DXR is a code search and navigation tool aimed at making sense of large projects. It supports full-text and regex searches as well as structural queries.

Implementation

Mercurial (6863f516ba38)

VCS Links

Line Code
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 2 -*-
 * vim: sw=2 ts=4 et :
 * This Source Code Form is subject to the terms of the Mozilla Public
 * License, v. 2.0. If a copy of the MPL was not distributed with this
 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */

#ifndef dom_plugins_PluginProcessParent_h
#define dom_plugins_PluginProcessParent_h 1

#include "mozilla/Attributes.h"
#include "base/basictypes.h"

#include "base/file_path.h"
#include "base/task.h"
#include "base/thread.h"
#include "chrome/common/child_process_host.h"

#include "mozilla/ipc/GeckoChildProcessHost.h"
#include "mozilla/ipc/TaskFactory.h"
#include "mozilla/UniquePtr.h"
#include "nsCOMPtr.h"
#include "nsIRunnable.h"
#include "nsTHashtable.h"
#include "nsHashKeys.h"

namespace mozilla {
namespace plugins {

class LaunchCompleteTask : public Runnable {
 public:
  LaunchCompleteTask()
      : Runnable("plugins::LaunchCompleteTask"), mLaunchSucceeded(false) {}

  void SetLaunchSucceeded() { mLaunchSucceeded = true; }

 protected:
  bool mLaunchSucceeded;
};

class PluginProcessParent final : public mozilla::ipc::GeckoChildProcessHost {
 public:
  explicit PluginProcessParent(const std::string& aPluginFilePath);

  /**
   * Launch the plugin process. If the process fails to launch,
   * this method will return false.
   *
   * @param aLaunchCompleteTask Task that is executed on the main
   * thread once the asynchonous launch has completed.
   * @param aSandboxLevel Determines the strength of the sandbox.
   * <= 0 means no sandbox.
   * @param aIsSandboxLoggingEnabled Indicates if sandbox violation
   * logging should be enabled for the plugin process.
   */
  bool Launch(UniquePtr<LaunchCompleteTask> aLaunchCompleteTask =
                  UniquePtr<LaunchCompleteTask>(),
              int32_t aSandboxLevel = 0, bool aIsSandboxLoggingEnabled = false);

  virtual bool CanShutdown() override { return true; }

  const std::string& GetPluginFilePath() { return mPluginFilePath; }

  using mozilla::ipc::GeckoChildProcessHost::GetChannel;

  virtual bool WaitUntilConnected(int32_t aTimeoutMs = 0) override;

  virtual void OnChannelConnected(int32_t peer_pid) override;
  virtual void OnChannelError() override;

  bool IsConnected();

  static bool IsPluginProcessId(base::ProcessId procId);

 private:
  ~PluginProcessParent();

  void RunLaunchCompleteTask();

  std::string mPluginFilePath;
  ipc::TaskFactory<PluginProcessParent> mTaskFactory;
  UniquePtr<LaunchCompleteTask> mLaunchCompleteTask;
  MessageLoop* mMainMsgLoop;
#ifdef XP_WIN
  typedef nsTHashtable<nsUint32HashKey> PidSet;
  // Set of PIDs for all plugin child processes or NULL if empty.
  static PidSet* sPidSet;
  uint32_t mChildPid;
#endif

  DISALLOW_EVIL_CONSTRUCTORS(PluginProcessParent);
};

}  // namespace plugins
}  // namespace mozilla

#endif  // ifndef dom_plugins_PluginProcessParent_h