2009-08-18 12:05:15 -07:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
|
|
|
|
/* vim: set sw=4 ts=8 et tw=80 : */
|
2012-05-21 04:12:37 -07:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2009-09-09 15:00:14 -07:00
|
|
|
|
2012-12-14 15:58:45 -08:00
|
|
|
#include "mozilla/DebugOnly.h"
|
|
|
|
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "base/basictypes.h"
|
2009-08-12 09:18:08 -07:00
|
|
|
|
2012-08-01 23:02:29 -07:00
|
|
|
#include "ContentParent.h"
|
|
|
|
|
2012-07-17 16:59:44 -07:00
|
|
|
#if defined(ANDROID) || defined(LINUX)
|
|
|
|
# include <sys/time.h>
|
|
|
|
# include <sys/resource.h>
|
|
|
|
#endif
|
|
|
|
|
2011-07-12 23:52:31 -07:00
|
|
|
#include "chrome/common/process_watcher.h"
|
|
|
|
|
2012-12-22 03:53:38 -08:00
|
|
|
#include "AppProcessChecker.h"
|
2012-12-05 19:01:58 -08:00
|
|
|
#include "AudioChannelService.h"
|
2010-11-24 06:15:03 -08:00
|
|
|
#include "CrashReporterParent.h"
|
2012-11-09 01:55:54 -08:00
|
|
|
#include "IHistory.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "IDBFactory.h"
|
|
|
|
#include "IndexedDBParent.h"
|
|
|
|
#include "IndexedDatabaseManager.h"
|
2012-08-08 19:58:06 -07:00
|
|
|
#include "mozIApplication.h"
|
2012-08-15 18:46:03 -07:00
|
|
|
#include "mozilla/ClearOnShutdown.h"
|
2013-05-17 13:17:53 -07:00
|
|
|
#include "mozilla/dom/Element.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "mozilla/dom/ExternalHelperAppParent.h"
|
|
|
|
#include "mozilla/dom/PMemoryReportRequestParent.h"
|
2013-02-14 12:41:30 -08:00
|
|
|
#include "mozilla/dom/power/PowerManagerService.h"
|
2013-04-15 05:38:48 -07:00
|
|
|
#include "mozilla/dom/DOMStorageIPC.h"
|
2012-09-13 09:37:14 -07:00
|
|
|
#include "mozilla/dom/bluetooth/PBluetoothParent.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "mozilla/dom/devicestorage/DeviceStorageRequestParent.h"
|
2012-11-06 13:29:30 -08:00
|
|
|
#include "SmsParent.h"
|
2013-01-26 13:14:01 -08:00
|
|
|
#include "mozilla/Hal.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "mozilla/hal_sandbox/PHalParent.h"
|
2009-08-12 11:31:48 -07:00
|
|
|
#include "mozilla/ipc/TestShellParent.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "mozilla/layers/CompositorParent.h"
|
2012-08-29 05:24:48 -07:00
|
|
|
#include "mozilla/layers/ImageBridgeParent.h"
|
2009-08-18 12:05:15 -07:00
|
|
|
#include "mozilla/net/NeckoParent.h"
|
2012-08-15 18:46:03 -07:00
|
|
|
#include "mozilla/Preferences.h"
|
|
|
|
#include "mozilla/Services.h"
|
|
|
|
#include "mozilla/StaticPtr.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "mozilla/unused.h"
|
|
|
|
#include "nsAppDirectoryServiceDefs.h"
|
|
|
|
#include "nsAppDirectoryServiceDefs.h"
|
|
|
|
#include "nsAppRunner.h"
|
2009-09-02 17:18:27 -07:00
|
|
|
#include "nsAutoPtr.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "nsCExternalHandlerService.h"
|
2009-09-02 17:18:27 -07:00
|
|
|
#include "nsCOMPtr.h"
|
2010-03-10 21:33:00 -08:00
|
|
|
#include "nsChromeRegistryChrome.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "nsConsoleMessage.h"
|
2012-11-09 09:52:09 -08:00
|
|
|
#include "nsConsoleService.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "nsDebugImpl.h"
|
|
|
|
#include "nsDirectoryServiceDefs.h"
|
2012-08-02 23:25:30 -07:00
|
|
|
#include "nsDOMFile.h"
|
2010-08-10 10:14:45 -07:00
|
|
|
#include "nsExternalHelperAppService.h"
|
2010-08-31 11:58:35 -07:00
|
|
|
#include "nsFrameMessageManager.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "nsHashPropertyBag.h"
|
2010-09-15 09:44:57 -07:00
|
|
|
#include "nsIAlertsService.h"
|
2013-04-25 17:53:26 -07:00
|
|
|
#include "nsIAppsService.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "nsIClipboard.h"
|
2012-08-08 19:58:06 -07:00
|
|
|
#include "nsIDOMApplicationRegistry.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "nsIDOMGeoGeolocation.h"
|
2013-02-14 12:41:30 -08:00
|
|
|
#include "nsIDOMWakeLock.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "nsIDOMWindow.h"
|
|
|
|
#include "nsIFilePicker.h"
|
|
|
|
#include "nsIMemoryReporter.h"
|
2013-02-14 12:41:30 -08:00
|
|
|
#include "nsIMozBrowserFrame.h"
|
2013-01-10 10:16:40 -08:00
|
|
|
#include "nsIMutable.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "nsIObserverService.h"
|
|
|
|
#include "nsIPresShell.h"
|
2012-08-01 23:02:29 -07:00
|
|
|
#include "nsIRemoteBlob.h"
|
2010-09-23 18:39:32 -07:00
|
|
|
#include "nsIScriptError.h"
|
2012-08-08 19:58:06 -07:00
|
|
|
#include "nsIScriptSecurityManager.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "nsISupportsPrimitives.h"
|
|
|
|
#include "nsIWindowWatcher.h"
|
|
|
|
#include "nsServiceManagerUtils.h"
|
2011-06-16 19:59:00 -07:00
|
|
|
#include "nsSystemInfo.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "nsThreadUtils.h"
|
|
|
|
#include "nsToolkitCompsCID.h"
|
|
|
|
#include "nsWidgetsCID.h"
|
2013-04-25 17:53:26 -07:00
|
|
|
#include "PreallocatedProcessManager.h"
|
|
|
|
#include "ProcessPriorityManager.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "SandboxHal.h"
|
2012-08-01 23:02:29 -07:00
|
|
|
#include "StructuredCloneUtils.h"
|
2012-07-17 16:59:44 -07:00
|
|
|
#include "TabParent.h"
|
2012-08-23 12:33:46 -07:00
|
|
|
#include "URIUtils.h"
|
2013-05-06 21:10:31 -07:00
|
|
|
#include "nsIWebBrowserChrome.h"
|
|
|
|
#include "nsIDocShell.h"
|
2011-02-14 14:34:46 -08:00
|
|
|
|
2012-07-17 16:59:44 -07:00
|
|
|
#ifdef ANDROID
|
|
|
|
# include "gfxAndroidPlatform.h"
|
2010-10-09 11:07:38 -07:00
|
|
|
#endif
|
|
|
|
|
2010-11-24 05:58:21 -08:00
|
|
|
#ifdef MOZ_CRASHREPORTER
|
2012-07-17 16:59:44 -07:00
|
|
|
# include "nsExceptionHandler.h"
|
|
|
|
# include "nsICrashReporter.h"
|
2010-11-24 05:58:21 -08:00
|
|
|
#endif
|
|
|
|
|
2012-07-17 16:59:44 -07:00
|
|
|
#ifdef MOZ_PERMISSIONS
|
|
|
|
# include "nsPermissionManager.h"
|
|
|
|
#endif
|
2011-02-16 10:43:23 -08:00
|
|
|
|
2011-11-10 16:17:46 -08:00
|
|
|
#ifdef MOZ_WIDGET_ANDROID
|
2012-07-17 16:59:44 -07:00
|
|
|
# include "AndroidBridge.h"
|
2011-01-12 20:04:42 -08:00
|
|
|
#endif
|
|
|
|
|
2012-08-03 16:48:58 -07:00
|
|
|
#ifdef MOZ_WIDGET_GONK
|
|
|
|
#include "nsIVolume.h"
|
|
|
|
#include "nsIVolumeService.h"
|
2012-12-14 16:01:34 -08:00
|
|
|
using namespace mozilla::system;
|
2012-08-03 16:48:58 -07:00
|
|
|
#endif
|
|
|
|
|
2012-09-13 09:37:14 -07:00
|
|
|
#ifdef MOZ_B2G_BT
|
|
|
|
#include "BluetoothParent.h"
|
|
|
|
#include "BluetoothService.h"
|
|
|
|
#endif
|
|
|
|
|
2013-02-27 12:31:19 -08:00
|
|
|
#include "Crypto.h"
|
|
|
|
|
2013-04-03 15:13:17 -07:00
|
|
|
#ifdef MOZ_WEBSPEECH
|
|
|
|
#include "mozilla/dom/SpeechSynthesisParent.h"
|
|
|
|
#endif
|
|
|
|
|
2011-02-28 21:36:43 -08:00
|
|
|
static NS_DEFINE_CID(kCClipboardCID, NS_CLIPBOARD_CID);
|
|
|
|
static const char* sClipboardTextFlavors[] = { kUnicodeMime };
|
|
|
|
|
2012-12-19 23:41:08 -08:00
|
|
|
using base::ChildPrivileges;
|
2011-01-19 22:14:12 -08:00
|
|
|
using base::KillProcess;
|
2012-09-13 09:37:14 -07:00
|
|
|
using namespace mozilla::dom::bluetooth;
|
2012-06-19 16:14:39 -07:00
|
|
|
using namespace mozilla::dom::devicestorage;
|
2012-07-14 04:24:20 -07:00
|
|
|
using namespace mozilla::dom::indexedDB;
|
2013-02-14 12:41:30 -08:00
|
|
|
using namespace mozilla::dom::power;
|
2013-03-01 00:38:47 -08:00
|
|
|
using namespace mozilla::dom::mobilemessage;
|
2013-01-26 13:14:01 -08:00
|
|
|
using namespace mozilla::hal;
|
2013-02-26 09:27:31 -08:00
|
|
|
using namespace mozilla::idl;
|
2012-07-17 16:59:44 -07:00
|
|
|
using namespace mozilla::ipc;
|
|
|
|
using namespace mozilla::layers;
|
|
|
|
using namespace mozilla::net;
|
2009-09-02 17:18:27 -07:00
|
|
|
|
2009-08-12 09:18:08 -07:00
|
|
|
namespace mozilla {
|
|
|
|
namespace dom {
|
|
|
|
|
2010-05-11 10:22:34 -07:00
|
|
|
#define NS_IPC_IOSERVICE_SET_OFFLINE_TOPIC "ipc:network:set-offline"
|
2010-05-11 05:44:12 -07:00
|
|
|
|
2013-01-14 16:28:36 -08:00
|
|
|
// This represents a single measurement taken by a memory reporter in a child
|
|
|
|
// process and passed to this one. Its process is non-empty, and its amount is
|
|
|
|
// fixed.
|
|
|
|
class ChildMemoryReporter MOZ_FINAL : public MemoryReporterBase
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
ChildMemoryReporter(const char* aProcess, const char* aPath, int32_t aKind,
|
|
|
|
int32_t aUnits, int64_t aAmount,
|
|
|
|
const char* aDescription)
|
|
|
|
: MemoryReporterBase(aPath, aKind, aUnits, aDescription)
|
|
|
|
, mProcess(aProcess)
|
|
|
|
, mAmount(aAmount)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
int64_t Amount() { return mAmount; }
|
|
|
|
|
|
|
|
nsCString mProcess;
|
|
|
|
int64_t mAmount;
|
|
|
|
};
|
|
|
|
|
2011-02-16 10:43:23 -08:00
|
|
|
class MemoryReportRequestParent : public PMemoryReportRequestParent
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
MemoryReportRequestParent();
|
|
|
|
virtual ~MemoryReportRequestParent();
|
|
|
|
|
2013-01-14 16:28:36 -08:00
|
|
|
virtual bool Recv__delete__(const InfallibleTArray<MemoryReport>& report);
|
2011-02-16 10:43:23 -08:00
|
|
|
private:
|
|
|
|
ContentParent* Owner()
|
|
|
|
{
|
|
|
|
return static_cast<ContentParent*>(Manager());
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
MemoryReportRequestParent::MemoryReportRequestParent()
|
|
|
|
{
|
|
|
|
MOZ_COUNT_CTOR(MemoryReportRequestParent);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
MemoryReportRequestParent::Recv__delete__(const InfallibleTArray<MemoryReport>& report)
|
|
|
|
{
|
|
|
|
Owner()->SetChildMemoryReporters(report);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
MemoryReportRequestParent::~MemoryReportRequestParent()
|
|
|
|
{
|
|
|
|
MOZ_COUNT_DTOR(MemoryReportRequestParent);
|
|
|
|
}
|
|
|
|
|
2013-04-25 17:53:26 -07:00
|
|
|
nsDataHashtable<nsStringHashKey, ContentParent*>* ContentParent::sAppContentParents;
|
|
|
|
nsTArray<ContentParent*>* ContentParent::sNonAppContentParents;
|
|
|
|
nsTArray<ContentParent*>* ContentParent::sPrivateContent;
|
2013-04-25 17:53:26 -07:00
|
|
|
LinkedList<ContentParent> ContentParent::sContentParents;
|
2009-08-12 09:18:08 -07:00
|
|
|
|
2012-12-28 01:45:16 -08:00
|
|
|
// This is true when subprocess launching is enabled. This is the
|
|
|
|
// case between StartUp() and ShutDown() or JoinAllSubprocesses().
|
|
|
|
static bool sCanLaunchSubprocesses;
|
|
|
|
|
2011-09-30 00:00:48 -07:00
|
|
|
// The first content child has ID 1, so the chrome process can have ID 0.
|
2012-08-22 08:56:38 -07:00
|
|
|
static uint64_t gContentChildID = 1;
|
2011-09-30 00:00:48 -07:00
|
|
|
|
2012-08-15 18:46:03 -07:00
|
|
|
// We want the prelaunched process to know that it's for apps, but not
|
|
|
|
// actually for any app in particular. Use a magic manifest URL.
|
|
|
|
// Can't be a static constant.
|
|
|
|
#define MAGIC_PREALLOCATED_APP_MANIFEST_URL NS_LITERAL_STRING("{{template}}")
|
|
|
|
|
2013-04-25 17:53:26 -07:00
|
|
|
// PreallocateAppProcess is called by the PreallocatedProcessManager.
|
|
|
|
// ContentParent then takes this process back within
|
|
|
|
// MaybeTakePreallocatedAppProcess.
|
|
|
|
|
|
|
|
/*static*/ already_AddRefed<ContentParent>
|
2012-08-15 18:46:03 -07:00
|
|
|
ContentParent::PreallocateAppProcess()
|
|
|
|
{
|
2013-04-25 17:53:26 -07:00
|
|
|
nsRefPtr<ContentParent> process =
|
2013-04-25 17:53:26 -07:00
|
|
|
new ContentParent(/* app = */ nullptr,
|
|
|
|
/* isForBrowserElement = */ false,
|
|
|
|
/* isForPreallocated = */ true,
|
2013-01-17 12:06:36 -08:00
|
|
|
// Final privileges are set when we
|
|
|
|
// transform into our app.
|
2013-02-14 12:41:30 -08:00
|
|
|
base::PRIVILEGES_INHERIT,
|
|
|
|
PROCESS_PRIORITY_BACKGROUND);
|
2013-04-25 17:53:26 -07:00
|
|
|
process->Init();
|
|
|
|
return process.forget();
|
2012-08-15 18:46:03 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*static*/ already_AddRefed<ContentParent>
|
2013-02-08 06:32:23 -08:00
|
|
|
ContentParent::MaybeTakePreallocatedAppProcess(const nsAString& aAppManifestURL,
|
2013-02-14 12:41:30 -08:00
|
|
|
ChildPrivileges aPrivs,
|
|
|
|
ProcessPriority aInitialPriority)
|
2012-08-15 18:46:03 -07:00
|
|
|
{
|
2013-04-25 17:53:26 -07:00
|
|
|
nsRefPtr<ContentParent> process = PreallocatedProcessManager::Take();
|
2013-02-08 06:32:23 -08:00
|
|
|
if (!process) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2013-02-14 12:41:30 -08:00
|
|
|
if (!process->SetPriorityAndCheckIsAlive(aInitialPriority) ||
|
|
|
|
!process->TransformPreallocatedIntoApp(aAppManifestURL, aPrivs)) {
|
2013-02-08 06:32:23 -08:00
|
|
|
// Kill the process just in case it's not actually dead; we don't want
|
|
|
|
// to "leak" this process!
|
|
|
|
process->KillHard();
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2012-08-15 18:46:03 -07:00
|
|
|
return process.forget();
|
|
|
|
}
|
|
|
|
|
|
|
|
/*static*/ void
|
|
|
|
ContentParent::StartUp()
|
|
|
|
{
|
|
|
|
if (XRE_GetProcessType() != GeckoProcessType_Default) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2012-12-28 01:45:16 -08:00
|
|
|
sCanLaunchSubprocesses = true;
|
2013-04-25 17:53:26 -07:00
|
|
|
|
|
|
|
// Try to preallocate a process that we can transform into an app later.
|
|
|
|
PreallocatedProcessManager::AllocateAfterDelay();
|
2012-08-15 18:46:03 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*static*/ void
|
|
|
|
ContentParent::ShutDown()
|
|
|
|
{
|
|
|
|
// No-op for now. We rely on normal process shutdown and
|
|
|
|
// ClearOnShutdown() to clean up our state.
|
2012-12-28 01:45:16 -08:00
|
|
|
sCanLaunchSubprocesses = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*static*/ void
|
|
|
|
ContentParent::JoinProcessesIOThread(const nsTArray<ContentParent*>* aProcesses,
|
|
|
|
Monitor* aMonitor, bool* aDone)
|
|
|
|
{
|
|
|
|
const nsTArray<ContentParent*>& processes = *aProcesses;
|
|
|
|
for (uint32_t i = 0; i < processes.Length(); ++i) {
|
|
|
|
if (GeckoChildProcessHost* process = processes[i]->mSubprocess) {
|
|
|
|
process->Join();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
{
|
|
|
|
MonitorAutoLock lock(*aMonitor);
|
|
|
|
*aDone = true;
|
|
|
|
lock.Notify();
|
|
|
|
}
|
|
|
|
// Don't touch any arguments to this function from now on.
|
|
|
|
}
|
|
|
|
|
|
|
|
/*static*/ void
|
|
|
|
ContentParent::JoinAllSubprocesses()
|
|
|
|
{
|
|
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
|
|
|
|
nsAutoTArray<ContentParent*, 8> processes;
|
|
|
|
GetAll(processes);
|
|
|
|
if (processes.IsEmpty()) {
|
|
|
|
printf_stderr("There are no live subprocesses.");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
printf_stderr("Subprocesses are still alive. Doing emergency join.\n");
|
|
|
|
|
|
|
|
bool done = false;
|
|
|
|
Monitor monitor("mozilla.dom.ContentParent.JoinAllSubprocesses");
|
|
|
|
XRE_GetIOMessageLoop()->PostTask(FROM_HERE,
|
|
|
|
NewRunnableFunction(
|
|
|
|
&ContentParent::JoinProcessesIOThread,
|
|
|
|
&processes, &monitor, &done));
|
|
|
|
{
|
|
|
|
MonitorAutoLock lock(monitor);
|
|
|
|
while (!done) {
|
|
|
|
lock.Wait();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
sCanLaunchSubprocesses = false;
|
2012-08-15 18:46:03 -07:00
|
|
|
}
|
|
|
|
|
2013-04-02 16:52:51 -07:00
|
|
|
/*static*/ already_AddRefed<ContentParent>
|
2012-08-23 03:23:43 -07:00
|
|
|
ContentParent::GetNewOrUsed(bool aForBrowserElement)
|
2009-08-12 09:18:08 -07:00
|
|
|
{
|
2013-04-25 17:53:26 -07:00
|
|
|
if (!sNonAppContentParents)
|
|
|
|
sNonAppContentParents = new nsTArray<ContentParent*>();
|
2011-08-02 12:35:42 -07:00
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
int32_t maxContentProcesses = Preferences::GetInt("dom.ipc.processCount", 1);
|
2011-08-02 12:35:42 -07:00
|
|
|
if (maxContentProcesses < 1)
|
|
|
|
maxContentProcesses = 1;
|
|
|
|
|
2013-04-25 17:53:26 -07:00
|
|
|
if (sNonAppContentParents->Length() >= uint32_t(maxContentProcesses)) {
|
|
|
|
uint32_t idx = rand() % sNonAppContentParents->Length();
|
|
|
|
nsRefPtr<ContentParent> p = (*sNonAppContentParents)[idx];
|
|
|
|
NS_ASSERTION(p->IsAlive(), "Non-alive contentparent in sNonAppContentParents?");
|
2013-04-02 16:52:51 -07:00
|
|
|
return p.forget();
|
2011-03-26 13:16:45 -07:00
|
|
|
}
|
2012-08-08 19:58:06 -07:00
|
|
|
|
2012-07-13 14:10:20 -07:00
|
|
|
nsRefPtr<ContentParent> p =
|
2013-04-25 17:53:26 -07:00
|
|
|
new ContentParent(/* app = */ nullptr,
|
2013-02-14 12:41:30 -08:00
|
|
|
aForBrowserElement,
|
2013-04-25 17:53:26 -07:00
|
|
|
/* isForPreallocated = */ false,
|
2013-02-14 12:41:30 -08:00
|
|
|
base::PRIVILEGES_DEFAULT,
|
|
|
|
PROCESS_PRIORITY_FOREGROUND);
|
2011-08-02 12:35:42 -07:00
|
|
|
p->Init();
|
2013-04-25 17:53:26 -07:00
|
|
|
sNonAppContentParents->AppendElement(p);
|
2013-04-02 16:52:51 -07:00
|
|
|
return p.forget();
|
2011-08-02 12:35:42 -07:00
|
|
|
}
|
2010-12-26 12:03:52 -08:00
|
|
|
|
2012-12-19 23:41:08 -08:00
|
|
|
namespace {
|
|
|
|
struct SpecialPermission {
|
|
|
|
const char* perm; // an app permission
|
|
|
|
ChildPrivileges privs; // the OS privilege it requires
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
static ChildPrivileges
|
|
|
|
PrivilegesForApp(mozIApplication* aApp)
|
2012-08-29 05:24:48 -07:00
|
|
|
{
|
2012-12-19 23:41:08 -08:00
|
|
|
const SpecialPermission specialPermissions[] = {
|
2012-09-20 16:26:41 -07:00
|
|
|
// FIXME/bug 785592: implement a CameraBridge so we don't have
|
|
|
|
// to hack around with OS permissions
|
2013-03-12 23:44:43 -07:00
|
|
|
{ "camera", base::PRIVILEGES_CAMERA }
|
2012-09-20 16:26:41 -07:00
|
|
|
};
|
2012-12-19 23:41:08 -08:00
|
|
|
for (size_t i = 0; i < ArrayLength(specialPermissions); ++i) {
|
|
|
|
const char* const permission = specialPermissions[i].perm;
|
|
|
|
bool hasPermission = false;
|
|
|
|
if (NS_FAILED(aApp->HasPermission(permission, &hasPermission))) {
|
2012-09-20 16:26:41 -07:00
|
|
|
NS_WARNING("Unable to check permissions. Breakage may follow.");
|
2012-12-19 23:41:08 -08:00
|
|
|
break;
|
|
|
|
} else if (hasPermission) {
|
|
|
|
return specialPermissions[i].privs;
|
2012-09-20 16:26:41 -07:00
|
|
|
}
|
2012-08-29 05:24:48 -07:00
|
|
|
}
|
2012-12-19 23:41:08 -08:00
|
|
|
return base::PRIVILEGES_DEFAULT;
|
2012-08-29 05:24:48 -07:00
|
|
|
}
|
|
|
|
|
2013-02-14 12:41:30 -08:00
|
|
|
/*static*/ ProcessPriority
|
|
|
|
ContentParent::GetInitialProcessPriority(nsIDOMElement* aFrameElement)
|
|
|
|
{
|
|
|
|
// Frames with mozapptype == critical which are expecting a system message
|
|
|
|
// get FOREGROUND_HIGH priority. All other frames get FOREGROUND priority.
|
|
|
|
|
|
|
|
if (!aFrameElement) {
|
|
|
|
return PROCESS_PRIORITY_FOREGROUND;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsAutoString appType;
|
|
|
|
nsCOMPtr<Element> frameElement = do_QueryInterface(aFrameElement);
|
|
|
|
frameElement->GetAttr(kNameSpaceID_None, nsGkAtoms::mozapptype, appType);
|
|
|
|
if (appType != NS_LITERAL_STRING("critical")) {
|
|
|
|
return PROCESS_PRIORITY_FOREGROUND;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIMozBrowserFrame> browserFrame =
|
|
|
|
do_QueryInterface(aFrameElement);
|
|
|
|
if (!browserFrame) {
|
|
|
|
return PROCESS_PRIORITY_FOREGROUND;
|
|
|
|
}
|
|
|
|
|
|
|
|
return browserFrame->GetIsExpectingSystemMessage() ?
|
|
|
|
PROCESS_PRIORITY_FOREGROUND_HIGH :
|
|
|
|
PROCESS_PRIORITY_FOREGROUND;
|
|
|
|
}
|
|
|
|
|
2012-08-08 19:58:06 -07:00
|
|
|
/*static*/ TabParent*
|
2013-02-14 12:41:30 -08:00
|
|
|
ContentParent::CreateBrowserOrApp(const TabContext& aContext,
|
|
|
|
nsIDOMElement* aFrameElement)
|
2012-07-13 14:10:20 -07:00
|
|
|
{
|
2012-12-28 01:45:16 -08:00
|
|
|
if (!sCanLaunchSubprocesses) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
Bug 802366 - The main event: Let a browser process inherit its app's id. r=bz,cjones
The main bug fixed here is that in half of our interfaces, we use "is browser frame/element" to mean "browser or app", and in the other half, we use it to mean "is browser not app".
There's a related, functional bug also fixed here, which is that a browser process doesn't inherit its parent's app-id. This causes problems e.g. for IndexedDB: If a browser inside an app uses IndexedDB, the DB should have the app's app-id.
I also modified Tab{Parent,Child} and nsFrameLoader to call "app" "ownOrContainingApp", to emphasize that we might have inherited the app from a parent process. I left nsIDocShell::appId alone, because changing that would have necessitated changing nsILoadGroup and therefore a /lot/ of users in Necko; it's also not clear it would have clarified anything in those cases.
2012-11-10 10:32:37 -08:00
|
|
|
if (aContext.IsBrowserElement() || !aContext.HasOwnApp()) {
|
2013-04-02 16:52:51 -07:00
|
|
|
if (nsRefPtr<ContentParent> cp = GetNewOrUsed(aContext.IsBrowserElement())) {
|
Bug 802366 - The main event: Let a browser process inherit its app's id. r=bz,cjones
The main bug fixed here is that in half of our interfaces, we use "is browser frame/element" to mean "browser or app", and in the other half, we use it to mean "is browser not app".
There's a related, functional bug also fixed here, which is that a browser process doesn't inherit its parent's app-id. This causes problems e.g. for IndexedDB: If a browser inside an app uses IndexedDB, the DB should have the app's app-id.
I also modified Tab{Parent,Child} and nsFrameLoader to call "app" "ownOrContainingApp", to emphasize that we might have inherited the app from a parent process. I left nsIDocShell::appId alone, because changing that would have necessitated changing nsILoadGroup and therefore a /lot/ of users in Necko; it's also not clear it would have clarified anything in those cases.
2012-11-10 10:32:37 -08:00
|
|
|
nsRefPtr<TabParent> tp(new TabParent(aContext));
|
2013-02-14 12:41:30 -08:00
|
|
|
tp->SetOwnerElement(aFrameElement);
|
2013-05-06 21:10:31 -07:00
|
|
|
uint32_t chromeFlags = 0;
|
|
|
|
|
|
|
|
// Propagate the private-browsing status of the element's parent
|
|
|
|
// docshell to the remote docshell, via the chrome flags.
|
|
|
|
nsCOMPtr<Element> frameElement = do_QueryInterface(aFrameElement);
|
|
|
|
MOZ_ASSERT(frameElement);
|
|
|
|
nsIDocShell* docShell =
|
|
|
|
frameElement->OwnerDoc()->GetWindow()->GetDocShell();
|
|
|
|
MOZ_ASSERT(docShell);
|
|
|
|
nsCOMPtr<nsILoadContext> loadContext = do_QueryInterface(docShell);
|
|
|
|
if (loadContext && loadContext->UsePrivateBrowsing()) {
|
|
|
|
chromeFlags |= nsIWebBrowserChrome::CHROME_PRIVATE_WINDOW;
|
|
|
|
}
|
|
|
|
bool affectLifetime;
|
|
|
|
docShell->GetAffectPrivateSessionLifetime(&affectLifetime);
|
|
|
|
if (affectLifetime) {
|
|
|
|
chromeFlags |= nsIWebBrowserChrome::CHROME_PRIVATE_LIFETIME;
|
|
|
|
}
|
|
|
|
|
Bug 802366 - The main event: Let a browser process inherit its app's id. r=bz,cjones
The main bug fixed here is that in half of our interfaces, we use "is browser frame/element" to mean "browser or app", and in the other half, we use it to mean "is browser not app".
There's a related, functional bug also fixed here, which is that a browser process doesn't inherit its parent's app-id. This causes problems e.g. for IndexedDB: If a browser inside an app uses IndexedDB, the DB should have the app's app-id.
I also modified Tab{Parent,Child} and nsFrameLoader to call "app" "ownOrContainingApp", to emphasize that we might have inherited the app from a parent process. I left nsIDocShell::appId alone, because changing that would have necessitated changing nsILoadGroup and therefore a /lot/ of users in Necko; it's also not clear it would have clarified anything in those cases.
2012-11-10 10:32:37 -08:00
|
|
|
PBrowserParent* browser = cp->SendPBrowserConstructor(
|
|
|
|
tp.forget().get(), // DeallocPBrowserParent() releases this ref.
|
|
|
|
aContext.AsIPCTabContext(),
|
2013-05-06 21:10:31 -07:00
|
|
|
chromeFlags);
|
Bug 802366 - The main event: Let a browser process inherit its app's id. r=bz,cjones
The main bug fixed here is that in half of our interfaces, we use "is browser frame/element" to mean "browser or app", and in the other half, we use it to mean "is browser not app".
There's a related, functional bug also fixed here, which is that a browser process doesn't inherit its parent's app-id. This causes problems e.g. for IndexedDB: If a browser inside an app uses IndexedDB, the DB should have the app's app-id.
I also modified Tab{Parent,Child} and nsFrameLoader to call "app" "ownOrContainingApp", to emphasize that we might have inherited the app from a parent process. I left nsIDocShell::appId alone, because changing that would have necessitated changing nsILoadGroup and therefore a /lot/ of users in Necko; it's also not clear it would have clarified anything in those cases.
2012-11-10 10:32:37 -08:00
|
|
|
return static_cast<TabParent*>(browser);
|
2012-08-08 19:58:06 -07:00
|
|
|
}
|
|
|
|
return nullptr;
|
2012-07-13 14:10:20 -07:00
|
|
|
}
|
|
|
|
|
Bug 802366 - The main event: Let a browser process inherit its app's id. r=bz,cjones
The main bug fixed here is that in half of our interfaces, we use "is browser frame/element" to mean "browser or app", and in the other half, we use it to mean "is browser not app".
There's a related, functional bug also fixed here, which is that a browser process doesn't inherit its parent's app-id. This causes problems e.g. for IndexedDB: If a browser inside an app uses IndexedDB, the DB should have the app's app-id.
I also modified Tab{Parent,Child} and nsFrameLoader to call "app" "ownOrContainingApp", to emphasize that we might have inherited the app from a parent process. I left nsIDocShell::appId alone, because changing that would have necessitated changing nsILoadGroup and therefore a /lot/ of users in Necko; it's also not clear it would have clarified anything in those cases.
2012-11-10 10:32:37 -08:00
|
|
|
// If we got here, we have an app and we're not a browser element. ownApp
|
|
|
|
// shouldn't be null, because we otherwise would have gone into the
|
|
|
|
// !HasOwnApp() branch above.
|
|
|
|
nsCOMPtr<mozIApplication> ownApp = aContext.GetOwnApp();
|
|
|
|
|
2013-04-25 17:53:26 -07:00
|
|
|
if (!sAppContentParents) {
|
|
|
|
sAppContentParents =
|
2012-07-13 14:10:20 -07:00
|
|
|
new nsDataHashtable<nsStringHashKey, ContentParent*>();
|
2013-04-25 17:53:26 -07:00
|
|
|
sAppContentParents->Init();
|
2012-07-13 14:10:20 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
// Each app gets its own ContentParent instance.
|
2012-08-08 19:58:06 -07:00
|
|
|
nsAutoString manifestURL;
|
Bug 802366 - The main event: Let a browser process inherit its app's id. r=bz,cjones
The main bug fixed here is that in half of our interfaces, we use "is browser frame/element" to mean "browser or app", and in the other half, we use it to mean "is browser not app".
There's a related, functional bug also fixed here, which is that a browser process doesn't inherit its parent's app-id. This causes problems e.g. for IndexedDB: If a browser inside an app uses IndexedDB, the DB should have the app's app-id.
I also modified Tab{Parent,Child} and nsFrameLoader to call "app" "ownOrContainingApp", to emphasize that we might have inherited the app from a parent process. I left nsIDocShell::appId alone, because changing that would have necessitated changing nsILoadGroup and therefore a /lot/ of users in Necko; it's also not clear it would have clarified anything in those cases.
2012-11-10 10:32:37 -08:00
|
|
|
if (NS_FAILED(ownApp->GetManifestURL(manifestURL))) {
|
2012-08-08 19:58:06 -07:00
|
|
|
NS_ERROR("Failed to get manifest URL");
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2013-02-14 12:41:30 -08:00
|
|
|
ProcessPriority initialPriority = GetInitialProcessPriority(aFrameElement);
|
|
|
|
|
2013-04-25 17:53:26 -07:00
|
|
|
nsRefPtr<ContentParent> p = sAppContentParents->Get(manifestURL);
|
2013-02-14 12:41:30 -08:00
|
|
|
if (p) {
|
|
|
|
// Check that the process is still alive and set its priority.
|
|
|
|
// Hopefully the process won't die after this point, if this call
|
|
|
|
// succeeds.
|
|
|
|
if (!p->SetPriorityAndCheckIsAlive(initialPriority)) {
|
|
|
|
p = nullptr;
|
|
|
|
}
|
|
|
|
}
|
2013-02-14 12:41:30 -08:00
|
|
|
|
2013-02-14 12:41:30 -08:00
|
|
|
if (!p) {
|
2012-12-19 23:41:08 -08:00
|
|
|
ChildPrivileges privs = PrivilegesForApp(ownApp);
|
2013-02-14 12:41:30 -08:00
|
|
|
p = MaybeTakePreallocatedAppProcess(manifestURL, privs,
|
|
|
|
initialPriority);
|
2013-02-08 06:32:23 -08:00
|
|
|
if (!p) {
|
2013-01-17 12:06:36 -08:00
|
|
|
NS_WARNING("Unable to use pre-allocated app process");
|
2013-04-25 17:53:26 -07:00
|
|
|
p = new ContentParent(ownApp,
|
|
|
|
/* isForBrowserElement = */ false,
|
|
|
|
/* isForPreallocated = */ false,
|
|
|
|
privs,
|
|
|
|
initialPriority);
|
2012-08-15 18:46:03 -07:00
|
|
|
p->Init();
|
|
|
|
}
|
2013-04-25 17:53:26 -07:00
|
|
|
sAppContentParents->Put(manifestURL, p);
|
2012-07-13 14:10:20 -07:00
|
|
|
}
|
|
|
|
|
Bug 802366 - The main event: Let a browser process inherit its app's id. r=bz,cjones
The main bug fixed here is that in half of our interfaces, we use "is browser frame/element" to mean "browser or app", and in the other half, we use it to mean "is browser not app".
There's a related, functional bug also fixed here, which is that a browser process doesn't inherit its parent's app-id. This causes problems e.g. for IndexedDB: If a browser inside an app uses IndexedDB, the DB should have the app's app-id.
I also modified Tab{Parent,Child} and nsFrameLoader to call "app" "ownOrContainingApp", to emphasize that we might have inherited the app from a parent process. I left nsIDocShell::appId alone, because changing that would have necessitated changing nsILoadGroup and therefore a /lot/ of users in Necko; it's also not clear it would have clarified anything in those cases.
2012-11-10 10:32:37 -08:00
|
|
|
nsRefPtr<TabParent> tp = new TabParent(aContext);
|
2013-02-14 12:41:30 -08:00
|
|
|
tp->SetOwnerElement(aFrameElement);
|
Bug 802366 - The main event: Let a browser process inherit its app's id. r=bz,cjones
The main bug fixed here is that in half of our interfaces, we use "is browser frame/element" to mean "browser or app", and in the other half, we use it to mean "is browser not app".
There's a related, functional bug also fixed here, which is that a browser process doesn't inherit its parent's app-id. This causes problems e.g. for IndexedDB: If a browser inside an app uses IndexedDB, the DB should have the app's app-id.
I also modified Tab{Parent,Child} and nsFrameLoader to call "app" "ownOrContainingApp", to emphasize that we might have inherited the app from a parent process. I left nsIDocShell::appId alone, because changing that would have necessitated changing nsILoadGroup and therefore a /lot/ of users in Necko; it's also not clear it would have clarified anything in those cases.
2012-11-10 10:32:37 -08:00
|
|
|
PBrowserParent* browser = p->SendPBrowserConstructor(
|
2013-04-25 17:53:26 -07:00
|
|
|
nsRefPtr<TabParent>(tp).forget().get(), // DeallocPBrowserParent() releases this ref.
|
Bug 802366 - The main event: Let a browser process inherit its app's id. r=bz,cjones
The main bug fixed here is that in half of our interfaces, we use "is browser frame/element" to mean "browser or app", and in the other half, we use it to mean "is browser not app".
There's a related, functional bug also fixed here, which is that a browser process doesn't inherit its parent's app-id. This causes problems e.g. for IndexedDB: If a browser inside an app uses IndexedDB, the DB should have the app's app-id.
I also modified Tab{Parent,Child} and nsFrameLoader to call "app" "ownOrContainingApp", to emphasize that we might have inherited the app from a parent process. I left nsIDocShell::appId alone, because changing that would have necessitated changing nsILoadGroup and therefore a /lot/ of users in Necko; it's also not clear it would have clarified anything in those cases.
2012-11-10 10:32:37 -08:00
|
|
|
aContext.AsIPCTabContext(),
|
|
|
|
/* chromeFlags */ 0);
|
2013-02-14 12:41:30 -08:00
|
|
|
|
|
|
|
p->MaybeTakeCPUWakeLock(aFrameElement);
|
|
|
|
|
Bug 802366 - The main event: Let a browser process inherit its app's id. r=bz,cjones
The main bug fixed here is that in half of our interfaces, we use "is browser frame/element" to mean "browser or app", and in the other half, we use it to mean "is browser not app".
There's a related, functional bug also fixed here, which is that a browser process doesn't inherit its parent's app-id. This causes problems e.g. for IndexedDB: If a browser inside an app uses IndexedDB, the DB should have the app's app-id.
I also modified Tab{Parent,Child} and nsFrameLoader to call "app" "ownOrContainingApp", to emphasize that we might have inherited the app from a parent process. I left nsIDocShell::appId alone, because changing that would have necessitated changing nsILoadGroup and therefore a /lot/ of users in Necko; it's also not clear it would have clarified anything in those cases.
2012-11-10 10:32:37 -08:00
|
|
|
return static_cast<TabParent*>(browser);
|
2012-07-13 14:10:20 -07:00
|
|
|
}
|
|
|
|
|
2011-08-02 12:35:42 -07:00
|
|
|
void
|
|
|
|
ContentParent::GetAll(nsTArray<ContentParent*>& aArray)
|
|
|
|
{
|
2012-07-13 14:10:20 -07:00
|
|
|
aArray.Clear();
|
|
|
|
|
2013-04-25 17:53:26 -07:00
|
|
|
for (ContentParent* cp = sContentParents.getFirst(); cp;
|
|
|
|
cp = cp->getNext()) {
|
|
|
|
aArray.AppendElement(cp);
|
2012-10-02 18:19:11 -07:00
|
|
|
}
|
2009-08-12 09:18:08 -07:00
|
|
|
}
|
|
|
|
|
2010-12-26 12:03:52 -08:00
|
|
|
void
|
|
|
|
ContentParent::Init()
|
|
|
|
{
|
|
|
|
nsCOMPtr<nsIObserverService> obs = mozilla::services::GetObserverService();
|
|
|
|
if (obs) {
|
2011-10-17 07:59:28 -07:00
|
|
|
obs->AddObserver(this, "xpcom-shutdown", false);
|
|
|
|
obs->AddObserver(this, NS_IPC_IOSERVICE_SET_OFFLINE_TOPIC, false);
|
|
|
|
obs->AddObserver(this, "child-memory-reporter-request", false);
|
|
|
|
obs->AddObserver(this, "memory-pressure", false);
|
|
|
|
obs->AddObserver(this, "child-gc-request", false);
|
|
|
|
obs->AddObserver(this, "child-cc-request", false);
|
2012-04-19 17:13:20 -07:00
|
|
|
obs->AddObserver(this, "last-pb-context-exited", false);
|
2012-08-17 19:43:00 -07:00
|
|
|
obs->AddObserver(this, "file-watcher-update", false);
|
2012-08-03 16:48:58 -07:00
|
|
|
#ifdef MOZ_WIDGET_GONK
|
|
|
|
obs->AddObserver(this, NS_VOLUME_STATE_CHANGED, false);
|
|
|
|
#endif
|
2011-07-20 21:37:32 -07:00
|
|
|
#ifdef ACCESSIBILITY
|
2011-10-17 07:59:28 -07:00
|
|
|
obs->AddObserver(this, "a11y-init-or-shutdown", false);
|
2011-07-20 21:37:32 -07:00
|
|
|
#endif
|
2010-12-26 12:03:52 -08:00
|
|
|
}
|
2012-04-03 21:09:20 -07:00
|
|
|
Preferences::AddStrongObserver(this, "");
|
2010-12-26 12:03:52 -08:00
|
|
|
nsCOMPtr<nsIThreadInternal>
|
|
|
|
threadInt(do_QueryInterface(NS_GetCurrentThread()));
|
|
|
|
if (threadInt) {
|
2011-12-02 04:33:05 -08:00
|
|
|
threadInt->AddObserver(this);
|
2010-12-26 12:03:52 -08:00
|
|
|
}
|
|
|
|
if (obs) {
|
2012-07-30 07:20:58 -07:00
|
|
|
obs->NotifyObservers(static_cast<nsIObserver*>(this), "ipc:content-created", nullptr);
|
2010-12-26 12:03:52 -08:00
|
|
|
}
|
2011-07-20 21:37:32 -07:00
|
|
|
|
|
|
|
#ifdef ACCESSIBILITY
|
|
|
|
// If accessibility is running in chrome process then start it in content
|
|
|
|
// process.
|
|
|
|
if (nsIPresShell::IsAccessibilityActive()) {
|
2011-09-18 12:02:27 -07:00
|
|
|
unused << SendActivateA11y();
|
2011-07-20 21:37:32 -07:00
|
|
|
}
|
|
|
|
#endif
|
2013-01-09 07:03:28 -08:00
|
|
|
|
|
|
|
DebugOnly<FileUpdateDispatcher*> observer = FileUpdateDispatcher::GetSingleton();
|
|
|
|
NS_ASSERTION(observer, "FileUpdateDispatcher is null");
|
2010-12-26 12:03:52 -08:00
|
|
|
}
|
|
|
|
|
2013-02-14 12:41:30 -08:00
|
|
|
namespace {
|
|
|
|
|
|
|
|
class SystemMessageHandledListener MOZ_FINAL
|
|
|
|
: public nsITimerCallback
|
|
|
|
, public LinkedListElement<SystemMessageHandledListener>
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
NS_DECL_ISUPPORTS
|
|
|
|
|
|
|
|
SystemMessageHandledListener() {}
|
|
|
|
|
|
|
|
static void OnSystemMessageHandled()
|
|
|
|
{
|
|
|
|
if (!sListeners) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
SystemMessageHandledListener* listener = sListeners->popFirst();
|
|
|
|
if (!listener) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Careful: ShutDown() may delete |this|.
|
|
|
|
listener->ShutDown();
|
|
|
|
}
|
|
|
|
|
|
|
|
void Init(nsIDOMMozWakeLock* aWakeLock)
|
|
|
|
{
|
|
|
|
MOZ_ASSERT(!mWakeLock);
|
|
|
|
MOZ_ASSERT(!mTimer);
|
|
|
|
|
|
|
|
// mTimer keeps a strong reference to |this|. When this object's
|
|
|
|
// destructor runs, it will remove itself from the LinkedList.
|
|
|
|
|
|
|
|
if (!sListeners) {
|
|
|
|
sListeners = new LinkedList<SystemMessageHandledListener>();
|
|
|
|
ClearOnShutdown(&sListeners);
|
|
|
|
}
|
|
|
|
sListeners->insertBack(this);
|
|
|
|
|
|
|
|
mWakeLock = aWakeLock;
|
|
|
|
|
|
|
|
mTimer = do_CreateInstance("@mozilla.org/timer;1");
|
|
|
|
|
|
|
|
uint32_t timeoutSec =
|
|
|
|
Preferences::GetInt("dom.ipc.systemMessageCPULockTimeoutSec", 30);
|
|
|
|
mTimer->InitWithCallback(this, timeoutSec * 1000,
|
|
|
|
nsITimer::TYPE_ONE_SHOT);
|
|
|
|
}
|
|
|
|
|
|
|
|
NS_IMETHOD Notify(nsITimer* aTimer)
|
|
|
|
{
|
|
|
|
// Careful: ShutDown() may delete |this|.
|
|
|
|
ShutDown();
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
static StaticAutoPtr<LinkedList<SystemMessageHandledListener> > sListeners;
|
|
|
|
|
|
|
|
void ShutDown()
|
|
|
|
{
|
|
|
|
nsRefPtr<SystemMessageHandledListener> kungFuDeathGrip = this;
|
|
|
|
|
|
|
|
mWakeLock->Unlock();
|
|
|
|
|
|
|
|
if (mTimer) {
|
|
|
|
mTimer->Cancel();
|
|
|
|
mTimer = nullptr;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIDOMMozWakeLock> mWakeLock;
|
|
|
|
nsCOMPtr<nsITimer> mTimer;
|
|
|
|
};
|
|
|
|
|
|
|
|
StaticAutoPtr<LinkedList<SystemMessageHandledListener> >
|
|
|
|
SystemMessageHandledListener::sListeners;
|
|
|
|
|
|
|
|
NS_IMPL_ISUPPORTS1(SystemMessageHandledListener,
|
|
|
|
nsITimerCallback)
|
|
|
|
|
|
|
|
} // anonymous namespace
|
|
|
|
|
|
|
|
void
|
|
|
|
ContentParent::MaybeTakeCPUWakeLock(nsIDOMElement* aFrameElement)
|
|
|
|
{
|
|
|
|
// Take the CPU wake lock on behalf of this processs if it's expecting a
|
|
|
|
// system message. We'll release the CPU lock once the message is
|
|
|
|
// delivered, or after some period of time, which ever comes first.
|
|
|
|
|
|
|
|
nsCOMPtr<nsIMozBrowserFrame> browserFrame =
|
|
|
|
do_QueryInterface(aFrameElement);
|
|
|
|
if (!browserFrame ||
|
|
|
|
!browserFrame->GetIsExpectingSystemMessage()) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsRefPtr<PowerManagerService> pms = PowerManagerService::GetInstance();
|
|
|
|
nsCOMPtr<nsIDOMMozWakeLock> lock =
|
|
|
|
pms->NewWakeLockOnBehalfOfProcess(NS_LITERAL_STRING("cpu"), this);
|
|
|
|
|
|
|
|
// This object's Init() function keeps it alive.
|
|
|
|
nsRefPtr<SystemMessageHandledListener> listener =
|
|
|
|
new SystemMessageHandledListener();
|
|
|
|
listener->Init(lock);
|
|
|
|
}
|
|
|
|
|
2013-02-08 06:32:23 -08:00
|
|
|
bool
|
2013-02-14 12:41:30 -08:00
|
|
|
ContentParent::SetPriorityAndCheckIsAlive(ProcessPriority aPriority)
|
2012-08-15 18:46:03 -07:00
|
|
|
{
|
2013-04-25 17:53:26 -07:00
|
|
|
ProcessPriorityManager::SetProcessPriority(this, aPriority);
|
2013-02-08 06:32:23 -08:00
|
|
|
|
2013-02-14 12:41:30 -08:00
|
|
|
// Now that we've set this process's priority, check whether the process is
|
|
|
|
// still alive. Hopefully we've set the priority to FOREGROUND*, so the
|
|
|
|
// process won't unexpectedly crash after this point!
|
2013-02-14 12:41:29 -08:00
|
|
|
//
|
|
|
|
// It's not legal to call DidProcessCrash on Windows if the process has not
|
2013-02-14 12:41:30 -08:00
|
|
|
// terminated yet, so we have to skip this check here.
|
2013-02-14 12:41:29 -08:00
|
|
|
#ifndef XP_WIN
|
|
|
|
bool exited = false;
|
|
|
|
base::DidProcessCrash(&exited, mSubprocess->GetChildProcessHandle());
|
|
|
|
if (exited) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2013-02-14 12:41:30 -08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-04-25 17:53:26 -07:00
|
|
|
// Helper for ContentParent::TransformPreallocatedIntoApp.
|
|
|
|
static void
|
|
|
|
TryGetNameFromManifestURL(const nsAString& aManifestURL,
|
|
|
|
nsAString& aName)
|
|
|
|
{
|
|
|
|
aName.Truncate();
|
|
|
|
if (aManifestURL.IsEmpty() ||
|
|
|
|
aManifestURL == MAGIC_PREALLOCATED_APP_MANIFEST_URL) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIAppsService> appsService = do_GetService(APPS_SERVICE_CONTRACTID);
|
|
|
|
NS_ENSURE_TRUE_VOID(appsService);
|
|
|
|
|
|
|
|
nsCOMPtr<mozIDOMApplication> domApp;
|
|
|
|
appsService->GetAppByManifestURL(aManifestURL, getter_AddRefs(domApp));
|
|
|
|
|
|
|
|
nsCOMPtr<mozIApplication> app = do_QueryInterface(domApp);
|
|
|
|
if (!app) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
app->GetName(aName);
|
|
|
|
}
|
|
|
|
|
2013-02-14 12:41:30 -08:00
|
|
|
bool
|
|
|
|
ContentParent::TransformPreallocatedIntoApp(const nsAString& aAppManifestURL,
|
|
|
|
ChildPrivileges aPrivs)
|
|
|
|
{
|
2013-04-25 17:53:26 -07:00
|
|
|
MOZ_ASSERT(IsPreallocated());
|
|
|
|
mAppManifestURL = aAppManifestURL;
|
|
|
|
TryGetNameFromManifestURL(aAppManifestURL, mAppName);
|
2013-02-14 12:41:30 -08:00
|
|
|
|
2013-02-08 06:32:23 -08:00
|
|
|
return SendSetProcessPrivileges(aPrivs);
|
2012-08-15 18:46:03 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
ContentParent::ShutDownProcess()
|
2012-07-17 11:27:27 -07:00
|
|
|
{
|
2012-11-27 12:43:52 -08:00
|
|
|
if (!mIsDestroyed) {
|
2012-10-05 12:09:33 -07:00
|
|
|
const InfallibleTArray<PIndexedDBParent*>& idbParents =
|
|
|
|
ManagedPIndexedDBParent();
|
|
|
|
for (uint32_t i = 0; i < idbParents.Length(); ++i) {
|
|
|
|
static_cast<IndexedDBParent*>(idbParents[i])->Disconnect();
|
2012-07-17 11:27:27 -07:00
|
|
|
}
|
2012-10-05 12:09:33 -07:00
|
|
|
|
|
|
|
// Close() can only be called once. It kicks off the
|
|
|
|
// destruction sequence.
|
|
|
|
Close();
|
2012-11-27 12:43:52 -08:00
|
|
|
mIsDestroyed = true;
|
2012-10-05 12:09:33 -07:00
|
|
|
}
|
|
|
|
// NB: must MarkAsDead() here so that this isn't accidentally
|
|
|
|
// returned from Get*() while in the midst of shutdown.
|
|
|
|
MarkAsDead();
|
2012-07-17 11:27:27 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
ContentParent::MarkAsDead()
|
|
|
|
{
|
|
|
|
if (!mAppManifestURL.IsEmpty()) {
|
2013-04-25 17:53:26 -07:00
|
|
|
if (sAppContentParents) {
|
|
|
|
sAppContentParents->Remove(mAppManifestURL);
|
|
|
|
if (!sAppContentParents->Count()) {
|
|
|
|
delete sAppContentParents;
|
|
|
|
sAppContentParents = NULL;
|
2012-07-17 11:27:27 -07:00
|
|
|
}
|
|
|
|
}
|
2013-04-25 17:53:26 -07:00
|
|
|
} else if (sNonAppContentParents) {
|
|
|
|
sNonAppContentParents->RemoveElement(this);
|
|
|
|
if (!sNonAppContentParents->Length()) {
|
|
|
|
delete sNonAppContentParents;
|
|
|
|
sNonAppContentParents = NULL;
|
2012-07-17 11:27:27 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-04-25 17:53:26 -07:00
|
|
|
if (sPrivateContent) {
|
|
|
|
sPrivateContent->RemoveElement(this);
|
|
|
|
if (!sPrivateContent->Length()) {
|
|
|
|
delete sPrivateContent;
|
|
|
|
sPrivateContent = NULL;
|
2012-07-17 11:27:27 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mIsAlive = false;
|
2013-04-25 17:53:26 -07:00
|
|
|
|
|
|
|
// Remove from sContentParents.
|
|
|
|
if (isInList()) {
|
|
|
|
remove();
|
|
|
|
}
|
2012-07-17 11:27:27 -07:00
|
|
|
}
|
|
|
|
|
2010-11-24 05:58:21 -08:00
|
|
|
void
|
2012-09-17 01:37:20 -07:00
|
|
|
ContentParent::OnChannelConnected(int32_t pid)
|
2010-11-24 05:58:21 -08:00
|
|
|
{
|
|
|
|
ProcessHandle handle;
|
|
|
|
if (!base::OpenPrivilegedProcessHandle(pid, &handle)) {
|
|
|
|
NS_WARNING("Can't open handle to child process.");
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
SetOtherProcess(handle);
|
2011-02-14 14:34:46 -08:00
|
|
|
|
|
|
|
#if defined(ANDROID) || defined(LINUX)
|
|
|
|
// Check nice preference
|
2012-08-22 08:56:38 -07:00
|
|
|
int32_t nice = Preferences::GetInt("dom.ipc.content.nice", 0);
|
2011-02-14 14:34:46 -08:00
|
|
|
|
|
|
|
// Environment variable overrides preference
|
|
|
|
char* relativeNicenessStr = getenv("MOZ_CHILD_PROCESS_RELATIVE_NICENESS");
|
|
|
|
if (relativeNicenessStr) {
|
|
|
|
nice = atoi(relativeNicenessStr);
|
|
|
|
}
|
|
|
|
|
2011-06-17 06:26:17 -07:00
|
|
|
/* make the GUI thread have higher priority on single-cpu devices */
|
2011-06-16 19:59:00 -07:00
|
|
|
nsCOMPtr<nsIPropertyBag2> infoService = do_GetService(NS_SYSTEMINFO_CONTRACTID);
|
|
|
|
if (infoService) {
|
2012-08-22 08:56:38 -07:00
|
|
|
int32_t cpus;
|
2011-06-16 19:59:00 -07:00
|
|
|
nsresult rv = infoService->GetPropertyAsInt32(NS_LITERAL_STRING("cpucount"), &cpus);
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
cpus = 1;
|
|
|
|
}
|
|
|
|
if (nice != 0 && cpus == 1) {
|
|
|
|
setpriority(PRIO_PROCESS, pid, getpriority(PRIO_PROCESS, pid) + nice);
|
|
|
|
}
|
2011-02-14 14:34:46 -08:00
|
|
|
}
|
|
|
|
#endif
|
2010-11-24 05:58:21 -08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-07-12 23:52:31 -07:00
|
|
|
void
|
|
|
|
ContentParent::ProcessingError(Result what)
|
|
|
|
{
|
|
|
|
if (MsgDropped == what) {
|
|
|
|
// Messages sent after crashes etc. are not a big deal.
|
|
|
|
return;
|
|
|
|
}
|
2012-09-05 15:18:48 -07:00
|
|
|
// Other errors are big deals.
|
|
|
|
KillHard();
|
2011-07-12 23:52:31 -07:00
|
|
|
}
|
|
|
|
|
2010-11-24 05:58:21 -08:00
|
|
|
namespace {
|
2011-08-30 21:11:25 -07:00
|
|
|
|
2010-11-24 05:58:21 -08:00
|
|
|
void
|
|
|
|
DelayedDeleteSubprocess(GeckoChildProcessHost* aSubprocess)
|
|
|
|
{
|
|
|
|
XRE_GetIOMessageLoop()
|
|
|
|
->PostTask(FROM_HERE,
|
|
|
|
new DeleteTask<GeckoChildProcessHost>(aSubprocess));
|
|
|
|
}
|
2011-08-30 21:11:25 -07:00
|
|
|
|
|
|
|
// This runnable only exists to delegate ownership of the
|
|
|
|
// ContentParent to this runnable, until it's deleted by the event
|
|
|
|
// system.
|
|
|
|
struct DelayedDeleteContentParentTask : public nsRunnable
|
|
|
|
{
|
|
|
|
DelayedDeleteContentParentTask(ContentParent* aObj) : mObj(aObj) { }
|
|
|
|
|
|
|
|
// No-op
|
|
|
|
NS_IMETHODIMP Run() { return NS_OK; }
|
|
|
|
|
|
|
|
nsRefPtr<ContentParent> mObj;
|
|
|
|
};
|
|
|
|
|
2010-11-24 05:58:21 -08:00
|
|
|
}
|
|
|
|
|
2010-02-01 17:53:52 -08:00
|
|
|
void
|
2010-07-19 11:33:33 -07:00
|
|
|
ContentParent::ActorDestroy(ActorDestroyReason why)
|
2010-02-01 17:53:52 -08:00
|
|
|
{
|
2013-01-10 05:22:14 -08:00
|
|
|
if (mForceKillTask) {
|
|
|
|
mForceKillTask->Cancel();
|
|
|
|
mForceKillTask = nullptr;
|
|
|
|
}
|
|
|
|
|
2012-09-27 22:43:24 -07:00
|
|
|
nsRefPtr<nsFrameMessageManager> ppm = mMessageManager;
|
|
|
|
if (ppm) {
|
|
|
|
ppm->ReceiveMessage(static_cast<nsIContentFrameMessageManager*>(ppm.get()),
|
|
|
|
CHILD_PROCESS_SHUTDOWN_MESSAGE, false,
|
2013-05-20 05:40:06 -07:00
|
|
|
nullptr, JS::NullPtr(), nullptr);
|
2012-09-27 22:43:24 -07:00
|
|
|
}
|
2010-02-01 17:53:52 -08:00
|
|
|
nsCOMPtr<nsIThreadObserver>
|
|
|
|
kungFuDeathGrip(static_cast<nsIThreadObserver*>(this));
|
2010-12-26 12:03:52 -08:00
|
|
|
nsCOMPtr<nsIObserverService> obs = mozilla::services::GetObserverService();
|
2010-12-26 11:27:50 -08:00
|
|
|
if (obs) {
|
2010-02-01 17:53:52 -08:00
|
|
|
obs->RemoveObserver(static_cast<nsIObserver*>(this), "xpcom-shutdown");
|
2010-12-26 11:27:50 -08:00
|
|
|
obs->RemoveObserver(static_cast<nsIObserver*>(this), "memory-pressure");
|
2011-02-16 10:43:23 -08:00
|
|
|
obs->RemoveObserver(static_cast<nsIObserver*>(this), "child-memory-reporter-request");
|
|
|
|
obs->RemoveObserver(static_cast<nsIObserver*>(this), NS_IPC_IOSERVICE_SET_OFFLINE_TOPIC);
|
2011-09-13 10:53:51 -07:00
|
|
|
obs->RemoveObserver(static_cast<nsIObserver*>(this), "child-gc-request");
|
|
|
|
obs->RemoveObserver(static_cast<nsIObserver*>(this), "child-cc-request");
|
2012-04-19 17:13:20 -07:00
|
|
|
obs->RemoveObserver(static_cast<nsIObserver*>(this), "last-pb-context-exited");
|
2012-08-17 19:43:00 -07:00
|
|
|
obs->RemoveObserver(static_cast<nsIObserver*>(this), "file-watcher-update");
|
2012-08-03 16:48:58 -07:00
|
|
|
#ifdef MOZ_WIDGET_GONK
|
|
|
|
obs->RemoveObserver(static_cast<nsIObserver*>(this), NS_VOLUME_STATE_CHANGED);
|
|
|
|
#endif
|
2011-07-20 21:37:32 -07:00
|
|
|
#ifdef ACCESSIBILITY
|
|
|
|
obs->RemoveObserver(static_cast<nsIObserver*>(this), "a11y-init-or-shutdown");
|
|
|
|
#endif
|
2010-12-26 11:27:50 -08:00
|
|
|
}
|
|
|
|
|
2011-08-02 12:57:48 -07:00
|
|
|
mMessageManager->Disconnect();
|
|
|
|
|
2011-02-16 10:43:23 -08:00
|
|
|
// clear the child memory reporters
|
|
|
|
InfallibleTArray<MemoryReport> empty;
|
|
|
|
SetChildMemoryReporters(empty);
|
|
|
|
|
2010-12-26 11:27:50 -08:00
|
|
|
// remove the global remote preferences observers
|
2012-04-03 21:09:20 -07:00
|
|
|
Preferences::RemoveObserver(this, "");
|
2010-12-26 11:27:50 -08:00
|
|
|
|
|
|
|
RecvRemoveGeolocationListener();
|
|
|
|
|
2012-11-09 09:52:09 -08:00
|
|
|
mConsoleService = nullptr;
|
|
|
|
|
2010-02-01 17:53:52 -08:00
|
|
|
nsCOMPtr<nsIThreadInternal>
|
|
|
|
threadInt(do_QueryInterface(NS_GetCurrentThread()));
|
|
|
|
if (threadInt)
|
2011-12-02 04:33:05 -08:00
|
|
|
threadInt->RemoveObserver(this);
|
2010-02-01 17:53:52 -08:00
|
|
|
if (mRunToCompletionDepth)
|
|
|
|
mRunToCompletionDepth = 0;
|
2010-04-11 17:24:45 -07:00
|
|
|
|
2012-07-17 11:27:27 -07:00
|
|
|
MarkAsDead();
|
2010-10-08 12:12:40 -07:00
|
|
|
|
|
|
|
if (obs) {
|
2010-11-24 05:58:21 -08:00
|
|
|
nsRefPtr<nsHashPropertyBag> props = new nsHashPropertyBag();
|
|
|
|
props->Init();
|
|
|
|
|
2012-11-17 07:05:18 -08:00
|
|
|
props->SetPropertyAsUint64(NS_LITERAL_STRING("childID"), mChildID);
|
|
|
|
|
2010-11-24 05:58:21 -08:00
|
|
|
if (AbnormalShutdown == why) {
|
2011-10-17 07:59:28 -07:00
|
|
|
props->SetPropertyAsBool(NS_LITERAL_STRING("abnormal"), true);
|
2010-11-24 05:58:21 -08:00
|
|
|
|
|
|
|
#ifdef MOZ_CRASHREPORTER
|
2013-01-03 15:39:25 -08:00
|
|
|
// There's a window in which child processes can crash
|
|
|
|
// after IPC is established, but before a crash reporter
|
|
|
|
// is created.
|
|
|
|
if (ManagedPCrashReporterParent().Length() > 0) {
|
|
|
|
CrashReporterParent* crashReporter =
|
2011-06-08 12:56:31 -07:00
|
|
|
static_cast<CrashReporterParent*>(ManagedPCrashReporterParent()[0]);
|
2010-11-24 05:58:21 -08:00
|
|
|
|
2013-01-07 06:42:32 -08:00
|
|
|
// If we're an app process, always stomp the latest URI
|
|
|
|
// loaded in the child process with our manifest URL. We
|
|
|
|
// would rather associate the crashes with apps than
|
|
|
|
// random child windows loaded in them.
|
|
|
|
//
|
|
|
|
// XXX would be nice if we could get both ...
|
|
|
|
if (!mAppManifestURL.IsEmpty()) {
|
|
|
|
crashReporter->AnnotateCrashReport(NS_LITERAL_CSTRING("URL"),
|
|
|
|
NS_ConvertUTF16toUTF8(mAppManifestURL));
|
|
|
|
}
|
|
|
|
|
2013-01-03 15:39:25 -08:00
|
|
|
crashReporter->GenerateCrashReport(this, NULL);
|
2012-12-25 15:06:27 -08:00
|
|
|
|
2013-01-03 15:39:25 -08:00
|
|
|
nsAutoString dumpID(crashReporter->ChildDumpID());
|
|
|
|
props->SetPropertyAsAString(NS_LITERAL_STRING("dumpID"), dumpID);
|
|
|
|
}
|
2010-11-24 05:58:21 -08:00
|
|
|
#endif
|
|
|
|
}
|
2012-11-17 07:05:18 -08:00
|
|
|
obs->NotifyObservers((nsIPropertyBag2*) props, "ipc:content-shutdown", nullptr);
|
2010-10-08 12:12:40 -07:00
|
|
|
}
|
2010-11-24 05:58:21 -08:00
|
|
|
|
|
|
|
MessageLoop::current()->
|
|
|
|
PostTask(FROM_HERE,
|
|
|
|
NewRunnableFunction(DelayedDeleteSubprocess, mSubprocess));
|
|
|
|
mSubprocess = NULL;
|
2011-08-30 21:11:25 -07:00
|
|
|
|
|
|
|
// IPDL rules require actors to live on past ActorDestroy, but it
|
|
|
|
// may be that the kungFuDeathGrip above is the last reference to
|
|
|
|
// |this|. If so, when we go out of scope here, we're deleted and
|
|
|
|
// all hell breaks loose.
|
|
|
|
//
|
|
|
|
// This runnable ensures that a reference to |this| lives on at
|
|
|
|
// least until after the current task finishes running.
|
|
|
|
NS_DispatchToCurrentThread(new DelayedDeleteContentParentTask(this));
|
2010-02-01 17:53:52 -08:00
|
|
|
}
|
|
|
|
|
2012-07-17 11:27:27 -07:00
|
|
|
void
|
2013-01-10 05:22:14 -08:00
|
|
|
ContentParent::NotifyTabDestroying(PBrowserParent* aTab)
|
|
|
|
{
|
|
|
|
// There can be more than one PBrowser for a given app process
|
|
|
|
// because of popup windows. PBrowsers can also destroy
|
|
|
|
// concurrently. When all the PBrowsers are destroying, kick off
|
|
|
|
// another task to ensure the child process *really* shuts down,
|
|
|
|
// even if the PBrowsers themselves never finish destroying.
|
|
|
|
int32_t numLiveTabs = ManagedPBrowserParent().Length();
|
|
|
|
++mNumDestroyingTabs;
|
|
|
|
if (mNumDestroyingTabs != numLiveTabs) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// We're dying now, so prevent this content process from being
|
|
|
|
// recycled during its shutdown procedure.
|
|
|
|
MarkAsDead();
|
|
|
|
|
|
|
|
MOZ_ASSERT(!mForceKillTask);
|
|
|
|
int32_t timeoutSecs =
|
|
|
|
Preferences::GetInt("dom.ipc.tabs.shutdownTimeoutSecs", 5);
|
|
|
|
if (timeoutSecs > 0) {
|
|
|
|
MessageLoop::current()->PostDelayedTask(
|
|
|
|
FROM_HERE,
|
|
|
|
mForceKillTask = NewRunnableMethod(this, &ContentParent::KillHard),
|
|
|
|
timeoutSecs * 1000);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
ContentParent::NotifyTabDestroyed(PBrowserParent* aTab,
|
|
|
|
bool aNotifiedDestroying)
|
2012-07-17 11:27:27 -07:00
|
|
|
{
|
2013-01-10 05:22:14 -08:00
|
|
|
if (aNotifiedDestroying) {
|
|
|
|
--mNumDestroyingTabs;
|
|
|
|
}
|
|
|
|
|
2012-07-17 11:27:27 -07:00
|
|
|
// There can be more than one PBrowser for a given app process
|
|
|
|
// because of popup windows. When the last one closes, shut
|
|
|
|
// us down.
|
2012-11-27 12:43:52 -08:00
|
|
|
if (ManagedPBrowserParent().Length() == 1) {
|
2012-07-17 11:27:27 -07:00
|
|
|
MessageLoop::current()->PostTask(
|
|
|
|
FROM_HERE,
|
2012-08-15 18:46:03 -07:00
|
|
|
NewRunnableMethod(this, &ContentParent::ShutDownProcess));
|
2012-07-17 11:27:27 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2009-08-12 11:31:48 -07:00
|
|
|
TestShellParent*
|
2010-07-19 11:33:33 -07:00
|
|
|
ContentParent::CreateTestShell()
|
2009-08-12 11:31:48 -07:00
|
|
|
{
|
2009-09-09 15:00:14 -07:00
|
|
|
return static_cast<TestShellParent*>(SendPTestShellConstructor());
|
2009-08-12 11:31:48 -07:00
|
|
|
}
|
|
|
|
|
2009-11-11 00:34:08 -08:00
|
|
|
bool
|
2010-07-19 11:33:33 -07:00
|
|
|
ContentParent::DestroyTestShell(TestShellParent* aTestShell)
|
2009-11-11 00:34:08 -08:00
|
|
|
{
|
2009-12-03 00:16:14 -08:00
|
|
|
return PTestShellParent::Send__delete__(aTestShell);
|
2009-11-11 00:34:08 -08:00
|
|
|
}
|
|
|
|
|
2011-06-23 16:31:58 -07:00
|
|
|
TestShellParent*
|
|
|
|
ContentParent::GetTestShellSingleton()
|
|
|
|
{
|
|
|
|
if (!ManagedPTestShellParent().Length())
|
2012-07-30 07:20:58 -07:00
|
|
|
return nullptr;
|
2011-06-23 16:31:58 -07:00
|
|
|
return static_cast<TestShellParent*>(ManagedPTestShellParent()[0]);
|
|
|
|
}
|
|
|
|
|
2013-04-25 17:53:26 -07:00
|
|
|
ContentParent::ContentParent(mozIApplication* aApp,
|
2012-08-29 05:24:48 -07:00
|
|
|
bool aIsForBrowser,
|
2013-04-25 17:53:26 -07:00
|
|
|
bool aIsForPreallocated,
|
2013-02-14 12:41:30 -08:00
|
|
|
ChildPrivileges aOSPrivileges,
|
|
|
|
ProcessPriority aInitialPriority /* = PROCESS_PRIORITY_FOREGROUND */)
|
2012-08-29 05:24:48 -07:00
|
|
|
: mSubprocess(nullptr)
|
|
|
|
, mOSPrivileges(aOSPrivileges)
|
2013-02-15 05:40:35 -08:00
|
|
|
, mChildID(gContentChildID++)
|
2012-08-29 05:24:48 -07:00
|
|
|
, mGeolocationWatchID(-1)
|
2010-02-01 17:53:52 -08:00
|
|
|
, mRunToCompletionDepth(0)
|
2010-03-29 13:29:45 -07:00
|
|
|
, mShouldCallUnblockChild(false)
|
2013-01-10 05:22:14 -08:00
|
|
|
, mForceKillTask(nullptr)
|
|
|
|
, mNumDestroyingTabs(0)
|
2010-04-11 17:24:45 -07:00
|
|
|
, mIsAlive(true)
|
2012-11-27 12:43:52 -08:00
|
|
|
, mIsDestroyed(false)
|
2011-08-02 12:35:42 -07:00
|
|
|
, mSendPermissionUpdates(false)
|
2012-09-04 17:36:16 -07:00
|
|
|
, mIsForBrowser(aIsForBrowser)
|
2009-08-12 09:18:08 -07:00
|
|
|
{
|
2013-04-25 17:53:26 -07:00
|
|
|
// No more than one of !!aApp, aIsForBrowser, and aIsForPreallocated should
|
|
|
|
// be true.
|
|
|
|
MOZ_ASSERT(!!aApp + aIsForBrowser + aIsForPreallocated <= 1);
|
|
|
|
|
2013-04-25 17:53:26 -07:00
|
|
|
// Insert ourselves into the global linked list of ContentParent objects.
|
|
|
|
sContentParents.insertBack(this);
|
|
|
|
|
2013-04-25 17:53:26 -07:00
|
|
|
if (aApp) {
|
|
|
|
aApp->GetManifestURL(mAppManifestURL);
|
|
|
|
aApp->GetName(mAppName);
|
|
|
|
} else if (aIsForPreallocated) {
|
|
|
|
mAppManifestURL = MAGIC_PREALLOCATED_APP_MANIFEST_URL;
|
|
|
|
}
|
|
|
|
|
2012-04-10 12:57:20 -07:00
|
|
|
// From this point on, NS_WARNING, NS_ASSERTION, etc. should print out the
|
|
|
|
// PID along with the warning.
|
|
|
|
nsDebugImpl::SetMultiprocessMode("Parent");
|
|
|
|
|
2009-09-02 17:18:27 -07:00
|
|
|
NS_ASSERTION(NS_IsMainThread(), "Wrong thread!");
|
2012-08-29 05:24:48 -07:00
|
|
|
mSubprocess = new GeckoChildProcessHost(GeckoProcessType_Content,
|
|
|
|
aOSPrivileges);
|
2012-07-17 16:59:44 -07:00
|
|
|
|
2013-01-26 13:14:01 -08:00
|
|
|
mSubprocess->LaunchAndWaitForProcessHandle();
|
|
|
|
|
2009-10-27 14:52:37 -07:00
|
|
|
Open(mSubprocess->GetChannel(), mSubprocess->GetChildProcessHandle());
|
2010-03-10 21:33:00 -08:00
|
|
|
|
2013-04-25 17:53:26 -07:00
|
|
|
// Set the subprocess's priority. We do this early on because we're likely
|
|
|
|
// /lowering/ the process's CPU and memory priority, which it has inherited
|
|
|
|
// from this process.
|
|
|
|
//
|
|
|
|
// This call can cause us to send IPC messages to the child process, so it
|
|
|
|
// must come after the Open() call above.
|
|
|
|
ProcessPriorityManager::SetProcessPriority(this, aInitialPriority);
|
|
|
|
|
2012-07-17 16:59:45 -07:00
|
|
|
// NB: internally, this will send an IPC message to the child
|
|
|
|
// process to get it to create the CompositorChild. This
|
|
|
|
// message goes through the regular IPC queue for this
|
|
|
|
// channel, so delivery will happen-before any other messages
|
|
|
|
// we send. The CompositorChild must be created before any
|
|
|
|
// PBrowsers are created, because they rely on the Compositor
|
|
|
|
// already being around. (Creation is async, so can't happen
|
|
|
|
// on demand.)
|
2013-01-26 13:14:01 -08:00
|
|
|
bool useOffMainThreadCompositing = !!CompositorParent::CompositorLoop();
|
2012-07-17 16:59:45 -07:00
|
|
|
if (useOffMainThreadCompositing) {
|
|
|
|
DebugOnly<bool> opened = PCompositor::Open(this);
|
|
|
|
MOZ_ASSERT(opened);
|
2012-08-29 05:24:48 -07:00
|
|
|
|
|
|
|
if (Preferences::GetBool("layers.async-video.enabled",false)) {
|
|
|
|
opened = PImageBridge::Open(this);
|
|
|
|
MOZ_ASSERT(opened);
|
|
|
|
}
|
2012-07-17 16:59:45 -07:00
|
|
|
}
|
|
|
|
|
2010-03-10 21:33:00 -08:00
|
|
|
nsCOMPtr<nsIChromeRegistry> registrySvc = nsChromeRegistry::GetService();
|
|
|
|
nsChromeRegistryChrome* chromeRegistry =
|
|
|
|
static_cast<nsChromeRegistryChrome*>(registrySvc.get());
|
|
|
|
chromeRegistry->SendRegisteredChrome(this);
|
2011-08-02 12:57:48 -07:00
|
|
|
mMessageManager = nsFrameMessageManager::NewProcessMessageManager(this);
|
2011-10-04 13:31:00 -07:00
|
|
|
|
|
|
|
if (gAppData) {
|
|
|
|
nsCString version(gAppData->version);
|
|
|
|
nsCString buildID(gAppData->buildID);
|
|
|
|
|
|
|
|
//Sending all information to content process
|
2012-07-17 16:59:44 -07:00
|
|
|
unused << SendAppInfo(version, buildID);
|
2011-10-04 13:31:00 -07:00
|
|
|
}
|
2009-08-12 09:18:08 -07:00
|
|
|
}
|
|
|
|
|
2010-07-19 11:33:33 -07:00
|
|
|
ContentParent::~ContentParent()
|
2009-08-12 09:18:08 -07:00
|
|
|
{
|
2013-01-10 05:22:14 -08:00
|
|
|
if (mForceKillTask) {
|
|
|
|
mForceKillTask->Cancel();
|
|
|
|
}
|
|
|
|
|
2010-11-24 05:58:21 -08:00
|
|
|
if (OtherProcess())
|
|
|
|
base::CloseProcessHandle(OtherProcess());
|
|
|
|
|
2009-09-02 17:18:27 -07:00
|
|
|
NS_ASSERTION(NS_IsMainThread(), "Wrong thread!");
|
2012-07-13 14:10:20 -07:00
|
|
|
|
|
|
|
// We should be removed from all these lists in ActorDestroy.
|
2013-04-25 17:53:26 -07:00
|
|
|
MOZ_ASSERT(!sPrivateContent || !sPrivateContent->Contains(this));
|
2012-07-13 14:10:20 -07:00
|
|
|
if (mAppManifestURL.IsEmpty()) {
|
2013-04-25 17:53:26 -07:00
|
|
|
MOZ_ASSERT(!sNonAppContentParents ||
|
|
|
|
!sNonAppContentParents->Contains(this));
|
2012-07-13 14:10:20 -07:00
|
|
|
} else {
|
2013-04-25 17:53:26 -07:00
|
|
|
// In general, we expect sAppContentParents->Get(mAppManifestURL) to be
|
2012-10-03 21:44:50 -07:00
|
|
|
// NULL. But it could be that we created another ContentParent for this
|
|
|
|
// app after we did this->ActorDestroy(), so the right check is that
|
2013-04-29 15:50:09 -07:00
|
|
|
// sAppContentParents->Get(mAppManifestURL) != this.
|
2013-04-25 17:53:26 -07:00
|
|
|
MOZ_ASSERT(!sAppContentParents ||
|
|
|
|
sAppContentParents->Get(mAppManifestURL) != this);
|
2012-07-13 14:10:20 -07:00
|
|
|
}
|
2010-04-11 17:24:45 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2010-07-19 11:33:33 -07:00
|
|
|
ContentParent::IsAlive()
|
2010-04-11 17:24:45 -07:00
|
|
|
{
|
|
|
|
return mIsAlive;
|
2009-09-02 17:18:27 -07:00
|
|
|
}
|
|
|
|
|
2012-07-17 11:27:27 -07:00
|
|
|
bool
|
|
|
|
ContentParent::IsForApp()
|
|
|
|
{
|
|
|
|
return !mAppManifestURL.IsEmpty();
|
|
|
|
}
|
|
|
|
|
2010-05-25 17:13:47 -07:00
|
|
|
bool
|
2012-08-22 13:00:21 -07:00
|
|
|
ContentParent::RecvReadPrefsArray(InfallibleTArray<PrefSetting>* aPrefs)
|
2010-05-25 17:13:47 -07:00
|
|
|
{
|
2012-08-22 13:00:21 -07:00
|
|
|
Preferences::GetPreferences(aPrefs);
|
2010-05-28 11:09:15 -07:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2011-01-12 20:04:42 -08:00
|
|
|
bool
|
|
|
|
ContentParent::RecvReadFontList(InfallibleTArray<FontListEntry>* retValue)
|
|
|
|
{
|
|
|
|
#ifdef ANDROID
|
|
|
|
gfxAndroidPlatform::GetPlatform()->GetFontList(retValue);
|
|
|
|
#endif
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2010-10-09 11:07:38 -07:00
|
|
|
bool
|
2010-11-08 18:49:00 -08:00
|
|
|
ContentParent::RecvReadPermissions(InfallibleTArray<IPC::Permission>* aPermissions)
|
2010-07-15 07:04:25 -07:00
|
|
|
{
|
2010-10-09 11:07:38 -07:00
|
|
|
#ifdef MOZ_PERMISSIONS
|
2011-08-30 10:45:09 -07:00
|
|
|
nsCOMPtr<nsIPermissionManager> permissionManagerIface =
|
|
|
|
do_GetService(NS_PERMISSIONMANAGER_CONTRACTID);
|
|
|
|
nsPermissionManager* permissionManager =
|
|
|
|
static_cast<nsPermissionManager*>(permissionManagerIface.get());
|
2010-10-09 11:07:38 -07:00
|
|
|
NS_ABORT_IF_FALSE(permissionManager,
|
|
|
|
"We have no permissionManager in the Chrome process !");
|
|
|
|
|
2010-10-21 11:36:39 -07:00
|
|
|
nsCOMPtr<nsISimpleEnumerator> enumerator;
|
2011-09-18 12:02:27 -07:00
|
|
|
DebugOnly<nsresult> rv = permissionManager->GetEnumerator(getter_AddRefs(enumerator));
|
2010-10-09 11:07:38 -07:00
|
|
|
NS_ABORT_IF_FALSE(NS_SUCCEEDED(rv), "Could not get enumerator!");
|
|
|
|
while(1) {
|
2011-09-28 23:19:26 -07:00
|
|
|
bool hasMore;
|
2010-10-09 11:07:38 -07:00
|
|
|
enumerator->HasMoreElements(&hasMore);
|
|
|
|
if (!hasMore)
|
|
|
|
break;
|
2010-10-21 11:36:39 -07:00
|
|
|
|
|
|
|
nsCOMPtr<nsISupports> supp;
|
|
|
|
enumerator->GetNext(getter_AddRefs(supp));
|
2010-10-09 11:07:38 -07:00
|
|
|
nsCOMPtr<nsIPermission> perm = do_QueryInterface(supp);
|
|
|
|
|
|
|
|
nsCString host;
|
|
|
|
perm->GetHost(host);
|
2012-08-23 11:38:01 -07:00
|
|
|
uint32_t appId;
|
|
|
|
perm->GetAppId(&appId);
|
|
|
|
bool isInBrowserElement;
|
|
|
|
perm->GetIsInBrowserElement(&isInBrowserElement);
|
2010-10-09 11:07:38 -07:00
|
|
|
nsCString type;
|
|
|
|
perm->GetType(type);
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t capability;
|
2010-10-09 11:07:38 -07:00
|
|
|
perm->GetCapability(&capability);
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t expireType;
|
2010-10-09 11:07:38 -07:00
|
|
|
perm->GetExpireType(&expireType);
|
2012-08-22 08:56:38 -07:00
|
|
|
int64_t expireTime;
|
2010-10-09 11:07:38 -07:00
|
|
|
perm->GetExpireTime(&expireTime);
|
|
|
|
|
2012-08-23 11:38:01 -07:00
|
|
|
aPermissions->AppendElement(IPC::Permission(host, appId,
|
|
|
|
isInBrowserElement, type,
|
|
|
|
capability, expireType,
|
|
|
|
expireTime));
|
2010-07-15 07:04:25 -07:00
|
|
|
}
|
2010-10-09 11:07:38 -07:00
|
|
|
|
|
|
|
// Ask for future changes
|
2011-08-02 12:35:42 -07:00
|
|
|
mSendPermissionUpdates = true;
|
2010-10-09 11:07:38 -07:00
|
|
|
#endif
|
|
|
|
|
2011-04-29 16:46:20 -07:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2011-02-28 21:36:43 -08:00
|
|
|
bool
|
2012-08-14 20:37:44 -07:00
|
|
|
ContentParent::RecvSetClipboardText(const nsString& text,
|
|
|
|
const bool& isPrivateData,
|
2012-08-22 08:56:38 -07:00
|
|
|
const int32_t& whichClipboard)
|
2011-02-28 21:36:43 -08:00
|
|
|
{
|
|
|
|
nsresult rv;
|
|
|
|
nsCOMPtr<nsIClipboard> clipboard(do_GetService(kCClipboardCID, &rv));
|
|
|
|
NS_ENSURE_SUCCESS(rv, true);
|
|
|
|
|
|
|
|
nsCOMPtr<nsISupportsString> dataWrapper =
|
|
|
|
do_CreateInstance(NS_SUPPORTS_STRING_CONTRACTID, &rv);
|
|
|
|
NS_ENSURE_SUCCESS(rv, true);
|
|
|
|
|
|
|
|
rv = dataWrapper->SetData(text);
|
|
|
|
NS_ENSURE_SUCCESS(rv, true);
|
|
|
|
|
|
|
|
nsCOMPtr<nsITransferable> trans = do_CreateInstance("@mozilla.org/widget/transferable;1", &rv);
|
|
|
|
NS_ENSURE_SUCCESS(rv, true);
|
2012-07-30 07:20:58 -07:00
|
|
|
trans->Init(nullptr);
|
2011-02-28 21:36:43 -08:00
|
|
|
|
|
|
|
// If our data flavor has already been added, this will fail. But we don't care
|
|
|
|
trans->AddDataFlavor(kUnicodeMime);
|
2012-08-14 20:37:44 -07:00
|
|
|
trans->SetIsPrivateData(isPrivateData);
|
2011-02-28 21:36:43 -08:00
|
|
|
|
|
|
|
nsCOMPtr<nsISupports> nsisupportsDataWrapper =
|
|
|
|
do_QueryInterface(dataWrapper);
|
|
|
|
|
|
|
|
rv = trans->SetTransferData(kUnicodeMime, nsisupportsDataWrapper,
|
|
|
|
text.Length() * sizeof(PRUnichar));
|
|
|
|
NS_ENSURE_SUCCESS(rv, true);
|
|
|
|
|
|
|
|
clipboard->SetData(trans, NULL, whichClipboard);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2012-08-22 08:56:38 -07:00
|
|
|
ContentParent::RecvGetClipboardText(const int32_t& whichClipboard, nsString* text)
|
2011-02-28 21:36:43 -08:00
|
|
|
{
|
|
|
|
nsresult rv;
|
|
|
|
nsCOMPtr<nsIClipboard> clipboard(do_GetService(kCClipboardCID, &rv));
|
|
|
|
NS_ENSURE_SUCCESS(rv, true);
|
|
|
|
|
|
|
|
nsCOMPtr<nsITransferable> trans = do_CreateInstance("@mozilla.org/widget/transferable;1", &rv);
|
|
|
|
NS_ENSURE_SUCCESS(rv, true);
|
2012-07-30 07:20:58 -07:00
|
|
|
trans->Init(nullptr);
|
2011-02-28 21:36:43 -08:00
|
|
|
|
|
|
|
clipboard->GetData(trans, whichClipboard);
|
|
|
|
nsCOMPtr<nsISupports> tmp;
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t len;
|
2011-08-09 12:38:26 -07:00
|
|
|
rv = trans->GetTransferData(kUnicodeMime, getter_AddRefs(tmp), &len);
|
|
|
|
if (NS_FAILED(rv))
|
|
|
|
return false;
|
2011-02-28 21:36:43 -08:00
|
|
|
|
|
|
|
nsCOMPtr<nsISupportsString> supportsString = do_QueryInterface(tmp);
|
|
|
|
// No support for non-text data
|
2011-08-09 12:38:26 -07:00
|
|
|
if (!supportsString)
|
|
|
|
return false;
|
2011-02-28 21:36:43 -08:00
|
|
|
supportsString->GetData(*text);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::RecvEmptyClipboard()
|
|
|
|
{
|
|
|
|
nsresult rv;
|
|
|
|
nsCOMPtr<nsIClipboard> clipboard(do_GetService(kCClipboardCID, &rv));
|
|
|
|
NS_ENSURE_SUCCESS(rv, true);
|
|
|
|
|
|
|
|
clipboard->EmptyClipboard(nsIClipboard::kGlobalClipboard);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2011-09-28 23:19:26 -07:00
|
|
|
ContentParent::RecvClipboardHasText(bool* hasText)
|
2011-02-28 21:36:43 -08:00
|
|
|
{
|
|
|
|
nsresult rv;
|
|
|
|
nsCOMPtr<nsIClipboard> clipboard(do_GetService(kCClipboardCID, &rv));
|
|
|
|
NS_ENSURE_SUCCESS(rv, true);
|
|
|
|
|
|
|
|
clipboard->HasDataMatchingFlavors(sClipboardTextFlavors, 1,
|
|
|
|
nsIClipboard::kGlobalClipboard, hasText);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2011-03-30 11:04:41 -07:00
|
|
|
bool
|
2012-08-22 08:56:38 -07:00
|
|
|
ContentParent::RecvGetSystemColors(const uint32_t& colorsCount, InfallibleTArray<uint32_t>* colors)
|
2011-03-30 11:04:41 -07:00
|
|
|
{
|
2011-11-10 16:17:46 -08:00
|
|
|
#ifdef MOZ_WIDGET_ANDROID
|
2012-07-30 07:20:58 -07:00
|
|
|
NS_ASSERTION(AndroidBridge::Bridge() != nullptr, "AndroidBridge is not available");
|
|
|
|
if (AndroidBridge::Bridge() == nullptr) {
|
2011-07-27 17:34:47 -07:00
|
|
|
// Do not fail - the colors won't be right, but it's not critical
|
|
|
|
return true;
|
|
|
|
}
|
2011-03-30 11:04:41 -07:00
|
|
|
|
|
|
|
colors->AppendElements(colorsCount);
|
|
|
|
|
|
|
|
// The array elements correspond to the members of AndroidSystemColors structure,
|
|
|
|
// so just pass the pointer to the elements buffer
|
|
|
|
AndroidBridge::Bridge()->GetSystemColors((AndroidSystemColors*)colors->Elements());
|
|
|
|
#endif
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2011-06-13 14:02:13 -07:00
|
|
|
bool
|
2012-08-22 08:56:38 -07:00
|
|
|
ContentParent::RecvGetIconForExtension(const nsCString& aFileExt, const uint32_t& aIconSize, InfallibleTArray<uint8_t>* bits)
|
2011-06-13 14:02:13 -07:00
|
|
|
{
|
2011-11-10 16:17:46 -08:00
|
|
|
#ifdef MOZ_WIDGET_ANDROID
|
2012-07-30 07:20:58 -07:00
|
|
|
NS_ASSERTION(AndroidBridge::Bridge() != nullptr, "AndroidBridge is not available");
|
|
|
|
if (AndroidBridge::Bridge() == nullptr) {
|
2011-07-27 17:34:47 -07:00
|
|
|
// Do not fail - just no icon will be shown
|
|
|
|
return true;
|
|
|
|
}
|
2011-06-13 14:02:13 -07:00
|
|
|
|
|
|
|
bits->AppendElements(aIconSize * aIconSize * 4);
|
|
|
|
|
|
|
|
AndroidBridge::Bridge()->GetIconForExtension(aFileExt, aIconSize, bits->Elements());
|
|
|
|
#endif
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2011-07-26 18:14:52 -07:00
|
|
|
bool
|
2011-09-28 23:19:26 -07:00
|
|
|
ContentParent::RecvGetShowPasswordSetting(bool* showPassword)
|
2011-07-26 18:14:52 -07:00
|
|
|
{
|
|
|
|
// default behavior is to show the last password character
|
2011-10-17 07:59:28 -07:00
|
|
|
*showPassword = true;
|
2011-11-10 16:17:46 -08:00
|
|
|
#ifdef MOZ_WIDGET_ANDROID
|
2012-07-30 07:20:58 -07:00
|
|
|
NS_ASSERTION(AndroidBridge::Bridge() != nullptr, "AndroidBridge is not available");
|
|
|
|
if (AndroidBridge::Bridge() != nullptr)
|
2011-07-26 18:14:52 -07:00
|
|
|
*showPassword = AndroidBridge::Bridge()->GetShowPasswordSetting();
|
|
|
|
#endif
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-10-08 21:46:19 -07:00
|
|
|
bool
|
|
|
|
ContentParent::RecvFirstIdle()
|
|
|
|
{
|
2013-04-25 17:53:26 -07:00
|
|
|
// When the ContentChild goes idle, it sends us a FirstIdle message which we
|
|
|
|
// use as an indicator that it's a good time to prelaunch another process.
|
|
|
|
// If we prelaunch any sooner than this, then we'll be competing with the
|
2012-10-08 21:46:19 -07:00
|
|
|
// child process and slowing it down.
|
2013-05-09 13:27:06 -07:00
|
|
|
PreallocatedProcessManager::AllocateAfterDelay();
|
2012-10-08 21:46:19 -07:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-12-05 19:01:58 -08:00
|
|
|
bool
|
|
|
|
ContentParent::RecvAudioChannelGetMuted(const AudioChannelType& aType,
|
2013-01-08 23:18:16 -08:00
|
|
|
const bool& aElementHidden,
|
|
|
|
const bool& aElementWasHidden,
|
2012-12-05 19:01:58 -08:00
|
|
|
bool* aValue)
|
|
|
|
{
|
|
|
|
nsRefPtr<AudioChannelService> service =
|
|
|
|
AudioChannelService::GetAudioChannelService();
|
|
|
|
*aValue = false;
|
|
|
|
if (service) {
|
2013-01-08 23:18:16 -08:00
|
|
|
*aValue = service->GetMutedInternal(aType, mChildID,
|
|
|
|
aElementHidden, aElementWasHidden);
|
2012-12-05 19:01:58 -08:00
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::RecvAudioChannelRegisterType(const AudioChannelType& aType)
|
|
|
|
{
|
|
|
|
nsRefPtr<AudioChannelService> service =
|
|
|
|
AudioChannelService::GetAudioChannelService();
|
|
|
|
if (service) {
|
2012-12-28 09:57:35 -08:00
|
|
|
service->RegisterType(aType, mChildID);
|
2012-12-05 19:01:58 -08:00
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2013-01-08 23:18:16 -08:00
|
|
|
ContentParent::RecvAudioChannelUnregisterType(const AudioChannelType& aType,
|
|
|
|
const bool& aElementHidden)
|
2012-12-05 19:01:58 -08:00
|
|
|
{
|
|
|
|
nsRefPtr<AudioChannelService> service =
|
|
|
|
AudioChannelService::GetAudioChannelService();
|
|
|
|
if (service) {
|
2013-01-08 23:18:16 -08:00
|
|
|
service->UnregisterType(aType, aElementHidden, mChildID);
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::RecvAudioChannelChangedNotification()
|
|
|
|
{
|
|
|
|
nsRefPtr<AudioChannelService> service =
|
|
|
|
AudioChannelService::GetAudioChannelService();
|
|
|
|
if (service) {
|
2013-04-25 17:53:26 -07:00
|
|
|
service->SendAudioChannelChangedNotification(ChildID());
|
2012-12-05 19:01:58 -08:00
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-12-14 16:01:34 -08:00
|
|
|
bool
|
|
|
|
ContentParent::RecvBroadcastVolume(const nsString& aVolumeName)
|
|
|
|
{
|
|
|
|
#ifdef MOZ_WIDGET_GONK
|
|
|
|
nsresult rv;
|
|
|
|
nsCOMPtr<nsIVolumeService> vs = do_GetService(NS_VOLUMESERVICE_CONTRACTID, &rv);
|
|
|
|
if (vs) {
|
|
|
|
vs->BroadcastVolume(aVolumeName);
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
#else
|
|
|
|
NS_WARNING("ContentParent::RecvBroadcastVolume shouldn't be called when MOZ_WIDGET_GONK is not defined");
|
|
|
|
return false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2013-01-24 18:45:36 -08:00
|
|
|
bool
|
|
|
|
ContentParent::RecvRecordingDeviceEvents(const nsString& aRecordingStatus)
|
|
|
|
{
|
|
|
|
nsCOMPtr<nsIObserverService> obs = mozilla::services::GetObserverService();
|
|
|
|
if (obs) {
|
|
|
|
obs->NotifyObservers(nullptr, "recording-device-events", aRecordingStatus.get());
|
|
|
|
} else {
|
|
|
|
NS_WARNING("Could not get the Observer service for ContentParent::RecvRecordingDeviceEvents.");
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-03-20 23:36:17 -07:00
|
|
|
NS_IMPL_THREADSAFE_ISUPPORTS3(ContentParent,
|
2010-02-01 17:53:52 -08:00
|
|
|
nsIObserver,
|
2010-09-20 21:16:37 -07:00
|
|
|
nsIThreadObserver,
|
2012-03-20 23:36:17 -07:00
|
|
|
nsIDOMGeoPositionCallback)
|
2009-09-02 17:18:27 -07:00
|
|
|
|
|
|
|
NS_IMETHODIMP
|
2010-07-19 11:33:33 -07:00
|
|
|
ContentParent::Observe(nsISupports* aSubject,
|
|
|
|
const char* aTopic,
|
|
|
|
const PRUnichar* aData)
|
2009-09-02 17:18:27 -07:00
|
|
|
{
|
|
|
|
if (!strcmp(aTopic, "xpcom-shutdown") && mSubprocess) {
|
2012-11-27 12:43:52 -08:00
|
|
|
ShutDownProcess();
|
2010-11-24 05:58:21 -08:00
|
|
|
NS_ASSERTION(!mSubprocess, "Close should have nulled mSubprocess");
|
2009-09-02 17:18:27 -07:00
|
|
|
}
|
2010-05-11 05:44:12 -07:00
|
|
|
|
2010-07-19 11:33:33 -07:00
|
|
|
if (!mIsAlive || !mSubprocess)
|
|
|
|
return NS_OK;
|
|
|
|
|
2010-12-11 14:36:08 -08:00
|
|
|
// listening for memory pressure event
|
2012-11-07 17:07:57 -08:00
|
|
|
if (!strcmp(aTopic, "memory-pressure") &&
|
2013-04-25 18:36:53 -07:00
|
|
|
!StringEndsWith(nsDependentString(aData),
|
|
|
|
NS_LITERAL_STRING("-no-forward"))) {
|
2010-12-26 12:03:52 -08:00
|
|
|
unused << SendFlushMemory(nsDependentString(aData));
|
2010-12-11 14:36:08 -08:00
|
|
|
}
|
2010-05-25 17:13:47 -07:00
|
|
|
// listening for remotePrefs...
|
2010-12-11 14:36:08 -08:00
|
|
|
else if (!strcmp(aTopic, "nsPref:changed")) {
|
2010-05-25 17:13:47 -07:00
|
|
|
// We know prefs are ASCII here.
|
|
|
|
NS_LossyConvertUTF16toASCII strData(aData);
|
2010-10-19 13:35:08 -07:00
|
|
|
|
2012-08-22 13:00:21 -07:00
|
|
|
PrefSetting pref(strData, null_t(), null_t());
|
|
|
|
Preferences::GetPreference(&pref);
|
|
|
|
if (!SendPreferenceUpdate(pref)) {
|
|
|
|
return NS_ERROR_NOT_AVAILABLE;
|
2011-01-05 20:54:47 -08:00
|
|
|
}
|
2010-05-25 17:13:47 -07:00
|
|
|
}
|
2010-07-19 11:33:33 -07:00
|
|
|
else if (!strcmp(aTopic, NS_IPC_IOSERVICE_SET_OFFLINE_TOPIC)) {
|
2010-05-11 05:44:12 -07:00
|
|
|
NS_ConvertUTF16toUTF8 dataStr(aData);
|
|
|
|
const char *offline = dataStr.get();
|
2010-07-19 11:33:33 -07:00
|
|
|
if (!SendSetOffline(!strcmp(offline, "true") ? true : false))
|
|
|
|
return NS_ERROR_NOT_AVAILABLE;
|
2010-05-11 05:44:12 -07:00
|
|
|
}
|
2010-09-15 09:44:57 -07:00
|
|
|
// listening for alert notifications
|
|
|
|
else if (!strcmp(aTopic, "alertfinished") ||
|
2013-03-18 06:24:53 -07:00
|
|
|
!strcmp(aTopic, "alertclickcallback") ||
|
|
|
|
!strcmp(aTopic, "alertshow") ) {
|
2010-09-15 09:44:57 -07:00
|
|
|
if (!SendNotifyAlertsObserver(nsDependentCString(aTopic),
|
|
|
|
nsDependentString(aData)))
|
|
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
|
|
}
|
2011-02-16 10:43:23 -08:00
|
|
|
else if (!strcmp(aTopic, "child-memory-reporter-request")) {
|
2011-09-18 12:02:27 -07:00
|
|
|
unused << SendPMemoryReportRequestConstructor();
|
2011-09-13 10:53:51 -07:00
|
|
|
}
|
|
|
|
else if (!strcmp(aTopic, "child-gc-request")){
|
2012-07-17 16:59:44 -07:00
|
|
|
unused << SendGarbageCollect();
|
2011-09-13 10:53:51 -07:00
|
|
|
}
|
|
|
|
else if (!strcmp(aTopic, "child-cc-request")){
|
2012-07-17 16:59:44 -07:00
|
|
|
unused << SendCycleCollect();
|
2011-02-16 10:43:23 -08:00
|
|
|
}
|
2012-04-19 17:13:20 -07:00
|
|
|
else if (!strcmp(aTopic, "last-pb-context-exited")) {
|
|
|
|
unused << SendLastPrivateDocShellDestroyed();
|
|
|
|
}
|
2012-08-17 19:43:00 -07:00
|
|
|
else if (!strcmp(aTopic, "file-watcher-update")) {
|
|
|
|
nsCString creason;
|
|
|
|
CopyUTF16toUTF8(aData, creason);
|
2012-08-30 15:17:37 -07:00
|
|
|
DeviceStorageFile* file = static_cast<DeviceStorageFile*>(aSubject);
|
2012-08-17 19:43:00 -07:00
|
|
|
|
2013-05-11 02:10:18 -07:00
|
|
|
unused << SendFilePathUpdate(file->mStorageType, file->mStorageName, file->mPath, creason);
|
2012-08-17 19:43:00 -07:00
|
|
|
}
|
2012-08-03 16:48:58 -07:00
|
|
|
#ifdef MOZ_WIDGET_GONK
|
|
|
|
else if(!strcmp(aTopic, NS_VOLUME_STATE_CHANGED)) {
|
|
|
|
nsCOMPtr<nsIVolume> vol = do_QueryInterface(aSubject);
|
|
|
|
if (!vol) {
|
|
|
|
return NS_ERROR_NOT_AVAILABLE;
|
|
|
|
}
|
|
|
|
|
|
|
|
nsString volName;
|
|
|
|
nsString mountPoint;
|
2012-08-22 08:56:38 -07:00
|
|
|
int32_t state;
|
2012-12-14 16:01:34 -08:00
|
|
|
int32_t mountGeneration;
|
2012-08-03 16:48:58 -07:00
|
|
|
|
|
|
|
vol->GetName(volName);
|
|
|
|
vol->GetMountPoint(mountPoint);
|
|
|
|
vol->GetState(&state);
|
2012-12-14 16:01:34 -08:00
|
|
|
vol->GetMountGeneration(&mountGeneration);
|
2012-08-03 16:48:58 -07:00
|
|
|
|
2012-12-14 16:01:34 -08:00
|
|
|
unused << SendFileSystemUpdate(volName, mountPoint, state,
|
|
|
|
mountGeneration);
|
2012-08-03 16:48:58 -07:00
|
|
|
}
|
|
|
|
#endif
|
2011-07-20 21:37:32 -07:00
|
|
|
#ifdef ACCESSIBILITY
|
|
|
|
// Make sure accessibility is running in content process when accessibility
|
|
|
|
// gets initiated in chrome process.
|
|
|
|
else if (aData && (*aData == '1') &&
|
|
|
|
!strcmp(aTopic, "a11y-init-or-shutdown")) {
|
2011-09-18 12:02:27 -07:00
|
|
|
unused << SendActivateA11y();
|
2011-07-20 21:37:32 -07:00
|
|
|
}
|
|
|
|
#endif
|
2011-02-16 10:43:23 -08:00
|
|
|
|
2009-09-02 17:18:27 -07:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2012-07-17 16:59:45 -07:00
|
|
|
PCompositorParent*
|
2012-08-01 23:02:29 -07:00
|
|
|
ContentParent::AllocPCompositor(mozilla::ipc::Transport* aTransport,
|
2012-07-17 16:59:45 -07:00
|
|
|
base::ProcessId aOtherProcess)
|
|
|
|
{
|
|
|
|
return CompositorParent::Create(aTransport, aOtherProcess);
|
|
|
|
}
|
|
|
|
|
2012-08-29 05:24:48 -07:00
|
|
|
PImageBridgeParent*
|
|
|
|
ContentParent::AllocPImageBridge(mozilla::ipc::Transport* aTransport,
|
|
|
|
base::ProcessId aOtherProcess)
|
|
|
|
{
|
|
|
|
return ImageBridgeParent::Create(aTransport, aOtherProcess);
|
|
|
|
}
|
|
|
|
|
2012-09-04 17:36:16 -07:00
|
|
|
bool
|
2013-01-26 13:14:01 -08:00
|
|
|
ContentParent::RecvGetProcessAttributes(uint64_t* aId,
|
2012-09-04 17:36:16 -07:00
|
|
|
bool* aIsForApp, bool* aIsForBrowser)
|
|
|
|
{
|
2013-02-15 05:40:35 -08:00
|
|
|
*aId = mChildID;
|
2012-09-04 17:36:16 -07:00
|
|
|
*aIsForApp = IsForApp();
|
|
|
|
*aIsForBrowser = mIsForBrowser;
|
2012-11-08 13:09:39 -08:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::RecvGetXPCOMProcessAttributes(bool* aIsOffline)
|
|
|
|
{
|
|
|
|
nsCOMPtr<nsIIOService> io(do_GetIOService());
|
|
|
|
NS_ASSERTION(io, "No IO service?");
|
|
|
|
DebugOnly<nsresult> rv = io->GetOffline(aIsOffline);
|
|
|
|
NS_ASSERTION(NS_SUCCEEDED(rv), "Failed getting offline?");
|
|
|
|
|
2012-09-04 17:36:16 -07:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2010-07-19 11:33:33 -07:00
|
|
|
PBrowserParent*
|
Bug 802366 - The main event: Let a browser process inherit its app's id. r=bz,cjones
The main bug fixed here is that in half of our interfaces, we use "is browser frame/element" to mean "browser or app", and in the other half, we use it to mean "is browser not app".
There's a related, functional bug also fixed here, which is that a browser process doesn't inherit its parent's app-id. This causes problems e.g. for IndexedDB: If a browser inside an app uses IndexedDB, the DB should have the app's app-id.
I also modified Tab{Parent,Child} and nsFrameLoader to call "app" "ownOrContainingApp", to emphasize that we might have inherited the app from a parent process. I left nsIDocShell::appId alone, because changing that would have necessitated changing nsILoadGroup and therefore a /lot/ of users in Necko; it's also not clear it would have clarified anything in those cases.
2012-11-10 10:32:37 -08:00
|
|
|
ContentParent::AllocPBrowser(const IPCTabContext& aContext,
|
|
|
|
const uint32_t &aChromeFlags)
|
2009-08-12 09:18:08 -07:00
|
|
|
{
|
Bug 802366 - The main event: Let a browser process inherit its app's id. r=bz,cjones
The main bug fixed here is that in half of our interfaces, we use "is browser frame/element" to mean "browser or app", and in the other half, we use it to mean "is browser not app".
There's a related, functional bug also fixed here, which is that a browser process doesn't inherit its parent's app-id. This causes problems e.g. for IndexedDB: If a browser inside an app uses IndexedDB, the DB should have the app's app-id.
I also modified Tab{Parent,Child} and nsFrameLoader to call "app" "ownOrContainingApp", to emphasize that we might have inherited the app from a parent process. I left nsIDocShell::appId alone, because changing that would have necessitated changing nsILoadGroup and therefore a /lot/ of users in Necko; it's also not clear it would have clarified anything in those cases.
2012-11-10 10:32:37 -08:00
|
|
|
unused << aChromeFlags;
|
|
|
|
|
2012-11-27 12:43:52 -08:00
|
|
|
const IPCTabAppBrowserContext& appBrowser = aContext.appBrowserContext();
|
|
|
|
|
Bug 802366 - The main event: Let a browser process inherit its app's id. r=bz,cjones
The main bug fixed here is that in half of our interfaces, we use "is browser frame/element" to mean "browser or app", and in the other half, we use it to mean "is browser not app".
There's a related, functional bug also fixed here, which is that a browser process doesn't inherit its parent's app-id. This causes problems e.g. for IndexedDB: If a browser inside an app uses IndexedDB, the DB should have the app's app-id.
I also modified Tab{Parent,Child} and nsFrameLoader to call "app" "ownOrContainingApp", to emphasize that we might have inherited the app from a parent process. I left nsIDocShell::appId alone, because changing that would have necessitated changing nsILoadGroup and therefore a /lot/ of users in Necko; it's also not clear it would have clarified anything in those cases.
2012-11-10 10:32:37 -08:00
|
|
|
// We don't trust the IPCTabContext we receive from the child, so we'll bail
|
|
|
|
// if we receive an IPCTabContext that's not a PopupIPCTabContext.
|
|
|
|
// (PopupIPCTabContext lets the child process prove that it has access to
|
|
|
|
// the app it's trying to open.)
|
2012-11-27 12:43:52 -08:00
|
|
|
if (appBrowser.type() != IPCTabAppBrowserContext::TPopupIPCTabContext) {
|
Bug 802366 - The main event: Let a browser process inherit its app's id. r=bz,cjones
The main bug fixed here is that in half of our interfaces, we use "is browser frame/element" to mean "browser or app", and in the other half, we use it to mean "is browser not app".
There's a related, functional bug also fixed here, which is that a browser process doesn't inherit its parent's app-id. This causes problems e.g. for IndexedDB: If a browser inside an app uses IndexedDB, the DB should have the app's app-id.
I also modified Tab{Parent,Child} and nsFrameLoader to call "app" "ownOrContainingApp", to emphasize that we might have inherited the app from a parent process. I left nsIDocShell::appId alone, because changing that would have necessitated changing nsILoadGroup and therefore a /lot/ of users in Necko; it's also not clear it would have clarified anything in those cases.
2012-11-10 10:32:37 -08:00
|
|
|
NS_ERROR("Unexpected IPCTabContext type. Aborting AllocPBrowser.");
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2012-11-27 12:43:52 -08:00
|
|
|
const PopupIPCTabContext& popupContext = appBrowser.get_PopupIPCTabContext();
|
Bug 802366 - The main event: Let a browser process inherit its app's id. r=bz,cjones
The main bug fixed here is that in half of our interfaces, we use "is browser frame/element" to mean "browser or app", and in the other half, we use it to mean "is browser not app".
There's a related, functional bug also fixed here, which is that a browser process doesn't inherit its parent's app-id. This causes problems e.g. for IndexedDB: If a browser inside an app uses IndexedDB, the DB should have the app's app-id.
I also modified Tab{Parent,Child} and nsFrameLoader to call "app" "ownOrContainingApp", to emphasize that we might have inherited the app from a parent process. I left nsIDocShell::appId alone, because changing that would have necessitated changing nsILoadGroup and therefore a /lot/ of users in Necko; it's also not clear it would have clarified anything in those cases.
2012-11-10 10:32:37 -08:00
|
|
|
TabParent* opener = static_cast<TabParent*>(popupContext.openerParent());
|
|
|
|
if (!opener) {
|
|
|
|
NS_ERROR("Got null opener from child; aborting AllocPBrowser.");
|
2012-08-08 19:58:06 -07:00
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
Bug 802366 - The main event: Let a browser process inherit its app's id. r=bz,cjones
The main bug fixed here is that in half of our interfaces, we use "is browser frame/element" to mean "browser or app", and in the other half, we use it to mean "is browser not app".
There's a related, functional bug also fixed here, which is that a browser process doesn't inherit its parent's app-id. This causes problems e.g. for IndexedDB: If a browser inside an app uses IndexedDB, the DB should have the app's app-id.
I also modified Tab{Parent,Child} and nsFrameLoader to call "app" "ownOrContainingApp", to emphasize that we might have inherited the app from a parent process. I left nsIDocShell::appId alone, because changing that would have necessitated changing nsILoadGroup and therefore a /lot/ of users in Necko; it's also not clear it would have clarified anything in those cases.
2012-11-10 10:32:37 -08:00
|
|
|
// Popup windows of isBrowser frames must be isBrowser if the parent
|
|
|
|
// isBrowser. Allocating a !isBrowser frame with same app ID would allow
|
|
|
|
// the content to access data it's not supposed to.
|
|
|
|
if (!popupContext.isBrowserElement() && opener->IsBrowserElement()) {
|
|
|
|
NS_ERROR("Child trying to escalate privileges! Aborting AllocPBrowser.");
|
2012-08-08 19:58:06 -07:00
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
Bug 802366 - The main event: Let a browser process inherit its app's id. r=bz,cjones
The main bug fixed here is that in half of our interfaces, we use "is browser frame/element" to mean "browser or app", and in the other half, we use it to mean "is browser not app".
There's a related, functional bug also fixed here, which is that a browser process doesn't inherit its parent's app-id. This causes problems e.g. for IndexedDB: If a browser inside an app uses IndexedDB, the DB should have the app's app-id.
I also modified Tab{Parent,Child} and nsFrameLoader to call "app" "ownOrContainingApp", to emphasize that we might have inherited the app from a parent process. I left nsIDocShell::appId alone, because changing that would have necessitated changing nsILoadGroup and therefore a /lot/ of users in Necko; it's also not clear it would have clarified anything in those cases.
2012-11-10 10:32:37 -08:00
|
|
|
TabParent* parent = new TabParent(TabContext(aContext));
|
|
|
|
|
2012-08-08 19:58:06 -07:00
|
|
|
// We release this ref in DeallocPBrowser()
|
2010-03-26 11:39:39 -07:00
|
|
|
NS_ADDREF(parent);
|
2012-08-08 19:58:06 -07:00
|
|
|
return parent;
|
2009-08-12 09:18:08 -07:00
|
|
|
}
|
|
|
|
|
2009-09-17 16:09:20 -07:00
|
|
|
bool
|
2010-07-19 11:33:33 -07:00
|
|
|
ContentParent::DeallocPBrowser(PBrowserParent* frame)
|
2009-08-12 09:18:08 -07:00
|
|
|
{
|
2012-08-08 19:58:06 -07:00
|
|
|
TabParent* parent = static_cast<TabParent*>(frame);
|
|
|
|
NS_RELEASE(parent);
|
|
|
|
return true;
|
2009-08-12 09:18:08 -07:00
|
|
|
}
|
|
|
|
|
2012-06-19 16:14:39 -07:00
|
|
|
PDeviceStorageRequestParent*
|
|
|
|
ContentParent::AllocPDeviceStorageRequest(const DeviceStorageParams& aParams)
|
|
|
|
{
|
2012-11-29 21:41:40 -08:00
|
|
|
nsRefPtr<DeviceStorageRequestParent> result = new DeviceStorageRequestParent(aParams);
|
|
|
|
if (!result->EnsureRequiredPermissions(this)) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
result->Dispatch();
|
|
|
|
return result.forget().get();
|
2012-06-19 16:14:39 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::DeallocPDeviceStorageRequest(PDeviceStorageRequestParent* doomed)
|
|
|
|
{
|
2012-08-09 15:41:18 -07:00
|
|
|
DeviceStorageRequestParent *parent = static_cast<DeviceStorageRequestParent*>(doomed);
|
|
|
|
NS_RELEASE(parent);
|
2012-06-19 16:14:39 -07:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-08-01 23:02:29 -07:00
|
|
|
PBlobParent*
|
|
|
|
ContentParent::AllocPBlob(const BlobConstructorParams& aParams)
|
|
|
|
{
|
2013-01-17 12:17:33 -08:00
|
|
|
return BlobParent::Create(aParams);
|
2012-08-01 23:02:29 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::DeallocPBlob(PBlobParent* aActor)
|
|
|
|
{
|
|
|
|
delete aActor;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-01-10 05:47:32 -08:00
|
|
|
BlobParent*
|
|
|
|
ContentParent::GetOrCreateActorForBlob(nsIDOMBlob* aBlob)
|
|
|
|
{
|
|
|
|
NS_ASSERTION(NS_IsMainThread(), "Wrong thread!");
|
|
|
|
NS_ASSERTION(aBlob, "Null pointer!");
|
|
|
|
|
|
|
|
// XXX This is only safe so long as all blob implementations in our tree
|
|
|
|
// inherit nsDOMFileBase. If that ever changes then this will need to grow
|
|
|
|
// a real interface or something.
|
2013-01-17 12:17:33 -08:00
|
|
|
const nsDOMFileBase* blob = static_cast<nsDOMFileBase*>(aBlob);
|
2013-01-10 05:47:32 -08:00
|
|
|
|
2013-01-10 10:16:40 -08:00
|
|
|
// All blobs shared between processes must be immutable.
|
|
|
|
nsCOMPtr<nsIMutable> mutableBlob = do_QueryInterface(aBlob);
|
|
|
|
if (!mutableBlob || NS_FAILED(mutableBlob->SetMutable(false))) {
|
|
|
|
NS_WARNING("Failed to make blob immutable!");
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
|
2013-01-10 05:47:32 -08:00
|
|
|
nsCOMPtr<nsIRemoteBlob> remoteBlob = do_QueryInterface(aBlob);
|
|
|
|
if (remoteBlob) {
|
|
|
|
BlobParent* actor =
|
|
|
|
static_cast<BlobParent*>(
|
|
|
|
static_cast<PBlobParent*>(remoteBlob->GetPBlob()));
|
|
|
|
NS_ASSERTION(actor, "Null actor?!");
|
|
|
|
|
2013-01-17 12:17:33 -08:00
|
|
|
if (static_cast<ContentParent*>(actor->Manager()) == this) {
|
2013-01-10 05:47:32 -08:00
|
|
|
return actor;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-01-17 12:17:33 -08:00
|
|
|
ChildBlobConstructorParams params;
|
|
|
|
|
|
|
|
if (blob->IsSizeUnknown() || blob->IsDateUnknown()) {
|
|
|
|
// We don't want to call GetSize or GetLastModifiedDate
|
|
|
|
// yet since that may stat a file on the main thread
|
|
|
|
// here. Instead we'll learn the size lazily from the
|
|
|
|
// other process.
|
|
|
|
params = MysteryBlobConstructorParams();
|
2012-08-01 23:02:29 -07:00
|
|
|
}
|
2013-01-17 12:17:33 -08:00
|
|
|
else {
|
|
|
|
nsString contentType;
|
|
|
|
nsresult rv = aBlob->GetType(contentType);
|
|
|
|
NS_ENSURE_SUCCESS(rv, nullptr);
|
2012-08-01 23:02:29 -07:00
|
|
|
|
2013-01-17 12:17:33 -08:00
|
|
|
uint64_t length;
|
|
|
|
rv = aBlob->GetSize(&length);
|
|
|
|
NS_ENSURE_SUCCESS(rv, nullptr);
|
2012-08-01 23:02:29 -07:00
|
|
|
|
2013-01-17 12:17:33 -08:00
|
|
|
nsCOMPtr<nsIDOMFile> file = do_QueryInterface(aBlob);
|
|
|
|
if (file) {
|
|
|
|
FileBlobConstructorParams fileParams;
|
2012-08-01 23:02:29 -07:00
|
|
|
|
2013-01-17 12:17:33 -08:00
|
|
|
rv = file->GetMozLastModifiedDate(&fileParams.modDate());
|
|
|
|
NS_ENSURE_SUCCESS(rv, nullptr);
|
2013-01-10 05:47:32 -08:00
|
|
|
|
2013-01-17 12:17:33 -08:00
|
|
|
rv = file->GetName(fileParams.name());
|
|
|
|
NS_ENSURE_SUCCESS(rv, nullptr);
|
2013-01-10 05:47:32 -08:00
|
|
|
|
2013-01-17 12:17:33 -08:00
|
|
|
fileParams.contentType() = contentType;
|
|
|
|
fileParams.length() = length;
|
2013-01-10 05:47:32 -08:00
|
|
|
|
2013-01-17 12:17:33 -08:00
|
|
|
params = fileParams;
|
|
|
|
} else {
|
|
|
|
NormalBlobConstructorParams blobParams;
|
|
|
|
blobParams.contentType() = contentType;
|
|
|
|
blobParams.length() = length;
|
|
|
|
params = blobParams;
|
2013-01-10 05:47:32 -08:00
|
|
|
}
|
2013-01-17 12:17:33 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
BlobParent* actor = BlobParent::Create(aBlob);
|
|
|
|
NS_ENSURE_TRUE(actor, nullptr);
|
|
|
|
|
|
|
|
if (!SendPBlobConstructor(actor, params)) {
|
|
|
|
return nullptr;
|
2013-01-10 05:47:32 -08:00
|
|
|
}
|
|
|
|
|
2012-08-01 23:02:29 -07:00
|
|
|
return actor;
|
|
|
|
}
|
|
|
|
|
2012-09-05 15:18:48 -07:00
|
|
|
void
|
|
|
|
ContentParent::KillHard()
|
|
|
|
{
|
2013-01-10 05:22:14 -08:00
|
|
|
mForceKillTask = nullptr;
|
2012-09-05 15:18:48 -07:00
|
|
|
// This ensures the process is eventually killed, but doesn't
|
|
|
|
// immediately KILLITWITHFIRE because we want to get a minidump if
|
|
|
|
// possible. After a timeout though, the process is forceably
|
|
|
|
// killed.
|
|
|
|
if (!KillProcess(OtherProcess(), 1, false)) {
|
|
|
|
NS_WARNING("failed to kill subprocess!");
|
|
|
|
}
|
|
|
|
XRE_GetIOMessageLoop()->PostTask(
|
|
|
|
FROM_HERE,
|
|
|
|
NewRunnableFunction(&ProcessWatcher::EnsureProcessTerminated,
|
|
|
|
OtherProcess(), /*force=*/true));
|
|
|
|
}
|
|
|
|
|
2013-04-25 17:53:26 -07:00
|
|
|
bool
|
|
|
|
ContentParent::IsPreallocated()
|
|
|
|
{
|
|
|
|
return mAppManifestURL == MAGIC_PREALLOCATED_APP_MANIFEST_URL;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
ContentParent::FriendlyName(nsAString& aName)
|
|
|
|
{
|
|
|
|
aName.Truncate();
|
|
|
|
if (IsPreallocated()) {
|
|
|
|
aName.AssignLiteral("(Preallocated)");
|
|
|
|
} else if (mIsForBrowser) {
|
|
|
|
aName.AssignLiteral("Browser");
|
|
|
|
} else if (!mAppName.IsEmpty()) {
|
|
|
|
aName = mAppName;
|
|
|
|
} else if (!mAppManifestURL.IsEmpty()) {
|
|
|
|
aName.AssignLiteral("Unknown app: ");
|
|
|
|
aName.Append(mAppManifestURL);
|
|
|
|
} else {
|
|
|
|
aName.AssignLiteral("???");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-11-24 06:15:03 -08:00
|
|
|
PCrashReporterParent*
|
2011-06-08 12:56:31 -07:00
|
|
|
ContentParent::AllocPCrashReporter(const NativeThreadId& tid,
|
2012-08-22 08:56:38 -07:00
|
|
|
const uint32_t& processType)
|
2010-11-24 06:15:03 -08:00
|
|
|
{
|
2011-06-08 12:56:31 -07:00
|
|
|
#ifdef MOZ_CRASHREPORTER
|
2011-06-29 20:44:28 -07:00
|
|
|
return new CrashReporterParent();
|
2011-06-08 12:56:31 -07:00
|
|
|
#else
|
2012-07-30 07:20:58 -07:00
|
|
|
return nullptr;
|
2011-06-08 12:56:31 -07:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::RecvPCrashReporterConstructor(PCrashReporterParent* actor,
|
|
|
|
const NativeThreadId& tid,
|
2012-08-22 08:56:38 -07:00
|
|
|
const uint32_t& processType)
|
2011-06-08 12:56:31 -07:00
|
|
|
{
|
|
|
|
static_cast<CrashReporterParent*>(actor)->SetChildData(tid, processType);
|
|
|
|
return true;
|
2010-11-24 06:15:03 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::DeallocPCrashReporter(PCrashReporterParent* crashreporter)
|
|
|
|
{
|
|
|
|
delete crashreporter;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-01-26 13:14:01 -08:00
|
|
|
hal_sandbox::PHalParent*
|
2011-10-05 15:15:45 -07:00
|
|
|
ContentParent::AllocPHal()
|
|
|
|
{
|
2013-01-26 13:14:01 -08:00
|
|
|
return hal_sandbox::CreateHalParent();
|
2011-10-05 15:15:45 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2013-01-26 13:14:01 -08:00
|
|
|
ContentParent::DeallocPHal(hal_sandbox::PHalParent* aHal)
|
2011-10-05 15:15:45 -07:00
|
|
|
{
|
|
|
|
delete aHal;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-07-14 04:24:20 -07:00
|
|
|
PIndexedDBParent*
|
|
|
|
ContentParent::AllocPIndexedDB()
|
|
|
|
{
|
2012-10-25 10:12:14 -07:00
|
|
|
return new IndexedDBParent(this);
|
2012-07-14 04:24:20 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::DeallocPIndexedDB(PIndexedDBParent* aActor)
|
|
|
|
{
|
|
|
|
delete aActor;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::RecvPIndexedDBConstructor(PIndexedDBParent* aActor)
|
|
|
|
{
|
|
|
|
nsRefPtr<IndexedDatabaseManager> mgr = IndexedDatabaseManager::GetOrCreate();
|
|
|
|
NS_ENSURE_TRUE(mgr, false);
|
|
|
|
|
|
|
|
if (!IndexedDatabaseManager::IsMainProcess()) {
|
|
|
|
NS_RUNTIMEABORT("Not supported yet!");
|
|
|
|
}
|
|
|
|
|
|
|
|
nsRefPtr<IDBFactory> factory;
|
2012-08-01 23:02:29 -07:00
|
|
|
nsresult rv = IDBFactory::Create(this, getter_AddRefs(factory));
|
2012-07-14 04:24:20 -07:00
|
|
|
NS_ENSURE_SUCCESS(rv, false);
|
|
|
|
|
|
|
|
NS_ASSERTION(factory, "This should never be null!");
|
|
|
|
|
|
|
|
IndexedDBParent* actor = static_cast<IndexedDBParent*>(aActor);
|
|
|
|
actor->mFactory = factory;
|
|
|
|
actor->mASCIIOrigin = factory->GetASCIIOrigin();
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2011-02-16 10:43:23 -08:00
|
|
|
PMemoryReportRequestParent*
|
|
|
|
ContentParent::AllocPMemoryReportRequest()
|
|
|
|
{
|
|
|
|
MemoryReportRequestParent* parent = new MemoryReportRequestParent();
|
|
|
|
return parent;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::DeallocPMemoryReportRequest(PMemoryReportRequestParent* actor)
|
|
|
|
{
|
|
|
|
delete actor;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
ContentParent::SetChildMemoryReporters(const InfallibleTArray<MemoryReport>& report)
|
|
|
|
{
|
2011-06-16 11:34:09 -07:00
|
|
|
nsCOMPtr<nsIMemoryReporterManager> mgr =
|
|
|
|
do_GetService("@mozilla.org/memory-reporter-manager;1");
|
2012-08-22 08:56:38 -07:00
|
|
|
for (int32_t i = 0; i < mMemoryReporters.Count(); i++)
|
2011-02-16 10:43:23 -08:00
|
|
|
mgr->UnregisterReporter(mMemoryReporters[i]);
|
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
for (uint32_t i = 0; i < report.Length(); i++) {
|
2011-06-05 18:22:45 -07:00
|
|
|
nsCString process = report[i].process();
|
|
|
|
nsCString path = report[i].path();
|
2012-08-22 08:56:38 -07:00
|
|
|
int32_t kind = report[i].kind();
|
|
|
|
int32_t units = report[i].units();
|
|
|
|
int64_t amount = report[i].amount();
|
2011-06-05 18:22:45 -07:00
|
|
|
nsCString desc = report[i].desc();
|
2013-01-14 16:28:36 -08:00
|
|
|
|
|
|
|
nsRefPtr<ChildMemoryReporter> r =
|
|
|
|
new ChildMemoryReporter(process.get(), path.get(), kind, units,
|
|
|
|
amount, desc.get());
|
2011-06-16 11:34:09 -07:00
|
|
|
|
|
|
|
mMemoryReporters.AppendObject(r);
|
|
|
|
mgr->RegisterReporter(r);
|
2011-02-16 10:43:23 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
nsCOMPtr<nsIObserverService> obs =
|
|
|
|
do_GetService("@mozilla.org/observer-service;1");
|
|
|
|
if (obs)
|
2012-07-30 07:20:58 -07:00
|
|
|
obs->NotifyObservers(nullptr, "child-memory-reporter-update", nullptr);
|
2011-02-16 10:43:23 -08:00
|
|
|
}
|
|
|
|
|
2009-09-09 15:59:06 -07:00
|
|
|
PTestShellParent*
|
2010-07-19 11:33:33 -07:00
|
|
|
ContentParent::AllocPTestShell()
|
2009-08-12 11:31:48 -07:00
|
|
|
{
|
|
|
|
return new TestShellParent();
|
|
|
|
}
|
|
|
|
|
2009-09-17 16:09:20 -07:00
|
|
|
bool
|
2010-07-19 11:33:33 -07:00
|
|
|
ContentParent::DeallocPTestShell(PTestShellParent* shell)
|
2009-08-12 11:31:48 -07:00
|
|
|
{
|
|
|
|
delete shell;
|
2009-09-17 16:09:20 -07:00
|
|
|
return true;
|
2009-08-12 11:31:48 -07:00
|
|
|
}
|
2010-11-16 20:14:19 -08:00
|
|
|
|
2009-08-18 12:05:15 -07:00
|
|
|
PNeckoParent*
|
2010-07-19 11:33:33 -07:00
|
|
|
ContentParent::AllocPNecko()
|
2009-08-18 12:05:15 -07:00
|
|
|
{
|
|
|
|
return new NeckoParent();
|
|
|
|
}
|
|
|
|
|
2009-09-17 16:09:20 -07:00
|
|
|
bool
|
2010-07-19 11:33:33 -07:00
|
|
|
ContentParent::DeallocPNecko(PNeckoParent* necko)
|
2009-08-18 12:05:15 -07:00
|
|
|
{
|
|
|
|
delete necko;
|
2009-09-17 16:09:20 -07:00
|
|
|
return true;
|
2009-08-18 12:05:15 -07:00
|
|
|
}
|
|
|
|
|
2010-09-15 15:55:08 -07:00
|
|
|
PExternalHelperAppParent*
|
2012-08-23 12:33:46 -07:00
|
|
|
ContentParent::AllocPExternalHelperApp(const OptionalURIParams& uri,
|
2010-09-15 15:55:08 -07:00
|
|
|
const nsCString& aMimeContentType,
|
|
|
|
const nsCString& aContentDisposition,
|
|
|
|
const bool& aForceSave,
|
2012-08-22 08:56:38 -07:00
|
|
|
const int64_t& aContentLength,
|
2012-08-23 12:33:46 -07:00
|
|
|
const OptionalURIParams& aReferrer)
|
2010-09-15 15:55:08 -07:00
|
|
|
{
|
|
|
|
ExternalHelperAppParent *parent = new ExternalHelperAppParent(uri, aContentLength);
|
|
|
|
parent->AddRef();
|
2010-11-21 11:21:59 -08:00
|
|
|
parent->Init(this, aMimeContentType, aContentDisposition, aForceSave, aReferrer);
|
2010-09-15 15:55:08 -07:00
|
|
|
return parent;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::DeallocPExternalHelperApp(PExternalHelperAppParent* aService)
|
|
|
|
{
|
|
|
|
ExternalHelperAppParent *parent = static_cast<ExternalHelperAppParent *>(aService);
|
|
|
|
parent->Release();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2011-11-20 14:40:53 -08:00
|
|
|
PSmsParent*
|
|
|
|
ContentParent::AllocPSms()
|
|
|
|
{
|
2012-09-25 11:52:30 -07:00
|
|
|
if (!AssertAppProcessPermission(this, "sms")) {
|
2012-08-16 12:34:53 -07:00
|
|
|
return nullptr;
|
|
|
|
}
|
2012-11-06 13:29:30 -08:00
|
|
|
|
|
|
|
SmsParent* parent = new SmsParent();
|
|
|
|
parent->AddRef();
|
|
|
|
return parent;
|
2011-11-20 14:40:53 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::DeallocPSms(PSmsParent* aSms)
|
|
|
|
{
|
2012-11-06 13:29:30 -08:00
|
|
|
static_cast<SmsParent*>(aSms)->Release();
|
2011-11-20 14:40:53 -08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2010-11-18 17:15:23 -08:00
|
|
|
PStorageParent*
|
2013-04-15 05:38:48 -07:00
|
|
|
ContentParent::AllocPStorage()
|
2010-11-18 17:15:23 -08:00
|
|
|
{
|
2013-04-15 05:38:48 -07:00
|
|
|
return new DOMStorageDBParent();
|
2010-11-18 17:15:23 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::DeallocPStorage(PStorageParent* aActor)
|
|
|
|
{
|
2013-04-15 05:38:48 -07:00
|
|
|
DOMStorageDBParent* child = static_cast<DOMStorageDBParent*>(aActor);
|
|
|
|
child->ReleaseIPDLReference();
|
2010-11-18 17:15:23 -08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-09-13 09:37:14 -07:00
|
|
|
PBluetoothParent*
|
|
|
|
ContentParent::AllocPBluetooth()
|
|
|
|
{
|
|
|
|
#ifdef MOZ_B2G_BT
|
2012-09-25 11:52:30 -07:00
|
|
|
if (!AssertAppProcessPermission(this, "bluetooth")) {
|
2012-09-13 09:37:14 -07:00
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
return new mozilla::dom::bluetooth::BluetoothParent();
|
|
|
|
#else
|
|
|
|
MOZ_NOT_REACHED("No support for bluetooth on this platform!");
|
|
|
|
return nullptr;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::DeallocPBluetooth(PBluetoothParent* aActor)
|
|
|
|
{
|
|
|
|
#ifdef MOZ_B2G_BT
|
|
|
|
delete aActor;
|
|
|
|
return true;
|
|
|
|
#else
|
|
|
|
MOZ_NOT_REACHED("No support for bluetooth on this platform!");
|
|
|
|
return false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::RecvPBluetoothConstructor(PBluetoothParent* aActor)
|
|
|
|
{
|
|
|
|
#ifdef MOZ_B2G_BT
|
|
|
|
nsRefPtr<BluetoothService> btService = BluetoothService::Get();
|
|
|
|
NS_ENSURE_TRUE(btService, false);
|
|
|
|
|
|
|
|
return static_cast<BluetoothParent*>(aActor)->InitWithService(btService);
|
|
|
|
#else
|
|
|
|
MOZ_NOT_REACHED("No support for bluetooth on this platform!");
|
|
|
|
return false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2013-04-03 15:13:17 -07:00
|
|
|
PSpeechSynthesisParent*
|
|
|
|
ContentParent::AllocPSpeechSynthesis()
|
|
|
|
{
|
|
|
|
#ifdef MOZ_WEBSPEECH
|
|
|
|
return new mozilla::dom::SpeechSynthesisParent();
|
|
|
|
#else
|
|
|
|
return nullptr;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::DeallocPSpeechSynthesis(PSpeechSynthesisParent* aActor)
|
|
|
|
{
|
|
|
|
#ifdef MOZ_WEBSPEECH
|
|
|
|
delete aActor;
|
|
|
|
return true;
|
|
|
|
#else
|
|
|
|
return false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::RecvPSpeechSynthesisConstructor(PSpeechSynthesisParent* aActor)
|
|
|
|
{
|
|
|
|
#ifdef MOZ_WEBSPEECH
|
|
|
|
return true;
|
|
|
|
#else
|
|
|
|
return false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2010-03-29 13:29:45 -07:00
|
|
|
void
|
2010-07-19 11:33:33 -07:00
|
|
|
ContentParent::ReportChildAlreadyBlocked()
|
2010-03-29 13:29:45 -07:00
|
|
|
{
|
|
|
|
if (!mRunToCompletionDepth) {
|
|
|
|
#ifdef DEBUG
|
|
|
|
printf("Running to completion...\n");
|
|
|
|
#endif
|
|
|
|
mRunToCompletionDepth = 1;
|
|
|
|
mShouldCallUnblockChild = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-02-01 17:53:52 -08:00
|
|
|
bool
|
2010-07-19 11:33:33 -07:00
|
|
|
ContentParent::RequestRunToCompletion()
|
2010-02-01 17:53:52 -08:00
|
|
|
{
|
|
|
|
if (!mRunToCompletionDepth &&
|
|
|
|
BlockChild()) {
|
|
|
|
#ifdef DEBUG
|
|
|
|
printf("Running to completion...\n");
|
|
|
|
#endif
|
|
|
|
mRunToCompletionDepth = 1;
|
2010-03-29 13:29:45 -07:00
|
|
|
mShouldCallUnblockChild = true;
|
2010-02-01 17:53:52 -08:00
|
|
|
}
|
|
|
|
return !!mRunToCompletionDepth;
|
|
|
|
}
|
|
|
|
|
2010-07-02 08:50:41 -07:00
|
|
|
bool
|
2012-08-23 12:33:46 -07:00
|
|
|
ContentParent::RecvStartVisitedQuery(const URIParams& aURI)
|
2010-07-02 08:50:41 -07:00
|
|
|
{
|
2012-08-23 12:33:46 -07:00
|
|
|
nsCOMPtr<nsIURI> newURI = DeserializeURI(aURI);
|
|
|
|
if (!newURI) {
|
|
|
|
return false;
|
|
|
|
}
|
2010-08-05 10:07:46 -07:00
|
|
|
nsCOMPtr<IHistory> history = services::GetHistoryService();
|
|
|
|
if (history) {
|
2012-08-23 12:33:46 -07:00
|
|
|
history->RegisterVisitedCallback(newURI, nullptr);
|
2010-08-05 10:07:46 -07:00
|
|
|
}
|
2010-07-02 08:50:41 -07:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2010-07-02 08:50:24 -07:00
|
|
|
|
|
|
|
bool
|
2012-08-23 12:33:46 -07:00
|
|
|
ContentParent::RecvVisitURI(const URIParams& uri,
|
|
|
|
const OptionalURIParams& referrer,
|
|
|
|
const uint32_t& flags)
|
2010-07-02 08:50:24 -07:00
|
|
|
{
|
2012-08-23 12:33:46 -07:00
|
|
|
nsCOMPtr<nsIURI> ourURI = DeserializeURI(uri);
|
|
|
|
if (!ourURI) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
nsCOMPtr<nsIURI> ourReferrer = DeserializeURI(referrer);
|
2010-08-05 10:07:46 -07:00
|
|
|
nsCOMPtr<IHistory> history = services::GetHistoryService();
|
|
|
|
if (history) {
|
2012-08-23 12:33:46 -07:00
|
|
|
history->VisitURI(ourURI, ourReferrer, flags);
|
2010-08-05 10:07:46 -07:00
|
|
|
}
|
2010-07-02 08:50:24 -07:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2010-07-02 08:53:42 -07:00
|
|
|
|
|
|
|
bool
|
2012-08-23 12:33:46 -07:00
|
|
|
ContentParent::RecvSetURITitle(const URIParams& uri,
|
|
|
|
const nsString& title)
|
2010-07-02 08:53:42 -07:00
|
|
|
{
|
2012-08-23 12:33:46 -07:00
|
|
|
nsCOMPtr<nsIURI> ourURI = DeserializeURI(uri);
|
|
|
|
if (!ourURI) {
|
|
|
|
return false;
|
|
|
|
}
|
2010-08-05 10:07:46 -07:00
|
|
|
nsCOMPtr<IHistory> history = services::GetHistoryService();
|
|
|
|
if (history) {
|
2012-08-23 12:33:46 -07:00
|
|
|
history->SetURITitle(ourURI, title);
|
2010-08-05 10:07:46 -07:00
|
|
|
}
|
2010-07-02 08:53:42 -07:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2010-10-20 08:19:24 -07:00
|
|
|
bool
|
2012-08-22 08:56:38 -07:00
|
|
|
ContentParent::RecvShowFilePicker(const int16_t& mode,
|
|
|
|
const int16_t& selectedType,
|
2011-09-28 23:19:26 -07:00
|
|
|
const bool& addToRecentDocs,
|
2010-10-20 08:19:24 -07:00
|
|
|
const nsString& title,
|
|
|
|
const nsString& defaultFile,
|
|
|
|
const nsString& defaultExtension,
|
2010-11-08 18:49:00 -08:00
|
|
|
const InfallibleTArray<nsString>& filters,
|
|
|
|
const InfallibleTArray<nsString>& filterNames,
|
|
|
|
InfallibleTArray<nsString>* files,
|
2012-08-22 08:56:38 -07:00
|
|
|
int16_t* retValue,
|
2010-10-20 08:19:24 -07:00
|
|
|
nsresult* result)
|
|
|
|
{
|
|
|
|
nsCOMPtr<nsIFilePicker> filePicker = do_CreateInstance("@mozilla.org/filepicker;1");
|
|
|
|
if (!filePicker) {
|
|
|
|
*result = NS_ERROR_NOT_AVAILABLE;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// as the parent given to the content process would be meaningless in this
|
|
|
|
// process, always use active window as the parent
|
|
|
|
nsCOMPtr<nsIWindowWatcher> ww = do_GetService(NS_WINDOWWATCHER_CONTRACTID);
|
|
|
|
nsCOMPtr<nsIDOMWindow> window;
|
|
|
|
ww->GetActiveWindow(getter_AddRefs(window));
|
|
|
|
|
|
|
|
// initialize the "real" picker with all data given
|
|
|
|
*result = filePicker->Init(window, title, mode);
|
|
|
|
if (NS_FAILED(*result))
|
|
|
|
return true;
|
2011-05-24 05:28:19 -07:00
|
|
|
|
|
|
|
filePicker->SetAddToRecentDocs(addToRecentDocs);
|
|
|
|
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t count = filters.Length();
|
|
|
|
for (uint32_t i = 0; i < count; ++i) {
|
2010-10-20 08:19:24 -07:00
|
|
|
filePicker->AppendFilter(filterNames[i], filters[i]);
|
|
|
|
}
|
|
|
|
|
|
|
|
filePicker->SetDefaultString(defaultFile);
|
|
|
|
filePicker->SetDefaultExtension(defaultExtension);
|
|
|
|
filePicker->SetFilterIndex(selectedType);
|
|
|
|
|
|
|
|
// and finally open the dialog
|
|
|
|
*result = filePicker->Show(retValue);
|
|
|
|
if (NS_FAILED(*result))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
if (mode == nsIFilePicker::modeOpenMultiple) {
|
|
|
|
nsCOMPtr<nsISimpleEnumerator> fileIter;
|
|
|
|
*result = filePicker->GetFiles(getter_AddRefs(fileIter));
|
|
|
|
|
2012-06-05 19:08:30 -07:00
|
|
|
nsCOMPtr<nsIFile> singleFile;
|
2011-09-28 23:19:26 -07:00
|
|
|
bool loop = true;
|
2010-10-20 08:19:24 -07:00
|
|
|
while (NS_SUCCEEDED(fileIter->HasMoreElements(&loop)) && loop) {
|
|
|
|
fileIter->GetNext(getter_AddRefs(singleFile));
|
|
|
|
if (singleFile) {
|
|
|
|
nsAutoString filePath;
|
|
|
|
singleFile->GetPath(filePath);
|
|
|
|
files->AppendElement(filePath);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
2012-06-05 19:08:30 -07:00
|
|
|
nsCOMPtr<nsIFile> file;
|
2010-10-20 08:19:24 -07:00
|
|
|
filePicker->GetFile(getter_AddRefs(file));
|
|
|
|
|
|
|
|
// even with NS_OK file can be null if nothing was selected
|
|
|
|
if (file) {
|
|
|
|
nsAutoString filePath;
|
|
|
|
file->GetPath(filePath);
|
|
|
|
files->AppendElement(filePath);
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-02-27 12:31:19 -08:00
|
|
|
bool
|
|
|
|
ContentParent::RecvGetRandomValues(const uint32_t& length,
|
|
|
|
InfallibleTArray<uint8_t>* randomValues)
|
|
|
|
{
|
|
|
|
uint8_t* buf = Crypto::GetRandomValues(length);
|
|
|
|
|
|
|
|
randomValues->SetCapacity(length);
|
|
|
|
randomValues->SetLength(length);
|
|
|
|
|
|
|
|
memcpy(randomValues->Elements(), buf, length);
|
|
|
|
|
|
|
|
NS_Free(buf);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2010-08-10 10:14:45 -07:00
|
|
|
bool
|
2012-08-23 12:33:46 -07:00
|
|
|
ContentParent::RecvLoadURIExternal(const URIParams& uri)
|
2010-08-10 10:14:45 -07:00
|
|
|
{
|
|
|
|
nsCOMPtr<nsIExternalProtocolService> extProtService(do_GetService(NS_EXTERNALPROTOCOLSERVICE_CONTRACTID));
|
2012-08-23 12:33:46 -07:00
|
|
|
if (!extProtService) {
|
2010-08-10 10:14:45 -07:00
|
|
|
return true;
|
2012-08-23 12:33:46 -07:00
|
|
|
}
|
|
|
|
nsCOMPtr<nsIURI> ourURI = DeserializeURI(uri);
|
|
|
|
if (!ourURI) {
|
|
|
|
return false;
|
|
|
|
}
|
2012-07-30 07:20:58 -07:00
|
|
|
extProtService->LoadURI(ourURI, nullptr);
|
2010-08-10 10:14:45 -07:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2010-02-01 17:53:52 -08:00
|
|
|
/* void onDispatchedEvent (in nsIThreadInternal thread); */
|
|
|
|
NS_IMETHODIMP
|
2010-07-19 11:33:33 -07:00
|
|
|
ContentParent::OnDispatchedEvent(nsIThreadInternal *thread)
|
2012-01-18 02:23:28 -08:00
|
|
|
{
|
2011-12-02 04:33:05 -08:00
|
|
|
NS_NOTREACHED("OnDispatchedEvent unimplemented");
|
|
|
|
return NS_ERROR_NOT_IMPLEMENTED;
|
2010-02-01 17:53:52 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* void onProcessNextEvent (in nsIThreadInternal thread, in boolean mayWait, in unsigned long recursionDepth); */
|
|
|
|
NS_IMETHODIMP
|
2010-07-19 11:33:33 -07:00
|
|
|
ContentParent::OnProcessNextEvent(nsIThreadInternal *thread,
|
2011-09-28 23:19:26 -07:00
|
|
|
bool mayWait,
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t recursionDepth)
|
2010-02-01 17:53:52 -08:00
|
|
|
{
|
|
|
|
if (mRunToCompletionDepth)
|
|
|
|
++mRunToCompletionDepth;
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* void afterProcessNextEvent (in nsIThreadInternal thread, in unsigned long recursionDepth); */
|
|
|
|
NS_IMETHODIMP
|
2010-07-19 11:33:33 -07:00
|
|
|
ContentParent::AfterProcessNextEvent(nsIThreadInternal *thread,
|
2012-08-22 08:56:38 -07:00
|
|
|
uint32_t recursionDepth)
|
2010-02-01 17:53:52 -08:00
|
|
|
{
|
|
|
|
if (mRunToCompletionDepth &&
|
|
|
|
!--mRunToCompletionDepth) {
|
|
|
|
#ifdef DEBUG
|
|
|
|
printf("... ran to completion.\n");
|
|
|
|
#endif
|
2010-03-29 13:29:45 -07:00
|
|
|
if (mShouldCallUnblockChild) {
|
|
|
|
mShouldCallUnblockChild = false;
|
|
|
|
UnblockChild();
|
|
|
|
}
|
2010-02-01 17:53:52 -08:00
|
|
|
}
|
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
2010-08-05 11:11:32 -07:00
|
|
|
|
2010-09-15 09:44:57 -07:00
|
|
|
bool
|
|
|
|
ContentParent::RecvShowAlertNotification(const nsString& aImageUrl, const nsString& aTitle,
|
2011-09-28 23:19:26 -07:00
|
|
|
const nsString& aText, const bool& aTextClickable,
|
2013-03-18 06:24:53 -07:00
|
|
|
const nsString& aCookie, const nsString& aName,
|
|
|
|
const nsString& aBidi, const nsString& aLang)
|
2010-09-15 09:44:57 -07:00
|
|
|
{
|
2012-12-20 11:06:42 -08:00
|
|
|
if (!AssertAppProcessPermission(this, "desktop-notification")) {
|
|
|
|
return false;
|
|
|
|
}
|
2010-09-15 09:44:57 -07:00
|
|
|
nsCOMPtr<nsIAlertsService> sysAlerts(do_GetService(NS_ALERTSERVICE_CONTRACTID));
|
|
|
|
if (sysAlerts) {
|
|
|
|
sysAlerts->ShowAlertNotification(aImageUrl, aTitle, aText, aTextClickable,
|
2013-03-18 06:24:53 -07:00
|
|
|
aCookie, this, aName, aBidi, aLang);
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::RecvCloseAlert(const nsString& aName)
|
|
|
|
{
|
|
|
|
if (!AssertAppProcessPermission(this, "desktop-notification")) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
nsCOMPtr<nsIAlertsService> sysAlerts(do_GetService(NS_ALERTSERVICE_CONTRACTID));
|
|
|
|
if (sysAlerts) {
|
|
|
|
sysAlerts->CloseAlert(aName);
|
2010-09-15 09:44:57 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
2010-08-31 11:58:35 -07:00
|
|
|
|
2013-03-18 06:24:53 -07:00
|
|
|
bool
|
|
|
|
ContentParent::RecvTestPermissionFromPrincipal(const IPC::Principal& aPrincipal,
|
|
|
|
const nsCString& aType,
|
|
|
|
uint32_t* permission)
|
|
|
|
{
|
|
|
|
nsCOMPtr<nsIPermissionManager> permissionManager =
|
|
|
|
do_GetService(NS_PERMISSIONMANAGER_CONTRACTID);
|
|
|
|
NS_ENSURE_TRUE(permissionManager, false);
|
|
|
|
|
|
|
|
nsresult rv = permissionManager->TestPermissionFromPrincipal(aPrincipal,
|
|
|
|
aType.get(),
|
|
|
|
permission);
|
|
|
|
NS_ENSURE_SUCCESS(rv, false);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2010-08-31 11:58:35 -07:00
|
|
|
bool
|
2012-08-01 23:02:29 -07:00
|
|
|
ContentParent::RecvSyncMessage(const nsString& aMsg,
|
|
|
|
const ClonedMessageData& aData,
|
2010-11-08 18:49:00 -08:00
|
|
|
InfallibleTArray<nsString>* aRetvals)
|
2010-08-31 11:58:35 -07:00
|
|
|
{
|
2011-08-02 12:57:48 -07:00
|
|
|
nsRefPtr<nsFrameMessageManager> ppm = mMessageManager;
|
2010-08-31 11:58:35 -07:00
|
|
|
if (ppm) {
|
2013-01-24 08:24:19 -08:00
|
|
|
StructuredCloneData cloneData = ipc::UnpackClonedMessageDataForParent(aData);
|
2010-08-31 11:58:35 -07:00
|
|
|
ppm->ReceiveMessage(static_cast<nsIContentFrameMessageManager*>(ppm.get()),
|
2013-05-20 05:40:06 -07:00
|
|
|
aMsg, true, &cloneData, JS::NullPtr(), aRetvals);
|
2010-08-31 11:58:35 -07:00
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2012-08-01 23:02:29 -07:00
|
|
|
ContentParent::RecvAsyncMessage(const nsString& aMsg,
|
|
|
|
const ClonedMessageData& aData)
|
2010-08-31 11:58:35 -07:00
|
|
|
{
|
2011-08-02 12:57:48 -07:00
|
|
|
nsRefPtr<nsFrameMessageManager> ppm = mMessageManager;
|
2010-08-31 11:58:35 -07:00
|
|
|
if (ppm) {
|
2013-01-24 08:24:19 -08:00
|
|
|
StructuredCloneData cloneData = ipc::UnpackClonedMessageDataForParent(aData);
|
2010-08-31 11:58:35 -07:00
|
|
|
ppm->ReceiveMessage(static_cast<nsIContentFrameMessageManager*>(ppm.get()),
|
2013-05-20 05:40:06 -07:00
|
|
|
aMsg, false, &cloneData, JS::NullPtr(), nullptr);
|
2010-08-31 11:58:35 -07:00
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
2010-09-20 21:16:37 -07:00
|
|
|
|
2013-01-09 07:03:28 -08:00
|
|
|
bool
|
2013-04-18 07:13:23 -07:00
|
|
|
ContentParent::RecvFilePathUpdateNotify(const nsString& aType,
|
2013-05-11 02:10:18 -07:00
|
|
|
const nsString& aStorageName,
|
2013-04-18 07:13:23 -07:00
|
|
|
const nsString& aFilePath,
|
|
|
|
const nsCString& aReason)
|
2013-01-09 07:03:28 -08:00
|
|
|
{
|
2013-05-11 02:10:18 -07:00
|
|
|
nsRefPtr<DeviceStorageFile> dsf = new DeviceStorageFile(aType,
|
|
|
|
aStorageName,
|
|
|
|
aFilePath);
|
2013-01-09 07:03:28 -08:00
|
|
|
|
|
|
|
nsCOMPtr<nsIObserverService> obs = mozilla::services::GetObserverService();
|
|
|
|
if (!obs) {
|
|
|
|
return false;
|
|
|
|
}
|
2013-05-11 02:10:18 -07:00
|
|
|
obs->NotifyObservers(dsf, "file-watcher-update",
|
|
|
|
NS_ConvertASCIItoUTF16(aReason).get());
|
2013-01-09 07:03:28 -08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-02-26 09:27:31 -08:00
|
|
|
static int32_t
|
|
|
|
AddGeolocationListener(nsIDOMGeoPositionCallback* watcher, bool highAccuracy)
|
|
|
|
{
|
2013-04-12 11:46:36 -07:00
|
|
|
nsCOMPtr<nsIDOMGeoGeolocation> geo = do_GetService("@mozilla.org/geolocation;1");
|
2013-02-26 09:27:31 -08:00
|
|
|
if (!geo) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
GeoPositionOptions* options = new GeoPositionOptions();
|
|
|
|
options->enableHighAccuracy = highAccuracy;
|
|
|
|
int32_t retval = 1;
|
|
|
|
geo->WatchPosition(watcher, nullptr, options, &retval);
|
|
|
|
return retval;
|
|
|
|
}
|
|
|
|
|
2010-09-20 21:16:37 -07:00
|
|
|
bool
|
2013-02-26 09:27:31 -08:00
|
|
|
ContentParent::RecvAddGeolocationListener(const IPC::Principal& aPrincipal,
|
|
|
|
const bool& aHighAccuracy)
|
2010-09-20 21:16:37 -07:00
|
|
|
{
|
2013-01-02 13:21:37 -08:00
|
|
|
#ifdef MOZ_PERMISSIONS
|
|
|
|
if (Preferences::GetBool("geo.testing.ignore_ipc_principal", false) == false) {
|
|
|
|
nsIPrincipal* principal = aPrincipal;
|
|
|
|
if (principal == nullptr) {
|
|
|
|
KillHard();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t principalAppId;
|
|
|
|
nsresult rv = principal->GetAppId(&principalAppId);
|
|
|
|
if (NS_FAILED(rv)) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool found = false;
|
|
|
|
const InfallibleTArray<PBrowserParent*>& browsers = ManagedPBrowserParent();
|
|
|
|
for (uint32_t i = 0; i < browsers.Length(); ++i) {
|
|
|
|
TabParent* tab = static_cast<TabParent*>(browsers[i]);
|
|
|
|
nsCOMPtr<mozIApplication> app = tab->GetOwnOrContainingApp();
|
|
|
|
uint32_t appId;
|
|
|
|
app->GetLocalId(&appId);
|
|
|
|
if (appId == principalAppId) {
|
|
|
|
found = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!found) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// We need to ensure that this permission has been set.
|
|
|
|
// If it hasn't, just noop
|
|
|
|
nsCOMPtr<nsIPermissionManager> pm = do_GetService(NS_PERMISSIONMANAGER_CONTRACTID);
|
|
|
|
if (!pm) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t permission = nsIPermissionManager::UNKNOWN_ACTION;
|
|
|
|
rv = pm->TestPermissionFromPrincipal(principal, "geolocation", &permission);
|
|
|
|
if (NS_FAILED(rv) || permission != nsIPermissionManager::ALLOW_ACTION) {
|
|
|
|
KillHard();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2013-01-06 21:57:00 -08:00
|
|
|
// To ensure no geolocation updates are skipped, we always force the
|
|
|
|
// creation of a new listener.
|
|
|
|
RecvRemoveGeolocationListener();
|
2013-02-26 09:27:31 -08:00
|
|
|
mGeolocationWatchID = AddGeolocationListener(this, aHighAccuracy);
|
2010-09-20 21:16:37 -07:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
2010-11-05 10:43:13 -07:00
|
|
|
ContentParent::RecvRemoveGeolocationListener()
|
2010-09-20 21:16:37 -07:00
|
|
|
{
|
2012-12-03 16:03:16 -08:00
|
|
|
if (mGeolocationWatchID != -1) {
|
|
|
|
nsCOMPtr<nsIDOMGeoGeolocation> geo = do_GetService("@mozilla.org/geolocation;1");
|
|
|
|
if (!geo) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
geo->ClearWatch(mGeolocationWatchID);
|
|
|
|
mGeolocationWatchID = -1;
|
2012-12-01 18:21:56 -08:00
|
|
|
}
|
2010-09-20 21:16:37 -07:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-12-31 08:36:46 -08:00
|
|
|
bool
|
|
|
|
ContentParent::RecvSetGeolocationHigherAccuracy(const bool& aEnable)
|
|
|
|
{
|
2013-02-26 09:27:31 -08:00
|
|
|
// This should never be called without a listener already present,
|
|
|
|
// so this check allows us to forgo securing privileges.
|
|
|
|
if (mGeolocationWatchID != -1) {
|
|
|
|
RecvRemoveGeolocationListener();
|
|
|
|
mGeolocationWatchID = AddGeolocationListener(this, aEnable);
|
|
|
|
}
|
|
|
|
return true;
|
2012-12-31 08:36:46 -08:00
|
|
|
}
|
|
|
|
|
2010-09-20 21:16:37 -07:00
|
|
|
NS_IMETHODIMP
|
|
|
|
ContentParent::HandleEvent(nsIDOMGeoPosition* postion)
|
|
|
|
{
|
2010-12-26 12:03:52 -08:00
|
|
|
unused << SendGeolocationUpdate(GeoPosition(postion));
|
2010-09-20 21:16:37 -07:00
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2012-11-09 09:52:09 -08:00
|
|
|
nsConsoleService *
|
|
|
|
ContentParent::GetConsoleService()
|
|
|
|
{
|
|
|
|
if (mConsoleService) {
|
|
|
|
return mConsoleService.get();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the ConsoleService by CID rather than ContractID, so that we
|
|
|
|
// can cast the returned pointer to an nsConsoleService (rather than
|
|
|
|
// just an nsIConsoleService). This allows us to call the non-idl function
|
|
|
|
// nsConsoleService::LogMessageWithMode.
|
|
|
|
NS_DEFINE_CID(consoleServiceCID, NS_CONSOLESERVICE_CID);
|
|
|
|
nsCOMPtr<nsConsoleService> consoleService(do_GetService(consoleServiceCID));
|
|
|
|
mConsoleService = consoleService;
|
|
|
|
return mConsoleService.get();
|
|
|
|
}
|
|
|
|
|
2010-09-23 18:39:32 -07:00
|
|
|
bool
|
|
|
|
ContentParent::RecvConsoleMessage(const nsString& aMessage)
|
|
|
|
{
|
2012-11-09 09:52:09 -08:00
|
|
|
nsRefPtr<nsConsoleService> consoleService = GetConsoleService();
|
|
|
|
if (!consoleService) {
|
2010-09-23 18:39:32 -07:00
|
|
|
return true;
|
2012-11-09 09:52:09 -08:00
|
|
|
}
|
2010-09-23 18:39:32 -07:00
|
|
|
|
|
|
|
nsRefPtr<nsConsoleMessage> msg(new nsConsoleMessage(aMessage.get()));
|
2012-11-09 09:52:09 -08:00
|
|
|
consoleService->LogMessageWithMode(msg, nsConsoleService::SuppressLog);
|
2010-09-23 18:39:32 -07:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::RecvScriptError(const nsString& aMessage,
|
|
|
|
const nsString& aSourceName,
|
|
|
|
const nsString& aSourceLine,
|
2012-08-22 08:56:38 -07:00
|
|
|
const uint32_t& aLineNumber,
|
|
|
|
const uint32_t& aColNumber,
|
|
|
|
const uint32_t& aFlags,
|
2010-09-23 18:39:32 -07:00
|
|
|
const nsCString& aCategory)
|
|
|
|
{
|
2012-11-09 09:52:09 -08:00
|
|
|
nsRefPtr<nsConsoleService> consoleService = GetConsoleService();
|
|
|
|
if (!consoleService) {
|
|
|
|
return true;
|
|
|
|
}
|
2010-09-23 18:39:32 -07:00
|
|
|
|
|
|
|
nsCOMPtr<nsIScriptError> msg(do_CreateInstance(NS_SCRIPTERROR_CONTRACTID));
|
2012-09-09 16:29:12 -07:00
|
|
|
nsresult rv = msg->Init(aMessage, aSourceName, aSourceLine,
|
2010-09-23 18:39:32 -07:00
|
|
|
aLineNumber, aColNumber, aFlags, aCategory.get());
|
|
|
|
if (NS_FAILED(rv))
|
|
|
|
return true;
|
|
|
|
|
2012-11-09 09:52:09 -08:00
|
|
|
consoleService->LogMessageWithMode(msg, nsConsoleService::SuppressLog);
|
2010-09-23 18:39:32 -07:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-04-19 17:13:20 -07:00
|
|
|
bool
|
|
|
|
ContentParent::RecvPrivateDocShellsExist(const bool& aExist)
|
|
|
|
{
|
2013-04-25 17:53:26 -07:00
|
|
|
if (!sPrivateContent)
|
|
|
|
sPrivateContent = new nsTArray<ContentParent*>();
|
2012-04-19 17:13:20 -07:00
|
|
|
if (aExist) {
|
2013-04-25 17:53:26 -07:00
|
|
|
sPrivateContent->AppendElement(this);
|
2012-04-19 17:13:20 -07:00
|
|
|
} else {
|
2013-04-25 17:53:26 -07:00
|
|
|
sPrivateContent->RemoveElement(this);
|
|
|
|
if (!sPrivateContent->Length()) {
|
2012-04-19 17:13:20 -07:00
|
|
|
nsCOMPtr<nsIObserverService> obs = mozilla::services::GetObserverService();
|
2012-07-30 07:20:58 -07:00
|
|
|
obs->NotifyObservers(nullptr, "last-pb-context-exited", nullptr);
|
2013-04-25 17:53:26 -07:00
|
|
|
delete sPrivateContent;
|
|
|
|
sPrivateContent = NULL;
|
2012-04-19 17:13:20 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2012-09-27 22:43:12 -07:00
|
|
|
bool
|
|
|
|
ContentParent::DoSendAsyncMessage(const nsAString& aMessage,
|
|
|
|
const mozilla::dom::StructuredCloneData& aData)
|
|
|
|
{
|
|
|
|
ClonedMessageData data;
|
2013-01-23 18:39:27 -08:00
|
|
|
if (!BuildClonedMessageDataForParent(this, aData, data)) {
|
|
|
|
return false;
|
2012-09-27 22:43:12 -07:00
|
|
|
}
|
|
|
|
return SendAsyncMessage(nsString(aMessage), data);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool
|
|
|
|
ContentParent::CheckPermission(const nsAString& aPermission)
|
|
|
|
{
|
|
|
|
return AssertAppProcessPermission(this, NS_ConvertUTF16toUTF8(aPermission).get());
|
|
|
|
}
|
|
|
|
|
2012-12-22 04:00:10 -08:00
|
|
|
bool
|
|
|
|
ContentParent::CheckManifestURL(const nsAString& aManifestURL)
|
|
|
|
{
|
|
|
|
return AssertAppProcessManifestURL(this, NS_ConvertUTF16toUTF8(aManifestURL).get());
|
|
|
|
}
|
2012-09-27 22:43:12 -07:00
|
|
|
|
2013-01-14 02:08:55 -08:00
|
|
|
bool
|
|
|
|
ContentParent::CheckAppHasPermission(const nsAString& aPermission)
|
|
|
|
{
|
|
|
|
return AssertAppHasPermission(this, NS_ConvertUTF16toUTF8(aPermission).get());
|
|
|
|
}
|
|
|
|
|
2013-02-14 12:41:30 -08:00
|
|
|
bool
|
|
|
|
ContentParent::RecvSystemMessageHandled()
|
|
|
|
{
|
|
|
|
SystemMessageHandledListener::OnSystemMessageHandled();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2009-08-12 09:18:08 -07:00
|
|
|
} // namespace dom
|
2013-02-14 12:41:30 -08:00
|
|
|
} // namespace mozilla
|