2011-07-17 12:09:13 -07:00
|
|
|
/* -*- Mode: c++; c-basic-offset: 2; indent-tabs-mode: nil; tab-width: 40 -*- */
|
2011-08-15 20:40:38 -07:00
|
|
|
/* vim: set ts=2 et sw=2 tw=80: */
|
2012-05-21 04:12:37 -07:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
#include "WorkerPrivate.h"
|
|
|
|
|
|
|
|
#include "nsIClassInfo.h"
|
2012-09-15 11:51:55 -07:00
|
|
|
#include "nsIContentSecurityPolicy.h"
|
2011-07-17 12:09:13 -07:00
|
|
|
#include "nsIConsoleService.h"
|
2011-08-15 20:40:38 -07:00
|
|
|
#include "nsIDOMFile.h"
|
2011-07-17 12:09:13 -07:00
|
|
|
#include "nsIDocument.h"
|
2012-08-20 11:34:32 -07:00
|
|
|
#include "nsIDocShell.h"
|
2011-07-17 12:09:13 -07:00
|
|
|
#include "nsIJSContextStack.h"
|
2011-09-08 17:03:03 -07:00
|
|
|
#include "nsIMemoryReporter.h"
|
2012-09-16 17:20:16 -07:00
|
|
|
#include "nsIPermissionManager.h"
|
2011-07-17 12:09:13 -07:00
|
|
|
#include "nsIScriptError.h"
|
|
|
|
#include "nsIScriptGlobalObject.h"
|
|
|
|
#include "nsIScriptSecurityManager.h"
|
|
|
|
#include "nsPIDOMWindow.h"
|
|
|
|
#include "nsITextToSubURI.h"
|
|
|
|
#include "nsITimer.h"
|
|
|
|
#include "nsIURI.h"
|
|
|
|
#include "nsIURL.h"
|
|
|
|
#include "nsIXPConnect.h"
|
2012-05-04 00:22:18 -07:00
|
|
|
#include "nsIXPCScriptNotify.h"
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-01-15 00:13:08 -08:00
|
|
|
#include "jsfriendapi.h"
|
2011-07-17 12:09:13 -07:00
|
|
|
#include "jsdbgapi.h"
|
2012-01-17 12:05:25 -08:00
|
|
|
#include "jsfriendapi.h"
|
2011-09-08 17:03:03 -07:00
|
|
|
#include "jsprf.h"
|
2012-01-11 00:23:08 -08:00
|
|
|
#include "js/MemoryMetrics.h"
|
2011-07-17 12:09:13 -07:00
|
|
|
#include "nsAlgorithm.h"
|
|
|
|
#include "nsContentUtils.h"
|
2012-07-27 07:03:27 -07:00
|
|
|
#include "nsError.h"
|
2011-07-17 12:09:13 -07:00
|
|
|
#include "nsDOMJSUtils.h"
|
|
|
|
#include "nsGUIEvent.h"
|
|
|
|
#include "nsJSEnvironment.h"
|
|
|
|
#include "nsJSUtils.h"
|
|
|
|
#include "nsNetUtil.h"
|
2012-08-20 11:34:32 -07:00
|
|
|
#include "nsSandboxFlags.h"
|
2011-07-17 12:09:13 -07:00
|
|
|
#include "nsThreadUtils.h"
|
2011-08-06 18:03:46 -07:00
|
|
|
#include "xpcpublic.h"
|
2012-06-14 19:31:55 -07:00
|
|
|
#include "mozilla/Attributes.h"
|
2012-10-26 06:32:10 -07:00
|
|
|
#include "mozilla/Likely.h"
|
2013-01-15 04:22:03 -08:00
|
|
|
#include <algorithm>
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
#ifdef ANDROID
|
|
|
|
#include <android/log.h>
|
|
|
|
#endif
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
#include "Events.h"
|
|
|
|
#include "Exceptions.h"
|
2011-08-15 20:40:38 -07:00
|
|
|
#include "File.h"
|
2012-04-24 03:58:08 -07:00
|
|
|
#include "ImageData.h"
|
2011-07-17 12:09:13 -07:00
|
|
|
#include "Principal.h"
|
|
|
|
#include "RuntimeService.h"
|
|
|
|
#include "ScriptLoader.h"
|
2011-10-06 16:09:43 -07:00
|
|
|
#include "Worker.h"
|
2011-07-17 12:09:13 -07:00
|
|
|
#include "WorkerFeature.h"
|
|
|
|
#include "WorkerScope.h"
|
|
|
|
|
|
|
|
#if 0 // Define to run GC more often.
|
|
|
|
#define EXTRA_GC
|
|
|
|
#endif
|
|
|
|
|
2012-01-17 12:05:25 -08:00
|
|
|
// GC will run once every thirty seconds during normal execution.
|
|
|
|
#define NORMAL_GC_TIMER_DELAY_MS 30000
|
|
|
|
|
|
|
|
// GC will run five seconds after the last event is processed.
|
|
|
|
#define IDLE_GC_TIMER_DELAY_MS 5000
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
using mozilla::MutexAutoLock;
|
|
|
|
using mozilla::TimeDuration;
|
|
|
|
using mozilla::TimeStamp;
|
2012-04-24 16:50:00 -07:00
|
|
|
using mozilla::dom::workers::exceptions::ThrowDOMExceptionForNSResult;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
USING_WORKERS_NAMESPACE
|
2012-03-30 21:42:20 -07:00
|
|
|
using namespace mozilla::dom::workers::events;
|
2012-04-24 03:58:08 -07:00
|
|
|
using namespace mozilla::dom;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-12-23 16:59:51 -08:00
|
|
|
NS_MEMORY_REPORTER_MALLOC_SIZEOF_FUN(JsWorkerMallocSizeOf)
|
2012-07-12 23:51:01 -07:00
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
namespace {
|
|
|
|
|
|
|
|
const char gErrorChars[] = "error";
|
|
|
|
const char gMessageChars[] = "message";
|
|
|
|
|
|
|
|
template <class T>
|
|
|
|
class AutoPtrComparator
|
|
|
|
{
|
|
|
|
typedef nsAutoPtr<T> A;
|
|
|
|
typedef T* B;
|
|
|
|
|
|
|
|
public:
|
2011-09-28 23:19:26 -07:00
|
|
|
bool Equals(const A& a, const B& b) const {
|
2011-07-17 12:09:13 -07:00
|
|
|
return a && b ? *a == *b : !a && !b ? true : false;
|
|
|
|
}
|
2011-09-28 23:19:26 -07:00
|
|
|
bool LessThan(const A& a, const B& b) const {
|
2011-07-17 12:09:13 -07:00
|
|
|
return a && b ? *a < *b : b ? true : false;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
template <class T>
|
|
|
|
inline AutoPtrComparator<T>
|
|
|
|
GetAutoPtrComparator(const nsTArray<nsAutoPtr<T> >&)
|
|
|
|
{
|
|
|
|
return AutoPtrComparator<T>();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Specialize this if there's some class that has multiple nsISupports bases.
|
|
|
|
template <class T>
|
|
|
|
struct ISupportsBaseInfo
|
|
|
|
{
|
|
|
|
typedef T ISupportsBase;
|
|
|
|
};
|
|
|
|
|
|
|
|
template <template <class> class SmartPtr, class T>
|
|
|
|
inline void
|
|
|
|
SwapToISupportsArray(SmartPtr<T>& aSrc,
|
|
|
|
nsTArray<nsCOMPtr<nsISupports> >& aDest)
|
|
|
|
{
|
|
|
|
nsCOMPtr<nsISupports>* dest = aDest.AppendElement();
|
|
|
|
|
2012-07-30 07:20:58 -07:00
|
|
|
T* raw = nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
aSrc.swap(raw);
|
|
|
|
|
|
|
|
nsISupports* rawSupports =
|
|
|
|
static_cast<typename ISupportsBaseInfo<T>::ISupportsBase*>(raw);
|
|
|
|
dest->swap(rawSupports);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct WorkerStructuredCloneCallbacks
|
|
|
|
{
|
|
|
|
static JSObject*
|
Bug 708735 - Use <stdint.h> types in JSAPI and throughout SpiderMonkey. Continue to provide the {u,}int{8,16,32,64} and JS{Uint,Int}{8,16,32,64} integer types through a single header, however, for a simpler backout strategy -- and also to ease the transition for embedders. r=timeless on switching the jsd API to use the <stdint.h> types, r=luke, r=dmandelin
2011-12-08 19:54:10 -08:00
|
|
|
Read(JSContext* aCx, JSStructuredCloneReader* aReader, uint32_t aTag,
|
|
|
|
uint32_t aData, void* aClosure)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
2011-08-15 20:40:38 -07:00
|
|
|
// See if object is a nsIDOMFile pointer.
|
|
|
|
if (aTag == DOMWORKER_SCTAG_FILE) {
|
|
|
|
JS_ASSERT(!aData);
|
|
|
|
|
|
|
|
nsIDOMFile* file;
|
|
|
|
if (JS_ReadBytes(aReader, &file, sizeof(file))) {
|
|
|
|
JS_ASSERT(file);
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
{
|
|
|
|
// File should not be mutable.
|
|
|
|
nsCOMPtr<nsIMutable> mutableFile = do_QueryInterface(file);
|
2011-09-28 23:19:26 -07:00
|
|
|
bool isMutable;
|
2011-08-15 20:40:38 -07:00
|
|
|
NS_ASSERTION(NS_SUCCEEDED(mutableFile->GetMutable(&isMutable)) &&
|
|
|
|
!isMutable,
|
|
|
|
"Only immutable file should be passed to worker");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
// nsIDOMFiles should be threadsafe, thus we will use the same instance
|
|
|
|
// in the worker.
|
|
|
|
JSObject* jsFile = file::CreateFile(aCx, file);
|
|
|
|
return jsFile;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// See if object is a nsIDOMBlob pointer.
|
|
|
|
else if (aTag == DOMWORKER_SCTAG_BLOB) {
|
|
|
|
JS_ASSERT(!aData);
|
|
|
|
|
|
|
|
nsIDOMBlob* blob;
|
|
|
|
if (JS_ReadBytes(aReader, &blob, sizeof(blob))) {
|
|
|
|
JS_ASSERT(blob);
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
{
|
|
|
|
// Blob should not be mutable.
|
|
|
|
nsCOMPtr<nsIMutable> mutableBlob = do_QueryInterface(blob);
|
2011-09-28 23:19:26 -07:00
|
|
|
bool isMutable;
|
2011-08-15 20:40:38 -07:00
|
|
|
NS_ASSERTION(NS_SUCCEEDED(mutableBlob->GetMutable(&isMutable)) &&
|
|
|
|
!isMutable,
|
|
|
|
"Only immutable blob should be passed to worker");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
// nsIDOMBlob should be threadsafe, thus we will use the same instance
|
|
|
|
// in the worker.
|
|
|
|
JSObject* jsBlob = file::CreateBlob(aCx, blob);
|
|
|
|
return jsBlob;
|
|
|
|
}
|
|
|
|
}
|
2012-04-24 03:58:08 -07:00
|
|
|
// See if the object is an ImageData.
|
|
|
|
else if (aTag == SCTAG_DOM_IMAGEDATA) {
|
|
|
|
JS_ASSERT(!aData);
|
|
|
|
|
|
|
|
// Read the information out of the stream.
|
|
|
|
uint32_t width, height;
|
|
|
|
jsval dataArray;
|
|
|
|
if (!JS_ReadUint32Pair(aReader, &width, &height) ||
|
|
|
|
!JS_ReadTypedArray(aReader, &dataArray))
|
|
|
|
{
|
2012-07-30 07:20:58 -07:00
|
|
|
return nullptr;
|
2012-04-24 03:58:08 -07:00
|
|
|
}
|
|
|
|
MOZ_ASSERT(dataArray.isObject());
|
|
|
|
|
|
|
|
// Construct the ImageData.
|
|
|
|
JSObject* obj = imagedata::Create(aCx, width, height,
|
|
|
|
JSVAL_TO_OBJECT(dataArray));
|
|
|
|
return obj;
|
|
|
|
}
|
2011-08-15 20:40:38 -07:00
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
Error(aCx, 0);
|
2012-07-30 07:20:58 -07:00
|
|
|
return nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
static JSBool
|
|
|
|
Write(JSContext* aCx, JSStructuredCloneWriter* aWriter, JSObject* aObj,
|
|
|
|
void* aClosure)
|
|
|
|
{
|
2011-08-15 20:40:38 -07:00
|
|
|
NS_ASSERTION(aClosure, "Null pointer!");
|
|
|
|
|
|
|
|
// We'll stash any nsISupports pointers that need to be AddRef'd here.
|
|
|
|
nsTArray<nsCOMPtr<nsISupports> >* clonedObjects =
|
|
|
|
static_cast<nsTArray<nsCOMPtr<nsISupports> >*>(aClosure);
|
|
|
|
|
|
|
|
// See if this is a File object.
|
|
|
|
{
|
2012-02-05 12:07:23 -08:00
|
|
|
nsIDOMFile* file = file::GetDOMFileFromJSObject(aObj);
|
2011-08-15 20:40:38 -07:00
|
|
|
if (file) {
|
|
|
|
if (JS_WriteUint32Pair(aWriter, DOMWORKER_SCTAG_FILE, 0) &&
|
|
|
|
JS_WriteBytes(aWriter, &file, sizeof(file))) {
|
|
|
|
clonedObjects->AppendElement(file);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// See if this is a Blob object.
|
|
|
|
{
|
2012-02-05 12:07:23 -08:00
|
|
|
nsIDOMBlob* blob = file::GetDOMBlobFromJSObject(aObj);
|
2011-08-15 20:40:38 -07:00
|
|
|
if (blob) {
|
|
|
|
nsCOMPtr<nsIMutable> mutableBlob = do_QueryInterface(blob);
|
2011-10-17 07:59:28 -07:00
|
|
|
if (mutableBlob && NS_SUCCEEDED(mutableBlob->SetMutable(false)) &&
|
2011-08-15 20:40:38 -07:00
|
|
|
JS_WriteUint32Pair(aWriter, DOMWORKER_SCTAG_BLOB, 0) &&
|
|
|
|
JS_WriteBytes(aWriter, &blob, sizeof(blob))) {
|
|
|
|
clonedObjects->AppendElement(blob);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-04-24 03:58:08 -07:00
|
|
|
// See if this is an ImageData object.
|
|
|
|
if (imagedata::IsImageData(aObj)) {
|
|
|
|
// Pull the properties off the object.
|
|
|
|
uint32_t width = imagedata::GetWidth(aObj);
|
|
|
|
uint32_t height = imagedata::GetHeight(aObj);
|
|
|
|
JSObject* data = imagedata::GetData(aObj);
|
|
|
|
|
|
|
|
// Write the structured clone.
|
|
|
|
return JS_WriteUint32Pair(aWriter, SCTAG_DOM_IMAGEDATA, 0) &&
|
|
|
|
JS_WriteUint32Pair(aWriter, width, height) &&
|
|
|
|
JS_WriteTypedArray(aWriter, OBJECT_TO_JSVAL(data));
|
|
|
|
}
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
Error(aCx, 0);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
Bug 708735 - Use <stdint.h> types in JSAPI and throughout SpiderMonkey. Continue to provide the {u,}int{8,16,32,64} and JS{Uint,Int}{8,16,32,64} integer types through a single header, however, for a simpler backout strategy -- and also to ease the transition for embedders. r=timeless on switching the jsd API to use the <stdint.h> types, r=luke, r=dmandelin
2011-12-08 19:54:10 -08:00
|
|
|
Error(JSContext* aCx, uint32_t /* aErrorId */)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
2012-04-24 16:50:00 -07:00
|
|
|
ThrowDOMExceptionForNSResult(aCx, NS_ERROR_DOM_DATA_CLONE_ERR);
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
JSStructuredCloneCallbacks gWorkerStructuredCloneCallbacks = {
|
|
|
|
WorkerStructuredCloneCallbacks::Read,
|
|
|
|
WorkerStructuredCloneCallbacks::Write,
|
|
|
|
WorkerStructuredCloneCallbacks::Error
|
|
|
|
};
|
|
|
|
|
|
|
|
struct MainThreadWorkerStructuredCloneCallbacks
|
|
|
|
{
|
|
|
|
static JSObject*
|
Bug 708735 - Use <stdint.h> types in JSAPI and throughout SpiderMonkey. Continue to provide the {u,}int{8,16,32,64} and JS{Uint,Int}{8,16,32,64} integer types through a single header, however, for a simpler backout strategy -- and also to ease the transition for embedders. r=timeless on switching the jsd API to use the <stdint.h> types, r=luke, r=dmandelin
2011-12-08 19:54:10 -08:00
|
|
|
Read(JSContext* aCx, JSStructuredCloneReader* aReader, uint32_t aTag,
|
|
|
|
uint32_t aData, void* aClosure)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
2011-08-15 20:40:38 -07:00
|
|
|
// See if object is a nsIDOMFile pointer.
|
|
|
|
if (aTag == DOMWORKER_SCTAG_FILE) {
|
|
|
|
JS_ASSERT(!aData);
|
|
|
|
|
|
|
|
nsIDOMFile* file;
|
|
|
|
if (JS_ReadBytes(aReader, &file, sizeof(file))) {
|
|
|
|
JS_ASSERT(file);
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
{
|
|
|
|
// File should not be mutable.
|
|
|
|
nsCOMPtr<nsIMutable> mutableFile = do_QueryInterface(file);
|
2011-09-28 23:19:26 -07:00
|
|
|
bool isMutable;
|
2011-08-15 20:40:38 -07:00
|
|
|
NS_ASSERTION(NS_SUCCEEDED(mutableFile->GetMutable(&isMutable)) &&
|
|
|
|
!isMutable,
|
|
|
|
"Only immutable file should be passed to worker");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
// nsIDOMFiles should be threadsafe, thus we will use the same instance
|
|
|
|
// on the main thread.
|
|
|
|
jsval wrappedFile;
|
|
|
|
nsresult rv =
|
|
|
|
nsContentUtils::WrapNative(aCx, JS_GetGlobalForScopeChain(aCx), file,
|
|
|
|
&NS_GET_IID(nsIDOMFile), &wrappedFile);
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
Error(aCx, DATA_CLONE_ERR);
|
2012-07-30 07:20:58 -07:00
|
|
|
return nullptr;
|
2011-08-15 20:40:38 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
return JSVAL_TO_OBJECT(wrappedFile);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// See if object is a nsIDOMBlob pointer.
|
|
|
|
else if (aTag == DOMWORKER_SCTAG_BLOB) {
|
|
|
|
JS_ASSERT(!aData);
|
|
|
|
|
|
|
|
nsIDOMBlob* blob;
|
|
|
|
if (JS_ReadBytes(aReader, &blob, sizeof(blob))) {
|
|
|
|
JS_ASSERT(blob);
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
{
|
|
|
|
// Blob should not be mutable.
|
|
|
|
nsCOMPtr<nsIMutable> mutableBlob = do_QueryInterface(blob);
|
2011-09-28 23:19:26 -07:00
|
|
|
bool isMutable;
|
2011-08-15 20:40:38 -07:00
|
|
|
NS_ASSERTION(NS_SUCCEEDED(mutableBlob->GetMutable(&isMutable)) &&
|
|
|
|
!isMutable,
|
|
|
|
"Only immutable blob should be passed to worker");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
// nsIDOMBlobs should be threadsafe, thus we will use the same instance
|
|
|
|
// on the main thread.
|
|
|
|
jsval wrappedBlob;
|
|
|
|
nsresult rv =
|
|
|
|
nsContentUtils::WrapNative(aCx, JS_GetGlobalForScopeChain(aCx), blob,
|
|
|
|
&NS_GET_IID(nsIDOMBlob), &wrappedBlob);
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
Error(aCx, DATA_CLONE_ERR);
|
2012-07-30 07:20:58 -07:00
|
|
|
return nullptr;
|
2011-08-15 20:40:38 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
return JSVAL_TO_OBJECT(wrappedBlob);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
JS_ClearPendingException(aCx);
|
2012-07-30 07:20:58 -07:00
|
|
|
return NS_DOMReadStructuredClone(aCx, aReader, aTag, aData, nullptr);
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
static JSBool
|
|
|
|
Write(JSContext* aCx, JSStructuredCloneWriter* aWriter, JSObject* aObj,
|
|
|
|
void* aClosure)
|
|
|
|
{
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
2011-08-15 20:40:38 -07:00
|
|
|
NS_ASSERTION(aClosure, "Null pointer!");
|
|
|
|
|
|
|
|
// We'll stash any nsISupports pointers that need to be AddRef'd here.
|
|
|
|
nsTArray<nsCOMPtr<nsISupports> >* clonedObjects =
|
|
|
|
static_cast<nsTArray<nsCOMPtr<nsISupports> >*>(aClosure);
|
|
|
|
|
|
|
|
// See if this is a wrapped native.
|
|
|
|
nsCOMPtr<nsIXPConnectWrappedNative> wrappedNative;
|
|
|
|
nsContentUtils::XPConnect()->
|
|
|
|
GetWrappedNativeOfJSObject(aCx, aObj, getter_AddRefs(wrappedNative));
|
|
|
|
|
|
|
|
if (wrappedNative) {
|
|
|
|
// Get the raw nsISupports out of it.
|
|
|
|
nsISupports* wrappedObject = wrappedNative->Native();
|
|
|
|
NS_ASSERTION(wrappedObject, "Null pointer?!");
|
|
|
|
|
2012-08-01 22:34:26 -07:00
|
|
|
nsISupports* ccISupports = nullptr;
|
|
|
|
wrappedObject->QueryInterface(NS_GET_IID(nsCycleCollectionISupports),
|
|
|
|
reinterpret_cast<void**>(&ccISupports));
|
|
|
|
if (ccISupports) {
|
|
|
|
NS_WARNING("Cycle collected objects are not supported!");
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
// See if the wrapped native is a nsIDOMFile.
|
|
|
|
nsCOMPtr<nsIDOMFile> file = do_QueryInterface(wrappedObject);
|
|
|
|
if (file) {
|
|
|
|
nsCOMPtr<nsIMutable> mutableFile = do_QueryInterface(file);
|
|
|
|
if (mutableFile && NS_SUCCEEDED(mutableFile->SetMutable(false))) {
|
|
|
|
nsIDOMFile* filePtr = file;
|
|
|
|
if (JS_WriteUint32Pair(aWriter, DOMWORKER_SCTAG_FILE, 0) &&
|
|
|
|
JS_WriteBytes(aWriter, &filePtr, sizeof(filePtr))) {
|
|
|
|
clonedObjects->AppendElement(file);
|
|
|
|
return true;
|
|
|
|
}
|
2011-08-15 20:40:38 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-01 22:34:26 -07:00
|
|
|
// See if the wrapped native is a nsIDOMBlob.
|
|
|
|
nsCOMPtr<nsIDOMBlob> blob = do_QueryInterface(wrappedObject);
|
|
|
|
if (blob) {
|
|
|
|
nsCOMPtr<nsIMutable> mutableBlob = do_QueryInterface(blob);
|
|
|
|
if (mutableBlob && NS_SUCCEEDED(mutableBlob->SetMutable(false))) {
|
|
|
|
nsIDOMBlob* blobPtr = blob;
|
|
|
|
if (JS_WriteUint32Pair(aWriter, DOMWORKER_SCTAG_BLOB, 0) &&
|
|
|
|
JS_WriteBytes(aWriter, &blobPtr, sizeof(blobPtr))) {
|
|
|
|
clonedObjects->AppendElement(blob);
|
|
|
|
return true;
|
|
|
|
}
|
2011-08-15 20:40:38 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
JS_ClearPendingException(aCx);
|
2012-07-30 07:20:58 -07:00
|
|
|
return NS_DOMWriteStructuredClone(aCx, aWriter, aObj, nullptr);
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
Bug 708735 - Use <stdint.h> types in JSAPI and throughout SpiderMonkey. Continue to provide the {u,}int{8,16,32,64} and JS{Uint,Int}{8,16,32,64} integer types through a single header, however, for a simpler backout strategy -- and also to ease the transition for embedders. r=timeless on switching the jsd API to use the <stdint.h> types, r=luke, r=dmandelin
2011-12-08 19:54:10 -08:00
|
|
|
Error(JSContext* aCx, uint32_t aErrorId)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
NS_DOMStructuredCloneError(aCx, aErrorId);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
JSStructuredCloneCallbacks gMainThreadWorkerStructuredCloneCallbacks = {
|
|
|
|
MainThreadWorkerStructuredCloneCallbacks::Read,
|
|
|
|
MainThreadWorkerStructuredCloneCallbacks::Write,
|
|
|
|
MainThreadWorkerStructuredCloneCallbacks::Error
|
|
|
|
};
|
|
|
|
|
|
|
|
struct ChromeWorkerStructuredCloneCallbacks
|
|
|
|
{
|
|
|
|
static JSObject*
|
Bug 708735 - Use <stdint.h> types in JSAPI and throughout SpiderMonkey. Continue to provide the {u,}int{8,16,32,64} and JS{Uint,Int}{8,16,32,64} integer types through a single header, however, for a simpler backout strategy -- and also to ease the transition for embedders. r=timeless on switching the jsd API to use the <stdint.h> types, r=luke, r=dmandelin
2011-12-08 19:54:10 -08:00
|
|
|
Read(JSContext* aCx, JSStructuredCloneReader* aReader, uint32_t aTag,
|
|
|
|
uint32_t aData, void* aClosure)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
return WorkerStructuredCloneCallbacks::Read(aCx, aReader, aTag, aData,
|
|
|
|
aClosure);
|
|
|
|
}
|
|
|
|
|
|
|
|
static JSBool
|
|
|
|
Write(JSContext* aCx, JSStructuredCloneWriter* aWriter, JSObject* aObj,
|
|
|
|
void* aClosure)
|
|
|
|
{
|
|
|
|
return WorkerStructuredCloneCallbacks::Write(aCx, aWriter, aObj, aClosure);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
Bug 708735 - Use <stdint.h> types in JSAPI and throughout SpiderMonkey. Continue to provide the {u,}int{8,16,32,64} and JS{Uint,Int}{8,16,32,64} integer types through a single header, however, for a simpler backout strategy -- and also to ease the transition for embedders. r=timeless on switching the jsd API to use the <stdint.h> types, r=luke, r=dmandelin
2011-12-08 19:54:10 -08:00
|
|
|
Error(JSContext* aCx, uint32_t aErrorId)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
return WorkerStructuredCloneCallbacks::Error(aCx, aErrorId);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
JSStructuredCloneCallbacks gChromeWorkerStructuredCloneCallbacks = {
|
|
|
|
ChromeWorkerStructuredCloneCallbacks::Read,
|
|
|
|
ChromeWorkerStructuredCloneCallbacks::Write,
|
|
|
|
ChromeWorkerStructuredCloneCallbacks::Error
|
|
|
|
};
|
|
|
|
|
|
|
|
struct MainThreadChromeWorkerStructuredCloneCallbacks
|
|
|
|
{
|
|
|
|
static JSObject*
|
Bug 708735 - Use <stdint.h> types in JSAPI and throughout SpiderMonkey. Continue to provide the {u,}int{8,16,32,64} and JS{Uint,Int}{8,16,32,64} integer types through a single header, however, for a simpler backout strategy -- and also to ease the transition for embedders. r=timeless on switching the jsd API to use the <stdint.h> types, r=luke, r=dmandelin
2011-12-08 19:54:10 -08:00
|
|
|
Read(JSContext* aCx, JSStructuredCloneReader* aReader, uint32_t aTag,
|
|
|
|
uint32_t aData, void* aClosure)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
JSObject* clone =
|
2011-11-07 17:01:29 -08:00
|
|
|
MainThreadWorkerStructuredCloneCallbacks::Read(aCx, aReader, aTag, aData,
|
|
|
|
aClosure);
|
|
|
|
if (clone) {
|
|
|
|
return clone;
|
|
|
|
}
|
|
|
|
|
|
|
|
clone =
|
2011-07-17 12:09:13 -07:00
|
|
|
ChromeWorkerStructuredCloneCallbacks::Read(aCx, aReader, aTag, aData,
|
|
|
|
aClosure);
|
|
|
|
if (clone) {
|
|
|
|
return clone;
|
|
|
|
}
|
|
|
|
|
|
|
|
JS_ClearPendingException(aCx);
|
2012-07-30 07:20:58 -07:00
|
|
|
return NS_DOMReadStructuredClone(aCx, aReader, aTag, aData, nullptr);
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
static JSBool
|
|
|
|
Write(JSContext* aCx, JSStructuredCloneWriter* aWriter, JSObject* aObj,
|
|
|
|
void* aClosure)
|
|
|
|
{
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
2011-11-07 17:01:29 -08:00
|
|
|
if (MainThreadWorkerStructuredCloneCallbacks::Write(aCx, aWriter, aObj,
|
|
|
|
aClosure) ||
|
|
|
|
ChromeWorkerStructuredCloneCallbacks::Write(aCx, aWriter, aObj,
|
|
|
|
aClosure) ||
|
2012-07-30 07:20:58 -07:00
|
|
|
NS_DOMWriteStructuredClone(aCx, aWriter, aObj, nullptr)) {
|
2011-11-07 17:01:29 -08:00
|
|
|
return true;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
2011-11-07 17:01:29 -08:00
|
|
|
return false;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
Bug 708735 - Use <stdint.h> types in JSAPI and throughout SpiderMonkey. Continue to provide the {u,}int{8,16,32,64} and JS{Uint,Int}{8,16,32,64} integer types through a single header, however, for a simpler backout strategy -- and also to ease the transition for embedders. r=timeless on switching the jsd API to use the <stdint.h> types, r=luke, r=dmandelin
2011-12-08 19:54:10 -08:00
|
|
|
Error(JSContext* aCx, uint32_t aErrorId)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
NS_DOMStructuredCloneError(aCx, aErrorId);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
JSStructuredCloneCallbacks gMainThreadChromeWorkerStructuredCloneCallbacks = {
|
|
|
|
MainThreadChromeWorkerStructuredCloneCallbacks::Read,
|
|
|
|
MainThreadChromeWorkerStructuredCloneCallbacks::Write,
|
|
|
|
MainThreadChromeWorkerStructuredCloneCallbacks::Error
|
|
|
|
};
|
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
class MainThreadReleaseRunnable : public nsRunnable
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
nsCOMPtr<nsIThread> mThread;
|
2012-03-30 21:42:20 -07:00
|
|
|
nsTArray<nsCOMPtr<nsISupports> > mDoomed;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
public:
|
|
|
|
MainThreadReleaseRunnable(nsCOMPtr<nsIThread>& aThread,
|
|
|
|
nsTArray<nsCOMPtr<nsISupports> >& aDoomed)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
2012-03-30 21:42:20 -07:00
|
|
|
mThread.swap(aThread);
|
|
|
|
mDoomed.SwapElements(aDoomed);
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
MainThreadReleaseRunnable(nsTArray<nsCOMPtr<nsISupports> >& aDoomed)
|
|
|
|
{
|
|
|
|
mDoomed.SwapElements(aDoomed);
|
|
|
|
}
|
2011-07-25 18:49:16 -07:00
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
NS_IMETHOD
|
|
|
|
Run()
|
|
|
|
{
|
|
|
|
mDoomed.Clear();
|
2011-07-25 18:49:16 -07:00
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
if (mThread) {
|
|
|
|
RuntimeService* runtime = RuntimeService::GetService();
|
|
|
|
NS_ASSERTION(runtime, "This should never be null!");
|
2011-07-25 18:49:16 -07:00
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
runtime->NoteIdleThread(mThread);
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
2012-03-30 21:42:20 -07:00
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
class WorkerFinishedRunnable : public WorkerControlRunnable
|
|
|
|
{
|
|
|
|
WorkerPrivate* mFinishedWorker;
|
|
|
|
nsCOMPtr<nsIThread> mThread;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
public:
|
|
|
|
WorkerFinishedRunnable(WorkerPrivate* aWorkerPrivate,
|
|
|
|
WorkerPrivate* aFinishedWorker,
|
|
|
|
nsIThread* aFinishedThread)
|
|
|
|
: WorkerControlRunnable(aWorkerPrivate, WorkerThread, UnchangedBusyCount),
|
|
|
|
mFinishedWorker(aFinishedWorker), mThread(aFinishedThread)
|
|
|
|
{ }
|
|
|
|
|
|
|
|
bool
|
|
|
|
PreDispatch(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
// Silence bad assertions.
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
PostDispatch(JSContext* aCx, WorkerPrivate* aWorkerPrivate,
|
|
|
|
bool aDispatchResult)
|
|
|
|
{
|
|
|
|
// Silence bad assertions.
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
nsTArray<nsCOMPtr<nsISupports> > doomed;
|
|
|
|
mFinishedWorker->ForgetMainThreadObjects(doomed);
|
|
|
|
|
|
|
|
nsRefPtr<MainThreadReleaseRunnable> runnable =
|
|
|
|
new MainThreadReleaseRunnable(mThread, doomed);
|
|
|
|
if (NS_FAILED(NS_DispatchToMainThread(runnable, NS_DISPATCH_NORMAL))) {
|
|
|
|
NS_WARNING("Failed to dispatch, going to leak!");
|
|
|
|
}
|
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
mFinishedWorker->Finish(aCx);
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
RuntimeService* runtime = RuntimeService::GetService();
|
|
|
|
NS_ASSERTION(runtime, "This should never be null!");
|
|
|
|
|
|
|
|
runtime->UnregisterWorker(aCx, mFinishedWorker);
|
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
mFinishedWorker->Release();
|
2011-07-17 12:09:13 -07:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
class TopLevelWorkerFinishedRunnable : public nsRunnable
|
|
|
|
{
|
|
|
|
WorkerPrivate* mFinishedWorker;
|
|
|
|
nsCOMPtr<nsIThread> mThread;
|
|
|
|
|
|
|
|
public:
|
|
|
|
TopLevelWorkerFinishedRunnable(WorkerPrivate* aFinishedWorker,
|
|
|
|
nsIThread* aFinishedThread)
|
|
|
|
: mFinishedWorker(aFinishedWorker), mThread(aFinishedThread)
|
|
|
|
{
|
|
|
|
aFinishedWorker->AssertIsOnWorkerThread();
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHOD
|
|
|
|
Run()
|
|
|
|
{
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
RuntimeService::AutoSafeJSContext cx;
|
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
mFinishedWorker->Finish(cx);
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
RuntimeService* runtime = RuntimeService::GetService();
|
|
|
|
NS_ASSERTION(runtime, "This should never be null!");
|
|
|
|
|
|
|
|
runtime->UnregisterWorker(cx, mFinishedWorker);
|
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
nsTArray<nsCOMPtr<nsISupports> > doomed;
|
|
|
|
mFinishedWorker->ForgetMainThreadObjects(doomed);
|
|
|
|
|
|
|
|
nsRefPtr<MainThreadReleaseRunnable> runnable =
|
|
|
|
new MainThreadReleaseRunnable(doomed);
|
|
|
|
if (NS_FAILED(NS_DispatchToCurrentThread(runnable))) {
|
|
|
|
NS_WARNING("Failed to dispatch, going to leak!");
|
|
|
|
}
|
|
|
|
|
2011-07-25 18:49:16 -07:00
|
|
|
if (mThread) {
|
|
|
|
runtime->NoteIdleThread(mThread);
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
mFinishedWorker->Release();
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2011-07-25 18:49:16 -07:00
|
|
|
return NS_OK;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
class ModifyBusyCountRunnable : public WorkerControlRunnable
|
|
|
|
{
|
|
|
|
bool mIncrease;
|
|
|
|
|
|
|
|
public:
|
|
|
|
ModifyBusyCountRunnable(WorkerPrivate* aWorkerPrivate, bool aIncrease)
|
|
|
|
: WorkerControlRunnable(aWorkerPrivate, ParentThread, UnchangedBusyCount),
|
|
|
|
mIncrease(aIncrease)
|
|
|
|
{ }
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
return aWorkerPrivate->ModifyBusyCount(aCx, mIncrease);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
PostRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate, bool aRunResult)
|
|
|
|
{
|
|
|
|
if (mIncrease) {
|
|
|
|
WorkerControlRunnable::PostRun(aCx, aWorkerPrivate, aRunResult);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
// Don't do anything here as it's possible that aWorkerPrivate has been
|
|
|
|
// deleted.
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
class CompileScriptRunnable : public WorkerRunnable
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
CompileScriptRunnable(WorkerPrivate* aWorkerPrivate)
|
2012-02-09 20:54:47 -08:00
|
|
|
: WorkerRunnable(aWorkerPrivate, WorkerThread, ModifyBusyCount,
|
|
|
|
SkipWhenClearing)
|
2011-07-17 12:09:13 -07:00
|
|
|
{ }
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
JSObject* global = CreateDedicatedWorkerGlobalScope(aCx);
|
|
|
|
if (!global) {
|
|
|
|
NS_WARNING("Failed to make global!");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2012-08-21 18:42:53 -07:00
|
|
|
JSAutoCompartment ac(aCx, global);
|
2011-07-17 12:09:13 -07:00
|
|
|
JS_SetGlobalObject(aCx, global);
|
|
|
|
|
|
|
|
return scriptloader::LoadWorkerScript(aCx);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
class CloseEventRunnable : public WorkerRunnable
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
CloseEventRunnable(WorkerPrivate* aWorkerPrivate)
|
2012-02-09 20:54:47 -08:00
|
|
|
: WorkerRunnable(aWorkerPrivate, WorkerThread, UnchangedBusyCount,
|
|
|
|
SkipWhenClearing)
|
2011-07-17 12:09:13 -07:00
|
|
|
{ }
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
JSObject* target = JS_GetGlobalObject(aCx);
|
|
|
|
NS_ASSERTION(target, "This must never be null!");
|
|
|
|
|
|
|
|
aWorkerPrivate->CloseHandlerStarted();
|
|
|
|
|
|
|
|
JSString* type = JS_InternString(aCx, "close");
|
|
|
|
if (!type) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
JSObject* event = CreateGenericEvent(aCx, type, false, false, false);
|
2011-07-17 12:09:13 -07:00
|
|
|
if (!event) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool ignored;
|
2012-03-30 21:42:20 -07:00
|
|
|
return DispatchEventToTarget(aCx, target, event, &ignored);
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
PostRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate, bool aRunResult)
|
|
|
|
{
|
|
|
|
// Report errors.
|
|
|
|
WorkerRunnable::PostRun(aCx, aWorkerPrivate, aRunResult);
|
|
|
|
|
|
|
|
// Match the busy count increase from NotifyRunnable.
|
|
|
|
if (!aWorkerPrivate->ModifyBusyCountFromWorker(aCx, false)) {
|
|
|
|
JS_ReportPendingException(aCx);
|
|
|
|
}
|
|
|
|
|
|
|
|
aWorkerPrivate->CloseHandlerFinished();
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
class MessageEventRunnable : public WorkerRunnable
|
|
|
|
{
|
Bug 714332 - Fix uint64 types usage in dom/workers and dom/base; r=bent
Use uint64_t where appropriate for mData, fails to build on OpenBSD
otherwise with wrong casts/no matching template.
dom/base/nsStructuredCloneContainer.cpp:96: error: invalid conversion from 'PRUint64*' to 'uint64_t*'
dom/base/nsStructuredCloneContainer.cpp:131: error: invalid conversion from 'PRUint64*' to 'uint64_t*'
dom/workers/WorkerPrivate.cpp:822: error: no matching function for call to 'JSAutoStructuredCloneBuffer::steal(uint64**, size_t*)'
../../dist/include/jsapi.h:4641: note: candidates are: void
JSAutoStructuredCloneBuffer::steal(uint64_t**, size_t*, uint32_t*) <near
match>
dom/workers/WorkerPrivate.cpp:833: error: no matching function for call to 'JSAutoStructuredCloneBuffer::adopt(uint64*&, size_t&)'
../../dist/include/jsapi.h:4634: note: candidates are: void
JSAutoStructuredCloneBuffer::adopt(uint64_t*, size_t, uint32_t) <near
match>
dom/workers/WorkerPrivate.cpp:853: error: no matching function for call to 'JSAutoStructuredCloneBuffer::steal(uint64**, size_t*)'
../../dist/include/jsapi.h:4641: note: candidates are: void
JSAutoStructuredCloneBuffer::steal(uint64_t**, size_t*, uint32_t*) <near
match>
2012-01-02 10:08:14 -08:00
|
|
|
uint64_t* mData;
|
2011-07-17 12:09:13 -07:00
|
|
|
size_t mDataByteCount;
|
2011-08-15 20:40:38 -07:00
|
|
|
nsTArray<nsCOMPtr<nsISupports> > mClonedObjects;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
public:
|
|
|
|
MessageEventRunnable(WorkerPrivate* aWorkerPrivate, Target aTarget,
|
2011-08-15 20:40:38 -07:00
|
|
|
JSAutoStructuredCloneBuffer& aData,
|
|
|
|
nsTArray<nsCOMPtr<nsISupports> >& aClonedObjects)
|
2011-07-17 12:09:13 -07:00
|
|
|
: WorkerRunnable(aWorkerPrivate, aTarget, aTarget == WorkerThread ?
|
|
|
|
ModifyBusyCount :
|
2012-02-09 20:54:47 -08:00
|
|
|
UnchangedBusyCount,
|
|
|
|
SkipWhenClearing)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
aData.steal(&mData, &mDataByteCount);
|
2011-08-15 20:40:38 -07:00
|
|
|
|
|
|
|
if (!mClonedObjects.SwapElements(aClonedObjects)) {
|
|
|
|
NS_ERROR("This should never fail!");
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
JSAutoStructuredCloneBuffer buffer;
|
2011-07-12 10:42:24 -07:00
|
|
|
buffer.adopt(mData, mDataByteCount);
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-07-30 07:20:58 -07:00
|
|
|
mData = nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
mDataByteCount = 0;
|
|
|
|
|
|
|
|
bool mainRuntime;
|
|
|
|
JSObject* target;
|
|
|
|
if (mTarget == ParentThread) {
|
2012-03-30 21:42:20 -07:00
|
|
|
// Don't fire this event if the JS object has been disconnected from the
|
2011-07-17 12:09:13 -07:00
|
|
|
// private object.
|
2012-03-30 21:42:20 -07:00
|
|
|
if (!aWorkerPrivate->IsAcceptingEvents()) {
|
2011-07-17 12:09:13 -07:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
mainRuntime = !aWorkerPrivate->GetParent();
|
|
|
|
|
|
|
|
target = aWorkerPrivate->GetJSObject();
|
|
|
|
NS_ASSERTION(target, "Must have a target!");
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
if (aWorkerPrivate->IsSuspended()) {
|
|
|
|
aWorkerPrivate->QueueRunnable(this);
|
|
|
|
buffer.steal(&mData, &mDataByteCount);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
aWorkerPrivate->AssertInnerWindowIsCorrect();
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
NS_ASSERTION(aWorkerPrivate == GetWorkerPrivateFromContext(aCx),
|
|
|
|
"Badness!");
|
|
|
|
mainRuntime = false;
|
|
|
|
target = JS_GetGlobalObject(aCx);
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_ASSERTION(target, "This should never be null!");
|
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
JSObject* event =
|
|
|
|
CreateMessageEvent(aCx, buffer, mClonedObjects, mainRuntime);
|
2011-07-17 12:09:13 -07:00
|
|
|
if (!event) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool dummy;
|
2012-03-30 21:42:20 -07:00
|
|
|
return DispatchEventToTarget(aCx, target, event, &dummy);
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
2012-05-04 00:22:18 -07:00
|
|
|
|
|
|
|
void PostRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate, bool aRunResult)
|
|
|
|
{
|
|
|
|
// Notify before WorkerRunnable::PostRun, since that can kill aWorkerPrivate
|
|
|
|
NotifyScriptExecutedIfNeeded();
|
|
|
|
WorkerRunnable::PostRun(aCx, aWorkerPrivate, aRunResult);
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
};
|
|
|
|
|
|
|
|
class NotifyRunnable : public WorkerControlRunnable
|
|
|
|
{
|
|
|
|
Status mStatus;
|
|
|
|
|
|
|
|
public:
|
2012-08-07 14:38:46 -07:00
|
|
|
NotifyRunnable(WorkerPrivate* aWorkerPrivate, Status aStatus)
|
2011-07-17 12:09:13 -07:00
|
|
|
: WorkerControlRunnable(aWorkerPrivate, WorkerThread, UnchangedBusyCount),
|
2012-08-07 14:38:46 -07:00
|
|
|
mStatus(aStatus)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
NS_ASSERTION(aStatus == Terminating || aStatus == Canceling ||
|
|
|
|
aStatus == Killing, "Bad status!");
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
PreDispatch(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
// Modify here, but not in PostRun! This busy count addition will be matched
|
2012-08-07 14:38:46 -07:00
|
|
|
// by the CloseEventRunnable.
|
|
|
|
return aWorkerPrivate->ModifyBusyCount(aCx, true);
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
return aWorkerPrivate->NotifyInternal(aCx, mStatus);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2012-06-14 19:31:55 -07:00
|
|
|
class CloseRunnable MOZ_FINAL : public WorkerControlRunnable
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
public:
|
|
|
|
CloseRunnable(WorkerPrivate* aWorkerPrivate)
|
|
|
|
: WorkerControlRunnable(aWorkerPrivate, ParentThread, UnchangedBusyCount)
|
|
|
|
{ }
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
// This busy count will be matched by the CloseEventRunnable.
|
|
|
|
return aWorkerPrivate->ModifyBusyCount(aCx, true) &&
|
|
|
|
aWorkerPrivate->Close(aCx);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
class SuspendRunnable : public WorkerControlRunnable
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
SuspendRunnable(WorkerPrivate* aWorkerPrivate)
|
|
|
|
: WorkerControlRunnable(aWorkerPrivate, WorkerThread, UnchangedBusyCount)
|
|
|
|
{ }
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
return aWorkerPrivate->SuspendInternal(aCx);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
class ResumeRunnable : public WorkerControlRunnable
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
ResumeRunnable(WorkerPrivate* aWorkerPrivate)
|
|
|
|
: WorkerControlRunnable(aWorkerPrivate, WorkerThread, UnchangedBusyCount)
|
|
|
|
{ }
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
return aWorkerPrivate->ResumeInternal(aCx);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
class ReportErrorRunnable : public WorkerRunnable
|
|
|
|
{
|
|
|
|
nsString mMessage;
|
|
|
|
nsString mFilename;
|
|
|
|
nsString mLine;
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t mLineNumber;
|
|
|
|
uint32_t mColumnNumber;
|
|
|
|
uint32_t mFlags;
|
|
|
|
uint32_t mErrorNumber;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
public:
|
|
|
|
ReportErrorRunnable(WorkerPrivate* aWorkerPrivate, const nsString& aMessage,
|
|
|
|
const nsString& aFilename, const nsString& aLine,
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t aLineNumber, uint32_t aColumnNumber,
|
|
|
|
uint32_t aFlags, uint32_t aErrorNumber)
|
2012-02-09 20:54:47 -08:00
|
|
|
: WorkerRunnable(aWorkerPrivate, ParentThread, UnchangedBusyCount,
|
|
|
|
SkipWhenClearing),
|
2011-07-17 12:09:13 -07:00
|
|
|
mMessage(aMessage), mFilename(aFilename), mLine(aLine),
|
|
|
|
mLineNumber(aLineNumber), mColumnNumber(aColumnNumber), mFlags(aFlags),
|
|
|
|
mErrorNumber(aErrorNumber)
|
|
|
|
{ }
|
|
|
|
|
|
|
|
void
|
|
|
|
PostDispatch(JSContext* aCx, WorkerPrivate* aWorkerPrivate,
|
|
|
|
bool aDispatchResult)
|
|
|
|
{
|
|
|
|
aWorkerPrivate->AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
// Dispatch may fail if the worker was canceled, no need to report that as
|
|
|
|
// an error, so don't call base class PostDispatch.
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
2012-12-31 07:48:57 -08:00
|
|
|
// Don't fire this event if the JS object has been disconnected from the
|
|
|
|
// private object.
|
|
|
|
if (!aWorkerPrivate->IsAcceptingEvents()) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
JSObject* target = aWorkerPrivate->GetJSObject();
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
uint64_t innerWindowId;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
WorkerPrivate* parent = aWorkerPrivate->GetParent();
|
|
|
|
if (parent) {
|
2011-08-24 13:44:35 -07:00
|
|
|
innerWindowId = 0;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
if (aWorkerPrivate->IsSuspended()) {
|
|
|
|
aWorkerPrivate->QueueRunnable(this);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-08-06 08:29:03 -07:00
|
|
|
aWorkerPrivate->AssertInnerWindowIsCorrect();
|
|
|
|
|
2011-08-24 13:44:35 -07:00
|
|
|
innerWindowId = aWorkerPrivate->GetInnerWindowId();
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
return ReportErrorRunnable::ReportError(aCx, parent, true, target, mMessage,
|
|
|
|
mFilename, mLine, mLineNumber,
|
|
|
|
mColumnNumber, mFlags,
|
2011-08-24 13:44:35 -07:00
|
|
|
mErrorNumber, innerWindowId);
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
2012-05-04 00:22:18 -07:00
|
|
|
void PostRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate, bool aRunResult)
|
|
|
|
{
|
|
|
|
// Notify before WorkerRunnable::PostRun, since that can kill aWorkerPrivate
|
|
|
|
NotifyScriptExecutedIfNeeded();
|
|
|
|
WorkerRunnable::PostRun(aCx, aWorkerPrivate, aRunResult);
|
|
|
|
}
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
static bool
|
|
|
|
ReportError(JSContext* aCx, WorkerPrivate* aWorkerPrivate,
|
|
|
|
bool aFireAtScope, JSObject* aTarget, const nsString& aMessage,
|
|
|
|
const nsString& aFilename, const nsString& aLine,
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t aLineNumber, uint32_t aColumnNumber, uint32_t aFlags,
|
|
|
|
uint32_t aErrorNumber, uint64_t aInnerWindowId)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
if (aWorkerPrivate) {
|
|
|
|
aWorkerPrivate->AssertIsOnWorkerThread();
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
}
|
|
|
|
|
|
|
|
JSString* message = JS_NewUCStringCopyN(aCx, aMessage.get(),
|
|
|
|
aMessage.Length());
|
|
|
|
if (!message) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
JSString* filename = JS_NewUCStringCopyN(aCx, aFilename.get(),
|
|
|
|
aFilename.Length());
|
|
|
|
if (!filename) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2012-12-07 16:35:44 -08:00
|
|
|
// We should not fire error events for warnings but instead make sure that
|
|
|
|
// they show up in the error console.
|
|
|
|
if (!JSREPORT_IS_WARNING(aFlags)) {
|
|
|
|
// First fire an ErrorEvent at the worker.
|
|
|
|
if (aTarget) {
|
2012-03-30 21:42:20 -07:00
|
|
|
JSObject* event =
|
2012-12-07 16:35:44 -08:00
|
|
|
CreateErrorEvent(aCx, message, filename, aLineNumber, !aWorkerPrivate);
|
2011-07-17 12:09:13 -07:00
|
|
|
if (!event) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2012-12-07 16:35:44 -08:00
|
|
|
bool preventDefaultCalled;
|
|
|
|
if (!DispatchEventToTarget(aCx, aTarget, event, &preventDefaultCalled)) {
|
2011-07-17 12:09:13 -07:00
|
|
|
return false;
|
|
|
|
}
|
2012-12-07 16:35:44 -08:00
|
|
|
|
|
|
|
if (preventDefaultCalled) {
|
|
|
|
return true;
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
2012-12-07 16:35:44 -08:00
|
|
|
|
|
|
|
// Now fire an event at the global object, but don't do that if the error
|
|
|
|
// code is too much recursion and this is the same script threw the error.
|
|
|
|
if (aFireAtScope && (aTarget || aErrorNumber != JSMSG_OVER_RECURSED)) {
|
|
|
|
aTarget = JS_GetGlobalForScopeChain(aCx);
|
|
|
|
NS_ASSERTION(aTarget, "This should never be null!");
|
|
|
|
|
|
|
|
bool preventDefaultCalled;
|
|
|
|
nsIScriptGlobalObject* sgo;
|
|
|
|
|
|
|
|
if (aWorkerPrivate ||
|
|
|
|
!(sgo = nsJSUtils::GetStaticScriptGlobal(aTarget))) {
|
|
|
|
// Fire a normal ErrorEvent if we're running on a worker thread.
|
|
|
|
JSObject* event =
|
|
|
|
CreateErrorEvent(aCx, message, filename, aLineNumber, false);
|
|
|
|
if (!event) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!DispatchEventToTarget(aCx, aTarget, event,
|
|
|
|
&preventDefaultCalled)) {
|
|
|
|
return false;
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
2012-12-07 16:35:44 -08:00
|
|
|
else {
|
|
|
|
// Icky, we have to fire an nsScriptErrorEvent...
|
|
|
|
nsScriptErrorEvent event(true, NS_LOAD_ERROR);
|
|
|
|
event.lineNr = aLineNumber;
|
|
|
|
event.errorMsg = aMessage.get();
|
|
|
|
event.fileName = aFilename.get();
|
|
|
|
|
|
|
|
nsEventStatus status = nsEventStatus_eIgnore;
|
|
|
|
if (NS_FAILED(sgo->HandleScriptError(&event, &status))) {
|
|
|
|
NS_WARNING("Failed to dispatch main thread error event!");
|
|
|
|
status = nsEventStatus_eIgnore;
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-12-07 16:35:44 -08:00
|
|
|
preventDefaultCalled = status == nsEventStatus_eConsumeNoDefault;
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-12-07 16:35:44 -08:00
|
|
|
if (preventDefaultCalled) {
|
|
|
|
return true;
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now fire a runnable to do the same on the parent's thread if we can.
|
|
|
|
if (aWorkerPrivate) {
|
|
|
|
nsRefPtr<ReportErrorRunnable> runnable =
|
|
|
|
new ReportErrorRunnable(aWorkerPrivate, aMessage, aFilename, aLine,
|
|
|
|
aLineNumber, aColumnNumber, aFlags,
|
|
|
|
aErrorNumber);
|
|
|
|
return runnable->Dispatch(aCx);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Otherwise log an error to the error console.
|
2011-12-21 13:51:29 -08:00
|
|
|
nsCOMPtr<nsIScriptError> scriptError =
|
2011-07-17 12:09:13 -07:00
|
|
|
do_CreateInstance(NS_SCRIPTERROR_CONTRACTID);
|
2011-12-21 13:51:29 -08:00
|
|
|
NS_WARN_IF_FALSE(scriptError, "Failed to create script error!");
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
if (scriptError) {
|
2012-09-09 16:29:12 -07:00
|
|
|
if (NS_FAILED(scriptError->InitWithWindowID(aMessage,
|
|
|
|
aFilename,
|
|
|
|
aLine, aLineNumber,
|
2011-12-21 13:51:29 -08:00
|
|
|
aColumnNumber, aFlags,
|
|
|
|
"Web Worker",
|
|
|
|
aInnerWindowId))) {
|
2011-07-17 12:09:13 -07:00
|
|
|
NS_WARNING("Failed to init script error!");
|
2012-07-30 07:20:58 -07:00
|
|
|
scriptError = nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIConsoleService> consoleService =
|
|
|
|
do_GetService(NS_CONSOLESERVICE_CONTRACTID);
|
2011-12-21 13:51:29 -08:00
|
|
|
NS_WARN_IF_FALSE(consoleService, "Failed to get console service!");
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
bool logged = false;
|
|
|
|
|
|
|
|
if (consoleService) {
|
2011-12-21 13:51:29 -08:00
|
|
|
if (scriptError) {
|
|
|
|
if (NS_SUCCEEDED(consoleService->LogMessage(scriptError))) {
|
2011-07-17 12:09:13 -07:00
|
|
|
logged = true;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
NS_WARNING("Failed to log script error!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else if (NS_SUCCEEDED(consoleService->LogStringMessage(aMessage.get()))) {
|
|
|
|
logged = true;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
NS_WARNING("Failed to log script error!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!logged) {
|
2011-12-07 02:29:34 -08:00
|
|
|
NS_ConvertUTF16toUTF8 msg(aMessage);
|
|
|
|
#ifdef ANDROID
|
2012-06-28 07:14:11 -07:00
|
|
|
__android_log_print(ANDROID_LOG_INFO, "Gecko", "%s", msg.get());
|
2011-12-07 02:29:34 -08:00
|
|
|
#endif
|
|
|
|
fputs(msg.get(), stderr);
|
2011-07-17 12:09:13 -07:00
|
|
|
fflush(stderr);
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
class TimerRunnable : public WorkerRunnable
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
TimerRunnable(WorkerPrivate* aWorkerPrivate)
|
2012-02-09 20:54:47 -08:00
|
|
|
: WorkerRunnable(aWorkerPrivate, WorkerThread, UnchangedBusyCount,
|
|
|
|
SkipWhenClearing)
|
2011-07-17 12:09:13 -07:00
|
|
|
{ }
|
|
|
|
|
|
|
|
bool
|
|
|
|
PreDispatch(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
// Silence bad assertions.
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
PostDispatch(JSContext* aCx, WorkerPrivate* aWorkerPrivate,
|
|
|
|
bool aDispatchResult)
|
|
|
|
{
|
|
|
|
// Silence bad assertions.
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
return aWorkerPrivate->RunExpiredTimeouts(aCx);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
void
|
|
|
|
DummyCallback(nsITimer* aTimer, void* aClosure)
|
|
|
|
{
|
|
|
|
// Nothing!
|
|
|
|
}
|
|
|
|
|
2012-06-14 19:31:55 -07:00
|
|
|
class WorkerRunnableEventTarget MOZ_FINAL : public nsIEventTarget
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
protected:
|
|
|
|
nsRefPtr<WorkerRunnable> mWorkerRunnable;
|
|
|
|
|
|
|
|
public:
|
|
|
|
WorkerRunnableEventTarget(WorkerRunnable* aWorkerRunnable)
|
|
|
|
: mWorkerRunnable(aWorkerRunnable)
|
|
|
|
{ }
|
|
|
|
|
|
|
|
NS_DECL_ISUPPORTS
|
|
|
|
|
|
|
|
NS_IMETHOD
|
2012-08-22 08:56:38 -07:00
|
|
|
Dispatch(nsIRunnable* aRunnable, uint32_t aFlags)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
NS_ASSERTION(aFlags == nsIEventTarget::DISPATCH_NORMAL, "Don't call me!");
|
|
|
|
|
|
|
|
nsRefPtr<WorkerRunnableEventTarget> kungFuDeathGrip = this;
|
|
|
|
|
2012-03-23 10:46:16 -07:00
|
|
|
// Run the runnable we're given now (should just call DummyCallback()),
|
|
|
|
// otherwise the timer thread will leak it... If we run this after
|
|
|
|
// dispatch running the event can race against resetting the timer.
|
|
|
|
aRunnable->Run();
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
// This can fail if we're racing to terminate or cancel, should be handled
|
|
|
|
// by the terminate or cancel code.
|
2012-07-30 07:20:58 -07:00
|
|
|
mWorkerRunnable->Dispatch(nullptr);
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-03-23 10:46:16 -07:00
|
|
|
return NS_OK;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHOD
|
2011-09-28 23:19:26 -07:00
|
|
|
IsOnCurrentThread(bool* aIsOnCurrentThread)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
*aIsOnCurrentThread = false;
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
NS_IMPL_THREADSAFE_ISUPPORTS1(WorkerRunnableEventTarget, nsIEventTarget)
|
|
|
|
|
|
|
|
class KillCloseEventRunnable : public WorkerRunnable
|
|
|
|
{
|
|
|
|
nsCOMPtr<nsITimer> mTimer;
|
|
|
|
|
|
|
|
class KillScriptRunnable : public WorkerControlRunnable
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
KillScriptRunnable(WorkerPrivate* aWorkerPrivate)
|
|
|
|
: WorkerControlRunnable(aWorkerPrivate, WorkerThread, UnchangedBusyCount)
|
|
|
|
{ }
|
|
|
|
|
|
|
|
bool
|
|
|
|
PreDispatch(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
// Silence bad assertions.
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
PostDispatch(JSContext* aCx, WorkerPrivate* aWorkerPrivate,
|
|
|
|
bool aDispatchResult)
|
|
|
|
{
|
|
|
|
// Silence bad assertions.
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
// Kill running script.
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
public:
|
|
|
|
KillCloseEventRunnable(WorkerPrivate* aWorkerPrivate)
|
2012-02-09 20:54:47 -08:00
|
|
|
: WorkerRunnable(aWorkerPrivate, WorkerThread, UnchangedBusyCount,
|
|
|
|
SkipWhenClearing)
|
2011-07-17 12:09:13 -07:00
|
|
|
{ }
|
|
|
|
|
|
|
|
~KillCloseEventRunnable()
|
|
|
|
{
|
|
|
|
if (mTimer) {
|
|
|
|
mTimer->Cancel();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
PreDispatch(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
NS_NOTREACHED("Not meant to be dispatched!");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2012-08-22 08:56:38 -07:00
|
|
|
SetTimeout(JSContext* aCx, uint32_t aDelayMS)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
nsCOMPtr<nsITimer> timer = do_CreateInstance(NS_TIMER_CONTRACTID);
|
|
|
|
if (!timer) {
|
|
|
|
JS_ReportError(aCx, "Failed to create timer!");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsRefPtr<KillScriptRunnable> runnable =
|
|
|
|
new KillScriptRunnable(mWorkerPrivate);
|
|
|
|
|
|
|
|
nsRefPtr<WorkerRunnableEventTarget> target =
|
|
|
|
new WorkerRunnableEventTarget(runnable);
|
|
|
|
|
|
|
|
if (NS_FAILED(timer->SetTarget(target))) {
|
|
|
|
JS_ReportError(aCx, "Failed to set timer's target!");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2012-07-30 07:20:58 -07:00
|
|
|
if (NS_FAILED(timer->InitWithFuncCallback(DummyCallback, nullptr, aDelayMS,
|
2011-07-17 12:09:13 -07:00
|
|
|
nsITimer::TYPE_ONE_SHOT))) {
|
|
|
|
JS_ReportError(aCx, "Failed to start timer!");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
mTimer.swap(timer);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
if (mTimer) {
|
|
|
|
mTimer->Cancel();
|
2012-07-30 07:20:58 -07:00
|
|
|
mTimer = nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
class UpdateJSContextOptionsRunnable : public WorkerControlRunnable
|
|
|
|
{
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t mOptions;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
public:
|
|
|
|
UpdateJSContextOptionsRunnable(WorkerPrivate* aWorkerPrivate,
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t aOptions)
|
2011-07-17 12:09:13 -07:00
|
|
|
: WorkerControlRunnable(aWorkerPrivate, WorkerThread, UnchangedBusyCount),
|
|
|
|
mOptions(aOptions)
|
|
|
|
{ }
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
aWorkerPrivate->UpdateJSContextOptionsInternal(aCx, mOptions);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2013-01-10 14:50:40 -08:00
|
|
|
class UpdateJSWorkerMemoryParameterRunnable : public WorkerControlRunnable
|
2012-01-04 11:11:32 -08:00
|
|
|
{
|
2013-01-10 14:50:40 -08:00
|
|
|
uint32_t mValue;
|
|
|
|
JSGCParamKey mKey;
|
2012-01-04 11:11:32 -08:00
|
|
|
|
|
|
|
public:
|
2013-01-10 14:50:40 -08:00
|
|
|
UpdateJSWorkerMemoryParameterRunnable(WorkerPrivate* aWorkerPrivate,
|
|
|
|
JSGCParamKey aKey,
|
|
|
|
uint32_t aValue)
|
2012-01-04 11:11:32 -08:00
|
|
|
: WorkerControlRunnable(aWorkerPrivate, WorkerThread, UnchangedBusyCount),
|
2013-01-10 14:50:40 -08:00
|
|
|
mValue(aValue), mKey(aKey)
|
2012-01-04 11:11:32 -08:00
|
|
|
{ }
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
2013-01-10 14:50:40 -08:00
|
|
|
aWorkerPrivate->UpdateJSWorkerMemoryParameter(aCx, mKey, mValue);
|
2012-01-04 11:11:32 -08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
#ifdef JS_GC_ZEAL
|
|
|
|
class UpdateGCZealRunnable : public WorkerControlRunnable
|
|
|
|
{
|
2012-08-22 08:56:38 -07:00
|
|
|
uint8_t mGCZeal;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
public:
|
|
|
|
UpdateGCZealRunnable(WorkerPrivate* aWorkerPrivate,
|
2012-08-22 08:56:38 -07:00
|
|
|
uint8_t aGCZeal)
|
2011-07-17 12:09:13 -07:00
|
|
|
: WorkerControlRunnable(aWorkerPrivate, WorkerThread, UnchangedBusyCount),
|
|
|
|
mGCZeal(aGCZeal)
|
|
|
|
{ }
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
aWorkerPrivate->UpdateGCZealInternal(aCx, mGCZeal);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2012-01-17 12:05:25 -08:00
|
|
|
class GarbageCollectRunnable : public WorkerControlRunnable
|
|
|
|
{
|
|
|
|
protected:
|
|
|
|
bool mShrinking;
|
|
|
|
bool mCollectChildren;
|
|
|
|
|
|
|
|
public:
|
|
|
|
GarbageCollectRunnable(WorkerPrivate* aWorkerPrivate, bool aShrinking,
|
|
|
|
bool aCollectChildren)
|
|
|
|
: WorkerControlRunnable(aWorkerPrivate, WorkerThread, UnchangedBusyCount),
|
|
|
|
mShrinking(aShrinking), mCollectChildren(aCollectChildren)
|
|
|
|
{ }
|
|
|
|
|
|
|
|
bool
|
|
|
|
PreDispatch(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
// Silence bad assertions, this can be dispatched from either the main
|
|
|
|
// thread or the timer thread..
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
PostDispatch(JSContext* aCx, WorkerPrivate* aWorkerPrivate,
|
|
|
|
bool aDispatchResult)
|
|
|
|
{
|
|
|
|
// Silence bad assertions, this can be dispatched from either the main
|
|
|
|
// thread or the timer thread..
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
aWorkerPrivate->GarbageCollectInternal(aCx, mShrinking, mCollectChildren);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2012-12-30 10:21:52 -08:00
|
|
|
class WorkerJSRuntimeStats : public JS::RuntimeStats
|
2011-08-06 18:03:46 -07:00
|
|
|
{
|
2012-12-30 10:21:52 -08:00
|
|
|
const nsACString& mRtPath;
|
2011-08-06 18:03:46 -07:00
|
|
|
|
|
|
|
public:
|
2012-12-30 10:21:52 -08:00
|
|
|
WorkerJSRuntimeStats(const nsACString& aRtPath)
|
|
|
|
: JS::RuntimeStats(JsWorkerMallocSizeOf), mRtPath(aRtPath)
|
2011-08-06 18:03:46 -07:00
|
|
|
{ }
|
|
|
|
|
2012-12-30 10:21:52 -08:00
|
|
|
~WorkerJSRuntimeStats()
|
2011-08-06 18:03:46 -07:00
|
|
|
{
|
2012-07-12 23:51:01 -07:00
|
|
|
for (size_t i = 0; i != compartmentStatsVector.length(); i++) {
|
|
|
|
free(compartmentStatsVector[i].extra1);
|
2012-12-30 10:21:52 -08:00
|
|
|
// No need to free |extra2| because it's a static string.
|
2012-07-12 23:51:01 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-12-30 10:21:52 -08:00
|
|
|
virtual void
|
|
|
|
initExtraCompartmentStats(JSCompartment* aCompartment,
|
|
|
|
JS::CompartmentStats* aCompartmentStats)
|
|
|
|
MOZ_OVERRIDE
|
2012-07-12 23:51:01 -07:00
|
|
|
{
|
2012-12-30 10:21:52 -08:00
|
|
|
MOZ_ASSERT(!aCompartmentStats->extra1);
|
|
|
|
MOZ_ASSERT(!aCompartmentStats->extra2);
|
2012-12-07 16:35:44 -08:00
|
|
|
|
2012-12-30 10:21:52 -08:00
|
|
|
// ReportJSRuntimeExplicitTreeStats expects that
|
|
|
|
// aCompartmentStats->{extra1,extra2} are char pointers.
|
2012-07-12 23:51:01 -07:00
|
|
|
|
|
|
|
// This is the |cJSPathPrefix|. Each worker has exactly two compartments:
|
|
|
|
// one for atoms, and one for everything else.
|
2012-12-30 10:21:52 -08:00
|
|
|
nsAutoCString cJSPathPrefix(mRtPath);
|
|
|
|
cJSPathPrefix += js::IsAtomsCompartment(aCompartment)
|
2012-07-12 23:51:01 -07:00
|
|
|
? NS_LITERAL_CSTRING("compartment(web-worker-atoms)/")
|
|
|
|
: NS_LITERAL_CSTRING("compartment(web-worker)/");
|
2012-12-30 10:21:52 -08:00
|
|
|
aCompartmentStats->extra1 = strdup(cJSPathPrefix.get());
|
2012-07-12 23:51:01 -07:00
|
|
|
|
2012-12-30 10:21:52 -08:00
|
|
|
// This should never be used when reporting with workers (hence the "?!").
|
|
|
|
static const char bogusMemoryReporterPath[] = "explicit/workers/?!/";
|
|
|
|
aCompartmentStats->extra2 = const_cast<char*>(bogusMemoryReporterPath);
|
2012-07-12 23:51:01 -07:00
|
|
|
}
|
|
|
|
};
|
2012-12-07 16:35:44 -08:00
|
|
|
|
2012-12-30 10:21:52 -08:00
|
|
|
} /* anonymous namespace */
|
2012-07-12 23:51:01 -07:00
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
#ifdef DEBUG
|
|
|
|
void
|
|
|
|
mozilla::dom::workers::AssertIsOnMainThread()
|
|
|
|
{
|
|
|
|
NS_ASSERTION(NS_IsMainThread(), "Wrong thread!");
|
|
|
|
}
|
|
|
|
|
|
|
|
WorkerRunnable::WorkerRunnable(WorkerPrivate* aWorkerPrivate, Target aTarget,
|
2012-02-09 20:54:47 -08:00
|
|
|
BusyBehavior aBusyBehavior,
|
|
|
|
ClearingBehavior aClearingBehavior)
|
2011-07-17 12:09:13 -07:00
|
|
|
: mWorkerPrivate(aWorkerPrivate), mTarget(aTarget),
|
2012-02-09 20:54:47 -08:00
|
|
|
mBusyBehavior(aBusyBehavior), mClearingBehavior(aClearingBehavior)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
NS_ASSERTION(aWorkerPrivate, "Null worker private!");
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
NS_IMPL_THREADSAFE_ISUPPORTS1(WorkerRunnable, nsIRunnable)
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRunnable::PreDispatch(JSContext* aCx, WorkerPrivate* aWorkerPrivate)
|
|
|
|
{
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (mBusyBehavior == ModifyBusyCount) {
|
|
|
|
NS_ASSERTION(mTarget == WorkerThread,
|
|
|
|
"Don't set this option unless targeting the worker thread!");
|
|
|
|
}
|
|
|
|
if (mTarget == ParentThread) {
|
|
|
|
aWorkerPrivate->AssertIsOnWorkerThread();
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
aWorkerPrivate->AssertIsOnParentThread();
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2012-01-12 08:55:44 -08:00
|
|
|
if (mBusyBehavior == ModifyBusyCount && aCx) {
|
2011-07-17 12:09:13 -07:00
|
|
|
return aWorkerPrivate->ModifyBusyCount(aCx, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerRunnable::Dispatch(JSContext* aCx)
|
|
|
|
{
|
|
|
|
bool ok;
|
|
|
|
|
|
|
|
if (!aCx) {
|
2012-07-30 07:20:58 -07:00
|
|
|
ok = PreDispatch(nullptr, mWorkerPrivate);
|
2011-07-17 12:09:13 -07:00
|
|
|
if (ok) {
|
|
|
|
ok = DispatchInternal();
|
|
|
|
}
|
2012-07-30 07:20:58 -07:00
|
|
|
PostDispatch(nullptr, mWorkerPrivate, ok);
|
2011-07-17 12:09:13 -07:00
|
|
|
return ok;
|
|
|
|
}
|
|
|
|
|
|
|
|
JSAutoRequest ar(aCx);
|
|
|
|
|
|
|
|
JSObject* global = JS_GetGlobalObject(aCx);
|
|
|
|
|
2012-08-21 18:42:53 -07:00
|
|
|
Maybe<JSAutoCompartment> ac;
|
|
|
|
if (global) {
|
|
|
|
ac.construct(aCx, global);
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
ok = PreDispatch(aCx, mWorkerPrivate);
|
|
|
|
|
|
|
|
if (ok && !DispatchInternal()) {
|
|
|
|
ok = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
PostDispatch(aCx, mWorkerPrivate, ok);
|
|
|
|
|
|
|
|
return ok;
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
|
|
|
bool
|
|
|
|
WorkerRunnable::DispatchToMainThread(nsIRunnable* aRunnable)
|
|
|
|
{
|
|
|
|
nsCOMPtr<nsIThread> mainThread = do_GetMainThread();
|
|
|
|
NS_ASSERTION(mainThread, "This should never fail!");
|
|
|
|
|
|
|
|
return NS_SUCCEEDED(mainThread->Dispatch(aRunnable, NS_DISPATCH_NORMAL));
|
|
|
|
}
|
|
|
|
|
|
|
|
// These DispatchInternal functions look identical but carry important type
|
|
|
|
// informaton so they can't be consolidated...
|
|
|
|
|
|
|
|
#define IMPL_DISPATCH_INTERNAL(_class) \
|
|
|
|
bool \
|
|
|
|
_class ::DispatchInternal() \
|
|
|
|
{ \
|
|
|
|
if (mTarget == WorkerThread) { \
|
|
|
|
return mWorkerPrivate->Dispatch(this); \
|
|
|
|
} \
|
|
|
|
\
|
|
|
|
if (mWorkerPrivate->GetParent()) { \
|
|
|
|
return mWorkerPrivate->GetParent()->Dispatch(this); \
|
|
|
|
} \
|
|
|
|
\
|
|
|
|
return DispatchToMainThread(this); \
|
|
|
|
}
|
|
|
|
|
|
|
|
IMPL_DISPATCH_INTERNAL(WorkerRunnable)
|
|
|
|
IMPL_DISPATCH_INTERNAL(WorkerSyncRunnable)
|
|
|
|
IMPL_DISPATCH_INTERNAL(WorkerControlRunnable)
|
|
|
|
|
|
|
|
#undef IMPL_DISPATCH_INTERNAL
|
|
|
|
|
|
|
|
void
|
|
|
|
WorkerRunnable::PostDispatch(JSContext* aCx, WorkerPrivate* aWorkerPrivate,
|
|
|
|
bool aDispatchResult)
|
|
|
|
{
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (mTarget == ParentThread) {
|
|
|
|
aWorkerPrivate->AssertIsOnWorkerThread();
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
aWorkerPrivate->AssertIsOnParentThread();
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2012-01-12 08:55:44 -08:00
|
|
|
if (!aDispatchResult && aCx) {
|
2011-07-17 12:09:13 -07:00
|
|
|
if (mBusyBehavior == ModifyBusyCount) {
|
|
|
|
aWorkerPrivate->ModifyBusyCount(aCx, false);
|
|
|
|
}
|
|
|
|
JS_ReportPendingException(aCx);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHODIMP
|
|
|
|
WorkerRunnable::Run()
|
|
|
|
{
|
|
|
|
JSContext* cx;
|
2011-07-27 16:15:50 -07:00
|
|
|
JSObject* targetCompartmentObject;
|
2012-07-30 07:20:58 -07:00
|
|
|
nsIThreadJSContextStack* contextStack = nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-05-14 11:29:41 -07:00
|
|
|
nsRefPtr<WorkerPrivate> kungFuDeathGrip;
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
if (mTarget == WorkerThread) {
|
|
|
|
mWorkerPrivate->AssertIsOnWorkerThread();
|
|
|
|
cx = mWorkerPrivate->GetJSContext();
|
2011-07-27 16:15:50 -07:00
|
|
|
targetCompartmentObject = JS_GetGlobalObject(cx);
|
2011-07-17 12:09:13 -07:00
|
|
|
} else {
|
2012-05-14 11:29:41 -07:00
|
|
|
kungFuDeathGrip = mWorkerPrivate;
|
2011-07-17 12:09:13 -07:00
|
|
|
mWorkerPrivate->AssertIsOnParentThread();
|
|
|
|
cx = mWorkerPrivate->ParentJSContext();
|
2011-07-27 16:15:50 -07:00
|
|
|
targetCompartmentObject = mWorkerPrivate->GetJSObject();
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
if (!mWorkerPrivate->GetParent()) {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
contextStack = nsContentUtils::ThreadJSContextStack();
|
|
|
|
NS_ASSERTION(contextStack, "This should never be null!");
|
|
|
|
|
|
|
|
if (NS_FAILED(contextStack->Push(cx))) {
|
|
|
|
NS_WARNING("Failed to push context!");
|
2012-07-30 07:20:58 -07:00
|
|
|
contextStack = nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_ASSERTION(cx, "Must have a context!");
|
|
|
|
|
|
|
|
JSAutoRequest ar(cx);
|
|
|
|
|
2012-08-21 18:42:53 -07:00
|
|
|
Maybe<JSAutoCompartment> ac;
|
|
|
|
if (targetCompartmentObject) {
|
|
|
|
ac.construct(cx, targetCompartmentObject);
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
bool result = WorkerRun(cx, mWorkerPrivate);
|
|
|
|
|
|
|
|
PostRun(cx, mWorkerPrivate, result);
|
|
|
|
|
|
|
|
if (contextStack) {
|
|
|
|
JSContext* otherCx;
|
|
|
|
if (NS_FAILED(contextStack->Pop(&otherCx))) {
|
|
|
|
NS_WARNING("Failed to pop context!");
|
|
|
|
}
|
|
|
|
else if (otherCx != cx) {
|
|
|
|
NS_WARNING("Popped a different context!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return result ? NS_OK : NS_ERROR_FAILURE;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
WorkerRunnable::PostRun(JSContext* aCx, WorkerPrivate* aWorkerPrivate,
|
|
|
|
bool aRunResult)
|
|
|
|
{
|
|
|
|
#ifdef DEBUG
|
|
|
|
if (mTarget == ParentThread) {
|
|
|
|
mWorkerPrivate->AssertIsOnParentThread();
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
mWorkerPrivate->AssertIsOnWorkerThread();
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (mBusyBehavior == ModifyBusyCount) {
|
|
|
|
if (!aWorkerPrivate->ModifyBusyCountFromWorker(aCx, false)) {
|
|
|
|
aRunResult = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!aRunResult) {
|
|
|
|
JS_ReportPendingException(aCx);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-05-04 00:22:18 -07:00
|
|
|
void
|
|
|
|
WorkerRunnable::NotifyScriptExecutedIfNeeded() const
|
|
|
|
{
|
|
|
|
// if we're on the main thread notify about the end of our script execution.
|
|
|
|
if (mTarget == ParentThread && !mWorkerPrivate->GetParent()) {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
if (mWorkerPrivate->GetScriptNotify()) {
|
|
|
|
mWorkerPrivate->GetScriptNotify()->ScriptExecuted();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
struct WorkerPrivate::TimeoutInfo
|
|
|
|
{
|
|
|
|
TimeoutInfo()
|
2012-05-11 08:46:26 -07:00
|
|
|
: mTimeoutVal(JS::UndefinedValue()), mLineNumber(0), mId(0), mIsInterval(false),
|
2011-07-17 12:09:13 -07:00
|
|
|
mCanceled(false)
|
|
|
|
{
|
|
|
|
MOZ_COUNT_CTOR(mozilla::dom::workers::WorkerPrivate::TimeoutInfo);
|
|
|
|
}
|
|
|
|
|
|
|
|
~TimeoutInfo()
|
|
|
|
{
|
|
|
|
MOZ_COUNT_DTOR(mozilla::dom::workers::WorkerPrivate::TimeoutInfo);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool operator==(const TimeoutInfo& aOther)
|
|
|
|
{
|
|
|
|
return mTargetTime == aOther.mTargetTime;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool operator<(const TimeoutInfo& aOther)
|
|
|
|
{
|
|
|
|
return mTargetTime < aOther.mTargetTime;
|
|
|
|
}
|
|
|
|
|
2012-05-11 08:46:26 -07:00
|
|
|
JS::Value mTimeoutVal;
|
2011-07-17 12:09:13 -07:00
|
|
|
nsTArray<jsval> mExtraArgVals;
|
|
|
|
mozilla::TimeStamp mTargetTime;
|
|
|
|
mozilla::TimeDuration mInterval;
|
|
|
|
nsCString mFilename;
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t mLineNumber;
|
|
|
|
uint32_t mId;
|
2011-07-17 12:09:13 -07:00
|
|
|
bool mIsInterval;
|
|
|
|
bool mCanceled;
|
|
|
|
};
|
|
|
|
|
2013-02-08 03:50:00 -08:00
|
|
|
class WorkerPrivate::MemoryReporter MOZ_FINAL : public nsIMemoryMultiReporter
|
|
|
|
{
|
|
|
|
friend class WorkerPrivate;
|
|
|
|
|
|
|
|
SharedMutex mMutex;
|
|
|
|
WorkerPrivate* mWorkerPrivate;
|
|
|
|
nsCString mRtPath;
|
|
|
|
|
|
|
|
public:
|
|
|
|
NS_DECL_ISUPPORTS
|
|
|
|
|
|
|
|
MemoryReporter(WorkerPrivate* aWorkerPrivate)
|
|
|
|
: mMutex(aWorkerPrivate->mMutex), mWorkerPrivate(aWorkerPrivate)
|
|
|
|
{
|
|
|
|
aWorkerPrivate->AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
nsCString escapedDomain(aWorkerPrivate->Domain());
|
|
|
|
escapedDomain.ReplaceChar('/', '\\');
|
|
|
|
|
|
|
|
NS_ConvertUTF16toUTF8 escapedURL(aWorkerPrivate->ScriptURL());
|
|
|
|
escapedURL.ReplaceChar('/', '\\');
|
|
|
|
|
|
|
|
nsAutoCString addressString;
|
|
|
|
addressString.AppendPrintf("0x%p", static_cast<void*>(aWorkerPrivate));
|
|
|
|
|
|
|
|
mRtPath = NS_LITERAL_CSTRING("explicit/workers/workers(") +
|
|
|
|
escapedDomain + NS_LITERAL_CSTRING(")/worker(") +
|
|
|
|
escapedURL + NS_LITERAL_CSTRING(", ") + addressString +
|
|
|
|
NS_LITERAL_CSTRING(")/");
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHOD
|
|
|
|
GetName(nsACString& aName)
|
|
|
|
{
|
|
|
|
aName.AssignLiteral("workers");
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHOD
|
|
|
|
CollectReports(nsIMemoryMultiReporterCallback* aCallback,
|
|
|
|
nsISupports* aClosure)
|
|
|
|
{
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
WorkerJSRuntimeStats rtStats(mRtPath);
|
|
|
|
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
|
|
|
if (!mWorkerPrivate ||
|
|
|
|
!mWorkerPrivate->BlockAndCollectRuntimeStats(/* aIsQuick = */ false,
|
|
|
|
&rtStats)) {
|
|
|
|
// Returning NS_OK here will effectively report 0 memory.
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return xpc::ReportJSRuntimeExplicitTreeStats(rtStats, mRtPath,
|
|
|
|
aCallback, aClosure);
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHOD
|
|
|
|
GetExplicitNonHeap(int64_t* aAmount)
|
|
|
|
{
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
|
|
|
if (!mWorkerPrivate ||
|
|
|
|
!mWorkerPrivate->BlockAndCollectRuntimeStats(/* aIsQuick = */ true,
|
|
|
|
aAmount)) {
|
|
|
|
*aAmount = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
~MemoryReporter()
|
|
|
|
{ }
|
|
|
|
|
|
|
|
void
|
|
|
|
Disable()
|
|
|
|
{
|
|
|
|
// Called from WorkerPrivate::DisableMemoryReporter.
|
|
|
|
mMutex.AssertCurrentThreadOwns();
|
|
|
|
|
|
|
|
NS_ASSERTION(mWorkerPrivate, "Disabled more than once!");
|
|
|
|
mWorkerPrivate = nullptr;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
NS_IMPL_THREADSAFE_ISUPPORTS1(WorkerPrivate::MemoryReporter,
|
|
|
|
nsIMemoryMultiReporter)
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
template <class Derived>
|
|
|
|
WorkerPrivateParent<Derived>::WorkerPrivateParent(
|
|
|
|
JSContext* aCx, JSObject* aObject,
|
|
|
|
WorkerPrivate* aParent,
|
|
|
|
JSContext* aParentJSContext,
|
|
|
|
const nsAString& aScriptURL,
|
|
|
|
bool aIsChromeWorker,
|
|
|
|
const nsACString& aDomain,
|
|
|
|
nsCOMPtr<nsPIDOMWindow>& aWindow,
|
|
|
|
nsCOMPtr<nsIScriptContext>& aScriptContext,
|
|
|
|
nsCOMPtr<nsIURI>& aBaseURI,
|
2012-09-15 11:51:55 -07:00
|
|
|
nsCOMPtr<nsIPrincipal>& aPrincipal,
|
|
|
|
nsCOMPtr<nsIContentSecurityPolicy>& aCSP,
|
|
|
|
bool aEvalAllowed)
|
2012-03-30 21:42:20 -07:00
|
|
|
: EventTarget(aParent ? aCx : NULL), mMutex("WorkerPrivateParent Mutex"),
|
2011-07-17 12:09:13 -07:00
|
|
|
mCondVar(mMutex, "WorkerPrivateParent CondVar"),
|
2012-12-30 10:21:52 -08:00
|
|
|
mMemoryReportCondVar(mMutex, "WorkerPrivateParent Memory Report CondVar"),
|
2011-07-17 12:09:13 -07:00
|
|
|
mJSObject(aObject), mParent(aParent), mParentJSContext(aParentJSContext),
|
|
|
|
mScriptURL(aScriptURL), mDomain(aDomain), mBusyCount(0),
|
2013-01-10 14:50:40 -08:00
|
|
|
mParentStatus(Pending), mJSContextOptions(0),
|
|
|
|
mJSRuntimeHeapSize(0), mJSWorkerAllocationThreshold(3),
|
2012-01-04 11:11:32 -08:00
|
|
|
mGCZeal(0), mJSObjectRooted(false), mParentSuspended(false),
|
2012-03-30 21:42:20 -07:00
|
|
|
mIsChromeWorker(aIsChromeWorker), mPrincipalIsSystem(false),
|
2012-09-15 11:51:55 -07:00
|
|
|
mMainThreadObjectsForgotten(false), mEvalAllowed(aEvalAllowed)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
MOZ_COUNT_CTOR(mozilla::dom::workers::WorkerPrivateParent);
|
|
|
|
|
|
|
|
if (aWindow) {
|
|
|
|
NS_ASSERTION(aWindow->IsInnerWindow(), "Should have inner window here!");
|
|
|
|
}
|
|
|
|
|
|
|
|
mWindow.swap(aWindow);
|
|
|
|
mScriptContext.swap(aScriptContext);
|
2012-05-04 00:22:18 -07:00
|
|
|
mScriptNotify = do_QueryInterface(mScriptContext);
|
2011-07-17 12:09:13 -07:00
|
|
|
mBaseURI.swap(aBaseURI);
|
|
|
|
mPrincipal.swap(aPrincipal);
|
2012-09-15 11:51:55 -07:00
|
|
|
mCSP.swap(aCSP);
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
if (aParent) {
|
|
|
|
aParent->AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
NS_ASSERTION(JS_GetOptions(aCx) == aParent->GetJSContextOptions(),
|
|
|
|
"Options mismatch!");
|
|
|
|
mJSContextOptions = aParent->GetJSContextOptions();
|
2012-01-04 11:11:32 -08:00
|
|
|
|
|
|
|
NS_ASSERTION(JS_GetGCParameter(JS_GetRuntime(aCx), JSGC_MAX_BYTES) ==
|
|
|
|
aParent->GetJSRuntimeHeapSize(),
|
|
|
|
"Runtime heap size mismatch!");
|
|
|
|
mJSRuntimeHeapSize = aParent->GetJSRuntimeHeapSize();
|
|
|
|
|
2013-01-10 14:50:40 -08:00
|
|
|
mJSWorkerAllocationThreshold = aParent->GetJSWorkerAllocationThreshold();
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
#ifdef JS_GC_ZEAL
|
|
|
|
mGCZeal = aParent->GetGCZeal();
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
mJSContextOptions = RuntimeService::GetDefaultJSContextOptions();
|
2013-01-10 14:50:40 -08:00
|
|
|
mJSRuntimeHeapSize =
|
|
|
|
RuntimeService::GetDefaultJSWorkerMemoryParameter(JSGC_MAX_BYTES);
|
|
|
|
mJSWorkerAllocationThreshold =
|
|
|
|
RuntimeService::GetDefaultJSWorkerMemoryParameter(JSGC_ALLOCATION_THRESHOLD);
|
2011-07-17 12:09:13 -07:00
|
|
|
#ifdef JS_GC_ZEAL
|
|
|
|
mGCZeal = RuntimeService::GetDefaultGCZeal();
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template <class Derived>
|
|
|
|
WorkerPrivateParent<Derived>::~WorkerPrivateParent()
|
|
|
|
{
|
|
|
|
MOZ_COUNT_DTOR(mozilla::dom::workers::WorkerPrivateParent);
|
|
|
|
}
|
|
|
|
|
|
|
|
template <class Derived>
|
|
|
|
bool
|
|
|
|
WorkerPrivateParent<Derived>::Start()
|
|
|
|
{
|
|
|
|
// May be called on any thread!
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
|
|
|
NS_ASSERTION(mParentStatus != Running, "How can this be?!");
|
|
|
|
|
|
|
|
if (mParentStatus == Pending) {
|
|
|
|
mParentStatus = Running;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2012-03-19 07:34:58 -07:00
|
|
|
// aCx is null when called from the finalizer
|
2011-07-17 12:09:13 -07:00
|
|
|
template <class Derived>
|
|
|
|
bool
|
2012-03-19 07:34:58 -07:00
|
|
|
WorkerPrivateParent<Derived>::NotifyPrivate(JSContext* aCx, Status aStatus)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
AssertIsOnParentThread();
|
|
|
|
|
|
|
|
bool pending;
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
|
|
|
if (mParentStatus >= aStatus) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
pending = mParentStatus == Pending;
|
|
|
|
mParentStatus = aStatus;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pending) {
|
|
|
|
WorkerPrivate* self = ParentAsWorkerPrivate();
|
|
|
|
#ifdef DEBUG
|
|
|
|
{
|
|
|
|
// Silence useless assertions in debug builds.
|
|
|
|
nsIThread* currentThread = NS_GetCurrentThread();
|
|
|
|
NS_ASSERTION(currentThread, "This should never be null!");
|
|
|
|
|
|
|
|
self->SetThread(currentThread);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
// Worker never got a chance to run, go ahead and delete it.
|
|
|
|
self->ScheduleDeletion(true);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_ASSERTION(aStatus != Terminating || mQueuedRunnables.IsEmpty(),
|
|
|
|
"Shouldn't have anything queued!");
|
|
|
|
|
|
|
|
// Anything queued will be discarded.
|
|
|
|
mQueuedRunnables.Clear();
|
|
|
|
|
|
|
|
nsRefPtr<NotifyRunnable> runnable =
|
2012-08-07 14:38:46 -07:00
|
|
|
new NotifyRunnable(ParentAsWorkerPrivate(), aStatus);
|
2012-03-19 07:34:58 -07:00
|
|
|
return runnable->Dispatch(aCx);
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
template <class Derived>
|
|
|
|
bool
|
|
|
|
WorkerPrivateParent<Derived>::Suspend(JSContext* aCx)
|
|
|
|
{
|
|
|
|
AssertIsOnParentThread();
|
|
|
|
NS_ASSERTION(!mParentSuspended, "Suspended more than once!");
|
|
|
|
|
|
|
|
mParentSuspended = true;
|
|
|
|
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
|
|
|
if (mParentStatus >= Terminating) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
nsRefPtr<SuspendRunnable> runnable =
|
|
|
|
new SuspendRunnable(ParentAsWorkerPrivate());
|
|
|
|
return runnable->Dispatch(aCx);
|
|
|
|
}
|
|
|
|
|
|
|
|
template <class Derived>
|
|
|
|
bool
|
|
|
|
WorkerPrivateParent<Derived>::Resume(JSContext* aCx)
|
|
|
|
{
|
|
|
|
AssertIsOnParentThread();
|
|
|
|
NS_ASSERTION(mParentSuspended, "Not yet suspended!");
|
|
|
|
|
|
|
|
mParentSuspended = false;
|
|
|
|
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
|
|
|
if (mParentStatus >= Terminating) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Dispatch queued runnables before waking up the worker, otherwise the worker
|
|
|
|
// could post new messages before we run those that have been queued.
|
|
|
|
if (!mQueuedRunnables.IsEmpty()) {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
nsTArray<nsRefPtr<WorkerRunnable> > runnables;
|
|
|
|
mQueuedRunnables.SwapElements(runnables);
|
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
for (uint32_t index = 0; index < runnables.Length(); index++) {
|
2011-07-17 12:09:13 -07:00
|
|
|
nsRefPtr<WorkerRunnable>& runnable = runnables[index];
|
|
|
|
if (NS_FAILED(NS_DispatchToCurrentThread(runnable))) {
|
|
|
|
NS_WARNING("Failed to dispatch queued runnable!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
nsRefPtr<ResumeRunnable> runnable =
|
|
|
|
new ResumeRunnable(ParentAsWorkerPrivate());
|
|
|
|
if (!runnable->Dispatch(aCx)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
template <class Derived>
|
|
|
|
void
|
2012-04-26 13:57:33 -07:00
|
|
|
WorkerPrivateParent<Derived>::_trace(JSTracer* aTrc)
|
2012-03-30 21:42:20 -07:00
|
|
|
{
|
|
|
|
// This should only happen on the parent thread but we can't assert that
|
|
|
|
// because it can also happen on the cycle collector thread when this is a
|
|
|
|
// top-level worker.
|
2012-04-26 13:57:33 -07:00
|
|
|
EventTarget::_trace(aTrc);
|
2012-03-30 21:42:20 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
template <class Derived>
|
|
|
|
void
|
2012-04-26 13:57:33 -07:00
|
|
|
WorkerPrivateParent<Derived>::_finalize(JSFreeOp* aFop)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
AssertIsOnParentThread();
|
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
MOZ_ASSERT(mJSObject);
|
|
|
|
MOZ_ASSERT(!mJSObjectRooted);
|
2011-10-06 16:09:43 -07:00
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
// Clear the JS object.
|
2012-07-30 07:20:58 -07:00
|
|
|
mJSObject = nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-07-30 07:20:58 -07:00
|
|
|
if (!TerminatePrivate(nullptr)) {
|
2012-03-30 21:42:20 -07:00
|
|
|
NS_WARNING("Failed to terminate!");
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
// Before calling through to the base class we need to grab another reference
|
|
|
|
// if we're on the main thread. Otherwise the base class' _Finalize method
|
|
|
|
// will call Release, and some of our members cannot be released during
|
|
|
|
// finalization. Of course, if those members are already gone then we can skip
|
|
|
|
// this mess...
|
|
|
|
WorkerPrivateParent<Derived>* extraSelfRef = NULL;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
if (!mParent && !mMainThreadObjectsForgotten) {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
NS_ADDREF(extraSelfRef = this);
|
|
|
|
}
|
|
|
|
|
2012-04-26 13:57:33 -07:00
|
|
|
EventTarget::_finalize(aFop);
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
if (extraSelfRef) {
|
|
|
|
nsCOMPtr<nsIRunnable> runnable =
|
|
|
|
NS_NewNonOwningRunnableMethod(extraSelfRef,
|
|
|
|
&WorkerPrivateParent<Derived>::Release);
|
|
|
|
if (NS_FAILED(NS_DispatchToCurrentThread(runnable))) {
|
|
|
|
NS_WARNING("Failed to proxy release, this will leak!");
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template <class Derived>
|
|
|
|
bool
|
|
|
|
WorkerPrivateParent<Derived>::Close(JSContext* aCx)
|
|
|
|
{
|
|
|
|
AssertIsOnParentThread();
|
|
|
|
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
|
|
|
if (mParentStatus < Closing) {
|
|
|
|
mParentStatus = Closing;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
template <class Derived>
|
|
|
|
bool
|
|
|
|
WorkerPrivateParent<Derived>::ModifyBusyCount(JSContext* aCx, bool aIncrease)
|
|
|
|
{
|
|
|
|
AssertIsOnParentThread();
|
|
|
|
|
|
|
|
NS_ASSERTION(aIncrease || mBusyCount, "Mismatched busy count mods!");
|
|
|
|
|
|
|
|
if (aIncrease) {
|
2012-08-07 14:38:46 -07:00
|
|
|
if (mBusyCount++ == 0 && mJSObject) {
|
2011-07-17 12:09:13 -07:00
|
|
|
if (!RootJSObject(aCx, true)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-08-07 14:38:46 -07:00
|
|
|
if (--mBusyCount == 0 && mJSObject) {
|
2011-07-17 12:09:13 -07:00
|
|
|
if (!RootJSObject(aCx, false)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool shouldCancel;
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
shouldCancel = mParentStatus == Terminating;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (shouldCancel && !Cancel(aCx)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
template <class Derived>
|
|
|
|
bool
|
|
|
|
WorkerPrivateParent<Derived>::RootJSObject(JSContext* aCx, bool aRoot)
|
|
|
|
{
|
|
|
|
AssertIsOnParentThread();
|
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
if (aRoot != mJSObjectRooted) {
|
|
|
|
if (aRoot) {
|
2012-08-07 14:38:46 -07:00
|
|
|
NS_ASSERTION(mJSObject, "Nothing to root?");
|
2012-03-30 21:42:20 -07:00
|
|
|
if (!JS_AddNamedObjectRoot(aCx, &mJSObject, "Worker root")) {
|
|
|
|
NS_WARNING("JS_AddNamedObjectRoot failed!");
|
|
|
|
return false;
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
2012-03-19 07:34:58 -07:00
|
|
|
else {
|
|
|
|
JS_RemoveObjectRoot(aCx, &mJSObject);
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
2012-03-30 21:42:20 -07:00
|
|
|
|
|
|
|
mJSObjectRooted = aRoot;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
template <class Derived>
|
|
|
|
void
|
|
|
|
WorkerPrivateParent<Derived>::ForgetMainThreadObjects(
|
|
|
|
nsTArray<nsCOMPtr<nsISupports> >& aDoomed)
|
|
|
|
{
|
|
|
|
AssertIsOnParentThread();
|
2012-03-30 21:42:20 -07:00
|
|
|
MOZ_ASSERT(!mMainThreadObjectsForgotten);
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-05-04 00:22:18 -07:00
|
|
|
aDoomed.SetCapacity(7);
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
SwapToISupportsArray(mWindow, aDoomed);
|
|
|
|
SwapToISupportsArray(mScriptContext, aDoomed);
|
2012-05-04 00:22:18 -07:00
|
|
|
SwapToISupportsArray(mScriptNotify, aDoomed);
|
2011-07-17 12:09:13 -07:00
|
|
|
SwapToISupportsArray(mBaseURI, aDoomed);
|
|
|
|
SwapToISupportsArray(mScriptURI, aDoomed);
|
|
|
|
SwapToISupportsArray(mPrincipal, aDoomed);
|
2012-09-22 05:45:00 -07:00
|
|
|
SwapToISupportsArray(mCSP, aDoomed);
|
2012-03-30 21:42:20 -07:00
|
|
|
|
|
|
|
mMainThreadObjectsForgotten = true;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
template <class Derived>
|
|
|
|
bool
|
2012-10-03 15:19:22 -07:00
|
|
|
WorkerPrivateParent<Derived>::PostMessage(JSContext* aCx, jsval aMessage,
|
|
|
|
jsval aTransferable)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
AssertIsOnParentThread();
|
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
2012-12-14 08:16:11 -08:00
|
|
|
if (mParentStatus > Running) {
|
2012-03-30 21:42:20 -07:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
JSStructuredCloneCallbacks* callbacks;
|
|
|
|
if (GetParent()) {
|
2011-08-15 20:40:38 -07:00
|
|
|
if (IsChromeWorker()) {
|
|
|
|
callbacks = &gChromeWorkerStructuredCloneCallbacks;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
callbacks = &gWorkerStructuredCloneCallbacks;
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
if (IsChromeWorker()) {
|
|
|
|
callbacks = &gMainThreadChromeWorkerStructuredCloneCallbacks;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
callbacks = &gMainThreadWorkerStructuredCloneCallbacks;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-08-15 20:40:38 -07:00
|
|
|
nsTArray<nsCOMPtr<nsISupports> > clonedObjects;
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
JSAutoStructuredCloneBuffer buffer;
|
2012-10-03 15:19:22 -07:00
|
|
|
if (!buffer.write(aCx, aMessage, aTransferable, callbacks, &clonedObjects)) {
|
2011-07-17 12:09:13 -07:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsRefPtr<MessageEventRunnable> runnable =
|
|
|
|
new MessageEventRunnable(ParentAsWorkerPrivate(),
|
2011-08-15 20:40:38 -07:00
|
|
|
WorkerRunnable::WorkerThread, buffer,
|
|
|
|
clonedObjects);
|
2011-07-17 12:09:13 -07:00
|
|
|
return runnable->Dispatch(aCx);
|
|
|
|
}
|
|
|
|
|
|
|
|
template <class Derived>
|
2012-08-22 08:56:38 -07:00
|
|
|
uint64_t
|
2011-08-24 13:44:35 -07:00
|
|
|
WorkerPrivateParent<Derived>::GetInnerWindowId()
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
AssertIsOnMainThread();
|
2012-09-05 10:47:57 -07:00
|
|
|
NS_ASSERTION(!mWindow || mWindow->IsInnerWindow(), "Outer window?");
|
|
|
|
return mWindow ? mWindow->WindowID() : 0;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
template <class Derived>
|
|
|
|
void
|
|
|
|
WorkerPrivateParent<Derived>::UpdateJSContextOptions(JSContext* aCx,
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t aOptions)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
AssertIsOnParentThread();
|
|
|
|
|
|
|
|
mJSContextOptions = aOptions;
|
|
|
|
|
|
|
|
nsRefPtr<UpdateJSContextOptionsRunnable> runnable =
|
|
|
|
new UpdateJSContextOptionsRunnable(ParentAsWorkerPrivate(), aOptions);
|
|
|
|
if (!runnable->Dispatch(aCx)) {
|
|
|
|
NS_WARNING("Failed to update worker context options!");
|
|
|
|
JS_ClearPendingException(aCx);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-01-04 11:11:32 -08:00
|
|
|
template <class Derived>
|
|
|
|
void
|
2013-01-10 14:50:40 -08:00
|
|
|
WorkerPrivateParent<Derived>::UpdateJSWorkerMemoryParameter(JSContext* aCx,
|
|
|
|
JSGCParamKey aKey,
|
|
|
|
uint32_t aValue)
|
2012-01-04 11:11:32 -08:00
|
|
|
{
|
|
|
|
AssertIsOnParentThread();
|
2013-01-10 14:50:40 -08:00
|
|
|
switch(aKey) {
|
|
|
|
case JSGC_ALLOCATION_THRESHOLD:
|
|
|
|
mJSWorkerAllocationThreshold = aValue;
|
|
|
|
break;
|
|
|
|
case JSGC_MAX_BYTES:
|
|
|
|
mJSRuntimeHeapSize = aValue;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2012-01-04 11:11:32 -08:00
|
|
|
|
2013-01-10 14:50:40 -08:00
|
|
|
nsRefPtr<UpdateJSWorkerMemoryParameterRunnable> runnable =
|
|
|
|
new UpdateJSWorkerMemoryParameterRunnable(ParentAsWorkerPrivate(),
|
|
|
|
aKey,
|
|
|
|
aValue);
|
2012-01-04 11:11:32 -08:00
|
|
|
if (!runnable->Dispatch(aCx)) {
|
2013-01-10 14:50:40 -08:00
|
|
|
NS_WARNING("Failed to update memory parameter!");
|
2012-01-04 11:11:32 -08:00
|
|
|
JS_ClearPendingException(aCx);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
#ifdef JS_GC_ZEAL
|
|
|
|
template <class Derived>
|
|
|
|
void
|
2012-08-22 08:56:38 -07:00
|
|
|
WorkerPrivateParent<Derived>::UpdateGCZeal(JSContext* aCx, uint8_t aGCZeal)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
AssertIsOnParentThread();
|
|
|
|
|
|
|
|
mGCZeal = aGCZeal;
|
|
|
|
|
|
|
|
nsRefPtr<UpdateGCZealRunnable> runnable =
|
|
|
|
new UpdateGCZealRunnable(ParentAsWorkerPrivate(), aGCZeal);
|
|
|
|
if (!runnable->Dispatch(aCx)) {
|
|
|
|
NS_WARNING("Failed to update worker gczeal!");
|
|
|
|
JS_ClearPendingException(aCx);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2012-01-17 12:05:25 -08:00
|
|
|
template <class Derived>
|
|
|
|
void
|
|
|
|
WorkerPrivateParent<Derived>::GarbageCollect(JSContext* aCx, bool aShrinking)
|
|
|
|
{
|
|
|
|
nsRefPtr<GarbageCollectRunnable> runnable =
|
|
|
|
new GarbageCollectRunnable(ParentAsWorkerPrivate(), aShrinking, true);
|
|
|
|
if (!runnable->Dispatch(aCx)) {
|
|
|
|
NS_WARNING("Failed to update worker heap size!");
|
|
|
|
JS_ClearPendingException(aCx);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
template <class Derived>
|
2011-11-04 09:32:17 -07:00
|
|
|
void
|
2011-07-17 12:09:13 -07:00
|
|
|
WorkerPrivateParent<Derived>::SetBaseURI(nsIURI* aBaseURI)
|
|
|
|
{
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
mBaseURI = aBaseURI;
|
|
|
|
|
2011-11-04 09:32:17 -07:00
|
|
|
if (NS_FAILED(aBaseURI->GetSpec(mLocationInfo.mHref))) {
|
|
|
|
mLocationInfo.mHref.Truncate();
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2011-11-04 09:32:17 -07:00
|
|
|
if (NS_FAILED(aBaseURI->GetHost(mLocationInfo.mHostname))) {
|
|
|
|
mLocationInfo.mHostname.Truncate();
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2011-11-04 09:32:17 -07:00
|
|
|
if (NS_FAILED(aBaseURI->GetPath(mLocationInfo.mPathname))) {
|
|
|
|
mLocationInfo.mPathname.Truncate();
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
nsCString temp;
|
|
|
|
|
2011-11-04 09:32:17 -07:00
|
|
|
nsCOMPtr<nsIURL> url(do_QueryInterface(aBaseURI));
|
|
|
|
if (url && NS_SUCCEEDED(url->GetQuery(temp)) && !temp.IsEmpty()) {
|
2011-07-17 12:09:13 -07:00
|
|
|
mLocationInfo.mSearch.AssignLiteral("?");
|
|
|
|
mLocationInfo.mSearch.Append(temp);
|
|
|
|
}
|
|
|
|
|
2011-11-04 09:32:17 -07:00
|
|
|
if (NS_SUCCEEDED(aBaseURI->GetRef(temp)) && !temp.IsEmpty()) {
|
2011-07-17 12:09:13 -07:00
|
|
|
nsCOMPtr<nsITextToSubURI> converter =
|
2011-11-04 09:32:17 -07:00
|
|
|
do_GetService(NS_ITEXTTOSUBURI_CONTRACTID);
|
|
|
|
if (converter) {
|
2011-07-17 12:09:13 -07:00
|
|
|
nsCString charset;
|
2011-11-04 09:32:17 -07:00
|
|
|
nsAutoString unicodeRef;
|
|
|
|
if (NS_SUCCEEDED(aBaseURI->GetOriginCharset(charset)) &&
|
|
|
|
NS_SUCCEEDED(converter->UnEscapeURIForUI(charset, temp,
|
|
|
|
unicodeRef))) {
|
|
|
|
mLocationInfo.mHash.AssignLiteral("#");
|
|
|
|
mLocationInfo.mHash.Append(NS_ConvertUTF16toUTF8(unicodeRef));
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-11-04 09:32:17 -07:00
|
|
|
if (mLocationInfo.mHash.IsEmpty()) {
|
2011-07-17 12:09:13 -07:00
|
|
|
mLocationInfo.mHash.AssignLiteral("#");
|
|
|
|
mLocationInfo.mHash.Append(temp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-11-04 09:32:17 -07:00
|
|
|
if (NS_SUCCEEDED(aBaseURI->GetScheme(mLocationInfo.mProtocol))) {
|
|
|
|
mLocationInfo.mProtocol.AppendLiteral(":");
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
mLocationInfo.mProtocol.Truncate();
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
int32_t port;
|
2011-11-04 09:32:17 -07:00
|
|
|
if (NS_SUCCEEDED(aBaseURI->GetPort(&port)) && port != -1) {
|
2011-07-17 12:09:13 -07:00
|
|
|
mLocationInfo.mPort.AppendInt(port);
|
|
|
|
|
2012-09-01 19:35:17 -07:00
|
|
|
nsAutoCString host(mLocationInfo.mHostname);
|
2011-07-17 12:09:13 -07:00
|
|
|
host.AppendLiteral(":");
|
|
|
|
host.Append(mLocationInfo.mPort);
|
|
|
|
|
|
|
|
mLocationInfo.mHost.Assign(host);
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
mLocationInfo.mHost.Assign(mLocationInfo.mHostname);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-08-15 20:40:38 -07:00
|
|
|
template <class Derived>
|
|
|
|
void
|
|
|
|
WorkerPrivateParent<Derived>::SetPrincipal(nsIPrincipal* aPrincipal)
|
|
|
|
{
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
mPrincipal = aPrincipal;
|
|
|
|
mPrincipalIsSystem = nsContentUtils::IsSystemPrincipal(aPrincipal);
|
|
|
|
}
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
template <class Derived>
|
|
|
|
JSContext*
|
|
|
|
WorkerPrivateParent<Derived>::ParentJSContext() const
|
|
|
|
{
|
|
|
|
AssertIsOnParentThread();
|
|
|
|
|
|
|
|
if (!mParent) {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
if (!mScriptContext) {
|
|
|
|
NS_ASSERTION(!mParentJSContext, "Shouldn't have a parent context!");
|
|
|
|
return RuntimeService::AutoSafeJSContext::GetSafeContext();
|
|
|
|
}
|
|
|
|
|
2011-09-18 02:22:17 -07:00
|
|
|
NS_ASSERTION(mParentJSContext == mScriptContext->GetNativeContext(),
|
2011-07-17 12:09:13 -07:00
|
|
|
"Native context has changed!");
|
|
|
|
}
|
|
|
|
|
|
|
|
return mParentJSContext;
|
|
|
|
}
|
|
|
|
|
|
|
|
WorkerPrivate::WorkerPrivate(JSContext* aCx, JSObject* aObject,
|
|
|
|
WorkerPrivate* aParent,
|
|
|
|
JSContext* aParentJSContext,
|
|
|
|
const nsAString& aScriptURL, bool aIsChromeWorker,
|
|
|
|
const nsACString& aDomain,
|
|
|
|
nsCOMPtr<nsPIDOMWindow>& aWindow,
|
|
|
|
nsCOMPtr<nsIScriptContext>& aParentScriptContext,
|
|
|
|
nsCOMPtr<nsIURI>& aBaseURI,
|
2012-09-15 11:51:55 -07:00
|
|
|
nsCOMPtr<nsIPrincipal>& aPrincipal,
|
|
|
|
nsCOMPtr<nsIContentSecurityPolicy>& aCSP,
|
2012-09-16 17:20:16 -07:00
|
|
|
bool aEvalAllowed,
|
|
|
|
bool aXHRParamsAllowed)
|
2011-07-17 12:09:13 -07:00
|
|
|
: WorkerPrivateParent<WorkerPrivate>(aCx, aObject, aParent, aParentJSContext,
|
|
|
|
aScriptURL, aIsChromeWorker, aDomain,
|
|
|
|
aWindow, aParentScriptContext, aBaseURI,
|
2012-09-15 11:51:55 -07:00
|
|
|
aPrincipal, aCSP, aEvalAllowed),
|
2012-07-30 07:20:58 -07:00
|
|
|
mJSContext(nullptr), mErrorHandlerRecursionCount(0), mNextTimeoutId(1),
|
2011-07-17 12:09:13 -07:00
|
|
|
mStatus(Pending), mSuspended(false), mTimerRunning(false),
|
|
|
|
mRunningExpiredTimeouts(false), mCloseHandlerStarted(false),
|
2013-02-08 03:50:00 -08:00
|
|
|
mCloseHandlerFinished(false), mMemoryReporterRunning(false),
|
|
|
|
mBlockedForMemoryReporter(false), mXHRParamsAllowed(aXHRParamsAllowed)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
MOZ_COUNT_CTOR(mozilla::dom::workers::WorkerPrivate);
|
|
|
|
}
|
|
|
|
|
|
|
|
WorkerPrivate::~WorkerPrivate()
|
|
|
|
{
|
|
|
|
MOZ_COUNT_DTOR(mozilla::dom::workers::WorkerPrivate);
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
2012-03-30 21:42:20 -07:00
|
|
|
already_AddRefed<WorkerPrivate>
|
2011-07-17 12:09:13 -07:00
|
|
|
WorkerPrivate::Create(JSContext* aCx, JSObject* aObj, WorkerPrivate* aParent,
|
|
|
|
JSString* aScriptURL, bool aIsChromeWorker)
|
|
|
|
{
|
|
|
|
nsCString domain;
|
|
|
|
nsCOMPtr<nsIURI> baseURI;
|
|
|
|
nsCOMPtr<nsIPrincipal> principal;
|
|
|
|
nsCOMPtr<nsIScriptContext> scriptContext;
|
|
|
|
nsCOMPtr<nsIDocument> document;
|
|
|
|
nsCOMPtr<nsPIDOMWindow> window;
|
2012-09-15 11:51:55 -07:00
|
|
|
nsCOMPtr<nsIContentSecurityPolicy> csp;
|
|
|
|
|
|
|
|
bool evalAllowed = true;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
JSContext* parentContext;
|
|
|
|
|
2012-09-16 17:20:16 -07:00
|
|
|
bool xhrParamsAllowed = false;
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
if (aParent) {
|
|
|
|
aParent->AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
parentContext = aCx;
|
|
|
|
|
|
|
|
// Domain is the only thing we can touch here. The rest will be handled by
|
|
|
|
// the ScriptLoader.
|
|
|
|
domain = aParent->Domain();
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
nsIScriptSecurityManager* ssm = nsContentUtils::GetSecurityManager();
|
|
|
|
NS_ASSERTION(ssm, "This should never be null!");
|
|
|
|
|
2012-10-21 23:29:55 -07:00
|
|
|
bool isChrome = nsContentUtils::IsCallerChrome();
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
// First check to make sure the caller has permission to make a
|
|
|
|
// ChromeWorker if they called the ChromeWorker constructor.
|
|
|
|
if (aIsChromeWorker && !isChrome) {
|
2012-06-19 16:01:10 -07:00
|
|
|
xpc::Throw(aCx, NS_ERROR_DOM_SECURITY_ERR);
|
2012-07-30 07:20:58 -07:00
|
|
|
return nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// Chrome callers (whether ChromeWorker of Worker) always get the system
|
|
|
|
// principal here as they're allowed to load anything. The script loader may
|
|
|
|
// change the principal later depending on the script uri.
|
|
|
|
if (isChrome &&
|
|
|
|
NS_FAILED(ssm->GetSystemPrincipal(getter_AddRefs(principal)))) {
|
|
|
|
JS_ReportError(aCx, "Could not get system principal!");
|
2012-07-30 07:20:58 -07:00
|
|
|
return nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// See if we're being called from a window or from somewhere else.
|
|
|
|
nsCOMPtr<nsIScriptGlobalObject> scriptGlobal =
|
2012-11-09 07:43:57 -08:00
|
|
|
nsJSUtils::GetStaticScriptGlobal(JS_GetGlobalForScopeChain(aCx));
|
2011-07-17 12:09:13 -07:00
|
|
|
if (scriptGlobal) {
|
|
|
|
// Window!
|
|
|
|
nsCOMPtr<nsPIDOMWindow> globalWindow = do_QueryInterface(scriptGlobal);
|
|
|
|
|
|
|
|
// Only use the current inner window, and only use it if the caller can
|
|
|
|
// access it.
|
|
|
|
nsPIDOMWindow* outerWindow = globalWindow ?
|
|
|
|
globalWindow->GetOuterWindow() :
|
2012-07-30 07:20:58 -07:00
|
|
|
nullptr;
|
|
|
|
window = outerWindow ? outerWindow->GetCurrentInnerWindow() : nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
if (!window ||
|
|
|
|
(globalWindow != window &&
|
|
|
|
!nsContentUtils::CanCallerAccess(window))) {
|
2012-06-19 16:01:10 -07:00
|
|
|
xpc::Throw(aCx, NS_ERROR_DOM_SECURITY_ERR);
|
2012-07-30 07:20:58 -07:00
|
|
|
return nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
scriptContext = scriptGlobal->GetContext();
|
|
|
|
if (!scriptContext) {
|
|
|
|
JS_ReportError(aCx, "Couldn't get script context for this worker!");
|
2012-07-30 07:20:58 -07:00
|
|
|
return nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
2011-09-18 02:22:17 -07:00
|
|
|
parentContext = scriptContext->GetNativeContext();
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
// If we're called from a window then we can dig out the principal and URI
|
|
|
|
// from the document.
|
|
|
|
document = do_QueryInterface(window->GetExtantDocument());
|
|
|
|
if (!document) {
|
|
|
|
JS_ReportError(aCx, "No document in this window!");
|
2012-07-30 07:20:58 -07:00
|
|
|
return nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
baseURI = document->GetDocBaseURI();
|
|
|
|
|
|
|
|
// Use the document's NodePrincipal as our principal if we're not being
|
|
|
|
// called from chrome.
|
|
|
|
if (!principal) {
|
|
|
|
if (!(principal = document->NodePrincipal())) {
|
|
|
|
JS_ReportError(aCx, "Could not get document principal!");
|
2012-07-30 07:20:58 -07:00
|
|
|
return nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
2013-01-08 13:53:32 -08:00
|
|
|
// We use the document's base domain to limit the number of workers
|
|
|
|
// each domain can create. For sandboxed documents, we use the domain
|
|
|
|
// of their first non-sandboxed document, walking up until we find
|
|
|
|
// one. If we can't find one, we fall back to using the GUID of the
|
|
|
|
// null principal as the base domain.
|
|
|
|
if (document->GetSandboxFlags() & SANDBOXED_ORIGIN) {
|
|
|
|
nsCOMPtr<nsIDocument> tmpDoc = document;
|
|
|
|
do {
|
|
|
|
tmpDoc = tmpDoc->GetParentDocument();
|
|
|
|
} while (tmpDoc && tmpDoc->GetSandboxFlags() & SANDBOXED_ORIGIN);
|
|
|
|
|
|
|
|
if (tmpDoc) {
|
|
|
|
// There was an unsandboxed ancestor, yay!
|
|
|
|
nsCOMPtr<nsIPrincipal> tmpPrincipal = tmpDoc->NodePrincipal();
|
|
|
|
|
|
|
|
if (NS_FAILED(tmpPrincipal->GetBaseDomain(domain))) {
|
|
|
|
JS_ReportError(aCx, "Could not determine base domain!");
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// No unsandboxed ancestor, use our GUID.
|
|
|
|
if (NS_FAILED(principal->GetBaseDomain(domain))) {
|
|
|
|
JS_ReportError(aCx, "Could not determine base domain!");
|
|
|
|
return nullptr;
|
|
|
|
}
|
2012-08-20 11:34:32 -07:00
|
|
|
}
|
|
|
|
} else {
|
2013-01-08 13:53:32 -08:00
|
|
|
// Document creating the worker is not sandboxed.
|
|
|
|
if (NS_FAILED(principal->GetBaseDomain(domain))) {
|
|
|
|
JS_ReportError(aCx, "Could not determine base domain!");
|
2012-07-30 07:20:58 -07:00
|
|
|
return nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-09-16 17:20:16 -07:00
|
|
|
|
|
|
|
xhrParamsAllowed = CheckXHRParamsAllowed(window);
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
// Not a window
|
|
|
|
NS_ASSERTION(isChrome, "Should be chrome only!");
|
|
|
|
|
2012-07-30 07:20:58 -07:00
|
|
|
parentContext = nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
// We're being created outside of a window. Need to figure out the script
|
|
|
|
// that is creating us in order for us to use relative URIs later on.
|
2012-03-06 15:33:12 -08:00
|
|
|
JSScript *script;
|
2012-07-30 07:20:58 -07:00
|
|
|
if (JS_DescribeScriptedCaller(aCx, &script, nullptr)) {
|
2011-07-17 12:09:13 -07:00
|
|
|
if (NS_FAILED(NS_NewURI(getter_AddRefs(baseURI),
|
|
|
|
JS_GetScriptFilename(aCx, script)))) {
|
|
|
|
JS_ReportError(aCx, "Failed to construct base URI!");
|
2012-07-30 07:20:58 -07:00
|
|
|
return nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
}
|
2012-09-16 17:20:16 -07:00
|
|
|
|
|
|
|
xhrParamsAllowed = true;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
NS_ASSERTION(principal, "Must have a principal now!");
|
|
|
|
|
|
|
|
if (!isChrome && domain.IsEmpty()) {
|
|
|
|
NS_ERROR("Must be chrome or have an domain!");
|
2012-07-30 07:20:58 -07:00
|
|
|
return nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
2012-09-15 11:51:55 -07:00
|
|
|
|
|
|
|
if (!GetContentSecurityPolicy(aCx, getter_AddRefs(csp))) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (csp && NS_FAILED(csp->GetAllowsEval(&evalAllowed))) {
|
|
|
|
NS_ERROR("CSP: failed to get allowsEval");
|
|
|
|
return nullptr;
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
size_t urlLength;
|
|
|
|
const jschar* urlChars = JS_GetStringCharsZAndLength(aCx, aScriptURL,
|
|
|
|
&urlLength);
|
|
|
|
if (!urlChars) {
|
2012-07-30 07:20:58 -07:00
|
|
|
return nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
nsDependentString scriptURL(urlChars, urlLength);
|
|
|
|
|
2012-03-30 21:42:20 -07:00
|
|
|
nsRefPtr<WorkerPrivate> worker =
|
2011-07-17 12:09:13 -07:00
|
|
|
new WorkerPrivate(aCx, aObj, aParent, parentContext, scriptURL,
|
|
|
|
aIsChromeWorker, domain, window, scriptContext, baseURI,
|
2012-09-16 17:20:16 -07:00
|
|
|
principal, csp, evalAllowed, xhrParamsAllowed);
|
2012-03-30 21:42:20 -07:00
|
|
|
|
|
|
|
worker->SetIsDOMBinding();
|
|
|
|
worker->SetWrapper(aObj);
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
nsRefPtr<CompileScriptRunnable> compiler = new CompileScriptRunnable(worker);
|
|
|
|
if (!compiler->Dispatch(aCx)) {
|
2012-07-30 07:20:58 -07:00
|
|
|
return nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
return worker.forget();
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
WorkerPrivate::DoRunLoop(JSContext* aCx)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
mJSContext = aCx;
|
|
|
|
|
|
|
|
NS_ASSERTION(mStatus == Pending, "Huh?!");
|
|
|
|
mStatus = Running;
|
|
|
|
}
|
|
|
|
|
2012-01-17 12:05:25 -08:00
|
|
|
// We need a timer for GC. The basic plan is to run a normal (non-shrinking)
|
|
|
|
// GC periodically (NORMAL_GC_TIMER_DELAY_MS) while the worker is running.
|
|
|
|
// Once the worker goes idle we set a short (IDLE_GC_TIMER_DELAY_MS) timer to
|
|
|
|
// run a shrinking GC. If the worker receives more messages then the short
|
|
|
|
// timer is canceled and the periodic timer resumes.
|
|
|
|
nsCOMPtr<nsITimer> gcTimer = do_CreateInstance(NS_TIMER_CONTRACTID);
|
|
|
|
if (!gcTimer) {
|
|
|
|
JS_ReportError(aCx, "Failed to create GC timer!");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool normalGCTimerRunning = false;
|
|
|
|
|
|
|
|
// We need to swap event targets below to get different types of GC behavior.
|
|
|
|
nsCOMPtr<nsIEventTarget> normalGCEventTarget;
|
|
|
|
nsCOMPtr<nsIEventTarget> idleGCEventTarget;
|
|
|
|
|
|
|
|
// We also need to track the idle GC event so that we don't confuse it with a
|
|
|
|
// generic event that should re-trigger the idle GC timer.
|
|
|
|
nsCOMPtr<nsIRunnable> idleGCEvent;
|
|
|
|
{
|
|
|
|
nsRefPtr<GarbageCollectRunnable> runnable =
|
|
|
|
new GarbageCollectRunnable(this, false, false);
|
|
|
|
normalGCEventTarget = new WorkerRunnableEventTarget(runnable);
|
|
|
|
|
|
|
|
runnable = new GarbageCollectRunnable(this, true, false);
|
|
|
|
idleGCEventTarget = new WorkerRunnableEventTarget(runnable);
|
|
|
|
|
|
|
|
idleGCEvent = runnable;
|
|
|
|
}
|
|
|
|
|
2012-12-30 10:21:52 -08:00
|
|
|
EnableMemoryReporter();
|
2011-09-08 17:03:03 -07:00
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
for (;;) {
|
|
|
|
Status currentStatus;
|
2012-01-17 12:05:25 -08:00
|
|
|
bool scheduleIdleGC;
|
|
|
|
|
2012-02-09 20:54:47 -08:00
|
|
|
WorkerRunnable* event;
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
|
|
|
while (!mControlQueue.Pop(event) && !mQueue.Pop(event)) {
|
2012-12-30 10:21:52 -08:00
|
|
|
WaitForWorkerEvents();
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
2012-01-17 12:05:25 -08:00
|
|
|
bool eventIsNotIdleGCEvent;
|
|
|
|
currentStatus = mStatus;
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
MutexAutoUnlock unlock(mMutex);
|
|
|
|
|
2012-01-17 12:05:25 -08:00
|
|
|
if (!normalGCTimerRunning &&
|
|
|
|
event != idleGCEvent &&
|
|
|
|
currentStatus <= Terminating) {
|
|
|
|
// Must always cancel before changing the timer's target.
|
|
|
|
if (NS_FAILED(gcTimer->Cancel())) {
|
|
|
|
NS_WARNING("Failed to cancel GC timer!");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (NS_SUCCEEDED(gcTimer->SetTarget(normalGCEventTarget)) &&
|
|
|
|
NS_SUCCEEDED(gcTimer->InitWithFuncCallback(
|
2012-07-30 07:20:58 -07:00
|
|
|
DummyCallback, nullptr,
|
2012-01-17 12:05:25 -08:00
|
|
|
NORMAL_GC_TIMER_DELAY_MS,
|
|
|
|
nsITimer::TYPE_REPEATING_SLACK))) {
|
|
|
|
normalGCTimerRunning = true;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
JS_ReportError(aCx, "Failed to start normal GC timer!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
#ifdef EXTRA_GC
|
|
|
|
// Find GC bugs...
|
|
|
|
JS_GC(aCx);
|
|
|
|
#endif
|
|
|
|
|
2012-01-17 12:05:25 -08:00
|
|
|
// Keep track of whether or not this is the idle GC event.
|
|
|
|
eventIsNotIdleGCEvent = event != idleGCEvent;
|
|
|
|
|
2012-02-09 20:54:47 -08:00
|
|
|
static_cast<nsIRunnable*>(event)->Run();
|
2011-07-17 12:09:13 -07:00
|
|
|
NS_RELEASE(event);
|
|
|
|
}
|
|
|
|
|
|
|
|
currentStatus = mStatus;
|
2012-01-17 12:05:25 -08:00
|
|
|
scheduleIdleGC = mControlQueue.IsEmpty() &&
|
|
|
|
mQueue.IsEmpty() &&
|
|
|
|
eventIsNotIdleGCEvent;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Take care of the GC timer. If we're starting the close sequence then we
|
|
|
|
// kill the timer once and for all. Otherwise we schedule the idle timeout
|
|
|
|
// if there are no more events.
|
|
|
|
if (currentStatus > Terminating || scheduleIdleGC) {
|
|
|
|
if (NS_SUCCEEDED(gcTimer->Cancel())) {
|
|
|
|
normalGCTimerRunning = false;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
NS_WARNING("Failed to cancel GC timer!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (scheduleIdleGC) {
|
|
|
|
if (NS_SUCCEEDED(gcTimer->SetTarget(idleGCEventTarget)) &&
|
|
|
|
NS_SUCCEEDED(gcTimer->InitWithFuncCallback(
|
2012-07-30 07:20:58 -07:00
|
|
|
DummyCallback, nullptr,
|
2012-01-17 12:05:25 -08:00
|
|
|
IDLE_GC_TIMER_DELAY_MS,
|
|
|
|
nsITimer::TYPE_ONE_SHOT))) {
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
JS_ReportError(aCx, "Failed to start idle GC timer!");
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef EXTRA_GC
|
|
|
|
// Find GC bugs...
|
|
|
|
JS_GC(aCx);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (currentStatus != Running && !HasActiveFeatures()) {
|
|
|
|
// If the close handler has finished and all features are done then we can
|
|
|
|
// kill this thread.
|
|
|
|
if (mCloseHandlerFinished && currentStatus != Killing) {
|
|
|
|
if (!NotifyInternal(aCx, Killing)) {
|
|
|
|
JS_ReportPendingException(aCx);
|
|
|
|
}
|
|
|
|
#ifdef DEBUG
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
currentStatus = mStatus;
|
|
|
|
}
|
|
|
|
NS_ASSERTION(currentStatus == Killing, "Should have changed status!");
|
|
|
|
#else
|
|
|
|
currentStatus = Killing;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we're supposed to die then we should exit the loop.
|
|
|
|
if (currentStatus == Killing) {
|
2012-01-17 12:05:25 -08:00
|
|
|
// Always make sure the timer is canceled.
|
|
|
|
if (NS_FAILED(gcTimer->Cancel())) {
|
|
|
|
NS_WARNING("Failed to cancel the GC timer!");
|
|
|
|
}
|
|
|
|
|
2011-09-08 17:03:03 -07:00
|
|
|
DisableMemoryReporter();
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
StopAcceptingEvents();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_NOTREACHED("Shouldn't get here!");
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerPrivate::OperationCallback(JSContext* aCx)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
bool mayContinue = true;
|
|
|
|
|
|
|
|
for (;;) {
|
|
|
|
// Run all control events now.
|
2011-09-08 17:03:03 -07:00
|
|
|
mayContinue = ProcessAllControlRunnables();
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
if (!mayContinue || !mSuspended) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Clean up before suspending.
|
2012-03-28 03:13:30 -07:00
|
|
|
JS_GC(JS_GetRuntime(aCx));
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
while ((mayContinue = MayContinueRunning())) {
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
if (!mControlQueue.IsEmpty()) {
|
|
|
|
break;
|
|
|
|
}
|
2011-08-01 21:06:17 -07:00
|
|
|
|
2012-12-30 10:21:52 -08:00
|
|
|
WaitForWorkerEvents(PR_MillisecondsToInterval(RemainingRunTimeMS()));
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!mayContinue) {
|
|
|
|
// We want only uncatchable exceptions here.
|
|
|
|
NS_ASSERTION(!JS_IsExceptionPending(aCx),
|
|
|
|
"Should not have an exception set here!");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
WorkerPrivate::ScheduleDeletion(bool aWasPending)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
NS_ASSERTION(mChildWorkers.IsEmpty(), "Live child workers!");
|
|
|
|
NS_ASSERTION(mSyncQueues.IsEmpty(), "Should have no sync queues here!");
|
|
|
|
|
|
|
|
StopAcceptingEvents();
|
|
|
|
|
|
|
|
nsIThread* currentThread;
|
|
|
|
if (aWasPending) {
|
|
|
|
// Don't want to close down this thread since we never got to run!
|
2012-07-30 07:20:58 -07:00
|
|
|
currentThread = nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
else {
|
|
|
|
currentThread = NS_GetCurrentThread();
|
|
|
|
NS_ASSERTION(currentThread, "This should never be null!");
|
|
|
|
}
|
|
|
|
|
|
|
|
WorkerPrivate* parent = GetParent();
|
|
|
|
if (parent) {
|
|
|
|
nsRefPtr<WorkerFinishedRunnable> runnable =
|
|
|
|
new WorkerFinishedRunnable(parent, this, currentThread);
|
2012-07-30 07:20:58 -07:00
|
|
|
if (!runnable->Dispatch(nullptr)) {
|
2011-07-17 12:09:13 -07:00
|
|
|
NS_WARNING("Failed to dispatch runnable!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
nsRefPtr<TopLevelWorkerFinishedRunnable> runnable =
|
|
|
|
new TopLevelWorkerFinishedRunnable(this, currentThread);
|
|
|
|
if (NS_FAILED(NS_DispatchToMainThread(runnable, NS_DISPATCH_NORMAL))) {
|
|
|
|
NS_WARNING("Failed to dispatch runnable!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-08-06 18:03:46 -07:00
|
|
|
bool
|
2012-05-29 19:39:38 -07:00
|
|
|
WorkerPrivate::BlockAndCollectRuntimeStats(bool aIsQuick, void* aData)
|
2011-08-06 18:03:46 -07:00
|
|
|
{
|
|
|
|
AssertIsOnMainThread();
|
2013-02-08 03:50:00 -08:00
|
|
|
mMutex.AssertCurrentThreadOwns();
|
2011-08-06 18:03:46 -07:00
|
|
|
NS_ASSERTION(aData, "Null data!");
|
|
|
|
|
2013-02-08 03:50:00 -08:00
|
|
|
NS_ASSERTION(!mMemoryReporterRunning, "How can we get reentered here?!");
|
2012-12-30 10:21:52 -08:00
|
|
|
|
2013-02-08 03:50:00 -08:00
|
|
|
// This signals the worker that it should block itself as soon as possible.
|
|
|
|
mMemoryReporterRunning = true;
|
2012-12-30 10:21:52 -08:00
|
|
|
|
2013-02-08 03:50:00 -08:00
|
|
|
NS_ASSERTION(mJSContext, "This must never be null!");
|
|
|
|
JSRuntime* rt = JS_GetRuntime(mJSContext);
|
2012-12-30 10:21:52 -08:00
|
|
|
|
2013-02-08 03:50:00 -08:00
|
|
|
// If the worker is not already blocked (e.g. waiting for a worker event or
|
|
|
|
// currently in a ctypes call) then we need to trigger the operation
|
|
|
|
// callback to trap the worker.
|
|
|
|
if (!mBlockedForMemoryReporter) {
|
|
|
|
JS_TriggerOperationCallback(rt);
|
2012-12-30 10:21:52 -08:00
|
|
|
|
2013-02-08 03:50:00 -08:00
|
|
|
// Wait until the worker actually blocks.
|
|
|
|
while (!mBlockedForMemoryReporter) {
|
|
|
|
mMemoryReportCondVar.Wait();
|
2012-12-30 10:21:52 -08:00
|
|
|
}
|
2011-09-08 17:03:03 -07:00
|
|
|
}
|
|
|
|
|
2013-02-08 03:50:00 -08:00
|
|
|
bool succeeded = false;
|
2011-08-06 18:03:46 -07:00
|
|
|
|
2013-02-08 03:50:00 -08:00
|
|
|
// If mMemoryReporter is still set then we can do the actual report. Otherwise
|
|
|
|
// we're trying to shut down and we don't want to do anything but clean up.
|
|
|
|
if (mMemoryReporter) {
|
|
|
|
// Don't hold the lock while doing the actual report.
|
|
|
|
MutexAutoUnlock unlock(mMutex);
|
2011-08-06 18:03:46 -07:00
|
|
|
|
2013-02-08 03:50:00 -08:00
|
|
|
if (aIsQuick) {
|
|
|
|
*static_cast<int64_t*>(aData) =
|
|
|
|
JS::GetExplicitNonHeapForRuntime(rt, JsWorkerMallocSizeOf);
|
|
|
|
succeeded = true;
|
|
|
|
} else {
|
|
|
|
succeeded =
|
|
|
|
JS::CollectRuntimeStats(rt, static_cast<JS::RuntimeStats*>(aData),
|
|
|
|
nullptr);
|
|
|
|
}
|
|
|
|
}
|
2012-12-30 10:21:52 -08:00
|
|
|
|
|
|
|
NS_ASSERTION(mMemoryReporterRunning, "This isn't possible!");
|
|
|
|
NS_ASSERTION(mBlockedForMemoryReporter, "Somehow we got unblocked!");
|
|
|
|
|
|
|
|
// Tell the worker that it can now continue its execution.
|
|
|
|
mMemoryReporterRunning = false;
|
|
|
|
|
|
|
|
// The worker may be waiting so we must notify.
|
|
|
|
mMemoryReportCondVar.Notify();
|
2011-09-08 17:03:03 -07:00
|
|
|
|
2011-09-08 19:04:43 -07:00
|
|
|
return succeeded;
|
2011-09-08 17:03:03 -07:00
|
|
|
}
|
|
|
|
|
2012-12-30 10:21:52 -08:00
|
|
|
void
|
|
|
|
WorkerPrivate::EnableMemoryReporter()
|
2011-09-08 17:03:03 -07:00
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
2012-12-30 10:21:52 -08:00
|
|
|
// No need to lock here since the main thread can't race until we've
|
|
|
|
// successfully registered the reporter.
|
|
|
|
mMemoryReporter = new MemoryReporter(this);
|
2011-09-08 17:03:03 -07:00
|
|
|
|
2012-12-30 10:21:52 -08:00
|
|
|
if (NS_FAILED(NS_RegisterMemoryMultiReporter(mMemoryReporter))) {
|
|
|
|
NS_WARNING("Failed to register memory reporter!");
|
|
|
|
// No need to lock here since a failed registration means our memory
|
|
|
|
// reporter can't start running. Just clean up.
|
|
|
|
mMemoryReporter = nullptr;
|
|
|
|
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
WorkerPrivate::DisableMemoryReporter()
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
2013-02-08 03:50:00 -08:00
|
|
|
nsRefPtr<MemoryReporter> memoryReporter;
|
2011-09-08 17:03:03 -07:00
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
2013-02-08 03:50:00 -08:00
|
|
|
// There is nothing to do here if the memory reporter was never successfully
|
|
|
|
// registered.
|
|
|
|
if (!mMemoryReporter) {
|
|
|
|
return;
|
|
|
|
}
|
2012-05-29 19:39:38 -07:00
|
|
|
|
2013-02-08 03:50:00 -08:00
|
|
|
// We don't need this set any longer. Swap it out so that we can unregister
|
|
|
|
// below.
|
|
|
|
mMemoryReporter.swap(memoryReporter);
|
2011-09-08 17:03:03 -07:00
|
|
|
|
2013-02-08 03:50:00 -08:00
|
|
|
// Next disable the memory reporter so that the main thread stops trying to
|
|
|
|
// signal us.
|
|
|
|
memoryReporter->Disable();
|
2012-12-30 10:21:52 -08:00
|
|
|
|
2013-02-08 03:50:00 -08:00
|
|
|
// If the memory reporter is waiting to start then we need to wait for it to
|
|
|
|
// finish.
|
|
|
|
if (mMemoryReporterRunning) {
|
|
|
|
NS_ASSERTION(!mBlockedForMemoryReporter,
|
|
|
|
"Can't be blocked in more than one place at the same time!");
|
|
|
|
mBlockedForMemoryReporter = true;
|
2012-12-30 10:21:52 -08:00
|
|
|
|
2013-02-08 03:50:00 -08:00
|
|
|
// Tell the main thread that we're blocked.
|
|
|
|
mMemoryReportCondVar.Notify();
|
2012-12-30 10:21:52 -08:00
|
|
|
|
2013-02-08 03:50:00 -08:00
|
|
|
// Wait for it the main thread to finish. Since we swapped out
|
|
|
|
// mMemoryReporter above the main thread should respond quickly.
|
|
|
|
while (mMemoryReporterRunning) {
|
|
|
|
mMemoryReportCondVar.Wait();
|
|
|
|
}
|
2012-12-30 10:21:52 -08:00
|
|
|
|
2013-02-08 03:50:00 -08:00
|
|
|
NS_ASSERTION(mBlockedForMemoryReporter, "Somehow we got unblocked!");
|
|
|
|
mBlockedForMemoryReporter = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Finally unregister the memory reporter.
|
|
|
|
if (NS_FAILED(NS_UnregisterMemoryMultiReporter(memoryReporter))) {
|
|
|
|
NS_WARNING("Failed to unregister memory reporter!");
|
2012-12-30 10:21:52 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
WorkerPrivate::WaitForWorkerEvents(PRIntervalTime aInterval)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
mMutex.AssertCurrentThreadOwns();
|
|
|
|
|
|
|
|
NS_ASSERTION(!mBlockedForMemoryReporter,
|
|
|
|
"Can't be blocked in more than one place at the same time!");
|
|
|
|
|
|
|
|
// Let the main thread know that the worker is blocked and that memory
|
|
|
|
// reporting may proceed.
|
|
|
|
mBlockedForMemoryReporter = true;
|
|
|
|
|
|
|
|
// The main thread may be waiting so we must notify.
|
|
|
|
mMemoryReportCondVar.Notify();
|
|
|
|
|
|
|
|
// Now wait for an actual worker event.
|
|
|
|
mCondVar.Wait(aInterval);
|
|
|
|
|
|
|
|
// We've gotten some kind of signal but we can't continue until the memory
|
|
|
|
// reporter has finished. Wait again.
|
|
|
|
while (mMemoryReporterRunning) {
|
|
|
|
mMemoryReportCondVar.Wait();
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_ASSERTION(mBlockedForMemoryReporter, "Somehow we got unblocked!");
|
|
|
|
|
|
|
|
// No need to notify here as the main thread isn't watching for this state.
|
|
|
|
mBlockedForMemoryReporter = false;
|
2011-09-08 17:03:03 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerPrivate::ProcessAllControlRunnables()
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
bool result = true;
|
|
|
|
|
|
|
|
for (;;) {
|
2012-02-09 20:54:47 -08:00
|
|
|
WorkerRunnable* event;
|
2011-09-08 17:03:03 -07:00
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
2012-12-30 10:21:52 -08:00
|
|
|
|
|
|
|
// Block here if the memory reporter is trying to run.
|
|
|
|
if (mMemoryReporterRunning) {
|
|
|
|
NS_ASSERTION(!mBlockedForMemoryReporter,
|
|
|
|
"Can't be blocked in more than one place at the same "
|
|
|
|
"time!");
|
|
|
|
|
|
|
|
// Let the main thread know that we've received the block request and
|
|
|
|
// that memory reporting may proceed.
|
|
|
|
mBlockedForMemoryReporter = true;
|
|
|
|
|
|
|
|
// The main thread is almost certainly waiting so we must notify here.
|
|
|
|
mMemoryReportCondVar.Notify();
|
|
|
|
|
|
|
|
// Wait for the memory report to finish.
|
|
|
|
while (mMemoryReporterRunning) {
|
|
|
|
mMemoryReportCondVar.Wait();
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_ASSERTION(mBlockedForMemoryReporter, "Somehow we got unblocked!");
|
|
|
|
|
|
|
|
// No need to notify here as the main thread isn't watching for this
|
|
|
|
// state.
|
|
|
|
mBlockedForMemoryReporter = false;
|
|
|
|
}
|
|
|
|
|
2011-09-08 17:03:03 -07:00
|
|
|
if (!mControlQueue.Pop(event)) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-02-09 20:54:47 -08:00
|
|
|
if (NS_FAILED(static_cast<nsIRunnable*>(event)->Run())) {
|
2011-09-08 17:03:03 -07:00
|
|
|
result = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_RELEASE(event);
|
|
|
|
}
|
2012-12-30 10:21:52 -08:00
|
|
|
|
2011-09-08 17:03:03 -07:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
2012-09-16 17:20:16 -07:00
|
|
|
bool
|
|
|
|
WorkerPrivate::CheckXHRParamsAllowed(nsPIDOMWindow* aWindow)
|
|
|
|
{
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
NS_ASSERTION(aWindow, "Wrong cannot be null");
|
|
|
|
|
|
|
|
if (!aWindow->GetDocShell()) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIDocument> doc = do_QueryInterface(aWindow->GetExtantDocument());
|
|
|
|
if (!doc) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIPermissionManager> permMgr = do_GetService(NS_PERMISSIONMANAGER_CONTRACTID);
|
|
|
|
if (!permMgr) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t permission;
|
|
|
|
nsresult rv = permMgr->TestPermissionFromPrincipal(doc->NodePrincipal(),
|
|
|
|
"systemXHR", &permission);
|
|
|
|
if (NS_FAILED(rv) || permission != nsIPermissionManager::ALLOW_ACTION) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
bool
|
|
|
|
WorkerPrivate::Dispatch(WorkerRunnable* aEvent, EventQueue* aQueue)
|
|
|
|
{
|
|
|
|
nsRefPtr<WorkerRunnable> event(aEvent);
|
|
|
|
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
|
|
|
if (mStatus == Dead) {
|
|
|
|
// Nothing may be added after we've set Dead.
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (aQueue == &mQueue) {
|
|
|
|
// Check parent status.
|
|
|
|
Status parentStatus = ParentStatus();
|
|
|
|
if (parentStatus >= Terminating) {
|
|
|
|
// Throw.
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check inner status too.
|
|
|
|
if (parentStatus >= Closing || mStatus >= Closing) {
|
|
|
|
// Silently eat this one.
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!aQueue->Push(event)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (aQueue == &mControlQueue && mJSContext) {
|
2012-02-24 03:03:28 -08:00
|
|
|
JS_TriggerOperationCallback(JS_GetRuntime(mJSContext));
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
mCondVar.Notify();
|
|
|
|
}
|
|
|
|
|
|
|
|
event.forget();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerPrivate::DispatchToSyncQueue(WorkerSyncRunnable* aEvent)
|
|
|
|
{
|
|
|
|
nsRefPtr<WorkerRunnable> event(aEvent);
|
|
|
|
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
|
|
|
NS_ASSERTION(mSyncQueues.Length() > aEvent->mSyncQueueKey, "Bad event!");
|
|
|
|
|
|
|
|
if (!mSyncQueues[aEvent->mSyncQueueKey]->mQueue.Push(event)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
mCondVar.Notify();
|
|
|
|
}
|
|
|
|
|
|
|
|
event.forget();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
WorkerPrivate::ClearQueue(EventQueue* aQueue)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
mMutex.AssertCurrentThreadOwns();
|
|
|
|
|
2012-02-09 20:54:47 -08:00
|
|
|
WorkerRunnable* event;
|
2011-07-17 12:09:13 -07:00
|
|
|
while (aQueue->Pop(event)) {
|
2012-02-09 20:54:47 -08:00
|
|
|
if (event->WantsToRunDuringClear()) {
|
|
|
|
MutexAutoUnlock unlock(mMutex);
|
|
|
|
|
|
|
|
static_cast<nsIRunnable*>(event)->Run();
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
event->Release();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t
|
2011-07-17 12:09:13 -07:00
|
|
|
WorkerPrivate::RemainingRunTimeMS() const
|
|
|
|
{
|
|
|
|
if (mKillTime.IsNull()) {
|
2012-09-27 23:57:33 -07:00
|
|
|
return UINT32_MAX;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
TimeDuration runtime = mKillTime - TimeStamp::Now();
|
|
|
|
double ms = runtime > TimeDuration(0) ? runtime.ToMilliseconds() : 0;
|
2012-09-27 23:57:33 -07:00
|
|
|
return ms > double(UINT32_MAX) ? UINT32_MAX : uint32_t(ms);
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerPrivate::SuspendInternal(JSContext* aCx)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
NS_ASSERTION(!mSuspended, "Already suspended!");
|
|
|
|
|
|
|
|
mSuspended = true;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerPrivate::ResumeInternal(JSContext* aCx)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
NS_ASSERTION(mSuspended, "Not yet suspended!");
|
|
|
|
|
|
|
|
mSuspended = false;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
WorkerPrivate::TraceInternal(JSTracer* aTrc)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
for (uint32_t index = 0; index < mTimeouts.Length(); index++) {
|
2011-07-17 12:09:13 -07:00
|
|
|
TimeoutInfo* info = mTimeouts[index];
|
|
|
|
JS_CALL_VALUE_TRACER(aTrc, info->mTimeoutVal,
|
|
|
|
"WorkerPrivate timeout value");
|
2012-08-22 08:56:38 -07:00
|
|
|
for (uint32_t index2 = 0; index2 < info->mExtraArgVals.Length(); index2++) {
|
2011-07-17 12:09:13 -07:00
|
|
|
JS_CALL_VALUE_TRACER(aTrc, info->mExtraArgVals[index2],
|
|
|
|
"WorkerPrivate timeout extra argument value");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerPrivate::ModifyBusyCountFromWorker(JSContext* aCx, bool aIncrease)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
|
|
|
// If we're in shutdown then the busy count is no longer being considered so
|
|
|
|
// just return now.
|
|
|
|
if (mStatus >= Killing) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
nsRefPtr<ModifyBusyCountRunnable> runnable =
|
|
|
|
new ModifyBusyCountRunnable(this, aIncrease);
|
|
|
|
return runnable->Dispatch(aCx);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerPrivate::AddChildWorker(JSContext* aCx, ParentType* aChildWorker)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
Status currentStatus;
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
currentStatus = mStatus;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (currentStatus > Running) {
|
|
|
|
JS_ReportError(aCx, "Cannot create child workers from the close handler!");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_ASSERTION(!mChildWorkers.Contains(aChildWorker),
|
|
|
|
"Already know about this one!");
|
|
|
|
mChildWorkers.AppendElement(aChildWorker);
|
|
|
|
|
|
|
|
return mChildWorkers.Length() == 1 ?
|
|
|
|
ModifyBusyCountFromWorker(aCx, true) :
|
|
|
|
true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
WorkerPrivate::RemoveChildWorker(JSContext* aCx, ParentType* aChildWorker)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
NS_ASSERTION(mChildWorkers.Contains(aChildWorker),
|
|
|
|
"Didn't know about this one!");
|
|
|
|
mChildWorkers.RemoveElement(aChildWorker);
|
|
|
|
|
|
|
|
if (mChildWorkers.IsEmpty() && !ModifyBusyCountFromWorker(aCx, false)) {
|
|
|
|
NS_WARNING("Failed to modify busy count!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerPrivate::AddFeature(JSContext* aCx, WorkerFeature* aFeature)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
|
|
|
if (mStatus >= Canceling) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_ASSERTION(!mFeatures.Contains(aFeature), "Already know about this one!");
|
|
|
|
mFeatures.AppendElement(aFeature);
|
|
|
|
|
|
|
|
return mFeatures.Length() == 1 ?
|
|
|
|
ModifyBusyCountFromWorker(aCx, true) :
|
|
|
|
true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
WorkerPrivate::RemoveFeature(JSContext* aCx, WorkerFeature* aFeature)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
NS_ASSERTION(mFeatures.Contains(aFeature), "Didn't know about this one!");
|
|
|
|
mFeatures.RemoveElement(aFeature);
|
|
|
|
|
|
|
|
if (mFeatures.IsEmpty() && !ModifyBusyCountFromWorker(aCx, false)) {
|
|
|
|
NS_WARNING("Failed to modify busy count!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
WorkerPrivate::NotifyFeatures(JSContext* aCx, Status aStatus)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
NS_ASSERTION(aStatus > Running, "Bad status!");
|
|
|
|
|
|
|
|
if (aStatus >= Closing) {
|
|
|
|
CancelAllTimeouts(aCx);
|
|
|
|
}
|
|
|
|
|
|
|
|
nsAutoTArray<WorkerFeature*, 30> features;
|
|
|
|
features.AppendElements(mFeatures);
|
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
for (uint32_t index = 0; index < features.Length(); index++) {
|
2011-07-17 12:09:13 -07:00
|
|
|
if (!features[index]->Notify(aCx, aStatus)) {
|
|
|
|
NS_WARNING("Failed to notify feature!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
nsAutoTArray<ParentType*, 10> children;
|
|
|
|
children.AppendElements(mChildWorkers);
|
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
for (uint32_t index = 0; index < children.Length(); index++) {
|
2011-07-17 12:09:13 -07:00
|
|
|
if (!children[index]->Notify(aCx, aStatus)) {
|
|
|
|
NS_WARNING("Failed to notify child worker!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
WorkerPrivate::CancelAllTimeouts(JSContext* aCx)
|
|
|
|
{
|
2012-03-26 21:05:09 -07:00
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
if (mTimerRunning) {
|
|
|
|
NS_ASSERTION(mTimer, "Huh?!");
|
|
|
|
NS_ASSERTION(!mTimeouts.IsEmpty(), "Huh?!");
|
|
|
|
|
|
|
|
if (NS_FAILED(mTimer->Cancel())) {
|
|
|
|
NS_WARNING("Failed to cancel timer!");
|
|
|
|
}
|
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
for (uint32_t index = 0; index < mTimeouts.Length(); index++) {
|
2011-07-17 12:09:13 -07:00
|
|
|
mTimeouts[index]->mCanceled = true;
|
|
|
|
}
|
|
|
|
|
2012-03-26 21:05:09 -07:00
|
|
|
if (!RunExpiredTimeouts(aCx)) {
|
|
|
|
JS_ReportPendingException(aCx);
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-03-26 21:05:09 -07:00
|
|
|
mTimerRunning = false;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
2012-03-26 21:05:09 -07:00
|
|
|
#ifdef DEBUG
|
|
|
|
else if (!mRunningExpiredTimeouts) {
|
2011-07-17 12:09:13 -07:00
|
|
|
NS_ASSERTION(mTimeouts.IsEmpty(), "Huh?!");
|
|
|
|
}
|
2012-03-26 21:05:09 -07:00
|
|
|
#endif
|
|
|
|
|
2012-07-30 07:20:58 -07:00
|
|
|
mTimer = nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t
|
2011-07-17 12:09:13 -07:00
|
|
|
WorkerPrivate::CreateNewSyncLoop()
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
2012-09-27 23:57:33 -07:00
|
|
|
NS_ASSERTION(mSyncQueues.Length() < UINT32_MAX,
|
2011-07-17 12:09:13 -07:00
|
|
|
"Should have bailed by now!");
|
|
|
|
|
|
|
|
mSyncQueues.AppendElement(new SyncQueue());
|
|
|
|
return mSyncQueues.Length() - 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2012-08-22 08:56:38 -07:00
|
|
|
WorkerPrivate::RunSyncLoop(JSContext* aCx, uint32_t aSyncLoopKey)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
NS_ASSERTION(!mSyncQueues.IsEmpty() ||
|
|
|
|
(aSyncLoopKey != mSyncQueues.Length() - 1),
|
|
|
|
"Forgot to call CreateNewSyncLoop!");
|
|
|
|
if (aSyncLoopKey != mSyncQueues.Length() - 1) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
SyncQueue* syncQueue = mSyncQueues[aSyncLoopKey].get();
|
|
|
|
|
|
|
|
for (;;) {
|
2012-02-09 20:54:47 -08:00
|
|
|
WorkerRunnable* event;
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
|
|
|
while (!mControlQueue.Pop(event) && !syncQueue->mQueue.Pop(event)) {
|
2012-12-30 10:21:52 -08:00
|
|
|
WaitForWorkerEvents();
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef EXTRA_GC
|
|
|
|
// Find GC bugs...
|
|
|
|
JS_GC(mJSContext);
|
|
|
|
#endif
|
|
|
|
|
2012-02-09 20:54:47 -08:00
|
|
|
static_cast<nsIRunnable*>(event)->Run();
|
2011-07-17 12:09:13 -07:00
|
|
|
NS_RELEASE(event);
|
|
|
|
|
|
|
|
#ifdef EXTRA_GC
|
|
|
|
// Find GC bugs...
|
|
|
|
JS_GC(mJSContext);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (syncQueue->mComplete) {
|
|
|
|
NS_ASSERTION(mSyncQueues.Length() - 1 == aSyncLoopKey,
|
|
|
|
"Mismatched calls!");
|
|
|
|
NS_ASSERTION(syncQueue->mQueue.IsEmpty(), "Unprocessed sync events!");
|
|
|
|
|
|
|
|
bool result = syncQueue->mResult;
|
2012-12-21 12:14:47 -08:00
|
|
|
DestroySyncLoop(aSyncLoopKey);
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
#ifdef DEBUG
|
2012-07-30 07:20:58 -07:00
|
|
|
syncQueue = nullptr;
|
2011-07-17 12:09:13 -07:00
|
|
|
#endif
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_NOTREACHED("Shouldn't get here!");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2012-08-22 08:56:38 -07:00
|
|
|
WorkerPrivate::StopSyncLoop(uint32_t aSyncLoopKey, bool aSyncResult)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
NS_ASSERTION(mSyncQueues.IsEmpty() ||
|
|
|
|
(aSyncLoopKey == mSyncQueues.Length() - 1),
|
|
|
|
"Forgot to call CreateNewSyncLoop!");
|
|
|
|
if (aSyncLoopKey != mSyncQueues.Length() - 1) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
SyncQueue* syncQueue = mSyncQueues[aSyncLoopKey].get();
|
|
|
|
|
|
|
|
NS_ASSERTION(!syncQueue->mComplete, "Already called StopSyncLoop?!");
|
|
|
|
|
|
|
|
syncQueue->mResult = aSyncResult;
|
|
|
|
syncQueue->mComplete = true;
|
|
|
|
}
|
|
|
|
|
2012-12-21 12:14:47 -08:00
|
|
|
void
|
|
|
|
WorkerPrivate::DestroySyncLoop(uint32_t aSyncLoopKey)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
mSyncQueues.RemoveElementAt(aSyncLoopKey);
|
|
|
|
}
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
bool
|
2012-10-03 15:19:22 -07:00
|
|
|
WorkerPrivate::PostMessageToParent(JSContext* aCx, jsval aMessage,
|
|
|
|
jsval aTransferable)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
2011-08-15 20:40:38 -07:00
|
|
|
JSStructuredCloneCallbacks* callbacks =
|
|
|
|
IsChromeWorker() ?
|
|
|
|
&gChromeWorkerStructuredCloneCallbacks :
|
|
|
|
&gWorkerStructuredCloneCallbacks;
|
|
|
|
|
|
|
|
nsTArray<nsCOMPtr<nsISupports> > clonedObjects;
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
JSAutoStructuredCloneBuffer buffer;
|
2012-10-03 15:19:22 -07:00
|
|
|
if (!buffer.write(aCx, aMessage, aTransferable, callbacks, &clonedObjects)) {
|
2011-07-17 12:09:13 -07:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsRefPtr<MessageEventRunnable> runnable =
|
2011-08-15 20:40:38 -07:00
|
|
|
new MessageEventRunnable(this, WorkerRunnable::ParentThread, buffer,
|
|
|
|
clonedObjects);
|
2011-07-17 12:09:13 -07:00
|
|
|
return runnable->Dispatch(aCx);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerPrivate::NotifyInternal(JSContext* aCx, Status aStatus)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
NS_ASSERTION(aStatus > Running && aStatus < Dead, "Bad status!");
|
|
|
|
|
|
|
|
// Save the old status and set the new status.
|
|
|
|
Status previousStatus;
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
|
|
|
if (mStatus >= aStatus) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
previousStatus = mStatus;
|
|
|
|
mStatus = aStatus;
|
|
|
|
}
|
|
|
|
|
2011-12-04 23:58:27 -08:00
|
|
|
// Now that status > Running, no-one can create a new mCrossThreadDispatcher
|
|
|
|
// if we don't already have one.
|
|
|
|
if (mCrossThreadDispatcher) {
|
|
|
|
// Since we'll no longer process events, make sure we no longer allow
|
|
|
|
// anyone to post them.
|
|
|
|
// We have to do this without mMutex held, since our mutex must be
|
|
|
|
// acquired *after* mCrossThreadDispatcher's mutex when they're both held.
|
|
|
|
mCrossThreadDispatcher->Forget();
|
|
|
|
}
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
NS_ASSERTION(previousStatus != Pending, "How is this possible?!");
|
|
|
|
|
|
|
|
NS_ASSERTION(previousStatus >= Canceling || mKillTime.IsNull(),
|
|
|
|
"Bad kill time set!");
|
|
|
|
|
|
|
|
// Let all our features know the new status.
|
|
|
|
NotifyFeatures(aCx, aStatus);
|
|
|
|
|
2012-10-02 19:03:28 -07:00
|
|
|
// If this is the first time our status has changed then we need to clear the
|
|
|
|
// main event queue.
|
|
|
|
if (previousStatus == Running) {
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
ClearQueue(&mQueue);
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we've run the close handler, we don't need to do anything else.
|
|
|
|
if (mCloseHandlerFinished) {
|
2011-07-17 12:09:13 -07:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-10-02 19:03:28 -07:00
|
|
|
// If the worker script never ran, or failed to compile, we don't need to do
|
|
|
|
// anything else, except pretend that we ran the close handler.
|
|
|
|
if (!JS_GetGlobalObject(aCx)) {
|
|
|
|
mCloseHandlerStarted = true;
|
|
|
|
mCloseHandlerFinished = true;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If this is the first time our status has changed we also need to schedule
|
|
|
|
// the close handler unless we're being shut down.
|
|
|
|
if (previousStatus == Running && aStatus != Killing) {
|
2011-07-17 12:09:13 -07:00
|
|
|
NS_ASSERTION(!mCloseHandlerStarted && !mCloseHandlerFinished,
|
|
|
|
"This is impossible!");
|
|
|
|
|
2012-10-02 19:03:28 -07:00
|
|
|
nsRefPtr<CloseEventRunnable> closeRunnable = new CloseEventRunnable(this);
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-10-02 19:03:28 -07:00
|
|
|
MutexAutoLock lock(mMutex);
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-10-02 19:03:28 -07:00
|
|
|
if (!mQueue.Push(closeRunnable)) {
|
|
|
|
NS_WARNING("Failed to push closeRunnable!");
|
|
|
|
return false;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
2012-10-02 19:03:28 -07:00
|
|
|
|
|
|
|
closeRunnable.forget();
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
if (aStatus == Closing) {
|
|
|
|
// Notify parent to stop sending us messages and balance our busy count.
|
|
|
|
nsRefPtr<CloseRunnable> runnable = new CloseRunnable(this);
|
|
|
|
if (!runnable->Dispatch(aCx)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Don't abort the script.
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (aStatus == Terminating) {
|
|
|
|
// Only abort the script if we're not yet running the close handler.
|
|
|
|
return mCloseHandlerStarted;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (aStatus == Canceling) {
|
|
|
|
// We need to enforce a timeout on the close handler.
|
|
|
|
NS_ASSERTION(previousStatus == Running || previousStatus == Closing ||
|
|
|
|
previousStatus == Terminating,
|
|
|
|
"Bad previous status!");
|
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t killSeconds = RuntimeService::GetCloseHandlerTimeoutSeconds();
|
2011-07-17 12:09:13 -07:00
|
|
|
if (killSeconds) {
|
|
|
|
mKillTime = TimeStamp::Now() + TimeDuration::FromSeconds(killSeconds);
|
|
|
|
|
|
|
|
if (!mCloseHandlerFinished && !ScheduleKillCloseEventRunnable(aCx)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Only abort the script if we're not yet running the close handler.
|
|
|
|
return mCloseHandlerStarted;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (aStatus == Killing) {
|
|
|
|
mKillTime = TimeStamp::Now();
|
|
|
|
|
|
|
|
if (!mCloseHandlerFinished && !ScheduleKillCloseEventRunnable(aCx)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Always abort the script.
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_NOTREACHED("Should never get here!");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerPrivate::ScheduleKillCloseEventRunnable(JSContext* aCx)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
NS_ASSERTION(!mKillTime.IsNull(), "Must have a kill time!");
|
|
|
|
|
|
|
|
nsRefPtr<KillCloseEventRunnable> killCloseEventRunnable =
|
|
|
|
new KillCloseEventRunnable(this);
|
|
|
|
if (!killCloseEventRunnable->SetTimeout(aCx, RemainingRunTimeMS())) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
|
|
|
if (!mQueue.Push(killCloseEventRunnable)) {
|
|
|
|
NS_WARNING("Failed to push killCloseEventRunnable!");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
killCloseEventRunnable.forget();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
WorkerPrivate::ReportError(JSContext* aCx, const char* aMessage,
|
|
|
|
JSErrorReport* aReport)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
if (!MayContinueRunning() || mErrorHandlerRecursionCount == 2) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_ASSERTION(mErrorHandlerRecursionCount == 0 ||
|
|
|
|
mErrorHandlerRecursionCount == 1,
|
|
|
|
"Bad recursion logic!");
|
|
|
|
|
|
|
|
JS_ClearPendingException(aCx);
|
|
|
|
|
|
|
|
nsString message, filename, line;
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t lineNumber, columnNumber, flags, errorNumber;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
if (aReport) {
|
|
|
|
if (aReport->ucmessage) {
|
|
|
|
message = aReport->ucmessage;
|
|
|
|
}
|
|
|
|
filename = NS_ConvertUTF8toUTF16(aReport->filename);
|
|
|
|
line = aReport->uclinebuf;
|
|
|
|
lineNumber = aReport->lineno;
|
|
|
|
columnNumber = aReport->uctokenptr - aReport->uclinebuf;
|
|
|
|
flags = aReport->flags;
|
|
|
|
errorNumber = aReport->errorNumber;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
lineNumber = columnNumber = errorNumber = 0;
|
|
|
|
flags = nsIScriptError::errorFlag | nsIScriptError::exceptionFlag;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (message.IsEmpty()) {
|
|
|
|
message = NS_ConvertUTF8toUTF16(aMessage);
|
|
|
|
}
|
|
|
|
|
|
|
|
mErrorHandlerRecursionCount++;
|
|
|
|
|
|
|
|
// Don't want to run the scope's error handler if this is a recursive error or
|
2012-01-04 11:11:32 -08:00
|
|
|
// if there was an error in the close handler or if we ran out of memory.
|
2011-07-17 12:09:13 -07:00
|
|
|
bool fireAtScope = mErrorHandlerRecursionCount == 1 &&
|
2012-01-04 11:11:32 -08:00
|
|
|
!mCloseHandlerStarted &&
|
|
|
|
errorNumber != JSMSG_OUT_OF_MEMORY;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-07-30 07:20:58 -07:00
|
|
|
if (!ReportErrorRunnable::ReportError(aCx, this, fireAtScope, nullptr, message,
|
2011-07-17 12:09:13 -07:00
|
|
|
filename, line, lineNumber,
|
|
|
|
columnNumber, flags, errorNumber, 0)) {
|
|
|
|
JS_ReportPendingException(aCx);
|
|
|
|
}
|
|
|
|
|
|
|
|
mErrorHandlerRecursionCount--;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2012-02-28 15:11:11 -08:00
|
|
|
WorkerPrivate::SetTimeout(JSContext* aCx, unsigned aArgc, jsval* aVp,
|
2011-07-17 12:09:13 -07:00
|
|
|
bool aIsInterval)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
NS_ASSERTION(aArgc, "Huh?!");
|
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
const uint32_t timerId = mNextTimeoutId++;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
Status currentStatus;
|
|
|
|
{
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
currentStatus = mStatus;
|
|
|
|
}
|
|
|
|
|
2012-03-26 21:05:09 -07:00
|
|
|
// It's a script bug if setTimeout/setInterval are called from a close handler
|
|
|
|
// so throw an exception.
|
|
|
|
if (currentStatus == Closing) {
|
2011-07-17 12:09:13 -07:00
|
|
|
JS_ReportError(aCx, "Cannot schedule timeouts from the close handler!");
|
2012-03-26 21:05:09 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// If the worker is trying to call setTimeout/setInterval and the parent
|
|
|
|
// thread has initiated the close process then just silently fail.
|
|
|
|
if (currentStatus >= Closing) {
|
2011-07-17 12:09:13 -07:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsAutoPtr<TimeoutInfo> newInfo(new TimeoutInfo());
|
|
|
|
newInfo->mIsInterval = aIsInterval;
|
|
|
|
newInfo->mId = timerId;
|
|
|
|
|
2012-10-26 06:32:10 -07:00
|
|
|
if (MOZ_UNLIKELY(timerId == UINT32_MAX)) {
|
2011-07-17 12:09:13 -07:00
|
|
|
NS_WARNING("Timeout ids overflowed!");
|
|
|
|
mNextTimeoutId = 1;
|
|
|
|
}
|
|
|
|
|
2012-05-11 08:46:26 -07:00
|
|
|
JS::Value* argv = JS_ARGV(aCx, aVp);
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
// Take care of the main argument.
|
2012-05-11 08:46:26 -07:00
|
|
|
if (argv[0].isObject()) {
|
|
|
|
if (JS_ObjectIsCallable(aCx, &argv[0].toObject())) {
|
2011-07-17 12:09:13 -07:00
|
|
|
newInfo->mTimeoutVal = argv[0];
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
JSString* timeoutStr = JS_ValueToString(aCx, argv[0]);
|
|
|
|
if (!timeoutStr) {
|
|
|
|
return false;
|
|
|
|
}
|
2012-05-11 08:46:26 -07:00
|
|
|
newInfo->mTimeoutVal.setString(timeoutStr);
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
}
|
2012-05-11 08:46:26 -07:00
|
|
|
else if (argv[0].isString()) {
|
2011-07-17 12:09:13 -07:00
|
|
|
newInfo->mTimeoutVal = argv[0];
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
JS_ReportError(aCx, "Useless %s call (missing quotes around argument?)",
|
|
|
|
aIsInterval ? "setInterval" : "setTimeout");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// See if any of the optional arguments were passed.
|
|
|
|
if (aArgc > 1) {
|
2012-02-24 14:19:52 -08:00
|
|
|
double intervalMS = 0;
|
2011-07-17 12:09:13 -07:00
|
|
|
if (!JS_ValueToNumber(aCx, argv[1], &intervalMS)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
newInfo->mInterval = TimeDuration::FromMilliseconds(intervalMS);
|
|
|
|
|
2012-05-11 08:46:26 -07:00
|
|
|
if (aArgc > 2 && newInfo->mTimeoutVal.isObject()) {
|
2011-07-17 12:09:13 -07:00
|
|
|
nsTArray<jsval> extraArgVals(aArgc - 2);
|
2012-02-28 15:11:11 -08:00
|
|
|
for (unsigned index = 2; index < aArgc; index++) {
|
2011-07-17 12:09:13 -07:00
|
|
|
extraArgVals.AppendElement(argv[index]);
|
|
|
|
}
|
|
|
|
newInfo->mExtraArgVals.SwapElements(extraArgVals);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
newInfo->mTargetTime = TimeStamp::Now() + newInfo->mInterval;
|
|
|
|
|
2012-05-11 08:46:26 -07:00
|
|
|
if (newInfo->mTimeoutVal.isString()) {
|
2011-07-17 12:09:13 -07:00
|
|
|
const char* filenameChars;
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t lineNumber;
|
2011-07-17 12:09:13 -07:00
|
|
|
if (nsJSUtils::GetCallingLocation(aCx, &filenameChars, &lineNumber)) {
|
|
|
|
newInfo->mFilename = filenameChars;
|
|
|
|
newInfo->mLineNumber = lineNumber;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
NS_WARNING("Failed to get calling location!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mTimeouts.InsertElementSorted(newInfo.get(), GetAutoPtrComparator(mTimeouts));
|
|
|
|
|
|
|
|
// If the timeout we just made is set to fire next then we need to update the
|
|
|
|
// timer.
|
|
|
|
if (mTimeouts[0] == newInfo) {
|
|
|
|
nsresult rv;
|
|
|
|
|
|
|
|
if (!mTimer) {
|
|
|
|
mTimer = do_CreateInstance(NS_TIMER_CONTRACTID, &rv);
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
JS_ReportError(aCx, "Failed to create timer!");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsRefPtr<TimerRunnable> timerRunnable = new TimerRunnable(this);
|
|
|
|
|
|
|
|
nsCOMPtr<nsIEventTarget> target =
|
|
|
|
new WorkerRunnableEventTarget(timerRunnable);
|
|
|
|
rv = mTimer->SetTarget(target);
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
JS_ReportError(aCx, "Failed to set timer's target!");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!mTimerRunning) {
|
|
|
|
if (!ModifyBusyCountFromWorker(aCx, true)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
mTimerRunning = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!RescheduleTimeoutTimer(aCx)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
JS_SET_RVAL(aCx, aVp, INT_TO_JSVAL(timerId));
|
|
|
|
|
|
|
|
newInfo.forget();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2012-10-11 16:38:04 -07:00
|
|
|
WorkerPrivate::ClearTimeout(JSContext* aCx, uint32_t aId)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
if (!mTimeouts.IsEmpty()) {
|
|
|
|
NS_ASSERTION(mTimerRunning, "Huh?!");
|
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
for (uint32_t index = 0; index < mTimeouts.Length(); index++) {
|
2011-07-17 12:09:13 -07:00
|
|
|
nsAutoPtr<TimeoutInfo>& info = mTimeouts[index];
|
|
|
|
if (info->mId == aId) {
|
|
|
|
info->mCanceled = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerPrivate::RunExpiredTimeouts(JSContext* aCx)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
// We may be called recursively (e.g. close() inside a timeout) or we could
|
|
|
|
// have been canceled while this event was pending, bail out if there is
|
|
|
|
// nothing to do.
|
|
|
|
if (mRunningExpiredTimeouts || !mTimerRunning) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-03-26 21:05:09 -07:00
|
|
|
NS_ASSERTION(mTimer, "Must have a timer!");
|
2011-07-17 12:09:13 -07:00
|
|
|
NS_ASSERTION(!mTimeouts.IsEmpty(), "Should have some work to do!");
|
|
|
|
|
|
|
|
bool retval = true;
|
|
|
|
|
2011-08-26 00:34:10 -07:00
|
|
|
AutoPtrComparator<TimeoutInfo> comparator = GetAutoPtrComparator(mTimeouts);
|
2012-09-24 18:08:22 -07:00
|
|
|
js::RootedObject global(aCx, JS_GetGlobalObject(aCx));
|
2011-08-26 00:34:10 -07:00
|
|
|
JSPrincipals* principal = GetWorkerPrincipal();
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
// We want to make sure to run *something*, even if the timer fired a little
|
|
|
|
// early. Fudge the value of now to at least include the first timeout.
|
2013-01-15 04:22:03 -08:00
|
|
|
const TimeStamp now = std::max(TimeStamp::Now(), mTimeouts[0]->mTargetTime);
|
2011-07-17 12:09:13 -07:00
|
|
|
|
|
|
|
nsAutoTArray<TimeoutInfo*, 10> expiredTimeouts;
|
2012-08-22 08:56:38 -07:00
|
|
|
for (uint32_t index = 0; index < mTimeouts.Length(); index++) {
|
2011-07-17 12:09:13 -07:00
|
|
|
nsAutoPtr<TimeoutInfo>& info = mTimeouts[index];
|
2011-08-26 00:34:10 -07:00
|
|
|
if (info->mTargetTime > now) {
|
|
|
|
break;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
2011-08-26 00:34:10 -07:00
|
|
|
expiredTimeouts.AppendElement(info);
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// Guard against recursion.
|
|
|
|
mRunningExpiredTimeouts = true;
|
|
|
|
|
|
|
|
// Run expired timeouts.
|
2012-08-22 08:56:38 -07:00
|
|
|
for (uint32_t index = 0; index < expiredTimeouts.Length(); index++) {
|
2011-07-17 12:09:13 -07:00
|
|
|
TimeoutInfo*& info = expiredTimeouts[index];
|
|
|
|
|
|
|
|
if (info->mCanceled) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2011-08-26 00:34:10 -07:00
|
|
|
// Always call JS_ReportPendingException if something fails, and if
|
|
|
|
// JS_ReportPendingException returns false (i.e. uncatchable exception) then
|
|
|
|
// break out of the loop.
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-05-11 08:46:26 -07:00
|
|
|
if (info->mTimeoutVal.isString()) {
|
|
|
|
JSString* expression = info->mTimeoutVal.toString();
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-08-27 05:04:37 -07:00
|
|
|
JS::CompileOptions options(aCx);
|
|
|
|
options.setPrincipals(principal)
|
|
|
|
.setFileAndLine(info->mFilename.get(), info->mLineNumber);
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
size_t stringLength;
|
|
|
|
const jschar* string = JS_GetStringCharsAndLength(aCx, expression,
|
|
|
|
&stringLength);
|
2012-08-27 05:04:37 -07:00
|
|
|
if ((!string || !JS::Evaluate(aCx, global, options, string, stringLength, nullptr)) &&
|
2011-08-26 00:34:10 -07:00
|
|
|
!JS_ReportPendingException(aCx)) {
|
2012-08-27 05:21:27 -07:00
|
|
|
retval = false;
|
|
|
|
break;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
jsval rval;
|
|
|
|
if (!JS_CallFunctionValue(aCx, global, info->mTimeoutVal,
|
|
|
|
info->mExtraArgVals.Length(),
|
2011-08-26 00:34:10 -07:00
|
|
|
info->mExtraArgVals.Elements(), &rval) &&
|
|
|
|
!JS_ReportPendingException(aCx)) {
|
|
|
|
retval = false;
|
|
|
|
break;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
}
|
2011-08-26 00:34:10 -07:00
|
|
|
|
2012-03-26 21:05:09 -07:00
|
|
|
NS_ASSERTION(mRunningExpiredTimeouts, "Someone changed this!");
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// No longer possible to be called recursively.
|
|
|
|
mRunningExpiredTimeouts = false;
|
|
|
|
|
2011-08-26 00:34:10 -07:00
|
|
|
// Now remove canceled and expired timeouts from the main list.
|
2012-08-10 09:10:22 -07:00
|
|
|
// NB: The timeouts present in expiredTimeouts must have the same order
|
|
|
|
// with respect to each other in mTimeouts. That is, mTimeouts is just
|
|
|
|
// expiredTimeouts with extra elements inserted. There may be unexpired
|
|
|
|
// timeouts that have been inserted between the expired timeouts if the
|
|
|
|
// timeout event handler called setTimeout/setInterval.
|
2012-08-22 08:56:38 -07:00
|
|
|
for (uint32_t index = 0, expiredTimeoutIndex = 0,
|
2012-08-10 09:10:22 -07:00
|
|
|
expiredTimeoutLength = expiredTimeouts.Length();
|
|
|
|
index < mTimeouts.Length(); ) {
|
2011-08-26 00:34:10 -07:00
|
|
|
nsAutoPtr<TimeoutInfo>& info = mTimeouts[index];
|
2012-08-10 09:10:22 -07:00
|
|
|
if ((expiredTimeoutIndex < expiredTimeoutLength &&
|
|
|
|
info == expiredTimeouts[expiredTimeoutIndex] &&
|
|
|
|
++expiredTimeoutIndex) ||
|
|
|
|
info->mCanceled) {
|
|
|
|
if (info->mIsInterval && !info->mCanceled) {
|
|
|
|
// Reschedule intervals.
|
|
|
|
info->mTargetTime = info->mTargetTime + info->mInterval;
|
|
|
|
// Don't resort the list here, we'll do that at the end.
|
|
|
|
++index;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
mTimeouts.RemoveElement(info);
|
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
2011-08-26 00:34:10 -07:00
|
|
|
else {
|
2012-08-10 09:10:22 -07:00
|
|
|
// If info did not match the current entry in expiredTimeouts, it
|
|
|
|
// shouldn't be there at all.
|
|
|
|
NS_ASSERTION(!expiredTimeouts.Contains(info),
|
|
|
|
"Our timeouts are out of order!");
|
|
|
|
++index;
|
2011-08-26 00:34:10 -07:00
|
|
|
}
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
2012-08-10 09:10:22 -07:00
|
|
|
mTimeouts.Sort(comparator);
|
|
|
|
|
2012-03-26 21:05:09 -07:00
|
|
|
// Either signal the parent that we're no longer using timeouts or reschedule
|
|
|
|
// the timer.
|
2011-07-17 12:09:13 -07:00
|
|
|
if (mTimeouts.IsEmpty()) {
|
|
|
|
if (!ModifyBusyCountFromWorker(aCx, false)) {
|
|
|
|
retval = false;
|
|
|
|
}
|
|
|
|
mTimerRunning = false;
|
|
|
|
}
|
|
|
|
else if (retval && !RescheduleTimeoutTimer(aCx)) {
|
|
|
|
retval = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
WorkerPrivate::RescheduleTimeoutTimer(JSContext* aCx)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
NS_ASSERTION(!mTimeouts.IsEmpty(), "Should have some timeouts!");
|
|
|
|
NS_ASSERTION(mTimer, "Should have a timer!");
|
|
|
|
|
|
|
|
double delta =
|
|
|
|
(mTimeouts[0]->mTargetTime - TimeStamp::Now()).ToMilliseconds();
|
2013-01-15 04:22:03 -08:00
|
|
|
uint32_t delay = delta > 0 ? std::min(delta, double(UINT32_MAX)) : 0;
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-07-30 07:20:58 -07:00
|
|
|
nsresult rv = mTimer->InitWithFuncCallback(DummyCallback, nullptr, delay,
|
2011-07-17 12:09:13 -07:00
|
|
|
nsITimer::TYPE_ONE_SHOT);
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
JS_ReportError(aCx, "Failed to start timer!");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2012-08-22 08:56:38 -07:00
|
|
|
WorkerPrivate::UpdateJSContextOptionsInternal(JSContext* aCx, uint32_t aOptions)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
JS_SetOptions(aCx, aOptions);
|
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
for (uint32_t index = 0; index < mChildWorkers.Length(); index++) {
|
2011-07-17 12:09:13 -07:00
|
|
|
mChildWorkers[index]->UpdateJSContextOptions(aCx, aOptions);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-01-04 11:11:32 -08:00
|
|
|
void
|
2013-01-10 14:50:40 -08:00
|
|
|
WorkerPrivate::UpdateJSWorkerMemoryParameterInternal(JSContext* aCx,
|
|
|
|
JSGCParamKey aKey,
|
|
|
|
uint32_t aValue)
|
2012-01-04 11:11:32 -08:00
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
2013-01-10 14:50:40 -08:00
|
|
|
JS_SetGCParameter(JS_GetRuntime(aCx), aKey, aValue);
|
2012-01-04 11:11:32 -08:00
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
for (uint32_t index = 0; index < mChildWorkers.Length(); index++) {
|
2013-01-10 14:50:40 -08:00
|
|
|
mChildWorkers[index]->UpdateJSWorkerMemoryParameter(aCx, aKey, aValue);
|
2012-01-04 11:11:32 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
#ifdef JS_GC_ZEAL
|
|
|
|
void
|
2012-08-22 08:56:38 -07:00
|
|
|
WorkerPrivate::UpdateGCZealInternal(JSContext* aCx, uint8_t aGCZeal)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t frequency = aGCZeal <= 2 ? JS_DEFAULT_ZEAL_FREQ : 1;
|
2012-04-03 11:41:56 -07:00
|
|
|
JS_SetGCZeal(aCx, aGCZeal, frequency);
|
2011-07-17 12:09:13 -07:00
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
for (uint32_t index = 0; index < mChildWorkers.Length(); index++) {
|
2011-07-17 12:09:13 -07:00
|
|
|
mChildWorkers[index]->UpdateGCZeal(aCx, aGCZeal);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2012-01-17 12:05:25 -08:00
|
|
|
void
|
|
|
|
WorkerPrivate::GarbageCollectInternal(JSContext* aCx, bool aShrinking,
|
|
|
|
bool aCollectChildren)
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
2012-03-28 03:13:30 -07:00
|
|
|
JSRuntime *rt = JS_GetRuntime(aCx);
|
|
|
|
js::PrepareForFullGC(rt);
|
2012-01-17 12:05:25 -08:00
|
|
|
if (aShrinking) {
|
2012-03-28 03:13:30 -07:00
|
|
|
js::ShrinkingGC(rt, js::gcreason::DOM_WORKER);
|
2012-01-17 12:05:25 -08:00
|
|
|
}
|
|
|
|
else {
|
2012-03-28 03:13:30 -07:00
|
|
|
js::GCForReason(rt, js::gcreason::DOM_WORKER);
|
2012-01-17 12:05:25 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (aCollectChildren) {
|
2012-08-22 08:56:38 -07:00
|
|
|
for (uint32_t index = 0; index < mChildWorkers.Length(); index++) {
|
2012-01-17 12:05:25 -08:00
|
|
|
mChildWorkers[index]->GarbageCollect(aCx, aShrinking);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
#ifdef DEBUG
|
|
|
|
template <class Derived>
|
|
|
|
void
|
|
|
|
WorkerPrivateParent<Derived>::AssertIsOnParentThread() const
|
|
|
|
{
|
|
|
|
if (GetParent()) {
|
|
|
|
GetParent()->AssertIsOnWorkerThread();
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
template <class Derived>
|
|
|
|
void
|
|
|
|
WorkerPrivateParent<Derived>::AssertInnerWindowIsCorrect() const
|
|
|
|
{
|
|
|
|
AssertIsOnParentThread();
|
|
|
|
|
|
|
|
// Only care about top level workers from windows.
|
|
|
|
if (mParent || !mWindow) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
nsPIDOMWindow* outer = mWindow->GetOuterWindow();
|
|
|
|
NS_ASSERTION(outer && outer->GetCurrentInnerWindow() == mWindow,
|
|
|
|
"Inner window no longer correct!");
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
WorkerPrivate::AssertIsOnWorkerThread() const
|
|
|
|
{
|
|
|
|
if (mThread) {
|
2011-09-28 23:19:26 -07:00
|
|
|
bool current;
|
2011-07-17 12:09:13 -07:00
|
|
|
if (NS_FAILED(mThread->IsOnCurrentThread(¤t)) || !current) {
|
|
|
|
NS_ERROR("Wrong thread!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
NS_ERROR("Trying to assert thread identity after thread has been "
|
|
|
|
"shutdown!");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2011-12-04 23:58:27 -08:00
|
|
|
WorkerCrossThreadDispatcher*
|
|
|
|
WorkerPrivate::GetCrossThreadDispatcher()
|
|
|
|
{
|
|
|
|
mozilla::MutexAutoLock lock(mMutex);
|
|
|
|
if (!mCrossThreadDispatcher && mStatus <= Running) {
|
|
|
|
mCrossThreadDispatcher = new WorkerCrossThreadDispatcher(this);
|
|
|
|
}
|
|
|
|
return mCrossThreadDispatcher;
|
|
|
|
}
|
|
|
|
|
2012-09-15 11:51:55 -07:00
|
|
|
bool
|
|
|
|
WorkerPrivate::GetContentSecurityPolicy(JSContext* aCx,
|
|
|
|
nsIContentSecurityPolicy** aCSP)
|
|
|
|
{
|
|
|
|
AssertIsOnMainThread();
|
|
|
|
|
|
|
|
// Get the security manager
|
|
|
|
nsCOMPtr<nsIScriptSecurityManager> ssm = nsContentUtils::GetSecurityManager();
|
|
|
|
|
|
|
|
if (!ssm) {
|
|
|
|
NS_ERROR("Failed to get security manager service");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIPrincipal> subjectPrincipal = ssm->GetCxSubjectPrincipal(aCx);
|
|
|
|
NS_ASSERTION(subjectPrincipal, "Failed to get subjectPrincipal");
|
|
|
|
|
|
|
|
nsCOMPtr<nsIContentSecurityPolicy> csp;
|
|
|
|
nsresult rv = subjectPrincipal->GetCsp(getter_AddRefs(csp));
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
NS_ERROR("CSP: Failed to get CSP from principal.");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
csp.forget(aCSP);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-12-30 10:21:52 -08:00
|
|
|
void
|
|
|
|
WorkerPrivate::BeginCTypesCall()
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
|
|
|
NS_ASSERTION(!mBlockedForMemoryReporter,
|
|
|
|
"Can't be blocked in more than one place at the same time!");
|
|
|
|
|
|
|
|
// Let the main thread know that the worker is effectively blocked while in
|
|
|
|
// this ctypes call. It isn't technically true (obviously the call could do
|
|
|
|
// non-blocking things), but we're assuming that ctypes can't call back into
|
|
|
|
// JSAPI here and therefore any work the ctypes call does will not alter the
|
|
|
|
// data structures of this JS runtime.
|
|
|
|
mBlockedForMemoryReporter = true;
|
|
|
|
|
|
|
|
// The main thread may be waiting on us so it must be notified.
|
|
|
|
mMemoryReportCondVar.Notify();
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
WorkerPrivate::EndCTypesCall()
|
|
|
|
{
|
|
|
|
AssertIsOnWorkerThread();
|
|
|
|
|
|
|
|
MutexAutoLock lock(mMutex);
|
|
|
|
|
|
|
|
NS_ASSERTION(mBlockedForMemoryReporter, "Somehow we got unblocked!");
|
|
|
|
|
|
|
|
// Don't continue until the memory reporter has finished.
|
|
|
|
while (mMemoryReporterRunning) {
|
|
|
|
mMemoryReportCondVar.Wait();
|
|
|
|
}
|
|
|
|
|
|
|
|
// No need to notify the main thread here as it shouldn't be waiting to see
|
|
|
|
// this state.
|
|
|
|
mBlockedForMemoryReporter = false;
|
|
|
|
}
|
|
|
|
|
2011-08-04 15:01:45 -07:00
|
|
|
BEGIN_WORKERS_NAMESPACE
|
|
|
|
|
2011-07-17 12:09:13 -07:00
|
|
|
// Force instantiation.
|
|
|
|
template class WorkerPrivateParent<WorkerPrivate>;
|
|
|
|
|
|
|
|
WorkerPrivate*
|
|
|
|
GetWorkerPrivateFromContext(JSContext* aCx)
|
|
|
|
{
|
|
|
|
NS_ASSERTION(!NS_IsMainThread(), "Wrong thread!");
|
2013-01-08 04:57:44 -08:00
|
|
|
return static_cast<WorkerPrivate*>(JS_GetRuntimePrivate(JS_GetRuntime(aCx)));
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
JSStructuredCloneCallbacks*
|
2011-08-15 20:40:38 -07:00
|
|
|
WorkerStructuredCloneCallbacks(bool aMainRuntime)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
2011-08-15 20:40:38 -07:00
|
|
|
return aMainRuntime ?
|
|
|
|
&gMainThreadWorkerStructuredCloneCallbacks :
|
|
|
|
&gWorkerStructuredCloneCallbacks;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
JSStructuredCloneCallbacks*
|
2011-08-15 20:40:38 -07:00
|
|
|
ChromeWorkerStructuredCloneCallbacks(bool aMainRuntime)
|
2011-07-17 12:09:13 -07:00
|
|
|
{
|
2011-08-15 20:40:38 -07:00
|
|
|
return aMainRuntime ?
|
|
|
|
&gMainThreadChromeWorkerStructuredCloneCallbacks :
|
|
|
|
&gChromeWorkerStructuredCloneCallbacks;
|
2011-07-17 12:09:13 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
END_WORKERS_NAMESPACE
|