Home | History | Annotate | Download | only in renderer_host
      1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 // Represents the browser side of the browser <--> renderer communication
      6 // channel. There will be one RenderProcessHost per renderer process.
      7 
      8 #include "content/browser/renderer_host/render_process_host_impl.h"
      9 
     10 #include <algorithm>
     11 #include <limits>
     12 #include <vector>
     13 
     14 #if defined(OS_POSIX)
     15 #include <utility>  // for pair<>
     16 #endif
     17 
     18 #include "base/base_switches.h"
     19 #include "base/bind.h"
     20 #include "base/bind_helpers.h"
     21 #include "base/callback.h"
     22 #include "base/command_line.h"
     23 #include "base/debug/trace_event.h"
     24 #include "base/files/file.h"
     25 #include "base/lazy_instance.h"
     26 #include "base/logging.h"
     27 #include "base/metrics/field_trial.h"
     28 #include "base/metrics/histogram.h"
     29 #include "base/path_service.h"
     30 #include "base/process/process_handle.h"
     31 #include "base/rand_util.h"
     32 #include "base/stl_util.h"
     33 #include "base/strings/string_number_conversions.h"
     34 #include "base/strings/string_util.h"
     35 #include "base/supports_user_data.h"
     36 #include "base/sys_info.h"
     37 #include "base/threading/thread.h"
     38 #include "base/threading/thread_restrictions.h"
     39 #include "base/tracked_objects.h"
     40 #include "cc/base/switches.h"
     41 #include "content/browser/appcache/appcache_dispatcher_host.h"
     42 #include "content/browser/appcache/chrome_appcache_service.h"
     43 #include "content/browser/battery_status/battery_status_message_filter.h"
     44 #include "content/browser/browser_child_process_host_impl.h"
     45 #include "content/browser/browser_main.h"
     46 #include "content/browser/browser_main_loop.h"
     47 #include "content/browser/browser_plugin/browser_plugin_message_filter.h"
     48 #include "content/browser/child_process_security_policy_impl.h"
     49 #include "content/browser/device_sensors/device_light_message_filter.h"
     50 #include "content/browser/device_sensors/device_motion_message_filter.h"
     51 #include "content/browser/device_sensors/device_orientation_message_filter.h"
     52 #include "content/browser/dom_storage/dom_storage_context_wrapper.h"
     53 #include "content/browser/dom_storage/dom_storage_message_filter.h"
     54 #include "content/browser/download/mhtml_generation_manager.h"
     55 #include "content/browser/fileapi/chrome_blob_storage_context.h"
     56 #include "content/browser/fileapi/fileapi_message_filter.h"
     57 #include "content/browser/frame_host/render_frame_message_filter.h"
     58 #include "content/browser/gpu/compositor_util.h"
     59 #include "content/browser/gpu/gpu_data_manager_impl.h"
     60 #include "content/browser/gpu/gpu_process_host.h"
     61 #include "content/browser/gpu/shader_disk_cache.h"
     62 #include "content/browser/histogram_message_filter.h"
     63 #include "content/browser/indexed_db/indexed_db_context_impl.h"
     64 #include "content/browser/indexed_db/indexed_db_dispatcher_host.h"
     65 #include "content/browser/loader/resource_message_filter.h"
     66 #include "content/browser/loader/resource_scheduler_filter.h"
     67 #include "content/browser/media/capture/audio_mirroring_manager.h"
     68 #include "content/browser/media/media_internals.h"
     69 #include "content/browser/media/midi_host.h"
     70 #include "content/browser/message_port_message_filter.h"
     71 #include "content/browser/mime_registry_message_filter.h"
     72 #include "content/browser/mojo/mojo_application_host.h"
     73 #include "content/browser/profiler_message_filter.h"
     74 #include "content/browser/push_messaging_message_filter.h"
     75 #include "content/browser/quota_dispatcher_host.h"
     76 #include "content/browser/renderer_host/clipboard_message_filter.h"
     77 #include "content/browser/renderer_host/database_message_filter.h"
     78 #include "content/browser/renderer_host/file_utilities_message_filter.h"
     79 #include "content/browser/renderer_host/gamepad_browser_message_filter.h"
     80 #include "content/browser/renderer_host/gpu_message_filter.h"
     81 #include "content/browser/renderer_host/media/audio_input_renderer_host.h"
     82 #include "content/browser/renderer_host/media/audio_renderer_host.h"
     83 #include "content/browser/renderer_host/media/device_request_message_filter.h"
     84 #include "content/browser/renderer_host/media/media_stream_dispatcher_host.h"
     85 #include "content/browser/renderer_host/media/peer_connection_tracker_host.h"
     86 #include "content/browser/renderer_host/media/video_capture_host.h"
     87 #include "content/browser/renderer_host/memory_benchmark_message_filter.h"
     88 #include "content/browser/renderer_host/pepper/pepper_message_filter.h"
     89 #include "content/browser/renderer_host/pepper/pepper_renderer_connection.h"
     90 #include "content/browser/renderer_host/render_message_filter.h"
     91 #include "content/browser/renderer_host/render_view_host_delegate.h"
     92 #include "content/browser/renderer_host/render_view_host_impl.h"
     93 #include "content/browser/renderer_host/render_widget_helper.h"
     94 #include "content/browser/renderer_host/render_widget_host_impl.h"
     95 #include "content/browser/renderer_host/socket_stream_dispatcher_host.h"
     96 #include "content/browser/renderer_host/text_input_client_message_filter.h"
     97 #include "content/browser/renderer_host/websocket_dispatcher_host.h"
     98 #include "content/browser/resolve_proxy_msg_helper.h"
     99 #include "content/browser/service_worker/service_worker_context_wrapper.h"
    100 #include "content/browser/service_worker/service_worker_dispatcher_host.h"
    101 #include "content/browser/shared_worker/shared_worker_message_filter.h"
    102 #include "content/browser/shared_worker/worker_storage_partition.h"
    103 #include "content/browser/speech/speech_recognition_dispatcher_host.h"
    104 #include "content/browser/storage_partition_impl.h"
    105 #include "content/browser/streams/stream_context.h"
    106 #include "content/browser/tracing/trace_message_filter.h"
    107 #include "content/browser/vibration/vibration_message_filter.h"
    108 #include "content/browser/webui/web_ui_controller_factory_registry.h"
    109 #include "content/common/child_process_host_impl.h"
    110 #include "content/common/child_process_messages.h"
    111 #include "content/common/content_switches_internal.h"
    112 #include "content/common/gpu/gpu_messages.h"
    113 #include "content/common/mojo/mojo_messages.h"
    114 #include "content/common/resource_messages.h"
    115 #include "content/common/view_messages.h"
    116 #include "content/public/browser/browser_context.h"
    117 #include "content/public/browser/content_browser_client.h"
    118 #include "content/public/browser/notification_service.h"
    119 #include "content/public/browser/notification_types.h"
    120 #include "content/public/browser/render_process_host_factory.h"
    121 #include "content/public/browser/render_process_host_observer.h"
    122 #include "content/public/browser/render_widget_host.h"
    123 #include "content/public/browser/render_widget_host_iterator.h"
    124 #include "content/public/browser/render_widget_host_view_frame_subscriber.h"
    125 #include "content/public/browser/resource_context.h"
    126 #include "content/public/browser/user_metrics.h"
    127 #include "content/public/browser/worker_service.h"
    128 #include "content/public/common/content_constants.h"
    129 #include "content/public/common/content_switches.h"
    130 #include "content/public/common/process_type.h"
    131 #include "content/public/common/resource_type.h"
    132 #include "content/public/common/result_codes.h"
    133 #include "content/public/common/sandboxed_process_launcher_delegate.h"
    134 #include "content/public/common/url_constants.h"
    135 #include "gpu/command_buffer/service/gpu_switches.h"
    136 #include "ipc/ipc_channel.h"
    137 #include "ipc/ipc_logging.h"
    138 #include "ipc/ipc_switches.h"
    139 #include "ipc/mojo/ipc_channel_mojo.h"
    140 #include "ipc/mojo/ipc_channel_mojo_host.h"
    141 #include "media/base/media_switches.h"
    142 #include "net/url_request/url_request_context_getter.h"
    143 #include "ppapi/shared_impl/ppapi_switches.h"
    144 #include "storage/browser/fileapi/sandbox_file_system_backend.h"
    145 #include "third_party/skia/include/core/SkBitmap.h"
    146 #include "ui/base/ui_base_switches.h"
    147 #include "ui/events/event_switches.h"
    148 #include "ui/gfx/switches.h"
    149 #include "ui/gl/gl_switches.h"
    150 #include "ui/native_theme/native_theme_switches.h"
    151 
    152 #if defined(OS_ANDROID)
    153 #include "content/browser/media/android/browser_demuxer_android.h"
    154 #include "content/browser/screen_orientation/screen_orientation_message_filter_android.h"
    155 #endif
    156 
    157 #if defined(OS_WIN)
    158 #include "base/win/scoped_com_initializer.h"
    159 #include "content/common/font_cache_dispatcher_win.h"
    160 #include "content/common/sandbox_win.h"
    161 #include "ui/gfx/win/dpi.h"
    162 #endif
    163 
    164 #if defined(ENABLE_BROWSER_CDMS)
    165 #include "content/browser/media/cdm/browser_cdm_manager.h"
    166 #endif
    167 
    168 #if defined(ENABLE_PLUGINS)
    169 #include "content/browser/plugin_service_impl.h"
    170 #endif
    171 
    172 #if defined(ENABLE_WEBRTC)
    173 #include "content/browser/media/webrtc_internals.h"
    174 #include "content/browser/renderer_host/media/media_stream_track_metrics_host.h"
    175 #include "content/browser/renderer_host/media/webrtc_identity_service_host.h"
    176 #include "content/browser/renderer_host/p2p/socket_dispatcher_host.h"
    177 #include "content/common/media/aec_dump_messages.h"
    178 #include "content/common/media/media_stream_messages.h"
    179 #endif
    180 
    181 extern bool g_exited_main_message_loop;
    182 
    183 namespace content {
    184 namespace {
    185 
    186 const char kSiteProcessMapKeyName[] = "content_site_process_map";
    187 
    188 void CacheShaderInfo(int32 id, base::FilePath path) {
    189   ShaderCacheFactory::GetInstance()->SetCacheInfo(id, path);
    190 }
    191 
    192 void RemoveShaderInfo(int32 id) {
    193   ShaderCacheFactory::GetInstance()->RemoveCacheInfo(id);
    194 }
    195 
    196 net::URLRequestContext* GetRequestContext(
    197     scoped_refptr<net::URLRequestContextGetter> request_context,
    198     scoped_refptr<net::URLRequestContextGetter> media_request_context,
    199     ResourceType resource_type) {
    200   // If the request has resource type of RESOURCE_TYPE_MEDIA, we use a request
    201   // context specific to media for handling it because these resources have
    202   // specific needs for caching.
    203   if (resource_type == RESOURCE_TYPE_MEDIA)
    204     return media_request_context->GetURLRequestContext();
    205   return request_context->GetURLRequestContext();
    206 }
    207 
    208 void GetContexts(
    209     ResourceContext* resource_context,
    210     scoped_refptr<net::URLRequestContextGetter> request_context,
    211     scoped_refptr<net::URLRequestContextGetter> media_request_context,
    212     const ResourceHostMsg_Request& request,
    213     ResourceContext** resource_context_out,
    214     net::URLRequestContext** request_context_out) {
    215   *resource_context_out = resource_context;
    216   *request_context_out =
    217       GetRequestContext(request_context, media_request_context,
    218                         request.resource_type);
    219 }
    220 
    221 #if defined(ENABLE_WEBRTC)
    222 // Creates a file used for diagnostic echo canceller recordings for handing
    223 // over to the renderer.
    224 IPC::PlatformFileForTransit CreateAecDumpFileForProcess(
    225     base::FilePath file_path,
    226     base::ProcessHandle process) {
    227   DCHECK_CURRENTLY_ON(BrowserThread::FILE);
    228   base::File dump_file(file_path,
    229                        base::File::FLAG_OPEN_ALWAYS | base::File::FLAG_APPEND);
    230   if (!dump_file.IsValid()) {
    231     VLOG(1) << "Could not open AEC dump file, error=" <<
    232                dump_file.error_details();
    233     return IPC::InvalidPlatformFileForTransit();
    234   }
    235   return IPC::TakeFileHandleForProcess(dump_file.Pass(), process);
    236 }
    237 
    238 // Does nothing. Just to avoid races between enable and disable.
    239 void DisableAecDumpOnFileThread() {
    240   DCHECK_CURRENTLY_ON(BrowserThread::FILE);
    241 }
    242 #endif
    243 
    244 // the global list of all renderer processes
    245 base::LazyInstance<IDMap<RenderProcessHost> >::Leaky
    246     g_all_hosts = LAZY_INSTANCE_INITIALIZER;
    247 
    248 // Map of site to process, to ensure we only have one RenderProcessHost per
    249 // site in process-per-site mode.  Each map is specific to a BrowserContext.
    250 class SiteProcessMap : public base::SupportsUserData::Data {
    251  public:
    252   typedef base::hash_map<std::string, RenderProcessHost*> SiteToProcessMap;
    253   SiteProcessMap() {}
    254 
    255   void RegisterProcess(const std::string& site, RenderProcessHost* process) {
    256     map_[site] = process;
    257   }
    258 
    259   RenderProcessHost* FindProcess(const std::string& site) {
    260     SiteToProcessMap::iterator i = map_.find(site);
    261     if (i != map_.end())
    262       return i->second;
    263     return NULL;
    264   }
    265 
    266   void RemoveProcess(RenderProcessHost* host) {
    267     // Find all instances of this process in the map, then separately remove
    268     // them.
    269     std::set<std::string> sites;
    270     for (SiteToProcessMap::const_iterator i = map_.begin();
    271          i != map_.end();
    272          i++) {
    273       if (i->second == host)
    274         sites.insert(i->first);
    275     }
    276     for (std::set<std::string>::iterator i = sites.begin();
    277          i != sites.end();
    278          i++) {
    279       SiteToProcessMap::iterator iter = map_.find(*i);
    280       if (iter != map_.end()) {
    281         DCHECK_EQ(iter->second, host);
    282         map_.erase(iter);
    283       }
    284     }
    285   }
    286 
    287  private:
    288   SiteToProcessMap map_;
    289 };
    290 
    291 // Find the SiteProcessMap specific to the given context.
    292 SiteProcessMap* GetSiteProcessMapForBrowserContext(BrowserContext* context) {
    293   DCHECK(context);
    294   SiteProcessMap* map = static_cast<SiteProcessMap*>(
    295       context->GetUserData(kSiteProcessMapKeyName));
    296   if (!map) {
    297     map = new SiteProcessMap();
    298     context->SetUserData(kSiteProcessMapKeyName, map);
    299   }
    300   return map;
    301 }
    302 
    303 // NOTE: changes to this class need to be reviewed by the security team.
    304 class RendererSandboxedProcessLauncherDelegate
    305     : public SandboxedProcessLauncherDelegate {
    306  public:
    307   explicit RendererSandboxedProcessLauncherDelegate(IPC::ChannelProxy* channel)
    308 #if defined(OS_POSIX)
    309        : ipc_fd_(channel->TakeClientFileDescriptor())
    310 #endif  // OS_POSIX
    311   {}
    312 
    313   virtual ~RendererSandboxedProcessLauncherDelegate() {}
    314 
    315 #if defined(OS_WIN)
    316   virtual void PreSpawnTarget(sandbox::TargetPolicy* policy,
    317                               bool* success) {
    318     AddBaseHandleClosePolicy(policy);
    319     GetContentClient()->browser()->PreSpawnRenderer(policy, success);
    320   }
    321 
    322 #elif defined(OS_POSIX)
    323   virtual bool ShouldUseZygote() OVERRIDE {
    324     const base::CommandLine& browser_command_line =
    325         *base::CommandLine::ForCurrentProcess();
    326     base::CommandLine::StringType renderer_prefix =
    327         browser_command_line.GetSwitchValueNative(switches::kRendererCmdPrefix);
    328     return renderer_prefix.empty();
    329   }
    330   virtual int GetIpcFd() OVERRIDE {
    331     return ipc_fd_;
    332   }
    333 #endif  // OS_WIN
    334 
    335  private:
    336 #if defined(OS_POSIX)
    337   int ipc_fd_;
    338 #endif  // OS_POSIX
    339 };
    340 
    341 const char kSessionStorageHolderKey[] = "kSessionStorageHolderKey";
    342 
    343 class SessionStorageHolder : public base::SupportsUserData::Data {
    344  public:
    345   SessionStorageHolder() {}
    346   virtual ~SessionStorageHolder() {}
    347 
    348   void Hold(const SessionStorageNamespaceMap& sessions, int view_route_id) {
    349     session_storage_namespaces_awaiting_close_[view_route_id] = sessions;
    350   }
    351 
    352   void Release(int old_route_id) {
    353     session_storage_namespaces_awaiting_close_.erase(old_route_id);
    354   }
    355 
    356  private:
    357   std::map<int, SessionStorageNamespaceMap >
    358       session_storage_namespaces_awaiting_close_;
    359   DISALLOW_COPY_AND_ASSIGN(SessionStorageHolder);
    360 };
    361 
    362 }  // namespace
    363 
    364 RendererMainThreadFactoryFunction g_renderer_main_thread_factory = NULL;
    365 
    366 base::MessageLoop* g_in_process_thread;
    367 
    368 base::MessageLoop*
    369     RenderProcessHostImpl::GetInProcessRendererThreadForTesting() {
    370   return g_in_process_thread;
    371 }
    372 
    373 // Stores the maximum number of renderer processes the content module can
    374 // create.
    375 static size_t g_max_renderer_count_override = 0;
    376 
    377 // static
    378 size_t RenderProcessHost::GetMaxRendererProcessCount() {
    379   if (g_max_renderer_count_override)
    380     return g_max_renderer_count_override;
    381 
    382 #if defined(OS_ANDROID)
    383   // On Android we don't maintain a limit of renderer process hosts - we are
    384   // happy with keeping a lot of these, as long as the number of live renderer
    385   // processes remains reasonable, and on Android the OS takes care of that.
    386   return std::numeric_limits<size_t>::max();
    387 #endif
    388 
    389   // On other platforms, we calculate the maximum number of renderer process
    390   // hosts according to the amount of installed memory as reported by the OS.
    391   // The calculation assumes that you want the renderers to use half of the
    392   // installed RAM and assuming that each WebContents uses ~40MB.  If you modify
    393   // this assumption, you need to adjust the ThirtyFourTabs test to match the
    394   // expected number of processes.
    395   //
    396   // With the given amounts of installed memory below on a 32-bit CPU, the
    397   // maximum renderer count will roughly be as follows:
    398   //
    399   //   128 MB -> 3
    400   //   512 MB -> 6
    401   //  1024 MB -> 12
    402   //  4096 MB -> 51
    403   // 16384 MB -> 82 (kMaxRendererProcessCount)
    404 
    405   static size_t max_count = 0;
    406   if (!max_count) {
    407     const size_t kEstimatedWebContentsMemoryUsage =
    408 #if defined(ARCH_CPU_64_BITS)
    409         60;  // In MB
    410 #else
    411         40;  // In MB
    412 #endif
    413     max_count = base::SysInfo::AmountOfPhysicalMemoryMB() / 2;
    414     max_count /= kEstimatedWebContentsMemoryUsage;
    415 
    416     const size_t kMinRendererProcessCount = 3;
    417     max_count = std::max(max_count, kMinRendererProcessCount);
    418     max_count = std::min(max_count, kMaxRendererProcessCount);
    419   }
    420   return max_count;
    421 }
    422 
    423 // static
    424 bool g_run_renderer_in_process_ = false;
    425 
    426 // static
    427 void RenderProcessHost::SetMaxRendererProcessCount(size_t count) {
    428   g_max_renderer_count_override = count;
    429 }
    430 
    431 RenderProcessHostImpl::RenderProcessHostImpl(
    432     BrowserContext* browser_context,
    433     StoragePartitionImpl* storage_partition_impl,
    434     bool is_isolated_guest)
    435     : fast_shutdown_started_(false),
    436       deleting_soon_(false),
    437 #ifndef NDEBUG
    438       is_self_deleted_(false),
    439 #endif
    440       pending_views_(0),
    441       mojo_application_host_(new MojoApplicationHost),
    442       mojo_activation_required_(false),
    443       visible_widgets_(0),
    444       backgrounded_(true),
    445       is_initialized_(false),
    446       id_(ChildProcessHostImpl::GenerateChildProcessUniqueId()),
    447       browser_context_(browser_context),
    448       storage_partition_impl_(storage_partition_impl),
    449       sudden_termination_allowed_(true),
    450       ignore_input_events_(false),
    451       is_isolated_guest_(is_isolated_guest),
    452       gpu_observer_registered_(false),
    453       delayed_cleanup_needed_(false),
    454       within_process_died_observer_(false),
    455       power_monitor_broadcaster_(this),
    456       worker_ref_count_(0),
    457       weak_factory_(this) {
    458   widget_helper_ = new RenderWidgetHelper();
    459 
    460   ChildProcessSecurityPolicyImpl::GetInstance()->Add(GetID());
    461 
    462   CHECK(!g_exited_main_message_loop);
    463   RegisterHost(GetID(), this);
    464   g_all_hosts.Get().set_check_on_null_data(true);
    465   // Initialize |child_process_activity_time_| to a reasonable value.
    466   mark_child_process_activity_time();
    467 
    468   if (!GetBrowserContext()->IsOffTheRecord() &&
    469       !base::CommandLine::ForCurrentProcess()->HasSwitch(
    470           switches::kDisableGpuShaderDiskCache)) {
    471     BrowserThread::PostTask(BrowserThread::IO, FROM_HERE,
    472                             base::Bind(&CacheShaderInfo, GetID(),
    473                                        storage_partition_impl_->GetPath()));
    474   }
    475 
    476   // Note: When we create the RenderProcessHostImpl, it's technically
    477   //       backgrounded, because it has no visible listeners.  But the process
    478   //       doesn't actually exist yet, so we'll Background it later, after
    479   //       creation.
    480 }
    481 
    482 // static
    483 void RenderProcessHostImpl::ShutDownInProcessRenderer() {
    484   DCHECK(g_run_renderer_in_process_);
    485 
    486   switch (g_all_hosts.Pointer()->size()) {
    487     case 0:
    488       return;
    489     case 1: {
    490       RenderProcessHostImpl* host = static_cast<RenderProcessHostImpl*>(
    491           AllHostsIterator().GetCurrentValue());
    492       FOR_EACH_OBSERVER(RenderProcessHostObserver,
    493                         host->observers_,
    494                         RenderProcessHostDestroyed(host));
    495 #ifndef NDEBUG
    496       host->is_self_deleted_ = true;
    497 #endif
    498       delete host;
    499       return;
    500     }
    501     default:
    502       NOTREACHED() << "There should be only one RenderProcessHost when running "
    503                    << "in-process.";
    504   }
    505 }
    506 
    507 void RenderProcessHostImpl::RegisterRendererMainThreadFactory(
    508     RendererMainThreadFactoryFunction create) {
    509   g_renderer_main_thread_factory = create;
    510 }
    511 
    512 RenderProcessHostImpl::~RenderProcessHostImpl() {
    513 #ifndef NDEBUG
    514   DCHECK(is_self_deleted_)
    515       << "RenderProcessHostImpl is destroyed by something other than itself";
    516 #endif
    517 
    518   // Make sure to clean up the in-process renderer before the channel, otherwise
    519   // it may still run and have its IPCs fail, causing asserts.
    520   in_process_renderer_.reset();
    521 
    522   ChildProcessSecurityPolicyImpl::GetInstance()->Remove(GetID());
    523 
    524   if (gpu_observer_registered_) {
    525     GpuDataManagerImpl::GetInstance()->RemoveObserver(this);
    526     gpu_observer_registered_ = false;
    527   }
    528 
    529   // We may have some unsent messages at this point, but that's OK.
    530   channel_.reset();
    531   while (!queued_messages_.empty()) {
    532     delete queued_messages_.front();
    533     queued_messages_.pop();
    534   }
    535 
    536   UnregisterHost(GetID());
    537 
    538   if (!base::CommandLine::ForCurrentProcess()->HasSwitch(
    539       switches::kDisableGpuShaderDiskCache)) {
    540     BrowserThread::PostTask(BrowserThread::IO, FROM_HERE,
    541                             base::Bind(&RemoveShaderInfo, GetID()));
    542   }
    543 }
    544 
    545 void RenderProcessHostImpl::EnableSendQueue() {
    546   is_initialized_ = false;
    547 }
    548 
    549 bool RenderProcessHostImpl::Init() {
    550   // calling Init() more than once does nothing, this makes it more convenient
    551   // for the view host which may not be sure in some cases
    552   if (channel_)
    553     return true;
    554 
    555   base::CommandLine::StringType renderer_prefix;
    556 #if defined(OS_POSIX)
    557   // A command prefix is something prepended to the command line of the spawned
    558   // process. It is supported only on POSIX systems.
    559   const base::CommandLine& browser_command_line =
    560       *base::CommandLine::ForCurrentProcess();
    561   renderer_prefix =
    562       browser_command_line.GetSwitchValueNative(switches::kRendererCmdPrefix);
    563 #endif  // defined(OS_POSIX)
    564 
    565 #if defined(OS_LINUX)
    566   int flags = renderer_prefix.empty() ? ChildProcessHost::CHILD_ALLOW_SELF :
    567                                         ChildProcessHost::CHILD_NORMAL;
    568 #else
    569   int flags = ChildProcessHost::CHILD_NORMAL;
    570 #endif
    571 
    572   // Find the renderer before creating the channel so if this fails early we
    573   // return without creating the channel.
    574   base::FilePath renderer_path = ChildProcessHost::GetChildPath(flags);
    575   if (renderer_path.empty())
    576     return false;
    577 
    578   // Setup the IPC channel.
    579   const std::string channel_id =
    580       IPC::Channel::GenerateVerifiedChannelID(std::string());
    581   channel_ = CreateChannelProxy(channel_id);
    582 
    583   // Setup the Mojo channel.
    584   mojo_application_host_->Init();
    585 
    586   // Call the embedder first so that their IPC filters have priority.
    587   GetContentClient()->browser()->RenderProcessWillLaunch(this);
    588 
    589   CreateMessageFilters();
    590 
    591   if (run_renderer_in_process()) {
    592     DCHECK(g_renderer_main_thread_factory);
    593     // Crank up a thread and run the initialization there.  With the way that
    594     // messages flow between the browser and renderer, this thread is required
    595     // to prevent a deadlock in single-process mode.  Since the primordial
    596     // thread in the renderer process runs the WebKit code and can sometimes
    597     // make blocking calls to the UI thread (i.e. this thread), they need to run
    598     // on separate threads.
    599     in_process_renderer_.reset(g_renderer_main_thread_factory(channel_id));
    600 
    601     base::Thread::Options options;
    602 #if defined(OS_WIN) && !defined(OS_MACOSX)
    603     // In-process plugins require this to be a UI message loop.
    604     options.message_loop_type = base::MessageLoop::TYPE_UI;
    605 #else
    606     // We can't have multiple UI loops on Linux and Android, so we don't support
    607     // in-process plugins.
    608     options.message_loop_type = base::MessageLoop::TYPE_DEFAULT;
    609 #endif
    610     in_process_renderer_->StartWithOptions(options);
    611 
    612     g_in_process_thread = in_process_renderer_->message_loop();
    613 
    614     OnProcessLaunched();  // Fake a callback that the process is ready.
    615   } else {
    616     // Build command line for renderer.  We call AppendRendererCommandLine()
    617     // first so the process type argument will appear first.
    618     base::CommandLine* cmd_line = new base::CommandLine(renderer_path);
    619     if (!renderer_prefix.empty())
    620       cmd_line->PrependWrapper(renderer_prefix);
    621     AppendRendererCommandLine(cmd_line);
    622     cmd_line->AppendSwitchASCII(switches::kProcessChannelID, channel_id);
    623 
    624     // Spawn the child process asynchronously to avoid blocking the UI thread.
    625     // As long as there's no renderer prefix, we can use the zygote process
    626     // at this stage.
    627     child_process_launcher_.reset(new ChildProcessLauncher(
    628         new RendererSandboxedProcessLauncherDelegate(channel_.get()),
    629         cmd_line,
    630         GetID(),
    631         this));
    632 
    633     fast_shutdown_started_ = false;
    634   }
    635 
    636   if (!gpu_observer_registered_) {
    637     gpu_observer_registered_ = true;
    638     GpuDataManagerImpl::GetInstance()->AddObserver(this);
    639   }
    640 
    641   power_monitor_broadcaster_.Init();
    642 
    643   is_initialized_ = true;
    644   return true;
    645 }
    646 
    647 void RenderProcessHostImpl::MaybeActivateMojo() {
    648   // TODO(darin): Following security review, we can unconditionally initialize
    649   // Mojo in all renderers. We will then be able to directly call Activate()
    650   // from OnProcessLaunched.
    651   if (!mojo_activation_required_)
    652     return;  // Waiting on someone to require Mojo.
    653 
    654   if (!GetHandle())
    655     return;  // Waiting on renderer startup.
    656 
    657   if (!mojo_application_host_->did_activate())
    658     mojo_application_host_->Activate(this, GetHandle());
    659 }
    660 
    661 bool RenderProcessHostImpl::ShouldUseMojoChannel() const {
    662   const base::CommandLine& command_line =
    663       *base::CommandLine::ForCurrentProcess();
    664   return command_line.HasSwitch(switches::kEnableRendererMojoChannel);
    665 }
    666 
    667 scoped_ptr<IPC::ChannelProxy> RenderProcessHostImpl::CreateChannelProxy(
    668     const std::string& channel_id) {
    669   scoped_refptr<base::SingleThreadTaskRunner> runner =
    670       BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO);
    671   if (ShouldUseMojoChannel()) {
    672     VLOG(1) << "Mojo Channel is enabled on host";
    673     if (!channel_mojo_host_) {
    674       channel_mojo_host_.reset(new IPC::ChannelMojoHost(
    675           BrowserThread::GetMessageLoopProxyForThread(BrowserThread::IO)));
    676     }
    677 
    678     return IPC::ChannelProxy::Create(
    679         IPC::ChannelMojo::CreateServerFactory(
    680             channel_mojo_host_->channel_delegate(), channel_id),
    681         this,
    682         runner.get());
    683   }
    684 
    685   return IPC::ChannelProxy::Create(
    686       channel_id, IPC::Channel::MODE_SERVER, this, runner.get());
    687 }
    688 
    689 void RenderProcessHostImpl::CreateMessageFilters() {
    690   DCHECK_CURRENTLY_ON(BrowserThread::UI);
    691   AddFilter(new ResourceSchedulerFilter(GetID()));
    692   MediaInternals* media_internals = MediaInternals::GetInstance();
    693   media::AudioManager* audio_manager =
    694       BrowserMainLoop::GetInstance()->audio_manager();
    695   // Add BrowserPluginMessageFilter to ensure it gets the first stab at messages
    696   // from guests.
    697   scoped_refptr<BrowserPluginMessageFilter> bp_message_filter(
    698       new BrowserPluginMessageFilter(GetID()));
    699   AddFilter(bp_message_filter.get());
    700 
    701   scoped_refptr<RenderMessageFilter> render_message_filter(
    702       new RenderMessageFilter(
    703           GetID(),
    704 #if defined(ENABLE_PLUGINS)
    705           PluginServiceImpl::GetInstance(),
    706 #else
    707           NULL,
    708 #endif
    709           GetBrowserContext(),
    710           GetBrowserContext()->GetRequestContextForRenderProcess(GetID()),
    711           widget_helper_.get(),
    712           audio_manager,
    713           media_internals,
    714           storage_partition_impl_->GetDOMStorageContext()));
    715   AddFilter(render_message_filter.get());
    716   AddFilter(
    717       new RenderFrameMessageFilter(GetID(), widget_helper_.get()));
    718   BrowserContext* browser_context = GetBrowserContext();
    719   ResourceContext* resource_context = browser_context->GetResourceContext();
    720 
    721   scoped_refptr<net::URLRequestContextGetter> request_context(
    722       browser_context->GetRequestContextForRenderProcess(GetID()));
    723   scoped_refptr<net::URLRequestContextGetter> media_request_context(
    724       browser_context->GetMediaRequestContextForRenderProcess(GetID()));
    725 
    726   ResourceMessageFilter::GetContextsCallback get_contexts_callback(
    727       base::Bind(&GetContexts, browser_context->GetResourceContext(),
    728                  request_context, media_request_context));
    729 
    730   ResourceMessageFilter* resource_message_filter = new ResourceMessageFilter(
    731       GetID(), PROCESS_TYPE_RENDERER,
    732       storage_partition_impl_->GetAppCacheService(),
    733       ChromeBlobStorageContext::GetFor(browser_context),
    734       storage_partition_impl_->GetFileSystemContext(),
    735       storage_partition_impl_->GetServiceWorkerContext(),
    736       get_contexts_callback);
    737 
    738   AddFilter(resource_message_filter);
    739   MediaStreamManager* media_stream_manager =
    740       BrowserMainLoop::GetInstance()->media_stream_manager();
    741   AddFilter(new AudioInputRendererHost(
    742       audio_manager,
    743       media_stream_manager,
    744       AudioMirroringManager::GetInstance(),
    745       BrowserMainLoop::GetInstance()->user_input_monitor()));
    746   // The AudioRendererHost needs to be available for lookup, so it's
    747   // stashed in a member variable.
    748   audio_renderer_host_ = new AudioRendererHost(
    749       GetID(),
    750       audio_manager,
    751       AudioMirroringManager::GetInstance(),
    752       media_internals,
    753       media_stream_manager);
    754   AddFilter(audio_renderer_host_.get());
    755   AddFilter(
    756       new MidiHost(GetID(), BrowserMainLoop::GetInstance()->midi_manager()));
    757   AddFilter(new VideoCaptureHost(media_stream_manager));
    758   AddFilter(new AppCacheDispatcherHost(
    759       storage_partition_impl_->GetAppCacheService(),
    760       GetID()));
    761   AddFilter(new ClipboardMessageFilter);
    762   AddFilter(new DOMStorageMessageFilter(
    763       GetID(),
    764       storage_partition_impl_->GetDOMStorageContext()));
    765   AddFilter(new IndexedDBDispatcherHost(
    766       GetID(),
    767       storage_partition_impl_->GetURLRequestContext(),
    768       storage_partition_impl_->GetIndexedDBContext(),
    769       ChromeBlobStorageContext::GetFor(browser_context)));
    770 
    771   gpu_message_filter_ = new GpuMessageFilter(GetID(), widget_helper_.get());
    772   AddFilter(gpu_message_filter_);
    773 #if defined(ENABLE_WEBRTC)
    774   AddFilter(new WebRTCIdentityServiceHost(
    775       GetID(), storage_partition_impl_->GetWebRTCIdentityStore()));
    776   peer_connection_tracker_host_ = new PeerConnectionTrackerHost(GetID());
    777   AddFilter(peer_connection_tracker_host_.get());
    778   AddFilter(new MediaStreamDispatcherHost(
    779       GetID(),
    780       browser_context->GetResourceContext()->GetMediaDeviceIDSalt(),
    781       media_stream_manager));
    782   AddFilter(new DeviceRequestMessageFilter(
    783       resource_context, media_stream_manager, GetID()));
    784   AddFilter(new MediaStreamTrackMetricsHost());
    785 #endif
    786 #if defined(ENABLE_PLUGINS)
    787   AddFilter(new PepperRendererConnection(GetID()));
    788 #endif
    789   AddFilter(new SpeechRecognitionDispatcherHost(
    790       GetID(), storage_partition_impl_->GetURLRequestContext()));
    791   AddFilter(new FileAPIMessageFilter(
    792       GetID(),
    793       storage_partition_impl_->GetURLRequestContext(),
    794       storage_partition_impl_->GetFileSystemContext(),
    795       ChromeBlobStorageContext::GetFor(browser_context),
    796       StreamContext::GetFor(browser_context)));
    797   AddFilter(new FileUtilitiesMessageFilter(GetID()));
    798   AddFilter(new MimeRegistryMessageFilter());
    799   AddFilter(new DatabaseMessageFilter(
    800       storage_partition_impl_->GetDatabaseTracker()));
    801 #if defined(OS_MACOSX)
    802   AddFilter(new TextInputClientMessageFilter(GetID()));
    803 #elif defined(OS_WIN)
    804   // The FontCacheDispatcher is required only when we're using GDI rendering.
    805   // TODO(scottmg): pdf/ppapi still require the renderer to be able to precache
    806   // GDI fonts (http://crbug.com/383227), even when using DirectWrite. This
    807   // should eventually be if (!ShouldUseDirectWrite()) guarded.
    808   channel_->AddFilter(new FontCacheDispatcher());
    809 #elif defined(OS_ANDROID)
    810   browser_demuxer_android_ = new BrowserDemuxerAndroid();
    811   AddFilter(browser_demuxer_android_);
    812 #endif
    813 #if defined(ENABLE_BROWSER_CDMS)
    814   browser_cdm_manager_ = new BrowserCdmManager(GetID(), NULL);
    815   AddFilter(browser_cdm_manager_);
    816 #endif
    817 
    818   SocketStreamDispatcherHost::GetRequestContextCallback
    819       request_context_callback(
    820           base::Bind(&GetRequestContext, request_context,
    821                      media_request_context));
    822 
    823   SocketStreamDispatcherHost* socket_stream_dispatcher_host =
    824       new SocketStreamDispatcherHost(
    825           GetID(), request_context_callback, resource_context);
    826   AddFilter(socket_stream_dispatcher_host);
    827 
    828   WebSocketDispatcherHost::GetRequestContextCallback
    829       websocket_request_context_callback(
    830           base::Bind(&GetRequestContext, request_context,
    831                      media_request_context, RESOURCE_TYPE_SUB_RESOURCE));
    832 
    833   AddFilter(
    834       new WebSocketDispatcherHost(GetID(), websocket_request_context_callback));
    835 
    836   message_port_message_filter_ = new MessagePortMessageFilter(
    837       base::Bind(&RenderWidgetHelper::GetNextRoutingID,
    838                  base::Unretained(widget_helper_.get())));
    839   AddFilter(message_port_message_filter_.get());
    840 
    841   scoped_refptr<ServiceWorkerDispatcherHost> service_worker_filter =
    842       new ServiceWorkerDispatcherHost(GetID(),
    843                                       message_port_message_filter_.get());
    844   service_worker_filter->Init(
    845       storage_partition_impl_->GetServiceWorkerContext());
    846   AddFilter(service_worker_filter.get());
    847 
    848   AddFilter(new SharedWorkerMessageFilter(
    849       GetID(),
    850       resource_context,
    851       WorkerStoragePartition(
    852           storage_partition_impl_->GetURLRequestContext(),
    853           storage_partition_impl_->GetMediaURLRequestContext(),
    854           storage_partition_impl_->GetAppCacheService(),
    855           storage_partition_impl_->GetQuotaManager(),
    856           storage_partition_impl_->GetFileSystemContext(),
    857           storage_partition_impl_->GetDatabaseTracker(),
    858           storage_partition_impl_->GetIndexedDBContext(),
    859           storage_partition_impl_->GetServiceWorkerContext()),
    860       message_port_message_filter_.get()));
    861 
    862 #if defined(ENABLE_WEBRTC)
    863   p2p_socket_dispatcher_host_ = new P2PSocketDispatcherHost(
    864       resource_context,
    865       browser_context->GetRequestContextForRenderProcess(GetID()));
    866   AddFilter(p2p_socket_dispatcher_host_.get());
    867 #endif
    868 
    869   AddFilter(new TraceMessageFilter());
    870   AddFilter(new ResolveProxyMsgHelper(
    871       browser_context->GetRequestContextForRenderProcess(GetID())));
    872   AddFilter(new QuotaDispatcherHost(
    873       GetID(),
    874       storage_partition_impl_->GetQuotaManager(),
    875       GetContentClient()->browser()->CreateQuotaPermissionContext()));
    876   AddFilter(new GamepadBrowserMessageFilter());
    877   AddFilter(new DeviceLightMessageFilter());
    878   AddFilter(new DeviceMotionMessageFilter());
    879   AddFilter(new DeviceOrientationMessageFilter());
    880   AddFilter(new ProfilerMessageFilter(PROCESS_TYPE_RENDERER));
    881   AddFilter(new HistogramMessageFilter());
    882 #if defined(USE_TCMALLOC) && (defined(OS_LINUX) || defined(OS_ANDROID))
    883   if (base::CommandLine::ForCurrentProcess()->HasSwitch(
    884       switches::kEnableMemoryBenchmarking))
    885     AddFilter(new MemoryBenchmarkMessageFilter());
    886 #endif
    887   AddFilter(new VibrationMessageFilter());
    888   AddFilter(new PushMessagingMessageFilter(
    889       GetID(), storage_partition_impl_->GetServiceWorkerContext()));
    890   AddFilter(new BatteryStatusMessageFilter());
    891 #if defined(OS_ANDROID)
    892   AddFilter(new ScreenOrientationMessageFilterAndroid());
    893 #endif
    894 }
    895 
    896 int RenderProcessHostImpl::GetNextRoutingID() {
    897   return widget_helper_->GetNextRoutingID();
    898 }
    899 
    900 
    901 void RenderProcessHostImpl::ResumeDeferredNavigation(
    902     const GlobalRequestID& request_id) {
    903   widget_helper_->ResumeDeferredNavigation(request_id);
    904 }
    905 
    906 void RenderProcessHostImpl::ResumeResponseDeferredAtStart(
    907     const GlobalRequestID& request_id) {
    908   widget_helper_->ResumeResponseDeferredAtStart(request_id);
    909 }
    910 
    911 void RenderProcessHostImpl::NotifyTimezoneChange() {
    912   Send(new ViewMsg_TimezoneChange());
    913 }
    914 
    915 ServiceRegistry* RenderProcessHostImpl::GetServiceRegistry() {
    916   DCHECK(mojo_application_host_);
    917   return mojo_application_host_->service_registry();
    918 }
    919 
    920 void RenderProcessHostImpl::AddRoute(
    921     int32 routing_id,
    922     IPC::Listener* listener) {
    923   listeners_.AddWithID(listener, routing_id);
    924 }
    925 
    926 void RenderProcessHostImpl::RemoveRoute(int32 routing_id) {
    927   DCHECK(listeners_.Lookup(routing_id) != NULL);
    928   listeners_.Remove(routing_id);
    929 
    930 #if defined(OS_WIN)
    931   // Dump the handle table if handle auditing is enabled.
    932   const base::CommandLine& browser_command_line =
    933       *base::CommandLine::ForCurrentProcess();
    934   if (browser_command_line.HasSwitch(switches::kAuditHandles) ||
    935       browser_command_line.HasSwitch(switches::kAuditAllHandles)) {
    936     DumpHandles();
    937 
    938     // We wait to close the channels until the child process has finished
    939     // dumping handles and sends us ChildProcessHostMsg_DumpHandlesDone.
    940     return;
    941   }
    942 #endif
    943   // Keep the one renderer thread around forever in single process mode.
    944   if (!run_renderer_in_process())
    945     Cleanup();
    946 }
    947 
    948 void RenderProcessHostImpl::AddObserver(RenderProcessHostObserver* observer) {
    949   observers_.AddObserver(observer);
    950 }
    951 
    952 void RenderProcessHostImpl::RemoveObserver(
    953     RenderProcessHostObserver* observer) {
    954   observers_.RemoveObserver(observer);
    955 }
    956 
    957 void RenderProcessHostImpl::ReceivedBadMessage() {
    958   base::CommandLine* command_line = base::CommandLine::ForCurrentProcess();
    959   if (command_line->HasSwitch(switches::kDisableKillAfterBadIPC))
    960     return;
    961 
    962   if (run_renderer_in_process()) {
    963     // In single process mode it is better if we don't suicide but just
    964     // crash.
    965     CHECK(false);
    966   }
    967   // We kill the renderer but don't include a NOTREACHED, because we want the
    968   // browser to try to survive when it gets illegal messages from the renderer.
    969   base::KillProcess(GetHandle(), RESULT_CODE_KILLED_BAD_MESSAGE,
    970                     false);
    971 }
    972 
    973 void RenderProcessHostImpl::WidgetRestored() {
    974   // Verify we were properly backgrounded.
    975   DCHECK_EQ(backgrounded_, (visible_widgets_ == 0));
    976   visible_widgets_++;
    977   SetBackgrounded(false);
    978 }
    979 
    980 void RenderProcessHostImpl::WidgetHidden() {
    981   // On startup, the browser will call Hide
    982   if (backgrounded_)
    983     return;
    984 
    985   DCHECK_EQ(backgrounded_, (visible_widgets_ == 0));
    986   visible_widgets_--;
    987   DCHECK_GE(visible_widgets_, 0);
    988   if (visible_widgets_ == 0) {
    989     DCHECK(!backgrounded_);
    990     SetBackgrounded(true);
    991   }
    992 }
    993 
    994 int RenderProcessHostImpl::VisibleWidgetCount() const {
    995   return visible_widgets_;
    996 }
    997 
    998 bool RenderProcessHostImpl::IsIsolatedGuest() const {
    999   return is_isolated_guest_;
   1000 }
   1001 
   1002 StoragePartition* RenderProcessHostImpl::GetStoragePartition() const {
   1003   return storage_partition_impl_;
   1004 }
   1005 
   1006 static void AppendCompositorCommandLineFlags(base::CommandLine* command_line) {
   1007   if (IsPinchVirtualViewportEnabled())
   1008     command_line->AppendSwitch(cc::switches::kEnablePinchVirtualViewport);
   1009 
   1010   if (IsDelegatedRendererEnabled())
   1011     command_line->AppendSwitch(switches::kEnableDelegatedRenderer);
   1012 
   1013   if (IsImplSidePaintingEnabled()) {
   1014     command_line->AppendSwitch(switches::kEnableImplSidePainting);
   1015     command_line->AppendSwitchASCII(
   1016         switches::kNumRasterThreads,
   1017         base::IntToString(NumberOfRendererRasterThreads()));
   1018   }
   1019 
   1020   if (IsGpuRasterizationEnabled())
   1021     command_line->AppendSwitch(switches::kEnableGpuRasterization);
   1022 
   1023   if (IsForceGpuRasterizationEnabled())
   1024     command_line->AppendSwitch(switches::kForceGpuRasterization);
   1025 
   1026   // Appending disable-gpu-feature switches due to software rendering list.
   1027   GpuDataManagerImpl* gpu_data_manager = GpuDataManagerImpl::GetInstance();
   1028   DCHECK(gpu_data_manager);
   1029   gpu_data_manager->AppendRendererCommandLine(command_line);
   1030 }
   1031 
   1032 void RenderProcessHostImpl::AppendRendererCommandLine(
   1033     base::CommandLine* command_line) const {
   1034   // Pass the process type first, so it shows first in process listings.
   1035   command_line->AppendSwitchASCII(switches::kProcessType,
   1036                                   switches::kRendererProcess);
   1037 
   1038   // Now send any options from our own command line we want to propagate.
   1039   const base::CommandLine& browser_command_line =
   1040       *base::CommandLine::ForCurrentProcess();
   1041   PropagateBrowserCommandLineToRenderer(browser_command_line, command_line);
   1042 
   1043   // Pass on the browser locale.
   1044   const std::string locale =
   1045       GetContentClient()->browser()->GetApplicationLocale();
   1046   command_line->AppendSwitchASCII(switches::kLang, locale);
   1047 
   1048   // If we run base::FieldTrials, we want to pass to their state to the
   1049   // renderer so that it can act in accordance with each state, or record
   1050   // histograms relating to the base::FieldTrial states.
   1051   std::string field_trial_states;
   1052   base::FieldTrialList::StatesToString(&field_trial_states);
   1053   if (!field_trial_states.empty()) {
   1054     command_line->AppendSwitchASCII(switches::kForceFieldTrials,
   1055                                     field_trial_states);
   1056   }
   1057 
   1058   GetContentClient()->browser()->AppendExtraCommandLineSwitches(
   1059       command_line, GetID());
   1060 
   1061   if (IsPinchToZoomEnabled())
   1062     command_line->AppendSwitch(switches::kEnablePinch);
   1063 
   1064 #if defined(OS_WIN)
   1065   command_line->AppendSwitchASCII(switches::kDeviceScaleFactor,
   1066                                   base::DoubleToString(gfx::GetDPIScale()));
   1067 #endif
   1068 
   1069   AppendCompositorCommandLineFlags(command_line);
   1070 }
   1071 
   1072 void RenderProcessHostImpl::PropagateBrowserCommandLineToRenderer(
   1073     const base::CommandLine& browser_cmd,
   1074     base::CommandLine* renderer_cmd) const {
   1075   // Propagate the following switches to the renderer command line (along
   1076   // with any associated values) if present in the browser command line.
   1077   static const char* const kSwitchNames[] = {
   1078     switches::kAllowInsecureWebSocketFromHttpsOrigin,
   1079     switches::kAllowLoopbackInPeerConnection,
   1080     switches::kAudioBufferSize,
   1081     switches::kAuditAllHandles,
   1082     switches::kAuditHandles,
   1083     switches::kBlinkPlatformLogChannels,
   1084     switches::kBlockCrossSiteDocuments,
   1085     switches::kDefaultTileWidth,
   1086     switches::kDefaultTileHeight,
   1087     switches::kDisable3DAPIs,
   1088     switches::kDisableAcceleratedVideoDecode,
   1089     switches::kDisableApplicationCache,
   1090     switches::kDisableBreakpad,
   1091     switches::kDisablePreferCompositingToLCDText,
   1092     switches::kDisableCompositingForTransition,
   1093     switches::kDisableDatabases,
   1094     switches::kDisableDesktopNotifications,
   1095     switches::kDisableDirectNPAPIRequests,
   1096     switches::kDisableDisplayList2dCanvas,
   1097     switches::kDisableDistanceFieldText,
   1098     switches::kDisableFileSystem,
   1099     switches::kDisableGpuCompositing,
   1100     switches::kDisableGpuVsync,
   1101     switches::kDisableLowResTiling,
   1102     switches::kDisableHistogramCustomizer,
   1103     switches::kDisableLCDText,
   1104     switches::kDisableLayerSquashing,
   1105     switches::kDisableLocalStorage,
   1106     switches::kDisableLogging,
   1107     switches::kDisableMediaSource,
   1108     switches::kDisableOverlayScrollbar,
   1109     switches::kDisablePinch,
   1110     switches::kDisablePrefixedEncryptedMedia,
   1111     switches::kDisableSeccompFilterSandbox,
   1112     switches::kDisableSessionStorage,
   1113     switches::kDisableSharedWorkers,
   1114     switches::kDisableThreadedCompositing,
   1115     switches::kDisableThreadedScrolling,
   1116     switches::kDisableTouchAdjustment,
   1117     switches::kDisableTouchDragDrop,
   1118     switches::kDisableTouchEditing,
   1119     switches::kDisableV8IdleNotificationAfterCommit,
   1120     switches::kDisableZeroCopy,
   1121     switches::kDomAutomationController,
   1122     switches::kEnableBeginFrameScheduling,
   1123     switches::kEnableBleedingEdgeRenderingFastPaths,
   1124     switches::kEnablePreferCompositingToLCDText,
   1125     switches::kEnableCompositingForTransition,
   1126     switches::kEnableDeferredImageDecoding,
   1127     switches::kEnableDisplayList2dCanvas,
   1128     switches::kEnableDistanceFieldText,
   1129     switches::kEnableEncryptedMedia,
   1130     switches::kEnableExperimentalCanvasFeatures,
   1131     switches::kEnableExperimentalWebPlatformFeatures,
   1132     switches::kEnableGPUClientLogging,
   1133     switches::kEnableGpuClientTracing,
   1134     switches::kEnableGPUServiceLogging,
   1135     switches::kEnableLinkDisambiguationPopup,
   1136     switches::kEnableLowResTiling,
   1137     switches::kEnableInbandTextTracks,
   1138     switches::kEnableLCDText,
   1139     switches::kEnableLayerSquashing,
   1140     switches::kEnableLogging,
   1141     switches::kEnableMemoryBenchmarking,
   1142     switches::kEnableNetworkInformation,
   1143     switches::kEnableOneCopy,
   1144     switches::kEnableOverlayFullscreenVideo,
   1145     switches::kEnableOverlayScrollbar,
   1146     switches::kEnableOverscrollNotifications,
   1147     switches::kEnablePinch,
   1148     switches::kEnablePreciseMemoryInfo,
   1149     switches::kEnableRendererMojoChannel,
   1150     switches::kEnableSeccompFilterSandbox,
   1151     switches::kEnableSkiaBenchmarking,
   1152     switches::kEnableSmoothScrolling,
   1153     switches::kEnableStatsTable,
   1154     switches::kEnableStrictSiteIsolation,
   1155     switches::kEnableThreadedCompositing,
   1156     switches::kEnableTouchDragDrop,
   1157     switches::kEnableTouchEditing,
   1158     switches::kEnableV8IdleNotificationAfterCommit,
   1159     switches::kEnableViewport,
   1160     switches::kEnableViewportMeta,
   1161     switches::kEnableVtune,
   1162     switches::kEnableWebGLDraftExtensions,
   1163     switches::kEnableWebGLImageChromium,
   1164     switches::kEnableWebMIDI,
   1165     switches::kEnableZeroCopy,
   1166     switches::kForceDeviceScaleFactor,
   1167     switches::kFullMemoryCrashReport,
   1168     switches::kIgnoreResolutionLimitsForAcceleratedVideoDecode,
   1169     switches::kIPCConnectionTimeout,
   1170     switches::kJavaScriptFlags,
   1171     switches::kLoggingLevel,
   1172     switches::kMainFrameResizesAreOrientationChanges,
   1173     switches::kMaxUntiledLayerWidth,
   1174     switches::kMaxUntiledLayerHeight,
   1175     switches::kMemoryMetrics,
   1176     switches::kNoReferrers,
   1177     switches::kNoSandbox,
   1178     switches::kPpapiInProcess,
   1179     switches::kProfilerTiming,
   1180     switches::kReduceSecurityForTesting,
   1181     switches::kRegisterPepperPlugins,
   1182     switches::kRendererAssertTest,
   1183     switches::kRendererStartupDialog,
   1184     switches::kShowPaintRects,
   1185     switches::kSitePerProcess,
   1186     switches::kStatsCollectionController,
   1187     switches::kTestType,
   1188     switches::kTouchEvents,
   1189     switches::kTraceToConsole,
   1190     switches::kUseDiscardableMemory,
   1191     // This flag needs to be propagated to the renderer process for
   1192     // --in-process-webgl.
   1193     switches::kUseGL,
   1194     switches::kUseMobileUserAgent,
   1195     switches::kV,
   1196     switches::kVideoThreads,
   1197     switches::kVModule,
   1198     // Please keep these in alphabetical order. Compositor switches here should
   1199     // also be added to chrome/browser/chromeos/login/chrome_restart_request.cc.
   1200     cc::switches::kCompositeToMailbox,
   1201     cc::switches::kDisableCompositedAntialiasing,
   1202     cc::switches::kDisableMainFrameBeforeActivation,
   1203     cc::switches::kDisableMainFrameBeforeDraw,
   1204     cc::switches::kDisableThreadedAnimation,
   1205     cc::switches::kEnableGpuBenchmarking,
   1206     cc::switches::kEnableMainFrameBeforeActivation,
   1207     cc::switches::kEnableTopControlsPositionCalculation,
   1208     cc::switches::kMaxTilesForInterestArea,
   1209     cc::switches::kMaxUnusedResourceMemoryUsagePercentage,
   1210     cc::switches::kShowCompositedLayerBorders,
   1211     cc::switches::kShowFPSCounter,
   1212     cc::switches::kShowLayerAnimationBounds,
   1213     cc::switches::kShowNonOccludingRects,
   1214     cc::switches::kShowOccludingRects,
   1215     cc::switches::kShowPropertyChangedRects,
   1216     cc::switches::kShowReplicaScreenSpaceRects,
   1217     cc::switches::kShowScreenSpaceRects,
   1218     cc::switches::kShowSurfaceDamageRects,
   1219     cc::switches::kSlowDownRasterScaleFactor,
   1220     cc::switches::kStrictLayerPropertyChangeChecking,
   1221     cc::switches::kTopControlsHeight,
   1222     cc::switches::kTopControlsHideThreshold,
   1223     cc::switches::kTopControlsShowThreshold,
   1224 #if defined(ENABLE_PLUGINS)
   1225     switches::kEnablePepperTesting,
   1226 #endif
   1227 #if defined(ENABLE_WEBRTC)
   1228     switches::kDisableAudioTrackProcessing,
   1229     switches::kDisableWebRtcHWDecoding,
   1230     switches::kDisableWebRtcHWEncoding,
   1231     switches::kEnableWebRtcHWVp8Encoding,
   1232     switches::kEnableWebRtcHWH264Encoding,
   1233 #endif
   1234     switches::kLowEndDeviceMode,
   1235 #if defined(OS_ANDROID)
   1236     switches::kDisableGestureRequirementForMediaPlayback,
   1237     switches::kDisableWebRTC,
   1238     switches::kEnableSpeechRecognition,
   1239     switches::kMediaDrmEnableNonCompositing,
   1240     switches::kNetworkCountryIso,
   1241     switches::kDisableWebAudio,
   1242     switches::kRendererWaitForJavaDebugger,
   1243 #endif
   1244 #if defined(OS_MACOSX)
   1245     // Allow this to be set when invoking the browser and relayed along.
   1246     switches::kEnableSandboxLogging,
   1247 #endif
   1248 #if defined(OS_WIN)
   1249     switches::kDisableDirectWrite,
   1250 #endif
   1251 #if defined(OS_CHROMEOS)
   1252     switches::kDisableVaapiAcceleratedVideoEncode,
   1253 #endif
   1254   };
   1255   renderer_cmd->CopySwitchesFrom(browser_cmd, kSwitchNames,
   1256                                  arraysize(kSwitchNames));
   1257 
   1258   if (browser_cmd.HasSwitch(switches::kTraceStartup) &&
   1259       BrowserMainLoop::GetInstance()->is_tracing_startup()) {
   1260     // Pass kTraceStartup switch to renderer only if startup tracing has not
   1261     // finished.
   1262     renderer_cmd->AppendSwitchASCII(
   1263         switches::kTraceStartup,
   1264         browser_cmd.GetSwitchValueASCII(switches::kTraceStartup));
   1265   }
   1266 
   1267   // Disable databases in incognito mode.
   1268   if (GetBrowserContext()->IsOffTheRecord() &&
   1269       !browser_cmd.HasSwitch(switches::kDisableDatabases)) {
   1270     renderer_cmd->AppendSwitch(switches::kDisableDatabases);
   1271   }
   1272 
   1273   // Enforce the extra command line flags for impl-side painting.
   1274   if (IsImplSidePaintingEnabled() &&
   1275       !browser_cmd.HasSwitch(switches::kEnableDeferredImageDecoding))
   1276     renderer_cmd->AppendSwitch(switches::kEnableDeferredImageDecoding);
   1277 
   1278   // Add kWaitForDebugger to let renderer process wait for a debugger.
   1279   if (browser_cmd.HasSwitch(switches::kWaitForDebuggerChildren)) {
   1280     // Look to pass-on the kWaitForDebugger flag.
   1281     std::string value =
   1282         browser_cmd.GetSwitchValueASCII(switches::kWaitForDebuggerChildren);
   1283     if (value.empty() || value == switches::kRendererProcess) {
   1284       renderer_cmd->AppendSwitch(switches::kWaitForDebugger);
   1285     }
   1286   }
   1287 }
   1288 
   1289 base::ProcessHandle RenderProcessHostImpl::GetHandle() const {
   1290   if (run_renderer_in_process())
   1291     return base::Process::Current().handle();
   1292 
   1293   if (!child_process_launcher_.get() || child_process_launcher_->IsStarting())
   1294     return base::kNullProcessHandle;
   1295 
   1296   return child_process_launcher_->GetHandle();
   1297 }
   1298 
   1299 bool RenderProcessHostImpl::FastShutdownIfPossible() {
   1300   if (run_renderer_in_process())
   1301     return false;  // Single process mode never shutdown the renderer.
   1302 
   1303   if (!GetContentClient()->browser()->IsFastShutdownPossible())
   1304     return false;
   1305 
   1306   if (!child_process_launcher_.get() ||
   1307       child_process_launcher_->IsStarting() ||
   1308       !GetHandle())
   1309     return false;  // Render process hasn't started or is probably crashed.
   1310 
   1311   // Test if there's an unload listener.
   1312   // NOTE: It's possible that an onunload listener may be installed
   1313   // while we're shutting down, so there's a small race here.  Given that
   1314   // the window is small, it's unlikely that the web page has much
   1315   // state that will be lost by not calling its unload handlers properly.
   1316   if (!SuddenTerminationAllowed())
   1317     return false;
   1318 
   1319   if (worker_ref_count_ != 0) {
   1320     if (survive_for_worker_start_time_.is_null())
   1321       survive_for_worker_start_time_ = base::TimeTicks::Now();
   1322     return false;
   1323   }
   1324 
   1325   // Set this before ProcessDied() so observers can tell if the render process
   1326   // died due to fast shutdown versus another cause.
   1327   fast_shutdown_started_ = true;
   1328 
   1329   ProcessDied(false /* already_dead */);
   1330   return true;
   1331 }
   1332 
   1333 void RenderProcessHostImpl::DumpHandles() {
   1334 #if defined(OS_WIN)
   1335   Send(new ChildProcessMsg_DumpHandles());
   1336 #else
   1337   NOTIMPLEMENTED();
   1338 #endif
   1339 }
   1340 
   1341 bool RenderProcessHostImpl::Send(IPC::Message* msg) {
   1342   TRACE_EVENT0("renderer_host", "RenderProcessHostImpl::Send");
   1343   if (!channel_) {
   1344     if (!is_initialized_) {
   1345       queued_messages_.push(msg);
   1346       return true;
   1347     } else {
   1348       delete msg;
   1349       return false;
   1350     }
   1351   }
   1352 
   1353   if (child_process_launcher_.get() && child_process_launcher_->IsStarting()) {
   1354     queued_messages_.push(msg);
   1355     return true;
   1356   }
   1357 
   1358   return channel_->Send(msg);
   1359 }
   1360 
   1361 bool RenderProcessHostImpl::OnMessageReceived(const IPC::Message& msg) {
   1362   // If we're about to be deleted, or have initiated the fast shutdown sequence,
   1363   // we ignore incoming messages.
   1364 
   1365   if (deleting_soon_ || fast_shutdown_started_)
   1366     return false;
   1367 
   1368   mark_child_process_activity_time();
   1369   if (msg.routing_id() == MSG_ROUTING_CONTROL) {
   1370     // Dispatch control messages.
   1371     IPC_BEGIN_MESSAGE_MAP(RenderProcessHostImpl, msg)
   1372       IPC_MESSAGE_HANDLER(ChildProcessHostMsg_ShutdownRequest,
   1373                           OnShutdownRequest)
   1374       IPC_MESSAGE_HANDLER(ChildProcessHostMsg_DumpHandlesDone,
   1375                           OnDumpHandlesDone)
   1376       IPC_MESSAGE_HANDLER(ViewHostMsg_SuddenTerminationChanged,
   1377                           SuddenTerminationChanged)
   1378       IPC_MESSAGE_HANDLER(ViewHostMsg_UserMetricsRecordAction,
   1379                           OnUserMetricsRecordAction)
   1380       IPC_MESSAGE_HANDLER(ViewHostMsg_SavedPageAsMHTML, OnSavedPageAsMHTML)
   1381       IPC_MESSAGE_HANDLER(ViewHostMsg_Close_ACK, OnCloseACK)
   1382 #if defined(ENABLE_WEBRTC)
   1383       IPC_MESSAGE_HANDLER(AecDumpMsg_RegisterAecDumpConsumer,
   1384                           OnRegisterAecDumpConsumer)
   1385       IPC_MESSAGE_HANDLER(AecDumpMsg_UnregisterAecDumpConsumer,
   1386                           OnUnregisterAecDumpConsumer)
   1387 #endif
   1388       // Adding single handlers for your service here is fine, but once your
   1389       // service needs more than one handler, please extract them into a new
   1390       // message filter and add that filter to CreateMessageFilters().
   1391     IPC_END_MESSAGE_MAP()
   1392 
   1393     return true;
   1394   }
   1395 
   1396   // Dispatch incoming messages to the appropriate IPC::Listener.
   1397   IPC::Listener* listener = listeners_.Lookup(msg.routing_id());
   1398   if (!listener) {
   1399     if (msg.is_sync()) {
   1400       // The listener has gone away, so we must respond or else the caller will
   1401       // hang waiting for a reply.
   1402       IPC::Message* reply = IPC::SyncMessage::GenerateReply(&msg);
   1403       reply->set_reply_error();
   1404       Send(reply);
   1405     }
   1406     return true;
   1407   }
   1408   return listener->OnMessageReceived(msg);
   1409 }
   1410 
   1411 void RenderProcessHostImpl::OnChannelConnected(int32 peer_pid) {
   1412 #if defined(IPC_MESSAGE_LOG_ENABLED)
   1413   Send(new ChildProcessMsg_SetIPCLoggingEnabled(
   1414       IPC::Logging::GetInstance()->Enabled()));
   1415 #endif
   1416 
   1417   tracked_objects::ThreadData::Status status =
   1418       tracked_objects::ThreadData::status();
   1419   Send(new ChildProcessMsg_SetProfilerStatus(status));
   1420 }
   1421 
   1422 void RenderProcessHostImpl::OnChannelError() {
   1423   ProcessDied(true /* already_dead */);
   1424 }
   1425 
   1426 void RenderProcessHostImpl::OnBadMessageReceived(const IPC::Message& message) {
   1427   // Message de-serialization failed. We consider this a capital crime. Kill the
   1428   // renderer if we have one.
   1429   LOG(ERROR) << "bad message " << message.type() << " terminating renderer.";
   1430   BrowserChildProcessHostImpl::HistogramBadMessageTerminated(
   1431       PROCESS_TYPE_RENDERER);
   1432   ReceivedBadMessage();
   1433 }
   1434 
   1435 BrowserContext* RenderProcessHostImpl::GetBrowserContext() const {
   1436   return browser_context_;
   1437 }
   1438 
   1439 bool RenderProcessHostImpl::InSameStoragePartition(
   1440     StoragePartition* partition) const {
   1441   return storage_partition_impl_ == partition;
   1442 }
   1443 
   1444 int RenderProcessHostImpl::GetID() const {
   1445   return id_;
   1446 }
   1447 
   1448 bool RenderProcessHostImpl::HasConnection() const {
   1449   return channel_.get() != NULL;
   1450 }
   1451 
   1452 void RenderProcessHostImpl::SetIgnoreInputEvents(bool ignore_input_events) {
   1453   ignore_input_events_ = ignore_input_events;
   1454 }
   1455 
   1456 bool RenderProcessHostImpl::IgnoreInputEvents() const {
   1457   return ignore_input_events_;
   1458 }
   1459 
   1460 void RenderProcessHostImpl::Cleanup() {
   1461   // If within_process_died_observer_ is true, one of our observers performed an
   1462   // action that caused us to die (e.g. http://crbug.com/339504). Therefore,
   1463   // delay the destruction until all of the observer callbacks have been made,
   1464   // and guarantee that the RenderProcessHostDestroyed observer callback is
   1465   // always the last callback fired.
   1466   if (within_process_died_observer_) {
   1467     delayed_cleanup_needed_ = true;
   1468     return;
   1469   }
   1470   delayed_cleanup_needed_ = false;
   1471 
   1472   // Records the time when the process starts surviving for workers for UMA.
   1473   if (listeners_.IsEmpty() && worker_ref_count_ > 0 &&
   1474       survive_for_worker_start_time_.is_null()) {
   1475     survive_for_worker_start_time_ = base::TimeTicks::Now();
   1476   }
   1477 
   1478   // When there are no other owners of this object, we can delete ourselves.
   1479   if (listeners_.IsEmpty() && worker_ref_count_ == 0) {
   1480     if (!survive_for_worker_start_time_.is_null()) {
   1481       UMA_HISTOGRAM_LONG_TIMES(
   1482           "SharedWorker.RendererSurviveForWorkerTime",
   1483           base::TimeTicks::Now() - survive_for_worker_start_time_);
   1484     }
   1485     // We cannot clean up twice; if this fails, there is an issue with our
   1486     // control flow.
   1487     DCHECK(!deleting_soon_);
   1488 
   1489     DCHECK_EQ(0, pending_views_);
   1490     FOR_EACH_OBSERVER(RenderProcessHostObserver,
   1491                       observers_,
   1492                       RenderProcessHostDestroyed(this));
   1493     NotificationService::current()->Notify(
   1494         NOTIFICATION_RENDERER_PROCESS_TERMINATED,
   1495         Source<RenderProcessHost>(this),
   1496         NotificationService::NoDetails());
   1497 
   1498 #ifndef NDEBUG
   1499     is_self_deleted_ = true;
   1500 #endif
   1501     base::MessageLoop::current()->DeleteSoon(FROM_HERE, this);
   1502     deleting_soon_ = true;
   1503     // It's important not to wait for the DeleteTask to delete the channel
   1504     // proxy. Kill it off now. That way, in case the profile is going away, the
   1505     // rest of the objects attached to this RenderProcessHost start going
   1506     // away first, since deleting the channel proxy will post a
   1507     // OnChannelClosed() to IPC::ChannelProxy::Context on the IO thread.
   1508     channel_.reset();
   1509     gpu_message_filter_ = NULL;
   1510     message_port_message_filter_ = NULL;
   1511     RemoveUserData(kSessionStorageHolderKey);
   1512 
   1513     // Remove ourself from the list of renderer processes so that we can't be
   1514     // reused in between now and when the Delete task runs.
   1515     UnregisterHost(GetID());
   1516   }
   1517 }
   1518 
   1519 void RenderProcessHostImpl::AddPendingView() {
   1520   pending_views_++;
   1521 }
   1522 
   1523 void RenderProcessHostImpl::RemovePendingView() {
   1524   DCHECK(pending_views_);
   1525   pending_views_--;
   1526 }
   1527 
   1528 void RenderProcessHostImpl::SetSuddenTerminationAllowed(bool enabled) {
   1529   sudden_termination_allowed_ = enabled;
   1530 }
   1531 
   1532 bool RenderProcessHostImpl::SuddenTerminationAllowed() const {
   1533   return sudden_termination_allowed_;
   1534 }
   1535 
   1536 base::TimeDelta RenderProcessHostImpl::GetChildProcessIdleTime() const {
   1537   return base::TimeTicks::Now() - child_process_activity_time_;
   1538 }
   1539 
   1540 void RenderProcessHostImpl::ResumeRequestsForView(int route_id) {
   1541   widget_helper_->ResumeRequestsForView(route_id);
   1542 }
   1543 
   1544 void RenderProcessHostImpl::FilterURL(bool empty_allowed, GURL* url) {
   1545   FilterURL(this, empty_allowed, url);
   1546 }
   1547 
   1548 #if defined(ENABLE_WEBRTC)
   1549 void RenderProcessHostImpl::EnableAecDump(const base::FilePath& file) {
   1550   DCHECK_CURRENTLY_ON(BrowserThread::UI);
   1551   // Enable AEC dump for each registered consumer.
   1552   for (std::vector<int>::iterator it = aec_dump_consumers_.begin();
   1553        it != aec_dump_consumers_.end(); ++it) {
   1554     EnableAecDumpForId(file, *it);
   1555   }
   1556 }
   1557 
   1558 void RenderProcessHostImpl::DisableAecDump() {
   1559   DCHECK_CURRENTLY_ON(BrowserThread::UI);
   1560   // Posting on the FILE thread and then replying back on the UI thread is only
   1561   // for avoiding races between enable and disable. Nothing is done on the FILE
   1562   // thread.
   1563   BrowserThread::PostTaskAndReply(
   1564       BrowserThread::FILE, FROM_HERE,
   1565       base::Bind(&DisableAecDumpOnFileThread),
   1566       base::Bind(&RenderProcessHostImpl::SendDisableAecDumpToRenderer,
   1567                  weak_factory_.GetWeakPtr()));
   1568 }
   1569 
   1570 void RenderProcessHostImpl::SetWebRtcLogMessageCallback(
   1571     base::Callback<void(const std::string&)> callback) {
   1572   webrtc_log_message_callback_ = callback;
   1573 }
   1574 
   1575 RenderProcessHostImpl::WebRtcStopRtpDumpCallback
   1576 RenderProcessHostImpl::StartRtpDump(
   1577     bool incoming,
   1578     bool outgoing,
   1579     const WebRtcRtpPacketCallback& packet_callback) {
   1580   if (!p2p_socket_dispatcher_host_.get())
   1581     return WebRtcStopRtpDumpCallback();
   1582 
   1583   BrowserThread::PostTask(BrowserThread::IO,
   1584                           FROM_HERE,
   1585                           base::Bind(&P2PSocketDispatcherHost::StartRtpDump,
   1586                                      p2p_socket_dispatcher_host_,
   1587                                      incoming,
   1588                                      outgoing,
   1589                                      packet_callback));
   1590 
   1591   if (stop_rtp_dump_callback_.is_null()) {
   1592     stop_rtp_dump_callback_ =
   1593         base::Bind(&P2PSocketDispatcherHost::StopRtpDumpOnUIThread,
   1594                    p2p_socket_dispatcher_host_);
   1595   }
   1596   return stop_rtp_dump_callback_;
   1597 }
   1598 #endif
   1599 
   1600 IPC::ChannelProxy* RenderProcessHostImpl::GetChannel() {
   1601   return channel_.get();
   1602 }
   1603 
   1604 void RenderProcessHostImpl::AddFilter(BrowserMessageFilter* filter) {
   1605   channel_->AddFilter(filter->GetFilter());
   1606 }
   1607 
   1608 bool RenderProcessHostImpl::FastShutdownForPageCount(size_t count) {
   1609   if (static_cast<size_t>(GetActiveViewCount()) == count)
   1610     return FastShutdownIfPossible();
   1611   return false;
   1612 }
   1613 
   1614 bool RenderProcessHostImpl::FastShutdownStarted() const {
   1615   return fast_shutdown_started_;
   1616 }
   1617 
   1618 // static
   1619 void RenderProcessHostImpl::RegisterHost(int host_id, RenderProcessHost* host) {
   1620   g_all_hosts.Get().AddWithID(host, host_id);
   1621 }
   1622 
   1623 // static
   1624 void RenderProcessHostImpl::UnregisterHost(int host_id) {
   1625   RenderProcessHost* host = g_all_hosts.Get().Lookup(host_id);
   1626   if (!host)
   1627     return;
   1628 
   1629   g_all_hosts.Get().Remove(host_id);
   1630 
   1631   // Look up the map of site to process for the given browser_context,
   1632   // in case we need to remove this process from it.  It will be registered
   1633   // under any sites it rendered that use process-per-site mode.
   1634   SiteProcessMap* map =
   1635       GetSiteProcessMapForBrowserContext(host->GetBrowserContext());
   1636   map->RemoveProcess(host);
   1637 }
   1638 
   1639 // static
   1640 void RenderProcessHostImpl::FilterURL(RenderProcessHost* rph,
   1641                                       bool empty_allowed,
   1642                                       GURL* url) {
   1643   ChildProcessSecurityPolicyImpl* policy =
   1644       ChildProcessSecurityPolicyImpl::GetInstance();
   1645 
   1646   if (empty_allowed && url->is_empty())
   1647     return;
   1648 
   1649   // The browser process should never hear the swappedout:// URL from any
   1650   // of the renderer's messages.  Check for this in debug builds, but don't
   1651   // let it crash a release browser.
   1652   DCHECK(GURL(kSwappedOutURL) != *url);
   1653 
   1654   if (!url->is_valid()) {
   1655     // Have to use about:blank for the denied case, instead of an empty GURL.
   1656     // This is because the browser treats navigation to an empty GURL as a
   1657     // navigation to the home page. This is often a privileged page
   1658     // (chrome://newtab/) which is exactly what we don't want.
   1659     *url = GURL(url::kAboutBlankURL);
   1660     RecordAction(base::UserMetricsAction("FilterURLTermiate_Invalid"));
   1661     return;
   1662   }
   1663 
   1664   if (url->SchemeIs(url::kAboutScheme)) {
   1665     // The renderer treats all URLs in the about: scheme as being about:blank.
   1666     // Canonicalize about: URLs to about:blank.
   1667     *url = GURL(url::kAboutBlankURL);
   1668     RecordAction(base::UserMetricsAction("FilterURLTermiate_About"));
   1669   }
   1670 
   1671   // Do not allow browser plugin guests to navigate to non-web URLs, since they
   1672   // cannot swap processes or grant bindings.
   1673   bool non_web_url_in_guest = rph->IsIsolatedGuest() &&
   1674       !(url->is_valid() && policy->IsWebSafeScheme(url->scheme()));
   1675 
   1676   if (non_web_url_in_guest || !policy->CanRequestURL(rph->GetID(), *url)) {
   1677     // If this renderer is not permitted to request this URL, we invalidate the
   1678     // URL.  This prevents us from storing the blocked URL and becoming confused
   1679     // later.
   1680     VLOG(1) << "Blocked URL " << url->spec();
   1681     *url = GURL(url::kAboutBlankURL);
   1682     RecordAction(base::UserMetricsAction("FilterURLTermiate_Blocked"));
   1683   }
   1684 }
   1685 
   1686 // static
   1687 bool RenderProcessHostImpl::IsSuitableHost(
   1688     RenderProcessHost* host,
   1689     BrowserContext* browser_context,
   1690     const GURL& site_url) {
   1691   if (run_renderer_in_process())
   1692     return true;
   1693 
   1694   if (host->GetBrowserContext() != browser_context)
   1695     return false;
   1696 
   1697   // Do not allow sharing of guest hosts. This is to prevent bugs where guest
   1698   // and non-guest storage gets mixed. In the future, we might consider enabling
   1699   // the sharing of guests, in this case this check should be removed and
   1700   // InSameStoragePartition should handle the possible sharing.
   1701   if (host->IsIsolatedGuest())
   1702     return false;
   1703 
   1704   // Check whether the given host and the intended site_url will be using the
   1705   // same StoragePartition, since a RenderProcessHost can only support a single
   1706   // StoragePartition.  This is relevant for packaged apps and isolated sites.
   1707   StoragePartition* dest_partition =
   1708       BrowserContext::GetStoragePartitionForSite(browser_context, site_url);
   1709   if (!host->InSameStoragePartition(dest_partition))
   1710     return false;
   1711 
   1712   if (ChildProcessSecurityPolicyImpl::GetInstance()->HasWebUIBindings(
   1713           host->GetID()) !=
   1714       WebUIControllerFactoryRegistry::GetInstance()->UseWebUIBindingsForURL(
   1715           browser_context, site_url)) {
   1716     return false;
   1717   }
   1718 
   1719   return GetContentClient()->browser()->IsSuitableHost(host, site_url);
   1720 }
   1721 
   1722 // static
   1723 bool RenderProcessHost::run_renderer_in_process() {
   1724   return g_run_renderer_in_process_;
   1725 }
   1726 
   1727 // static
   1728 void RenderProcessHost::SetRunRendererInProcess(bool value) {
   1729   g_run_renderer_in_process_ = value;
   1730 
   1731   base::CommandLine* command_line = base::CommandLine::ForCurrentProcess();
   1732   if (value) {
   1733     if (!command_line->HasSwitch(switches::kLang)) {
   1734       // Modify the current process' command line to include the browser locale,
   1735       // as the renderer expects this flag to be set.
   1736       const std::string locale =
   1737           GetContentClient()->browser()->GetApplicationLocale();
   1738       command_line->AppendSwitchASCII(switches::kLang, locale);
   1739     }
   1740     // TODO(piman): we should really send configuration through bools rather
   1741     // than by parsing strings, i.e. sending an IPC rather than command line
   1742     // args. crbug.com/314909
   1743     AppendCompositorCommandLineFlags(command_line);
   1744   }
   1745 }
   1746 
   1747 // static
   1748 RenderProcessHost::iterator RenderProcessHost::AllHostsIterator() {
   1749   DCHECK_CURRENTLY_ON(BrowserThread::UI);
   1750   return iterator(g_all_hosts.Pointer());
   1751 }
   1752 
   1753 // static
   1754 RenderProcessHost* RenderProcessHost::FromID(int render_process_id) {
   1755   DCHECK_CURRENTLY_ON(BrowserThread::UI);
   1756   return g_all_hosts.Get().Lookup(render_process_id);
   1757 }
   1758 
   1759 // static
   1760 bool RenderProcessHost::ShouldTryToUseExistingProcessHost(
   1761     BrowserContext* browser_context, const GURL& url) {
   1762   // Experimental:
   1763   // If --enable-strict-site-isolation or --site-per-process is enabled, do not
   1764   // try to reuse renderer processes when over the limit.  (We could allow pages
   1765   // from the same site to share, if we knew what the given process was
   1766   // dedicated to.  Allowing no sharing is simpler for now.)  This may cause
   1767   // resource exhaustion issues if too many sites are open at once.
   1768   const base::CommandLine& command_line =
   1769       *base::CommandLine::ForCurrentProcess();
   1770   if (command_line.HasSwitch(switches::kEnableStrictSiteIsolation) ||
   1771       command_line.HasSwitch(switches::kSitePerProcess))
   1772     return false;
   1773 
   1774   if (run_renderer_in_process())
   1775     return true;
   1776 
   1777   // NOTE: Sometimes it's necessary to create more render processes than
   1778   //       GetMaxRendererProcessCount(), for instance when we want to create
   1779   //       a renderer process for a browser context that has no existing
   1780   //       renderers. This is OK in moderation, since the
   1781   //       GetMaxRendererProcessCount() is conservative.
   1782   if (g_all_hosts.Get().size() >= GetMaxRendererProcessCount())
   1783     return true;
   1784 
   1785   return GetContentClient()->browser()->
   1786       ShouldTryToUseExistingProcessHost(browser_context, url);
   1787 }
   1788 
   1789 // static
   1790 RenderProcessHost* RenderProcessHost::GetExistingProcessHost(
   1791     BrowserContext* browser_context,
   1792     const GURL& site_url) {
   1793   // First figure out which existing renderers we can use.
   1794   std::vector<RenderProcessHost*> suitable_renderers;
   1795   suitable_renderers.reserve(g_all_hosts.Get().size());
   1796 
   1797   iterator iter(AllHostsIterator());
   1798   while (!iter.IsAtEnd()) {
   1799     if (GetContentClient()->browser()->MayReuseHost(iter.GetCurrentValue()) &&
   1800         RenderProcessHostImpl::IsSuitableHost(
   1801             iter.GetCurrentValue(),
   1802             browser_context, site_url)) {
   1803       suitable_renderers.push_back(iter.GetCurrentValue());
   1804     }
   1805     iter.Advance();
   1806   }
   1807 
   1808   // Now pick a random suitable renderer, if we have any.
   1809   if (!suitable_renderers.empty()) {
   1810     int suitable_count = static_cast<int>(suitable_renderers.size());
   1811     int random_index = base::RandInt(0, suitable_count - 1);
   1812     return suitable_renderers[random_index];
   1813   }
   1814 
   1815   return NULL;
   1816 }
   1817 
   1818 // static
   1819 bool RenderProcessHost::ShouldUseProcessPerSite(
   1820     BrowserContext* browser_context,
   1821     const GURL& url) {
   1822   // Returns true if we should use the process-per-site model.  This will be
   1823   // the case if the --process-per-site switch is specified, or in
   1824   // process-per-site-instance for particular sites (e.g., WebUI).
   1825   // Note that --single-process is handled in ShouldTryToUseExistingProcessHost.
   1826   const base::CommandLine& command_line =
   1827       *base::CommandLine::ForCurrentProcess();
   1828   if (command_line.HasSwitch(switches::kProcessPerSite))
   1829     return true;
   1830 
   1831   // We want to consolidate particular sites like WebUI even when we are using
   1832   // the process-per-tab or process-per-site-instance models.
   1833   // Note: DevTools pages have WebUI type but should not reuse the same host.
   1834   if (WebUIControllerFactoryRegistry::GetInstance()->UseWebUIForURL(
   1835           browser_context, url) &&
   1836       !url.SchemeIs(kChromeDevToolsScheme)) {
   1837     return true;
   1838   }
   1839 
   1840   // Otherwise let the content client decide, defaulting to false.
   1841   return GetContentClient()->browser()->ShouldUseProcessPerSite(browser_context,
   1842                                                                 url);
   1843 }
   1844 
   1845 // static
   1846 RenderProcessHost* RenderProcessHostImpl::GetProcessHostForSite(
   1847     BrowserContext* browser_context,
   1848     const GURL& url) {
   1849   // Look up the map of site to process for the given browser_context.
   1850   SiteProcessMap* map =
   1851       GetSiteProcessMapForBrowserContext(browser_context);
   1852 
   1853   // See if we have an existing process with appropriate bindings for this site.
   1854   // If not, the caller should create a new process and register it.
   1855   std::string site = SiteInstance::GetSiteForURL(browser_context, url)
   1856       .possibly_invalid_spec();
   1857   RenderProcessHost* host = map->FindProcess(site);
   1858   if (host && (!GetContentClient()->browser()->MayReuseHost(host) ||
   1859                !IsSuitableHost(host, browser_context, url))) {
   1860     // The registered process does not have an appropriate set of bindings for
   1861     // the url.  Remove it from the map so we can register a better one.
   1862     RecordAction(
   1863         base::UserMetricsAction("BindingsMismatch_GetProcessHostPerSite"));
   1864     map->RemoveProcess(host);
   1865     host = NULL;
   1866   }
   1867 
   1868   return host;
   1869 }
   1870 
   1871 void RenderProcessHostImpl::RegisterProcessHostForSite(
   1872     BrowserContext* browser_context,
   1873     RenderProcessHost* process,
   1874     const GURL& url) {
   1875   // Look up the map of site to process for the given browser_context.
   1876   SiteProcessMap* map =
   1877       GetSiteProcessMapForBrowserContext(browser_context);
   1878 
   1879   // Only register valid, non-empty sites.  Empty or invalid sites will not
   1880   // use process-per-site mode.  We cannot check whether the process has
   1881   // appropriate bindings here, because the bindings have not yet been granted.
   1882   std::string site = SiteInstance::GetSiteForURL(browser_context, url)
   1883       .possibly_invalid_spec();
   1884   if (!site.empty())
   1885     map->RegisterProcess(site, process);
   1886 }
   1887 
   1888 void RenderProcessHostImpl::ProcessDied(bool already_dead) {
   1889   // Our child process has died.  If we didn't expect it, it's a crash.
   1890   // In any case, we need to let everyone know it's gone.
   1891   // The OnChannelError notification can fire multiple times due to nested sync
   1892   // calls to a renderer. If we don't have a valid channel here it means we
   1893   // already handled the error.
   1894 
   1895   // It should not be possible for us to be called re-entrantly.
   1896   DCHECK(!within_process_died_observer_);
   1897 
   1898   // It should not be possible for a process death notification to come in while
   1899   // we are dying.
   1900   DCHECK(!deleting_soon_);
   1901 
   1902   // child_process_launcher_ can be NULL in single process mode or if fast
   1903   // termination happened.
   1904   int exit_code = 0;
   1905   base::TerminationStatus status =
   1906       child_process_launcher_.get() ?
   1907       child_process_launcher_->GetChildTerminationStatus(already_dead,
   1908                                                          &exit_code) :
   1909       base::TERMINATION_STATUS_NORMAL_TERMINATION;
   1910 
   1911   RendererClosedDetails details(GetHandle(), status, exit_code);
   1912   within_process_died_observer_ = true;
   1913   NotificationService::current()->Notify(
   1914       NOTIFICATION_RENDERER_PROCESS_CLOSED,
   1915       Source<RenderProcessHost>(this),
   1916       Details<RendererClosedDetails>(&details));
   1917   FOR_EACH_OBSERVER(RenderProcessHostObserver,
   1918                     observers_,
   1919                     RenderProcessExited(this, GetHandle(), status, exit_code));
   1920   within_process_died_observer_ = false;
   1921 
   1922   mojo_application_host_->WillDestroySoon();
   1923 
   1924   child_process_launcher_.reset();
   1925   channel_.reset();
   1926   gpu_message_filter_ = NULL;
   1927   message_port_message_filter_ = NULL;
   1928   RemoveUserData(kSessionStorageHolderKey);
   1929 
   1930   IDMap<IPC::Listener>::iterator iter(&listeners_);
   1931   while (!iter.IsAtEnd()) {
   1932     iter.GetCurrentValue()->OnMessageReceived(
   1933         ViewHostMsg_RenderProcessGone(iter.GetCurrentKey(),
   1934                                       static_cast<int>(status),
   1935                                       exit_code));
   1936     iter.Advance();
   1937   }
   1938 
   1939   mojo_application_host_.reset(new MojoApplicationHost);
   1940   mojo_activation_required_ = false;
   1941 
   1942   // It's possible that one of the calls out to the observers might have caused
   1943   // this object to be no longer needed.
   1944   if (delayed_cleanup_needed_)
   1945     Cleanup();
   1946 
   1947   // This object is not deleted at this point and might be reused later.
   1948   // TODO(darin): clean this up
   1949 }
   1950 
   1951 int RenderProcessHostImpl::GetActiveViewCount() {
   1952   int num_active_views = 0;
   1953   scoped_ptr<RenderWidgetHostIterator> widgets(
   1954       RenderWidgetHost::GetRenderWidgetHosts());
   1955   while (RenderWidgetHost* widget = widgets->GetNextHost()) {
   1956     // Count only RenderWidgetHosts in this process.
   1957     if (widget->GetProcess()->GetID() == GetID())
   1958       num_active_views++;
   1959   }
   1960   return num_active_views;
   1961 }
   1962 
   1963 // Frame subscription API for this class is for accelerated composited path
   1964 // only. These calls are redirected to GpuMessageFilter.
   1965 void RenderProcessHostImpl::BeginFrameSubscription(
   1966     int route_id,
   1967     scoped_ptr<RenderWidgetHostViewFrameSubscriber> subscriber) {
   1968   if (!gpu_message_filter_)
   1969     return;
   1970   BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, base::Bind(
   1971       &GpuMessageFilter::BeginFrameSubscription,
   1972       gpu_message_filter_,
   1973       route_id, base::Passed(&subscriber)));
   1974 }
   1975 
   1976 void RenderProcessHostImpl::EndFrameSubscription(int route_id) {
   1977   if (!gpu_message_filter_)
   1978     return;
   1979   BrowserThread::PostTask(BrowserThread::IO, FROM_HERE, base::Bind(
   1980       &GpuMessageFilter::EndFrameSubscription,
   1981       gpu_message_filter_,
   1982       route_id));
   1983 }
   1984 
   1985 #if defined(ENABLE_WEBRTC)
   1986 void RenderProcessHostImpl::WebRtcLogMessage(const std::string& message) {
   1987   DCHECK_CURRENTLY_ON(BrowserThread::UI);
   1988   if (!webrtc_log_message_callback_.is_null())
   1989     webrtc_log_message_callback_.Run(message);
   1990 }
   1991 #endif
   1992 
   1993 void RenderProcessHostImpl::ReleaseOnCloseACK(
   1994     RenderProcessHost* host,
   1995     const SessionStorageNamespaceMap& sessions,
   1996     int view_route_id) {
   1997   DCHECK(host);
   1998   if (sessions.empty())
   1999     return;
   2000   SessionStorageHolder* holder = static_cast<SessionStorageHolder*>
   2001       (host->GetUserData(kSessionStorageHolderKey));
   2002   if (!holder) {
   2003     holder = new SessionStorageHolder();
   2004     host->SetUserData(
   2005         kSessionStorageHolderKey,
   2006         holder);
   2007   }
   2008   holder->Hold(sessions, view_route_id);
   2009 }
   2010 
   2011 void RenderProcessHostImpl::OnShutdownRequest() {
   2012   // Don't shut down if there are active RenderViews, or if there are pending
   2013   // RenderViews being swapped back in.
   2014   // In single process mode, we never shutdown the renderer.
   2015   int num_active_views = GetActiveViewCount();
   2016   if (pending_views_ || num_active_views > 0 || run_renderer_in_process())
   2017     return;
   2018 
   2019   // Notify any contents that might have swapped out renderers from this
   2020   // process. They should not attempt to swap them back in.
   2021   NotificationService::current()->Notify(
   2022       NOTIFICATION_RENDERER_PROCESS_CLOSING,
   2023       Source<RenderProcessHost>(this),
   2024       NotificationService::NoDetails());
   2025 
   2026   mojo_application_host_->WillDestroySoon();
   2027 
   2028   Send(new ChildProcessMsg_Shutdown());
   2029 }
   2030 
   2031 void RenderProcessHostImpl::SuddenTerminationChanged(bool enabled) {
   2032   SetSuddenTerminationAllowed(enabled);
   2033 }
   2034 
   2035 void RenderProcessHostImpl::OnDumpHandlesDone() {
   2036   Cleanup();
   2037 }
   2038 
   2039 void RenderProcessHostImpl::SetBackgrounded(bool backgrounded) {
   2040   // Note: we always set the backgrounded_ value.  If the process is NULL
   2041   // (and hence hasn't been created yet), we will set the process priority
   2042   // later when we create the process.
   2043   backgrounded_ = backgrounded;
   2044   if (!child_process_launcher_.get() || child_process_launcher_->IsStarting())
   2045     return;
   2046 
   2047   // Don't background processes which have active audio streams.
   2048   if (backgrounded_ && audio_renderer_host_->HasActiveAudio())
   2049     return;
   2050 
   2051 #if defined(OS_WIN)
   2052   // The cbstext.dll loads as a global GetMessage hook in the browser process
   2053   // and intercepts/unintercepts the kernel32 API SetPriorityClass in a
   2054   // background thread. If the UI thread invokes this API just when it is
   2055   // intercepted the stack is messed up on return from the interceptor
   2056   // which causes random crashes in the browser process. Our hack for now
   2057   // is to not invoke the SetPriorityClass API if the dll is loaded.
   2058   if (GetModuleHandle(L"cbstext.dll"))
   2059     return;
   2060 #endif  // OS_WIN
   2061 
   2062   // Notify the child process of background state.
   2063   Send(new ChildProcessMsg_SetProcessBackgrounded(backgrounded));
   2064 
   2065 #if !defined(OS_WIN)
   2066   // Backgrounding may require elevated privileges not available to renderer
   2067   // processes, so control backgrounding from the process host.
   2068 
   2069   // Windows Vista+ has a fancy process backgrounding mode that can only be set
   2070   // from within the process.
   2071   child_process_launcher_->SetProcessBackgrounded(backgrounded);
   2072 #endif  // !OS_WIN
   2073 }
   2074 
   2075 void RenderProcessHostImpl::OnProcessLaunched() {
   2076   // No point doing anything, since this object will be destructed soon.  We
   2077   // especially don't want to send the RENDERER_PROCESS_CREATED notification,
   2078   // since some clients might expect a RENDERER_PROCESS_TERMINATED afterwards to
   2079   // properly cleanup.
   2080   if (deleting_soon_)
   2081     return;
   2082 
   2083   if (child_process_launcher_) {
   2084     if (!child_process_launcher_->GetHandle()) {
   2085       OnChannelError();
   2086       return;
   2087     }
   2088 
   2089     SetBackgrounded(backgrounded_);
   2090   }
   2091 
   2092   // NOTE: This needs to be before sending queued messages because
   2093   // ExtensionService uses this notification to initialize the renderer process
   2094   // with state that must be there before any JavaScript executes.
   2095   //
   2096   // The queued messages contain such things as "navigate". If this notification
   2097   // was after, we can end up executing JavaScript before the initialization
   2098   // happens.
   2099   NotificationService::current()->Notify(
   2100       NOTIFICATION_RENDERER_PROCESS_CREATED,
   2101       Source<RenderProcessHost>(this),
   2102       NotificationService::NoDetails());
   2103 
   2104   // Allow Mojo to be setup before the renderer sees any Chrome IPC messages.
   2105   // This way, Mojo can be safely used from the renderer in response to any
   2106   // Chrome IPC message.
   2107   MaybeActivateMojo();
   2108 
   2109   if (channel_mojo_host_)
   2110     channel_mojo_host_->OnClientLaunched(GetHandle());
   2111 
   2112   while (!queued_messages_.empty()) {
   2113     Send(queued_messages_.front());
   2114     queued_messages_.pop();
   2115   }
   2116 
   2117 #if defined(ENABLE_WEBRTC)
   2118   if (WebRTCInternals::GetInstance()->aec_dump_enabled())
   2119     EnableAecDump(WebRTCInternals::GetInstance()->aec_dump_file_path());
   2120 #endif
   2121 }
   2122 
   2123 scoped_refptr<AudioRendererHost>
   2124 RenderProcessHostImpl::audio_renderer_host() const {
   2125   return audio_renderer_host_;
   2126 }
   2127 
   2128 void RenderProcessHostImpl::OnUserMetricsRecordAction(
   2129     const std::string& action) {
   2130   RecordComputedAction(action);
   2131 }
   2132 
   2133 void RenderProcessHostImpl::OnCloseACK(int old_route_id) {
   2134   SessionStorageHolder* holder = static_cast<SessionStorageHolder*>
   2135       (GetUserData(kSessionStorageHolderKey));
   2136   if (!holder)
   2137     return;
   2138   holder->Release(old_route_id);
   2139 }
   2140 
   2141 void RenderProcessHostImpl::OnSavedPageAsMHTML(int job_id, int64 data_size) {
   2142   MHTMLGenerationManager::GetInstance()->MHTMLGenerated(job_id, data_size);
   2143 }
   2144 
   2145 void RenderProcessHostImpl::OnGpuSwitching() {
   2146   // We are updating all widgets including swapped out ones.
   2147   scoped_ptr<RenderWidgetHostIterator> widgets(
   2148       RenderWidgetHostImpl::GetAllRenderWidgetHosts());
   2149   while (RenderWidgetHost* widget = widgets->GetNextHost()) {
   2150     if (!widget->IsRenderView())
   2151       continue;
   2152 
   2153     // Skip widgets in other processes.
   2154     if (widget->GetProcess()->GetID() != GetID())
   2155       continue;
   2156 
   2157     RenderViewHost* rvh = RenderViewHost::From(widget);
   2158     rvh->OnWebkitPreferencesChanged();
   2159   }
   2160 }
   2161 
   2162 #if defined(ENABLE_WEBRTC)
   2163 void RenderProcessHostImpl::OnRegisterAecDumpConsumer(int id) {
   2164   BrowserThread::PostTask(
   2165       BrowserThread::UI,
   2166       FROM_HERE,
   2167       base::Bind(
   2168           &RenderProcessHostImpl::RegisterAecDumpConsumerOnUIThread,
   2169           weak_factory_.GetWeakPtr(),
   2170           id));
   2171 }
   2172 
   2173 void RenderProcessHostImpl::OnUnregisterAecDumpConsumer(int id) {
   2174   BrowserThread::PostTask(
   2175       BrowserThread::UI,
   2176       FROM_HERE,
   2177       base::Bind(
   2178           &RenderProcessHostImpl::UnregisterAecDumpConsumerOnUIThread,
   2179           weak_factory_.GetWeakPtr(),
   2180           id));
   2181 }
   2182 
   2183 void RenderProcessHostImpl::RegisterAecDumpConsumerOnUIThread(int id) {
   2184   DCHECK_CURRENTLY_ON(BrowserThread::UI);
   2185   aec_dump_consumers_.push_back(id);
   2186   if (WebRTCInternals::GetInstance()->aec_dump_enabled()) {
   2187     EnableAecDumpForId(WebRTCInternals::GetInstance()->aec_dump_file_path(),
   2188                        id);
   2189   }
   2190 }
   2191 
   2192 void RenderProcessHostImpl::UnregisterAecDumpConsumerOnUIThread(int id) {
   2193   DCHECK_CURRENTLY_ON(BrowserThread::UI);
   2194   for (std::vector<int>::iterator it = aec_dump_consumers_.begin();
   2195        it != aec_dump_consumers_.end(); ++it) {
   2196     if (*it == id) {
   2197       aec_dump_consumers_.erase(it);
   2198       break;
   2199     }
   2200   }
   2201 }
   2202 
   2203 #if defined(OS_WIN)
   2204 #define IntToStringType base::IntToString16
   2205 #else
   2206 #define IntToStringType base::IntToString
   2207 #endif
   2208 
   2209 void RenderProcessHostImpl::EnableAecDumpForId(const base::FilePath& file,
   2210                                                int id) {
   2211   DCHECK_CURRENTLY_ON(BrowserThread::UI);
   2212   base::FilePath unique_file =
   2213       file.AddExtension(IntToStringType(base::GetProcId(GetHandle())))
   2214           .AddExtension(IntToStringType(id));
   2215   BrowserThread::PostTaskAndReplyWithResult(
   2216       BrowserThread::FILE, FROM_HERE,
   2217       base::Bind(&CreateAecDumpFileForProcess, unique_file, GetHandle()),
   2218       base::Bind(&RenderProcessHostImpl::SendAecDumpFileToRenderer,
   2219                  weak_factory_.GetWeakPtr(),
   2220                  id));
   2221 }
   2222 
   2223 #undef IntToStringType
   2224 
   2225 void RenderProcessHostImpl::SendAecDumpFileToRenderer(
   2226     int id,
   2227     IPC::PlatformFileForTransit file_for_transit) {
   2228   if (file_for_transit == IPC::InvalidPlatformFileForTransit())
   2229     return;
   2230   Send(new AecDumpMsg_EnableAecDump(id, file_for_transit));
   2231 }
   2232 
   2233 void RenderProcessHostImpl::SendDisableAecDumpToRenderer() {
   2234   Send(new AecDumpMsg_DisableAecDump());
   2235 }
   2236 #endif
   2237 
   2238 void RenderProcessHostImpl::IncrementWorkerRefCount() {
   2239   DCHECK_CURRENTLY_ON(BrowserThread::UI);
   2240   ++worker_ref_count_;
   2241 }
   2242 
   2243 void RenderProcessHostImpl::DecrementWorkerRefCount() {
   2244   DCHECK_CURRENTLY_ON(BrowserThread::UI);
   2245   DCHECK_GT(worker_ref_count_, 0);
   2246   --worker_ref_count_;
   2247   if (worker_ref_count_ == 0)
   2248     Cleanup();
   2249 }
   2250 
   2251 void RenderProcessHostImpl::EnsureMojoActivated() {
   2252   mojo_activation_required_ = true;
   2253   MaybeActivateMojo();
   2254 }
   2255 
   2256 }  // namespace content
   2257