blob: ea42f0cb2cef16cabd25868241e7f9aa57019b07 [file] [log] [blame]
/*
* Copyright (C) 2010-2017 Apple Inc. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS''
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
* THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
* THE POSSIBILITY OF SUCH DAMAGE.
*/
#include "config.h"
#include "WebProcessProxy.h"
#include "APIFrameHandle.h"
#include "APIPageGroupHandle.h"
#include "APIPageHandle.h"
#include "DataReference.h"
#include "DownloadProxyMap.h"
#include "Logging.h"
#include "PluginInfoStore.h"
#include "PluginProcessManager.h"
#include "ProvisionalPageProxy.h"
#include "TextChecker.h"
#include "TextCheckerState.h"
#include "UIMessagePortChannelProvider.h"
#include "UserData.h"
#include "WebBackForwardListItem.h"
#include "WebInspectorUtilities.h"
#include "WebNavigationDataStore.h"
#include "WebNotificationManagerProxy.h"
#include "WebPageGroup.h"
#include "WebPageProxy.h"
#include "WebPasteboardProxy.h"
#include "WebProcessCache.h"
#include "WebProcessMessages.h"
#include "WebProcessPool.h"
#include "WebProcessProxyMessages.h"
#include "WebUserContentControllerProxy.h"
#include "WebsiteData.h"
#include "WebsiteDataFetchOption.h"
#include <WebCore/DiagnosticLoggingKeys.h>
#include <WebCore/PrewarmInformation.h>
#include <WebCore/PublicSuffix.h>
#include <WebCore/SuddenTermination.h>
#include <stdio.h>
#include <wtf/Algorithms.h>
#include <wtf/NeverDestroyed.h>
#include <wtf/RunLoop.h>
#include <wtf/URL.h>
#include <wtf/text/CString.h>
#include <wtf/text/StringBuilder.h>
#include <wtf/text/WTFString.h>
#if PLATFORM(COCOA)
#include "ObjCObjectGraph.h"
#include "PDFPlugin.h"
#include "UserMediaCaptureManagerProxy.h"
#include "VersionChecks.h"
#endif
#if PLATFORM(MAC)
#include "HighPerformanceGPUManager.h"
#endif
#if ENABLE(SEC_ITEM_SHIM)
#include "SecItemShimProxy.h"
#endif
#define MESSAGE_CHECK(assertion) MESSAGE_CHECK_BASE(assertion, connection())
#define MESSAGE_CHECK_URL(url) MESSAGE_CHECK_BASE(checkURLReceivedFromWebProcess(url), connection())
namespace WebKit {
using namespace WebCore;
static bool isMainThreadOrCheckDisabled()
{
#if PLATFORM(IOS_FAMILY)
return LIKELY(RunLoop::isMain()) || !linkedOnOrAfter(SDKVersion::FirstWithMainThreadReleaseAssertionInWebPageProxy);
#elif PLATFORM(MAC)
return LIKELY(RunLoop::isMain()) || !linkedOnOrAfter(SDKVersion::FirstWithMainThreadReleaseAssertionInWebPageProxy);
#else
return RunLoop::isMain();
#endif
}
static HashMap<ProcessIdentifier, WebProcessProxy*>& allProcesses()
{
ASSERT(isMainThreadOrCheckDisabled());
static NeverDestroyed<HashMap<ProcessIdentifier, WebProcessProxy*>> map;
return map;
}
WebProcessProxy* WebProcessProxy::processForIdentifier(ProcessIdentifier identifier)
{
return allProcesses().get(identifier);
}
PageIdentifier WebProcessProxy::generatePageID()
{
return PageIdentifier::generate();
}
static WebProcessProxy::WebPageProxyMap& globalPageMap()
{
ASSERT(isMainThreadOrCheckDisabled());
static NeverDestroyed<WebProcessProxy::WebPageProxyMap> pageMap;
return pageMap;
}
void WebProcessProxy::forWebPagesWithOrigin(PAL::SessionID sessionID, const SecurityOriginData& origin, const Function<void(WebPageProxy&)>& callback)
{
for (auto* page : globalPageMap().values()) {
if (page->sessionID() != sessionID || SecurityOriginData::fromURL(URL { { }, page->currentURL() }) != origin)
continue;
callback(*page);
}
}
Ref<WebProcessProxy> WebProcessProxy::create(WebProcessPool& processPool, WebsiteDataStore* websiteDataStore, IsPrewarmed isPrewarmed, ShouldLaunchProcess shouldLaunchProcess)
{
auto proxy = adoptRef(*new WebProcessProxy(processPool, websiteDataStore, isPrewarmed));
if (shouldLaunchProcess == ShouldLaunchProcess::Yes)
proxy->connect();
return proxy;
}
WebProcessProxy::WebProcessProxy(WebProcessPool& processPool, WebsiteDataStore* websiteDataStore, IsPrewarmed isPrewarmed)
: AuxiliaryProcessProxy(processPool.alwaysRunsAtBackgroundPriority())
, m_responsivenessTimer(*this)
, m_backgroundResponsivenessTimer(*this)
, m_processPool(processPool, isPrewarmed == IsPrewarmed::Yes ? IsWeak::Yes : IsWeak::No)
, m_mayHaveUniversalFileReadSandboxExtension(false)
, m_numberOfTimesSuddenTerminationWasDisabled(0)
, m_throttler(*this, processPool.shouldTakeUIBackgroundAssertion())
, m_isResponsive(NoOrMaybe::Maybe)
, m_visiblePageCounter([this](RefCounterEvent) { updateBackgroundResponsivenessTimer(); })
, m_websiteDataStore(websiteDataStore)
#if PLATFORM(COCOA) && ENABLE(MEDIA_STREAM)
, m_userMediaCaptureManagerProxy(std::make_unique<UserMediaCaptureManagerProxy>(*this))
#endif
, m_isPrewarmed(isPrewarmed == IsPrewarmed::Yes)
{
RELEASE_ASSERT(isMainThreadOrCheckDisabled());
auto result = allProcesses().add(coreProcessIdentifier(), this);
ASSERT_UNUSED(result, result.isNewEntry);
WebPasteboardProxy::singleton().addWebProcessProxy(*this);
}
WebProcessProxy::~WebProcessProxy()
{
RELEASE_ASSERT(isMainThreadOrCheckDisabled());
ASSERT(m_pageURLRetainCountMap.isEmpty());
if (m_processPool)
m_processPool->clearWebProcessHasUploads(coreProcessIdentifier());
auto result = allProcesses().remove(coreProcessIdentifier());
ASSERT_UNUSED(result, result);
WebPasteboardProxy::singleton().removeWebProcessProxy(*this);
#if PLATFORM(MAC) && ENABLE(WEBPROCESS_WINDOWSERVER_BLOCKING)
if (state() == State::Running)
processPool().stopDisplayLinks(*connection());
#endif
auto isResponsiveCallbacks = WTFMove(m_isResponsiveCallbacks);
for (auto& callback : isResponsiveCallbacks)
callback(false);
if (m_webConnection)
m_webConnection->invalidate();
while (m_numberOfTimesSuddenTerminationWasDisabled-- > 0)
WebCore::enableSuddenTermination();
for (auto& callback : m_localPortActivityCompletionHandlers.values())
callback(MessagePortChannelProvider::HasActivity::No);
#if PLATFORM(MAC)
HighPerformanceGPUManager::singleton().removeProcessRequiringHighPerformance(this);
#endif
}
void WebProcessProxy::setIsInProcessCache(bool value)
{
ASSERT(m_isInProcessCache != value);
m_isInProcessCache = value;
send(Messages::WebProcess::SetIsInProcessCache(m_isInProcessCache), 0);
if (m_isInProcessCache) {
// WebProcessProxy objects normally keep the process pool alive but we do not want this to be the case
// for cached processes or it would leak the pool.
m_processPool.setIsWeak(IsWeak::Yes);
} else {
RELEASE_ASSERT(m_processPool);
m_processPool.setIsWeak(IsWeak::No);
}
}
void WebProcessProxy::setWebsiteDataStore(WebsiteDataStore& dataStore)
{
ASSERT(!m_websiteDataStore);
m_websiteDataStore = &dataStore;
updateRegistrationWithDataStore();
}
void WebProcessProxy::updateRegistrationWithDataStore()
{
if (!m_websiteDataStore)
return;
bool shouldBeRegistered = processPool().dummyProcessProxy() != this && (pageCount() || provisionalPageCount());
if (shouldBeRegistered)
m_websiteDataStore->registerProcess(*this);
else
m_websiteDataStore->unregisterProcess(*this);
}
void WebProcessProxy::addProvisionalPageProxy(ProvisionalPageProxy& provisionalPage)
{
ASSERT(!m_provisionalPages.contains(&provisionalPage));
m_provisionalPages.add(&provisionalPage);
updateRegistrationWithDataStore();
}
void WebProcessProxy::removeProvisionalPageProxy(ProvisionalPageProxy& provisionalPage)
{
ASSERT(m_provisionalPages.contains(&provisionalPage));
m_provisionalPages.remove(&provisionalPage);
updateRegistrationWithDataStore();
}
void WebProcessProxy::getLaunchOptions(ProcessLauncher::LaunchOptions& launchOptions)
{
launchOptions.processType = ProcessLauncher::ProcessType::Web;
AuxiliaryProcessProxy::getLaunchOptions(launchOptions);
if (!m_processPool->customWebContentServiceBundleIdentifier().isEmpty())
launchOptions.customWebContentServiceBundleIdentifier = m_processPool->customWebContentServiceBundleIdentifier().ascii();
if (WebKit::isInspectorProcessPool(processPool()))
launchOptions.extraInitializationData.add("inspector-process"_s, "1"_s);
auto overrideLanguages = m_processPool->configuration().overrideLanguages();
if (overrideLanguages.size()) {
StringBuilder languageString;
for (size_t i = 0; i < overrideLanguages.size(); ++i) {
if (i)
languageString.append(',');
languageString.append(overrideLanguages[i]);
}
launchOptions.extraInitializationData.add("OverrideLanguages"_s, languageString.toString());
}
launchOptions.nonValidInjectedCodeAllowed = shouldAllowNonValidInjectedCode();
if (isPrewarmed())
launchOptions.extraInitializationData.add("is-prewarmed"_s, "1"_s);
if (processPool().shouldMakeNextWebProcessLaunchFailForTesting()) {
processPool().setShouldMakeNextWebProcessLaunchFailForTesting(false);
launchOptions.shouldMakeProcessLaunchFailForTesting = true;
}
}
#if !PLATFORM(GTK) && !PLATFORM(WPE)
void WebProcessProxy::platformGetLaunchOptions(ProcessLauncher::LaunchOptions& launchOptions)
{
}
#endif
void WebProcessProxy::connectionWillOpen(IPC::Connection& connection)
{
ASSERT(this->connection() == &connection);
// Throttling IPC messages coming from the WebProcesses so that the UIProcess stays responsive, even
// if one of the WebProcesses misbehaves.
connection.enableIncomingMessagesThrottling();
// Use this flag to force synchronous messages to be treated as asynchronous messages in the WebProcess.
// Otherwise, the WebProcess would process incoming synchronous IPC while waiting for a synchronous IPC
// reply from the UIProcess, which would be unsafe.
connection.setOnlySendMessagesAsDispatchWhenWaitingForSyncReplyWhenProcessingSuchAMessage(true);
#if ENABLE(SEC_ITEM_SHIM)
SecItemShimProxy::singleton().initializeConnection(connection);
#endif
}
void WebProcessProxy::processWillShutDown(IPC::Connection& connection)
{
ASSERT_UNUSED(connection, this->connection() == &connection);
#if PLATFORM(MAC) && ENABLE(WEBPROCESS_WINDOWSERVER_BLOCKING)
processPool().stopDisplayLinks(connection);
#endif
}
void WebProcessProxy::shutDown()
{
RELEASE_ASSERT(isMainThreadOrCheckDisabled());
shutDownProcess();
if (m_webConnection) {
m_webConnection->invalidate();
m_webConnection = nullptr;
}
m_responsivenessTimer.invalidate();
m_backgroundResponsivenessTimer.invalidate();
m_tokenForHoldingLockedFiles = nullptr;
for (auto& frame : copyToVector(m_frameMap.values()))
frame->webProcessWillShutDown();
m_frameMap.clear();
for (auto* visitedLinkStore : m_visitedLinkStoresWithUsers.keys())
visitedLinkStore->removeProcess(*this);
m_visitedLinkStoresWithUsers.clear();
for (auto* webUserContentControllerProxy : m_webUserContentControllerProxies)
webUserContentControllerProxy->removeProcess(*this);
m_webUserContentControllerProxies.clear();
m_userInitiatedActionMap.clear();
for (auto& port : m_processEntangledPorts)
UIMessagePortChannelProvider::singleton().registry().didCloseMessagePort(port);
m_processPool->disconnectProcess(this);
}
WebPageProxy* WebProcessProxy::webPage(PageIdentifier pageID)
{
return globalPageMap().get(pageID);
}
#if ENABLE(RESOURCE_LOAD_STATISTICS)
void WebProcessProxy::notifyPageStatisticsAndDataRecordsProcessed()
{
for (auto& page : globalPageMap())
page.value->postMessageToInjectedBundle("WebsiteDataScanForRegistrableDomainsFinished", nullptr);
}
void WebProcessProxy::notifyWebsiteDataScanForRegistrableDomainsFinished()
{
for (auto& page : globalPageMap())
page.value->postMessageToInjectedBundle("WebsiteDataScanForRegistrableDomainsFinished", nullptr);
}
void WebProcessProxy::notifyWebsiteDataDeletionForRegistrableDomainsFinished()
{
for (auto& page : globalPageMap())
page.value->postMessageToInjectedBundle("WebsiteDataDeletionForRegistrableDomainsFinished", nullptr);
}
void WebProcessProxy::notifyPageStatisticsTelemetryFinished(API::Object* messageBody)
{
for (auto& page : globalPageMap())
page.value->postMessageToInjectedBundle("ResourceLoadStatisticsTelemetryFinished", messageBody);
}
#endif
Ref<WebPageProxy> WebProcessProxy::createWebPage(PageClient& pageClient, Ref<API::PageConfiguration>&& pageConfiguration)
{
auto pageID = generatePageID();
Ref<WebPageProxy> webPage = WebPageProxy::create(pageClient, *this, pageID, WTFMove(pageConfiguration));
addExistingWebPage(webPage.get(), BeginsUsingDataStore::Yes);
return webPage;
}
void WebProcessProxy::addExistingWebPage(WebPageProxy& webPage, BeginsUsingDataStore beginsUsingDataStore)
{
ASSERT(!m_pageMap.contains(webPage.pageID()));
ASSERT(!globalPageMap().contains(webPage.pageID()));
ASSERT(!m_isInProcessCache);
ASSERT(!m_websiteDataStore || m_websiteDataStore == &webPage.websiteDataStore());
if (beginsUsingDataStore == BeginsUsingDataStore::Yes)
m_processPool->pageBeginUsingWebsiteDataStore(webPage.pageID(), webPage.websiteDataStore());
m_pageMap.set(webPage.pageID(), &webPage);
globalPageMap().set(webPage.pageID(), &webPage);
updateRegistrationWithDataStore();
updateBackgroundResponsivenessTimer();
}
void WebProcessProxy::markIsNoLongerInPrewarmedPool()
{
ASSERT(m_isPrewarmed);
m_isPrewarmed = false;
RELEASE_ASSERT(m_processPool);
m_processPool.setIsWeak(IsWeak::No);
send(Messages::WebProcess::MarkIsNoLongerPrewarmed(), 0);
}
void WebProcessProxy::removeWebPage(WebPageProxy& webPage, EndsUsingDataStore endsUsingDataStore)
{
auto* removedPage = m_pageMap.take(webPage.pageID());
ASSERT_UNUSED(removedPage, removedPage == &webPage);
removedPage = globalPageMap().take(webPage.pageID());
ASSERT_UNUSED(removedPage, removedPage == &webPage);
if (endsUsingDataStore == EndsUsingDataStore::Yes)
m_processPool->pageEndUsingWebsiteDataStore(webPage.pageID(), webPage.websiteDataStore());
removeVisitedLinkStoreUser(webPage.visitedLinkStore(), webPage.pageID());
updateRegistrationWithDataStore();
updateBackgroundResponsivenessTimer();
maybeShutDown();
}
void WebProcessProxy::addVisitedLinkStoreUser(VisitedLinkStore& visitedLinkStore, PageIdentifier pageID)
{
auto& users = m_visitedLinkStoresWithUsers.ensure(&visitedLinkStore, [] {
return HashSet<PageIdentifier> { };
}).iterator->value;
ASSERT(!users.contains(pageID));
users.add(pageID);
if (users.size() == 1 && state() == State::Running)
visitedLinkStore.addProcess(*this);
}
void WebProcessProxy::removeVisitedLinkStoreUser(VisitedLinkStore& visitedLinkStore, PageIdentifier pageID)
{
auto it = m_visitedLinkStoresWithUsers.find(&visitedLinkStore);
if (it == m_visitedLinkStoresWithUsers.end())
return;
auto& users = it->value;
users.remove(pageID);
if (users.isEmpty()) {
m_visitedLinkStoresWithUsers.remove(it);
visitedLinkStore.removeProcess(*this);
}
}
void WebProcessProxy::addWebUserContentControllerProxy(WebUserContentControllerProxy& proxy, WebPageCreationParameters& parameters)
{
m_webUserContentControllerProxies.add(&proxy);
proxy.addProcess(*this, parameters);
}
void WebProcessProxy::didDestroyWebUserContentControllerProxy(WebUserContentControllerProxy& proxy)
{
ASSERT(m_webUserContentControllerProxies.contains(&proxy));
m_webUserContentControllerProxies.remove(&proxy);
}
void WebProcessProxy::assumeReadAccessToBaseURL(WebPageProxy& page, const String& urlString)
{
URL url(URL(), urlString);
if (!url.isLocalFile())
return;
// There's a chance that urlString does not point to a directory.
// Get url's base URL to add to m_localPathsWithAssumedReadAccess.
URL baseURL(URL(), url.baseAsString());
String path = baseURL.fileSystemPath();
if (path.isNull())
return;
// Client loads an alternate string. This doesn't grant universal file read, but the web process is assumed
// to have read access to this directory already.
m_localPathsWithAssumedReadAccess.add(path);
page.addPreviouslyVisitedPath(path);
}
bool WebProcessProxy::hasAssumedReadAccessToURL(const URL& url) const
{
if (!url.isLocalFile())
return false;
String path = url.fileSystemPath();
auto startsWithURLPath = [&path](const String& assumedAccessPath) {
// There are no ".." components, because URL removes those.
return path.startsWith(assumedAccessPath);
};
auto& platformPaths = platformPathsWithAssumedReadAccess();
auto platformPathsEnd = platformPaths.end();
if (std::find_if(platformPaths.begin(), platformPathsEnd, startsWithURLPath) != platformPathsEnd)
return true;
auto localPathsEnd = m_localPathsWithAssumedReadAccess.end();
if (std::find_if(m_localPathsWithAssumedReadAccess.begin(), localPathsEnd, startsWithURLPath) != localPathsEnd)
return true;
return false;
}
bool WebProcessProxy::checkURLReceivedFromWebProcess(const String& urlString)
{
return checkURLReceivedFromWebProcess(URL(URL(), urlString));
}
bool WebProcessProxy::checkURLReceivedFromWebProcess(const URL& url)
{
// FIXME: Consider checking that the URL is valid. Currently, WebProcess sends invalid URLs in many cases, but it probably doesn't have good reasons to do that.
// Any other non-file URL is OK.
if (!url.isLocalFile())
return true;
// Any file URL is also OK if we've loaded a file URL through API before, granting universal read access.
if (m_mayHaveUniversalFileReadSandboxExtension)
return true;
// If we loaded a string with a file base URL before, loading resources from that subdirectory is fine.
if (hasAssumedReadAccessToURL(url))
return true;
// Items in back/forward list have been already checked.
// One case where we don't have sandbox extensions for file URLs in b/f list is if the list has been reinstated after a crash or a browser restart.
String path = url.fileSystemPath();
for (auto& item : WebBackForwardListItem::allItems().values()) {
URL itemURL(URL(), item->url());
if (itemURL.isLocalFile() && itemURL.fileSystemPath() == path)
return true;
URL itemOriginalURL(URL(), item->originalURL());
if (itemOriginalURL.isLocalFile() && itemOriginalURL.fileSystemPath() == path)
return true;
}
// A Web process that was never asked to load a file URL should not ever ask us to do anything with a file URL.
WTFLogAlways("Received an unexpected URL from the web process: '%s'\n", url.string().utf8().data());
return false;
}
#if !PLATFORM(COCOA)
bool WebProcessProxy::fullKeyboardAccessEnabled()
{
return false;
}
#endif
bool WebProcessProxy::hasProvisionalPageWithID(PageIdentifier pageID) const
{
for (auto* provisionalPage : m_provisionalPages) {
if (provisionalPage->page().pageID() == pageID)
return true;
}
return false;
}
bool WebProcessProxy::isAllowedToUpdateBackForwardItem(WebBackForwardListItem& item) const
{
if (m_pageMap.contains(item.pageID()))
return true;
if (hasProvisionalPageWithID(item.pageID()))
return true;
if (item.suspendedPage() && item.suspendedPage()->page().pageID() == item.pageID() && &item.suspendedPage()->process() == this)
return true;
return false;
}
void WebProcessProxy::updateBackForwardItem(const BackForwardListItemState& itemState)
{
auto* item = WebBackForwardListItem::itemForID(itemState.identifier);
if (!item || !isAllowedToUpdateBackForwardItem(*item))
return;
item->setPageState(PageState { itemState.pageState });
}
#if ENABLE(NETSCAPE_PLUGIN_API)
void WebProcessProxy::getPlugins(bool refresh, CompletionHandler<void(Vector<PluginInfo>&& plugins, Vector<PluginInfo>&& applicationPlugins, Optional<Vector<WebCore::SupportedPluginIdentifier>>&& supportedPluginIdentifiers)>&& completionHandler)
{
if (refresh)
m_processPool->pluginInfoStore().refresh();
auto supportedPluginIdentifiers = m_processPool->pluginInfoStore().supportedPluginIdentifiers();
Vector<PluginInfo> plugins;
Vector<PluginModuleInfo> pluginModules = m_processPool->pluginInfoStore().plugins();
for (size_t i = 0; i < pluginModules.size(); ++i)
plugins.append(pluginModules[i].info);
Vector<PluginInfo> applicationPlugins;
#if ENABLE(PDFKIT_PLUGIN)
// Add built-in PDF last, so that it's not used when a real plug-in is installed.
if (!m_processPool->omitPDFSupport()) {
plugins.append(PDFPlugin::pluginInfo());
applicationPlugins.append(PDFPlugin::pluginInfo());
}
#endif
completionHandler(WTFMove(plugins), WTFMove(applicationPlugins), WTFMove(supportedPluginIdentifiers));
}
#endif // ENABLE(NETSCAPE_PLUGIN_API)
#if ENABLE(NETSCAPE_PLUGIN_API)
void WebProcessProxy::getPluginProcessConnection(uint64_t pluginProcessToken, Messages::WebProcessProxy::GetPluginProcessConnection::DelayedReply&& reply)
{
PluginProcessManager::singleton().getPluginProcessConnection(pluginProcessToken, WTFMove(reply));
}
#endif
void WebProcessProxy::getNetworkProcessConnection(Messages::WebProcessProxy::GetNetworkProcessConnection::DelayedReply&& reply)
{
m_processPool->getNetworkProcessConnection(*this, WTFMove(reply));
}
#if !PLATFORM(COCOA)
bool WebProcessProxy::platformIsBeingDebugged() const
{
return false;
}
#endif
#if !PLATFORM(MAC)
bool WebProcessProxy::shouldAllowNonValidInjectedCode() const
{
return false;
}
#endif
void WebProcessProxy::didReceiveMessage(IPC::Connection& connection, IPC::Decoder& decoder)
{
if (dispatchMessage(connection, decoder))
return;
if (m_processPool->dispatchMessage(connection, decoder))
return;
if (decoder.messageReceiverName() == Messages::WebProcessProxy::messageReceiverName()) {
didReceiveWebProcessProxyMessage(connection, decoder);
return;
}
// FIXME: Add unhandled message logging.
}
void WebProcessProxy::didReceiveSyncMessage(IPC::Connection& connection, IPC::Decoder& decoder, std::unique_ptr<IPC::Encoder>& replyEncoder)
{
if (dispatchSyncMessage(connection, decoder, replyEncoder))
return;
if (m_processPool->dispatchSyncMessage(connection, decoder, replyEncoder))
return;
if (decoder.messageReceiverName() == Messages::WebProcessProxy::messageReceiverName()) {
didReceiveSyncWebProcessProxyMessage(connection, decoder, replyEncoder);
return;
}
// FIXME: Add unhandled message logging.
}
void WebProcessProxy::didClose(IPC::Connection&)
{
RELEASE_LOG_IF(isReleaseLoggingAllowed(), Process, "%p - WebProcessProxy didClose (web process crash)", this);
processDidTerminateOrFailedToLaunch();
}
void WebProcessProxy::processDidTerminateOrFailedToLaunch()
{
// Protect ourselves, as the call to disconnect() below may otherwise cause us
// to be deleted before we can finish our work.
Ref<WebProcessProxy> protect(*this);
#if PLATFORM(COCOA) && ENABLE(MEDIA_STREAM)
m_userMediaCaptureManagerProxy->clear();
#endif
if (auto* webConnection = this->webConnection())
webConnection->didClose();
auto pages = copyToVectorOf<RefPtr<WebPageProxy>>(m_pageMap.values());
auto provisionalPages = WTF::map(m_provisionalPages, [](auto* provisionalPage) { return makeWeakPtr(provisionalPage); });
auto isResponsiveCallbacks = WTFMove(m_isResponsiveCallbacks);
for (auto& callback : isResponsiveCallbacks)
callback(false);
if (m_isInProcessCache) {
processPool().webProcessCache().removeProcess(*this, WebProcessCache::ShouldShutDownProcess::No);
ASSERT(!m_isInProcessCache);
}
shutDown();
#if ENABLE(PUBLIC_SUFFIX_LIST)
if (pages.size() == 1) {
auto& page = *pages[0];
String domain = topPrivatelyControlledDomain(URL({ }, page.currentURL()).host().toString());
if (!domain.isEmpty())
page.logDiagnosticMessageWithEnhancedPrivacy(WebCore::DiagnosticLoggingKeys::domainCausingCrashKey(), domain, WebCore::ShouldSample::No);
}
#endif
for (auto& page : pages)
page->processDidTerminate(ProcessTerminationReason::Crash);
for (auto& provisionalPage : provisionalPages) {
if (provisionalPage)
provisionalPage->processDidTerminate();
}
}
void WebProcessProxy::didReceiveInvalidMessage(IPC::Connection& connection, IPC::StringReference messageReceiverName, IPC::StringReference messageName)
{
WTFLogAlways("Received an invalid message \"%s.%s\" from the web process.\n", messageReceiverName.toString().data(), messageName.toString().data());
WebProcessPool::didReceiveInvalidMessage(messageReceiverName, messageName);
// Terminate the WebProcess.
terminate();
// Since we've invalidated the connection we'll never get a IPC::Connection::Client::didClose
// callback so we'll explicitly call it here instead.
didClose(connection);
}
void WebProcessProxy::didBecomeUnresponsive()
{
auto protectedThis = makeRef(*this);
m_isResponsive = NoOrMaybe::No;
auto isResponsiveCallbacks = WTFMove(m_isResponsiveCallbacks);
for (auto& page : copyToVectorOf<RefPtr<WebPageProxy>>(m_pageMap.values()))
page->processDidBecomeUnresponsive();
bool isWebProcessResponsive = false;
for (auto& callback : isResponsiveCallbacks)
callback(isWebProcessResponsive);
// If the service worker process becomes unresponsive, kill it ourselves since there are no native clients to do it.
if (isServiceWorkerProcess()) {
RELEASE_LOG_ERROR(PerformanceLogging, "%p - WebProcessProxy::didBecomeUnresponsive() Terminating Service Worker process with pid %d because it is unresponsive", this, processIdentifier());
terminate();
}
}
void WebProcessProxy::didBecomeResponsive()
{
m_isResponsive = NoOrMaybe::Maybe;
for (auto& page : copyToVectorOf<RefPtr<WebPageProxy>>(m_pageMap.values()))
page->processDidBecomeResponsive();
}
void WebProcessProxy::willChangeIsResponsive()
{
for (auto& page : copyToVectorOf<RefPtr<WebPageProxy>>(m_pageMap.values()))
page->willChangeProcessIsResponsive();
}
void WebProcessProxy::didChangeIsResponsive()
{
for (auto& page : copyToVectorOf<RefPtr<WebPageProxy>>(m_pageMap.values()))
page->didChangeProcessIsResponsive();
}
bool WebProcessProxy::mayBecomeUnresponsive()
{
return !platformIsBeingDebugged();
}
void WebProcessProxy::didFinishLaunching(ProcessLauncher* launcher, IPC::Connection::Identifier connectionIdentifier)
{
RELEASE_ASSERT(isMainThreadOrCheckDisabled());
AuxiliaryProcessProxy::didFinishLaunching(launcher, connectionIdentifier);
if (!IPC::Connection::identifierIsValid(connectionIdentifier)) {
RELEASE_LOG_IF(isReleaseLoggingAllowed(), Process, "%p - WebProcessProxy didFinishLaunching - invalid connection identifier (web process failed to launch)", this);
processDidTerminateOrFailedToLaunch();
return;
}
RELEASE_ASSERT(!m_webConnection);
m_webConnection = WebConnectionToWebProcess::create(this);
m_processPool->processDidFinishLaunching(this);
m_backgroundResponsivenessTimer.updateState();
for (auto* visitedLinkStore : m_visitedLinkStoresWithUsers.keys())
visitedLinkStore->addProcess(*this);
#if PLATFORM(IOS_FAMILY)
if (connection()) {
if (xpc_connection_t xpcConnection = connection()->xpcConnection())
m_throttler.didConnectToProcess(xpc_connection_get_pid(xpcConnection));
}
unblockAccessibilityServerIfNeeded();
#endif
}
WebFrameProxy* WebProcessProxy::webFrame(uint64_t frameID) const
{
if (!WebFrameProxyMap::isValidKey(frameID))
return 0;
return m_frameMap.get(frameID);
}
bool WebProcessProxy::canCreateFrame(uint64_t frameID) const
{
return WebFrameProxyMap::isValidKey(frameID) && !m_frameMap.contains(frameID);
}
void WebProcessProxy::frameCreated(uint64_t frameID, WebFrameProxy& frameProxy)
{
m_frameMap.set(frameID, &frameProxy);
}
void WebProcessProxy::didDestroyFrame(uint64_t frameID)
{
// If the page is closed before it has had the chance to send the DidCreateMainFrame message
// back to the UIProcess, then the frameDestroyed message will still be received because it
// gets sent directly to the WebProcessProxy.
ASSERT(WebFrameProxyMap::isValidKey(frameID));
m_frameMap.remove(frameID);
}
void WebProcessProxy::disconnectFramesFromPage(WebPageProxy* page)
{
for (auto& frame : copyToVector(m_frameMap.values())) {
if (frame->page() == page)
frame->webProcessWillShutDown();
}
}
size_t WebProcessProxy::frameCountInPage(WebPageProxy* page) const
{
size_t result = 0;
for (auto& frame : m_frameMap.values()) {
if (frame->page() == page)
++result;
}
return result;
}
auto WebProcessProxy::visiblePageToken() const -> VisibleWebPageToken
{
return m_visiblePageCounter.count();
}
RefPtr<API::UserInitiatedAction> WebProcessProxy::userInitiatedActivity(uint64_t identifier)
{
if (!UserInitiatedActionMap::isValidKey(identifier) || !identifier)
return nullptr;
auto result = m_userInitiatedActionMap.ensure(identifier, [] { return API::UserInitiatedAction::create(); });
return result.iterator->value;
}
bool WebProcessProxy::isResponsive() const
{
return m_responsivenessTimer.isResponsive() && m_backgroundResponsivenessTimer.isResponsive();
}
void WebProcessProxy::didDestroyUserGestureToken(uint64_t identifier)
{
ASSERT(UserInitiatedActionMap::isValidKey(identifier));
m_userInitiatedActionMap.remove(identifier);
}
bool WebProcessProxy::canBeAddedToWebProcessCache() const
{
if (isServiceWorkerProcess())
return false;
if (WebKit::isInspectorProcessPool(processPool()))
return false;
return true;
}
void WebProcessProxy::maybeShutDown(AllowProcessCaching allowProcessCaching)
{
if (processPool().dummyProcessProxy() == this && m_pageMap.isEmpty()) {
ASSERT(state() == State::Terminated);
m_processPool->disconnectProcess(this);
return;
}
if (state() == State::Terminated || !canTerminateAuxiliaryProcess())
return;
if (allowProcessCaching == AllowProcessCaching::Yes && canBeAddedToWebProcessCache() && processPool().webProcessCache().addProcessIfPossible(*this))
return;
shutDown();
}
bool WebProcessProxy::canTerminateAuxiliaryProcess()
{
if (!m_pageMap.isEmpty() || m_suspendedPageCount || !m_provisionalPages.isEmpty() || m_isInProcessCache)
return false;
if (!m_processPool->shouldTerminate(this))
return false;
return true;
}
void WebProcessProxy::shouldTerminate(CompletionHandler<void(bool)>&& completionHandler)
{
bool shouldTerminate = canTerminateAuxiliaryProcess();
if (shouldTerminate) {
// We know that the web process is going to terminate so start shutting it down in the UI process.
shutDown();
}
completionHandler(shouldTerminate);
}
void WebProcessProxy::updateTextCheckerState()
{
if (canSendMessage())
send(Messages::WebProcess::SetTextCheckerState(TextChecker::state()), 0);
}
void WebProcessProxy::didSaveToPageCache()
{
m_processPool->processDidCachePage(this);
}
void WebProcessProxy::releasePageCache()
{
if (canSendMessage())
send(Messages::WebProcess::ReleasePageCache(), 0);
}
void WebProcessProxy::windowServerConnectionStateChanged()
{
for (const auto& page : m_pageMap.values())
page->activityStateDidChange(ActivityState::IsVisuallyIdle);
}
void WebProcessProxy::fetchWebsiteData(PAL::SessionID sessionID, OptionSet<WebsiteDataType> dataTypes, CompletionHandler<void(WebsiteData)>&& completionHandler)
{
ASSERT(canSendMessage());
auto token = throttler().backgroundActivityToken();
RELEASE_LOG_IF(sessionID.isAlwaysOnLoggingAllowed(), ProcessSuspension, "%p - WebProcessProxy is taking a background assertion because the Web process is fetching Website data", this);
connection()->sendWithAsyncReply(Messages::WebProcess::FetchWebsiteData(sessionID, dataTypes), [this, protectedThis = makeRef(*this), token, completionHandler = WTFMove(completionHandler), sessionID] (auto reply) mutable {
#if RELEASE_LOG_DISABLED
UNUSED_PARAM(sessionID);
UNUSED_PARAM(this);
#endif
completionHandler(WTFMove(reply));
RELEASE_LOG_IF(sessionID.isAlwaysOnLoggingAllowed(), ProcessSuspension, "%p - WebProcessProxy is releasing a background assertion because the Web process is done fetching Website data", this);
});
}
void WebProcessProxy::deleteWebsiteData(PAL::SessionID sessionID, OptionSet<WebsiteDataType> dataTypes, WallTime modifiedSince, CompletionHandler<void()>&& completionHandler)
{
ASSERT(canSendMessage());
auto token = throttler().backgroundActivityToken();
RELEASE_LOG_IF(sessionID.isAlwaysOnLoggingAllowed(), ProcessSuspension, "%p - WebProcessProxy is taking a background assertion because the Web process is deleting Website data", this);
connection()->sendWithAsyncReply(Messages::WebProcess::DeleteWebsiteData(sessionID, dataTypes, modifiedSince), [this, protectedThis = makeRef(*this), token, completionHandler = WTFMove(completionHandler), sessionID] () mutable {
#if RELEASE_LOG_DISABLED
UNUSED_PARAM(this);
UNUSED_PARAM(sessionID);
#endif
completionHandler();
RELEASE_LOG_IF(sessionID.isAlwaysOnLoggingAllowed(), ProcessSuspension, "%p - WebProcessProxy is releasing a background assertion because the Web process is done deleting Website data", this);
});
}
void WebProcessProxy::deleteWebsiteDataForOrigins(PAL::SessionID sessionID, OptionSet<WebsiteDataType> dataTypes, const Vector<WebCore::SecurityOriginData>& origins, CompletionHandler<void()>&& completionHandler)
{
ASSERT(canSendMessage());
auto token = throttler().backgroundActivityToken();
RELEASE_LOG_IF(sessionID.isAlwaysOnLoggingAllowed(), ProcessSuspension, "%p - WebProcessProxy is taking a background assertion because the Web process is deleting Website data for several origins", this);
connection()->sendWithAsyncReply(Messages::WebProcess::DeleteWebsiteDataForOrigins(sessionID, dataTypes, origins), [this, protectedThis = makeRef(*this), token, completionHandler = WTFMove(completionHandler), sessionID] () mutable {
#if RELEASE_LOG_DISABLED
UNUSED_PARAM(this);
UNUSED_PARAM(sessionID);
#endif
completionHandler();
RELEASE_LOG_IF(sessionID.isAlwaysOnLoggingAllowed(), ProcessSuspension, "%p - WebProcessProxy is releasing a background assertion because the Web process is done deleting Website data for several origins", this);
});
}
void WebProcessProxy::requestTermination(ProcessTerminationReason reason)
{
if (state() == State::Terminated)
return;
auto protectedThis = makeRef(*this);
RELEASE_LOG_IF(isReleaseLoggingAllowed(), Process, "%p - WebProcessProxy::requestTermination - reason %d", this, reason);
AuxiliaryProcessProxy::terminate();
if (webConnection())
webConnection()->didClose();
auto pages = copyToVectorOf<RefPtr<WebPageProxy>>(m_pageMap.values());
shutDown();
for (auto& page : pages)
page->processDidTerminate(reason);
}
bool WebProcessProxy::isReleaseLoggingAllowed() const
{
return !m_websiteDataStore || m_websiteDataStore->sessionID().isAlwaysOnLoggingAllowed();
}
void WebProcessProxy::stopResponsivenessTimer()
{
responsivenessTimer().stop();
}
void WebProcessProxy::enableSuddenTermination()
{
if (state() != State::Running)
return;
ASSERT(m_numberOfTimesSuddenTerminationWasDisabled);
WebCore::enableSuddenTermination();
--m_numberOfTimesSuddenTerminationWasDisabled;
}
void WebProcessProxy::disableSuddenTermination()
{
if (state() != State::Running)
return;
WebCore::disableSuddenTermination();
++m_numberOfTimesSuddenTerminationWasDisabled;
}
RefPtr<API::Object> WebProcessProxy::transformHandlesToObjects(API::Object* object)
{
struct Transformer final : UserData::Transformer {
Transformer(WebProcessProxy& webProcessProxy)
: m_webProcessProxy(webProcessProxy)
{
}
bool shouldTransformObject(const API::Object& object) const override
{
switch (object.type()) {
case API::Object::Type::FrameHandle:
return static_cast<const API::FrameHandle&>(object).isAutoconverting();
case API::Object::Type::PageHandle:
return static_cast<const API::PageHandle&>(object).isAutoconverting();
case API::Object::Type::PageGroupHandle:
#if PLATFORM(COCOA)
case API::Object::Type::ObjCObjectGraph:
#endif
return true;
default:
return false;
}
}
RefPtr<API::Object> transformObject(API::Object& object) const override
{
switch (object.type()) {
case API::Object::Type::FrameHandle:
ASSERT(static_cast<API::FrameHandle&>(object).isAutoconverting());
return m_webProcessProxy.webFrame(static_cast<API::FrameHandle&>(object).frameID());
case API::Object::Type::PageGroupHandle:
return WebPageGroup::get(static_cast<API::PageGroupHandle&>(object).webPageGroupData().pageGroupID);
case API::Object::Type::PageHandle:
ASSERT(static_cast<API::PageHandle&>(object).isAutoconverting());
return m_webProcessProxy.webPage(static_cast<API::PageHandle&>(object).pageID());
#if PLATFORM(COCOA)
case API::Object::Type::ObjCObjectGraph:
return m_webProcessProxy.transformHandlesToObjects(static_cast<ObjCObjectGraph&>(object));
#endif
default:
return &object;
}
}
WebProcessProxy& m_webProcessProxy;
};
return UserData::transform(object, Transformer(*this));
}
RefPtr<API::Object> WebProcessProxy::transformObjectsToHandles(API::Object* object)
{
struct Transformer final : UserData::Transformer {
bool shouldTransformObject(const API::Object& object) const override
{
switch (object.type()) {
case API::Object::Type::Frame:
case API::Object::Type::Page:
case API::Object::Type::PageGroup:
#if PLATFORM(COCOA)
case API::Object::Type::ObjCObjectGraph:
#endif
return true;
default:
return false;
}
}
RefPtr<API::Object> transformObject(API::Object& object) const override
{
switch (object.type()) {
case API::Object::Type::Frame:
return API::FrameHandle::createAutoconverting(static_cast<const WebFrameProxy&>(object).frameID());
case API::Object::Type::Page:
return API::PageHandle::createAutoconverting(static_cast<const WebPageProxy&>(object).pageID());
case API::Object::Type::PageGroup:
return API::PageGroupHandle::create(WebPageGroupData(static_cast<const WebPageGroup&>(object).data()));
#if PLATFORM(COCOA)
case API::Object::Type::ObjCObjectGraph:
return transformObjectsToHandles(static_cast<ObjCObjectGraph&>(object));
#endif
default:
return &object;
}
}
};
return UserData::transform(object, Transformer());
}
void WebProcessProxy::sendProcessWillSuspendImminently()
{
if (canSendMessage())
send(Messages::WebProcess::ProcessWillSuspendImminently(), 0);
}
void WebProcessProxy::sendPrepareToSuspend()
{
if (canSendMessage())
send(Messages::WebProcess::PrepareToSuspend(), 0);
}
void WebProcessProxy::sendCancelPrepareToSuspend()
{
if (canSendMessage())
send(Messages::WebProcess::CancelPrepareToSuspend(), 0);
}
void WebProcessProxy::sendProcessDidResume()
{
if (canSendMessage())
send(Messages::WebProcess::ProcessDidResume(), 0);
}
void WebProcessProxy::processReadyToSuspend()
{
m_throttler.processReadyToSuspend();
}
void WebProcessProxy::didCancelProcessSuspension()
{
m_throttler.didCancelProcessSuspension();
}
void WebProcessProxy::didSetAssertionState(AssertionState state)
{
#if PLATFORM(IOS_FAMILY)
if (isServiceWorkerProcess())
return;
ASSERT(!m_backgroundToken || !m_foregroundToken);
switch (state) {
case AssertionState::Suspended:
RELEASE_LOG(ProcessSuspension, "%p - WebProcessProxy::didSetAssertionState(Suspended) release all assertions for network process", this);
m_foregroundToken = nullptr;
m_backgroundToken = nullptr;
for (auto& page : m_pageMap.values())
page->processWillBecomeSuspended();
break;
case AssertionState::Background:
RELEASE_LOG(ProcessSuspension, "%p - WebProcessProxy::didSetAssertionState(Background) taking background assertion for network process", this);
m_backgroundToken = processPool().backgroundWebProcessToken();
m_foregroundToken = nullptr;
break;
case AssertionState::Foreground:
RELEASE_LOG(ProcessSuspension, "%p - WebProcessProxy::didSetAssertionState(Foreground) taking foreground assertion for network process", this);
m_foregroundToken = processPool().foregroundWebProcessToken();
m_backgroundToken = nullptr;
for (auto& page : m_pageMap.values())
page->processWillBecomeForeground();
break;
case AssertionState::UnboundedNetworking:
ASSERT_NOT_REACHED();
}
ASSERT(!m_backgroundToken || !m_foregroundToken);
#else
UNUSED_PARAM(state);
#endif
}
void WebProcessProxy::webPageMediaStateDidChange(WebPageProxy&)
{
bool newHasAudibleWebPage = WTF::anyOf(m_pageMap.values(), [] (auto& page) { return page->isPlayingAudio(); });
if (m_hasAudibleWebPage == newHasAudibleWebPage)
return;
m_hasAudibleWebPage = newHasAudibleWebPage;
if (m_hasAudibleWebPage)
processPool().setWebProcessIsPlayingAudibleMedia(coreProcessIdentifier());
else
processPool().clearWebProcessIsPlayingAudibleMedia(coreProcessIdentifier());
}
void WebProcessProxy::setIsHoldingLockedFiles(bool isHoldingLockedFiles)
{
if (!isHoldingLockedFiles) {
RELEASE_LOG(ProcessSuspension, "UIProcess is releasing a background assertion because the WebContent process is no longer holding locked files");
m_tokenForHoldingLockedFiles = nullptr;
return;
}
if (!m_tokenForHoldingLockedFiles) {
RELEASE_LOG(ProcessSuspension, "UIProcess is taking a background assertion because the WebContent process is holding locked files");
m_tokenForHoldingLockedFiles = m_throttler.backgroundActivityToken();
}
}
void WebProcessProxy::isResponsive(CompletionHandler<void(bool isWebProcessResponsive)>&& callback)
{
if (m_isResponsive == NoOrMaybe::No) {
if (callback) {
RunLoop::main().dispatch([callback = WTFMove(callback)]() mutable {
bool isWebProcessResponsive = false;
callback(isWebProcessResponsive);
});
}
return;
}
if (callback)
m_isResponsiveCallbacks.append(WTFMove(callback));
responsivenessTimer().start();
send(Messages::WebProcess::MainThreadPing(), 0);
}
void WebProcessProxy::isResponsiveWithLazyStop()
{
if (m_isResponsive == NoOrMaybe::No)
return;
if (!responsivenessTimer().hasActiveTimer()) {
// We do not send a ping if we are already waiting for the WebProcess.
// Spamming pings on a slow web process is not helpful.
responsivenessTimer().startWithLazyStop();
send(Messages::WebProcess::MainThreadPing(), 0);
}
}
bool WebProcessProxy::isJITEnabled() const
{
return processPool().configuration().isJITEnabled();
}
void WebProcessProxy::didReceiveMainThreadPing()
{
responsivenessTimer().stop();
auto isResponsiveCallbacks = WTFMove(m_isResponsiveCallbacks);
bool isWebProcessResponsive = true;
for (auto& callback : isResponsiveCallbacks)
callback(isWebProcessResponsive);
}
void WebProcessProxy::didReceiveBackgroundResponsivenessPing()
{
m_backgroundResponsivenessTimer.didReceiveBackgroundResponsivenessPong();
}
void WebProcessProxy::processTerminated()
{
m_responsivenessTimer.processTerminated();
m_backgroundResponsivenessTimer.processTerminated();
}
void WebProcessProxy::logDiagnosticMessageForResourceLimitTermination(const String& limitKey)
{
if (pageCount())
(*pages().begin())->logDiagnosticMessage(DiagnosticLoggingKeys::simulatedPageCrashKey(), limitKey, ShouldSample::No);
}
void WebProcessProxy::didExceedInactiveMemoryLimitWhileActive()
{
for (auto& page : pages())
page->didExceedInactiveMemoryLimitWhileActive();
}
void WebProcessProxy::didExceedActiveMemoryLimit()
{
RELEASE_LOG_ERROR(PerformanceLogging, "%p - WebProcessProxy::didExceedActiveMemoryLimit() Terminating WebProcess with pid %d that has exceeded the active memory limit", this, processIdentifier());
logDiagnosticMessageForResourceLimitTermination(DiagnosticLoggingKeys::exceededActiveMemoryLimitKey());
requestTermination(ProcessTerminationReason::ExceededMemoryLimit);
}
void WebProcessProxy::didExceedInactiveMemoryLimit()
{
RELEASE_LOG_ERROR(PerformanceLogging, "%p - WebProcessProxy::didExceedInactiveMemoryLimit() Terminating WebProcess with pid %d that has exceeded the inactive memory limit", this, processIdentifier());
logDiagnosticMessageForResourceLimitTermination(DiagnosticLoggingKeys::exceededInactiveMemoryLimitKey());
requestTermination(ProcessTerminationReason::ExceededMemoryLimit);
}
void WebProcessProxy::didExceedCPULimit()
{
auto protectedThis = makeRef(*this);
for (auto& page : pages()) {
if (page->isPlayingAudio()) {
RELEASE_LOG(PerformanceLogging, "%p - WebProcessProxy::didExceedCPULimit() WebProcess with pid %d has exceeded the background CPU limit but we are not terminating it because there is audio playing", this, processIdentifier());
return;
}
if (page->hasActiveAudioStream() || page->hasActiveVideoStream()) {
RELEASE_LOG(PerformanceLogging, "%p - WebProcessProxy::didExceedCPULimit() WebProcess with pid %d has exceeded the background CPU limit but we are not terminating it because it is capturing audio / video", this, processIdentifier());
return;
}
}
bool hasVisiblePage = false;
for (auto& page : pages()) {
if (page->isViewVisible()) {
page->didExceedBackgroundCPULimitWhileInForeground();
hasVisiblePage = true;
}
}
// We only notify the client that the process exceeded the CPU limit when it is visible, we do not terminate it.
if (hasVisiblePage)
return;
if (isServiceWorkerProcess())
RELEASE_LOG_ERROR(PerformanceLogging, "%p - WebProcessProxy::didExceedCPULimit() Terminating Service Worker process with pid %d that has exceeded the background CPU limit", this, processIdentifier());
else
RELEASE_LOG_ERROR(PerformanceLogging, "%p - WebProcessProxy::didExceedCPULimit() Terminating background WebProcess with pid %d that has exceeded the background CPU limit", this, processIdentifier());
logDiagnosticMessageForResourceLimitTermination(DiagnosticLoggingKeys::exceededBackgroundCPULimitKey());
requestTermination(ProcessTerminationReason::ExceededCPULimit);
}
void WebProcessProxy::updateBackgroundResponsivenessTimer()
{
m_backgroundResponsivenessTimer.updateState();
}
#if !PLATFORM(COCOA)
const HashSet<String>& WebProcessProxy::platformPathsWithAssumedReadAccess()
{
static NeverDestroyed<HashSet<String>> platformPathsWithAssumedReadAccess;
return platformPathsWithAssumedReadAccess;
}
#endif
void WebProcessProxy::createNewMessagePortChannel(const MessagePortIdentifier& port1, const MessagePortIdentifier& port2)
{
m_processEntangledPorts.add(port1);
m_processEntangledPorts.add(port2);
UIMessagePortChannelProvider::singleton().registry().didCreateMessagePortChannel(port1, port2);
}
void WebProcessProxy::entangleLocalPortInThisProcessToRemote(const MessagePortIdentifier& local, const MessagePortIdentifier& remote)
{
m_processEntangledPorts.add(local);
UIMessagePortChannelProvider::singleton().registry().didEntangleLocalToRemote(local, remote, coreProcessIdentifier());
auto* channel = UIMessagePortChannelProvider::singleton().registry().existingChannelContainingPort(local);
if (channel && channel->hasAnyMessagesPendingOrInFlight())
send(Messages::WebProcess::MessagesAvailableForPort(local), 0);
}
void WebProcessProxy::messagePortDisentangled(const MessagePortIdentifier& port)
{
auto result = m_processEntangledPorts.remove(port);
ASSERT_UNUSED(result, result);
UIMessagePortChannelProvider::singleton().registry().didDisentangleMessagePort(port);
}
void WebProcessProxy::messagePortClosed(const MessagePortIdentifier& port)
{
UIMessagePortChannelProvider::singleton().registry().didCloseMessagePort(port);
}
void WebProcessProxy::takeAllMessagesForPort(const MessagePortIdentifier& port, uint64_t messagesCallbackIdentifier)
{
UIMessagePortChannelProvider::singleton().registry().takeAllMessagesForPort(port, [this, protectedThis = makeRef(*this), messagesCallbackIdentifier](Vector<MessageWithMessagePorts>&& messages, Function<void()>&& deliveryCallback) {
static uint64_t currentMessageBatchIdentifier;
auto result = m_messageBatchDeliveryCompletionHandlers.ensure(++currentMessageBatchIdentifier, [deliveryCallback = WTFMove(deliveryCallback)]() mutable {
return WTFMove(deliveryCallback);
});
ASSERT_UNUSED(result, result.isNewEntry);
send(Messages::WebProcess::DidTakeAllMessagesForPort(WTFMove(messages), messagesCallbackIdentifier, currentMessageBatchIdentifier), 0);
});
}
void WebProcessProxy::didDeliverMessagePortMessages(uint64_t messageBatchIdentifier)
{
auto callback = m_messageBatchDeliveryCompletionHandlers.take(messageBatchIdentifier);
ASSERT(callback);
callback();
}
void WebProcessProxy::postMessageToRemote(MessageWithMessagePorts&& message, const MessagePortIdentifier& port)
{
if (UIMessagePortChannelProvider::singleton().registry().didPostMessageToRemote(WTFMove(message), port)) {
// Look up the process for that port
auto* channel = UIMessagePortChannelProvider::singleton().registry().existingChannelContainingPort(port);
ASSERT(channel);
auto processIdentifier = channel->processForPort(port);
if (processIdentifier) {
if (auto* process = WebProcessProxy::processForIdentifier(*processIdentifier))
process->send(Messages::WebProcess::MessagesAvailableForPort(port), 0);
}
}
}
void WebProcessProxy::checkRemotePortForActivity(const WebCore::MessagePortIdentifier port, uint64_t callbackIdentifier)
{
UIMessagePortChannelProvider::singleton().registry().checkRemotePortForActivity(port, [this, protectedThis = makeRef(*this), callbackIdentifier](MessagePortChannelProvider::HasActivity hasActivity) {
send(Messages::WebProcess::DidCheckRemotePortForActivity(callbackIdentifier, hasActivity == MessagePortChannelProvider::HasActivity::Yes), 0);
});
}
void WebProcessProxy::checkProcessLocalPortForActivity(const MessagePortIdentifier& port, CompletionHandler<void(MessagePortChannelProvider::HasActivity)>&& callback)
{
static uint64_t currentCallbackIdentifier;
auto result = m_localPortActivityCompletionHandlers.ensure(++currentCallbackIdentifier, [callback = WTFMove(callback)]() mutable {
return WTFMove(callback);
});
ASSERT_UNUSED(result, result.isNewEntry);
send(Messages::WebProcess::CheckProcessLocalPortForActivity(port, currentCallbackIdentifier), 0);
}
void WebProcessProxy::didCheckProcessLocalPortForActivity(uint64_t callbackIdentifier, bool isLocallyReachable)
{
auto callback = m_localPortActivityCompletionHandlers.take(callbackIdentifier);
if (!callback)
return;
callback(isLocallyReachable ? MessagePortChannelProvider::HasActivity::Yes : MessagePortChannelProvider::HasActivity::No);
}
void WebProcessProxy::didCollectPrewarmInformation(const WebCore::RegistrableDomain& domain, const WebCore::PrewarmInformation& prewarmInformation)
{
processPool().didCollectPrewarmInformation(domain, prewarmInformation);
}
void WebProcessProxy::activePagesDomainsForTesting(CompletionHandler<void(Vector<String>&&)>&& completionHandler)
{
connection()->sendWithAsyncReply(Messages::WebProcess::GetActivePagesOriginsForTesting(), WTFMove(completionHandler));
}
void WebProcessProxy::didStartProvisionalLoadForMainFrame(const URL& url)
{
RELEASE_ASSERT(!isInProcessCache());
// This process has been used for several registrable domains already.
if (m_registrableDomain && m_registrableDomain->isEmpty())
return;
auto registrableDomain = WebCore::RegistrableDomain { url };
if (m_registrableDomain && *m_registrableDomain != registrableDomain) {
// Null out registrable domain since this process has now been used for several domains.
m_registrableDomain = WebCore::RegistrableDomain { };
return;
}
// Associate the process with this registrable domain.
m_registrableDomain = WTFMove(registrableDomain);
}
void WebProcessProxy::incrementSuspendedPageCount()
{
++m_suspendedPageCount;
if (m_suspendedPageCount == 1)
send(Messages::WebProcess::SetHasSuspendedPageProxy(true), 0);
}
void WebProcessProxy::decrementSuspendedPageCount()
{
ASSERT(m_suspendedPageCount);
--m_suspendedPageCount;
if (!m_suspendedPageCount)
send(Messages::WebProcess::SetHasSuspendedPageProxy(false), 0);
}
WebProcessPool* WebProcessProxy::processPoolIfExists() const
{
if (m_isPrewarmed || m_isInProcessCache)
RELEASE_LOG_ERROR(Process, "%p - WebProcessProxy::processPoolIfExists: trying to get WebProcessPool from an inactive WebProcessProxy %i", this, processIdentifier());
else
ASSERT(m_processPool);
return m_processPool.get();
}
WebProcessPool& WebProcessProxy::processPool() const
{
ASSERT(m_processPool);
return *m_processPool.get();
}
#if PLATFORM(WATCHOS)
void WebProcessProxy::takeBackgroundActivityTokenForFullscreenInput()
{
if (m_backgroundActivityTokenForFullscreenFormControls)
return;
m_backgroundActivityTokenForFullscreenFormControls = m_throttler.backgroundActivityToken();
RELEASE_LOG(ProcessSuspension, "UIProcess is taking a background assertion because it is presenting fullscreen UI for form controls.");
}
void WebProcessProxy::releaseBackgroundActivityTokenForFullscreenInput()
{
if (!m_backgroundActivityTokenForFullscreenFormControls)
return;
m_backgroundActivityTokenForFullscreenFormControls = nullptr;
RELEASE_LOG(ProcessSuspension, "UIProcess is releasing a background assertion because it has dismissed fullscreen UI for form controls.");
}
#endif
} // namespace WebKit
#undef MESSAGE_CHECK
#undef MESSAGE_CHECK_URL