/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=8 sts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #ifndef mozilla_dom_ContentParent_h #define mozilla_dom_ContentParent_h #include "mozilla/dom/PContentParent.h" #include "mozilla/dom/CPOWManagerGetter.h" #include "mozilla/dom/ipc/IdType.h" #include "mozilla/dom/RemoteBrowser.h" #include "mozilla/gfx/gfxVarReceiver.h" #include "mozilla/gfx/GPUProcessListener.h" #include "mozilla/ipc/BackgroundUtils.h" #include "mozilla/ipc/GeckoChildProcessHost.h" #include "mozilla/ipc/PParentToChildStreamParent.h" #include "mozilla/ipc/PChildToParentStreamParent.h" #include "mozilla/Attributes.h" #include "mozilla/DataMutex.h" #include "mozilla/FileUtils.h" #include "mozilla/HalTypes.h" #include "mozilla/LinkedList.h" #include "mozilla/MemoryReportingProcess.h" #include "mozilla/MozPromise.h" #include "mozilla/StaticPtr.h" #include "mozilla/TimeStamp.h" #include "mozilla/Variant.h" #include "mozilla/UniquePtr.h" #include "nsDataHashtable.h" #include "nsPluginTags.h" #include "nsFrameMessageManager.h" #include "nsHashKeys.h" #include "nsIInterfaceRequestor.h" #include "nsIObserver.h" #include "nsIRemoteTab.h" #include "nsIThreadInternal.h" #include "nsIDOMGeoPositionCallback.h" #include "nsIDOMGeoPositionErrorCallback.h" #include "nsRefPtrHashtable.h" #include "PermissionMessageUtils.h" #include "DriverCrashGuard.h" #include "nsIReferrerInfo.h" #define CHILD_PROCESS_SHUTDOWN_MESSAGE \ NS_LITERAL_STRING("child-process-shutdown") // These must match the similar ones in E10SUtils.jsm and ProcInfo.h. // Process names as reported by about:memory are defined in // ContentChild:RecvRemoteType. Add your value there too or it will be called // "Web Content". #define DEFAULT_REMOTE_TYPE "web" #define FISSION_WEB_REMOTE_TYPE "webIsolated" #define FILE_REMOTE_TYPE "file" #define EXTENSION_REMOTE_TYPE "extension" #define PRIVILEGEDABOUT_REMOTE_TYPE "privilegedabout" #define PRIVILEGEDMOZILLA_REMOTE_TYPE "privilegedmozilla" #define WITH_COOP_COEP_REMOTE_TYPE_PREFIX "webCOOP+COEP=" // This must start with the DEFAULT_REMOTE_TYPE above. #define LARGE_ALLOCATION_REMOTE_TYPE "webLargeAllocation" class nsConsoleService; class nsIContentProcessInfo; class nsICycleCollectorLogSink; class nsIDumpGCAndCCLogsCallback; class nsIRemoteTab; class nsITimer; class ParentIdleListener; class nsIWidget; namespace mozilla { class PRemoteSpellcheckEngineParent; #if defined(XP_LINUX) && defined(MOZ_SANDBOX) class SandboxBroker; class SandboxBrokerPolicyFactory; #endif class PreallocatedProcessManagerImpl; class BenchmarkStorageParent; using mozilla::loader::PScriptCacheParent; namespace embedding { class PrintingParent; } namespace ipc { class CrashReporterHost; class PFileDescriptorSetParent; class URIParams; class TestShellParent; #ifdef FUZZING class ProtocolFuzzerHelper; #endif } // namespace ipc namespace jsipc { class PJavaScriptParent; class CpowEntry; } // namespace jsipc namespace layers { struct TextureFactoryIdentifier; } // namespace layers namespace dom { class BrowsingContextGroup; class Element; class BrowserParent; class ClonedMessageData; class MemoryReport; class TabContext; class GetFilesHelper; class MemoryReportRequestHost; class RemoteWorkerManager; struct CancelContentJSOptions; #define NS_CONTENTPARENT_IID \ { \ 0xeeec9ebf, 0x8ecf, 0x4e38, { \ 0x81, 0xda, 0xb7, 0x34, 0x13, 0x7e, 0xac, 0xf3 \ } \ } class ContentParent final : public PContentParent, public nsIObserver, public nsIDOMGeoPositionCallback, public nsIDOMGeoPositionErrorCallback, public nsIInterfaceRequestor, public gfx::gfxVarReceiver, public mozilla::LinkedListElement, public gfx::GPUProcessListener, public mozilla::MemoryReportingProcess, public mozilla::dom::ipc::MessageManagerCallback, public CPOWManagerGetter, public mozilla::ipc::IShmemAllocator { typedef mozilla::ipc::GeckoChildProcessHost GeckoChildProcessHost; typedef mozilla::ipc::PFileDescriptorSetParent PFileDescriptorSetParent; typedef mozilla::ipc::TestShellParent TestShellParent; typedef mozilla::ipc::URIParams URIParams; typedef mozilla::ipc::PrincipalInfo PrincipalInfo; typedef mozilla::dom::ClonedMessageData ClonedMessageData; typedef mozilla::dom::BrowsingContextGroup BrowsingContextGroup; friend class mozilla::PreallocatedProcessManagerImpl; friend class PContentParent; friend class mozilla::dom::RemoteWorkerManager; #ifdef FUZZING friend class mozilla::ipc::ProtocolFuzzerHelper; #endif public: using LaunchError = mozilla::ipc::LaunchError; using LaunchPromise = mozilla::MozPromise, LaunchError, false>; NS_DECLARE_STATIC_IID_ACCESSOR(NS_CONTENTPARENT_IID) /** * Create a subprocess suitable for use later as a content process. */ static RefPtr PreallocateProcess(); /** * Start up the content-process machinery. This might include * scheduling pre-launch tasks. */ static void StartUp(); /** Shut down the content-process machinery. */ static void ShutDown(); static uint32_t GetPoolSize(const nsAString& aContentProcessType); static uint32_t GetMaxProcessCount(const nsAString& aContentProcessType); static bool IsMaxProcessCountReached(const nsAString& aContentProcessType); static void ReleaseCachedProcesses(); /** * Picks a random content parent from |aContentParents| with a given |aOpener| * respecting the index limit set by |aMaxContentParents|. * Returns null if non available. */ static already_AddRefed MinTabSelect( const nsTArray& aContentParents, ContentParent* aOpener, int32_t maxContentParents); /** * Get or create a content process for: * 1. browser iframe * 2. remote xul * 3. normal iframe */ static already_AddRefed GetNewOrUsedBrowserProcess( Element* aFrameElement, const nsAString& aRemoteType, hal::ProcessPriority aPriority = hal::ProcessPriority::PROCESS_PRIORITY_FOREGROUND, ContentParent* aOpener = nullptr, bool aPreferUsed = false); /** * Get or create a content process for a JS plugin. aPluginID is the id of the * JS plugin * (@see nsFakePlugin::mId). There is a maximum of one process per JS plugin. */ static already_AddRefed GetNewOrUsedJSPluginProcess( uint32_t aPluginID, const hal::ProcessPriority& aPriority); /** * Get or create a content process for the given TabContext. aFrameElement * should be the frame/iframe element with which this process will * associated. */ static already_AddRefed CreateBrowser( const TabContext& aContext, Element* aFrameElement, const nsAString& aRemoteType, BrowsingContext* aBrowsingContext, ContentParent* aOpenerContentParent, BrowserParent* aSameTabGroupAs, uint64_t aNextRemoteTabId); static void GetAll(nsTArray& aArray); static void GetAllEvenIfDead(nsTArray& aArray); static void BroadcastStringBundle(const StringBundleDescriptor&); static void BroadcastFontListChanged(); const nsAString& GetRemoteType() const; virtual void DoGetRemoteType(nsAString& aRemoteType, ErrorResult& aError) const override { aRemoteType = GetRemoteType(); } enum CPIteratorPolicy { eLive, eAll }; class ContentParentIterator { private: ContentParent* mCurrent; CPIteratorPolicy mPolicy; public: ContentParentIterator(CPIteratorPolicy aPolicy, ContentParent* aCurrent) : mCurrent(aCurrent), mPolicy(aPolicy) {} ContentParentIterator begin() { // Move the cursor to the first element that matches the policy. while (mPolicy != eAll && mCurrent && !mCurrent->IsAlive()) { mCurrent = mCurrent->LinkedListElement::getNext(); } return *this; } ContentParentIterator end() { return ContentParentIterator(mPolicy, nullptr); } const ContentParentIterator& operator++() { MOZ_ASSERT(mCurrent); do { mCurrent = mCurrent->LinkedListElement::getNext(); } while (mPolicy != eAll && mCurrent && !mCurrent->IsAlive()); return *this; } bool operator!=(const ContentParentIterator& aOther) { MOZ_ASSERT(mPolicy == aOther.mPolicy); return mCurrent != aOther.mCurrent; } ContentParent* operator*() { return mCurrent; } }; static ContentParentIterator AllProcesses(CPIteratorPolicy aPolicy) { ContentParent* first = sContentParents ? sContentParents->getFirst() : nullptr; return ContentParentIterator(aPolicy, first); } static bool IgnoreIPCPrincipal(); static void NotifyUpdatedDictionaries(); static void NotifyUpdatedFonts(); static void NotifyRebuildFontList(); #if defined(XP_WIN) /** * Windows helper for firing off an update window request to a plugin * instance. * * aWidget - the eWindowType_plugin_ipc_chrome widget associated with * this plugin window. */ static void SendAsyncUpdate(nsIWidget* aWidget); #endif // Let managees query if it is safe to send messages. bool IsDestroyed() const { return !mIPCOpen; } mozilla::ipc::IPCResult RecvOpenRecordReplayChannel( const uint32_t& channelId, FileDescriptor* connection); mozilla::ipc::IPCResult RecvCreateReplayingProcess( const uint32_t& aChannelId); mozilla::ipc::IPCResult RecvGenerateReplayCrashReport( const uint32_t& aChannelId); mozilla::ipc::IPCResult RecvCreateGMPService(); mozilla::ipc::IPCResult RecvLoadPlugin( const uint32_t& aPluginId, nsresult* aRv, uint32_t* aRunID, Endpoint* aEndpoint); mozilla::ipc::IPCResult RecvMaybeReloadPlugins(); mozilla::ipc::IPCResult RecvConnectPluginBridge( const uint32_t& aPluginId, nsresult* aRv, Endpoint* aEndpoint); mozilla::ipc::IPCResult RecvLaunchRDDProcess( nsresult* aRv, Endpoint* aEndpoint); mozilla::ipc::IPCResult RecvUngrabPointer(const uint32_t& aTime); mozilla::ipc::IPCResult RecvRemovePermission(const IPC::Principal& aPrincipal, const nsCString& aPermissionType, nsresult* aRv); NS_DECL_CYCLE_COLLECTION_CLASS_AMBIGUOUS(ContentParent, nsIObserver) NS_DECL_CYCLE_COLLECTING_ISUPPORTS NS_DECL_NSIOBSERVER NS_DECL_NSIDOMGEOPOSITIONCALLBACK NS_DECL_NSIDOMGEOPOSITIONERRORCALLBACK NS_DECL_NSIINTERFACEREQUESTOR /** * MessageManagerCallback methods that we override. */ virtual bool DoLoadMessageManagerScript(const nsAString& aURL, bool aRunInGlobalScope) override; virtual nsresult DoSendAsyncMessage(JSContext* aCx, const nsAString& aMessage, StructuredCloneData& aData, JS::Handle aCpows, nsIPrincipal* aPrincipal) override; /** Notify that a tab is beginning its destruction sequence. */ void NotifyTabDestroying(); /** Notify that a tab was destroyed during normal operation. */ void NotifyTabDestroyed(const TabId& aTabId, bool aNotifiedDestroying); TestShellParent* CreateTestShell(); bool DestroyTestShell(TestShellParent* aTestShell); TestShellParent* GetTestShellSingleton(); jsipc::CPOWManager* GetCPOWManager() override; // This method can be called on any thread. void RegisterRemoteWorkerActor(); // This method _must_ be called on main-thread because it can start the // shutting down of the content process. void UnregisterRemoveWorkerActor(); void ReportChildAlreadyBlocked(); bool RequestRunToCompletion(); void UpdateCookieStatus(nsIChannel* aChannel); bool IsLaunching() const { return mLifecycleState == LifecycleState::LAUNCHING; } bool IsAlive() const override; bool IsDead() const { return mLifecycleState == LifecycleState::DEAD; } bool IsForBrowser() const { return mIsForBrowser; } bool IsForJSPlugin() const { return mJSPluginID != nsFakePluginTag::NOT_JSPLUGIN; } GeckoChildProcessHost* Process() const { return mSubprocess; } ContentParent* Opener() const { return mOpener; } nsIContentProcessInfo* ScriptableHelper() const { return mScriptableHelper; } mozilla::dom::ProcessMessageManager* GetMessageManager() const { return mMessageManager; } bool NeedsPermissionsUpdate(const nsACString& aPermissionKey) const; /** * Kill our subprocess and make sure it dies. Should only be used * in emergency situations since it bypasses the normal shutdown * process. * * WARNING: aReason appears in telemetry, so any new value passed in requires * data review. */ void KillHard(const char* aWhy); ContentParentId ChildID() const { return mChildID; } /** * Get a user-friendly name for this ContentParent. We make no guarantees * about this name: It might not be unique, apps can spoof special names, * etc. So please don't use this name to make any decisions about the * ContentParent based on the value returned here. */ void FriendlyName(nsAString& aName, bool aAnonymize = false); virtual void OnChannelError() override; mozilla::ipc::IPCResult RecvInitCrashReporter( Shmem&& aShmem, const NativeThreadId& aThreadId); PNeckoParent* AllocPNeckoParent(); virtual mozilla::ipc::IPCResult RecvPNeckoConstructor( PNeckoParent* aActor) override { return PContentParent::RecvPNeckoConstructor(aActor); } PPrintingParent* AllocPPrintingParent(); bool DeallocPPrintingParent(PPrintingParent* aActor); #if defined(NS_PRINTING) /** * @return the PrintingParent for this ContentParent. */ already_AddRefed GetPrintingParent(); #endif mozilla::ipc::IPCResult RecvInitStreamFilter( const uint64_t& aChannelId, const nsString& aAddonId, InitStreamFilterResolver&& aResolver); PChildToParentStreamParent* AllocPChildToParentStreamParent(); bool DeallocPChildToParentStreamParent(PChildToParentStreamParent* aActor); PParentToChildStreamParent* AllocPParentToChildStreamParent(); bool DeallocPParentToChildStreamParent(PParentToChildStreamParent* aActor); PHalParent* AllocPHalParent(); virtual mozilla::ipc::IPCResult RecvPHalConstructor( PHalParent* aActor) override { return PContentParent::RecvPHalConstructor(aActor); } PHeapSnapshotTempFileHelperParent* AllocPHeapSnapshotTempFileHelperParent(); PJavaScriptParent* AllocPJavaScriptParent(); virtual mozilla::ipc::IPCResult RecvPJavaScriptConstructor( PJavaScriptParent* aActor) override { return PContentParent::RecvPJavaScriptConstructor(aActor); } PRemoteSpellcheckEngineParent* AllocPRemoteSpellcheckEngineParent(); mozilla::ipc::IPCResult RecvRecordingDeviceEvents( const nsString& aRecordingStatus, const nsString& aPageURL, const bool& aIsAudio, const bool& aIsVideo); bool CycleCollectWithLogs(bool aDumpAllTraces, nsICycleCollectorLogSink* aSink, nsIDumpGCAndCCLogsCallback* aCallback); mozilla::ipc::IPCResult RecvNotifyTabDestroying(const TabId& aTabId, const ContentParentId& aCpId); already_AddRefed AllocPOfflineCacheUpdateParent( const URIParams& aManifestURI, const URIParams& aDocumentURI, const PrincipalInfo& aLoadingPrincipalInfo, const bool& aStickDocument, const CookieSettingsArgs& aCookieSettingsArgs); virtual mozilla::ipc::IPCResult RecvPOfflineCacheUpdateConstructor( POfflineCacheUpdateParent* aActor, const URIParams& aManifestURI, const URIParams& aDocumentURI, const PrincipalInfo& aLoadingPrincipal, const bool& stickDocument, const CookieSettingsArgs& aCookieSettingsArgs) override; mozilla::ipc::IPCResult RecvSetOfflinePermission( const IPC::Principal& principal); mozilla::ipc::IPCResult RecvFinishShutdown(); void MaybeInvokeDragSession(BrowserParent* aParent); PContentPermissionRequestParent* AllocPContentPermissionRequestParent( const nsTArray& aRequests, const IPC::Principal& aPrincipal, const IPC::Principal& aTopLevelPrincipal, const bool& aIsHandlingUserInput, const bool& aDocumentHasUserInput, const DOMTimeStamp& aPageLoadTimestamp, const TabId& aTabId); bool DeallocPContentPermissionRequestParent( PContentPermissionRequestParent* actor); virtual bool HandleWindowsMessages(const Message& aMsg) const override; void ForkNewProcess(bool aBlocking); mozilla::ipc::IPCResult RecvCreateWindow( PBrowserParent* aThisBrowserParent, PBrowserParent* aNewTab, const uint32_t& aChromeFlags, const bool& aCalledFromJS, const bool& aPositionSpecified, const bool& aSizeSpecified, const Maybe& aURIToLoad, const nsCString& aFeatures, const float& aFullZoom, const IPC::Principal& aTriggeringPrincipal, nsIContentSecurityPolicy* aCsp, nsIReferrerInfo* aReferrerInfo, CreateWindowResolver&& aResolve); mozilla::ipc::IPCResult RecvCreateWindowInDifferentProcess( PBrowserParent* aThisTab, const uint32_t& aChromeFlags, const bool& aCalledFromJS, const bool& aPositionSpecified, const bool& aSizeSpecified, const Maybe& aURIToLoad, const nsCString& aFeatures, const float& aFullZoom, const nsString& aName, nsIPrincipal* aTriggeringPrincipal, nsIContentSecurityPolicy* aCsp, nsIReferrerInfo* aReferrerInfo); static void BroadcastBlobURLRegistration( const nsACString& aURI, BlobImpl* aBlobImpl, nsIPrincipal* aPrincipal, ContentParent* aIgnoreThisCP = nullptr); static void BroadcastBlobURLUnregistration( const nsACString& aURI, ContentParent* aIgnoreThisCP = nullptr); mozilla::ipc::IPCResult RecvStoreAndBroadcastBlobURLRegistration( const nsCString& aURI, const IPCBlob& aBlob, const Principal& aPrincipal); mozilla::ipc::IPCResult RecvUnstoreAndBroadcastBlobURLUnregistration( const nsCString& aURI); mozilla::ipc::IPCResult RecvGetA11yContentId(uint32_t* aContentId); mozilla::ipc::IPCResult RecvA11yHandlerControl( const uint32_t& aPid, const IHandlerControlHolder& aHandlerControl); virtual int32_t Pid() const override; // PURLClassifierParent. PURLClassifierParent* AllocPURLClassifierParent(const Principal& aPrincipal, bool* aSuccess); virtual mozilla::ipc::IPCResult RecvPURLClassifierConstructor( PURLClassifierParent* aActor, const Principal& aPrincipal, bool* aSuccess) override; // PURLClassifierLocalParent. PURLClassifierLocalParent* AllocPURLClassifierLocalParent( const URIParams& aURI, const nsTArray& aFeatures); virtual mozilla::ipc::IPCResult RecvPURLClassifierLocalConstructor( PURLClassifierLocalParent* aActor, const URIParams& aURI, nsTArray&& aFeatures) override; PLoginReputationParent* AllocPLoginReputationParent(const URIParams& aURI); virtual mozilla::ipc::IPCResult RecvPLoginReputationConstructor( PLoginReputationParent* aActor, const URIParams& aURI) override; bool DeallocPLoginReputationParent(PLoginReputationParent* aActor); PSessionStorageObserverParent* AllocPSessionStorageObserverParent(); virtual mozilla::ipc::IPCResult RecvPSessionStorageObserverConstructor( PSessionStorageObserverParent* aActor) override; bool DeallocPSessionStorageObserverParent( PSessionStorageObserverParent* aActor); PSHEntryParent* AllocPSHEntryParent( PSHistoryParent* aSHistory, const PSHEntryOrSharedID& aEntryOrSharedID); void DeallocPSHEntryParent(PSHEntryParent*); PSHistoryParent* AllocPSHistoryParent(BrowsingContext* aContext); void DeallocPSHistoryParent(PSHistoryParent* aActor); bool DeallocPURLClassifierLocalParent(PURLClassifierLocalParent* aActor); bool DeallocPURLClassifierParent(PURLClassifierParent* aActor); // Use the PHangMonitor channel to ask the child to repaint a tab. void PaintTabWhileInterruptingJS(BrowserParent* aBrowserParent, const layers::LayersObserverEpoch& aEpoch); void CancelContentJSExecutionIfRunning( BrowserParent* aBrowserParent, nsIRemoteTab::NavigationType aNavigationType, const CancelContentJSOptions& aCancelContentJSOptions); // This function is called when we are about to load a document from an // HTTP(S) or FTP channel for a content process. It is a useful place // to start to kick off work as early as possible in response to such // document loads. nsresult AboutToLoadHttpFtpDocumentForChild(nsIChannel* aChannel); nsresult TransmitPermissionsForPrincipal(nsIPrincipal* aPrincipal); void OnCompositorDeviceReset() override; PClientOpenWindowOpParent* AllocPClientOpenWindowOpParent( const ClientOpenWindowArgs& aArgs); bool DeallocPClientOpenWindowOpParent(PClientOpenWindowOpParent* aActor); static hal::ProcessPriority GetInitialProcessPriority(Element* aFrameElement); // Control the priority of the IPC messages for input events. void SetInputPriorityEventEnabled(bool aEnabled); bool IsInputPriorityEventEnabled() { return mIsInputPriorityEventEnabled; } static bool IsInputEventQueueSupported(); mozilla::ipc::IPCResult RecvAttachBrowsingContext( BrowsingContext::IPCInitializer&& aInit); mozilla::ipc::IPCResult RecvDetachBrowsingContext( uint64_t aContextId, DetachBrowsingContextResolver&& aResolve); mozilla::ipc::IPCResult RecvCacheBrowsingContextChildren( BrowsingContext* aContext); mozilla::ipc::IPCResult RecvRestoreBrowsingContextChildren( BrowsingContext* aContext, BrowsingContext::Children&& aChildren); mozilla::ipc::IPCResult RecvWindowClose(BrowsingContext* aContext, bool aTrustedCaller); mozilla::ipc::IPCResult RecvWindowFocus(BrowsingContext* aContext); mozilla::ipc::IPCResult RecvWindowBlur(BrowsingContext* aContext); mozilla::ipc::IPCResult RecvWindowPostMessage( BrowsingContext* aContext, const ClonedMessageData& aMessage, const PostMessageData& aData); FORWARD_SHMEM_ALLOCATOR_TO(PContentParent) protected: bool CheckBrowsingContextOwnership(BrowsingContext* aBC, const char* aOperation) const; void OnChannelConnected(int32_t pid) override; void ActorDestroy(ActorDestroyReason why) override; void ActorDealloc() override; bool ShouldContinueFromReplyTimeout() override; void OnVarChanged(const GfxVarUpdate& aVar) override; void OnCompositorUnexpectedShutdown() override; private: /** * A map of the remote content process type to a list of content parents * currently available to host *new* tabs/frames of that type. * * If a content process is identified as troubled or dead, it will be * removed from this list, but will still be in the sContentParents list for * the GetAll/GetAllEvenIfDead APIs. */ static nsClassHashtable>* sBrowserContentParents; static nsTArray* sPrivateContent; static nsDataHashtable* sJSPluginContentParents; static StaticAutoPtr> sContentParents; #if defined(XP_MACOSX) && defined(MOZ_SANDBOX) // Cached Mac sandbox params used when launching content processes. static StaticAutoPtr> sMacSandboxParams; #endif // Set aLoadUri to true to load aURIToLoad and to false to only create the // window. aURIToLoad should always be provided, if available, to ensure // compatibility with GeckoView. mozilla::ipc::IPCResult CommonCreateWindow( PBrowserParent* aThisTab, bool aSetOpener, const uint32_t& aChromeFlags, const bool& aCalledFromJS, const bool& aPositionSpecified, const bool& aSizeSpecified, nsIURI* aURIToLoad, const nsCString& aFeatures, const float& aFullZoom, uint64_t aNextRemoteTabId, const nsString& aName, nsresult& aResult, nsCOMPtr& aNewRemoteTab, bool* aWindowIsNew, int32_t& aOpenLocation, nsIPrincipal* aTriggeringPrincipal, nsIReferrerInfo* aReferrerInfo, bool aLoadUri, nsIContentSecurityPolicy* aCsp); enum RecordReplayState { eNotRecordingOrReplaying, eRecording, eReplaying }; explicit ContentParent(int32_t aPluginID) : ContentParent(nullptr, EmptyString(), eNotRecordingOrReplaying, EmptyString(), aPluginID) {} ContentParent(ContentParent* aOpener, const nsAString& aRemoteType, RecordReplayState aRecordReplayState = eNotRecordingOrReplaying, const nsAString& aRecordingFile = EmptyString()) : ContentParent(aOpener, aRemoteType, aRecordReplayState, aRecordingFile, nsFakePluginTag::NOT_JSPLUGIN) {} ContentParent(ContentParent* aOpener, const nsAString& aRemoteType, RecordReplayState aRecordReplayState, const nsAString& aRecordingFile, int32_t aPluginID); // Launch the subprocess and associated initialization. // Returns false if the process fails to start. // Deprecated in favor of LaunchSubprocessAsync. bool LaunchSubprocessSync(hal::ProcessPriority aInitialPriority); // Launch the subprocess and associated initialization; // returns a promise and signals failure by rejecting. // OS-level launching work is dispatched to another thread, but some // initialization (creating IPDL actors, etc.; see Init()) is run on // the main thread. RefPtr LaunchSubprocessAsync( hal::ProcessPriority aInitialPriority); // Common implementation of LaunchSubprocess{Sync,Async}. void LaunchSubprocessInternal( hal::ProcessPriority aInitialPriority, mozilla::Variant*>&& aRetval); // Common initialization after sub process launch. bool InitInternal(ProcessPriority aPriority); // Generate a minidump for the child process and one for the main process void GeneratePairedMinidump(const char* aReason); virtual ~ContentParent(); void Init(); // Some information could be sent to content very early, it // should be send from this function. This function should only be // called after the process has been transformed to browser. void ForwardKnownInfo(); /** * We might want to reuse barely used content processes if certain criteria * are met. */ bool TryToRecycle(); /** * Removing it from the static array so it won't be returned for new tabs in * GetNewOrUsedBrowserProcess. */ void RemoveFromList(); /** * Decide whether the process should be kept alive even when it would normally * be shut down, for example when all its tabs are closed. */ bool ShouldKeepProcessAlive(); /** * Mark this ContentParent as "troubled". This means that it is still alive, * but it won't be returned for new tabs in GetNewOrUsedBrowserProcess. */ void MarkAsTroubled(); /** * Mark this ContentParent as dead for the purposes of Get*(). * This method is idempotent. */ void MarkAsDead(); /** * How we will shut down this ContentParent and its subprocess. */ enum ShutDownMethod { // Send a shutdown message and wait for FinishShutdown call back. SEND_SHUTDOWN_MESSAGE, // Close the channel ourselves and let the subprocess clean up itself. CLOSE_CHANNEL, // Close the channel with error and let the subprocess clean up itself. CLOSE_CHANNEL_WITH_ERROR, }; void MaybeAsyncSendShutDownMessage(); /** * Exit the subprocess and vamoose. After this call IsAlive() * will return false and this ContentParent will not be returned * by the Get*() funtions. However, the shutdown sequence itself * may be asynchronous. * * If aMethod is CLOSE_CHANNEL_WITH_ERROR and this is the first call * to ShutDownProcess, then we'll close our channel using CloseWithError() * rather than vanilla Close(). CloseWithError() indicates to IPC that this * is an abnormal shutdown (e.g. a crash). */ void ShutDownProcess(ShutDownMethod aMethod); // Perform any steps necesssary to gracefully shtudown the message // manager and null out mMessageManager. void ShutDownMessageManager(); // Start the force-kill timer on shutdown. void StartForceKillTimer(); // Ensure that the permissions for the giben Permission key are set in the // content process. // // See nsIPermissionManager::GetPermissionsForKey for more information on // these keys. void EnsurePermissionsByKey(const nsCString& aKey); static void ForceKillTimerCallback(nsITimer* aTimer, void* aClosure); bool CanOpenBrowser(const IPCTabContext& aContext); /** * Get or create the corresponding content parent array to * |aContentProcessType|. */ static nsTArray& GetOrCreatePool( const nsAString& aContentProcessType); mozilla::ipc::IPCResult RecvInitBackground( Endpoint&& aEndpoint); mozilla::ipc::IPCResult RecvAddMemoryReport(const MemoryReport& aReport); mozilla::ipc::IPCResult RecvFinishMemoryReport(const uint32_t& aGeneration); mozilla::ipc::IPCResult RecvAddPerformanceMetrics( const nsID& aID, nsTArray&& aMetrics); bool DeallocPJavaScriptParent(mozilla::jsipc::PJavaScriptParent*); bool DeallocPRemoteSpellcheckEngineParent(PRemoteSpellcheckEngineParent*); mozilla::ipc::IPCResult RecvConstructPopupBrowser( ManagedEndpoint&& actor, ManagedEndpoint&& windowEp, const TabId& tabId, const IPCTabContext& context, const WindowGlobalInit& initialWindowInit, const uint32_t& chromeFlags); mozilla::ipc::IPCResult RecvIsSecureURI( const uint32_t& aType, const URIParams& aURI, const uint32_t& aFlags, const OriginAttributes& aOriginAttributes, bool* aIsSecureURI); mozilla::ipc::IPCResult RecvAccumulateMixedContentHSTS( const URIParams& aURI, const bool& aActive, const OriginAttributes& aOriginAttributes); bool DeallocPHalParent(PHalParent*); bool DeallocPHeapSnapshotTempFileHelperParent( PHeapSnapshotTempFileHelperParent*); PCycleCollectWithLogsParent* AllocPCycleCollectWithLogsParent( const bool& aDumpAllTraces, const FileDescriptor& aGCLog, const FileDescriptor& aCCLog); bool DeallocPCycleCollectWithLogsParent(PCycleCollectWithLogsParent* aActor); PTestShellParent* AllocPTestShellParent(); bool DeallocPTestShellParent(PTestShellParent* shell); PScriptCacheParent* AllocPScriptCacheParent(const FileDescOrError& cacheFile, const bool& wantCacheData); bool DeallocPScriptCacheParent(PScriptCacheParent* shell); bool DeallocPNeckoParent(PNeckoParent* necko); PPSMContentDownloaderParent* AllocPPSMContentDownloaderParent( const uint32_t& aCertType); bool DeallocPPSMContentDownloaderParent( PPSMContentDownloaderParent* aDownloader); already_AddRefed AllocPExternalHelperAppParent( const Maybe& aUri, const Maybe& aLoadInfoArgs, const nsCString& aMimeContentType, const nsCString& aContentDisposition, const uint32_t& aContentDispositionHint, const nsString& aContentDispositionFilename, const bool& aForceSave, const int64_t& aContentLength, const bool& aWasFileChannel, const Maybe& aReferrer, BrowsingContext* aContext, const bool& aShouldCloseWindow); mozilla::ipc::IPCResult RecvPExternalHelperAppConstructor( PExternalHelperAppParent* actor, const Maybe& uri, const Maybe& loadInfoArgs, const nsCString& aMimeContentType, const nsCString& aContentDisposition, const uint32_t& aContentDispositionHint, const nsString& aContentDispositionFilename, const bool& aForceSave, const int64_t& aContentLength, const bool& aWasFileChannel, const Maybe& aReferrer, BrowsingContext* aContext, const bool& aShouldCloseWindow) override; already_AddRefed AllocPHandlerServiceParent(); PMediaParent* AllocPMediaParent(); bool DeallocPMediaParent(PMediaParent* aActor); PBenchmarkStorageParent* AllocPBenchmarkStorageParent(); bool DeallocPBenchmarkStorageParent(PBenchmarkStorageParent* aActor); PPresentationParent* AllocPPresentationParent(); bool DeallocPPresentationParent(PPresentationParent* aActor); virtual mozilla::ipc::IPCResult RecvPPresentationConstructor( PPresentationParent* aActor) override; PSpeechSynthesisParent* AllocPSpeechSynthesisParent(); bool DeallocPSpeechSynthesisParent(PSpeechSynthesisParent* aActor); virtual mozilla::ipc::IPCResult RecvPSpeechSynthesisConstructor( PSpeechSynthesisParent* aActor) override; PWebBrowserPersistDocumentParent* AllocPWebBrowserPersistDocumentParent( PBrowserParent* aBrowser, const uint64_t& aOuterWindowID); bool DeallocPWebBrowserPersistDocumentParent( PWebBrowserPersistDocumentParent* aActor); mozilla::ipc::IPCResult RecvGetGfxVars(nsTArray* aVars); mozilla::ipc::IPCResult RecvReadFontList(nsTArray* retValue); mozilla::ipc::IPCResult RecvSetClipboard( const IPCDataTransfer& aDataTransfer, const bool& aIsPrivateData, const IPC::Principal& aRequestingPrincipal, const uint32_t& aContentPolicyType, const int32_t& aWhichClipboard); mozilla::ipc::IPCResult RecvGetClipboard(nsTArray&& aTypes, const int32_t& aWhichClipboard, IPCDataTransfer* aDataTransfer); mozilla::ipc::IPCResult RecvEmptyClipboard(const int32_t& aWhichClipboard); mozilla::ipc::IPCResult RecvClipboardHasType(nsTArray&& aTypes, const int32_t& aWhichClipboard, bool* aHasType); mozilla::ipc::IPCResult RecvGetExternalClipboardFormats( const int32_t& aWhichClipboard, const bool& aPlainTextOnly, nsTArray* aTypes); mozilla::ipc::IPCResult RecvPlaySound(const URIParams& aURI); mozilla::ipc::IPCResult RecvBeep(); mozilla::ipc::IPCResult RecvPlayEventSound(const uint32_t& aEventId); mozilla::ipc::IPCResult RecvGetIconForExtension(const nsCString& aFileExt, const uint32_t& aIconSize, nsTArray* bits); mozilla::ipc::IPCResult RecvGetShowPasswordSetting(bool* showPassword); mozilla::ipc::IPCResult RecvStartVisitedQueries(const nsTArray&); mozilla::ipc::IPCResult RecvSetURITitle(const URIParams& uri, const nsString& title); bool HasNotificationPermission(const IPC::Principal& aPrincipal); mozilla::ipc::IPCResult RecvShowAlert(nsIAlertNotification* aAlert); mozilla::ipc::IPCResult RecvCloseAlert(const nsString& aName, const IPC::Principal& aPrincipal); mozilla::ipc::IPCResult RecvDisableNotifications( const IPC::Principal& aPrincipal); mozilla::ipc::IPCResult RecvOpenNotificationSettings( const IPC::Principal& aPrincipal); mozilla::ipc::IPCResult RecvNotificationEvent( const nsString& aType, const NotificationEventData& aData); mozilla::ipc::IPCResult RecvLoadURIExternal(const URIParams& uri, PBrowserParent* windowContext); mozilla::ipc::IPCResult RecvExtProtocolChannelConnectParent( const uint32_t& registrarId); mozilla::ipc::IPCResult RecvSyncMessage( const nsString& aMsg, const ClonedMessageData& aData, nsTArray&& aCpows, const IPC::Principal& aPrincipal, nsTArray* aRetvals); mozilla::ipc::IPCResult RecvRpcMessage( const nsString& aMsg, const ClonedMessageData& aData, nsTArray&& aCpows, const IPC::Principal& aPrincipal, nsTArray* aRetvals); mozilla::ipc::IPCResult RecvAsyncMessage(const nsString& aMsg, nsTArray&& aCpows, const IPC::Principal& aPrincipal, const ClonedMessageData& aData); // MOZ_CAN_RUN_SCRIPT_BOUNDARY because we don't have MOZ_CAN_RUN_SCRIPT bits // in IPC code yet. MOZ_CAN_RUN_SCRIPT_BOUNDARY mozilla::ipc::IPCResult RecvAddGeolocationListener( const IPC::Principal& aPrincipal, const bool& aHighAccuracy); mozilla::ipc::IPCResult RecvRemoveGeolocationListener(); // MOZ_CAN_RUN_SCRIPT_BOUNDARY because we don't have MOZ_CAN_RUN_SCRIPT bits // in IPC code yet. MOZ_CAN_RUN_SCRIPT_BOUNDARY mozilla::ipc::IPCResult RecvSetGeolocationHigherAccuracy(const bool& aEnable); mozilla::ipc::IPCResult RecvConsoleMessage(const nsString& aMessage); mozilla::ipc::IPCResult RecvScriptError( const nsString& aMessage, const nsString& aSourceName, const nsString& aSourceLine, const uint32_t& aLineNumber, const uint32_t& aColNumber, const uint32_t& aFlags, const nsCString& aCategory, const bool& aIsFromPrivateWindow, const uint64_t& aInnerWindowId, const bool& aIsFromChromeContext); mozilla::ipc::IPCResult RecvScriptErrorWithStack( const nsString& aMessage, const nsString& aSourceName, const nsString& aSourceLine, const uint32_t& aLineNumber, const uint32_t& aColNumber, const uint32_t& aFlags, const nsCString& aCategory, const bool& aIsFromPrivateWindow, const bool& aIsFromChromeContext, const ClonedMessageData& aStack); private: mozilla::ipc::IPCResult RecvScriptErrorInternal( const nsString& aMessage, const nsString& aSourceName, const nsString& aSourceLine, const uint32_t& aLineNumber, const uint32_t& aColNumber, const uint32_t& aFlags, const nsCString& aCategory, const bool& aIsFromPrivateWindow, const bool& aIsFromChromeContext, const ClonedMessageData* aStack = nullptr); public: mozilla::ipc::IPCResult RecvPrivateDocShellsExist(const bool& aExist); mozilla::ipc::IPCResult RecvCommitBrowsingContextTransaction( BrowsingContext* aContext, BrowsingContext::Transaction&& aTransaction, uint64_t aEpoch); mozilla::ipc::IPCResult RecvFirstIdle(); mozilla::ipc::IPCResult RecvDeviceReset(); mozilla::ipc::IPCResult RecvKeywordToURI(const nsCString& aKeyword, const bool& aIsPrivateContext, nsString* aProviderName, RefPtr* aPostData, Maybe* aURI); mozilla::ipc::IPCResult RecvNotifyKeywordSearchLoading( const nsString& aProvider, const nsString& aKeyword); mozilla::ipc::IPCResult RecvCopyFavicon( const URIParams& aOldURI, const URIParams& aNewURI, const IPC::Principal& aLoadingPrincipal, const bool& aInPrivateBrowsing); virtual void ProcessingError(Result aCode, const char* aMsgName) override; mozilla::ipc::IPCResult RecvGraphicsError(const nsCString& aError); mozilla::ipc::IPCResult RecvBeginDriverCrashGuard(const uint32_t& aGuardType, bool* aOutCrashed); mozilla::ipc::IPCResult RecvEndDriverCrashGuard(const uint32_t& aGuardType); mozilla::ipc::IPCResult RecvAddIdleObserver(const uint64_t& observerId, const uint32_t& aIdleTimeInS); mozilla::ipc::IPCResult RecvRemoveIdleObserver(const uint64_t& observerId, const uint32_t& aIdleTimeInS); mozilla::ipc::IPCResult RecvBackUpXResources( const FileDescriptor& aXSocketFd); mozilla::ipc::IPCResult RecvRequestAnonymousTemporaryFile( const uint64_t& aID); mozilla::ipc::IPCResult RecvCreateAudioIPCConnection( CreateAudioIPCConnectionResolver&& aResolver); PFileDescriptorSetParent* AllocPFileDescriptorSetParent( const mozilla::ipc::FileDescriptor&); bool DeallocPFileDescriptorSetParent(PFileDescriptorSetParent*); PWebrtcGlobalParent* AllocPWebrtcGlobalParent(); bool DeallocPWebrtcGlobalParent(PWebrtcGlobalParent* aActor); mozilla::ipc::IPCResult RecvUpdateDropEffect(const uint32_t& aDragAction, const uint32_t& aDropEffect); mozilla::ipc::IPCResult RecvShutdownProfile(const nsCString& aProfile); mozilla::ipc::IPCResult RecvGetGraphicsDeviceInitData( ContentDeviceData* aOut); mozilla::ipc::IPCResult RecvGetFontListShmBlock( const uint32_t& aGeneration, const uint32_t& aIndex, mozilla::ipc::SharedMemoryBasic::Handle* aOut); mozilla::ipc::IPCResult RecvInitializeFamily(const uint32_t& aGeneration, const uint32_t& aFamilyIndex); mozilla::ipc::IPCResult RecvSetCharacterMap( const uint32_t& aGeneration, const mozilla::fontlist::Pointer& aFacePtr, const gfxSparseBitSet& aMap); mozilla::ipc::IPCResult RecvInitOtherFamilyNames(const uint32_t& aGeneration, const bool& aDefer, bool* aLoaded); mozilla::ipc::IPCResult RecvSetupFamilyCharMap( const uint32_t& aGeneration, const mozilla::fontlist::Pointer& aFamilyPtr); mozilla::ipc::IPCResult RecvGetHyphDict( const mozilla::ipc::URIParams& aURIParams, mozilla::ipc::SharedMemoryBasic::Handle* aOutHandle, uint32_t* aOutSize); mozilla::ipc::IPCResult RecvNotifyBenchmarkResult(const nsString& aCodecName, const uint32_t& aDecodeFPS); mozilla::ipc::IPCResult RecvNotifyPushObservers( const nsCString& aScope, const IPC::Principal& aPrincipal, const nsString& aMessageId); mozilla::ipc::IPCResult RecvNotifyPushObserversWithData( const nsCString& aScope, const IPC::Principal& aPrincipal, const nsString& aMessageId, nsTArray&& aData); mozilla::ipc::IPCResult RecvNotifyPushSubscriptionChangeObservers( const nsCString& aScope, const IPC::Principal& aPrincipal); mozilla::ipc::IPCResult RecvPushError(const nsCString& aScope, const IPC::Principal& aPrincipal, const nsString& aMessage, const uint32_t& aFlags); mozilla::ipc::IPCResult RecvNotifyPushSubscriptionModifiedObservers( const nsCString& aScope, const IPC::Principal& aPrincipal); mozilla::ipc::IPCResult RecvGetFilesRequest(const nsID& aID, const nsString& aDirectoryPath, const bool& aRecursiveFlag); mozilla::ipc::IPCResult RecvDeleteGetFilesRequest(const nsID& aID); mozilla::ipc::IPCResult RecvAccumulateChildHistograms( nsTArray&& aAccumulations); mozilla::ipc::IPCResult RecvAccumulateChildKeyedHistograms( nsTArray&& aAccumulations); mozilla::ipc::IPCResult RecvUpdateChildScalars( nsTArray&& aScalarActions); mozilla::ipc::IPCResult RecvUpdateChildKeyedScalars( nsTArray&& aScalarActions); mozilla::ipc::IPCResult RecvRecordChildEvents( nsTArray&& events); mozilla::ipc::IPCResult RecvRecordDiscardedData( const DiscardedData& aDiscardedData); mozilla::ipc::IPCResult RecvRecordOrigin(const uint32_t& aMetricId, const nsCString& aOrigin); mozilla::ipc::IPCResult RecvReportContentBlockingLog( const IPCStream& aIPCStream); mozilla::ipc::IPCResult RecvBHRThreadHang(const HangDetails& aHangDetails); mozilla::ipc::IPCResult RecvAutomaticStorageAccessCanBeGranted( const Principal& aPrincipal, AutomaticStorageAccessCanBeGrantedResolver&& aResolver); mozilla::ipc::IPCResult RecvFirstPartyStorageAccessGrantedForOrigin( const Principal& aParentPrincipal, const Principal& aTrackingPrincipal, const nsCString& aTrackingOrigin, const nsCString& aGrantedOrigin, const int& aAllowMode, FirstPartyStorageAccessGrantedForOriginResolver&& aResolver); mozilla::ipc::IPCResult RecvStoreUserInteractionAsPermission( const Principal& aPrincipal); mozilla::ipc::IPCResult RecvNotifyMediaActiveChanged( BrowsingContext* aContext, bool aActive); mozilla::ipc::IPCResult RecvNotifyMediaAudibleChanged( BrowsingContext* aContext, bool aAudible); // Notify the ContentChild to enable the input event prioritization when // initializing. void MaybeEnableRemoteInputEventQueue(); #if defined(XP_MACOSX) && defined(MOZ_SANDBOX) void AppendSandboxParams(std::vector& aArgs); void AppendDynamicSandboxParams(std::vector& aArgs); #endif public: void SendGetFilesResponseAndForget(const nsID& aID, const GetFilesResponseResult& aResult); bool SendRequestMemoryReport(const uint32_t& aGeneration, const bool& aAnonymize, const bool& aMinimizeMemoryUsage, const Maybe& aDMDFile) override; nsresult SaveRecording(nsIFile* aFile, bool* aRetval); bool IsRecordingOrReplaying() const { return mRecordReplayState != eNotRecordingOrReplaying; } void OnBrowsingContextGroupSubscribe(BrowsingContextGroup* aGroup); void OnBrowsingContextGroupUnsubscribe(BrowsingContextGroup* aGroup); // See `BrowsingContext::mEpochs` for an explanation of this field. uint64_t GetBrowsingContextFieldEpoch() const { return mBrowsingContextFieldEpoch; } void UpdateNetworkLinkType(); static bool ShouldSyncPreference(const char16_t* aData); private: // Released in ActorDealloc; deliberately not exposed to the CC. RefPtr mSelfRef; // If you add strong pointers to cycle collected objects here, be sure to // release these objects in ShutDownProcess. See the comment there for more // details. GeckoChildProcessHost* mSubprocess; const TimeStamp mLaunchTS; // used to calculate time to start content process TimeStamp mLaunchYieldTS; // used to calculate async launch main thread time TimeStamp mActivateTS; ContentParent* mOpener; nsString mRemoteType; ContentParentId mChildID; int32_t mGeolocationWatchID; // This contains the id for the JS plugin (@see nsFakePluginTag) if this is // the ContentParent for a process containing iframes for that JS plugin. If // this is not a ContentParent for a JS plugin then it contains the value // nsFakePluginTag::NOT_JSPLUGIN. int32_t mJSPluginID; // After we initiate shutdown, we also start a timer to ensure // that even content processes that are 100% blocked (say from // SIGSTOP), are still killed eventually. This task enforces that // timer. nsCOMPtr mForceKillTimer; // `mCount` is increased when a RemoteWorkerParent actor is created for this // ContentProcess and it is decreased when the actor is destroyed. // // `mShutdownStarted` is flipped to `true` when a runnable that calls // `ShutDownProcess` is dispatched; it's needed because the corresponding // Content Process may be shutdown if there's no remote worker actors, and // decrementing `mCount` and the call to `ShutDownProcess` are async. So, // when a worker is going to be spawned and we see that `mCount` is 0, // we can decide whether or not to use that process based on the value of // `mShutdownStarted.` // // It's touched on PBackground thread and on main-thread. struct RemoteWorkerActorData { uint32_t mCount = 0; bool mShutdownStarted = false; }; DataMutex mRemoteWorkerActorData; // How many tabs we're waiting to finish their destruction // sequence. Precisely, how many BrowserParents have called // NotifyTabDestroying() but not called NotifyTabDestroyed(). int32_t mNumDestroyingTabs; // The process starts in the LAUNCHING state, and transitions to // ALIVE once it can accept IPC messages. It remains ALIVE only // while remote content is being actively used from this process. // After the state becaomes DEAD, some previously scheduled IPC // traffic may still pass through. enum class LifecycleState : uint8_t { LAUNCHING, ALIVE, DEAD, }; LifecycleState mLifecycleState; bool mIsForBrowser; // Whether this process is recording or replaying its execution, and any // associated recording file. RecordReplayState mRecordReplayState; nsString mRecordingFile; // When recording or replaying, the child process is a middleman. This vector // stores any replaying children we have spawned on behalf of that middleman, // indexed by their record/replay channel ID. Vector mReplayingChildren; // These variables track whether we've called Close() and KillHard() on our // channel. bool mCalledClose; bool mCalledKillHard; bool mCreatedPairedMinidumps; bool mShutdownPending; bool mIPCOpen; // True if the input event queue on the main thread of the content process is // enabled. bool mIsRemoteInputEventQueueEnabled; // True if we send input events with input priority. Otherwise, we send input // events with normal priority. bool mIsInputPriorityEventEnabled; RefPtr mConsoleService; nsConsoleService* GetConsoleService(); nsCOMPtr mScriptableHelper; nsTArray> mIdleListeners; #ifdef MOZ_X11 // Dup of child's X socket, used to scope its resources to this // object instead of the child process's lifetime. ScopedClose mChildXSocketFdDup; #endif PProcessHangMonitorParent* mHangMonitorActor; UniquePtr mDriverCrashGuard; UniquePtr mMemoryReportRequest; #if defined(XP_LINUX) && defined(MOZ_SANDBOX) mozilla::UniquePtr mSandboxBroker; static mozilla::UniquePtr sSandboxBrokerPolicyFactory; #endif #ifdef NS_PRINTING RefPtr mPrintingParent; #endif // This hashtable is used to run GetFilesHelper objects in the parent process. // GetFilesHelper can be aborted by receiving RecvDeleteGetFilesRequest. nsRefPtrHashtable mGetFilesPendingRequests; nsTHashtable mActivePermissionKeys; nsTArray mBlobURLs; UniquePtr mCrashReporter; // Collects any pref changes that occur during process launch (after // the initial map is passed in command-line arguments) to be sent // when the process can receive IPC messages. nsTArray mQueuedPrefs; RefPtr mMessageManager; static uint64_t sNextRemoteTabId; static nsDataHashtable sNextBrowserParents; #if defined(XP_MACOSX) && defined(MOZ_SANDBOX) // When set to true, indicates that content processes should // initialize their sandbox during startup instead of waiting // for the SetProcessSandbox IPDL message. static bool sEarlySandboxInit; #endif nsTHashtable> mGroups; // See `BrowsingContext::mEpochs` for an explanation of this field. uint64_t mBrowsingContextFieldEpoch = 0; }; NS_DEFINE_STATIC_IID_ACCESSOR(ContentParent, NS_CONTENTPARENT_IID) // This is the C++ version of remoteTypePrefix in E10SUtils.jsm. const nsDependentSubstring RemoteTypePrefix( const nsAString& aContentProcessType); // This is based on isWebRemoteType in E10SUtils.jsm. bool IsWebRemoteType(const nsAString& aContentProcessType); bool IsWebCoopCoepRemoteType(const nsAString& aContentProcessType); } // namespace dom } // namespace mozilla class ParentIdleListener : public nsIObserver { friend class mozilla::dom::ContentParent; public: NS_DECL_ISUPPORTS NS_DECL_NSIOBSERVER ParentIdleListener(mozilla::dom::ContentParent* aParent, uint64_t aObserver, uint32_t aTime) : mParent(aParent), mObserver(aObserver), mTime(aTime) {} private: virtual ~ParentIdleListener() {} RefPtr mParent; uint64_t mObserver; uint32_t mTime; }; #endif // mozilla_dom_ContentParent_h