/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 2 -*- * vim: sw=2 ts=4 et : * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #include "mozilla/plugins/PluginModuleParent.h" #include "base/process_util.h" #include "mozilla/Attributes.h" #include "mozilla/AutoRestore.h" #include "mozilla/BackgroundHangMonitor.h" #include "mozilla/dom/ContentParent.h" #include "mozilla/dom/ContentChild.h" #include "mozilla/dom/Document.h" #include "mozilla/ipc/CrashReporterClient.h" #include "mozilla/ipc/CrashReporterHost.h" #include "mozilla/dom/Element.h" #include "mozilla/ipc/Endpoint.h" #include "mozilla/ipc/GeckoChildProcessHost.h" #include "mozilla/ipc/MessageChannel.h" #include "mozilla/layers/ImageBridgeChild.h" #include "mozilla/plugins/BrowserStreamParent.h" #include "mozilla/plugins/PluginBridge.h" #include "mozilla/plugins/PluginInstanceParent.h" #include "mozilla/plugins/PPluginBackgroundDestroyerParent.h" #include "mozilla/plugins/PStreamNotifyParent.h" #include "mozilla/Preferences.h" #include "mozilla/ProcessHangMonitor.h" #include "mozilla/Services.h" #include "mozilla/Telemetry.h" #include "mozilla/Unused.h" #include "mozilla/UniquePtr.h" #include "nsCRT.h" #include "nsIFile.h" #include "nsICrashService.h" #include "nsIObserverService.h" #include "nsNPAPIPlugin.h" #include "nsPluginInstanceOwner.h" #include "nsPrintfCString.h" #include "prsystem.h" #include "prclist.h" #include "PluginQuirks.h" #include "gfxPlatform.h" #include "GeckoProfiler.h" #include "nsPluginTags.h" #include "nsUnicharUtils.h" #include "mozilla/layers/TextureClientRecycleAllocator.h" #ifdef XP_WIN # include "mozilla/plugins/PluginSurfaceParent.h" # include "mozilla/widget/AudioSession.h" # include "PluginHangUIParent.h" # include "FunctionBrokerParent.h" # include "PluginUtilsWin.h" #endif #ifdef MOZ_WIDGET_GTK # include #elif XP_MACOSX # include "PluginInterposeOSX.h" # include "PluginUtilsOSX.h" #endif #ifdef MOZ_GECKO_PROFILER # include "ProfilerParent.h" #endif using base::KillProcess; using mozilla::PluginLibrary; using mozilla::ipc::GeckoChildProcessHost; using mozilla::ipc::MessageChannel; using namespace mozilla; using namespace mozilla::plugins; using namespace mozilla::plugins::parent; using namespace CrashReporter; static const char kContentTimeoutPref[] = "dom.ipc.plugins.contentTimeoutSecs"; static const char kChildTimeoutPref[] = "dom.ipc.plugins.timeoutSecs"; static const char kParentTimeoutPref[] = "dom.ipc.plugins.parentTimeoutSecs"; static const char kLaunchTimeoutPref[] = "dom.ipc.plugins.processLaunchTimeoutSecs"; #ifdef XP_WIN static const char kHangUITimeoutPref[] = "dom.ipc.plugins.hangUITimeoutSecs"; static const char kHangUIMinDisplayPref[] = "dom.ipc.plugins.hangUIMinDisplaySecs"; # define CHILD_TIMEOUT_PREF kHangUITimeoutPref #else # define CHILD_TIMEOUT_PREF kChildTimeoutPref #endif bool mozilla::plugins::SetupBridge( uint32_t aPluginId, dom::ContentParent* aContentParent, nsresult* rv, uint32_t* runID, ipc::Endpoint* aEndpoint) { AUTO_PROFILER_LABEL("plugins::SetupBridge", OTHER); if (NS_WARN_IF(!rv) || NS_WARN_IF(!runID)) { return false; } RefPtr host = nsPluginHost::GetInst(); RefPtr plugin; *rv = host->GetPluginForContentProcess(aPluginId, getter_AddRefs(plugin)); if (NS_FAILED(*rv)) { return true; } PluginModuleChromeParent* chromeParent = static_cast(plugin->GetLibrary()); *rv = chromeParent->GetRunID(runID); if (NS_FAILED(*rv)) { return true; } ipc::Endpoint parent; ipc::Endpoint child; *rv = PPluginModule::CreateEndpoints( aContentParent->OtherPid(), chromeParent->OtherPid(), &parent, &child); if (NS_FAILED(*rv)) { return true; } *aEndpoint = std::move(parent); if (!chromeParent->SendInitPluginModuleChild(std::move(child))) { *rv = NS_ERROR_BRIDGE_OPEN_CHILD; return true; } return true; } #ifdef MOZ_CRASHREPORTER_INJECTOR /** * Use for executing CreateToolhelp32Snapshot off main thread */ class mozilla::plugins::FinishInjectorInitTask : public mozilla::CancelableRunnable { public: FinishInjectorInitTask() : CancelableRunnable("FinishInjectorInitTask"), mMutex("FlashInjectorInitTask::mMutex"), mParent(nullptr), mMainThreadMsgLoop(MessageLoop::current()) { MOZ_ASSERT(NS_IsMainThread()); } void Init(PluginModuleChromeParent* aParent) { MOZ_ASSERT(aParent); mParent = aParent; } void PostToMainThread() { RefPtr self = this; mSnapshot.own(CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0)); { // Scope for lock mozilla::MutexAutoLock lock(mMutex); if (mMainThreadMsgLoop) { mMainThreadMsgLoop->PostTask(self.forget()); } } } NS_IMETHOD Run() override { mParent->DoInjection(mSnapshot); // We don't need to hold this lock during DoInjection, but we do need // to obtain it before returning from Run() to ensure that // PostToMainThread has completed before we return. mozilla::MutexAutoLock lock(mMutex); return NS_OK; } nsresult Cancel() override { mozilla::MutexAutoLock lock(mMutex); mMainThreadMsgLoop = nullptr; return NS_OK; } private: mozilla::Mutex mMutex; nsAutoHandle mSnapshot; PluginModuleChromeParent* mParent; MessageLoop* mMainThreadMsgLoop; }; #endif // MOZ_CRASHREPORTER_INJECTOR namespace { /** * Objects of this class remain linked until an error occurs in the * plugin initialization sequence. */ class PluginModuleMapping : public PRCList { public: explicit PluginModuleMapping(uint32_t aPluginId) : mPluginId(aPluginId), mProcessIdValid(false), mProcessId(0), mModule(nullptr), mChannelOpened(false) { MOZ_COUNT_CTOR(PluginModuleMapping); PR_INIT_CLIST(this); PR_APPEND_LINK(this, &sModuleListHead); } ~PluginModuleMapping() { PR_REMOVE_LINK(this); MOZ_COUNT_DTOR(PluginModuleMapping); } bool IsChannelOpened() const { return mChannelOpened; } void SetChannelOpened() { mChannelOpened = true; } PluginModuleContentParent* GetModule() { if (!mModule) { mModule = new PluginModuleContentParent(); } return mModule; } static PluginModuleMapping* AssociateWithProcessId( uint32_t aPluginId, base::ProcessId aProcessId) { PluginModuleMapping* mapping = static_cast(PR_NEXT_LINK(&sModuleListHead)); while (mapping != &sModuleListHead) { if (mapping->mPluginId == aPluginId) { mapping->AssociateWithProcessId(aProcessId); return mapping; } mapping = static_cast(PR_NEXT_LINK(mapping)); } return nullptr; } static PluginModuleMapping* Resolve(base::ProcessId aProcessId) { PluginModuleMapping* mapping = nullptr; if (sIsLoadModuleOnStack) { // Special case: If loading synchronously, we just need to access // the tail entry of the list. mapping = static_cast(PR_LIST_TAIL(&sModuleListHead)); MOZ_ASSERT(mapping); return mapping; } mapping = static_cast(PR_NEXT_LINK(&sModuleListHead)); while (mapping != &sModuleListHead) { if (mapping->mProcessIdValid && mapping->mProcessId == aProcessId) { return mapping; } mapping = static_cast(PR_NEXT_LINK(mapping)); } return nullptr; } static PluginModuleMapping* FindModuleByPluginId(uint32_t aPluginId) { PluginModuleMapping* mapping = static_cast(PR_NEXT_LINK(&sModuleListHead)); while (mapping != &sModuleListHead) { if (mapping->mPluginId == aPluginId) { return mapping; } mapping = static_cast(PR_NEXT_LINK(mapping)); } return nullptr; } class MOZ_RAII NotifyLoadingModule { public: explicit NotifyLoadingModule() { PluginModuleMapping::sIsLoadModuleOnStack = true; } ~NotifyLoadingModule() { PluginModuleMapping::sIsLoadModuleOnStack = false; } private: }; private: void AssociateWithProcessId(base::ProcessId aProcessId) { MOZ_ASSERT(!mProcessIdValid); mProcessId = aProcessId; mProcessIdValid = true; } uint32_t mPluginId; bool mProcessIdValid; base::ProcessId mProcessId; PluginModuleContentParent* mModule; bool mChannelOpened; friend class NotifyLoadingModule; static PRCList sModuleListHead; static bool sIsLoadModuleOnStack; }; PRCList PluginModuleMapping::sModuleListHead = PR_INIT_STATIC_CLIST(&PluginModuleMapping::sModuleListHead); bool PluginModuleMapping::sIsLoadModuleOnStack = false; } // namespace static PluginModuleChromeParent* PluginModuleChromeParentForId( const uint32_t aPluginId) { MOZ_ASSERT(XRE_IsParentProcess()); RefPtr host = nsPluginHost::GetInst(); nsPluginTag* pluginTag = host->PluginWithId(aPluginId); if (!pluginTag || !pluginTag->mPlugin) { return nullptr; } RefPtr plugin = pluginTag->mPlugin; return static_cast(plugin->GetLibrary()); } void mozilla::plugins::TakeFullMinidump(uint32_t aPluginId, base::ProcessId aContentProcessId, const nsAString& aBrowserDumpId, nsString& aDumpId) { PluginModuleChromeParent* chromeParent = PluginModuleChromeParentForId(aPluginId); if (chromeParent) { chromeParent->TakeFullMinidump(aContentProcessId, aBrowserDumpId, aDumpId); } } void mozilla::plugins::TerminatePlugin(uint32_t aPluginId, base::ProcessId aContentProcessId, const nsCString& aMonitorDescription, const nsAString& aDumpId) { PluginModuleChromeParent* chromeParent = PluginModuleChromeParentForId(aPluginId); if (chromeParent) { chromeParent->TerminateChildProcess(MessageLoop::current(), aContentProcessId, aMonitorDescription, aDumpId); } } /* static */ PluginLibrary* PluginModuleContentParent::LoadModule(uint32_t aPluginId, nsPluginTag* aPluginTag) { PluginModuleMapping::NotifyLoadingModule loadingModule; UniquePtr mapping(new PluginModuleMapping(aPluginId)); MOZ_ASSERT(XRE_IsContentProcess()); /* * We send a LoadPlugin message to the chrome process using an intr * message. Before it sends its response, it sends a message to create * PluginModuleParent instance. That message is handled by * PluginModuleContentParent::Initialize, which saves the instance in * its module mapping. We fetch it from there after LoadPlugin finishes. */ dom::ContentChild* cp = dom::ContentChild::GetSingleton(); nsresult rv; uint32_t runID; Endpoint endpoint; if (!cp->SendLoadPlugin(aPluginId, &rv, &runID, &endpoint) || NS_FAILED(rv)) { return nullptr; } Initialize(std::move(endpoint)); PluginModuleContentParent* parent = mapping->GetModule(); MOZ_ASSERT(parent); if (!mapping->IsChannelOpened()) { // mapping is linked into PluginModuleMapping::sModuleListHead and is // needed later, so since this function is returning successfully we // forget it here. Unused << mapping.release(); } parent->mPluginId = aPluginId; parent->mRunID = runID; return parent; } /* static */ void PluginModuleContentParent::Initialize( Endpoint&& aEndpoint) { UniquePtr moduleMapping( PluginModuleMapping::Resolve(aEndpoint.OtherPid())); MOZ_ASSERT(moduleMapping); PluginModuleContentParent* parent = moduleMapping->GetModule(); MOZ_ASSERT(parent); DebugOnly ok = aEndpoint.Bind(parent); MOZ_ASSERT(ok); moduleMapping->SetChannelOpened(); if (XRE_UseNativeEventProcessing()) { // If we're processing native events in our message pump, request Windows // message deferral behavior on our channel. This applies to the top level // and all sub plugin protocols since they all share the same channel. parent->GetIPCChannel()->SetChannelFlags( MessageChannel::REQUIRE_DEFERRED_MESSAGE_PROTECTION); } TimeoutChanged(kContentTimeoutPref, parent); // moduleMapping is linked into PluginModuleMapping::sModuleListHead and is // needed later, so since this function is returning successfully we // forget it here. Unused << moduleMapping.release(); } // static PluginLibrary* PluginModuleChromeParent::LoadModule(const char* aFilePath, uint32_t aPluginId, nsPluginTag* aPluginTag) { PLUGIN_LOG_DEBUG_FUNCTION; UniquePtr parent(new PluginModuleChromeParent( aFilePath, aPluginId, aPluginTag->mSandboxLevel)); UniquePtr onLaunchedRunnable( new LaunchedTask(parent.get())); bool launched = parent->mSubprocess->Launch( std::move(onLaunchedRunnable), aPluginTag->mSandboxLevel, aPluginTag->mIsSandboxLoggingEnabled); if (!launched) { // We never reached open parent->mShutdown = true; return nullptr; } parent->mIsFlashPlugin = aPluginTag->mIsFlashPlugin; uint32_t blocklistState; nsresult rv = aPluginTag->GetBlocklistState(&blocklistState); parent->mIsBlocklisted = NS_FAILED(rv) || blocklistState != 0; int32_t launchTimeoutSecs = Preferences::GetInt(kLaunchTimeoutPref, 0); if (!parent->mSubprocess->WaitUntilConnected(launchTimeoutSecs * 1000)) { parent->mShutdown = true; return nullptr; } #if defined(XP_WIN) Endpoint brokerParentEnd; Endpoint brokerChildEnd; rv = PFunctionBroker::CreateEndpoints(base::GetCurrentProcId(), parent->OtherPid(), &brokerParentEnd, &brokerChildEnd); if (NS_FAILED(rv)) { parent->mShutdown = true; return nullptr; } parent->mBrokerParent = FunctionBrokerParent::Create(std::move(brokerParentEnd)); if (parent->mBrokerParent) { Unused << parent->SendInitPluginFunctionBroker(std::move(brokerChildEnd)); } #endif return parent.release(); } static const char* gCallbackPrefs[] = { kChildTimeoutPref, kParentTimeoutPref, #ifdef XP_WIN kHangUITimeoutPref, kHangUIMinDisplayPref, #endif nullptr, }; void PluginModuleChromeParent::OnProcessLaunched(const bool aSucceeded) { if (!aSucceeded) { mShutdown = true; OnInitFailure(); return; } // We may have already been initialized by another call that was waiting // for process connect. If so, this function doesn't need to run. if (mShutdown) { return; } Open(mSubprocess->TakeChannel(), base::GetProcId(mSubprocess->GetChildProcessHandle())); // Request Windows message deferral behavior on our channel. This // applies to the top level and all sub plugin protocols since they // all share the same channel. GetIPCChannel()->SetChannelFlags( MessageChannel::REQUIRE_DEFERRED_MESSAGE_PROTECTION); TimeoutChanged(CHILD_TIMEOUT_PREF, this); Preferences::RegisterCallbacks(TimeoutChanged, gCallbackPrefs, static_cast(this)); RegisterSettingsCallbacks(); // If this fails, we're having IPC troubles, and we're doomed anyways. if (!InitCrashReporter()) { mShutdown = true; Close(); OnInitFailure(); return; } #if defined(XP_WIN) && defined(_X86_) // Protected mode only applies to Windows and only to x86. if (!mIsBlocklisted && mIsFlashPlugin && (Preferences::GetBool("dom.ipc.plugins.flash.disable-protected-mode", false) || mSandboxLevel >= 2)) { Unused << SendDisableFlashProtectedMode(); } #endif #ifdef MOZ_GECKO_PROFILER Unused << SendInitProfiler(ProfilerParent::CreateForProcess(OtherPid())); #endif } bool PluginModuleChromeParent::InitCrashReporter() { NativeThreadId threadId; if (!CallInitCrashReporter(&threadId)) { return false; } { mozilla::MutexAutoLock lock(mCrashReporterMutex); mCrashReporter = MakeUnique(GeckoProcessType_Plugin, threadId); } return true; } PluginModuleParent::PluginModuleParent(bool aIsChrome) : mQuirks(QUIRKS_NOT_INITIALIZED), mIsChrome(aIsChrome), mShutdown(false), mHadLocalInstance(false), mClearSiteDataSupported(false), mGetSitesWithDataSupported(false), mNPNIface(nullptr), mNPPIface(nullptr), mPlugin(nullptr), mTaskFactory(this), mSandboxLevel(0), mIsFlashPlugin(false), mRunID(0), mCrashReporterMutex("PluginModuleChromeParent::mCrashReporterMutex") {} PluginModuleParent::~PluginModuleParent() { if (!OkToCleanup()) { MOZ_CRASH("unsafe destruction"); } if (!mShutdown) { NS_WARNING("Plugin host deleted the module without shutting down."); NPError err; NP_Shutdown(&err); } } PluginModuleContentParent::PluginModuleContentParent() : PluginModuleParent(false), mPluginId(0) { Preferences::RegisterCallback(TimeoutChanged, kContentTimeoutPref, static_cast(this)); } PluginModuleContentParent::~PluginModuleContentParent() { Preferences::UnregisterCallback(TimeoutChanged, kContentTimeoutPref, static_cast(this)); } PluginModuleChromeParent::PluginModuleChromeParent(const char* aFilePath, uint32_t aPluginId, int32_t aSandboxLevel) : PluginModuleParent(true), mSubprocess(new PluginProcessParent(aFilePath)), mPluginId(aPluginId), mChromeTaskFactory(this), mHangAnnotationFlags(0) #ifdef XP_WIN , mPluginCpuUsageOnHang(), mHangUIParent(nullptr), mHangUIEnabled(true), mIsTimerReset(true), mBrokerParent(nullptr) #endif #ifdef MOZ_CRASHREPORTER_INJECTOR , mFlashProcess1(0), mFlashProcess2(0), mFinishInitTask(nullptr) #endif , mIsBlocklisted(false), mIsCleaningFromTimeout(false) { NS_ASSERTION(mSubprocess, "Out of memory!"); mSandboxLevel = aSandboxLevel; mRunID = GeckoChildProcessHost::GetUniqueID(); mozilla::BackgroundHangMonitor::RegisterAnnotator(*this); } PluginModuleChromeParent::~PluginModuleChromeParent() { if (!OkToCleanup()) { MOZ_CRASH("unsafe destruction"); } #ifdef XP_WIN // If we registered for audio notifications, stop. mozilla::plugins::PluginUtilsWin::RegisterForAudioDeviceChanges(this, false); #endif if (!mShutdown) { NS_WARNING("Plugin host deleted the module without shutting down."); NPError err; NP_Shutdown(&err); } NS_ASSERTION(mShutdown, "NP_Shutdown didn't"); if (mSubprocess) { mSubprocess->Destroy(); mSubprocess = nullptr; } #ifdef MOZ_CRASHREPORTER_INJECTOR if (mFlashProcess1) UnregisterInjectorCallback(mFlashProcess1); if (mFlashProcess2) UnregisterInjectorCallback(mFlashProcess2); if (mFinishInitTask) { // mFinishInitTask will be deleted by the main thread message_loop mFinishInitTask->Cancel(); } #endif UnregisterSettingsCallbacks(); Preferences::UnregisterCallbacks(TimeoutChanged, gCallbackPrefs, static_cast(this)); #ifdef XP_WIN if (mHangUIParent) { delete mHangUIParent; mHangUIParent = nullptr; } #endif mozilla::BackgroundHangMonitor::UnregisterAnnotator(*this); } void PluginModuleChromeParent::AddCrashAnnotations() { // mCrashReporterMutex is already held by the caller mCrashReporterMutex.AssertCurrentThreadOwns(); typedef nsDependentCString cstring; // Get the plugin filename, try to get just the file leafname const std::string& pluginFile = mSubprocess->GetPluginFilePath(); size_t filePos = pluginFile.rfind(FILE_PATH_SEPARATOR); if (filePos == std::string::npos) filePos = 0; else filePos++; mCrashReporter->AddAnnotation(CrashReporter::Annotation::PluginFilename, cstring(pluginFile.substr(filePos).c_str())); mCrashReporter->AddAnnotation(CrashReporter::Annotation::PluginName, mPluginName); mCrashReporter->AddAnnotation(CrashReporter::Annotation::PluginVersion, mPluginVersion); if (mCrashReporter) { #ifdef XP_WIN if (mPluginCpuUsageOnHang.Length() > 0) { nsCString cpuUsageStr; cpuUsageStr.AppendFloat(std::ceil(mPluginCpuUsageOnHang[0] * 100) / 100); mCrashReporter->AddAnnotation(CrashReporter::Annotation::PluginCpuUsage, cpuUsageStr); # ifdef MOZ_CRASHREPORTER_INJECTOR for (uint32_t i = 1; i < mPluginCpuUsageOnHang.Length(); ++i) { nsCString tempStr; tempStr.AppendFloat(std::ceil(mPluginCpuUsageOnHang[i] * 100) / 100); // HACK: There can only be at most two flash processes hence // the hardcoded annotations CrashReporter::Annotation annotation = (i == 1) ? CrashReporter::Annotation::CpuUsageFlashProcess1 : CrashReporter::Annotation::CpuUsageFlashProcess2; mCrashReporter->AddAnnotation(annotation, tempStr); } # endif } #endif } } void PluginModuleParent::SetChildTimeout(const int32_t aChildTimeout) { int32_t timeoutMs = (aChildTimeout > 0) ? (1000 * aChildTimeout) : MessageChannel::kNoTimeout; SetReplyTimeoutMs(timeoutMs); } void PluginModuleParent::TimeoutChanged(const char* aPref, void* aModule) { auto module = static_cast(aModule); NS_ASSERTION(NS_IsMainThread(), "Wrong thread!"); #ifndef XP_WIN if (!strcmp(aPref, kChildTimeoutPref)) { MOZ_ASSERT(module->IsChrome()); // The timeout value used by the parent for children int32_t timeoutSecs = Preferences::GetInt(kChildTimeoutPref, 0); module->SetChildTimeout(timeoutSecs); #else if (!strcmp(aPref, kChildTimeoutPref) || !strcmp(aPref, kHangUIMinDisplayPref) || !strcmp(aPref, kHangUITimeoutPref)) { MOZ_ASSERT(module->IsChrome()); static_cast(module)->EvaluateHangUIState(true); #endif // XP_WIN } else if (!strcmp(aPref, kParentTimeoutPref)) { // The timeout value used by the child for its parent MOZ_ASSERT(module->IsChrome()); int32_t timeoutSecs = Preferences::GetInt(kParentTimeoutPref, 0); Unused << static_cast(module) ->SendSetParentHangTimeout(timeoutSecs); } else if (!strcmp(aPref, kContentTimeoutPref)) { MOZ_ASSERT(!module->IsChrome()); int32_t timeoutSecs = Preferences::GetInt(kContentTimeoutPref, 0); module->SetChildTimeout(timeoutSecs); } } void PluginModuleChromeParent::CleanupFromTimeout(const bool aFromHangUI) { if (mShutdown) { return; } if (!OkToCleanup()) { // there's still plugin code on the C++ stack, try again MessageLoop::current()->PostDelayedTask( mChromeTaskFactory.NewRunnableMethod( &PluginModuleChromeParent::CleanupFromTimeout, aFromHangUI), 10); return; } // Avoid recursively calling this method. MessageChannel::Close() can // cause this task to be re-launched. if (mIsCleaningFromTimeout) { return; } AutoRestore resetCleaningFlag(mIsCleaningFromTimeout); mIsCleaningFromTimeout = true; /* If the plugin container was terminated by the Plugin Hang UI, then either the I/O thread detects a channel error, or the main thread must set the error (whomever gets there first). OTOH, if we terminate and return false from ShouldContinueFromReplyTimeout, then the channel state has already been set to ChannelTimeout and we should call the regular Close function. */ if (aFromHangUI) { GetIPCChannel()->CloseWithError(); } else { Close(); } } #ifdef XP_WIN namespace { uint64_t FileTimeToUTC(const FILETIME& ftime) { ULARGE_INTEGER li; li.LowPart = ftime.dwLowDateTime; li.HighPart = ftime.dwHighDateTime; return li.QuadPart; } struct CpuUsageSamples { uint64_t sampleTimes[2]; uint64_t cpuTimes[2]; }; bool GetProcessCpuUsage(const nsTArray& processHandles, nsTArray& cpuUsage) { nsTArray samples(processHandles.Length()); FILETIME creationTime, exitTime, kernelTime, userTime, currentTime; BOOL res; for (uint32_t i = 0; i < processHandles.Length(); ++i) { ::GetSystemTimeAsFileTime(¤tTime); res = ::GetProcessTimes(processHandles[i], &creationTime, &exitTime, &kernelTime, &userTime); if (!res) { NS_WARNING("failed to get process times"); return false; } CpuUsageSamples s; s.sampleTimes[0] = FileTimeToUTC(currentTime); s.cpuTimes[0] = FileTimeToUTC(kernelTime) + FileTimeToUTC(userTime); samples.AppendElement(s); } // we already hung for a while, a little bit longer won't matter ::Sleep(50); const int32_t numberOfProcessors = PR_GetNumberOfProcessors(); for (uint32_t i = 0; i < processHandles.Length(); ++i) { ::GetSystemTimeAsFileTime(¤tTime); res = ::GetProcessTimes(processHandles[i], &creationTime, &exitTime, &kernelTime, &userTime); if (!res) { NS_WARNING("failed to get process times"); return false; } samples[i].sampleTimes[1] = FileTimeToUTC(currentTime); samples[i].cpuTimes[1] = FileTimeToUTC(kernelTime) + FileTimeToUTC(userTime); const uint64_t deltaSampleTime = samples[i].sampleTimes[1] - samples[i].sampleTimes[0]; const uint64_t deltaCpuTime = samples[i].cpuTimes[1] - samples[i].cpuTimes[0]; const float usage = 100.f * (float(deltaCpuTime) / deltaSampleTime) / numberOfProcessors; cpuUsage.AppendElement(usage); } return true; } } // namespace #endif // #ifdef XP_WIN /** * This function converts the topmost routing id on the call stack (as recorded * by the MessageChannel) into a pointer to a IProtocol object. */ mozilla::ipc::IProtocol* PluginModuleChromeParent::GetInvokingProtocol() { int32_t routingId = GetIPCChannel()->GetTopmostMessageRoutingId(); // Nothing being routed. No protocol. Just return nullptr. if (routingId == MSG_ROUTING_NONE) { return nullptr; } // If routingId is MSG_ROUTING_CONTROL then we're dealing with control // messages that were initiated by the topmost managing protocol, ie. this. if (routingId == MSG_ROUTING_CONTROL) { return this; } // Otherwise we can look up the protocol object by the routing id. mozilla::ipc::IProtocol* protocol = Lookup(routingId); return protocol; } /** * This function examines the IProtocol object parameter and converts it into * the PluginInstanceParent object that is associated with that protocol, if * any. Since PluginInstanceParent manages subprotocols, this function needs * to determine whether |aProtocol| is a subprotocol, and if so it needs to * obtain the protocol's manager. * * This function needs to be updated if the subprotocols are modified in * PPluginInstance.ipdl. */ PluginInstanceParent* PluginModuleChromeParent::GetManagingInstance( mozilla::ipc::IProtocol* aProtocol) { MOZ_ASSERT(aProtocol); mozilla::ipc::IProtocol* listener = aProtocol; switch (listener->GetProtocolId()) { case PPluginInstanceMsgStart: // In this case, aProtocol is the instance itself. Just cast it. return static_cast(aProtocol); case PPluginBackgroundDestroyerMsgStart: { PPluginBackgroundDestroyerParent* actor = static_cast(aProtocol); return static_cast(actor->Manager()); } case PPluginScriptableObjectMsgStart: { PPluginScriptableObjectParent* actor = static_cast(aProtocol); return static_cast(actor->Manager()); } case PBrowserStreamMsgStart: { PBrowserStreamParent* actor = static_cast(aProtocol); return static_cast(actor->Manager()); } case PStreamNotifyMsgStart: { PStreamNotifyParent* actor = static_cast(aProtocol); return static_cast(actor->Manager()); } #ifdef XP_WIN case PPluginSurfaceMsgStart: { PPluginSurfaceParent* actor = static_cast(aProtocol); return static_cast(actor->Manager()); } #endif default: return nullptr; } } void PluginModuleChromeParent::EnteredCxxStack() { mHangAnnotationFlags |= kInPluginCall; } void PluginModuleChromeParent::ExitedCxxStack() { mHangAnnotationFlags = 0; #ifdef XP_WIN FinishHangUI(); #endif } /** * This function is always called by the BackgroundHangMonitor thread. */ void PluginModuleChromeParent::AnnotateHang( mozilla::BackgroundHangAnnotations& aAnnotations) { uint32_t flags = mHangAnnotationFlags; if (flags) { /* We don't actually annotate anything specifically for kInPluginCall; we use it to determine whether to annotate other things. It will be pretty obvious from the hang stack that we're in a plugin call when the hang occurred. */ if (flags & kHangUIShown) { aAnnotations.AddAnnotation(u"HangUIShown"_ns, true); } if (flags & kHangUIContinued) { aAnnotations.AddAnnotation(u"HangUIContinued"_ns, true); } if (flags & kHangUIDontShow) { aAnnotations.AddAnnotation(u"HangUIDontShow"_ns, true); } aAnnotations.AddAnnotation(u"pluginName"_ns, mPluginName); aAnnotations.AddAnnotation(u"pluginVersion"_ns, mPluginVersion); } } static bool CreatePluginMinidump(base::ProcessId processId, ThreadId childThread, nsIFile* parentMinidump, const nsACString& name) { mozilla::ipc::ScopedProcessHandle handle; if (processId == 0 || !base::OpenPrivilegedProcessHandle(processId, &handle.rwget())) { return false; } return CreateAdditionalChildMinidump(handle, 0, parentMinidump, name); } bool PluginModuleChromeParent::ShouldContinueFromReplyTimeout() { if (mIsFlashPlugin) { MessageLoop::current()->PostTask(mTaskFactory.NewRunnableMethod( &PluginModuleChromeParent::NotifyFlashHang)); } #ifdef XP_WIN if (LaunchHangUI()) { return true; } // If LaunchHangUI returned false then we should proceed with the // original plugin hang behaviour and kill the plugin container. FinishHangUI(); #endif // XP_WIN TerminateChildProcess(MessageLoop::current(), mozilla::ipc::kInvalidProcessId, "ModalHangUI"_ns, u""_ns); GetIPCChannel()->CloseWithTimeout(); return false; } bool PluginModuleContentParent::ShouldContinueFromReplyTimeout() { RefPtr monitor = ProcessHangMonitor::Get(); if (!monitor) { return true; } monitor->NotifyPluginHang(mPluginId); return true; } void PluginModuleContentParent::OnExitedSyncSend() { ProcessHangMonitor::ClearHang(); } void PluginModuleChromeParent::TakeFullMinidump(base::ProcessId aContentPid, const nsAString& aBrowserDumpId, nsString& aDumpId) { mozilla::MutexAutoLock lock(mCrashReporterMutex); if (!mCrashReporter) { return; } bool reportsReady = false; // Check to see if we already have a browser dump id - with e10s plugin // hangs we take this earlier (see ProcessHangMonitor) from a background // thread. We do this before we message the main thread about the hang // since the posted message will trash our browser stack state. nsCOMPtr browserDumpFile; if (CrashReporter::GetMinidumpForID(aBrowserDumpId, getter_AddRefs(browserDumpFile))) { // We have a single browser report, generate a new plugin process parent // report and pair it up with the browser report handed in. reportsReady = mCrashReporter->GenerateMinidumpAndPair( this, browserDumpFile, "browser"_ns); if (!reportsReady) { browserDumpFile = nullptr; CrashReporter::DeleteMinidumpFilesForID(aBrowserDumpId); } } // Generate crash report including plugin and browser process minidumps. // The plugin process is the parent report with additional dumps including // the browser process, content process when running under e10s, and // various flash subprocesses if we're the flash module. if (!reportsReady) { reportsReady = mCrashReporter->GenerateMinidumpAndPair( this, nullptr, // Pair with a dump of this process and thread. "browser"_ns); } if (reportsReady) { aDumpId = mCrashReporter->MinidumpID(); PLUGIN_LOG_DEBUG(("generated paired browser/plugin minidumps: %s)", NS_ConvertUTF16toUTF8(aDumpId).get())); nsAutoCString additionalDumps("browser"); nsCOMPtr pluginDumpFile; if (GetMinidumpForID(aDumpId, getter_AddRefs(pluginDumpFile))) { #ifdef MOZ_CRASHREPORTER_INJECTOR // If we have handles to the flash sandbox processes on Windows, // include those minidumps as well. if (CreatePluginMinidump(mFlashProcess1, 0, pluginDumpFile, "flash1"_ns)) { additionalDumps.AppendLiteral(",flash1"); } if (CreatePluginMinidump(mFlashProcess2, 0, pluginDumpFile, "flash2"_ns)) { additionalDumps.AppendLiteral(",flash2"); } #endif // MOZ_CRASHREPORTER_INJECTOR if (aContentPid != mozilla::ipc::kInvalidProcessId) { // Include the content process minidump if (CreatePluginMinidump(aContentPid, 0, pluginDumpFile, "content"_ns)) { additionalDumps.AppendLiteral(",content"); } } } mCrashReporter->AddAnnotation(Annotation::additional_minidumps, additionalDumps); } else { NS_WARNING("failed to capture paired minidumps from hang"); } } void PluginModuleChromeParent::TerminateChildProcess( MessageLoop* aMsgLoop, base::ProcessId aContentPid, const nsCString& aMonitorDescription, const nsAString& aDumpId) { // Start by taking a full minidump if necessary, this is done early // because it also needs to lock the mCrashReporterMutex and Mutex doesn't // support recursive locking. nsAutoString dumpId; if (aDumpId.IsEmpty()) { TakeFullMinidump(aContentPid, u""_ns, dumpId); } mozilla::MutexAutoLock lock(mCrashReporterMutex); if (!mCrashReporter) { // If mCrashReporter is null then the hang has ended, the plugin module // is shutting down. There's nothing to do here. return; } mCrashReporter->AddAnnotation(Annotation::PluginHang, true); mCrashReporter->AddAnnotation(Annotation::HangMonitorDescription, aMonitorDescription); #ifdef XP_WIN if (mHangUIParent) { unsigned int hangUIDuration = mHangUIParent->LastShowDurationMs(); if (hangUIDuration) { mCrashReporter->AddAnnotation(Annotation::PluginHangUIDuration, hangUIDuration); } } #endif // XP_WIN mozilla::ipc::ScopedProcessHandle geckoChildProcess; bool childOpened = base::OpenProcessHandle(OtherPid(), &geckoChildProcess.rwget()); #ifdef XP_WIN // collect cpu usage for plugin processes nsTArray processHandles; if (childOpened) { processHandles.AppendElement(geckoChildProcess); } # ifdef MOZ_CRASHREPORTER_INJECTOR mozilla::ipc::ScopedProcessHandle flashBrokerProcess; if (mFlashProcess1 && base::OpenProcessHandle(mFlashProcess1, &flashBrokerProcess.rwget())) { processHandles.AppendElement(flashBrokerProcess); } mozilla::ipc::ScopedProcessHandle flashSandboxProcess; if (mFlashProcess2 && base::OpenProcessHandle(mFlashProcess2, &flashSandboxProcess.rwget())) { processHandles.AppendElement(flashSandboxProcess); } # endif if (!GetProcessCpuUsage(processHandles, mPluginCpuUsageOnHang)) { mPluginCpuUsageOnHang.Clear(); } #endif // this must run before the error notification from the channel, // or not at all bool isFromHangUI = aMsgLoop != MessageLoop::current(); aMsgLoop->PostTask(mChromeTaskFactory.NewRunnableMethod( &PluginModuleChromeParent::CleanupFromTimeout, isFromHangUI)); if (!childOpened || !KillProcess(geckoChildProcess, 1, false)) { NS_WARNING("failed to kill subprocess!"); } } bool PluginModuleParent::GetPluginDetails() { RefPtr host = nsPluginHost::GetInst(); if (!host) { return false; } nsPluginTag* pluginTag = host->TagForPlugin(mPlugin); if (!pluginTag) { return false; } mPluginName = pluginTag->Name(); mPluginVersion = pluginTag->Version(); mPluginFilename = pluginTag->FileName(); mIsFlashPlugin = pluginTag->mIsFlashPlugin; mSandboxLevel = pluginTag->mSandboxLevel; return true; } void PluginModuleParent::InitQuirksModes(const nsCString& aMimeType) { if (mQuirks != QUIRKS_NOT_INITIALIZED) { return; } mQuirks = GetQuirksFromMimeTypeAndFilename(aMimeType, mPluginFilename); } #ifdef XP_WIN void PluginModuleChromeParent::EvaluateHangUIState(const bool aReset) { int32_t minDispSecs = Preferences::GetInt(kHangUIMinDisplayPref, 10); int32_t autoStopSecs = Preferences::GetInt(kChildTimeoutPref, 0); int32_t timeoutSecs = 0; if (autoStopSecs > 0 && autoStopSecs < minDispSecs) { /* If we're going to automatically terminate the plugin within a time frame shorter than minDispSecs, there's no point in showing the hang UI; it would just flash briefly on the screen. */ mHangUIEnabled = false; } else { timeoutSecs = Preferences::GetInt(kHangUITimeoutPref, 0); mHangUIEnabled = timeoutSecs > 0; } if (mHangUIEnabled) { if (aReset) { mIsTimerReset = true; SetChildTimeout(timeoutSecs); return; } else if (mIsTimerReset) { /* The Hang UI is being shown, so now we're setting the timeout to kChildTimeoutPref while we wait for a user response. ShouldContinueFromReplyTimeout will fire after (reply timeout / 2) seconds, which is not what we want. Doubling the timeout value here so that we get the right result. */ autoStopSecs *= 2; } } mIsTimerReset = false; SetChildTimeout(autoStopSecs); } bool PluginModuleChromeParent::LaunchHangUI() { if (!mHangUIEnabled) { return false; } if (mHangUIParent) { if (mHangUIParent->IsShowing()) { // We've already shown the UI but the timeout has expired again. return false; } if (mHangUIParent->DontShowAgain()) { mHangAnnotationFlags |= kHangUIDontShow; bool wasLastHangStopped = mHangUIParent->WasLastHangStopped(); if (!wasLastHangStopped) { mHangAnnotationFlags |= kHangUIContinued; } return !wasLastHangStopped; } delete mHangUIParent; mHangUIParent = nullptr; } mHangUIParent = new PluginHangUIParent(this, Preferences::GetInt(kHangUITimeoutPref, 0), Preferences::GetInt(kChildTimeoutPref, 0)); bool retval = mHangUIParent->Init(NS_ConvertUTF8toUTF16(mPluginName)); if (retval) { mHangAnnotationFlags |= kHangUIShown; /* Once the UI is shown we switch the timeout over to use kChildTimeoutPref, allowing us to terminate a hung plugin after kChildTimeoutPref seconds if the user doesn't respond to the hang UI. */ EvaluateHangUIState(false); } return retval; } void PluginModuleChromeParent::FinishHangUI() { if (mHangUIEnabled && mHangUIParent) { bool needsCancel = mHangUIParent->IsShowing(); // If we're still showing, send a Cancel notification if (needsCancel) { mHangUIParent->Cancel(); } /* If we cancelled the UI or if the user issued a response, we need to reset the child process timeout. */ if (needsCancel || (!mIsTimerReset && mHangUIParent->WasShown())) { /* We changed the timeout to kChildTimeoutPref when the plugin hang UI was displayed. Now that we're finishing the UI, we need to switch it back to kHangUITimeoutPref. */ EvaluateHangUIState(true); } } } void PluginModuleChromeParent::OnHangUIContinue() { mHangAnnotationFlags |= kHangUIContinued; } #endif // XP_WIN #ifdef MOZ_CRASHREPORTER_INJECTOR static void RemoveMinidump(nsIFile* minidump) { if (!minidump) return; minidump->Remove(false); nsCOMPtr extraFile; if (GetExtraFileForMinidump(minidump, getter_AddRefs(extraFile))) { extraFile->Remove(true); } } #endif // MOZ_CRASHREPORTER_INJECTOR void PluginModuleChromeParent::ProcessFirstMinidump() { mozilla::MutexAutoLock lock(mCrashReporterMutex); if (!mCrashReporter) { HandleOrphanedMinidump(); return; } AddCrashAnnotations(); if (mCrashReporter->HasMinidump()) { // A minidump may be set in TerminateChildProcess, which means the // process hang monitor has already collected a 3-way browser, plugin, // content crash report. If so, update the existing report with our // annotations and finalize it. If not, fall through for standard // plugin crash report handling. mCrashReporter->FinalizeCrashReport(); return; } AnnotationTable annotations; uint32_t sequence = UINT32_MAX; nsAutoCString flashProcessType; RefPtr dumpFile = mCrashReporter->TakeCrashedChildMinidump(OtherPid(), &sequence); #ifdef MOZ_CRASHREPORTER_INJECTOR nsCOMPtr childDumpFile; uint32_t childSequence; if (mFlashProcess1 && TakeMinidumpForChild(mFlashProcess1, getter_AddRefs(childDumpFile), annotations, &childSequence)) { if (childSequence < sequence && mCrashReporter->AdoptMinidump(childDumpFile, annotations)) { RemoveMinidump(dumpFile); dumpFile = childDumpFile; sequence = childSequence; flashProcessType.AssignLiteral("Broker"); } else { RemoveMinidump(childDumpFile); } } if (mFlashProcess2 && TakeMinidumpForChild(mFlashProcess2, getter_AddRefs(childDumpFile), annotations, &childSequence)) { if (childSequence < sequence && mCrashReporter->AdoptMinidump(childDumpFile, annotations)) { RemoveMinidump(dumpFile); dumpFile = childDumpFile; sequence = childSequence; flashProcessType.AssignLiteral("Sandbox"); } else { RemoveMinidump(childDumpFile); } } #endif if (!dumpFile) { NS_WARNING( "[PluginModuleParent::ActorDestroy] abnormal shutdown without " "minidump!"); return; } PLUGIN_LOG_DEBUG(("got child minidump: %s", NS_ConvertUTF16toUTF8(mCrashReporter->MinidumpID()).get())); if (!flashProcessType.IsEmpty()) { mCrashReporter->AddAnnotation(Annotation::FlashProcessDump, flashProcessType); } mCrashReporter->FinalizeCrashReport(); } void PluginModuleChromeParent::HandleOrphanedMinidump() { if (CrashReporter::FinalizeOrphanedMinidump( OtherPid(), GeckoProcessType_Plugin, &mOrphanedDumpId)) { ipc::CrashReporterHost::RecordCrash(GeckoProcessType_Plugin, nsICrashService::CRASH_TYPE_CRASH, mOrphanedDumpId); } else { NS_WARNING(nsPrintfCString("plugin process pid = %d crashed without " "leaving a minidump behind", OtherPid()) .get()); } } void PluginModuleParent::ActorDestroy(ActorDestroyReason why) { switch (why) { case AbnormalShutdown: { mShutdown = true; // Defer the PluginCrashed method so that we don't re-enter // and potentially modify the actor child list while enumerating it. if (mPlugin) MessageLoop::current()->PostTask(mTaskFactory.NewRunnableMethod( &PluginModuleParent::NotifyPluginCrashed)); break; } case NormalShutdown: mShutdown = true; break; default: MOZ_CRASH("Unexpected shutdown reason for toplevel actor."); } } nsresult PluginModuleParent::GetRunID(uint32_t* aRunID) { if (NS_WARN_IF(!aRunID)) { return NS_ERROR_INVALID_POINTER; } *aRunID = mRunID; return NS_OK; } void PluginModuleChromeParent::ActorDestroy(ActorDestroyReason why) { if (why == AbnormalShutdown) { ProcessFirstMinidump(); Telemetry::Accumulate(Telemetry::SUBPROCESS_ABNORMAL_ABORT, "plugin"_ns, 1); } // We can't broadcast settings changes anymore. UnregisterSettingsCallbacks(); #if defined(XP_WIN) if (mBrokerParent) { FunctionBrokerParent::Destroy(mBrokerParent); mBrokerParent = nullptr; } #endif PluginModuleParent::ActorDestroy(why); } void PluginModuleParent::NotifyFlashHang() { nsCOMPtr obs = services::GetObserverService(); if (obs) { obs->NotifyObservers(nullptr, "flash-plugin-hang", nullptr); } } void PluginModuleParent::NotifyPluginCrashed() { if (!OkToCleanup()) { // there's still plugin code on the C++ stack. try again MessageLoop::current()->PostDelayedTask( mTaskFactory.NewRunnableMethod( &PluginModuleParent::NotifyPluginCrashed), 10); return; } if (!mPlugin) { return; } nsString dumpID; nsCString additionalMinidumps; if (mCrashReporter && mCrashReporter->HasMinidump()) { dumpID = mCrashReporter->MinidumpID(); additionalMinidumps = mCrashReporter->AdditionalMinidumps(); } else { dumpID = mOrphanedDumpId; } mPlugin->PluginCrashed(dumpID, additionalMinidumps); } PPluginInstanceParent* PluginModuleParent::AllocPPluginInstanceParent( const nsCString& aMimeType, const nsTArray& aNames, const nsTArray& aValues) { NS_ERROR("Not reachable!"); return nullptr; } bool PluginModuleParent::DeallocPPluginInstanceParent( PPluginInstanceParent* aActor) { PLUGIN_LOG_DEBUG_METHOD; delete aActor; return true; } void PluginModuleParent::SetPluginFuncs(NPPluginFuncs* aFuncs) { MOZ_ASSERT(aFuncs); aFuncs->version = (NP_VERSION_MAJOR << 8) | NP_VERSION_MINOR; aFuncs->javaClass = nullptr; // Gecko should always call these functions through a PluginLibrary object. aFuncs->newp = nullptr; aFuncs->clearsitedata = nullptr; aFuncs->getsiteswithdata = nullptr; aFuncs->destroy = NPP_Destroy; aFuncs->setwindow = NPP_SetWindow; aFuncs->newstream = NPP_NewStream; aFuncs->destroystream = NPP_DestroyStream; aFuncs->writeready = NPP_WriteReady; aFuncs->write = NPP_Write; aFuncs->print = NPP_Print; aFuncs->event = NPP_HandleEvent; aFuncs->urlnotify = NPP_URLNotify; aFuncs->getvalue = NPP_GetValue; aFuncs->setvalue = NPP_SetValue; aFuncs->gotfocus = nullptr; aFuncs->lostfocus = nullptr; aFuncs->urlredirectnotify = nullptr; // Provide 'NPP_URLRedirectNotify', 'NPP_ClearSiteData', and // 'NPP_GetSitesWithData' functionality if it is supported by the plugin. bool urlRedirectSupported = false; Unused << CallOptionalFunctionsSupported(&urlRedirectSupported, &mClearSiteDataSupported, &mGetSitesWithDataSupported); if (urlRedirectSupported) { aFuncs->urlredirectnotify = NPP_URLRedirectNotify; } } NPError PluginModuleParent::NPP_Destroy(NPP instance, NPSavedData** saved) { // FIXME/cjones: // (1) send a "destroy" message to the child // (2) the child shuts down its instance // (3) remove both parent and child IDs from map // (4) free parent PLUGIN_LOG_DEBUG_FUNCTION; PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); if (!pip) return NPERR_NO_ERROR; NPError retval = pip->Destroy(); instance->pdata = nullptr; Unused << PluginInstanceParent::Send__delete__(pip); return retval; } NPError PluginModuleParent::NPP_NewStream(NPP instance, NPMIMEType type, NPStream* stream, NPBool seekable, uint16_t* stype) { AUTO_PROFILER_LABEL("PluginModuleParent::NPP_NewStream", OTHER); PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); return pip ? pip->NPP_NewStream(type, stream, seekable, stype) : NPERR_GENERIC_ERROR; } NPError PluginModuleParent::NPP_SetWindow(NPP instance, NPWindow* window) { PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); return pip ? pip->NPP_SetWindow(window) : NPERR_GENERIC_ERROR; } NPError PluginModuleParent::NPP_DestroyStream(NPP instance, NPStream* stream, NPReason reason) { PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); return pip ? pip->NPP_DestroyStream(stream, reason) : NPERR_GENERIC_ERROR; } int32_t PluginModuleParent::NPP_WriteReady(NPP instance, NPStream* stream) { BrowserStreamParent* s = StreamCast(instance, stream); return s ? s->WriteReady() : -1; } int32_t PluginModuleParent::NPP_Write(NPP instance, NPStream* stream, int32_t offset, int32_t len, void* buffer) { BrowserStreamParent* s = StreamCast(instance, stream); if (!s) return -1; return s->Write(offset, len, buffer); } void PluginModuleParent::NPP_Print(NPP instance, NPPrint* platformPrint) { PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); return pip ? pip->NPP_Print(platformPrint) : (void)0; } int16_t PluginModuleParent::NPP_HandleEvent(NPP instance, void* event) { PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); return pip ? pip->NPP_HandleEvent(event) : NPERR_GENERIC_ERROR; } void PluginModuleParent::NPP_URLNotify(NPP instance, const char* url, NPReason reason, void* notifyData) { PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); return pip ? pip->NPP_URLNotify(url, reason, notifyData) : (void)0; } NPError PluginModuleParent::NPP_GetValue(NPP instance, NPPVariable variable, void* ret_value) { PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); return pip ? pip->NPP_GetValue(variable, ret_value) : NPERR_GENERIC_ERROR; } NPError PluginModuleParent::NPP_SetValue(NPP instance, NPNVariable variable, void* value) { PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); return pip ? pip->NPP_SetValue(variable, value) : NPERR_GENERIC_ERROR; } mozilla::ipc::IPCResult PluginModuleChromeParent:: AnswerNPN_SetValue_NPPVpluginRequiresAudioDeviceChanges( const bool& shouldRegister, NPError* result) { #ifdef XP_WIN *result = NPERR_NO_ERROR; nsresult err = mozilla::plugins::PluginUtilsWin::RegisterForAudioDeviceChanges( this, shouldRegister); if (err != NS_OK) { *result = NPERR_GENERIC_ERROR; } return IPC_OK(); #else MOZ_CRASH( "NPPVpluginRequiresAudioDeviceChanges is not valid on this platform."); #endif } mozilla::ipc::IPCResult PluginModuleParent::RecvBackUpXResources( const FileDescriptor& aXSocketFd) { #ifndef MOZ_X11 MOZ_CRASH("This message only makes sense on X11 platforms"); #else MOZ_ASSERT(0 > mPluginXSocketFdDup.get(), "Already backed up X resources??"); if (aXSocketFd.IsValid()) { auto rawFD = aXSocketFd.ClonePlatformHandle(); mPluginXSocketFdDup.reset(rawFD.release()); } #endif return IPC_OK(); } void PluginModuleParent::NPP_URLRedirectNotify(NPP instance, const char* url, int32_t status, void* notifyData) { PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); return pip ? pip->NPP_URLRedirectNotify(url, status, notifyData) : (void)0; } BrowserStreamParent* PluginModuleParent::StreamCast(NPP instance, NPStream* s) { PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); if (!pip) { return nullptr; } BrowserStreamParent* sp = static_cast(static_cast(s->pdata)); if (sp && (sp->mNPP != pip || s != sp->mStream)) { MOZ_CRASH("Corrupted plugin stream data."); } return sp; } bool PluginModuleParent::HasRequiredFunctions() { return true; } nsresult PluginModuleParent::AsyncSetWindow(NPP instance, NPWindow* window) { PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); return pip ? pip->AsyncSetWindow(window) : NS_ERROR_FAILURE; } nsresult PluginModuleParent::GetImageContainer( NPP instance, mozilla::layers::ImageContainer** aContainer) { PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); return pip ? pip->GetImageContainer(aContainer) : NS_ERROR_FAILURE; } nsresult PluginModuleParent::GetImageSize(NPP instance, nsIntSize* aSize) { PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); return pip ? pip->GetImageSize(aSize) : NS_ERROR_FAILURE; } void PluginModuleParent::DidComposite(NPP aInstance) { PluginInstanceParent* pip = PluginInstanceParent::Cast(aInstance); return pip ? pip->DidComposite() : (void)0; } nsresult PluginModuleParent::SetBackgroundUnknown(NPP instance) { PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); return pip ? pip->SetBackgroundUnknown() : NS_ERROR_FAILURE; } nsresult PluginModuleParent::BeginUpdateBackground(NPP instance, const nsIntRect& aRect, DrawTarget** aDrawTarget) { PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); return pip ? pip->BeginUpdateBackground(aRect, aDrawTarget) : NS_ERROR_FAILURE; } nsresult PluginModuleParent::EndUpdateBackground(NPP instance, const nsIntRect& aRect) { PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); return pip ? pip->EndUpdateBackground(aRect) : NS_ERROR_FAILURE; } #if defined(XP_WIN) nsresult PluginModuleParent::GetScrollCaptureContainer( NPP aInstance, mozilla::layers::ImageContainer** aContainer) { PluginInstanceParent* pip = PluginInstanceParent::Cast(aInstance); return pip ? pip->GetScrollCaptureContainer(aContainer) : NS_ERROR_FAILURE; } #endif nsresult PluginModuleParent::HandledWindowedPluginKeyEvent( NPP aInstance, const NativeEventData& aNativeKeyData, bool aIsConsumed) { PluginInstanceParent* pip = PluginInstanceParent::Cast(aInstance); return pip ? pip->HandledWindowedPluginKeyEvent(aNativeKeyData, aIsConsumed) : NS_ERROR_FAILURE; } void PluginModuleParent::OnInitFailure() { if (GetIPCChannel()->CanSend()) { Close(); } mShutdown = true; } class PluginOfflineObserver final : public nsIObserver { public: NS_DECL_ISUPPORTS NS_DECL_NSIOBSERVER explicit PluginOfflineObserver(PluginModuleChromeParent* pmp) : mPmp(pmp) {} private: ~PluginOfflineObserver() = default; PluginModuleChromeParent* mPmp; }; NS_IMPL_ISUPPORTS(PluginOfflineObserver, nsIObserver) NS_IMETHODIMP PluginOfflineObserver::Observe(nsISupports* aSubject, const char* aTopic, const char16_t* aData) { MOZ_ASSERT(!strcmp(aTopic, "ipc:network:set-offline")); mPmp->CachedSettingChanged(); return NS_OK; } void PluginModuleChromeParent::RegisterSettingsCallbacks() { Preferences::RegisterCallback(CachedSettingChanged, "javascript.enabled", this); Preferences::RegisterCallback(CachedSettingChanged, "dom.ipc.plugins.nativeCursorSupport", this); nsCOMPtr observerService = mozilla::services::GetObserverService(); if (observerService) { mPluginOfflineObserver = new PluginOfflineObserver(this); observerService->AddObserver(mPluginOfflineObserver, "ipc:network:set-offline", false); } } void PluginModuleChromeParent::UnregisterSettingsCallbacks() { Preferences::UnregisterCallback(CachedSettingChanged, "javascript.enabled", this); Preferences::UnregisterCallback(CachedSettingChanged, "dom.ipc.plugins.nativeCursorSupport", this); nsCOMPtr observerService = mozilla::services::GetObserverService(); if (observerService) { observerService->RemoveObserver(mPluginOfflineObserver, "ipc:network:set-offline"); mPluginOfflineObserver = nullptr; } } bool PluginModuleParent::GetSetting(NPNVariable aVariable) { NPBool boolVal = false; mozilla::plugins::parent::_getvalue(nullptr, aVariable, &boolVal); return boolVal; } void PluginModuleParent::GetSettings(PluginSettings* aSettings) { aSettings->javascriptEnabled() = GetSetting(NPNVjavascriptEnabledBool); aSettings->asdEnabled() = GetSetting(NPNVasdEnabledBool); aSettings->isOffline() = GetSetting(NPNVisOfflineBool); aSettings->supportsXembed() = GetSetting(NPNVSupportsXEmbedBool); aSettings->supportsWindowless() = GetSetting(NPNVSupportsWindowless); aSettings->userAgent() = NullableString(mNPNIface->uagent(nullptr)); #if defined(XP_MACOSX) aSettings->nativeCursorsSupported() = Preferences::GetBool("dom.ipc.plugins.nativeCursorSupport", false); #else // Need to initialize this to satisfy IPDL. aSettings->nativeCursorsSupported() = false; #endif } void PluginModuleChromeParent::CachedSettingChanged() { PluginSettings settings; GetSettings(&settings); Unused << SendSettingChanged(settings); } /* static */ void PluginModuleChromeParent::CachedSettingChanged(const char* aPref, void* aModule) { auto module = static_cast(aModule); module->CachedSettingChanged(); } #if defined(XP_UNIX) && !defined(XP_MACOSX) nsresult PluginModuleParent::NP_Initialize(NPNetscapeFuncs* bFuncs, NPPluginFuncs* pFuncs, NPError* error) { PLUGIN_LOG_DEBUG_METHOD; mNPNIface = bFuncs; mNPPIface = pFuncs; if (mShutdown) { *error = NPERR_GENERIC_ERROR; return NS_ERROR_FAILURE; } *error = NPERR_NO_ERROR; SetPluginFuncs(pFuncs); return NS_OK; } nsresult PluginModuleChromeParent::NP_Initialize(NPNetscapeFuncs* bFuncs, NPPluginFuncs* pFuncs, NPError* error) { PLUGIN_LOG_DEBUG_METHOD; if (mShutdown) { *error = NPERR_GENERIC_ERROR; return NS_ERROR_FAILURE; } *error = NPERR_NO_ERROR; mNPNIface = bFuncs; mNPPIface = pFuncs; PluginSettings settings; GetSettings(&settings); if (!CallNP_Initialize(settings, error)) { Close(); return NS_ERROR_FAILURE; } else if (*error != NPERR_NO_ERROR) { Close(); return NS_ERROR_FAILURE; } if (*error != NPERR_NO_ERROR) { OnInitFailure(); return NS_OK; } SetPluginFuncs(mNPPIface); return NS_OK; } #else nsresult PluginModuleParent::NP_Initialize(NPNetscapeFuncs* bFuncs, NPError* error) { PLUGIN_LOG_DEBUG_METHOD; mNPNIface = bFuncs; if (mShutdown) { *error = NPERR_GENERIC_ERROR; return NS_ERROR_FAILURE; } *error = NPERR_NO_ERROR; return NS_OK; } # if defined(XP_WIN) || defined(XP_MACOSX) nsresult PluginModuleContentParent::NP_Initialize(NPNetscapeFuncs* bFuncs, NPError* error) { PLUGIN_LOG_DEBUG_METHOD; return PluginModuleParent::NP_Initialize(bFuncs, error); } # endif nsresult PluginModuleChromeParent::NP_Initialize(NPNetscapeFuncs* bFuncs, NPError* error) { nsresult rv = PluginModuleParent::NP_Initialize(bFuncs, error); if (NS_FAILED(rv)) return rv; PluginSettings settings; GetSettings(&settings); if (!CallNP_Initialize(settings, error)) { Close(); return NS_ERROR_FAILURE; } bool ok = true; if (*error == NPERR_NO_ERROR) { // Initialization steps for (e10s && !asyncInit) || !e10s # if defined XP_WIN // Send the info needed to join the browser process's audio session to // the plugin process. nsID id; nsString sessionName; nsString iconPath; if (NS_SUCCEEDED( mozilla::widget::GetAudioSessionData(id, sessionName, iconPath))) { Unused << SendSetAudioSessionData(id, sessionName, iconPath); } # endif # ifdef MOZ_CRASHREPORTER_INJECTOR InitializeInjector(); # endif } if (!ok) { return NS_ERROR_FAILURE; } if (*error != NPERR_NO_ERROR) { OnInitFailure(); return NS_OK; } return NS_OK; } #endif nsresult PluginModuleParent::NP_Shutdown(NPError* error) { PLUGIN_LOG_DEBUG_METHOD; if (mShutdown) { *error = NPERR_GENERIC_ERROR; return NS_ERROR_FAILURE; } if (!DoShutdown(error)) { return NS_ERROR_FAILURE; } return NS_OK; } bool PluginModuleParent::DoShutdown(NPError* error) { bool ok = true; if (IsChrome() && mHadLocalInstance) { // We synchronously call NP_Shutdown if the chrome process was using // plugins itself. That way we can service any requests the plugin // makes. If we're in e10s, though, the content processes will have // already shut down and there's no one to talk to. So we shut down // asynchronously in PluginModuleChild::ActorDestroy. ok = CallNP_Shutdown(error); } // if NP_Shutdown() is nested within another interrupt call, this will // break things. but lord help us if we're doing that anyway; the // plugin dso will have been unloaded on the other side by the // CallNP_Shutdown() message Close(); // mShutdown should either be initialized to false, or be transitiong from // false to true. It is never ok to go from true to false. Using OR for // the following assignment to ensure this. mShutdown |= ok; if (!ok) { *error = NPERR_GENERIC_ERROR; } return ok; } nsresult PluginModuleParent::NP_GetMIMEDescription(const char** mimeDesc) { PLUGIN_LOG_DEBUG_METHOD; *mimeDesc = "application/x-foobar"; return NS_OK; } nsresult PluginModuleParent::NP_GetValue(void* future, NPPVariable aVariable, void* aValue, NPError* error) { MOZ_LOG(GetPluginLog(), LogLevel::Warning, ("%s Not implemented, requested variable %i", __FUNCTION__, (int)aVariable)); // TODO: implement this correctly *error = NPERR_GENERIC_ERROR; return NS_OK; } #if defined(XP_WIN) || defined(XP_MACOSX) nsresult PluginModuleParent::NP_GetEntryPoints(NPPluginFuncs* pFuncs, NPError* error) { NS_ASSERTION(pFuncs, "Null pointer!"); *error = NPERR_NO_ERROR; SetPluginFuncs(pFuncs); return NS_OK; } nsresult PluginModuleChromeParent::NP_GetEntryPoints(NPPluginFuncs* pFuncs, NPError* error) { # if !defined(XP_MACOSX) if (!mSubprocess->IsConnected()) { mNPPIface = pFuncs; *error = NPERR_NO_ERROR; return NS_OK; } # endif // We need to have the plugin process update its function table here by // actually calling NP_GetEntryPoints. The parent's function table will // reflect nullptr entries in the child's table once SetPluginFuncs is // called. if (!CallNP_GetEntryPoints(error)) { return NS_ERROR_FAILURE; } else if (*error != NPERR_NO_ERROR) { return NS_OK; } return PluginModuleParent::NP_GetEntryPoints(pFuncs, error); } #endif nsresult PluginModuleParent::NPP_New(NPMIMEType pluginType, NPP instance, int16_t argc, char* argn[], char* argv[], NPSavedData* saved, NPError* error) { PLUGIN_LOG_DEBUG_METHOD; if (mShutdown) { *error = NPERR_GENERIC_ERROR; return NS_ERROR_FAILURE; } // create the instance on the other side nsTArray names; nsTArray values; for (int i = 0; i < argc; ++i) { names.AppendElement(NullableString(argn[i])); values.AppendElement(NullableString(argv[i])); } return NPP_NewInternal(pluginType, instance, names, values, saved, error); } class nsCaseInsensitiveUTF8StringArrayComparator { public: template bool Equals(const A& a, const B& b) const { return a.Equals(b.get(), nsCaseInsensitiveUTF8StringComparator); } }; #if defined(XP_WIN) || defined(MOZ_WIDGET_GTK) static void ForceWindowless(nsTArray& names, nsTArray& values) { nsCaseInsensitiveUTF8StringArrayComparator comparator; constexpr auto wmodeAttributeName = "wmode"_ns; constexpr auto opaqueAttributeValue = "opaque"_ns; auto wmodeAttributeIndex = names.IndexOf(wmodeAttributeName, 0, comparator); if (wmodeAttributeIndex != names.NoIndex) { if (!values[wmodeAttributeIndex].EqualsLiteral("transparent")) { values[wmodeAttributeIndex].Assign(opaqueAttributeValue); } } else { names.AppendElement(wmodeAttributeName); values.AppendElement(opaqueAttributeValue); } } #endif // windows or linux #if defined(XP_WIN) static void ForceDirect(nsTArray& names, nsTArray& values) { nsCaseInsensitiveUTF8StringArrayComparator comparator; constexpr auto wmodeAttributeName = "wmode"_ns; constexpr auto directAttributeValue = "direct"_ns; auto wmodeAttributeIndex = names.IndexOf(wmodeAttributeName, 0, comparator); if (wmodeAttributeIndex != names.NoIndex) { if ((!values[wmodeAttributeIndex].EqualsLiteral("transparent")) && (!values[wmodeAttributeIndex].EqualsLiteral("opaque"))) { values[wmodeAttributeIndex].Assign(directAttributeValue); } } else { names.AppendElement(wmodeAttributeName); values.AppendElement(directAttributeValue); } } #endif // windows nsresult PluginModuleParent::NPP_NewInternal( NPMIMEType pluginType, NPP instance, nsTArray& names, nsTArray& values, NPSavedData* saved, NPError* error) { MOZ_ASSERT(names.Length() == values.Length()); if (mPluginName.IsEmpty()) { GetPluginDetails(); InitQuirksModes(nsDependentCString(pluginType)); } nsCaseInsensitiveUTF8StringArrayComparator comparator; constexpr auto srcAttributeName = "src"_ns; auto srcAttributeIndex = names.IndexOf(srcAttributeName, 0, comparator); nsAutoCString srcAttribute; if (srcAttributeIndex != names.NoIndex) { srcAttribute = values[srcAttributeIndex]; } nsDependentCString strPluginType(pluginType); PluginInstanceParent* parentInstance = new PluginInstanceParent(this, instance, strPluginType, mNPNIface); if (mIsFlashPlugin) { parentInstance->InitMetadata(strPluginType, srcAttribute); #ifdef XP_WIN bool supportsAsyncRender = Preferences::GetBool("dom.ipc.plugins.asyncdrawing.enabled", false); bool supportsForceDirect = Preferences::GetBool("dom.ipc.plugins.forcedirect.enabled", false); if (supportsAsyncRender) { // Prefs indicates we want async plugin rendering, make sure // the flash module has support. if (!CallModuleSupportsAsyncRender(&supportsAsyncRender)) { *error = NPERR_GENERIC_ERROR; return NS_ERROR_FAILURE; } } # ifdef _WIN64 // For 64-bit builds force windowless if the flash library doesn't support // async rendering regardless of sandbox level. if (!supportsAsyncRender) { # else // For 32-bit builds force windowless if the flash library doesn't support // async rendering and the sandbox level is 2 or greater. if (!supportsAsyncRender && mSandboxLevel >= 2) { # endif ForceWindowless(names, values); } #elif defined(MOZ_WIDGET_GTK) // We no longer support windowed mode on Linux. ForceWindowless(names, values); #endif #ifdef XP_WIN // For all builds that use async rendering force use of the accelerated // direct path for flash objects that have wmode=window or no wmode // specified. if (supportsAsyncRender && supportsForceDirect && PluginInstanceParent::SupportsPluginDirectDXGISurfaceDrawing()) { ForceDirect(names, values); } #endif } instance->pdata = parentInstance; // Any IPC messages for the PluginInstance actor should be dispatched to the // DocGroup for the plugin's document. RefPtr owner = parentInstance->GetOwner(); RefPtr elt; owner->GetDOMElement(getter_AddRefs(elt)); if (elt) { RefPtr doc = elt->OwnerDoc(); nsCOMPtr eventTarget = doc->EventTargetFor(TaskCategory::Other); SetEventTargetForActor(parentInstance, eventTarget); } if (!SendPPluginInstanceConstructor( parentInstance, nsDependentCString(pluginType), names, values)) { // |parentInstance| is automatically deleted. instance->pdata = nullptr; *error = NPERR_GENERIC_ERROR; return NS_ERROR_FAILURE; } if (!CallSyncNPP_New(parentInstance, error)) { // if IPC is down, we'll get an immediate "failed" return, but // without *error being set. So make sure that the error // condition is signaled to nsNPAPIPluginInstance if (NPERR_NO_ERROR == *error) { *error = NPERR_GENERIC_ERROR; } return NS_ERROR_FAILURE; } if (*error != NPERR_NO_ERROR) { NPP_Destroy(instance, 0); return NS_ERROR_FAILURE; } Telemetry::ScalarAdd(Telemetry::ScalarID::BROWSER_USAGE_PLUGIN_INSTANTIATED, 1); UpdatePluginTimeout(); return NS_OK; } void PluginModuleChromeParent::UpdatePluginTimeout() { TimeoutChanged(kParentTimeoutPref, this); } nsresult PluginModuleParent::NPP_ClearSiteData( const char* site, uint64_t flags, uint64_t maxAge, nsCOMPtr callback) { if (!mClearSiteDataSupported) return NS_ERROR_NOT_AVAILABLE; static uint64_t callbackId = 0; callbackId++; mClearSiteDataCallbacks[callbackId] = callback; if (!SendNPP_ClearSiteData(NullableString(site), flags, maxAge, callbackId)) { return NS_ERROR_FAILURE; } return NS_OK; } nsresult PluginModuleParent::NPP_GetSitesWithData( nsCOMPtr callback) { if (!mGetSitesWithDataSupported) return NS_ERROR_NOT_AVAILABLE; static uint64_t callbackId = 0; callbackId++; mSitesWithDataCallbacks[callbackId] = callback; if (!SendNPP_GetSitesWithData(callbackId)) return NS_ERROR_FAILURE; return NS_OK; } #if defined(XP_MACOSX) nsresult PluginModuleParent::IsRemoteDrawingCoreAnimation(NPP instance, bool* aDrawing) { PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); return pip ? pip->IsRemoteDrawingCoreAnimation(aDrawing) : NS_ERROR_FAILURE; } #endif #if defined(XP_MACOSX) || defined(XP_WIN) nsresult PluginModuleParent::ContentsScaleFactorChanged( NPP instance, double aContentsScaleFactor) { PluginInstanceParent* pip = PluginInstanceParent::Cast(instance); return pip ? pip->ContentsScaleFactorChanged(aContentsScaleFactor) : NS_ERROR_FAILURE; } #endif // #if defined(XP_MACOSX) #if defined(XP_MACOSX) mozilla::ipc::IPCResult PluginModuleParent::AnswerProcessSomeEvents() { mozilla::plugins::PluginUtilsOSX::InvokeNativeEventLoop(); return IPC_OK(); } #elif !defined(MOZ_WIDGET_GTK) mozilla::ipc::IPCResult PluginModuleParent::AnswerProcessSomeEvents() { MOZ_CRASH("unreached"); } #else static const int kMaxChancesToProcessEvents = 20; mozilla::ipc::IPCResult PluginModuleParent::AnswerProcessSomeEvents() { PLUGIN_LOG_DEBUG(("Spinning mini nested loop ...")); int i = 0; for (; i < kMaxChancesToProcessEvents; ++i) if (!g_main_context_iteration(nullptr, FALSE)) break; PLUGIN_LOG_DEBUG(("... quitting mini nested loop; processed %i tasks", i)); return IPC_OK(); } #endif mozilla::ipc::IPCResult PluginModuleParent::RecvProcessNativeEventsInInterruptCall() { PLUGIN_LOG_DEBUG(("%s", FULLFUNCTION)); #if defined(OS_WIN) ProcessNativeEventsInInterruptCall(); return IPC_OK(); #else MOZ_ASSERT_UNREACHABLE( "PluginModuleParent::RecvProcessNativeEventsInInterruptCall not " "implemented!"); return IPC_FAIL_NO_REASON(this); #endif } void PluginModuleParent::ProcessRemoteNativeEventsInInterruptCall() { #if defined(OS_WIN) Unused << SendProcessNativeEventsInInterruptCall(); return; #endif MOZ_ASSERT_UNREACHABLE( "PluginModuleParent::ProcessRemoteNativeEventsInInterruptCall not " "implemented!"); } mozilla::ipc::IPCResult PluginModuleParent::RecvPluginShowWindow( const uint32_t& aWindowId, const bool& aModal, const int32_t& aX, const int32_t& aY, const double& aWidth, const double& aHeight) { PLUGIN_LOG_DEBUG(("%s", FULLFUNCTION)); #if defined(XP_MACOSX) CGRect windowBound = ::CGRectMake(aX, aY, aWidth, aHeight); mac_plugin_interposing::parent::OnPluginShowWindow(aWindowId, windowBound, aModal); return IPC_OK(); #else MOZ_ASSERT_UNREACHABLE( "PluginInstanceParent::RecvPluginShowWindow not implemented!"); return IPC_FAIL_NO_REASON(this); #endif } mozilla::ipc::IPCResult PluginModuleParent::RecvPluginHideWindow( const uint32_t& aWindowId) { PLUGIN_LOG_DEBUG(("%s", FULLFUNCTION)); #if defined(XP_MACOSX) mac_plugin_interposing::parent::OnPluginHideWindow(aWindowId, OtherPid()); return IPC_OK(); #else MOZ_ASSERT_UNREACHABLE( "PluginInstanceParent::RecvPluginHideWindow not implemented!"); return IPC_FAIL_NO_REASON(this); #endif } mozilla::ipc::IPCResult PluginModuleParent::RecvSetCursor( const NSCursorInfo& aCursorInfo) { PLUGIN_LOG_DEBUG(("%s", FULLFUNCTION)); #if defined(XP_MACOSX) mac_plugin_interposing::parent::OnSetCursor(aCursorInfo); return IPC_OK(); #else MOZ_ASSERT_UNREACHABLE( "PluginInstanceParent::RecvSetCursor not implemented!"); return IPC_FAIL_NO_REASON(this); #endif } mozilla::ipc::IPCResult PluginModuleParent::RecvShowCursor(const bool& aShow) { PLUGIN_LOG_DEBUG(("%s", FULLFUNCTION)); #if defined(XP_MACOSX) mac_plugin_interposing::parent::OnShowCursor(aShow); return IPC_OK(); #else MOZ_ASSERT_UNREACHABLE( "PluginInstanceParent::RecvShowCursor not implemented!"); return IPC_FAIL_NO_REASON(this); #endif } mozilla::ipc::IPCResult PluginModuleParent::RecvPushCursor( const NSCursorInfo& aCursorInfo) { PLUGIN_LOG_DEBUG(("%s", FULLFUNCTION)); #if defined(XP_MACOSX) mac_plugin_interposing::parent::OnPushCursor(aCursorInfo); return IPC_OK(); #else MOZ_ASSERT_UNREACHABLE( "PluginInstanceParent::RecvPushCursor not implemented!"); return IPC_FAIL_NO_REASON(this); #endif } mozilla::ipc::IPCResult PluginModuleParent::RecvPopCursor() { PLUGIN_LOG_DEBUG(("%s", FULLFUNCTION)); #if defined(XP_MACOSX) mac_plugin_interposing::parent::OnPopCursor(); return IPC_OK(); #else MOZ_ASSERT_UNREACHABLE( "PluginInstanceParent::RecvPopCursor not implemented!"); return IPC_FAIL_NO_REASON(this); #endif } mozilla::ipc::IPCResult PluginModuleParent::RecvNPN_SetException( const nsCString& aMessage) { PLUGIN_LOG_DEBUG(("%s", FULLFUNCTION)); // This function ignores its first argument. mozilla::plugins::parent::_setexception(nullptr, NullableStringGet(aMessage)); return IPC_OK(); } mozilla::ipc::IPCResult PluginModuleParent::RecvNPN_ReloadPlugins( const bool& aReloadPages) { PLUGIN_LOG_DEBUG(("%s", FULLFUNCTION)); mozilla::plugins::parent::_reloadplugins(aReloadPages); return IPC_OK(); } mozilla::ipc::IPCResult PluginModuleChromeParent::RecvNotifyContentModuleDestroyed() { RefPtr host = nsPluginHost::GetInst(); if (host) { host->NotifyContentModuleDestroyed(mPluginId); } return IPC_OK(); } mozilla::ipc::IPCResult PluginModuleParent::RecvReturnClearSiteData( const NPError& aRv, const uint64_t& aCallbackId) { if (mClearSiteDataCallbacks.find(aCallbackId) == mClearSiteDataCallbacks.end()) { return IPC_OK(); } if (!!mClearSiteDataCallbacks[aCallbackId]) { nsresult rv; switch (aRv) { case NPERR_NO_ERROR: rv = NS_OK; break; case NPERR_TIME_RANGE_NOT_SUPPORTED: rv = NS_ERROR_PLUGIN_TIME_RANGE_NOT_SUPPORTED; break; case NPERR_MALFORMED_SITE: rv = NS_ERROR_INVALID_ARG; break; default: rv = NS_ERROR_FAILURE; } mClearSiteDataCallbacks[aCallbackId]->Callback(rv); } mClearSiteDataCallbacks.erase(aCallbackId); return IPC_OK(); } mozilla::ipc::IPCResult PluginModuleParent::RecvReturnSitesWithData( nsTArray&& aSites, const uint64_t& aCallbackId) { if (mSitesWithDataCallbacks.find(aCallbackId) == mSitesWithDataCallbacks.end()) { return IPC_OK(); } if (!!mSitesWithDataCallbacks[aCallbackId]) { mSitesWithDataCallbacks[aCallbackId]->SitesWithData(aSites); } mSitesWithDataCallbacks.erase(aCallbackId); return IPC_OK(); } layers::TextureClientRecycleAllocator* PluginModuleParent::EnsureTextureAllocatorForDirectBitmap() { if (!mTextureAllocatorForDirectBitmap) { mTextureAllocatorForDirectBitmap = new layers::TextureClientRecycleAllocator( layers::ImageBridgeChild::GetSingleton().get()); } return mTextureAllocatorForDirectBitmap; } layers::TextureClientRecycleAllocator* PluginModuleParent::EnsureTextureAllocatorForDXGISurface() { if (!mTextureAllocatorForDXGISurface) { mTextureAllocatorForDXGISurface = new layers::TextureClientRecycleAllocator( layers::ImageBridgeChild::GetSingleton().get()); } return mTextureAllocatorForDXGISurface; } mozilla::ipc::IPCResult PluginModuleParent::AnswerNPN_SetValue_NPPVpluginRequiresAudioDeviceChanges( const bool& shouldRegister, NPError* result) { MOZ_CRASH( "SetValue_NPPVpluginRequiresAudioDeviceChanges is only valid " "with PluginModuleChromeParent"); } #ifdef MOZ_CRASHREPORTER_INJECTOR // We only add the crash reporter to subprocess which have the filename // FlashPlayerPlugin* # define FLASH_PROCESS_PREFIX u"FLASHPLAYERPLUGIN" static DWORD GetFlashChildOfPID(DWORD pid, HANDLE snapshot) { PROCESSENTRY32 entry = {sizeof(entry)}; for (BOOL ok = Process32First(snapshot, &entry); ok; ok = Process32Next(snapshot, &entry)) { if (entry.th32ParentProcessID == pid) { nsString name(entry.szExeFile); ToUpperCase(name); if (StringBeginsWith(name, nsLiteralString(FLASH_PROCESS_PREFIX))) { return entry.th32ProcessID; } } } return 0; } // We only look for child processes of the Flash plugin, NPSWF* # define FLASH_PLUGIN_PREFIX "NPSWF" void PluginModuleChromeParent::InitializeInjector() { if (!Preferences::GetBool( "dom.ipc.plugins.flash.subprocess.crashreporter.enabled", false)) return; nsCString path(Process()->GetPluginFilePath().c_str()); ToUpperCase(path); int32_t lastSlash = path.RFindCharInSet("\\/"); if (kNotFound == lastSlash) return; if (!StringBeginsWith(Substring(path, lastSlash + 1), nsLiteralCString(FLASH_PLUGIN_PREFIX))) return; mFinishInitTask = mChromeTaskFactory.NewTask(); mFinishInitTask->Init(this); if (!::QueueUserWorkItem(&PluginModuleChromeParent::GetToolhelpSnapshot, mFinishInitTask, WT_EXECUTEDEFAULT)) { mFinishInitTask = nullptr; return; } } void PluginModuleChromeParent::DoInjection(const nsAutoHandle& aSnapshot) { DWORD pluginProcessPID = GetProcessId(Process()->GetChildProcessHandle()); mFlashProcess1 = GetFlashChildOfPID(pluginProcessPID, aSnapshot); if (mFlashProcess1) { InjectCrashReporterIntoProcess(mFlashProcess1, this); mFlashProcess2 = GetFlashChildOfPID(mFlashProcess1, aSnapshot); if (mFlashProcess2) { InjectCrashReporterIntoProcess(mFlashProcess2, this); } } mFinishInitTask = nullptr; } DWORD WINAPI PluginModuleChromeParent::GetToolhelpSnapshot(LPVOID aContext) { FinishInjectorInitTask* task = static_cast(aContext); MOZ_ASSERT(task); task->PostToMainThread(); return 0; } void PluginModuleChromeParent::OnCrash(DWORD processID) { if (!mShutdown) { GetIPCChannel()->CloseWithError(); mozilla::ipc::ScopedProcessHandle geckoPluginChild; if (base::OpenProcessHandle(OtherPid(), &geckoPluginChild.rwget())) { if (!base::KillProcess(geckoPluginChild, base::PROCESS_END_KILLED_BY_USER, false)) { NS_ERROR("May have failed to kill child process."); } } else { NS_ERROR("Failed to open child process when attempting kill."); } } } #endif // MOZ_CRASHREPORTER_INJECTOR