProcessHostImpl* host = static_cast<RenderProcessHostImpl*>(
508          AllHostsIterator().GetCurrentValue());
509      FOR_EACH_OBSERVER(RenderProcessHostObserver,
510                        host->observers_,
511                        RenderProcessHostDestroyed(host));
512#ifndef NDEBUG
513      host->is_self_deleted_ = true;
514#endif
515      delete host;
516      return;
517    }
518    default:
519      NOTREACHED() << "There should be only one RenderProcessHost when running "
520                   << "in-process.";
521  }
522}
523
524void RenderProcessHostImpl::RegisterRendererMainThreadFactory(
525    RendererMainThreadFactoryFunction create) {
526  g_renderer_main_thread_factory = create;
527}
528
529RenderProcessHostImpl::~RenderProcessHostImpl() {
530#ifndef NDEBUG
531  DCHECK(is_self_deleted_)
532      << "RenderProcessHostImpl is destroyed by something other than itself";
533#endif
534
535  // Make sure to clean up the in-process renderer before the channel, otherwise
536  // it may still run and have its IPCs fail, causing asserts.
537  in_process_renderer_.reset();
538
539  ChildProcessSecurityPolicyImpl::GetInstance()->Remove(GetID());
540
541  if (gpu_observer_registered_) {
542    GpuDataManagerImpl::GetInstance()->RemoveObserver(this);
543    gpu_observer_registered_ = false;
544  }
545
546  // We may have some unsent messages at this point, but that's OK.
547  channel_.reset();
548  while (!queued_messages_.empty()) {
549    delete queued_messages_.front();
550    queued_messages_.pop();
551  }
552
553  UnregisterHost(GetID());
554
555  if (!CommandLine::ForCurrentProcess()->HasSwitch(
556      switches::kDisableGpuShaderDiskCache)) {
557    BrowserThread::PostTask(BrowserThread::IO, FROM_HERE,
558                            base::Bind(&RemoveShaderInfo, GetID()));
559  }
560
561#if defined(OS_ANDROID)
562  CompositorImpl::DestroyAllSurfaceTextures(GetID());
563#endif
564}
565
566void RenderProcessHostImpl::EnableSendQueue() {
567  is_initialized_ = false;
568}
569
570bool RenderProcessHostImpl::Init() {
571  // calling Init() more than once does nothing, this makes it more convenient
572  // for the view host which may not be sure in some cases
573  if (channel_)
574    return true;
575
576  CommandLine::StringType renderer_prefix;
577#if defined(OS_POSIX)
578  // A command prefix is something prepended to the command line of the spawned
579  // process. It is supported only on POSIX systems.
580  const CommandLine& browser_command_line = *CommandLine::ForCurrentProcess();
581  renderer_prefix =
582      browser_command_line.GetSwitchValueNative(switches::kRendererCmdPrefix);
583#endif  // defined(OS_POSIX)
584
585#if defined(OS_LINUX)
586  int flags = renderer_prefix.empty() ? ChildProcessHost::CHILD_ALLOW_SELF :
587                                        ChildProcessHost::CHILD_NORMAL;
588#else
589  int flags = ChildProcessHost::CHILD_NORMAL;
590#endif
591
592  // Find the renderer before creating the channel so if this fails early we
593  // return without creating the channel.
594  base::FilePath renderer_path = ChildProcessHost::GetChildPath(flags);
595  if (renderer_path.empty())
596    return false;
597
598  // Setup the IPC channel.
599  const std::string channel_id =
600      IPC::Channel::GenerateVerifiedChannelID(std::string());
601  channel_ = IPC::ChannelProxy::Create(
602      channel_id,
603      IPC::Channel::MODE_SERVER,
604      this,
605      BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO).get());
606
607  // Setup the Mojo channel.
608  mojo_application_host_.reset(new MojoApplicationHost());
609  mojo_application_host_->Init();
610
611  // Call the embedder first so that their IPC filters have priority.
612  GetContentClient()->browser()->RenderProcessWillLaunch(this);
613
614  CreateMessageFilters();
615
616  if (run_renderer_in_process()) {
617    DCHECK(g_renderer_main_thread_factory);
618    // Crank up a thread and run the initialization there.  With the way that
619    // messages flow between the browser and renderer, this thread is required
620    // to prevent a deadlock in single-process mode.  Since the primordial
621    // thread in the renderer process runs the WebKit code and can sometimes
622    // make blocking calls to the UI thread (i.e. this thread), they need to run
623    // on separate threads.
624    in_process_renderer_.reset(g_renderer_main_thread_factory(channel_id));
625
626    base::Thread::Options options;
627#if defined(OS_WIN) && !defined(OS_MACOSX)
628    // In-process plugins require this to be a UI message loop.
629    options.message_loop_type = base::MessageLoop::TYPE_UI;
630#else
631    // We can't have multiple UI loops on Linux and Android, so we don't support
632    // in-process plugins.
633    options.message_loop_type = base::MessageLoop::TYPE_DEFAULT;
634#endif
635    in_process_renderer_->StartWithOptions(options);
636
637    g_in_process_thread = in_process_renderer_->message_loop();
638
639    OnProcessLaunched();  // Fake a callback that the process is ready.
640  } else {
641    // Build command line for renderer.  We call AppendRendererCommandLine()
642    // first so the process type argument will appear first.
643    CommandLine* cmd_line = new CommandLine(renderer_path);
644    if (!renderer_prefix.empty())
645      cmd_line->PrependWrapper(renderer_prefix);
646    AppendRendererCommandLine(cmd_line);
647    cmd_line->AppendSwitchASCII(switches::kProcessChannelID, channel_id);
648
649    // Spawn the child process asynchronously to avoid blocking the UI thread.
650    // As long as there's no renderer prefix, we can use the zygote process
651    // at this stage.
652    child_process_launcher_.reset(new ChildProcessLauncher(
653        new RendererSandboxedProcessLauncherDelegate(channel_.get()),
654        cmd_line,
655        GetID(),
656        this));
657
658    fast_shutdown_started_ = false;
659  }
660
661  if (!gpu_observer_registered_) {
662    gpu_observer_registered_ = true;
663    GpuDataManagerImpl::GetInstance()->AddObserver(this);
664  }
665
666  is_initialized_ = true;
667  return true;
668}
669
670void RenderProcessHostImpl::MaybeActivateMojo() {
671  // TODO(darin): Following security review, we can unconditionally initialize
672  // Mojo in all renderers. We will then be able to directly call Activate()
673  // from OnProcessLaunched.
674  if (!mojo_activation_required_)
675    return;  // Waiting on someone to require Mojo.
676
677  if (!GetHandle())
678    return;  // Waiting on renderer startup.
679
680  if (!mojo_application_host_->did_activate())
681    mojo_application_host_->Activate(this, GetHandle());
682}
683
684void RenderProcessHostImpl::CreateMessageFilters() {
685  DCHECK_CURRENTLY_ON(BrowserThread::UI);
686  AddFilter(new ResourceSchedulerFilter(GetID()));
687  MediaInternals* media_internals = MediaInternals::GetInstance();
688  media::AudioManager* audio_manager =
689      BrowserMainLoop::GetInstance()->audio_manager();
690  // Add BrowserPluginMessageFilter to ensure it gets the first stab at messages
691  // from guests.
692  scoped_refptr<BrowserPluginMessageFilter> bp_message_filter(
693      new BrowserPluginMessageFilter(GetID()));
694  AddFilter(bp_message_filter.get());
695
696  scoped_refptr<RenderMessageFilter> render_message_filter(
697      new RenderMessageFilter(
698          GetID(),
699#if defined(ENABLE_PLUGINS)
700          PluginServiceImpl::GetInstance(),
701#else
702          NULL,
703#endif
704          GetBrowserContext(),
705          GetBrowserContext()->GetRequestContextForRenderProcess(GetID()),
706          widget_helper_.get(),
707          audio_manager,
708          media_internals,
709          storage_partition_impl_->GetDOMStorageContext()));
710  AddFilter(render_message_filter.get());
711  AddFilter(
712      new RenderFrameMessageFilter(GetID(), widget_helper_.get()));
713  BrowserContext* browser_context = GetBrowserContext();
714  ResourceContext* resource_context = browser_context->GetResourceContext();
715
716  scoped_refptr<net::URLRequestContextGetter> request_context(
717      browser_context->GetRequestContextForRenderProcess(GetID()));
718  scoped_refptr<net::URLRequestContextGetter> media_request_context(
719      browser_context->GetMediaRequestContextForRenderProcess(GetID()));
720
721  ResourceMessageFilter::GetContextsCallback get_contexts_callback(
722      base::Bind(&GetContexts, browser_context->GetResourceContext(),
723                 request_context, media_request_context));
724
725  ResourceMessageFilter* resource_message_filter = new ResourceMessageFilter(
726      GetID(), PROCESS_TYPE_RENDERER,
727      storage_partition_impl_->GetAppCacheService(),
728      ChromeBlobStorageContext::GetFor(browser_context),
729      storage_partition_impl_->GetFileSystemContext(),
730      storage_partition_impl_->GetServiceWorkerContext(),
731      get_contexts_callback);
732
733  AddFilter(resource_message_filter);
734  MediaStreamManager* media_stream_manager =
735      BrowserMainLoop::GetInstance()->media_stream_manager();
736  AddFilter(new AudioInputRendererHost(
737      audio_manager,
738      media_stream_manager,
739      BrowserMainLoop::GetInstance()->audio_mirroring_manager(),
740      BrowserMainLoop::GetInstance()->user_input_monitor()));
741  // The AudioRendererHost needs to be available for lookup, so it's
742  // stashed in a member variable.
743  audio_renderer_host_ = new AudioRendererHost(
744      GetID(),
745      audio_manager,
746      BrowserMainLoop::GetInstance()->audio_mirroring_manager(),
747      media_internals,
748      media_stream_manager);
749  AddFilter(audio_renderer_host_);
750  AddFilter(
751      new MidiHost(GetID(), BrowserMainLoop::GetInstance()->midi_manager()));
752  AddFilter(new VideoCaptureHost(media_stream_manager));
753  AddFilter(new AppCacheDispatcherHost(
754      storage_partition_impl_->GetAppCacheService(),
755      GetID()));
756  AddFilter(new ClipboardMessageFilter);
757  AddFilter(new DOMStorageMessageFilter(
758      GetID(),
759      storage_partition_impl_->GetDOMStorageContext()));
760  AddFilter(new IndexedDBDispatcherHost(
761      GetID(),
762      storage_partition_impl_->GetURLRequestContext(),
763      storage_partition_impl_->GetIndexedDBContext(),
764      ChromeBlobStorageContext::GetFor(browser_context)));
765
766  gpu_message_filter_ = new GpuMessageFilter(GetID(), widget_helper_.get());
767  AddFilter(gpu_message_filter_);
768#if defined(ENABLE_WEBRTC)
769  AddFilter(new WebRTCIdentityServiceHost(
770      GetID(), storage_partition_impl_->GetWebRTCIdentityStore()));
771  peer_connection_tracker_host_ = new PeerConnectionTrackerHost(GetID());
772  AddFilter(peer_connection_tracker_host_.get());
773  AddFilter(new MediaStreamDispatcherHost(
774      GetID(),
775      browser_context->GetResourceContext()->GetMediaDeviceIDSalt(),
776      media_stream_manager,
777      resource_context));
778  AddFilter(new DeviceRequestMessageFilter(
779      resource_context, media_stream_manager, GetID()));
780  AddFilter(new MediaStreamTrackMetricsHost());
781#endif
782#if defined(ENABLE_PLUGINS)
783  AddFilter(new PepperRendererConnection(GetID()));
784#endif
785  AddFilter(new SpeechRecognitionDispatcherHost(
786      GetID(), storage_partition_impl_->GetURLRequestContext()));
787  AddFilter(new FileAPIMessageFilter(
788      GetID(),
789      storage_partition_impl_->GetURLRequestContext(),
790      storage_partition_impl_->GetFileSystemContext(),
791      ChromeBlobStorageContext::GetFor(browser_context),
792      StreamContext::GetFor(browser_context)));
793  AddFilter(new FileUtilitiesMessageFilter(GetID()));
794  AddFilter(new MimeRegistryMessageFilter());
795  AddFilter(new DatabaseMessageFilter(
796      storage_partition_impl_->GetDatabaseTracker()));
797#if defined(OS_MACOSX)
798  AddFilter(new TextInputClientMessageFilter(GetID()));
799#elif defined(OS_WIN)
800  // The FontCacheDispatcher is required only when we're using GDI rendering.
801  // TODO(scottmg): pdf/ppapi still require the renderer to be able to precache
802  // GDI fonts (http://crbug.com/383227), even when using DirectWrite. This
803  // should eventually be if (!ShouldUseDirectWrite()) guarded.
804  channel_->AddFilter(new FontCacheDispatcher());
805#elif defined(OS_ANDROID)
806  browser_demuxer_android_ = new BrowserDemuxerAndroid();
807  AddFilter(browser_demuxer_android_);
808#endif
809
810  SocketStreamDispatcherHost::GetRequestContextCallback
811      request_context_callback(
812          base::Bind(&GetRequestContext, request_context,
813                     media_request_context));
814
815  SocketStreamDispatcherHost* socket_stream_dispatcher_host =
816      new SocketStreamDispatcherHost(
817          GetID(), request_context_callback, resource_context);
818  AddFilter(socket_stream_dispatcher_host);
819
820  WebSocketDispatcherHost::GetRequestContextCallback
821      websocket_request_context_callback(
822          base::Bind(&GetRequestContext, request_context,
823                     media_request_context, ResourceType::SUB_RESOURCE));
824
825  AddFilter(
826      new WebSocketDispatcherHost(GetID(), websocket_request_context_callback));
827
828  message_port_message_filter_ = new MessagePortMessageFilter(
829      base::Bind(&RenderWidgetHelper::GetNextRoutingID,
830                 base::Unretained(widget_helper_.get())));
831  AddFilter(message_port_message_filter_);
832
833  scoped_refptr<ServiceWorkerDispatcherHost> service_worker_filter =
834      new ServiceWorkerDispatcherHost(GetID(), message_port_message_filter_);
835  service_worker_filter->Init(
836      storage_partition_impl_->GetServiceWorkerContext());
837  AddFilter(service_worker_filter);
838
839  // If "--enable-embedded-shared-worker" is set, we use
840  // SharedWorkerMessageFilter in stead of WorkerMessageFilter.
841  if (WorkerService::EmbeddedSharedWorkerEnabled()) {
842    AddFilter(new SharedWorkerMessageFilter(
843        GetID(),
844        resource_context,
845        WorkerStoragePartition(
846            storage_partition_impl_->GetURLRequestContext(),
847            storage_partition_impl_->GetMediaURLRequestContext(),
848            storage_partition_impl_->GetAppCacheService(),
849            storage_partition_impl_->GetQuotaManager(),
850            storage_partition_impl_->GetFileSystemContext(),
851            storage_partition_impl_->GetDatabaseTracker(),
852            storage_partition_impl_->GetIndexedDBContext(),
853            storage_partition_impl_->GetServiceWorkerContext()),
854        message_port_message_filter_));
855  } else {
856    AddFilter(new WorkerMessageFilter(
857        GetID(),
858        resource_context,
859        WorkerStoragePartition(
860            storage_partition_impl_->GetURLRequestContext(),
861            storage_partition_impl_->GetMediaURLRequestContext(),
862            storage_partition_impl_->GetAppCacheService(),
863            storage_partition_impl_->GetQuotaManager(),
864            storage_partition_impl_->GetFileSystemContext(),
865            storage_partition_impl_->GetDatabaseTracker(),
866            storage_partition_impl_->GetIndexedDBContext(),
867            storage_partition_impl_->GetServiceWorkerContext()),
868        message_port_message_filter_));
869  }
870
871#if defined(ENABLE_WEBRTC)
872  p2p_socket_dispatcher_host_ = new P2PSocketDispatcherHost(
873      resource_context,
874      browser_context->GetRequestContextForRenderProcess(GetID()));
875  AddFilter(p2p_socket_dispatcher_host_);
876#endif
877
878  AddFilter(new TraceMessageFilter());
879  AddFilter(new ResolveProxyMsgHelper(
880      browser_context->GetRequestContextForRenderProcess(GetID())));
881  AddFilter(new QuotaDispatcherHost(
882      GetID(),
883      storage_partition_impl_->GetQuotaManager(),
884      GetContentClient()->browser()->CreateQuotaPermissionContext()));
885  AddFilter(new GamepadBrowserMessageFilter());
886  AddFilter(new DeviceMotionMessageFilter());
887  AddFilter(new DeviceOrientationMessageFilter());
888  AddFilter(new ProfilerMessageFilter(PROCESS_TYPE_RENDERER));
889  AddFilter(new HistogramMessageFilter());
890#if defined(USE_TCMALLOC) && (defined(OS_LINUX) || defined(OS_ANDROID))
891  if (CommandLine::ForCurrentProcess()->HasSwitch(
892      switches::kEnableMemoryBenchmarking))
893    AddFilter(new MemoryBenchmarkMessageFilter());
894#endif
895  AddFilter(new VibrationMessageFilter());
896  AddFilter(new PushMessagingMessageFilter(GetID()));
897  AddFilter(new BatteryStatusMessageFilter());
898}
899
900int RenderProcessHostImpl::GetNextRoutingID() {
901  return widget_helper_->GetNextRoutingID();
902}
903
904
905void RenderProcessHostImpl::ResumeDeferredNavigation(
906    const GlobalRequestID& request_id) {
907  widget_helper_->ResumeDeferredNavigation(request_id);
908}
909
910void RenderProcessHostImpl::NotifyTimezoneChange() {
911  Send(new ViewMsg_TimezoneChange());
912}
913
914void RenderProcessHostImpl::AddRoute(
915    int32 routing_id,
916    IPC::Listener* listener) {
917  listeners_.AddWithID(listener, routing_id);
918}
919
920void RenderProcessHostImpl::RemoveRoute(int32 routing_id) {
921  DCHECK(listeners_.Lookup(routing_id) != NULL);
922  listeners_.Remove(routing_id);
923
924#if defined(OS_WIN)
925  // Dump the handle table if handle auditing is enabled.
926  const CommandLine& browser_command_line =
927      *CommandLine::ForCurrentProcess();
928  if (browser_command_line.HasSwitch(switches::kAuditHandles) ||
929      browser_command_line.HasSwitch(switches::kAuditAllHandles)) {
930    DumpHandles();
931
932    // We wait to close the channels until the child process has finished
933    // dumping handles and sends us ChildProcessHostMsg_DumpHandlesDone.
934    return;
935  }
936#endif
937  // Keep the one renderer thread around forever in single process mode.
938  if (!run_renderer_in_process())
939    Cleanup();
940}
941
942void RenderProcessHostImpl::AddObserver(RenderProcessHostObserver* observer) {
943  observers_.AddObserver(observer);
944}
945
946void RenderProcessHostImpl::RemoveObserver(
947    RenderProcessHostObserver* observer) {
948  observers_.RemoveObserver(observer);
949}
950
951bool RenderProcessHostImpl::WaitForBackingStoreMsg(
952    int render_widget_id,
953    const base::TimeDelta& max_delay,
954    IPC::Message* msg) {
955  // The post task to this thread with the process id could be in queue, and we
956  // don't want to dispatch a message before then since it will need the handle.
957  if (child_process_launcher_.get() && child_process_launcher_->IsStarting())
958    return false;
959
960  return widget_helper_->WaitForBackingStoreMsg(render_widget_id,
961                                                max_delay, msg);
962}
963
964void RenderProcessHostImpl::ReceivedBadMessage() {
965  CommandLine* command_line = CommandLine::ForCurrentProcess();
966  if (command_line->HasSwitch(switches::kDisableKillAfterBadIPC))
967    return;
968
969  if (run_renderer_in_process()) {
970    // In single process mode it is better if we don't suicide but just
971    // crash.
972    CHECK(false);
973  }
974  // We kill the renderer but don't include a NOTREACHED, because we want the
975  // browser to try to survive when it gets illegal messages from the renderer.
976  base::KillProcess(GetHandle(), RESULT_CODE_KILLED_BAD_MESSAGE,
977                    false);
978}
979
980void RenderProcessHostImpl::WidgetRestored() {
981  // Verify we were properly backgrounded.
982  DCHECK_EQ(backgrounded_, (visible_widgets_ == 0));
983  visible_widgets_++;
984  SetBackgrounded(false);
985}
986
987void RenderProcessHostImpl::WidgetHidden() {
988  // On startup, the browser will call Hide
989  if (backgrounded_)
990    return;
991
992  DCHECK_EQ(backgrounded_, (visible_widgets_ == 0));
993  visible_widgets_--;
994  DCHECK_GE(visible_widgets_, 0);
995  if (visible_widgets_ == 0) {
996    DCHECK(!backgrounded_);
997    SetBackgrounded(true);
998  }
999}
1000
1001int RenderProcessHostImpl::VisibleWidgetCount() const {
1002  return visible_widgets_;
1003}
1004
1005bool RenderProcessHostImpl::IsIsolatedGuest() const {
1006  return is_isolated_guest_;
1007}
1008
1009StoragePartition* RenderProcessHostImpl::GetStoragePartition() const {
1010  return storage_partition_impl_;
1011}
1012
1013static void AppendCompositorCommandLineFlags(CommandLine* command_line) {
1014  if (IsPinchVirtualViewportEnabled())
1015    command_line->AppendSwitch(cc::switches::kEnablePinchVirtualViewport);
1016
1017  if (IsThreadedCompositingEnabled())
1018    command_line->AppendSwitch(switches::kEnableThreadedCompositing);
1019
1020  if (IsDelegatedRendererEnabled())
1021    command_line->AppendSwitch(switches::kEnableDelegatedRenderer);
1022
1023  if (IsImplSidePaintingEnabled())
1024    command_line->AppendSwitch(switches::kEnableImplSidePainting);
1025
1026  if (content::IsGpuRasterizationEnabled())
1027    command_line->AppendSwitch(switches::kEnableGpuRasterization);
1028
1029  if (content::IsForceGpuRasterizationEnabled())
1030    command_line->AppendSwitch(switches::kForceGpuRasterization);
1031
1032  // Appending disable-gpu-feature switches due to software rendering list.
1033  GpuDataManagerImpl* gpu_data_manager = GpuDataManagerImpl::GetInstance();
1034  DCHECK(gpu_data_manager);
1035  gpu_data_manager->AppendRendererCommandLine(command_line);
1036}
1037
1038void RenderProcessHostImpl::AppendRendererCommandLine(
1039    CommandLine* command_line) const {
1040  // Pass the process type first, so it shows first in process listings.
1041  command_line->AppendSwitchASCII(switches::kProcessType,
1042                                  switches::kRendererProcess);
1043
1044  // Now send any options from our own command line we want to propagate.
1045  const CommandLine& browser_command_line = *CommandLine::ForCurrentProcess();
1046  PropagateBrowserCommandLineToRenderer(browser_command_line, command_line);
1047
1048  // Pass on the browser locale.
1049  const std::string locale =
1050      GetContentClient()->browser()->GetApplicationLocale();
1051  command_line->AppendSwitchASCII(switches::kLang, locale);
1052
1053  // If we run base::FieldTrials, we want to pass to their state to the
1054  // renderer so that it can act in accordance with each state, or record
1055  // histograms relating to the base::FieldTrial states.
1056  std::string field_trial_states;
1057  base::FieldTrialList::StatesToString(&field_trial_states);
1058  if (!field_trial_states.empty()) {
1059    command_line->AppendSwitchASCII(switches::kForceFieldTrials,
1060                                    field_trial_states);
1061  }
1062
1063  GetContentClient()->browser()->AppendExtraCommandLineSwitches(
1064      command_line, GetID());
1065
1066  if (content::IsPinchToZoomEnabled())
1067    command_line->AppendSwitch(switches::kEnablePinch);
1068
1069#if defined(OS_WIN)
1070  command_line->AppendSwitchASCII(switches::kDeviceScaleFactor,
1071                                  base::DoubleToString(gfx::GetDPIScale()));
1072#endif
1073
1074  AppendCompositorCommandLineFlags(command_line);
1075}
1076
1077void RenderProcessHostImpl::PropagateBrowserCommandLineToRenderer(
1078    const CommandLine& browser_cmd,
1079    CommandLine* renderer_cmd) const {
1080  // Propagate the following switches to the renderer command line (along
1081  // with any associated values) if present in the browser command line.
1082  static const char* const kSwitchNames[] = {
1083    switches::kAllowInsecureWebSocketFromHttpsOrigin,
1084    switches::kAllowLoopbackInPeerConnection,
1085    switches::kAudioBufferSize,
1086    switches::kAuditAllHandles,
1087    switches::kAuditHandles,
1088    switches::kBlinkPlatformLogChannels,
1089    switches::kBlockCrossSiteDocuments,
1090    switches::kDefaultTileWidth,
1091    switches::kDefaultTileHeight,
1092    switches::kDisable3DAPIs,
1093    switches::kDisableAcceleratedFixedRootBackground,
1094    switches::kDisableAcceleratedOverflowScroll,
1095    switches::kDisableAcceleratedVideoDecode,
1096    switches::kDisableApplicationCache,
1097    switches::kDisableBreakpad,
1098    switches::kDisableCompositingForFixedPosition,
1099    switches::kDisableCompositingForTransition,
1100    switches::kDisableDatabases,
1101    switches::kDisableDesktopNotifications,
1102    switches::kDisableDirectNPAPIRequests,
1103    switches::kDisableDistanceFieldText,
1104    switches::kDisableFastTextAutosizing,
1105    switches::kDisableFileSystem,
1106    switches::kDisableGpuCompositing,
1107    switches::kDisableGpuVsync,
1108    switches::kDisableLowResTiling,
1109    switches::kDisableHistogramCustomizer,
1110    switches::kDisableLCDText,
1111    switches::kDisableLayerSquashing,
1112    switches::kDisableLocalStorage,
1113    switches::kDisableLogging,
1114    switches::kDisableMediaSource,
1115    switches::kDisableOverlayScrollbar,
1116    switches::kDisablePinch,
1117    switches::kDisablePrefixedEncryptedMedia,
1118    switches::kDisableRepaintAfterLayout,
1119    switches::kDisableSeccompFilterSandbox,
1120    switches::kDisableSessionStorage,
1121    switches::kDisableSharedWorkers,
1122    switches::kDisableTouchAdjustment,
1123    switches::kDisableTouchDragDrop,
1124    switches::kDisableTouchEditing,
1125    switches::kDisableZeroCopy,
1126    switches::kDomAutomationController,
1127    switches::kEnableAcceleratedFixedRootBackground,
1128    switches::kEnableAcceleratedOverflowScroll,
1129    switches::kEnableBeginFrameScheduling,
1130    switches::kEnableBleedingEdgeRenderingFastPaths,
1131    switches::kEnableCompositingForFixedPosition,
1132    switches::kEnableCompositingForTransition,
1133    switches::kEnableDeferredImageDecoding,
1134    switches::kEnableDistanceFieldText,
1135    switches::kEnableEncryptedMedia,
1136    switches::kEnableExperimentalCanvasFeatures,
1137    switches::kEnableExperimentalWebPlatformFeatures,
1138    switches::kEnableFastTextAutosizing,
1139    switches::kEnableGPUClientLogging,
1140    switches::kEnableGpuClientTracing,
1141    switches::kEnableGPUServiceLogging,
1142    switches::kEnableHighDpiCompositingForFixedPosition,
1143    switches::kEnableLowResTiling,
1144    switches::kEnableInbandTextTracks,
1145    switches::kEnableLCDText,
1146    switches::kEnableLayerSquashing,
1147    switches::kEnableLogging,
1148    switches::kEnableMemoryBenchmarking,
1149    switches::kEnableOneCopy,
1150    switches::kEnableOverlayFullscreenVideo,
1151    switches::kEnableOverlayScrollbar,
1152    switches::kEnableOverscrollNotifications,
1153    switches::kEnablePinch,
1154    switches::kEnablePreciseMemoryInfo,
1155    switches::kEnablePreparsedJsCaching,
1156    switches::kEnableRepaintAfterLayout,
1157    switches::kEnableSeccompFilterSandbox,
1158    switches::kEnableServiceWorker,
1159    switches::kEnableSkiaBenchmarking,
1160    switches::kEnableSpeechSynthesis,
1161    switches::kEnableStatsTable,
1162    switches::kEnableStrictSiteIsolation,
1163    switches::kEnableTargetedStyleRecalc,
1164    switches::kEnableTouchDragDrop,
1165    switches::kEnableTouchEditing,
1166    switches::kEnableViewport,
1167    switches::kEnableViewportMeta,
1168    switches::kMainFrameResizesAreOrientationChanges,
1169    switches::kEnableVtune,
1170    switches::kEnableWebAnimationsSVG,
1171    switches::kEnableWebGLDraftExtensions,
1172    switches::kEnableWebGLImageChromium,
1173    switches::kEnableWebMIDI,
1174    switches::kEnableZeroCopy,
1175    switches::kForceDeviceScaleFactor,
1176    switches::kFullMemoryCrashReport,
1177    switches::kIgnoreResolutionLimitsForAcceleratedVideoDecode,
1178    switches::kIPCConnectionTimeout,
1179    switches::kJavaScriptFlags,
1180    switches::kLoggingLevel,
1181    switches::kMaxUntiledLayerWidth,
1182    switches::kMaxUntiledLayerHeight,
1183    switches::kMemoryMetrics,
1184    switches::kNoReferrers,
1185    switches::kNoSandbox,
1186    switches::kNumRasterThreads,
1187    switches::kPpapiInProcess,
1188    switches::kProfilerTiming,
1189    switches::kReduceSecurityForTesting,
1190    switches::kRegisterPepperPlugins,
1191    switches::kRendererAssertTest,
1192    switches::kRendererStartupDialog,
1193    switches::kShowPaintRects,
1194    switches::kSitePerProcess,
1195    switches::kStatsCollectionController,
1196    switches::kTestType,
1197    switches::kTouchEvents,
1198    switches::kTraceToConsole,
1199    switches::kUseDiscardableMemory,
1200    // This flag needs to be propagated to the renderer process for
1201    // --in-process-webgl.
1202    switches::kUseGL,
1203    switches::kUseMobileUserAgent,
1204    switches::kV,
1205    switches::kVideoThreads,
1206    switches::kVModule,
1207    // Please keep these in alphabetical order. Compositor switches here should
1208    // also be added to chrome/browser/chromeos/login/chrome_restart_request.cc.
1209    cc::switches::kCompositeToMailbox,
1210    cc::switches::kDisableCompositedAntialiasing,
1211    cc::switches::kDisableCompositorTouchHitTesting,
1212    cc::switches::kDisableMainFrameBeforeActivation,
1213    cc::switches::kDisableMainFrameBeforeDraw,
1214    cc::switches::kDisableThreadedAnimation,
1215    cc::switches::kEnableGpuBenchmarking,
1216    cc::switches::kEnableMainFrameBeforeActivation,
1217    cc::switches::kEnableTopControlsPositionCalculation,
1218    cc::switches::kMaxTilesForInterestArea,
1219    cc::switches::kMaxUnusedResourceMemoryUsagePercentage,
1220    cc::switches::kShowCompositedLayerBorders,
1221    cc::switches::kShowFPSCounter,
1222    cc::switches::kShowLayerAnimationBounds,
1223    cc::switches::kShowNonOccludingRects,
1224    cc::switches::kShowOccludingRects,
1225    cc::switches::kShowPropertyChangedRects,
1226    cc::switches::kShowReplicaScreenSpaceRects,
1227    cc::switches::kShowScreenSpaceRects,
1228    cc::switches::kShowSurfaceDamageRects,
1229    cc::switches::kSlowDownRasterScaleFactor,
1230    cc::switches::kStrictLayerPropertyChangeChecking,
1231    cc::switches::kTopControlsHeight,
1232    cc::switches::kTopControlsHideThreshold,
1233    cc::switches::kTopControlsShowThreshold,
1234#if defined(ENABLE_PLUGINS)
1235    switches::kEnablePepperTesting,
1236#endif
1237#if defined(ENABLE_WEBRTC)
1238    switches::kDisableAudioTrackProcessing,
1239    switches::kDisableDeviceEnumeration,
1240    switches::kDisableWebRtcHWDecoding,
1241    switches::kDisableWebRtcHWEncoding,
1242    switches::kEnableWebRtcHWVp8Encoding,
1243#endif
1244#if defined(OS_ANDROID)
1245    switches::kDisableGestureRequirementForMediaPlayback,
1246    switches::kDisableLowEndDeviceMode,
1247    switches::kDisableWebRTC,
1248    switches::kEnableLowEndDeviceMode,
1249    switches::kEnableSpeechRecognition,
1250    switches::kMediaDrmEnableNonCompositing,
1251    switches::kNetworkCountryIso,
1252    switches::kDisableWebAudio,
1253#endif
1254#if defined(OS_MACOSX)
1255    // Allow this to be set when invoking the browser and relayed along.
1256    switches::kEnableSandboxLogging,
1257#endif
1258#if defined(OS_WIN)
1259    switches::kDisableDirectWrite,
1260    switches::kEnableHighResolutionTime,
1261#endif
1262  };
1263  renderer_cmd->CopySwitchesFrom(browser_cmd, kSwitchNames,
1264                                 arraysize(kSwitchNames));
1265
1266  if (browser_cmd.HasSwitch(switches::kTraceStartup) &&
1267      BrowserMainLoop::GetInstance()->is_tracing_startup()) {
1268    // Pass kTraceStartup switch to renderer only if startup tracing has not
1269    // finished.
1270    renderer_cmd->AppendSwitchASCII(
1271        switches::kTraceStartup,
1272        browser_cmd.GetSwitchValueASCII(switches::kTraceStartup));
1273  }
1274
1275  // Disable databases in incognito mode.
1276  if (GetBrowserContext()->IsOffTheRecord() &&
1277      !browser_cmd.HasSwitch(switches::kDisableDatabases)) {
1278    renderer_cmd->AppendSwitch(switches::kDisableDatabases);
1279  }
1280
1281  // Enforce the extra command line flags for impl-side painting.
1282  if (IsImplSidePaintingEnabled() &&
1283      !browser_cmd.HasSwitch(switches::kEnableDeferredImageDecoding))
1284    renderer_cmd->AppendSwitch(switches::kEnableDeferredImageDecoding);
1285}
1286
1287base::ProcessHandle RenderProcessHostImpl::GetHandle() const {
1288  if (run_renderer_in_process())
1289    return base::Process::Current().handle();
1290
1291  if (!child_process_launcher_.get() || child_process_launcher_->IsStarting())
1292    return base::kNullProcessHandle;
1293
1294  return child_process_launcher_->GetHandle();
1295}
1296
1297bool RenderProcessHostImpl::FastShutdownIfPossible() {
1298  if (run_renderer_in_process())
1299    return false;  // Single process mode never shutdown the renderer.
1300
1301  if (!GetContentClient()->browser()->IsFastShutdownPossible())
1302    return false;
1303
1304  if (!child_process_launcher_.get() ||
1305      child_process_launcher_->IsStarting() ||
1306      !GetHandle())
1307    return false;  // Render process hasn't started or is probably crashed.
1308
1309  // Test if there's an unload listener.
1310  // NOTE: It's possible that an onunload listener may be installed
1311  // while we're shutting down, so there's a small race here.  Given that
1312  // the window is small, it's unlikely that the web page has much
1313  // state that will be lost by not calling its unload handlers properly.
1314  if (!SuddenTerminationAllowed())
1315    return false;
1316
1317  if (worker_ref_count_ != 0) {
1318    if (survive_for_worker_start_time_.is_null())
1319      survive_for_worker_start_time_ = base::TimeTicks::Now();
1320    return false;
1321  }
1322
1323  // Set this before ProcessDied() so observers can tell if the render process
1324  // died due to fast shutdown versus another cause.
1325  fast_shutdown_started_ = true;
1326
1327  ProcessDied(false /* already_dead */);
1328  return true;
1329}
1330
1331void RenderProcessHostImpl::DumpHandles() {
1332#if defined(OS_WIN)
1333  Send(new ChildProcessMsg_DumpHandles());
1334#else
1335  NOTIMPLEMENTED();
1336#endif
1337}
1338
1339bool RenderProcessHostImpl::Send(IPC::Message* msg) {
1340  TRACE_EVENT0("renderer_host", "RenderProcessHostImpl::Send");
1341  if (!channel_) {
1342    if (!is_initialized_) {
1343      queued_messages_.push(msg);
1344      return true;
1345    } else {
1346      delete msg;
1347      return false;
1348    }
1349  }
1350
1351  if (child_process_launcher_.get() && child_process_launcher_->IsStarting()) {
1352    queued_messages_.push(msg);
1353    return true;
1354  }
1355
1356  return channel_->Send(msg);
1357}
1358
1359bool RenderProcessHostImpl::OnMessageReceived(const IPC::Message& msg) {
1360  // If we're about to be deleted, or have initiated the fast shutdown sequence,
1361  // we ignore incoming messages.
1362
1363  if (deleting_soon_ || fast_shutdown_started_)
1364    return false;
1365
1366  mark_child_process_activity_time();
1367  if (msg.routing_id() == MSG_ROUTING_CONTROL) {
1368    // Dispatch control messages.
1369    IPC_BEGIN_MESSAGE_MAP(RenderProcessHostImpl, msg)
1370      IPC_MESSAGE_HANDLER(ChildProcessHostMsg_ShutdownRequest,
1371                          OnShutdownRequest)
1372      IPC_MESSAGE_HANDLER(ChildProcessHostMsg_DumpHandlesDone,
1373                          OnDumpHandlesDone)
1374      IPC_MESSAGE_HANDLER(ViewHostMsg_SuddenTerminationChanged,
1375                          SuddenTerminationChanged)
1376      IPC_MESSAGE_HANDLER(ViewHostMsg_UserMetricsRecordAction,
1377                          OnUserMetricsRecordAction)
1378      IPC_MESSAGE_HANDLER(ViewHostMsg_SavedPageAsMHTML, OnSavedPageAsMHTML)
1379      IPC_MESSAGE_HANDLER_DELAY_REPLY(
1380          ChildProcessHostMsg_SyncAllocateGpuMemoryBuffer,
1381          OnAllocateGpuMemoryBuffer)
1382      IPC_MESSAGE_HANDLER(ViewHostMsg_Close_ACK, OnCloseACK)
1383#if defined(ENABLE_WEBRTC)
1384      IPC_MESSAGE_HANDLER(AecDumpMsg_RegisterAecDumpConsumer,
1385                          OnRegisterAecDumpConsumer)
1386      IPC_MESSAGE_HANDLER(AecDumpMsg_UnregisterAecDumpConsumer,
1387                          OnUnregisterAecDumpConsumer)
1388#endif
1389      // Adding single handlers for your service here is fine, but once your
1390      // service needs more than one handler, please extract them into a new
1391      // message filter and add that filter to CreateMessageFilters().
1392    IPC_END_MESSAGE_MAP()
1393
1394    return true;
1395  }
1396
1397  // Dispatch incoming messages to the appropriate IPC::Listener.
1398  IPC::Listener* listener = listeners_.Lookup(msg.routing_id());
1399  if (!listener) {
1400    if (msg.is_sync()) {
1401      // The listener has gone away, so we must respond or else the caller will
1402      // hang waiting for a reply.
1403      IPC::Message* reply = IPC::SyncMessage::GenerateReply(&msg);
1404      reply->set_reply_error();
1405      Send(reply);
1406    }
1407
1408    // If this is a SwapBuffers, we need to ack it if we're not going to handle
1409    // it so that the GPU process doesn't get stuck in unscheduled state.
1410    IPC_BEGIN_MESSAGE_MAP(RenderProcessHostImpl, msg)
1411      IPC_MESSAGE_HANDLER(ViewHostMsg_CompositorSurfaceBuffersSwapped,
1412                          OnCompositorSurfaceBuffersSwappedNoHost)
1413    IPC_END_MESSAGE_MAP()
1414    return true;
1415  }
1416  return listener->OnMessageReceived(msg);
1417}
1418
1419void RenderProcessHostImpl::OnChannelConnected(int32 peer_pid) {
1420#if defined(IPC_MESSAGE_LOG_ENABLED)
1421  Send(new ChildProcessMsg_SetIPCLoggingEnabled(
1422      IPC::Logging::GetInstance()->Enabled()));
1423#endif
1424
1425  tracked_objects::ThreadData::Status status =
1426      tracked_objects::ThreadData::status();
1427  Send(new ChildProcessMsg_SetProfilerStatus(status));
1428}
1429
1430void RenderProcessHostImpl::OnChannelError() {
1431  ProcessDied(true /* already_dead */);
1432}
1433
1434void RenderProcessHostImpl::OnBadMessageReceived(const IPC::Message& message) {
1435  // Message de-serialization failed. We consider this a capital crime. Kill the
1436  // renderer if we have one.
1437  LOG(ERROR) << "bad message " << message.type() << " terminating renderer.";
1438  BrowserChildProcessHostImpl::HistogramBadMessageTerminated(
1439      PROCESS_TYPE_RENDERER);
1440  ReceivedBadMessage();
1441}
1442
1443BrowserContext* RenderProcessHostImpl::GetBrowserContext() const {
1444  return browser_context_;
1445}
1446
1447bool RenderProcessHostImpl::InSameStoragePartition(
1448    StoragePartition* partition) const {
1449  return storage_partition_impl_ == partition;
1450}
1451
1452int RenderProcessHostImpl::GetID() const {
1453  return id_;
1454}
1455
1456bool RenderProcessHostImpl::HasConnection() const {
1457  return channel_.get() != NULL;
1458}
1459
1460void RenderProcessHostImpl::SetIgnoreInputEvents(bool ignore_input_events) {
1461  ignore_input_events_ = ignore_input_events;
1462}
1463
1464bool RenderProcessHostImpl::IgnoreInputEvents() const {
1465  return ignore_input_events_;
1466}
1467
1468void RenderProcessHostImpl::Cleanup() {
1469  // If within_process_died_observer_ is true, one of our observers performed an
1470  // action that caused us to die (e.g. http://crbug.com/339504). Therefore,
1471  // delay the destruction until all of the observer callbacks have been made,
1472  // and guarantee that the RenderProcessHostDestroyed observer callback is
1473  // always the last callback fired.
1474  if (within_process_died_observer_) {
1475    delayed_cleanup_needed_ = true;
1476    return;
1477  }
1478  delayed_cleanup_needed_ = false;
1479
1480  // Records the time when the process starts surviving for workers for UMA.
1481  if (listeners_.IsEmpty() && worker_ref_count_ > 0 &&
1482      survive_for_worker_start_time_.is_null()) {
1483    survive_for_worker_start_time_ = base::TimeTicks::Now();
1484  }
1485
1486  // When there are no other owners of this object, we can delete ourselves.
1487  if (listeners_.IsEmpty() && worker_ref_count_ == 0) {
1488    if (!survive_for_worker_start_time_.is_null()) {
1489      UMA_HISTOGRAM_LONG_TIMES(
1490          "SharedWorker.RendererSurviveForWorkerTime",
1491          base::TimeTicks::Now() - survive_for_worker_start_time_);
1492    }
1493    // We cannot clean up twice; if this fails, there is an issue with our
1494    // control flow.
1495    DCHECK(!deleting_soon_);
1496
1497    DCHECK_EQ(0, pending_views_);
1498    FOR_EACH_OBSERVER(RenderProcessHostObserver,
1499                      observers_,
1500                      RenderProcessHostDestroyed(this));
1501    NotificationService::current()->Notify(
1502        NOTIFICATION_RENDERER_PROCESS_TERMINATED,
1503        Source<RenderProcessHost>(this),
1504        NotificationService::NoDetails());
1505
1506#ifndef NDEBUG
1507    is_self_deleted_ = true;
1508#endif
1509    base::MessageLoop::current()->DeleteSoon(FROM_HERE, this);
1510    deleting_soon_ = true;
1511    // It's important not to wait for the DeleteTask to delete the channel
1512    // proxy. Kill it off now. That way, in case the profile is going away, the
1513    // rest of the objects attached to this RenderProcessHost start going
1514    // away first, since deleting the channel proxy will post a
1515    // OnChannelClosed() to IPC::ChannelProxy::Context on the IO thread.
1516    channel_.reset();
1517    gpu_message_filter_ = NULL;
1518    message_port_message_filter_ = NULL;
1519    RemoveUserData(kSessionStorageHolderKey);
1520
1521    // Remove ourself from the list of renderer processes so that we can't be
1522    // reused in between now and when the Delete task runs.
1523    UnregisterHost(GetID());
1524  }
1525}
1526
1527void RenderProcessHostImpl::AddPendingView() {
1528  pending_views_++;
1529}
1530
1531void RenderProcessHostImpl::RemovePendingView() {
1532  DCHECK(pending_views_);
1533  pending_views_--;
1534}
1535
1536void RenderProcessHostImpl::SetSuddenTerminationAllowed(bool enabled) {
1537  sudden_termination_allowed_ = enabled;
1538}
1539
1540bool RenderProcessHostImpl::SuddenTerminationAllowed() const {
1541  return sudden_termination_allowed_;
1542}
1543
1544base::TimeDelta RenderProcessHostImpl::GetChildProcessIdleTime() const {
1545  return base::TimeTicks::Now() - child_process_activity_time_;
1546}
1547
1548void RenderProcessHostImpl::ResumeRequestsForView(int route_id) {
1549  widget_helper_->ResumeRequestsForView(route_id);
1550}
1551
1552void RenderProcessHostImpl::FilterURL(bool empty_allowed, GURL* url) {
1553  FilterURL(this, empty_allowed, url);
1554}
1555
1556#if defined(ENABLE_WEBRTC)
1557void RenderProcessHostImpl::EnableAecDump(const base::FilePath& file) {
1558  DCHECK_CURRENTLY_ON(BrowserThread::UI);
1559  // Enable AEC dump for each registered consumer.
1560  for (std::vector<int>::iterator it = aec_dump_consumers_.begin();
1561       it != aec_dump_consumers_.end(); ++it) {
1562    EnableAecDumpForId(file, *it);
1563  }
1564}
1565
1566void RenderProcessHostImpl::DisableAecDump() {
1567  DCHECK_CURRENTLY_ON(BrowserThread::UI);
1568  // Posting on the FILE thread and then replying back on the UI thread is only
1569  // for avoiding races between enable and disable. Nothing is done on the FILE
1570  // thread.
1571  BrowserThread::PostTaskAndReply(
1572      BrowserThread::FILE, FROM_HERE,
1573      base::Bind(&DisableAecDumpOnFileThread),
1574      base::Bind(&RenderProcessHostImpl::SendDisableAecDumpToRenderer,
1575                 weak_factory_.GetWeakPtr()));
1576}
1577
1578void RenderProcessHostImpl::SetWebRtcLogMessageCallback(
1579    base::Callback<void(const std::string&)> callback) {
1580  webrtc_log_message_callback_ = callback;
1581}
1582
1583RenderProcessHostImpl::WebRtcStopRtpDumpCallback
1584RenderProcessHostImpl::StartRtpDump(
1585    bool incoming,
1586    bool outgoing,
1587    const WebRtcRtpPacketCallback& packet_callback) {
1588  if (!p2p_socket_dispatcher_host_)
1589    return WebRtcStopRtpDumpCallback();
1590
1591  BrowserThread::PostTask(BrowserThread::IO,
1592                          FROM_HERE,
1593                          base::Bind(&P2PSocketDispatcherHost::StartRtpDump,
1594                                     p2p_socket_dispatcher_host_,
1595                                     incoming,
1596                                     outgoing,
1597                                     packet_callback));
1598
1599  if (stop_rtp_dump_callback_.is_null()) {
1600    stop_rtp_dump_callback_ =
1601        base::Bind(&P2PSocketDispatcherHost::StopRtpDumpOnUIThread,
1602                   p2p_socket_dispatcher_host_);
1603  }
1604  return stop_rtp_dump_callback_;
1605}
1606#endif
1607
1608IPC::ChannelProxy* RenderProcessHostImpl::GetChannel() {
1609  return channel_.get();
1610}
1611
1612void RenderProcessHostImpl::AddFilter(BrowserMessageFilter* filter) {
1613  channel_->AddFilter(filter->GetFilter());
1614}
1615
1616bool RenderProcessHostImpl::FastShutdownForPageCount(size_t count) {
1617  if (static_cast<size_t>(GetActiveViewCount()) == count)
1618    return FastShutdownIfPossible();
1619  return false;
1620}
1621
1622bool RenderProcessHostImpl::FastShutdownStarted() const {
1623  return fast_shutdown_started_;
1624}
1625
1626// static
1627void RenderProcessHostImpl::RegisterHost(int host_id, RenderProcessHost* host) {
1628  g_all_hosts.Get().AddWithID(host, host_id);
1629}
1630
1631// static
1632void RenderProcessHostImpl::UnregisterHost(int host_id) {
1633  RenderProcessHost* host = g_all_hosts.Get().Lookup(host_id);
1634  if (!host)
1635    return;
1636
1637  g_all_hosts.Get().Remove(host_id);
1638
1639  // Look up the map of site to process for the given browser_context,
1640  // in case we need to remove this process from it.  It will be registered
1641  // under any sites it rendered that use process-per-site mode.
1642  SiteProcessMap* map =
1643      GetSiteProcessMapForBrowserContext(host->GetBrowserContext());
1644  map->RemoveProcess(host);
1645}
1646
1647// static
1648void RenderProcessHostImpl::FilterURL(RenderProcessHost* rph,
1649                                      bool empty_allowed,
1650                                      GURL* url) {
1651  ChildProcessSecurityPolicyImpl* policy =
1652      ChildProcessSecurityPolicyImpl::GetInstance();
1653
1654  if (empty_allowed && url->is_empty())
1655    return;
1656
1657  // The browser process should never hear the swappedout:// URL from any
1658  // of the renderer's messages.  Check for this in debug builds, but don't
1659  // let it crash a release browser.
1660  DCHECK(GURL(kSwappedOutURL) != *url);
1661
1662  if (!url->is_valid()) {
1663    // Have to use about:blank for the denied case, instead of an empty GURL.
1664    // This is because the browser treats navigation to an empty GURL as a
1665    // navigation to the home page. This is often a privileged page
1666    // (chrome://newtab/) which is exactly what we don't want.
1667    *url = GURL(url::kAboutBlankURL);
1668    RecordAction(base::UserMetricsAction("FilterURLTermiate_Invalid"));
1669    return;
1670  }
1671
1672  if (url->SchemeIs(url::kAboutScheme)) {
1673    // The renderer treats all URLs in the about: scheme as being about:blank.
1674    // Canonicalize about: URLs to about:blank.
1675    *url = GURL(url::kAboutBlankURL);
1676    RecordAction(base::UserMetricsAction("FilterURLTermiate_About"));
1677  }
1678
1679  // Do not allow browser plugin guests to navigate to non-web URLs, since they
1680  // cannot swap processes or grant bindings.
1681  bool non_web_url_in_guest = rph->IsIsolatedGuest() &&
1682      !(url->is_valid() && policy->IsWebSafeScheme(url->scheme()));
1683
1684  if (non_web_url_in_guest || !policy->CanRequestURL(rph->GetID(), *url)) {
1685    // If this renderer is not permitted to request this URL, we invalidate the
1686    // URL.  This prevents us from storing the blocked URL and becoming confused
1687    // later.
1688    VLOG(1) << "Blocked URL " << url->spec();
1689    *url = GURL(url::kAboutBlankURL);
1690    RecordAction(base::UserMetricsAction("FilterURLTermiate_Blocked"));
1691  }
1692}
1693
1694// static
1695bool RenderProcessHostImpl::IsSuitableHost(
1696    RenderProcessHost* host,
1697    BrowserContext* browser_context,
1698    const GURL& site_url) {
1699  if (run_renderer_in_process())
1700    return true;
1701
1702  if (host->GetBrowserContext() != browser_context)
1703    return false;
1704
1705  // Do not allow sharing of guest hosts. This is to prevent bugs where guest
1706  // and non-guest storage gets mixed. In the future, we might consider enabling
1707  // the sharing of guests, in this case this check should be removed and
1708  // InSameStoragePartition should handle the possible sharing.
1709  if (host->IsIsolatedGuest())
1710    return false;
1711
1712  // Check whether the given host and the intended site_url will be using the
1713  // same StoragePartition, since a RenderProcessHost can only support a single
1714  // StoragePartition.  This is relevant for packaged apps and isolated sites.
1715  StoragePartition* dest_partition =
1716      BrowserContext::GetStoragePartitionForSite(browser_context, site_url);
1717  if (!host->InSameStoragePartition(dest_partition))
1718    return false;
1719
1720  if (ChildProcessSecurityPolicyImpl::GetInstance()->HasWebUIBindings(
1721          host->GetID()) !=
1722      WebUIControllerFactoryRegistry::GetInstance()->UseWebUIBindingsForURL(
1723          browser_context, site_url)) {
1724    return false;
1725  }
1726
1727  return GetContentClient()->browser()->IsSuitableHost(host, site_url);
1728}
1729
1730// static
1731bool RenderProcessHost::run_renderer_in_process() {
1732  return g_run_renderer_in_process_;
1733}
1734
1735// static
1736void RenderProcessHost::SetRunRendererInProcess(bool value) {
1737  g_run_renderer_in_process_ = value;
1738
1739  CommandLine* command_line = CommandLine::ForCurrentProcess();
1740  if (value) {
1741    if (!command_line->HasSwitch(switches::kLang)) {
1742      // Modify the current process' command line to include the browser locale,
1743      // as the renderer expects this flag to be set.
1744      const std::string locale =
1745          GetContentClient()->browser()->GetApplicationLocale();
1746      command_line->AppendSwitchASCII(switches::kLang, locale);
1747    }
1748    // TODO(piman): we should really send configuration through bools rather
1749    // than by parsing strings, i.e. sending an IPC rather than command line
1750    // args. crbug.com/314909
1751    AppendCompositorCommandLineFlags(command_line);
1752  }
1753}
1754
1755// static
1756RenderProcessHost::iterator RenderProcessHost::AllHostsIterator() {
1757  DCHECK_CURRENTLY_ON(BrowserThread::UI);
1758  return iterator(g_all_hosts.Pointer());
1759}
1760
1761// static
1762RenderProcessHost* RenderProcessHost::FromID(int render_process_id) {
1763  DCHECK_CURRENTLY_ON(BrowserThread::UI);
1764  return g_all_hosts.Get().Lookup(render_process_id);
1765}
1766
1767// static
1768bool RenderProcessHost::ShouldTryToUseExistingProcessHost(
1769    BrowserContext* browser_context, const GURL& url) {
1770  // Experimental:
1771  // If --enable-strict-site-isolation or --site-per-process is enabled, do not
1772  // try to reuse renderer processes when over the limit.  (We could allow pages
1773  // from the same site to share, if we knew what the given process was
1774  // dedicated to.  Allowing no sharing is simpler for now.)  This may cause
1775  // resource exhaustion issues if too many sites are open at once.
1776  const CommandLine& command_line = *CommandLine::ForCurrentProcess();
1777  if (command_line.HasSwitch(switches::kEnableStrictSiteIsolation) ||
1778      command_line.HasSwitch(switches::kSitePerProcess))
1779    return false;
1780
1781  if (run_renderer_in_process())
1782    return true;
1783
1784  // NOTE: Sometimes it's necessary to create more render processes than
1785  //       GetMaxRendererProcessCount(), for instance when we want to create
1786  //       a renderer process for a browser context that has no existing
1787  //       renderers. This is OK in moderation, since the
1788  //       GetMaxRendererProcessCount() is conservative.
1789  if (g_all_hosts.Get().size() >= GetMaxRendererProcessCount())
1790    return true;
1791
1792  return GetContentClient()->browser()->
1793      ShouldTryToUseExistingProcessHost(browser_context, url);
1794}
1795
1796// static
1797RenderProcessHost* RenderProcessHost::GetExistingProcessHost(
1798    BrowserContext* browser_context,
1799    const GURL& site_url) {
1800  // First figure out which existing renderers we can use.
1801  std::vector<RenderProcessHost*> suitable_renderers;
1802  suitable_renderers.reserve(g_all_hosts.Get().size());
1803
1804  iterator iter(AllHostsIterator());
1805  while (!iter.IsAtEnd()) {
1806    if (GetContentClient()->browser()->MayReuseHost(iter.GetCurrentValue()) &&
1807        RenderProcessHostImpl::IsSuitableHost(
1808            iter.GetCurrentValue(),
1809            browser_context, site_url)) {
1810      suitable_renderers.push_back(iter.GetCurrentValue());
1811    }
1812    iter.Advance();
1813  }
1814
1815  // Now pick a random suitable renderer, if we have any.
1816  if (!suitable_renderers.empty()) {
1817    int suitable_count = static_cast<int>(suitable_renderers.size());
1818    int random_index = base::RandInt(0, suitable_count - 1);
1819    return suitable_renderers[random_index];
1820  }
1821
1822  return NULL;
1823}
1824
1825// static
1826bool RenderProcessHost::ShouldUseProcessPerSite(
1827    BrowserContext* browser_context,
1828    const GURL& url) {
1829  // Returns true if we should use the process-per-site model.  This will be
1830  // the case if the --process-per-site switch is specified, or in
1831  // process-per-site-instance for particular sites (e.g., WebUI).
1832  // Note that --single-process is handled in ShouldTryToUseExistingProcessHost.
1833  const CommandLine& command_line = *CommandLine::ForCurrentProcess();
1834  if (command_line.HasSwitch(switches::kProcessPerSite))
1835    return true;
1836
1837  // We want to consolidate particular sites like WebUI even when we are using
1838  // the process-per-tab or process-per-site-instance models.
1839  // Note: DevTools pages have WebUI type but should not reuse the same host.
1840  if (WebUIControllerFactoryRegistry::GetInstance()->UseWebUIForURL(
1841          browser_context, url) &&
1842      !url.SchemeIs(kChromeDevToolsScheme)) {
1843    return true;
1844  }
1845
1846  // Otherwise let the content client decide, defaulting to false.
1847  return GetContentClient()->browser()->ShouldUseProcessPerSite(browser_context,
1848                                                                url);
1849}
1850
1851// static
1852RenderProcessHost* RenderProcessHostImpl::GetProcessHostForSite(
1853    BrowserContext* browser_context,
1854    const GURL& url) {
1855  // Look up the map of site to process for the given browser_context.
1856  SiteProcessMap* map =
1857      GetSiteProcessMapForBrowserContext(browser_context);
1858
1859  // See if we have an existing process with appropriate bindings for this site.
1860  // If not, the caller should create a new process and register it.
1861  std::string site = SiteInstance::GetSiteForURL(browser_context, url)
1862      .possibly_invalid_spec();
1863  RenderProcessHost* host = map->FindProcess(site);
1864  if (host && (!GetContentClient()->browser()->MayReuseHost(host) ||
1865               !IsSuitableHost(host, browser_context, url))) {
1866    // The registered process does not have an appropriate set of bindings for
1867    // the url.  Remove it from the map so we can register a better one.
1868    RecordAction(
1869        base::UserMetricsAction("BindingsMismatch_GetProcessHostPerSite"));
1870    map->RemoveProcess(host);
1871    host = NULL;
1872  }
1873
1874  return host;
1875}
1876
1877void RenderProcessHostImpl::RegisterProcessHostForSite(
1878    BrowserContext* browser_context,
1879    RenderProcessHost* process,
1880    const GURL& url) {
1881  // Look up the map of site to process for the given browser_context.
1882  SiteProcessMap* map =
1883      GetSiteProcessMapForBrowserContext(browser_context);
1884
1885  // Only register valid, non-empty sites.  Empty or invalid sites will not
1886  // use process-per-site mode.  We cannot check whether the process has
1887  // appropriate bindings here, because the bindings have not yet been granted.
1888  std::string site = SiteInstance::GetSiteForURL(browser_context, url)
1889      .possibly_invalid_spec();
1890  if (!site.empty())
1891    map->RegisterProcess(site, process);
1892}
1893
1894void RenderProcessHostImpl::ProcessDied(bool already_dead) {
1895  // Our child process has died.  If we didn't expect it, it's a crash.
1896  // In any case, we need to let everyone know it's gone.
1897  // The OnChannelError notification can fire multiple times due to nested sync
1898  // calls to a renderer. If we don't have a valid channel here it means we
1899  // already handled the error.
1900
1901  // It should not be possible for us to be called re-entrantly.
1902  DCHECK(!within_process_died_observer_);
1903
1904  // It should not be possible for a process death notification to come in while
1905  // we are dying.
1906  DCHECK(!deleting_soon_);
1907
1908  // child_process_launcher_ can be NULL in single process mode or if fast
1909  // termination happened.
1910  int exit_code = 0;
1911  base::TerminationStatus status =
1912      child_process_launcher_.get() ?
1913      child_process_launcher_->GetChildTerminationStatus(already_dead,
1914                                                         &exit_code) :
1915      base::TERMINATION_STATUS_NORMAL_TERMINATION;
1916
1917  RendererClosedDetails details(GetHandle(), status, exit_code);
1918  within_process_died_observer_ = true;
1919  NotificationService::current()->Notify(
1920      NOTIFICATION_RENDERER_PROCESS_CLOSED,
1921      Source<RenderProcessHost>(this),
1922      Details<RendererClosedDetails>(&details));
1923  FOR_EACH_OBSERVER(RenderProcessHostObserver,
1924                    observers_,
1925                    RenderProcessExited(this, GetHandle(), status, exit_code));
1926  within_process_died_observer_ = false;
1927
1928  child_process_launcher_.reset();
1929  channel_.reset();
1930  gpu_message_filter_ = NULL;
1931  message_port_message_filter_ = NULL;
1932  RemoveUserData(kSessionStorageHolderKey);
1933
1934  IDMap<IPC::Listener>::iterator iter(&listeners_);
1935  while (!iter.IsAtEnd()) {
1936    iter.GetCurrentValue()->OnMessageReceived(
1937        ViewHostMsg_RenderProcessGone(iter.GetCurrentKey(),
1938                                      static_cast<int>(status),
1939                                      exit_code));
1940    iter.Advance();
1941  }
1942
1943  mojo_application_host_.reset();
1944
1945  // It's possible that one of the calls out to the observers might have caused
1946  // this object to be no longer needed.
1947  if (delayed_cleanup_needed_)
1948    Cleanup();
1949
1950  // This object is not deleted at this point and might be reused later.
1951  // TODO(darin): clean this up
1952}
1953
1954int RenderProcessHostImpl::GetActiveViewCount() {
1955  int num_active_views = 0;
1956  scoped_ptr<RenderWidgetHostIterator> widgets(
1957      RenderWidgetHost::GetRenderWidgetHosts());
1958  while (RenderWidgetHost* widget = widgets->GetNextHost()) {
1959    // Count only RenderWidgetHosts in this process.
1960    if (widget->GetProcess()->GetID() == GetID())
1961      num_active_views++;
1962  }
1963  return num_active_views;
1964}
1965
1966// Frame subscription API for this class is for accelerated composited path
1967// only. These calls are redirected to GpuMessageFilter.
1968void RenderProcessHostImpl::BeginFrameSubscription(
1969    int route_id,
1970    scoped_ptr<RenderWidgetHostViewFrameSubscriber> subscriber) {
1971  if (!gpu_message_filter_)
1972    return;
1973  BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, base::Bind(
1974      &GpuMessageFilter::BeginFrameSubscription,
1975      gpu_message_filter_,
1976      route_id, base::Passed(&subscriber)));
1977}
1978
1979void RenderProcessHostImpl::EndFrameSubscription(int route_id) {
1980  if (!gpu_message_filter_)
1981    return;
1982  BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, base::Bind(
1983      &GpuMessageFilter::EndFrameSubscription,
1984      gpu_message_filter_,
1985      route_id));
1986}
1987
1988#if defined(ENABLE_WEBRTC)
1989void RenderProcessHostImpl::WebRtcLogMessage(const std::string& message) {
1990  DCHECK_CURRENTLY_ON(BrowserThread::UI);
1991  if (!webrtc_log_message_callback_.is_null())
1992    webrtc_log_message_callback_.Run(message);
1993}
1994#endif
1995
1996void RenderProcessHostImpl::ReleaseOnCloseACK(
1997    RenderProcessHost* host,
1998    const SessionStorageNamespaceMap& sessions,
1999    int view_route_id) {
2000  DCHECK(host);
2001  if (sessions.empty())
2002    return;
2003  SessionStorageHolder* holder = static_cast<SessionStorageHolder*>
2004      (host->GetUserData(kSessionStorageHolderKey));
2005  if (!holder) {
2006    holder = new SessionStorageHolder();
2007    host->SetUserData(
2008        kSessionStorageHolderKey,
2009        holder);
2010  }
2011  holder->Hold(sessions, view_route_id);
2012}
2013
2014void RenderProcessHostImpl::OnShutdownRequest() {
2015  // Don't shut down if there are active RenderViews, or if there are pending
2016  // RenderViews being swapped back in.
2017  // In single process mode, we never shutdown the renderer.
2018  int num_active_views = GetActiveViewCount();
2019  if (pending_views_ || num_active_views > 0 || run_renderer_in_process())
2020    return;
2021
2022  // Notify any contents that might have swapped out renderers from this
2023  // process. They should not attempt to swap them back in.
2024  NotificationService::current()->Notify(
2025      NOTIFICATION_RENDERER_PROCESS_CLOSING,
2026      Source<RenderProcessHost>(this),
2027      NotificationService::NoDetails());
2028
2029  Send(new ChildProcessMsg_Shutdown());
2030}
2031
2032void RenderProcessHostImpl::SuddenTerminationChanged(bool enabled) {
2033  SetSuddenTerminationAllowed(enabled);
2034}
2035
2036void RenderProcessHostImpl::OnDumpHandlesDone() {
2037  Cleanup();
2038}
2039
2040void RenderProcessHostImpl::SetBackgrounded(bool backgrounded) {
2041  // Note: we always set the backgrounded_ value.  If the process is NULL
2042  // (and hence hasn't been created yet), we will set the process priority
2043  // later when we create the process.
2044  backgrounded_ = backgrounded;
2045  if (!child_process_launcher_.get() || child_process_launcher_->IsStarting())
2046    return;
2047
2048  // Don't background processes which have active audio streams.
2049  if (backgrounded_ && audio_renderer_host_->HasActiveAudio())
2050    return;
2051
2052#if defined(OS_WIN)
2053  // The cbstext.dll loads as a global GetMessage hook in the browser process
2054  // and intercepts/unintercepts the kernel32 API SetPriorityClass in a
2055  // background thread. If the UI thread invokes this API just when it is
2056  // intercepted the stack is messed up on return from the interceptor
2057  // which causes random crashes in the browser process. Our hack for now
2058  // is to not invoke the SetPriorityClass API if the dll is loaded.
2059  if (GetModuleHandle(L"cbstext.dll"))
2060    return;
2061#endif  // OS_WIN
2062
2063  // Notify the child process of background state.
2064  Send(new ChildProcessMsg_SetProcessBackgrounded(backgrounded));
2065
2066#if !defined(OS_WIN)
2067  // Backgrounding may require elevated privileges not available to renderer
2068  // processes, so control backgrounding from the process host.
2069
2070  // Windows Vista+ has a fancy process backgrounding mode that can only be set
2071  // from within the process.
2072  child_process_launcher_->SetProcessBackgrounded(backgrounded);
2073#endif  // !OS_WIN
2074}
2075
2076void RenderProcessHostImpl::OnProcessLaunched() {
2077  // No point doing anything, since this object will be destructed soon.  We
2078  // especially don't want to send the RENDERER_PROCESS_CREATED notification,
2079  // since some clients might expect a RENDERER_PROCESS_TERMINATED afterwards to
2080  // properly cleanup.
2081  if (deleting_soon_)
2082    return;
2083
2084  if (child_process_launcher_) {
2085    if (!child_process_launcher_->GetHandle()) {
2086      OnChannelError();
2087      return;
2088    }
2089
2090    SetBackgrounded(backgrounded_);
2091  }
2092
2093  // NOTE: This needs to be before sending queued messages because
2094  // ExtensionService uses this notification to initialize the renderer process
2095  // with state that must be there before any JavaScript executes.
2096  //
2097  // The queued messages contain such things as "navigate". If this notification
2098  // was after, we can end up executing JavaScript before the initialization
2099  // happens.
2100  NotificationService::current()->Notify(
2101      NOTIFICATION_RENDERER_PROCESS_CREATED,
2102      Source<RenderProcessHost>(this),
2103      NotificationService::NoDetails());
2104
2105  // Allow Mojo to be setup before the renderer sees any Chrome IPC messages.
2106  // This way, Mojo can be safely used from the renderer in response to any
2107  // Chrome IPC message.
2108  MaybeActivateMojo();
2109
2110  while (!queued_messages_.empty()) {
2111    Send(queued_messages_.front());
2112    queued_messages_.pop();
2113  }
2114
2115#if defined(ENABLE_WEBRTC)
2116  if (WebRTCInternals::GetInstance()->aec_dump_enabled())
2117    EnableAecDump(WebRTCInternals::GetInstance()->aec_dump_file_path());
2118#endif
2119}
2120
2121scoped_refptr<AudioRendererHost>
2122RenderProcessHostImpl::audio_renderer_host() const {
2123  return audio_renderer_host_;
2124}
2125
2126void RenderProcessHostImpl::OnUserMetricsRecordAction(
2127    const std::string& action) {
2128  RecordComputedAction(action);
2129}
2130
2131void RenderProcessHostImpl::OnCloseACK(int old_route_id) {
2132  SessionStorageHolder* holder = static_cast<SessionStorageHolder*>
2133      (GetUserData(kSessionStorageHolderKey));
2134  if (!holder)
2135    return;
2136  holder->Release(old_route_id);
2137}
2138
2139void RenderProcessHostImpl::OnSavedPageAsMHTML(int job_id, int64 data_size) {
2140  MHTMLGenerationManager::GetInstance()->MHTMLGenerated(job_id, data_size);
2141}
2142
2143void RenderProcessHostImpl::OnCompositorSurfaceBuffersSwappedNoHost(
2144      const ViewHostMsg_CompositorSurfaceBuffersSwapped_Params& params) {
2145  TRACE_EVENT0("renderer_host",
2146               "RenderWidgetHostImpl::OnCompositorSurfaceBuffersSwappedNoHost");
2147  if (!ui::LatencyInfo::Verify(params.latency_info,
2148                               "ViewHostMsg_CompositorSurfaceBuffersSwapped"))
2149    return;
2150  AcceleratedSurfaceMsg_BufferPresented_Params ack_params;
2151  ack_params.sync_point = 0;
2152  RenderWidgetHostImpl::AcknowledgeBufferPresent(params.route_id,
2153                                                 params.gpu_process_host_id,
2154                                                 ack_params);
2155}
2156
2157void RenderProcessHostImpl::OnGpuSwitching() {
2158  // We are updating all widgets including swapped out ones.
2159  scoped_ptr<RenderWidgetHostIterator> widgets(
2160      RenderWidgetHostImpl::GetAllRenderWidgetHosts());
2161  while (RenderWidgetHost* widget = widgets->GetNextHost()) {
2162    if (!widget->IsRenderView())
2163      continue;
2164
2165    // Skip widgets in other processes.
2166    if (widget->GetProcess()->GetID() != GetID())
2167      continue;
2168
2169    RenderViewHost* rvh = RenderViewHost::From(widget);
2170    rvh->UpdateWebkitPreferences(rvh->GetWebkitPreferences());
2171  }
2172}
2173
2174#if defined(ENABLE_WEBRTC)
2175void RenderProcessHostImpl::OnRegisterAecDumpConsumer(int id) {
2176  BrowserThread::PostTask(
2177      BrowserThread::UI,
2178      FROM_HERE,
2179      base::Bind(
2180          &RenderProcessHostImpl::RegisterAecDumpConsumerOnUIThread,
2181          weak_factory_.GetWeakPtr(),
2182          id));
2183}
2184
2185void RenderProcessHostImpl::OnUnregisterAecDumpConsumer(int id) {
2186  BrowserThread::PostTask(
2187      BrowserThread::UI,
2188      FROM_HERE,
2189      base::Bind(
2190          &RenderProcessHostImpl::UnregisterAecDumpConsumerOnUIThread,
2191          weak_factory_.GetWeakPtr(),
2192          id));
2193}
2194
2195void RenderProcessHostImpl::RegisterAecDumpConsumerOnUIThread(int id) {
2196  DCHECK_CURRENTLY_ON(BrowserThread::UI);
2197  aec_dump_consumers_.push_back(id);
2198  if (WebRTCInternals::GetInstance()->aec_dump_enabled()) {
2199    EnableAecDumpForId(WebRTCInternals::GetInstance()->aec_dump_file_path(),
2200                       id);
2201  }
2202}
2203
2204void RenderProcessHostImpl::UnregisterAecDumpConsumerOnUIThread(int id) {
2205  DCHECK_CURRENTLY_ON(BrowserThread::UI);
2206  for (std::vector<int>::iterator it = aec_dump_consumers_.begin();
2207       it != aec_dump_consumers_.end(); ++it) {
2208    if (*it == id) {
2209      aec_dump_consumers_.erase(it);
2210      break;
2211    }
2212  }
2213}
2214
2215#if defined(OS_WIN)
2216#define IntToStringType base::IntToString16
2217#else
2218#define IntToStringType base::IntToString
2219#endif
2220
2221void RenderProcessHostImpl::EnableAecDumpForId(const base::FilePath& file,
2222                                               int id) {
2223  DCHECK_CURRENTLY_ON(BrowserThread::UI);
2224  base::FilePath unique_file =
2225      file.AddExtension(IntToStringType(GetID()))
2226          .AddExtension(IntToStringType(id));
2227  BrowserThread::PostTaskAndReplyWithResult(
2228      BrowserThread::FILE, FROM_HERE,
2229      base::Bind(&CreateAecDumpFileForProcess, unique_file, GetHandle()),
2230      base::Bind(&RenderProcessHostImpl::SendAecDumpFileToRenderer,
2231                 weak_factory_.GetWeakPtr(),
2232                 id));
2233}
2234
2235#undef IntToStringType
2236
2237void RenderProcessHostImpl::SendAecDumpFileToRenderer(
2238    int id,
2239    IPC::PlatformFileForTransit file_for_transit) {
2240  if (file_for_transit == IPC::InvalidPlatformFileForTransit())
2241    return;
2242  Send(new AecDumpMsg_EnableAecDump(id, file_for_transit));
2243}
2244
2245void RenderProcessHostImpl::SendDisableAecDumpToRenderer() {
2246  Send(new AecDumpMsg_DisableAecDump());
2247}
2248#endif
2249
2250void RenderProcessHostImpl::IncrementWorkerRefCount() {
2251  DCHECK_CURRENTLY_ON(BrowserThread::UI);
2252  ++worker_ref_count_;
2253}
2254
2255void RenderProcessHostImpl::DecrementWorkerRefCount() {
2256  DCHECK_CURRENTLY_ON(BrowserThread::UI);
2257  DCHECK_GT(worker_ref_count_, 0);
2258  --worker_ref_count_;
2259  if (worker_ref_count_ == 0)
2260    Cleanup();
2261}
2262
2263void RenderProcessHostImpl::ConnectTo(
2264    const base::StringPiece& service_name,
2265    mojo::ScopedMessagePipeHandle handle) {
2266  mojo_activation_required_ = true;
2267  MaybeActivateMojo();
2268
2269  mojo_application_host_->service_provider()->ConnectToService(
2270      mojo::String::From(service_name),
2271      std::string(),
2272      handle.Pass(),
2273      mojo::String());
2274}
2275
2276void RenderProcessHostImpl::OnAllocateGpuMemoryBuffer(uint32 width,
2277                                                      uint32 height,
2278                                                      uint32 internalformat,
2279                                                      uint32 usage,
2280                                                      IPC::Message* reply) {
2281  DCHECK_CURRENTLY_ON(BrowserThread::UI);
2282  if (!GpuMemoryBufferImpl::IsFormatValid(internalformat) ||
2283      !GpuMemoryBufferImpl::IsUsageValid(usage)) {
2284    GpuMemoryBufferAllocated(reply, gfx::GpuMemoryBufferHandle());
2285    return;
2286  }
2287  base::CheckedNumeric<int> size = width;
2288  size *= height;
2289  if (!size.IsValid()) {
2290    GpuMemoryBufferAllocated(reply, gfx::GpuMemoryBufferHandle());
2291    return;
2292  }
2293
2294#if defined(OS_MACOSX)
2295  // TODO(reveman): This should be moved to
2296  // GpuMemoryBufferImpl::AllocateForChildProcess and
2297  // GpuMemoryBufferImplIOSurface. crbug.com/325045, crbug.com/323304
2298  if (GpuMemoryBufferImplIOSurface::IsConfigurationSupported(internalformat,
2299                                                             usage)) {
2300    base::ScopedCFTypeRef<CFMutableDictionaryRef> properties;
2301    properties.reset(
2302        CFDictionaryCreateMutable(kCFAllocatorDefault,
2303                                  0,
2304                                  &kCFTypeDictionaryKeyCallBacks,
2305                                  &kCFTypeDictionaryValueCallBacks));
2306    AddIntegerValue(properties, kIOSurfaceWidth, width);
2307    AddIntegerValue(properties, kIOSurfaceHeight, height);
2308    AddIntegerValue(properties,
2309                    kIOSurfaceBytesPerElement,
2310                    GpuMemoryBufferImpl::BytesPerPixel(internalformat));
2311    AddIntegerValue(
2312        properties,
2313        kIOSurfacePixelFormat,
2314        GpuMemoryBufferImplIOSurface::PixelFormat(internalformat));
2315    // TODO(reveman): Remove this when using a mach_port_t to transfer
2316    // IOSurface to renderer process. crbug.com/323304
2317    AddBooleanValue(
2318        properties, kIOSurfaceIsGlobal, true);
2319
2320    base::ScopedCFTypeRef<IOSurfaceRef> io_surface(IOSurfaceCreate(properties));
2321    if (io_surface) {
2322      gfx::GpuMemoryBufferHandle handle;
2323      handle.type = gfx::IO_SURFACE_BUFFER;
2324      handle.io_surface_id = IOSurfaceGetID(io_surface);
2325
2326      // TODO(reveman): This makes the assumption that the renderer will
2327      // grab a reference to the surface before sending another message.
2328      // crbug.com/325045
2329      last_io_surface_ = io_surface;
2330      GpuMemoryBufferAllocated(reply, handle);
2331      return;
2332    }
2333  }
2334#endif
2335
2336#if defined(OS_ANDROID)
2337  // TODO(reveman): This should be moved to
2338  // GpuMemoryBufferImpl::AllocateForChildProcess and
2339  // GpuMemoryBufferImplSurfaceTexture when adding support for out-of-process
2340  // GPU service. crbug.com/368716
2341  if (GpuMemoryBufferImplSurfaceTexture::IsConfigurationSupported(
2342          internalformat, usage)) {
2343    // Each surface texture is associated with a render process id. This allows
2344    // the GPU service and Java Binder IPC to verify that a renderer is not
2345    // trying to use a surface texture it doesn't own.
2346    int surface_texture_id = CompositorImpl::CreateSurfaceTexture(GetID());
2347    if (surface_texture_id != -1) {
2348      gfx::GpuMemoryBufferHandle handle;
2349      handle.type = gfx::SURFACE_TEXTURE_BUFFER;
2350      handle.surface_texture_id =
2351          gfx::SurfaceTextureId(surface_texture_id, GetID());
2352      GpuMemoryBufferAllocated(reply, handle);
2353      return;
2354    }
2355  }
2356#endif
2357
2358  GpuMemoryBufferImpl::AllocateForChildProcess(
2359      gfx::Size(width, height),
2360      internalformat,
2361      usage,
2362      GetHandle(),
2363      base::Bind(&RenderProcessHostImpl::GpuMemoryBufferAllocated,
2364                 weak_factory_.GetWeakPtr(),
2365                 reply));
2366}
2367
2368void RenderProcessHostImpl::GpuMemoryBufferAllocated(
2369    IPC::Message* reply,
2370    const gfx::GpuMemoryBufferHandle& handle) {
2371  DCHECK_CURRENTLY_ON(BrowserThread::UI);
2372  ChildProcessHostMsg_SyncAllocateGpuMemoryBuffer::WriteReplyParams(reply,
2373                                                                    handle);
2374  Send(reply);
2375}
2376
2377}  // namespace content
2378