2016-01-08 23:40:26 +03:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
|
|
/* vim: set ts=8 sts=2 et sw=2 tw=80: */
|
2012-05-21 15:12:37 +04:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2009-08-12 20:18:08 +04:00
|
|
|
|
2010-07-19 22:33:33 +04:00
|
|
|
#ifndef mozilla_dom_ContentParent_h
|
|
|
|
#define mozilla_dom_ContentParent_h
|
2009-08-12 20:18:08 +04:00
|
|
|
|
2010-07-19 22:33:33 +04:00
|
|
|
#include "mozilla/dom/PContentParent.h"
|
2019-02-25 23:04:55 +03:00
|
|
|
#include "mozilla/dom/CPOWManagerGetter.h"
|
|
|
|
#include "mozilla/dom/ipc/IdType.h"
|
2019-05-07 05:29:48 +03:00
|
|
|
#include "mozilla/dom/RemoteBrowser.h"
|
2016-08-04 21:33:42 +03:00
|
|
|
#include "mozilla/gfx/gfxVarReceiver.h"
|
2016-09-20 11:18:50 +03:00
|
|
|
#include "mozilla/gfx/GPUProcessListener.h"
|
2019-02-18 20:11:22 +03:00
|
|
|
#include "mozilla/ipc/BackgroundUtils.h"
|
2018-11-28 23:42:24 +03:00
|
|
|
#include "mozilla/ipc/GeckoChildProcessHost.h"
|
2019-02-25 23:04:55 +03:00
|
|
|
#include "mozilla/ipc/PParentToChildStreamParent.h"
|
|
|
|
#include "mozilla/ipc/PChildToParentStreamParent.h"
|
2012-08-03 23:35:58 +04:00
|
|
|
#include "mozilla/Attributes.h"
|
2014-02-05 20:37:26 +04:00
|
|
|
#include "mozilla/FileUtils.h"
|
2013-02-15 00:41:29 +04:00
|
|
|
#include "mozilla/HalTypes.h"
|
2013-04-26 04:53:26 +04:00
|
|
|
#include "mozilla/LinkedList.h"
|
2017-01-27 03:35:54 +03:00
|
|
|
#include "mozilla/MemoryReportingProcess.h"
|
2019-07-11 01:37:35 +03:00
|
|
|
#include "mozilla/MozPromise.h"
|
2013-07-18 01:31:10 +04:00
|
|
|
#include "mozilla/StaticPtr.h"
|
2016-12-09 21:52:28 +03:00
|
|
|
#include "mozilla/TimeStamp.h"
|
2018-11-28 23:42:31 +03:00
|
|
|
#include "mozilla/Variant.h"
|
2015-10-08 08:13:09 +03:00
|
|
|
#include "mozilla/UniquePtr.h"
|
2009-08-12 20:18:08 +04:00
|
|
|
|
2013-12-13 20:28:46 +04:00
|
|
|
#include "nsDataHashtable.h"
|
2017-05-29 13:38:46 +03:00
|
|
|
#include "nsPluginTags.h"
|
2012-09-28 09:43:12 +04:00
|
|
|
#include "nsFrameMessageManager.h"
|
2013-12-13 20:28:46 +04:00
|
|
|
#include "nsHashKeys.h"
|
2017-08-14 05:00:49 +03:00
|
|
|
#include "nsIInterfaceRequestor.h"
|
2009-09-03 04:18:27 +04:00
|
|
|
#include "nsIObserver.h"
|
2019-05-01 02:31:36 +03:00
|
|
|
#include "nsIRemoteTab.h"
|
2010-02-02 04:53:52 +03:00
|
|
|
#include "nsIThreadInternal.h"
|
2010-09-21 08:16:37 +04:00
|
|
|
#include "nsIDOMGeoPositionCallback.h"
|
2014-10-23 22:31:00 +04:00
|
|
|
#include "nsIDOMGeoPositionErrorCallback.h"
|
2016-07-14 10:04:21 +03:00
|
|
|
#include "nsRefPtrHashtable.h"
|
2013-01-03 01:21:37 +04:00
|
|
|
#include "PermissionMessageUtils.h"
|
2015-08-12 06:22:20 +03:00
|
|
|
#include "DriverCrashGuard.h"
|
2019-03-15 08:11:43 +03:00
|
|
|
#include "nsIReferrerInfo.h"
|
2009-09-03 04:18:27 +04:00
|
|
|
|
2012-09-28 09:43:24 +04:00
|
|
|
#define CHILD_PROCESS_SHUTDOWN_MESSAGE \
|
|
|
|
NS_LITERAL_STRING("child-process-shutdown")
|
|
|
|
|
2019-02-28 09:30:05 +03:00
|
|
|
// These must match the similar ones in E10SUtils.jsm and ProcInfo.h.
|
2017-07-25 06:27:40 +03:00
|
|
|
// Process names as reported by about:memory are defined in
|
|
|
|
// ContentChild:RecvRemoteType. Add your value there too or it will be called
|
|
|
|
// "Web Content".
|
2016-11-24 18:08:31 +03:00
|
|
|
#define DEFAULT_REMOTE_TYPE "web"
|
2016-11-24 18:08:32 +03:00
|
|
|
#define FILE_REMOTE_TYPE "file"
|
2017-01-13 01:11:47 +03:00
|
|
|
#define EXTENSION_REMOTE_TYPE "extension"
|
2019-05-29 14:31:31 +03:00
|
|
|
#define PRIVILEGEDABOUT_REMOTE_TYPE "privilegedabout"
|
2019-05-29 14:31:50 +03:00
|
|
|
#define PRIVILEGEDMOZILLA_REMOTE_TYPE "privilegedmozilla"
|
2016-11-24 18:08:32 +03:00
|
|
|
|
|
|
|
// This must start with the DEFAULT_REMOTE_TYPE above.
|
|
|
|
#define LARGE_ALLOCATION_REMOTE_TYPE "webLargeAllocation"
|
2016-11-24 18:08:31 +03:00
|
|
|
|
2012-11-09 21:52:09 +04:00
|
|
|
class nsConsoleService;
|
2016-11-02 02:02:43 +03:00
|
|
|
class nsIContentProcessInfo;
|
2014-05-13 21:13:00 +04:00
|
|
|
class nsICycleCollectorLogSink;
|
|
|
|
class nsIDumpGCAndCCLogsCallback;
|
2019-04-09 23:59:37 +03:00
|
|
|
class nsIRemoteTab;
|
2015-01-07 08:42:23 +03:00
|
|
|
class nsITimer;
|
2013-12-13 20:28:46 +04:00
|
|
|
class ParentIdleListener;
|
2015-04-07 16:17:27 +03:00
|
|
|
class nsIWidget;
|
2012-08-02 10:02:29 +04:00
|
|
|
|
2009-08-12 20:18:08 +04:00
|
|
|
namespace mozilla {
|
2014-07-02 02:24:27 +04:00
|
|
|
class PRemoteSpellcheckEngineParent;
|
2009-09-10 02:00:14 +04:00
|
|
|
|
2019-03-19 01:31:59 +03:00
|
|
|
#if defined(XP_LINUX) && defined(MOZ_SANDBOX)
|
2015-10-08 08:13:09 +03:00
|
|
|
class SandboxBroker;
|
|
|
|
class SandboxBrokerPolicyFactory;
|
|
|
|
#endif
|
|
|
|
|
2017-02-01 15:34:24 +03:00
|
|
|
class PreallocatedProcessManagerImpl;
|
2019-08-06 12:24:34 +03:00
|
|
|
class BenchmarkStorageParent;
|
2017-02-01 15:34:24 +03:00
|
|
|
|
2017-05-03 03:17:52 +03:00
|
|
|
using mozilla::loader::PScriptCacheParent;
|
|
|
|
|
2016-05-16 12:40:54 +03:00
|
|
|
namespace embedding {
|
|
|
|
class PrintingParent;
|
|
|
|
}
|
|
|
|
|
2009-08-12 22:31:48 +04:00
|
|
|
namespace ipc {
|
2017-08-07 15:10:02 +03:00
|
|
|
class CrashReporterHost;
|
2014-09-27 03:21:57 +04:00
|
|
|
class PFileDescriptorSetParent;
|
2012-08-23 23:33:46 +04:00
|
|
|
class URIParams;
|
2009-08-12 22:31:48 +04:00
|
|
|
class TestShellParent;
|
2018-03-23 23:18:42 +03:00
|
|
|
#ifdef FUZZING
|
|
|
|
class ProtocolFuzzerHelper;
|
|
|
|
#endif
|
2012-08-23 23:33:46 +04:00
|
|
|
} // namespace ipc
|
2009-08-12 22:31:48 +04:00
|
|
|
|
2013-07-03 11:24:32 +04:00
|
|
|
namespace jsipc {
|
2013-06-03 14:14:37 +04:00
|
|
|
class PJavaScriptParent;
|
2019-02-25 23:04:55 +03:00
|
|
|
class CpowEntry;
|
2015-07-13 18:25:42 +03:00
|
|
|
} // namespace jsipc
|
2013-07-03 11:24:32 +04:00
|
|
|
|
2012-07-18 03:59:45 +04:00
|
|
|
namespace layers {
|
2016-03-29 21:32:41 +03:00
|
|
|
struct TextureFactoryIdentifier;
|
2012-08-23 23:33:46 +04:00
|
|
|
} // namespace layers
|
2012-07-18 03:59:45 +04:00
|
|
|
|
2009-08-12 20:18:08 +04:00
|
|
|
namespace dom {
|
|
|
|
|
2019-02-15 14:35:48 +03:00
|
|
|
class BrowsingContextGroup;
|
2013-08-20 23:45:30 +04:00
|
|
|
class Element;
|
2019-04-10 00:38:15 +03:00
|
|
|
class BrowserParent;
|
2012-08-02 10:02:29 +04:00
|
|
|
class ClonedMessageData;
|
2013-09-24 01:30:40 +04:00
|
|
|
class MemoryReport;
|
|
|
|
class TabContext;
|
2016-07-14 10:04:21 +03:00
|
|
|
class GetFilesHelper;
|
2017-01-27 03:35:54 +03:00
|
|
|
class MemoryReportRequestHost;
|
2019-05-01 02:31:36 +03:00
|
|
|
struct CancelContentJSOptions;
|
2009-08-12 20:18:08 +04:00
|
|
|
|
2019-02-25 23:04:55 +03:00
|
|
|
#define NS_CONTENTPARENT_IID \
|
|
|
|
{ \
|
|
|
|
0xeeec9ebf, 0x8ecf, 0x4e38, { \
|
|
|
|
0x81, 0xda, 0xb7, 0x34, 0x13, 0x7e, 0xac, 0xf3 \
|
|
|
|
} \
|
|
|
|
}
|
|
|
|
|
2015-03-21 19:28:04 +03:00
|
|
|
class ContentParent final : public PContentParent,
|
2015-03-27 21:52:19 +03:00
|
|
|
public nsIObserver,
|
|
|
|
public nsIDOMGeoPositionCallback,
|
|
|
|
public nsIDOMGeoPositionErrorCallback,
|
2017-08-14 05:00:49 +03:00
|
|
|
public nsIInterfaceRequestor,
|
2016-08-04 21:33:42 +03:00
|
|
|
public gfx::gfxVarReceiver,
|
2015-03-27 21:52:19 +03:00
|
|
|
public mozilla::LinkedListElement<ContentParent>,
|
2016-09-20 11:18:50 +03:00
|
|
|
public gfx::GPUProcessListener,
|
2019-02-25 23:04:55 +03:00
|
|
|
public mozilla::MemoryReportingProcess,
|
|
|
|
public mozilla::dom::ipc::MessageManagerCallback,
|
|
|
|
public CPOWManagerGetter,
|
|
|
|
public mozilla::ipc::IShmemAllocator {
|
2018-11-28 23:42:24 +03:00
|
|
|
typedef mozilla::ipc::GeckoChildProcessHost GeckoChildProcessHost;
|
2016-01-05 12:59:30 +03:00
|
|
|
typedef mozilla::ipc::PFileDescriptorSetParent PFileDescriptorSetParent;
|
|
|
|
typedef mozilla::ipc::TestShellParent TestShellParent;
|
|
|
|
typedef mozilla::ipc::URIParams URIParams;
|
|
|
|
typedef mozilla::ipc::PrincipalInfo PrincipalInfo;
|
|
|
|
typedef mozilla::dom::ClonedMessageData ClonedMessageData;
|
2019-02-15 14:35:48 +03:00
|
|
|
typedef mozilla::dom::BrowsingContextGroup BrowsingContextGroup;
|
2009-08-12 20:18:08 +04:00
|
|
|
|
2017-02-01 15:34:24 +03:00
|
|
|
friend class mozilla::PreallocatedProcessManagerImpl;
|
2019-02-06 18:57:37 +03:00
|
|
|
friend class PContentParent;
|
2018-03-23 23:18:42 +03:00
|
|
|
#ifdef FUZZING
|
|
|
|
friend class mozilla::ipc::ProtocolFuzzerHelper;
|
|
|
|
#endif
|
2017-02-01 15:34:24 +03:00
|
|
|
|
2009-08-12 20:18:08 +04:00
|
|
|
public:
|
2019-07-11 01:37:35 +03:00
|
|
|
using LaunchError = mozilla::ipc::LaunchError;
|
2018-11-28 23:42:31 +03:00
|
|
|
using LaunchPromise =
|
2019-07-11 01:37:35 +03:00
|
|
|
mozilla::MozPromise<RefPtr<ContentParent>, LaunchError, false>;
|
2018-11-28 23:42:31 +03:00
|
|
|
|
2019-02-25 23:04:55 +03:00
|
|
|
NS_DECLARE_STATIC_IID_ACCESSOR(NS_CONTENTPARENT_IID)
|
|
|
|
|
2017-02-01 15:34:24 +03:00
|
|
|
/**
|
|
|
|
* Create a subprocess suitable for use later as a content process.
|
|
|
|
*/
|
2018-11-28 23:42:31 +03:00
|
|
|
static RefPtr<LaunchPromise> PreallocateProcess();
|
2017-02-01 15:34:24 +03:00
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
/**
|
|
|
|
* Start up the content-process machinery. This might include
|
|
|
|
* scheduling pre-launch tasks.
|
|
|
|
*/
|
|
|
|
static void StartUp();
|
|
|
|
|
|
|
|
/** Shut down the content-process machinery. */
|
|
|
|
static void ShutDown();
|
|
|
|
|
2017-02-01 15:34:24 +03:00
|
|
|
static uint32_t GetPoolSize(const nsAString& aContentProcessType);
|
|
|
|
|
|
|
|
static uint32_t GetMaxProcessCount(const nsAString& aContentProcessType);
|
|
|
|
|
|
|
|
static bool IsMaxProcessCountReached(const nsAString& aContentProcessType);
|
|
|
|
|
2017-02-21 13:27:23 +03:00
|
|
|
static void ReleaseCachedProcesses();
|
|
|
|
|
2017-02-01 15:34:24 +03:00
|
|
|
/**
|
|
|
|
* Picks a random content parent from |aContentParents| with a given |aOpener|
|
|
|
|
* respecting the index limit set by |aMaxContentParents|.
|
|
|
|
* Returns null if non available.
|
|
|
|
*/
|
|
|
|
static already_AddRefed<ContentParent> MinTabSelect(
|
2017-03-07 22:00:28 +03:00
|
|
|
const nsTArray<ContentParent*>& aContentParents, ContentParent* aOpener,
|
2017-02-01 15:34:24 +03:00
|
|
|
int32_t maxContentParents);
|
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
/**
|
|
|
|
* Get or create a content process for:
|
|
|
|
* 1. browser iframe
|
|
|
|
* 2. remote xul <browser>
|
|
|
|
* 3. normal iframe
|
|
|
|
*/
|
|
|
|
static already_AddRefed<ContentParent> GetNewOrUsedBrowserProcess(
|
2018-07-22 14:52:42 +03:00
|
|
|
Element* aFrameElement, const nsAString& aRemoteType,
|
2016-01-05 12:59:30 +03:00
|
|
|
hal::ProcessPriority aPriority =
|
|
|
|
hal::ProcessPriority::PROCESS_PRIORITY_FOREGROUND,
|
2017-08-16 14:00:22 +03:00
|
|
|
ContentParent* aOpener = nullptr, bool aPreferUsed = false);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2017-05-29 13:38:46 +03:00
|
|
|
/**
|
|
|
|
* Get or create a content process for a JS plugin. aPluginID is the id of the
|
|
|
|
* JS plugin
|
|
|
|
* (@see nsFakePlugin::mId). There is a maximum of one process per JS plugin.
|
|
|
|
*/
|
|
|
|
static already_AddRefed<ContentParent> GetNewOrUsedJSPluginProcess(
|
|
|
|
uint32_t aPluginID, const hal::ProcessPriority& aPriority);
|
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
/**
|
|
|
|
* Get or create a content process for the given TabContext. aFrameElement
|
|
|
|
* should be the frame/iframe element with which this process will
|
|
|
|
* associated.
|
|
|
|
*/
|
2019-05-07 05:29:48 +03:00
|
|
|
static already_AddRefed<RemoteBrowser> CreateBrowser(
|
|
|
|
const TabContext& aContext, Element* aFrameElement,
|
2019-06-21 19:24:55 +03:00
|
|
|
const nsAString& aRemoteType, BrowsingContext* aBrowsingContext,
|
|
|
|
ContentParent* aOpenerContentParent, BrowserParent* aSameTabGroupAs,
|
|
|
|
uint64_t aNextRemoteTabId);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
|
|
|
static void GetAll(nsTArray<ContentParent*>& aArray);
|
|
|
|
|
|
|
|
static void GetAllEvenIfDead(nsTArray<ContentParent*>& aArray);
|
|
|
|
|
2018-06-30 08:53:12 +03:00
|
|
|
static void BroadcastStringBundle(const StringBundleDescriptor&);
|
|
|
|
|
2019-04-27 18:37:58 +03:00
|
|
|
static void BroadcastFontListChanged();
|
|
|
|
|
2017-01-25 10:18:00 +03:00
|
|
|
const nsAString& GetRemoteType() const;
|
|
|
|
|
2018-05-17 17:42:13 +03:00
|
|
|
virtual void DoGetRemoteType(nsAString& aRemoteType,
|
|
|
|
ErrorResult& aError) const override {
|
2017-08-14 04:58:23 +03:00
|
|
|
aRemoteType = GetRemoteType();
|
|
|
|
}
|
|
|
|
|
2016-06-07 01:23:43 +03:00
|
|
|
enum CPIteratorPolicy { eLive, eAll };
|
|
|
|
|
|
|
|
class ContentParentIterator {
|
|
|
|
private:
|
|
|
|
ContentParent* mCurrent;
|
|
|
|
CPIteratorPolicy mPolicy;
|
|
|
|
|
|
|
|
public:
|
|
|
|
ContentParentIterator(CPIteratorPolicy aPolicy, ContentParent* aCurrent)
|
|
|
|
: mCurrent(aCurrent), mPolicy(aPolicy) {}
|
|
|
|
|
|
|
|
ContentParentIterator begin() {
|
2016-07-01 05:50:14 +03:00
|
|
|
// Move the cursor to the first element that matches the policy.
|
2018-12-15 04:38:27 +03:00
|
|
|
while (mPolicy != eAll && mCurrent && !mCurrent->IsAlive()) {
|
2016-07-01 05:50:14 +03:00
|
|
|
mCurrent = mCurrent->LinkedListElement<ContentParent>::getNext();
|
|
|
|
}
|
|
|
|
|
2016-06-07 01:23:43 +03:00
|
|
|
return *this;
|
|
|
|
}
|
|
|
|
ContentParentIterator end() {
|
|
|
|
return ContentParentIterator(mPolicy, nullptr);
|
|
|
|
}
|
|
|
|
|
|
|
|
const ContentParentIterator& operator++() {
|
|
|
|
MOZ_ASSERT(mCurrent);
|
|
|
|
do {
|
|
|
|
mCurrent = mCurrent->LinkedListElement<ContentParent>::getNext();
|
2018-12-15 04:38:27 +03:00
|
|
|
} while (mPolicy != eAll && mCurrent && !mCurrent->IsAlive());
|
2016-06-07 01:23:43 +03:00
|
|
|
|
|
|
|
return *this;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool operator!=(const ContentParentIterator& aOther) {
|
|
|
|
MOZ_ASSERT(mPolicy == aOther.mPolicy);
|
|
|
|
return mCurrent != aOther.mCurrent;
|
|
|
|
}
|
|
|
|
|
|
|
|
ContentParent* operator*() { return mCurrent; }
|
|
|
|
};
|
|
|
|
|
|
|
|
static ContentParentIterator AllProcesses(CPIteratorPolicy aPolicy) {
|
|
|
|
ContentParent* first =
|
|
|
|
sContentParents ? sContentParents->getFirst() : nullptr;
|
|
|
|
return ContentParentIterator(aPolicy, first);
|
|
|
|
}
|
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
static bool IgnoreIPCPrincipal();
|
|
|
|
|
|
|
|
static void NotifyUpdatedDictionaries();
|
2014-10-03 18:52:37 +04:00
|
|
|
|
2017-11-02 23:29:33 +03:00
|
|
|
static void NotifyUpdatedFonts();
|
2019-04-27 18:37:58 +03:00
|
|
|
static void NotifyRebuildFontList();
|
2017-11-02 23:29:33 +03:00
|
|
|
|
2015-04-07 16:17:27 +03:00
|
|
|
#if defined(XP_WIN)
|
2016-01-05 12:59:30 +03:00
|
|
|
/**
|
|
|
|
* Windows helper for firing off an update window request to a plugin
|
|
|
|
* instance.
|
|
|
|
*
|
|
|
|
* aWidget - the eWindowType_plugin_ipc_chrome widget associated with
|
|
|
|
* this plugin window.
|
|
|
|
*/
|
|
|
|
static void SendAsyncUpdate(nsIWidget* aWidget);
|
2015-04-07 16:17:27 +03:00
|
|
|
#endif
|
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
// Let managees query if it is safe to send messages.
|
|
|
|
bool IsDestroyed() const { return !mIPCOpen; }
|
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvOpenRecordReplayChannel(
|
|
|
|
const uint32_t& channelId, FileDescriptor* connection);
|
|
|
|
mozilla::ipc::IPCResult RecvCreateReplayingProcess(
|
|
|
|
const uint32_t& aChannelId);
|
2019-08-04 19:50:37 +03:00
|
|
|
mozilla::ipc::IPCResult RecvGenerateReplayCrashReport(
|
|
|
|
const uint32_t& aChannelId);
|
2018-07-22 14:52:42 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvCreateGMPService();
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvLoadPlugin(
|
2016-11-15 06:26:00 +03:00
|
|
|
const uint32_t& aPluginId, nsresult* aRv, uint32_t* aRunID,
|
2019-02-06 18:58:43 +03:00
|
|
|
Endpoint<PPluginModuleParent>* aEndpoint);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvMaybeReloadPlugins();
|
2017-06-06 20:39:46 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvConnectPluginBridge(
|
2016-11-15 06:26:00 +03:00
|
|
|
const uint32_t& aPluginId, nsresult* aRv,
|
2019-02-06 18:58:43 +03:00
|
|
|
Endpoint<PPluginModuleParent>* aEndpoint);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvLaunchRDDProcess(
|
|
|
|
nsresult* aRv, Endpoint<PRemoteDecoderManagerChild>* aEndpoint);
|
2019-01-12 07:51:20 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvUngrabPointer(const uint32_t& aTime);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvRemovePermission(const IPC::Principal& aPrincipal,
|
|
|
|
const nsCString& aPermissionType,
|
|
|
|
nsresult* aRv);
|
2016-03-03 00:09:48 +03:00
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
NS_DECL_CYCLE_COLLECTION_CLASS_AMBIGUOUS(ContentParent, nsIObserver)
|
|
|
|
|
|
|
|
NS_DECL_CYCLE_COLLECTING_ISUPPORTS
|
|
|
|
NS_DECL_NSIOBSERVER
|
|
|
|
NS_DECL_NSIDOMGEOPOSITIONCALLBACK
|
|
|
|
NS_DECL_NSIDOMGEOPOSITIONERRORCALLBACK
|
2017-08-14 05:00:49 +03:00
|
|
|
NS_DECL_NSIINTERFACEREQUESTOR
|
2016-01-05 12:59:30 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* MessageManagerCallback methods that we override.
|
|
|
|
*/
|
|
|
|
virtual bool DoLoadMessageManagerScript(const nsAString& aURL,
|
|
|
|
bool aRunInGlobalScope) override;
|
|
|
|
|
|
|
|
virtual nsresult DoSendAsyncMessage(JSContext* aCx, const nsAString& aMessage,
|
|
|
|
StructuredCloneData& aData,
|
|
|
|
JS::Handle<JSObject*> aCpows,
|
|
|
|
nsIPrincipal* aPrincipal) override;
|
|
|
|
|
|
|
|
/** Notify that a tab is beginning its destruction sequence. */
|
|
|
|
static void NotifyTabDestroying(const TabId& aTabId,
|
|
|
|
const ContentParentId& aCpId);
|
|
|
|
|
|
|
|
/** Notify that a tab was destroyed during normal operation. */
|
|
|
|
void NotifyTabDestroyed(const TabId& aTabId, bool aNotifiedDestroying);
|
|
|
|
|
|
|
|
TestShellParent* CreateTestShell();
|
|
|
|
|
|
|
|
bool DestroyTestShell(TestShellParent* aTestShell);
|
|
|
|
|
|
|
|
TestShellParent* GetTestShellSingleton();
|
|
|
|
|
|
|
|
jsipc::CPOWManager* GetCPOWManager() override;
|
|
|
|
|
2018-11-20 02:18:33 +03:00
|
|
|
// This method can be called on any thread.
|
|
|
|
void RegisterRemoteWorkerActor();
|
|
|
|
|
|
|
|
// This method _must_ be called on main-thread because it can start the
|
|
|
|
// shutting down of the content process.
|
|
|
|
void UnregisterRemoveWorkerActor();
|
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
void ReportChildAlreadyBlocked();
|
|
|
|
|
|
|
|
bool RequestRunToCompletion();
|
|
|
|
|
2017-08-03 14:00:41 +03:00
|
|
|
void UpdateCookieStatus(nsIChannel* aChannel);
|
|
|
|
|
2018-12-15 04:38:27 +03:00
|
|
|
bool IsLaunching() const {
|
|
|
|
return mLifecycleState == LifecycleState::LAUNCHING;
|
|
|
|
}
|
2017-01-27 03:35:54 +03:00
|
|
|
bool IsAlive() const override;
|
2018-12-14 08:28:56 +03:00
|
|
|
bool IsDead() const { return mLifecycleState == LifecycleState::DEAD; }
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-25 23:04:53 +03:00
|
|
|
bool IsForBrowser() const { return mIsForBrowser; }
|
|
|
|
bool IsForJSPlugin() const {
|
2017-05-29 13:38:46 +03:00
|
|
|
return mJSPluginID != nsFakePluginTag::NOT_JSPLUGIN;
|
|
|
|
}
|
2015-04-07 16:17:27 +03:00
|
|
|
|
2018-11-28 23:42:24 +03:00
|
|
|
GeckoChildProcessHost* Process() const { return mSubprocess; }
|
2016-01-05 12:59:30 +03:00
|
|
|
|
|
|
|
ContentParent* Opener() const { return mOpener; }
|
2016-11-02 02:02:43 +03:00
|
|
|
nsIContentProcessInfo* ScriptableHelper() const { return mScriptableHelper; }
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-25 23:04:53 +03:00
|
|
|
mozilla::dom::ProcessMessageManager* GetMessageManager() const {
|
|
|
|
return mMessageManager;
|
|
|
|
}
|
|
|
|
|
2017-03-03 01:04:52 +03:00
|
|
|
bool NeedsPermissionsUpdate(const nsACString& aPermissionKey) const;
|
2016-01-05 12:59:30 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Kill our subprocess and make sure it dies. Should only be used
|
|
|
|
* in emergency situations since it bypasses the normal shutdown
|
|
|
|
* process.
|
2016-05-04 06:08:41 +03:00
|
|
|
*
|
|
|
|
* WARNING: aReason appears in telemetry, so any new value passed in requires
|
|
|
|
* data review.
|
2016-01-05 12:59:30 +03:00
|
|
|
*/
|
|
|
|
void KillHard(const char* aWhy);
|
|
|
|
|
2019-02-25 23:04:53 +03:00
|
|
|
ContentParentId ChildID() const { return mChildID; }
|
2016-01-05 12:59:30 +03:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Get a user-friendly name for this ContentParent. We make no guarantees
|
|
|
|
* about this name: It might not be unique, apps can spoof special names,
|
|
|
|
* etc. So please don't use this name to make any decisions about the
|
|
|
|
* ContentParent based on the value returned here.
|
|
|
|
*/
|
|
|
|
void FriendlyName(nsAString& aName, bool aAnonymize = false);
|
|
|
|
|
|
|
|
virtual void OnChannelError() override;
|
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvInitCrashReporter(
|
|
|
|
Shmem&& aShmem, const NativeThreadId& aThreadId);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
PNeckoParent* AllocPNeckoParent();
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2016-11-15 06:26:00 +03:00
|
|
|
virtual mozilla::ipc::IPCResult RecvPNeckoConstructor(
|
|
|
|
PNeckoParent* aActor) override {
|
2016-01-05 12:59:30 +03:00
|
|
|
return PContentParent::RecvPNeckoConstructor(aActor);
|
|
|
|
}
|
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
PPrintingParent* AllocPPrintingParent();
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPPrintingParent(PPrintingParent* aActor);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2016-05-16 12:40:54 +03:00
|
|
|
#if defined(NS_PRINTING)
|
|
|
|
/**
|
|
|
|
* @return the PrintingParent for this ContentParent.
|
|
|
|
*/
|
|
|
|
already_AddRefed<embedding::PrintingParent> GetPrintingParent();
|
|
|
|
#endif
|
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvInitStreamFilter(
|
2017-09-08 03:28:27 +03:00
|
|
|
const uint64_t& aChannelId, const nsString& aAddonId,
|
2019-02-06 18:58:43 +03:00
|
|
|
InitStreamFilterResolver&& aResolver);
|
2017-09-08 03:28:27 +03:00
|
|
|
|
2019-02-25 23:04:53 +03:00
|
|
|
PChildToParentStreamParent* AllocPChildToParentStreamParent();
|
|
|
|
bool DeallocPChildToParentStreamParent(PChildToParentStreamParent* aActor);
|
2019-02-25 18:51:12 +03:00
|
|
|
|
2019-02-25 23:04:53 +03:00
|
|
|
PParentToChildStreamParent* AllocPParentToChildStreamParent();
|
|
|
|
bool DeallocPParentToChildStreamParent(PParentToChildStreamParent* aActor);
|
2019-02-25 23:04:47 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
PHalParent* AllocPHalParent();
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2016-11-15 06:26:00 +03:00
|
|
|
virtual mozilla::ipc::IPCResult RecvPHalConstructor(
|
|
|
|
PHalParent* aActor) override {
|
2016-01-05 12:59:30 +03:00
|
|
|
return PContentParent::RecvPHalConstructor(aActor);
|
|
|
|
}
|
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
PHeapSnapshotTempFileHelperParent* AllocPHeapSnapshotTempFileHelperParent();
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-25 23:04:53 +03:00
|
|
|
PJavaScriptParent* AllocPJavaScriptParent();
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2016-11-15 06:26:00 +03:00
|
|
|
virtual mozilla::ipc::IPCResult RecvPJavaScriptConstructor(
|
2016-01-05 12:59:30 +03:00
|
|
|
PJavaScriptParent* aActor) override {
|
|
|
|
return PContentParent::RecvPJavaScriptConstructor(aActor);
|
|
|
|
}
|
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
PRemoteSpellcheckEngineParent* AllocPRemoteSpellcheckEngineParent();
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvRecordingDeviceEvents(
|
2016-11-15 06:26:00 +03:00
|
|
|
const nsString& aRecordingStatus, const nsString& aPageURL,
|
2019-02-06 18:58:43 +03:00
|
|
|
const bool& aIsAudio, const bool& aIsVideo);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
|
|
|
bool CycleCollectWithLogs(bool aDumpAllTraces,
|
|
|
|
nsICycleCollectorLogSink* aSink,
|
|
|
|
nsIDumpGCAndCCLogsCallback* aCallback);
|
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvNotifyTabDestroying(const TabId& aTabId,
|
|
|
|
const ContentParentId& aCpId);
|
2014-11-13 03:31:00 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
POfflineCacheUpdateParent* AllocPOfflineCacheUpdateParent(
|
2016-01-05 12:59:30 +03:00
|
|
|
const URIParams& aManifestURI, const URIParams& aDocumentURI,
|
2019-02-06 18:58:07 +03:00
|
|
|
const PrincipalInfo& aLoadingPrincipalInfo, const bool& aStickDocument);
|
2015-04-14 04:08:00 +03:00
|
|
|
|
2016-11-15 06:26:00 +03:00
|
|
|
virtual mozilla::ipc::IPCResult RecvPOfflineCacheUpdateConstructor(
|
2016-01-05 12:59:30 +03:00
|
|
|
POfflineCacheUpdateParent* aActor, const URIParams& aManifestURI,
|
|
|
|
const URIParams& aDocumentURI, const PrincipalInfo& aLoadingPrincipal,
|
2016-01-18 22:20:08 +03:00
|
|
|
const bool& stickDocument) override;
|
2015-04-14 04:08:00 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPOfflineCacheUpdateParent(POfflineCacheUpdateParent* aActor);
|
2015-10-08 00:38:08 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
mozilla::ipc::IPCResult RecvSetOfflinePermission(
|
2019-02-06 18:58:43 +03:00
|
|
|
const IPC::Principal& principal);
|
2015-04-24 01:05:29 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvFinishShutdown();
|
2015-07-31 10:25:27 +03:00
|
|
|
|
2019-04-10 00:38:15 +03:00
|
|
|
void MaybeInvokeDragSession(BrowserParent* aParent);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
PContentPermissionRequestParent* AllocPContentPermissionRequestParent(
|
2019-07-10 06:27:27 +03:00
|
|
|
const nsTArray<PermissionRequest>& aRequests,
|
2016-01-05 12:59:30 +03:00
|
|
|
const IPC::Principal& aPrincipal,
|
2019-04-18 16:43:05 +03:00
|
|
|
const IPC::Principal& aTopLevelPrincipal,
|
|
|
|
const bool& aIsHandlingUserInput, const bool& aDocumentHasUserInput,
|
|
|
|
const DOMTimeStamp& aPageLoadTimestamp, const TabId& aTabId);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPContentPermissionRequestParent(
|
|
|
|
PContentPermissionRequestParent* actor);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
|
|
|
virtual bool HandleWindowsMessages(const Message& aMsg) const override;
|
|
|
|
|
|
|
|
void ForkNewProcess(bool aBlocking);
|
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvCreateWindow(
|
2019-04-10 00:38:15 +03:00
|
|
|
PBrowserParent* aThisBrowserParent, PBrowserParent* aNewTab,
|
2016-11-24 18:08:31 +03:00
|
|
|
const uint32_t& aChromeFlags, const bool& aCalledFromJS,
|
|
|
|
const bool& aPositionSpecified, const bool& aSizeSpecified,
|
2019-03-06 17:05:50 +03:00
|
|
|
const Maybe<URIParams>& aURIToLoad, const nsCString& aFeatures,
|
2019-03-15 08:11:43 +03:00
|
|
|
const float& aFullZoom, const IPC::Principal& aTriggeringPrincipal,
|
|
|
|
nsIContentSecurityPolicy* aCsp, nsIReferrerInfo* aReferrerInfo,
|
2019-02-21 18:00:32 +03:00
|
|
|
CreateWindowResolver&& aResolve);
|
2016-11-24 18:08:31 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvCreateWindowInDifferentProcess(
|
2016-11-24 18:08:31 +03:00
|
|
|
PBrowserParent* aThisTab, const uint32_t& aChromeFlags,
|
|
|
|
const bool& aCalledFromJS, const bool& aPositionSpecified,
|
2019-03-06 17:05:50 +03:00
|
|
|
const bool& aSizeSpecified, const Maybe<URIParams>& aURIToLoad,
|
2019-03-15 08:11:43 +03:00
|
|
|
const nsCString& aFeatures, const float& aFullZoom, const nsString& aName,
|
2019-06-28 23:10:03 +03:00
|
|
|
nsIPrincipal* aTriggeringPrincipal, nsIContentSecurityPolicy* aCsp,
|
|
|
|
nsIReferrerInfo* aReferrerInfo);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2016-07-17 17:50:50 +03:00
|
|
|
static void BroadcastBlobURLRegistration(
|
|
|
|
const nsACString& aURI, BlobImpl* aBlobImpl, nsIPrincipal* aPrincipal,
|
|
|
|
ContentParent* aIgnoreThisCP = nullptr);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2016-07-17 17:50:50 +03:00
|
|
|
static void BroadcastBlobURLUnregistration(
|
|
|
|
const nsACString& aURI, ContentParent* aIgnoreThisCP = nullptr);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvStoreAndBroadcastBlobURLRegistration(
|
|
|
|
const nsCString& aURI, const IPCBlob& aBlob, const Principal& aPrincipal);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvUnstoreAndBroadcastBlobURLUnregistration(
|
|
|
|
const nsCString& aURI);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvGetA11yContentId(uint32_t* aContentId);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvA11yHandlerControl(
|
|
|
|
const uint32_t& aPid, const IHandlerControlHolder& aHandlerControl);
|
Bug 1303060: Changes to a11y to enable the serving of a COM handler; r=tbsaunde
MozReview-Commit-ID: GTQF3x1pBtX
A general outline of the COM handler (a.k.a. the "smart proxy"):
COM handlers are pieces of code that are loaded by the COM runtime along with
a proxy and are layered above that proxy. This enables the COM handler to
interpose itself between the caller and the proxy, thus providing the
opportunity for the handler to manipulate an interface's method calls before
those calls reach the proxy.
Handlers are regular COM components that live in DLLs and are declared in the
Windows registry. In order to allow for the specifying of a handler (and an
optional payload to be sent with the proxy), the mscom library allows its
clients to specify an implementation of the IHandlerProvider interface.
IHandlerProvider consists of 5 functions:
* GetHandler returns the CLSID of the component that should be loaded into
the COM client's process. If GetHandler returns a failure code, then no
handler is loaded.
* GetHandlerPayloadSize and WriteHandlerPayload are for obtaining the payload
data. These calls are made on a background thread but need to do their work
on the main thread. We declare the payload struct in IDL. MIDL generates two
functions, IA2Payload_Encode and IA2Payload_Decode, which are used by
mscom::StructToStream to read and write that struct to and from buffers.
* The a11y payload struct also includes an interface, IGeckoBackChannel, that
allows the handler to communicate directly with Gecko. IGeckoBackChannel
currently provides two methods: one to allow the handler to request fresh
cache information, and the other to provide Gecko with its IHandlerControl
interface.
* MarshalAs accepts an IID that specifies the interface that is about to be
proxied. We may want to send a more sophisticated proxy than the one that
is requested. The desired IID is returned by this function. In the case of
a11y interfaces, we should always return IAccessible2_3 if we are asked for
one of its parent interfaces. This allows us to eliminate round trips to
resolve more sophisticated interfaces later on.
* NewInstance, which is needed to ensure that all descendent proxies are also
imbued with the same handler code.
The main focus of this patch is as follows:
1. Provide an implementation of the IHandlerProvider interface;
2. Populate the handler payload (ie, the cache) with data;
3. Modify CreateHolderFromAccessible to specify the HandlerPayload object;
4. Receive the IHandlerControl interface from the handler DLL and move it
into the chrome process.
Some more information about IHandlerControl:
There is one IHandlerControl per handler DLL instance. It is the interface that
we call in Gecko when we need to dispatch an event to the handler. In order to
ensure that events are dispatched in the correct order, we need to dispatch
those events from the chrome main thread so that they occur in sequential order
with calls to NotifyWinEvent.
--HG--
extra : rebase_source : acb44dead7cc5488424720e1bf58862b7b30374f
2017-04-05 00:23:55 +03:00
|
|
|
|
2016-08-01 13:26:48 +03:00
|
|
|
virtual int32_t Pid() const override;
|
|
|
|
|
2017-04-07 09:15:16 +03:00
|
|
|
// PURLClassifierParent.
|
2019-02-06 18:58:07 +03:00
|
|
|
PURLClassifierParent* AllocPURLClassifierParent(const Principal& aPrincipal,
|
|
|
|
bool* aSuccess);
|
2016-11-19 00:54:57 +03:00
|
|
|
virtual mozilla::ipc::IPCResult RecvPURLClassifierConstructor(
|
|
|
|
PURLClassifierParent* aActor, const Principal& aPrincipal,
|
2019-01-18 00:24:43 +03:00
|
|
|
bool* aSuccess) override;
|
2017-03-15 04:00:00 +03:00
|
|
|
|
2017-04-07 09:15:16 +03:00
|
|
|
// PURLClassifierLocalParent.
|
2019-02-06 18:58:07 +03:00
|
|
|
PURLClassifierLocalParent* AllocPURLClassifierLocalParent(
|
2018-12-14 14:40:17 +03:00
|
|
|
const URIParams& aURI,
|
2019-02-06 18:58:07 +03:00
|
|
|
const nsTArray<IPCURLClassifierFeature>& aFeatures);
|
2018-12-14 14:40:17 +03:00
|
|
|
|
2016-11-15 06:26:00 +03:00
|
|
|
virtual mozilla::ipc::IPCResult RecvPURLClassifierLocalConstructor(
|
2017-04-07 09:15:16 +03:00
|
|
|
PURLClassifierLocalParent* aActor, const URIParams& aURI,
|
2018-12-14 14:40:17 +03:00
|
|
|
nsTArray<IPCURLClassifierFeature>&& aFeatures) override;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
PLoginReputationParent* AllocPLoginReputationParent(const URIParams& aURI);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2017-12-07 11:32:52 +03:00
|
|
|
virtual mozilla::ipc::IPCResult RecvPLoginReputationConstructor(
|
|
|
|
PLoginReputationParent* aActor, const URIParams& aURI) override;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPLoginReputationParent(PLoginReputationParent* aActor);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2019-02-06 08:09:57 +03:00
|
|
|
PSessionStorageObserverParent* AllocPSessionStorageObserverParent();
|
|
|
|
|
|
|
|
virtual mozilla::ipc::IPCResult RecvPSessionStorageObserverConstructor(
|
|
|
|
PSessionStorageObserverParent* aActor) override;
|
|
|
|
|
|
|
|
bool DeallocPSessionStorageObserverParent(
|
|
|
|
PSessionStorageObserverParent* aActor);
|
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPURLClassifierLocalParent(PURLClassifierLocalParent* aActor);
|
2017-04-07 09:15:16 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPURLClassifierParent(PURLClassifierParent* aActor);
|
2016-11-19 00:54:57 +03:00
|
|
|
|
2016-07-23 02:36:45 +03:00
|
|
|
// Use the PHangMonitor channel to ask the child to repaint a tab.
|
2019-04-10 00:38:15 +03:00
|
|
|
void PaintTabWhileInterruptingJS(BrowserParent* aBrowserParent,
|
|
|
|
bool aForceRepaint,
|
2018-07-30 16:24:50 +03:00
|
|
|
const layers::LayersObserverEpoch& aEpoch);
|
2016-07-23 02:36:45 +03:00
|
|
|
|
2019-05-01 02:31:36 +03:00
|
|
|
void CancelContentJSExecutionIfRunning(
|
|
|
|
BrowserParent* aBrowserParent,
|
|
|
|
nsIRemoteTab::NavigationType aNavigationType,
|
|
|
|
const CancelContentJSOptions& aCancelContentJSOptions);
|
2019-05-01 02:56:17 +03:00
|
|
|
|
2017-04-29 01:03:11 +03:00
|
|
|
// This function is called when we are about to load a document from an
|
2019-02-28 04:09:48 +03:00
|
|
|
// HTTP(S) or FTP channel for a content process. It is a useful place
|
|
|
|
// to start to kick off work as early as possible in response to such
|
2017-04-29 01:03:11 +03:00
|
|
|
// document loads.
|
2019-02-28 04:09:48 +03:00
|
|
|
nsresult AboutToLoadHttpFtpDocumentForChild(nsIChannel* aChannel);
|
2017-03-03 00:55:09 +03:00
|
|
|
|
2017-03-18 00:04:44 +03:00
|
|
|
nsresult TransmitPermissionsForPrincipal(nsIPrincipal* aPrincipal);
|
|
|
|
|
2017-05-12 08:44:27 +03:00
|
|
|
void OnCompositorDeviceReset() override;
|
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
PClientOpenWindowOpParent* AllocPClientOpenWindowOpParent(
|
|
|
|
const ClientOpenWindowArgs& aArgs);
|
2017-11-01 20:19:38 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPClientOpenWindowOpParent(PClientOpenWindowOpParent* aActor);
|
2017-11-01 20:19:38 +03:00
|
|
|
|
2017-12-08 22:46:43 +03:00
|
|
|
static hal::ProcessPriority GetInitialProcessPriority(Element* aFrameElement);
|
|
|
|
|
2017-07-28 10:14:54 +03:00
|
|
|
// Control the priority of the IPC messages for input events.
|
|
|
|
void SetInputPriorityEventEnabled(bool aEnabled);
|
|
|
|
bool IsInputPriorityEventEnabled() { return mIsInputPriorityEventEnabled; }
|
|
|
|
|
|
|
|
static bool IsInputEventQueueSupported();
|
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvAttachBrowsingContext(
|
2019-03-14 21:51:09 +03:00
|
|
|
BrowsingContext::IPCInitializer&& aInit);
|
2018-07-26 10:31:00 +03:00
|
|
|
|
2019-07-15 23:44:50 +03:00
|
|
|
mozilla::ipc::IPCResult RecvDetachBrowsingContext(
|
|
|
|
uint64_t aContextId, DetachBrowsingContextResolver&& aResolve);
|
2019-04-29 14:38:45 +03:00
|
|
|
|
|
|
|
mozilla::ipc::IPCResult RecvCacheBrowsingContextChildren(
|
|
|
|
BrowsingContext* aContext);
|
|
|
|
|
|
|
|
mozilla::ipc::IPCResult RecvRestoreBrowsingContextChildren(
|
2019-05-28 10:40:00 +03:00
|
|
|
BrowsingContext* aContext, BrowsingContext::Children&& aChildren);
|
2018-07-26 10:31:00 +03:00
|
|
|
|
2019-02-14 00:02:55 +03:00
|
|
|
mozilla::ipc::IPCResult RecvWindowClose(BrowsingContext* aContext,
|
|
|
|
bool aTrustedCaller);
|
|
|
|
mozilla::ipc::IPCResult RecvWindowFocus(BrowsingContext* aContext);
|
|
|
|
mozilla::ipc::IPCResult RecvWindowBlur(BrowsingContext* aContext);
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvWindowPostMessage(
|
2019-02-14 00:02:55 +03:00
|
|
|
BrowsingContext* aContext, const ClonedMessageData& aMessage,
|
2019-02-06 18:58:43 +03:00
|
|
|
const PostMessageData& aData);
|
2019-01-02 16:29:18 +03:00
|
|
|
|
2019-02-25 23:04:47 +03:00
|
|
|
FORWARD_SHMEM_ALLOCATOR_TO(PContentParent)
|
|
|
|
|
2010-02-02 04:53:52 +03:00
|
|
|
protected:
|
2016-01-05 12:59:30 +03:00
|
|
|
void OnChannelConnected(int32_t pid) override;
|
|
|
|
|
2019-07-03 06:34:37 +03:00
|
|
|
void ActorDestroy(ActorDestroyReason why) override;
|
|
|
|
void ActorDealloc() override;
|
2016-01-05 12:59:30 +03:00
|
|
|
|
|
|
|
bool ShouldContinueFromReplyTimeout() override;
|
2013-08-27 08:56:57 +04:00
|
|
|
|
2016-08-04 21:33:42 +03:00
|
|
|
void OnVarChanged(const GfxVarUpdate& aVar) override;
|
2016-09-20 11:18:50 +03:00
|
|
|
void OnCompositorUnexpectedShutdown() override;
|
2016-08-04 21:33:42 +03:00
|
|
|
|
2009-08-12 20:18:08 +04:00
|
|
|
private:
|
2017-02-07 19:46:44 +03:00
|
|
|
/**
|
|
|
|
* A map of the remote content process type to a list of content parents
|
|
|
|
* currently available to host *new* tabs/frames of that type.
|
|
|
|
*
|
|
|
|
* If a content process is identified as troubled or dead, it will be
|
|
|
|
* removed from this list, but will still be in the sContentParents list for
|
|
|
|
* the GetAll/GetAllEvenIfDead APIs.
|
|
|
|
*/
|
2016-11-24 18:08:32 +03:00
|
|
|
static nsClassHashtable<nsStringHashKey, nsTArray<ContentParent*>>*
|
|
|
|
sBrowserContentParents;
|
2016-01-05 12:59:30 +03:00
|
|
|
static nsTArray<ContentParent*>* sPrivateContent;
|
2017-05-29 13:38:46 +03:00
|
|
|
static nsDataHashtable<nsUint32HashKey, ContentParent*>*
|
|
|
|
sJSPluginContentParents;
|
2016-01-05 12:59:30 +03:00
|
|
|
static StaticAutoPtr<LinkedList<ContentParent>> sContentParents;
|
|
|
|
|
2019-03-19 01:31:59 +03:00
|
|
|
#if defined(XP_MACOSX) && defined(MOZ_SANDBOX)
|
2018-11-09 20:21:36 +03:00
|
|
|
// Cached Mac sandbox params used when launching content processes.
|
|
|
|
static StaticAutoPtr<std::vector<std::string>> sMacSandboxParams;
|
|
|
|
#endif
|
|
|
|
|
2017-08-24 16:43:28 +03:00
|
|
|
// Set aLoadUri to true to load aURIToLoad and to false to only create the
|
|
|
|
// window. aURIToLoad should always be provided, if available, to ensure
|
|
|
|
// compatibility with GeckoView.
|
2016-11-24 18:08:31 +03:00
|
|
|
mozilla::ipc::IPCResult CommonCreateWindow(
|
|
|
|
PBrowserParent* aThisTab, bool aSetOpener, const uint32_t& aChromeFlags,
|
|
|
|
const bool& aCalledFromJS, const bool& aPositionSpecified,
|
|
|
|
const bool& aSizeSpecified, nsIURI* aURIToLoad,
|
2019-03-15 08:11:43 +03:00
|
|
|
const nsCString& aFeatures, const float& aFullZoom,
|
2019-04-09 23:59:37 +03:00
|
|
|
uint64_t aNextRemoteTabId, const nsString& aName, nsresult& aResult,
|
2019-05-08 22:34:47 +03:00
|
|
|
nsCOMPtr<nsIRemoteTab>& aNewRemoteTab, bool* aWindowIsNew,
|
2019-03-15 08:11:43 +03:00
|
|
|
int32_t& aOpenLocation, nsIPrincipal* aTriggeringPrincipal,
|
|
|
|
nsIReferrerInfo* aReferrerInfo, bool aLoadUri,
|
|
|
|
nsIContentSecurityPolicy* aCsp);
|
2016-11-24 18:08:31 +03:00
|
|
|
|
2018-07-22 14:52:42 +03:00
|
|
|
enum RecordReplayState { eNotRecordingOrReplaying, eRecording, eReplaying };
|
|
|
|
|
2017-05-29 13:38:46 +03:00
|
|
|
explicit ContentParent(int32_t aPluginID)
|
2018-07-22 14:52:42 +03:00
|
|
|
: ContentParent(nullptr, EmptyString(), eNotRecordingOrReplaying,
|
|
|
|
EmptyString(), aPluginID) {}
|
2017-05-29 13:38:46 +03:00
|
|
|
ContentParent(ContentParent* aOpener, const nsAString& aRemoteType,
|
2018-07-22 14:52:42 +03:00
|
|
|
RecordReplayState aRecordReplayState = eNotRecordingOrReplaying,
|
|
|
|
const nsAString& aRecordingFile = EmptyString())
|
|
|
|
: ContentParent(aOpener, aRemoteType, aRecordReplayState, aRecordingFile,
|
|
|
|
nsFakePluginTag::NOT_JSPLUGIN) {}
|
2017-05-29 13:38:46 +03:00
|
|
|
|
2016-10-15 04:46:26 +03:00
|
|
|
ContentParent(ContentParent* aOpener, const nsAString& aRemoteType,
|
2018-07-22 14:52:42 +03:00
|
|
|
RecordReplayState aRecordReplayState,
|
|
|
|
const nsAString& aRecordingFile, int32_t aPluginID);
|
2013-06-03 14:14:40 +04:00
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
// Launch the subprocess and associated initialization.
|
|
|
|
// Returns false if the process fails to start.
|
2018-11-28 23:42:31 +03:00
|
|
|
// Deprecated in favor of LaunchSubprocessAsync.
|
|
|
|
bool LaunchSubprocessSync(hal::ProcessPriority aInitialPriority);
|
|
|
|
|
|
|
|
// Launch the subprocess and associated initialization;
|
|
|
|
// returns a promise and signals failure by rejecting.
|
|
|
|
// OS-level launching work is dispatched to another thread, but some
|
|
|
|
// initialization (creating IPDL actors, etc.; see Init()) is run on
|
|
|
|
// the main thread.
|
|
|
|
RefPtr<LaunchPromise> LaunchSubprocessAsync(
|
|
|
|
hal::ProcessPriority aInitialPriority);
|
|
|
|
|
|
|
|
// Common implementation of LaunchSubprocess{Sync,Async}.
|
|
|
|
void LaunchSubprocessInternal(
|
|
|
|
hal::ProcessPriority aInitialPriority,
|
|
|
|
mozilla::Variant<bool*, RefPtr<LaunchPromise>*>&& aRetval);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2018-03-22 23:02:57 +03:00
|
|
|
// Common initialization after sub process launch.
|
2019-07-11 01:37:34 +03:00
|
|
|
bool InitInternal(ProcessPriority aPriority);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2018-11-13 18:34:49 +03:00
|
|
|
// Generate a minidump for the child process and one for the main process
|
|
|
|
void GeneratePairedMinidump(const char* aReason);
|
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
virtual ~ContentParent();
|
|
|
|
|
|
|
|
void Init();
|
|
|
|
|
|
|
|
// Some information could be sent to content very early, it
|
|
|
|
// should be send from this function. This function should only be
|
2016-10-15 04:46:26 +03:00
|
|
|
// called after the process has been transformed to browser.
|
2016-01-05 12:59:30 +03:00
|
|
|
void ForwardKnownInfo();
|
|
|
|
|
2017-05-30 14:46:41 +03:00
|
|
|
/**
|
|
|
|
* We might want to reuse barely used content processes if certain criteria
|
|
|
|
* are met.
|
|
|
|
*/
|
|
|
|
bool TryToRecycle();
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Removing it from the static array so it won't be returned for new tabs in
|
|
|
|
* GetNewOrUsedBrowserProcess.
|
|
|
|
*/
|
|
|
|
void RemoveFromList();
|
|
|
|
|
2016-11-24 18:08:32 +03:00
|
|
|
/**
|
|
|
|
* Decide whether the process should be kept alive even when it would normally
|
|
|
|
* be shut down, for example when all its tabs are closed.
|
|
|
|
*/
|
2019-08-15 01:04:46 +03:00
|
|
|
bool ShouldKeepProcessAlive() const;
|
2016-11-24 18:08:32 +03:00
|
|
|
|
2017-02-07 19:46:44 +03:00
|
|
|
/**
|
|
|
|
* Mark this ContentParent as "troubled". This means that it is still alive,
|
|
|
|
* but it won't be returned for new tabs in GetNewOrUsedBrowserProcess.
|
|
|
|
*/
|
|
|
|
void MarkAsTroubled();
|
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
/**
|
|
|
|
* Mark this ContentParent as dead for the purposes of Get*().
|
|
|
|
* This method is idempotent.
|
|
|
|
*/
|
|
|
|
void MarkAsDead();
|
|
|
|
|
|
|
|
/**
|
|
|
|
* How we will shut down this ContentParent and its subprocess.
|
|
|
|
*/
|
|
|
|
enum ShutDownMethod {
|
|
|
|
// Send a shutdown message and wait for FinishShutdown call back.
|
|
|
|
SEND_SHUTDOWN_MESSAGE,
|
|
|
|
// Close the channel ourselves and let the subprocess clean up itself.
|
|
|
|
CLOSE_CHANNEL,
|
|
|
|
// Close the channel with error and let the subprocess clean up itself.
|
|
|
|
CLOSE_CHANNEL_WITH_ERROR,
|
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Exit the subprocess and vamoose. After this call IsAlive()
|
|
|
|
* will return false and this ContentParent will not be returned
|
|
|
|
* by the Get*() funtions. However, the shutdown sequence itself
|
|
|
|
* may be asynchronous.
|
|
|
|
*
|
|
|
|
* If aMethod is CLOSE_CHANNEL_WITH_ERROR and this is the first call
|
|
|
|
* to ShutDownProcess, then we'll close our channel using CloseWithError()
|
|
|
|
* rather than vanilla Close(). CloseWithError() indicates to IPC that this
|
|
|
|
* is an abnormal shutdown (e.g. a crash).
|
|
|
|
*/
|
|
|
|
void ShutDownProcess(ShutDownMethod aMethod);
|
|
|
|
|
|
|
|
// Perform any steps necesssary to gracefully shtudown the message
|
|
|
|
// manager and null out mMessageManager.
|
|
|
|
void ShutDownMessageManager();
|
|
|
|
|
|
|
|
// Start the force-kill timer on shutdown.
|
|
|
|
void StartForceKillTimer();
|
|
|
|
|
2017-03-03 00:55:09 +03:00
|
|
|
// Ensure that the permissions for the giben Permission key are set in the
|
|
|
|
// content process.
|
|
|
|
//
|
|
|
|
// See nsIPermissionManager::GetPermissionsForKey for more information on
|
|
|
|
// these keys.
|
|
|
|
void EnsurePermissionsByKey(const nsCString& aKey);
|
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
static void ForceKillTimerCallback(nsITimer* aTimer, void* aClosure);
|
|
|
|
|
2019-02-25 23:04:53 +03:00
|
|
|
bool CanOpenBrowser(const IPCTabContext& aContext);
|
|
|
|
|
2017-02-01 15:34:24 +03:00
|
|
|
/**
|
|
|
|
* Get or create the corresponding content parent array to
|
|
|
|
* |aContentProcessType|.
|
|
|
|
*/
|
|
|
|
static nsTArray<ContentParent*>& GetOrCreatePool(
|
|
|
|
const nsAString& aContentProcessType);
|
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvInitBackground(
|
|
|
|
Endpoint<mozilla::ipc::PBackgroundParent>&& aEndpoint);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvAddMemoryReport(const MemoryReport& aReport);
|
|
|
|
mozilla::ipc::IPCResult RecvFinishMemoryReport(const uint32_t& aGeneration);
|
2018-07-05 17:32:03 +03:00
|
|
|
mozilla::ipc::IPCResult RecvAddPerformanceMetrics(
|
2019-02-06 18:58:43 +03:00
|
|
|
const nsID& aID, nsTArray<PerformanceInfo>&& aMetrics);
|
2017-01-27 03:35:54 +03:00
|
|
|
|
2019-02-25 23:04:53 +03:00
|
|
|
bool DeallocPJavaScriptParent(mozilla::jsipc::PJavaScriptParent*);
|
2013-09-07 10:19:53 +04:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPRemoteSpellcheckEngineParent(PRemoteSpellcheckEngineParent*);
|
2014-09-26 09:00:24 +04:00
|
|
|
|
2019-04-17 03:51:38 +03:00
|
|
|
mozilla::ipc::IPCResult RecvConstructPopupBrowser(
|
2019-08-08 19:07:07 +03:00
|
|
|
ManagedEndpoint<PBrowserParent>&& actor,
|
|
|
|
ManagedEndpoint<PWindowGlobalParent>&& windowEp, const TabId& tabId,
|
|
|
|
const IPCTabContext& context, const WindowGlobalInit& initialWindowInit,
|
2019-04-17 03:51:38 +03:00
|
|
|
const uint32_t& chromeFlags);
|
2017-03-21 10:44:12 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvIsSecureURI(
|
2016-11-15 06:26:00 +03:00
|
|
|
const uint32_t& aType, const URIParams& aURI, const uint32_t& aFlags,
|
2019-02-06 18:58:43 +03:00
|
|
|
const OriginAttributes& aOriginAttributes, bool* aIsSecureURI);
|
2010-07-02 19:50:24 +04:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvAccumulateMixedContentHSTS(
|
2016-11-15 06:26:00 +03:00
|
|
|
const URIParams& aURI, const bool& aActive,
|
2019-02-06 18:58:43 +03:00
|
|
|
const OriginAttributes& aOriginAttributes);
|
2012-12-06 07:01:58 +04:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPHalParent(PHalParent*);
|
2015-10-23 00:20:51 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPHeapSnapshotTempFileHelperParent(
|
|
|
|
PHeapSnapshotTempFileHelperParent*);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
PCycleCollectWithLogsParent* AllocPCycleCollectWithLogsParent(
|
2016-01-05 12:59:30 +03:00
|
|
|
const bool& aDumpAllTraces, const FileDescriptor& aGCLog,
|
2019-02-06 18:58:07 +03:00
|
|
|
const FileDescriptor& aCCLog);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPCycleCollectWithLogsParent(PCycleCollectWithLogsParent* aActor);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
PTestShellParent* AllocPTestShellParent();
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPTestShellParent(PTestShellParent* shell);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
PScriptCacheParent* AllocPScriptCacheParent(const FileDescOrError& cacheFile,
|
|
|
|
const bool& wantCacheData);
|
2017-05-03 03:17:52 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPScriptCacheParent(PScriptCacheParent* shell);
|
2017-05-03 03:17:52 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPNeckoParent(PNeckoParent* necko);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
PPSMContentDownloaderParent* AllocPPSMContentDownloaderParent(
|
|
|
|
const uint32_t& aCertType);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPPSMContentDownloaderParent(
|
|
|
|
PPSMContentDownloaderParent* aDownloader);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-08-08 19:46:35 +03:00
|
|
|
already_AddRefed<PExternalHelperAppParent> AllocPExternalHelperAppParent(
|
2019-03-06 17:05:50 +03:00
|
|
|
const Maybe<URIParams>& aUri,
|
2019-03-04 09:30:00 +03:00
|
|
|
const Maybe<mozilla::net::LoadInfoArgs>& aLoadInfoArgs,
|
2019-02-18 20:11:22 +03:00
|
|
|
const nsCString& aMimeContentType, const nsCString& aContentDisposition,
|
2016-01-05 12:59:30 +03:00
|
|
|
const uint32_t& aContentDispositionHint,
|
|
|
|
const nsString& aContentDispositionFilename, const bool& aForceSave,
|
|
|
|
const int64_t& aContentLength, const bool& aWasFileChannel,
|
2019-03-06 17:05:50 +03:00
|
|
|
const Maybe<URIParams>& aReferrer, PBrowserParent* aBrowser);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-25 21:13:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvPExternalHelperAppConstructor(
|
2019-03-06 17:05:50 +03:00
|
|
|
PExternalHelperAppParent* actor, const Maybe<URIParams>& uri,
|
2019-03-04 09:30:00 +03:00
|
|
|
const Maybe<LoadInfoArgs>& loadInfoArgs,
|
|
|
|
const nsCString& aMimeContentType, const nsCString& aContentDisposition,
|
|
|
|
const uint32_t& aContentDispositionHint,
|
2019-02-25 21:13:43 +03:00
|
|
|
const nsString& aContentDispositionFilename, const bool& aForceSave,
|
|
|
|
const int64_t& aContentLength, const bool& aWasFileChannel,
|
2019-03-06 17:05:50 +03:00
|
|
|
const Maybe<URIParams>& aReferrer, PBrowserParent* aBrowser) override;
|
2019-02-25 21:13:43 +03:00
|
|
|
|
2019-08-08 19:46:42 +03:00
|
|
|
already_AddRefed<PHandlerServiceParent> AllocPHandlerServiceParent();
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
PMediaParent* AllocPMediaParent();
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPMediaParent(PMediaParent* aActor);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-08-06 12:24:34 +03:00
|
|
|
PBenchmarkStorageParent* AllocPBenchmarkStorageParent();
|
|
|
|
|
|
|
|
bool DeallocPBenchmarkStorageParent(PBenchmarkStorageParent* aActor);
|
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
PPresentationParent* AllocPPresentationParent();
|
2010-08-10 21:14:45 +04:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPPresentationParent(PPresentationParent* aActor);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2016-11-15 06:26:00 +03:00
|
|
|
virtual mozilla::ipc::IPCResult RecvPPresentationConstructor(
|
|
|
|
PPresentationParent* aActor) override;
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
PSpeechSynthesisParent* AllocPSpeechSynthesisParent();
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPSpeechSynthesisParent(PSpeechSynthesisParent* aActor);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2016-11-15 06:26:00 +03:00
|
|
|
virtual mozilla::ipc::IPCResult RecvPSpeechSynthesisConstructor(
|
2016-01-05 12:59:30 +03:00
|
|
|
PSpeechSynthesisParent* aActor) override;
|
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
PWebBrowserPersistDocumentParent* AllocPWebBrowserPersistDocumentParent(
|
|
|
|
PBrowserParent* aBrowser, const uint64_t& aOuterWindowID);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
bool DeallocPWebBrowserPersistDocumentParent(
|
|
|
|
PWebBrowserPersistDocumentParent* aActor);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-07-10 06:27:27 +03:00
|
|
|
mozilla::ipc::IPCResult RecvGetGfxVars(nsTArray<GfxVarUpdate>* aVars);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-07-10 06:27:27 +03:00
|
|
|
mozilla::ipc::IPCResult RecvReadFontList(nsTArray<FontListEntry>* retValue);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvSetClipboard(
|
2016-11-15 06:26:00 +03:00
|
|
|
const IPCDataTransfer& aDataTransfer, const bool& aIsPrivateData,
|
|
|
|
const IPC::Principal& aRequestingPrincipal,
|
2019-02-06 18:58:43 +03:00
|
|
|
const uint32_t& aContentPolicyType, const int32_t& aWhichClipboard);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvGetClipboard(nsTArray<nsCString>&& aTypes,
|
|
|
|
const int32_t& aWhichClipboard,
|
|
|
|
IPCDataTransfer* aDataTransfer);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvEmptyClipboard(const int32_t& aWhichClipboard);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvClipboardHasType(nsTArray<nsCString>&& aTypes,
|
|
|
|
const int32_t& aWhichClipboard,
|
|
|
|
bool* aHasType);
|
2018-01-16 15:24:51 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvGetExternalClipboardFormats(
|
Bug 1470540 - Improve performance of DataTransfer::CacheExternalClipboardFormats, r=baku,mccr8
Currently, in order to retrieve supported clipboard formats
DataTransfer::CacheExternalClipboardFormats repeatedly makes the same calls to
clipboard->HasDataMatchingFlavors.
In the case when aPlainTextOnly == true only 1 call is made -
clipboard->HasDataMatchingFlavors(kUnicodeMime, ...), and when
aPlainTextOnly == false we have 1 call made for every member of the list
{ kCustomTypesMime, kFileMime, kHTMLMime, kRTFMime, kURLMime, kURLDataMime,
kUnicodeMime, kPNGImageMime } - a total of 8 calls.
We can see that in nsClipboardProxy::HasDataMatchingFlavors, there is a call to
ContentChild::GetSingleton()->SendClipboardHasType.
So when aPlainTextOnly == true, we will have 1 sync message, and when
aPlainTextOnly == false, we will have 8 sync messages.
With the proposed solution, in DataTransfer::CacheExternalClipboardFormats
we will only have 1 sync message regardless of the case because
GetExternalClipboardFormats() will retrieve all supported clipboard
formats at once.
MozReview-Commit-ID: CAmBfqB459v
--HG--
extra : rebase_source : 27f1b420f2613e6a747ed63762f1583ab71ba3e0
2018-06-22 21:28:27 +03:00
|
|
|
const int32_t& aWhichClipboard, const bool& aPlainTextOnly,
|
2019-02-06 18:58:43 +03:00
|
|
|
nsTArray<nsCString>* aTypes);
|
Bug 1470540 - Improve performance of DataTransfer::CacheExternalClipboardFormats, r=baku,mccr8
Currently, in order to retrieve supported clipboard formats
DataTransfer::CacheExternalClipboardFormats repeatedly makes the same calls to
clipboard->HasDataMatchingFlavors.
In the case when aPlainTextOnly == true only 1 call is made -
clipboard->HasDataMatchingFlavors(kUnicodeMime, ...), and when
aPlainTextOnly == false we have 1 call made for every member of the list
{ kCustomTypesMime, kFileMime, kHTMLMime, kRTFMime, kURLMime, kURLDataMime,
kUnicodeMime, kPNGImageMime } - a total of 8 calls.
We can see that in nsClipboardProxy::HasDataMatchingFlavors, there is a call to
ContentChild::GetSingleton()->SendClipboardHasType.
So when aPlainTextOnly == true, we will have 1 sync message, and when
aPlainTextOnly == false, we will have 8 sync messages.
With the proposed solution, in DataTransfer::CacheExternalClipboardFormats
we will only have 1 sync message regardless of the case because
GetExternalClipboardFormats() will retrieve all supported clipboard
formats at once.
MozReview-Commit-ID: CAmBfqB459v
--HG--
extra : rebase_source : 27f1b420f2613e6a747ed63762f1583ab71ba3e0
2018-06-22 21:28:27 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvPlaySound(const URIParams& aURI);
|
|
|
|
mozilla::ipc::IPCResult RecvBeep();
|
|
|
|
mozilla::ipc::IPCResult RecvPlayEventSound(const uint32_t& aEventId);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-07-10 06:27:27 +03:00
|
|
|
mozilla::ipc::IPCResult RecvGetIconForExtension(const nsCString& aFileExt,
|
|
|
|
const uint32_t& aIconSize,
|
|
|
|
nsTArray<uint8_t>* bits);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvGetShowPasswordSetting(bool* showPassword);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvStartVisitedQuery(const URIParams& uri);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvSetURITitle(const URIParams& uri,
|
|
|
|
const nsString& title);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
|
|
|
bool HasNotificationPermission(const IPC::Principal& aPrincipal);
|
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvShowAlert(nsIAlertNotification* aAlert);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvCloseAlert(const nsString& aName,
|
|
|
|
const IPC::Principal& aPrincipal);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvDisableNotifications(
|
|
|
|
const IPC::Principal& aPrincipal);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvOpenNotificationSettings(
|
|
|
|
const IPC::Principal& aPrincipal);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvNotificationEvent(
|
|
|
|
const nsString& aType, const NotificationEventData& aData);
|
2018-12-18 03:42:53 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvLoadURIExternal(const URIParams& uri,
|
|
|
|
PBrowserParent* windowContext);
|
|
|
|
mozilla::ipc::IPCResult RecvExtProtocolChannelConnectParent(
|
|
|
|
const uint32_t& registrarId);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvSyncMessage(
|
2016-11-15 06:26:00 +03:00
|
|
|
const nsString& aMsg, const ClonedMessageData& aData,
|
2019-07-10 06:27:27 +03:00
|
|
|
nsTArray<CpowEntry>&& aCpows, const IPC::Principal& aPrincipal,
|
2019-02-25 23:04:53 +03:00
|
|
|
nsTArray<StructuredCloneData>* aRetvals);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvRpcMessage(
|
2016-11-15 06:26:00 +03:00
|
|
|
const nsString& aMsg, const ClonedMessageData& aData,
|
2019-07-10 06:27:27 +03:00
|
|
|
nsTArray<CpowEntry>&& aCpows, const IPC::Principal& aPrincipal,
|
2019-02-25 23:04:53 +03:00
|
|
|
nsTArray<StructuredCloneData>* aRetvals);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-02-25 23:04:53 +03:00
|
|
|
mozilla::ipc::IPCResult RecvAsyncMessage(const nsString& aMsg,
|
2019-07-10 06:27:27 +03:00
|
|
|
nsTArray<CpowEntry>&& aCpows,
|
2019-02-25 23:04:53 +03:00
|
|
|
const IPC::Principal& aPrincipal,
|
|
|
|
const ClonedMessageData& aData);
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-03-20 21:05:09 +03:00
|
|
|
// MOZ_CAN_RUN_SCRIPT_BOUNDARY because we don't have MOZ_CAN_RUN_SCRIPT bits
|
|
|
|
// in IPC code yet.
|
|
|
|
MOZ_CAN_RUN_SCRIPT_BOUNDARY
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvAddGeolocationListener(
|
|
|
|
const IPC::Principal& aPrincipal, const bool& aHighAccuracy);
|
|
|
|
mozilla::ipc::IPCResult RecvRemoveGeolocationListener();
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2019-03-20 21:05:09 +03:00
|
|
|
// MOZ_CAN_RUN_SCRIPT_BOUNDARY because we don't have MOZ_CAN_RUN_SCRIPT bits
|
|
|
|
// in IPC code yet.
|
|
|
|
MOZ_CAN_RUN_SCRIPT_BOUNDARY
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvSetGeolocationHigherAccuracy(const bool& aEnable);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvConsoleMessage(const nsString& aMessage);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvScriptError(
|
2016-11-15 06:26:00 +03:00
|
|
|
const nsString& aMessage, const nsString& aSourceName,
|
|
|
|
const nsString& aSourceLine, const uint32_t& aLineNumber,
|
|
|
|
const uint32_t& aColNumber, const uint32_t& aFlags,
|
2019-04-02 01:42:34 +03:00
|
|
|
const nsCString& aCategory, const bool& aIsFromPrivateWindow,
|
|
|
|
const bool& aIsFromChromeContext);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvScriptErrorWithStack(
|
2018-02-24 04:21:49 +03:00
|
|
|
const nsString& aMessage, const nsString& aSourceName,
|
|
|
|
const nsString& aSourceLine, const uint32_t& aLineNumber,
|
|
|
|
const uint32_t& aColNumber, const uint32_t& aFlags,
|
2018-03-13 08:40:38 +03:00
|
|
|
const nsCString& aCategory, const bool& aIsFromPrivateWindow,
|
2019-04-02 01:42:34 +03:00
|
|
|
const bool& aIsFromChromeContext, const ClonedMessageData& aStack);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2018-02-24 04:21:49 +03:00
|
|
|
private:
|
|
|
|
mozilla::ipc::IPCResult RecvScriptErrorInternal(
|
|
|
|
const nsString& aMessage, const nsString& aSourceName,
|
|
|
|
const nsString& aSourceLine, const uint32_t& aLineNumber,
|
|
|
|
const uint32_t& aColNumber, const uint32_t& aFlags,
|
2018-03-13 08:40:38 +03:00
|
|
|
const nsCString& aCategory, const bool& aIsFromPrivateWindow,
|
2019-04-02 01:42:34 +03:00
|
|
|
const bool& aIsFromChromeContext,
|
2018-02-24 04:21:49 +03:00
|
|
|
const ClonedMessageData* aStack = nullptr);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2018-02-24 04:21:49 +03:00
|
|
|
public:
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvPrivateDocShellsExist(const bool& aExist);
|
2010-09-24 05:39:32 +04:00
|
|
|
|
2019-02-21 23:14:28 +03:00
|
|
|
mozilla::ipc::IPCResult RecvCommitBrowsingContextTransaction(
|
2019-03-27 12:19:29 +03:00
|
|
|
BrowsingContext* aContext, BrowsingContext::Transaction&& aTransaction,
|
2019-08-09 17:51:30 +03:00
|
|
|
uint64_t aEpoch);
|
2019-02-21 23:14:28 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvFirstIdle();
|
2017-02-01 15:34:24 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvDeviceReset();
|
2017-06-15 21:34:00 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvKeywordToURI(const nsCString& aKeyword,
|
|
|
|
nsString* aProviderName,
|
|
|
|
RefPtr<nsIInputStream>* aPostData,
|
2019-03-06 17:05:50 +03:00
|
|
|
Maybe<URIParams>* aURI);
|
2015-05-04 09:11:00 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvNotifyKeywordSearchLoading(
|
|
|
|
const nsString& aProvider, const nsString& aKeyword);
|
2013-08-16 21:59:31 +04:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvCopyFavicon(
|
2016-11-15 06:26:00 +03:00
|
|
|
const URIParams& aOldURI, const URIParams& aNewURI,
|
2019-02-06 18:58:43 +03:00
|
|
|
const IPC::Principal& aLoadingPrincipal, const bool& aInPrivateBrowsing);
|
2014-09-11 17:50:55 +04:00
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
virtual void ProcessingError(Result aCode, const char* aMsgName) override;
|
2015-04-29 11:57:24 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvGraphicsError(const nsCString& aError);
|
2016-02-17 02:07:37 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvBeginDriverCrashGuard(const uint32_t& aGuardType,
|
|
|
|
bool* aOutCrashed);
|
2013-12-13 20:28:46 +04:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvEndDriverCrashGuard(const uint32_t& aGuardType);
|
2014-02-05 20:37:26 +04:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvAddIdleObserver(const uint64_t& observerId,
|
|
|
|
const uint32_t& aIdleTimeInS);
|
2014-06-24 21:11:36 +04:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvRemoveIdleObserver(const uint64_t& observerId,
|
|
|
|
const uint32_t& aIdleTimeInS);
|
2014-11-27 01:28:28 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvBackUpXResources(
|
|
|
|
const FileDescriptor& aXSocketFd);
|
2014-11-27 01:28:28 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvRequestAnonymousTemporaryFile(
|
|
|
|
const uint64_t& aID);
|
2017-03-14 02:06:04 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvCreateAudioIPCConnection(
|
|
|
|
CreateAudioIPCConnectionResolver&& aResolver);
|
2017-12-20 04:51:11 +03:00
|
|
|
|
2019-02-25 23:04:47 +03:00
|
|
|
PFileDescriptorSetParent* AllocPFileDescriptorSetParent(
|
|
|
|
const mozilla::ipc::FileDescriptor&);
|
2015-04-22 01:29:18 +03:00
|
|
|
|
2019-02-25 23:04:47 +03:00
|
|
|
bool DeallocPFileDescriptorSetParent(PFileDescriptorSetParent*);
|
2015-04-22 01:29:18 +03:00
|
|
|
|
2019-02-06 18:58:07 +03:00
|
|
|
PWebrtcGlobalParent* AllocPWebrtcGlobalParent();
|
|
|
|
bool DeallocPWebrtcGlobalParent(PWebrtcGlobalParent* aActor);
|
2015-04-24 01:05:29 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvUpdateDropEffect(const uint32_t& aDragAction,
|
|
|
|
const uint32_t& aDropEffect);
|
2015-11-04 22:08:14 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvShutdownProfile(const nsCString& aProfile);
|
2010-02-02 04:53:52 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvGetGraphicsDeviceInitData(
|
|
|
|
ContentDeviceData* aOut);
|
2010-02-02 04:53:52 +03:00
|
|
|
|
2019-04-27 18:37:29 +03:00
|
|
|
mozilla::ipc::IPCResult RecvGetFontListShmBlock(
|
|
|
|
const uint32_t& aGeneration, const uint32_t& aIndex,
|
|
|
|
mozilla::ipc::SharedMemoryBasic::Handle* aOut);
|
|
|
|
|
|
|
|
mozilla::ipc::IPCResult RecvInitializeFamily(const uint32_t& aGeneration,
|
|
|
|
const uint32_t& aFamilyIndex);
|
|
|
|
|
|
|
|
mozilla::ipc::IPCResult RecvSetCharacterMap(
|
|
|
|
const uint32_t& aGeneration, const mozilla::fontlist::Pointer& aFacePtr,
|
|
|
|
const gfxSparseBitSet& aMap);
|
|
|
|
|
|
|
|
mozilla::ipc::IPCResult RecvInitOtherFamilyNames(const uint32_t& aGeneration,
|
|
|
|
const bool& aDefer,
|
|
|
|
bool* aLoaded);
|
|
|
|
|
2019-04-27 18:39:26 +03:00
|
|
|
mozilla::ipc::IPCResult RecvSetupFamilyCharMap(
|
|
|
|
const uint32_t& aGeneration,
|
|
|
|
const mozilla::fontlist::Pointer& aFamilyPtr);
|
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvNotifyBenchmarkResult(const nsString& aCodecName,
|
|
|
|
const uint32_t& aDecodeFPS);
|
2016-03-17 09:18:35 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvNotifyPushObservers(
|
2016-11-15 06:26:00 +03:00
|
|
|
const nsCString& aScope, const IPC::Principal& aPrincipal,
|
2019-02-06 18:58:43 +03:00
|
|
|
const nsString& aMessageId);
|
2016-04-21 21:11:03 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvNotifyPushObserversWithData(
|
2016-11-15 06:26:00 +03:00
|
|
|
const nsCString& aScope, const IPC::Principal& aPrincipal,
|
2019-07-10 06:27:27 +03:00
|
|
|
const nsString& aMessageId, nsTArray<uint8_t>&& aData);
|
2016-04-21 21:11:03 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvNotifyPushSubscriptionChangeObservers(
|
|
|
|
const nsCString& aScope, const IPC::Principal& aPrincipal);
|
2016-04-21 21:11:03 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvPushError(const nsCString& aScope,
|
|
|
|
const IPC::Principal& aPrincipal,
|
|
|
|
const nsString& aMessage,
|
|
|
|
const uint32_t& aFlags);
|
2019-01-29 23:27:03 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvNotifyPushSubscriptionModifiedObservers(
|
|
|
|
const nsCString& aScope, const IPC::Principal& aPrincipal);
|
2016-04-21 22:04:15 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvGetFilesRequest(const nsID& aID,
|
|
|
|
const nsString& aDirectoryPath,
|
|
|
|
const bool& aRecursiveFlag);
|
2016-07-14 10:04:21 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvDeleteGetFilesRequest(const nsID& aID);
|
2016-07-14 10:04:21 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvAccumulateChildHistograms(
|
2019-07-10 06:27:27 +03:00
|
|
|
nsTArray<HistogramAccumulation>&& aAccumulations);
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvAccumulateChildKeyedHistograms(
|
2019-07-10 06:27:27 +03:00
|
|
|
nsTArray<KeyedHistogramAccumulation>&& aAccumulations);
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvUpdateChildScalars(
|
2019-07-10 06:27:27 +03:00
|
|
|
nsTArray<ScalarAction>&& aScalarActions);
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvUpdateChildKeyedScalars(
|
2019-07-10 06:27:27 +03:00
|
|
|
nsTArray<KeyedScalarAction>&& aScalarActions);
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvRecordChildEvents(
|
|
|
|
nsTArray<ChildEventData>&& events);
|
|
|
|
mozilla::ipc::IPCResult RecvRecordDiscardedData(
|
|
|
|
const DiscardedData& aDiscardedData);
|
2019-05-03 18:37:14 +03:00
|
|
|
mozilla::ipc::IPCResult RecvRecordOrigin(const uint32_t& aMetricId,
|
|
|
|
const nsCString& aOrigin);
|
2019-05-31 18:13:33 +03:00
|
|
|
mozilla::ipc::IPCResult RecvReportContentBlockingLog(
|
2019-06-22 01:45:47 +03:00
|
|
|
const IPCStream& aIPCStream);
|
2019-02-06 18:58:43 +03:00
|
|
|
|
|
|
|
mozilla::ipc::IPCResult RecvBHRThreadHang(const HangDetails& aHangDetails);
|
|
|
|
|
2019-08-15 00:00:51 +03:00
|
|
|
mozilla::ipc::IPCResult RecvAutomaticStorageAccessCanBeGranted(
|
|
|
|
const Principal& aPrincipal,
|
|
|
|
AutomaticStorageAccessCanBeGrantedResolver&& aResolver);
|
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvFirstPartyStorageAccessGrantedForOrigin(
|
2018-11-27 00:23:16 +03:00
|
|
|
const Principal& aParentPrincipal, const Principal& aTrackingPrincipal,
|
2018-07-13 13:02:19 +03:00
|
|
|
const nsCString& aTrackingOrigin, const nsCString& aGrantedOrigin,
|
2018-12-17 19:19:43 +03:00
|
|
|
const int& aAllowMode,
|
2019-02-06 18:58:43 +03:00
|
|
|
FirstPartyStorageAccessGrantedForOriginResolver&& aResolver);
|
2018-09-24 13:54:54 +03:00
|
|
|
|
2019-02-06 18:58:43 +03:00
|
|
|
mozilla::ipc::IPCResult RecvStoreUserInteractionAsPermission(
|
|
|
|
const Principal& aPrincipal);
|
2018-07-10 11:09:59 +03:00
|
|
|
|
2019-08-08 23:01:19 +03:00
|
|
|
mozilla::ipc::IPCResult RecvNotifyMediaActiveChanged(
|
|
|
|
BrowsingContext* aContext, bool aActive);
|
|
|
|
|
|
|
|
mozilla::ipc::IPCResult RecvNotifyMediaAudibleChanged(
|
|
|
|
BrowsingContext* aContext, bool aAudible);
|
|
|
|
|
2017-07-28 10:14:54 +03:00
|
|
|
// Notify the ContentChild to enable the input event prioritization when
|
|
|
|
// initializing.
|
|
|
|
void MaybeEnableRemoteInputEventQueue();
|
|
|
|
|
2019-03-19 01:31:59 +03:00
|
|
|
#if defined(XP_MACOSX) && defined(MOZ_SANDBOX)
|
2018-10-19 21:23:16 +03:00
|
|
|
void AppendSandboxParams(std::vector<std::string>& aArgs);
|
2018-11-09 20:21:36 +03:00
|
|
|
void AppendDynamicSandboxParams(std::vector<std::string>& aArgs);
|
|
|
|
#endif
|
2018-10-19 21:23:16 +03:00
|
|
|
|
2016-07-14 10:04:21 +03:00
|
|
|
public:
|
|
|
|
void SendGetFilesResponseAndForget(const nsID& aID,
|
|
|
|
const GetFilesResponseResult& aResult);
|
|
|
|
|
2017-01-27 03:35:54 +03:00
|
|
|
bool SendRequestMemoryReport(const uint32_t& aGeneration,
|
|
|
|
const bool& aAnonymize,
|
|
|
|
const bool& aMinimizeMemoryUsage,
|
2019-03-01 00:20:40 +03:00
|
|
|
const Maybe<FileDescriptor>& aDMDFile) override;
|
2017-01-27 03:35:54 +03:00
|
|
|
|
2018-07-22 14:52:42 +03:00
|
|
|
nsresult SaveRecording(nsIFile* aFile, bool* aRetval);
|
|
|
|
|
2018-07-24 00:51:24 +03:00
|
|
|
bool IsRecordingOrReplaying() const {
|
|
|
|
return mRecordReplayState != eNotRecordingOrReplaying;
|
|
|
|
}
|
|
|
|
|
2019-02-15 14:35:48 +03:00
|
|
|
void OnBrowsingContextGroupSubscribe(BrowsingContextGroup* aGroup);
|
|
|
|
void OnBrowsingContextGroupUnsubscribe(BrowsingContextGroup* aGroup);
|
|
|
|
|
2019-08-09 17:51:30 +03:00
|
|
|
// See `BrowsingContext::mEpochs` for an explanation of this field.
|
|
|
|
uint64_t GetBrowsingContextFieldEpoch() const {
|
|
|
|
return mBrowsingContextFieldEpoch;
|
|
|
|
}
|
|
|
|
|
2019-05-07 01:41:25 +03:00
|
|
|
void UpdateNetworkLinkType();
|
|
|
|
|
2019-05-25 13:12:51 +03:00
|
|
|
static bool ShouldSyncPreference(const char16_t* aData);
|
|
|
|
|
2016-07-14 10:04:21 +03:00
|
|
|
private:
|
2019-07-03 06:34:37 +03:00
|
|
|
// Released in ActorDealloc; deliberately not exposed to the CC.
|
2018-10-20 00:29:34 +03:00
|
|
|
RefPtr<ContentParent> mSelfRef;
|
2016-07-14 10:04:21 +03:00
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
// If you add strong pointers to cycle collected objects here, be sure to
|
|
|
|
// release these objects in ShutDownProcess. See the comment there for more
|
|
|
|
// details.
|
2015-01-28 08:52:46 +03:00
|
|
|
|
2018-11-28 23:42:24 +03:00
|
|
|
GeckoChildProcessHost* mSubprocess;
|
2016-12-09 21:52:28 +03:00
|
|
|
const TimeStamp mLaunchTS; // used to calculate time to start content process
|
2018-11-28 23:42:33 +03:00
|
|
|
TimeStamp mLaunchYieldTS; // used to calculate async launch main thread time
|
2017-05-30 14:46:41 +03:00
|
|
|
TimeStamp mActivateTS;
|
2016-01-05 12:59:30 +03:00
|
|
|
ContentParent* mOpener;
|
2012-09-05 04:36:16 +04:00
|
|
|
|
2016-11-24 18:08:31 +03:00
|
|
|
nsString mRemoteType;
|
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
ContentParentId mChildID;
|
|
|
|
int32_t mGeolocationWatchID;
|
2013-08-07 22:08:52 +04:00
|
|
|
|
2017-05-29 13:38:46 +03:00
|
|
|
// This contains the id for the JS plugin (@see nsFakePluginTag) if this is
|
|
|
|
// the ContentParent for a process containing iframes for that JS plugin. If
|
|
|
|
// this is not a ContentParent for a JS plugin then it contains the value
|
|
|
|
// nsFakePluginTag::NOT_JSPLUGIN.
|
|
|
|
int32_t mJSPluginID;
|
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
// After we initiate shutdown, we also start a timer to ensure
|
|
|
|
// that even content processes that are 100% blocked (say from
|
|
|
|
// SIGSTOP), are still killed eventually. This task enforces that
|
|
|
|
// timer.
|
|
|
|
nsCOMPtr<nsITimer> mForceKillTimer;
|
2018-11-20 02:18:33 +03:00
|
|
|
|
2019-08-15 01:04:46 +03:00
|
|
|
// Number of active remote workers. This value is increased when a
|
|
|
|
// RemoteWorkerParent actor is created for this ContentProcess and it is
|
|
|
|
// decreased when the actor is destroyed.
|
2018-11-20 02:18:33 +03:00
|
|
|
// It's touched on PBackground thread and on main-thread.
|
2019-08-15 01:04:46 +03:00
|
|
|
Atomic<uint32_t> mRemoteWorkerActors;
|
2018-11-20 02:18:33 +03:00
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
// How many tabs we're waiting to finish their destruction
|
2019-04-10 00:38:15 +03:00
|
|
|
// sequence. Precisely, how many BrowserParents have called
|
2016-01-05 12:59:30 +03:00
|
|
|
// NotifyTabDestroying() but not called NotifyTabDestroyed().
|
|
|
|
int32_t mNumDestroyingTabs;
|
2018-12-15 04:38:27 +03:00
|
|
|
|
|
|
|
// The process starts in the LAUNCHING state, and transitions to
|
|
|
|
// ALIVE once it can accept IPC messages. It remains ALIVE only
|
|
|
|
// while remote content is being actively used from this process.
|
|
|
|
// After the state becaomes DEAD, some previously scheduled IPC
|
|
|
|
// traffic may still pass through.
|
|
|
|
enum class LifecycleState : uint8_t {
|
|
|
|
LAUNCHING,
|
|
|
|
ALIVE,
|
|
|
|
DEAD,
|
|
|
|
};
|
|
|
|
|
|
|
|
LifecycleState mLifecycleState;
|
2016-01-05 12:59:30 +03:00
|
|
|
|
|
|
|
bool mIsForBrowser;
|
|
|
|
|
2018-07-22 14:52:42 +03:00
|
|
|
// Whether this process is recording or replaying its execution, and any
|
|
|
|
// associated recording file.
|
|
|
|
RecordReplayState mRecordReplayState;
|
|
|
|
nsString mRecordingFile;
|
|
|
|
|
|
|
|
// When recording or replaying, the child process is a middleman. This vector
|
|
|
|
// stores any replaying children we have spawned on behalf of that middleman,
|
|
|
|
// indexed by their record/replay channel ID.
|
|
|
|
Vector<mozilla::ipc::GeckoChildProcessHost*> mReplayingChildren;
|
|
|
|
|
2016-06-10 00:52:33 +03:00
|
|
|
// These variables track whether we've called Close() and KillHard() on our
|
|
|
|
// channel.
|
2016-01-05 12:59:30 +03:00
|
|
|
bool mCalledClose;
|
|
|
|
bool mCalledKillHard;
|
|
|
|
bool mCreatedPairedMinidumps;
|
|
|
|
bool mShutdownPending;
|
|
|
|
bool mIPCOpen;
|
|
|
|
|
2017-07-28 10:14:54 +03:00
|
|
|
// True if the input event queue on the main thread of the content process is
|
|
|
|
// enabled.
|
|
|
|
bool mIsRemoteInputEventQueueEnabled;
|
|
|
|
|
|
|
|
// True if we send input events with input priority. Otherwise, we send input
|
|
|
|
// events with normal priority.
|
|
|
|
bool mIsInputPriorityEventEnabled;
|
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
RefPtr<nsConsoleService> mConsoleService;
|
|
|
|
nsConsoleService* GetConsoleService();
|
2016-11-02 02:02:43 +03:00
|
|
|
nsCOMPtr<nsIContentProcessInfo> mScriptableHelper;
|
2016-01-05 12:59:30 +03:00
|
|
|
|
|
|
|
nsTArray<nsCOMPtr<nsIObserver>> mIdleListeners;
|
2014-02-05 20:37:26 +04:00
|
|
|
|
|
|
|
#ifdef MOZ_X11
|
2016-01-05 12:59:30 +03:00
|
|
|
// Dup of child's X socket, used to scope its resources to this
|
|
|
|
// object instead of the child process's lifetime.
|
|
|
|
ScopedClose mChildXSocketFdDup;
|
2014-02-05 20:37:26 +04:00
|
|
|
#endif
|
2014-08-22 09:41:34 +04:00
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
PProcessHangMonitorParent* mHangMonitorActor;
|
2015-07-31 10:25:27 +03:00
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
UniquePtr<gfx::DriverCrashGuard> mDriverCrashGuard;
|
2017-01-27 03:35:54 +03:00
|
|
|
UniquePtr<MemoryReportRequestHost> mMemoryReportRequest;
|
2015-10-08 08:13:09 +03:00
|
|
|
|
2019-03-19 01:31:59 +03:00
|
|
|
#if defined(XP_LINUX) && defined(MOZ_SANDBOX)
|
2016-01-05 12:59:30 +03:00
|
|
|
mozilla::UniquePtr<SandboxBroker> mSandboxBroker;
|
|
|
|
static mozilla::UniquePtr<SandboxBrokerPolicyFactory>
|
|
|
|
sSandboxBrokerPolicyFactory;
|
2015-10-08 08:13:09 +03:00
|
|
|
#endif
|
2016-05-16 12:40:54 +03:00
|
|
|
|
|
|
|
#ifdef NS_PRINTING
|
|
|
|
RefPtr<embedding::PrintingParent> mPrintingParent;
|
|
|
|
#endif
|
2016-07-14 10:04:21 +03:00
|
|
|
|
|
|
|
// This hashtable is used to run GetFilesHelper objects in the parent process.
|
|
|
|
// GetFilesHelper can be aborted by receiving RecvDeleteGetFilesRequest.
|
|
|
|
nsRefPtrHashtable<nsIDHashKey, GetFilesHelper> mGetFilesPendingRequests;
|
2016-07-18 12:12:18 +03:00
|
|
|
|
2017-03-03 00:55:09 +03:00
|
|
|
nsTHashtable<nsCStringHashKey> mActivePermissionKeys;
|
|
|
|
|
2016-07-18 12:12:18 +03:00
|
|
|
nsTArray<nsCString> mBlobURLs;
|
2017-10-10 13:43:09 +03:00
|
|
|
|
2017-02-17 05:44:16 +03:00
|
|
|
UniquePtr<mozilla::ipc::CrashReporterHost> mCrashReporter;
|
2017-04-17 01:52:02 +03:00
|
|
|
|
2018-12-14 08:28:56 +03:00
|
|
|
// Collects any pref changes that occur during process launch (after
|
|
|
|
// the initial map is passed in command-line arguments) to be sent
|
|
|
|
// when the process can receive IPC messages.
|
|
|
|
nsTArray<Pref> mQueuedPrefs;
|
|
|
|
|
2019-02-25 23:04:53 +03:00
|
|
|
RefPtr<mozilla::dom::ProcessMessageManager> mMessageManager;
|
|
|
|
|
2019-04-09 23:59:37 +03:00
|
|
|
static uint64_t sNextRemoteTabId;
|
2019-04-10 00:38:15 +03:00
|
|
|
static nsDataHashtable<nsUint64HashKey, BrowserParent*> sNextBrowserParents;
|
2018-10-19 21:23:16 +03:00
|
|
|
|
2019-03-19 01:31:59 +03:00
|
|
|
#if defined(XP_MACOSX) && defined(MOZ_SANDBOX)
|
2018-10-19 21:23:16 +03:00
|
|
|
// When set to true, indicates that content processes should
|
|
|
|
// initialize their sandbox during startup instead of waiting
|
|
|
|
// for the SetProcessSandbox IPDL message.
|
|
|
|
static bool sEarlySandboxInit;
|
|
|
|
#endif
|
2019-02-15 14:35:48 +03:00
|
|
|
|
|
|
|
nsTHashtable<nsRefPtrHashKey<BrowsingContextGroup>> mGroups;
|
2019-08-09 17:51:30 +03:00
|
|
|
|
|
|
|
// See `BrowsingContext::mEpochs` for an explanation of this field.
|
|
|
|
uint64_t mBrowsingContextFieldEpoch = 0;
|
2009-08-12 20:18:08 +04:00
|
|
|
};
|
|
|
|
|
2019-02-25 23:04:55 +03:00
|
|
|
NS_DEFINE_STATIC_IID_ACCESSOR(ContentParent, NS_CONTENTPARENT_IID)
|
|
|
|
|
2019-06-28 17:30:18 +03:00
|
|
|
const nsDependentSubstring RemoteTypePrefix(
|
|
|
|
const nsAString& aContentProcessType);
|
2009-08-12 20:18:08 +04:00
|
|
|
} // namespace dom
|
|
|
|
} // namespace mozilla
|
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
class ParentIdleListener : public nsIObserver {
|
2015-05-27 11:05:04 +03:00
|
|
|
friend class mozilla::dom::ContentParent;
|
|
|
|
|
2013-12-13 20:28:46 +04:00
|
|
|
public:
|
|
|
|
NS_DECL_ISUPPORTS
|
|
|
|
NS_DECL_NSIOBSERVER
|
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
ParentIdleListener(mozilla::dom::ContentParent* aParent, uint64_t aObserver,
|
|
|
|
uint32_t aTime)
|
2015-05-27 11:05:04 +03:00
|
|
|
: mParent(aParent), mObserver(aObserver), mTime(aTime) {}
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2013-12-13 20:28:46 +04:00
|
|
|
private:
|
2014-06-23 23:56:07 +04:00
|
|
|
virtual ~ParentIdleListener() {}
|
2016-01-05 12:59:30 +03:00
|
|
|
|
2015-10-18 08:24:48 +03:00
|
|
|
RefPtr<mozilla::dom::ContentParent> mParent;
|
2013-12-13 20:28:46 +04:00
|
|
|
uint64_t mObserver;
|
2015-05-27 11:05:04 +03:00
|
|
|
uint32_t mTime;
|
2013-12-13 20:28:46 +04:00
|
|
|
};
|
|
|
|
|
2016-01-05 12:59:30 +03:00
|
|
|
#endif // mozilla_dom_ContentParent_h
|