1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "content/browser/plugin_service_impl.h"
8 #include "base/command_line.h"
9 #include "base/compiler_specific.h"
10 #include "base/files/file_path.h"
11 #include "base/message_loop/message_loop.h"
12 #include "base/message_loop/message_loop_proxy.h"
13 #include "base/metrics/histogram.h"
14 #include "base/path_service.h"
15 #include "base/strings/string_util.h"
16 #include "base/strings/utf_string_conversions.h"
17 #include "base/synchronization/waitable_event.h"
18 #include "base/threading/thread.h"
19 #include "content/browser/ppapi_plugin_process_host.h"
20 #include "content/browser/renderer_host/render_process_host_impl.h"
21 #include "content/browser/renderer_host/render_view_host_impl.h"
22 #include "content/common/pepper_plugin_list.h"
23 #include "content/common/plugin_list.h"
24 #include "content/common/view_messages.h"
25 #include "content/public/browser/browser_thread.h"
26 #include "content/public/browser/content_browser_client.h"
27 #include "content/public/browser/plugin_service_filter.h"
28 #include "content/public/browser/resource_context.h"
29 #include "content/public/common/content_constants.h"
30 #include "content/public/common/content_switches.h"
31 #include "content/public/common/process_type.h"
32 #include "content/public/common/webplugininfo.h"
35 #include "content/common/plugin_constants_win.h"
36 #include "ui/gfx/win/hwnd_util.h"
40 #include "content/browser/plugin_loader_posix.h"
43 #if defined(OS_POSIX) && !defined(OS_OPENBSD) && !defined(OS_ANDROID)
44 using ::base::FilePathWatcher
;
50 // This enum is used to collect Flash usage data.
52 // Number of browser processes that have started at least one NPAPI Flash
53 // process during their lifetime.
54 START_NPAPI_FLASH_AT_LEAST_ONCE
,
55 // Number of browser processes that have started at least one PPAPI Flash
56 // process during their lifetime.
57 START_PPAPI_FLASH_AT_LEAST_ONCE
,
58 // Total number of browser processes.
59 TOTAL_BROWSER_PROCESSES
,
60 FLASH_USAGE_ENUM_COUNT
63 bool LoadPluginListInProcess() {
67 // If on POSIX, we don't want to load the list of NPAPI plugins in-process as
68 // that causes instability.
70 // Can't load the plugins on the utility thread when in single process mode
71 // since that requires GTK which can only be used on the main thread.
72 if (RenderProcessHost::run_renderer_in_process())
75 return !PluginService::GetInstance()->NPAPIPluginsSupported();
79 // Callback set on the PluginList to assert that plugin loading happens on the
81 void WillLoadPluginsCallback(
82 base::SequencedWorkerPool::SequenceToken token
) {
83 if (LoadPluginListInProcess()) {
84 CHECK(BrowserThread::GetBlockingPool()->IsRunningSequenceOnCurrentThread(
87 CHECK(false) << "Plugin loading should happen out-of-process.";
91 #if defined(OS_MACOSX)
92 void NotifyPluginsOfActivation() {
93 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO
));
95 for (PluginProcessHostIterator iter
; !iter
.Done(); ++iter
)
96 iter
->OnAppActivation();
100 #if defined(OS_POSIX) && !defined(OS_OPENBSD) && !defined(OS_ANDROID)
101 void NotifyPluginDirChanged(const base::FilePath
& path
, bool error
) {
103 // TODO(pastarmovj): Add some sensible error handling. Maybe silently
104 // stopping the watcher would be enough. Or possibly restart it.
108 VLOG(1) << "Watched path changed: " << path
.value();
109 // Make the plugin list update itself
110 PluginList::Singleton()->RefreshPlugins();
111 BrowserThread::PostTask(
112 BrowserThread::UI
, FROM_HERE
,
113 base::Bind(&PluginService::PurgePluginListCache
,
114 static_cast<BrowserContext
*>(NULL
), false));
118 void ForwardCallback(base::MessageLoopProxy
* target_loop
,
119 const PluginService::GetPluginsCallback
& callback
,
120 const std::vector
<WebPluginInfo
>& plugins
) {
121 target_loop
->PostTask(FROM_HERE
, base::Bind(callback
, plugins
));
127 PluginService
* PluginService::GetInstance() {
128 return PluginServiceImpl::GetInstance();
131 void PluginService::PurgePluginListCache(BrowserContext
* browser_context
,
133 for (RenderProcessHost::iterator it
= RenderProcessHost::AllHostsIterator();
134 !it
.IsAtEnd(); it
.Advance()) {
135 RenderProcessHost
* host
= it
.GetCurrentValue();
136 if (!browser_context
|| host
->GetBrowserContext() == browser_context
)
137 host
->Send(new ViewMsg_PurgePluginListCache(reload_pages
));
142 PluginServiceImpl
* PluginServiceImpl::GetInstance() {
143 return Singleton
<PluginServiceImpl
>::get();
146 PluginServiceImpl::PluginServiceImpl()
148 // Collect the total number of browser processes (which create
149 // PluginServiceImpl objects, to be precise). The number is used to normalize
150 // the number of processes which start at least one NPAPI/PPAPI Flash process.
151 static bool counted
= false;
154 UMA_HISTOGRAM_ENUMERATION("Plugin.FlashUsage", TOTAL_BROWSER_PROCESSES
,
155 FLASH_USAGE_ENUM_COUNT
);
159 PluginServiceImpl::~PluginServiceImpl() {
161 // Release the events since they're owned by RegKey, not WaitableEvent.
162 hkcu_watcher_
.StopWatching();
163 hklm_watcher_
.StopWatching();
165 hkcu_event_
->Release();
167 hklm_event_
->Release();
169 // Make sure no plugin channel requests have been leaked.
170 DCHECK(pending_plugin_clients_
.empty());
173 void PluginServiceImpl::Init() {
174 plugin_list_token_
= BrowserThread::GetBlockingPool()->GetSequenceToken();
175 PluginList::Singleton()->set_will_load_plugins_callback(
176 base::Bind(&WillLoadPluginsCallback
, plugin_list_token_
));
178 RegisterPepperPlugins();
180 // Load any specified on the command line as well.
181 const CommandLine
* command_line
= CommandLine::ForCurrentProcess();
182 base::FilePath path
=
183 command_line
->GetSwitchValuePath(switches::kLoadPlugin
);
185 AddExtraPluginPath(path
);
186 path
= command_line
->GetSwitchValuePath(switches::kExtraPluginDir
);
188 PluginList::Singleton()->AddExtraPluginDir(path
);
190 if (command_line
->HasSwitch(switches::kDisablePluginsDiscovery
))
191 PluginList::Singleton()->DisablePluginsDiscovery();
194 void PluginServiceImpl::StartWatchingPlugins() {
195 // Start watching for changes in the plugin list. This means watching
196 // for changes in the Windows registry keys and on both Windows and POSIX
197 // watch for changes in the paths that are expected to contain plugins.
199 if (hkcu_key_
.Create(HKEY_CURRENT_USER
,
200 kRegistryMozillaPlugins
,
201 KEY_NOTIFY
) == ERROR_SUCCESS
) {
202 if (hkcu_key_
.StartWatching() == ERROR_SUCCESS
) {
203 hkcu_event_
.reset(new base::WaitableEvent(hkcu_key_
.watch_event()));
204 base::WaitableEventWatcher::EventCallback callback
=
205 base::Bind(&PluginServiceImpl::OnWaitableEventSignaled
,
206 base::Unretained(this));
207 hkcu_watcher_
.StartWatching(hkcu_event_
.get(), callback
);
210 if (hklm_key_
.Create(HKEY_LOCAL_MACHINE
,
211 kRegistryMozillaPlugins
,
212 KEY_NOTIFY
) == ERROR_SUCCESS
) {
213 if (hklm_key_
.StartWatching() == ERROR_SUCCESS
) {
214 hklm_event_
.reset(new base::WaitableEvent(hklm_key_
.watch_event()));
215 base::WaitableEventWatcher::EventCallback callback
=
216 base::Bind(&PluginServiceImpl::OnWaitableEventSignaled
,
217 base::Unretained(this));
218 hklm_watcher_
.StartWatching(hklm_event_
.get(), callback
);
222 #if defined(OS_POSIX) && !defined(OS_OPENBSD) && !defined(OS_ANDROID)
223 // On ChromeOS the user can't install plugins anyway and on Windows all
224 // important plugins register themselves in the registry so no need to do that.
226 // Get the list of all paths for registering the FilePathWatchers
227 // that will track and if needed reload the list of plugins on runtime.
228 std::vector
<base::FilePath
> plugin_dirs
;
229 PluginList::Singleton()->GetPluginDirectories(&plugin_dirs
);
231 for (size_t i
= 0; i
< plugin_dirs
.size(); ++i
) {
232 // FilePathWatcher can not handle non-absolute paths under windows.
233 // We don't watch for file changes in windows now but if this should ever
234 // be extended to Windows these lines might save some time of debugging.
236 if (!plugin_dirs
[i
].IsAbsolute())
239 FilePathWatcher
* watcher
= new FilePathWatcher();
240 VLOG(1) << "Watching for changes in: " << plugin_dirs
[i
].value();
241 BrowserThread::PostTask(
242 BrowserThread::FILE, FROM_HERE
,
243 base::Bind(&PluginServiceImpl::RegisterFilePathWatcher
, watcher
,
245 file_watchers_
.push_back(watcher
);
250 PluginProcessHost
* PluginServiceImpl::FindNpapiPluginProcess(
251 const base::FilePath
& plugin_path
) {
252 for (PluginProcessHostIterator iter
; !iter
.Done(); ++iter
) {
253 if (iter
->info().path
== plugin_path
)
260 PpapiPluginProcessHost
* PluginServiceImpl::FindPpapiPluginProcess(
261 const base::FilePath
& plugin_path
,
262 const base::FilePath
& profile_data_directory
) {
263 for (PpapiPluginProcessHostIterator iter
; !iter
.Done(); ++iter
) {
264 if (iter
->plugin_path() == plugin_path
&&
265 iter
->profile_data_directory() == profile_data_directory
) {
272 PpapiPluginProcessHost
* PluginServiceImpl::FindPpapiBrokerProcess(
273 const base::FilePath
& broker_path
) {
274 for (PpapiBrokerProcessHostIterator iter
; !iter
.Done(); ++iter
) {
275 if (iter
->plugin_path() == broker_path
)
282 PluginProcessHost
* PluginServiceImpl::FindOrStartNpapiPluginProcess(
283 int render_process_id
,
284 const base::FilePath
& plugin_path
) {
285 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO
));
287 if (filter_
&& !filter_
->CanLoadPlugin(render_process_id
, plugin_path
))
290 PluginProcessHost
* plugin_host
= FindNpapiPluginProcess(plugin_path
);
295 if (!GetPluginInfoByPath(plugin_path
, &info
)) {
299 // Record when NPAPI Flash process is started for the first time.
300 static bool counted
= false;
301 if (!counted
&& base::UTF16ToUTF8(info
.name
) == kFlashPluginName
) {
303 UMA_HISTOGRAM_ENUMERATION("Plugin.FlashUsage",
304 START_NPAPI_FLASH_AT_LEAST_ONCE
,
305 FLASH_USAGE_ENUM_COUNT
);
307 #if defined(OS_CHROMEOS)
308 // TODO(ihf): Move to an earlier place once crbug.com/314301 is fixed. For now
309 // we still want Plugin.FlashUsage recorded if we end up here.
310 LOG(WARNING
) << "Refusing to start npapi plugin on ChromeOS.";
313 // This plugin isn't loaded by any plugin process, so create a new process.
314 scoped_ptr
<PluginProcessHost
> new_host(new PluginProcessHost());
315 if (!new_host
->Init(info
)) {
316 NOTREACHED(); // Init is not expected to fail.
319 return new_host
.release();
322 PpapiPluginProcessHost
* PluginServiceImpl::FindOrStartPpapiPluginProcess(
323 int render_process_id
,
324 const base::FilePath
& plugin_path
,
325 const base::FilePath
& profile_data_directory
) {
326 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO
));
328 if (filter_
&& !filter_
->CanLoadPlugin(render_process_id
, plugin_path
)) {
329 VLOG(1) << "Unable to load ppapi plugin: " << plugin_path
.MaybeAsASCII();
333 PpapiPluginProcessHost
* plugin_host
=
334 FindPpapiPluginProcess(plugin_path
, profile_data_directory
);
338 // Validate that the plugin is actually registered.
339 PepperPluginInfo
* info
= GetRegisteredPpapiPluginInfo(plugin_path
);
341 VLOG(1) << "Unable to find ppapi plugin registration for: "
342 << plugin_path
.MaybeAsASCII();
346 // Record when PPAPI Flash process is started for the first time.
347 static bool counted
= false;
348 if (!counted
&& info
->name
== kFlashPluginName
) {
350 UMA_HISTOGRAM_ENUMERATION("Plugin.FlashUsage",
351 START_PPAPI_FLASH_AT_LEAST_ONCE
,
352 FLASH_USAGE_ENUM_COUNT
);
355 // This plugin isn't loaded by any plugin process, so create a new process.
356 plugin_host
= PpapiPluginProcessHost::CreatePluginHost(
357 *info
, profile_data_directory
);
359 VLOG(1) << "Unable to create ppapi plugin process for: "
360 << plugin_path
.MaybeAsASCII();
366 PpapiPluginProcessHost
* PluginServiceImpl::FindOrStartPpapiBrokerProcess(
367 int render_process_id
,
368 const base::FilePath
& plugin_path
) {
369 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO
));
371 if (filter_
&& !filter_
->CanLoadPlugin(render_process_id
, plugin_path
))
374 PpapiPluginProcessHost
* plugin_host
= FindPpapiBrokerProcess(plugin_path
);
378 // Validate that the plugin is actually registered.
379 PepperPluginInfo
* info
= GetRegisteredPpapiPluginInfo(plugin_path
);
383 // TODO(ddorwin): Uncomment once out of process is supported.
384 // DCHECK(info->is_out_of_process);
386 // This broker isn't loaded by any broker process, so create a new process.
387 return PpapiPluginProcessHost::CreateBrokerHost(*info
);
390 void PluginServiceImpl::OpenChannelToNpapiPlugin(
391 int render_process_id
,
394 const GURL
& page_url
,
395 const std::string
& mime_type
,
396 PluginProcessHost::Client
* client
) {
397 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO
));
398 DCHECK(!ContainsKey(pending_plugin_clients_
, client
));
399 pending_plugin_clients_
.insert(client
);
401 // Make sure plugins are loaded if necessary.
402 PluginServiceFilterParams params
= {
406 client
->GetResourceContext()
408 GetPlugins(base::Bind(
409 &PluginServiceImpl::ForwardGetAllowedPluginForOpenChannelToPlugin
,
410 base::Unretained(this), params
, url
, mime_type
, client
));
413 void PluginServiceImpl::OpenChannelToPpapiPlugin(
414 int render_process_id
,
415 const base::FilePath
& plugin_path
,
416 const base::FilePath
& profile_data_directory
,
417 PpapiPluginProcessHost::PluginClient
* client
) {
418 PpapiPluginProcessHost
* plugin_host
= FindOrStartPpapiPluginProcess(
419 render_process_id
, plugin_path
, profile_data_directory
);
421 plugin_host
->OpenChannelToPlugin(client
);
424 client
->OnPpapiChannelOpened(IPC::ChannelHandle(), base::kNullProcessId
, 0);
428 void PluginServiceImpl::OpenChannelToPpapiBroker(
429 int render_process_id
,
430 const base::FilePath
& path
,
431 PpapiPluginProcessHost::BrokerClient
* client
) {
432 PpapiPluginProcessHost
* plugin_host
= FindOrStartPpapiBrokerProcess(
433 render_process_id
, path
);
435 plugin_host
->OpenChannelToPlugin(client
);
438 client
->OnPpapiChannelOpened(IPC::ChannelHandle(), base::kNullProcessId
, 0);
442 void PluginServiceImpl::CancelOpenChannelToNpapiPlugin(
443 PluginProcessHost::Client
* client
) {
444 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO
));
445 DCHECK(ContainsKey(pending_plugin_clients_
, client
));
446 pending_plugin_clients_
.erase(client
);
449 void PluginServiceImpl::ForwardGetAllowedPluginForOpenChannelToPlugin(
450 const PluginServiceFilterParams
& params
,
452 const std::string
& mime_type
,
453 PluginProcessHost::Client
* client
,
454 const std::vector
<WebPluginInfo
>&) {
455 GetAllowedPluginForOpenChannelToPlugin(
456 params
.render_process_id
, params
.render_frame_id
, url
, params
.page_url
,
457 mime_type
, client
, params
.resource_context
);
460 void PluginServiceImpl::GetAllowedPluginForOpenChannelToPlugin(
461 int render_process_id
,
464 const GURL
& page_url
,
465 const std::string
& mime_type
,
466 PluginProcessHost::Client
* client
,
467 ResourceContext
* resource_context
) {
469 bool allow_wildcard
= true;
470 bool found
= GetPluginInfo(
471 render_process_id
, render_frame_id
, resource_context
,
472 url
, page_url
, mime_type
, allow_wildcard
,
474 base::FilePath plugin_path
;
476 plugin_path
= info
.path
;
478 // Now we jump back to the IO thread to finish opening the channel.
479 BrowserThread::PostTask(
480 BrowserThread::IO
, FROM_HERE
,
481 base::Bind(&PluginServiceImpl::FinishOpenChannelToPlugin
,
482 base::Unretained(this),
488 void PluginServiceImpl::FinishOpenChannelToPlugin(
489 int render_process_id
,
490 const base::FilePath
& plugin_path
,
491 PluginProcessHost::Client
* client
) {
492 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO
));
494 // Make sure it hasn't been canceled yet.
495 if (!ContainsKey(pending_plugin_clients_
, client
))
497 pending_plugin_clients_
.erase(client
);
499 PluginProcessHost
* plugin_host
= FindOrStartNpapiPluginProcess(
500 render_process_id
, plugin_path
);
502 client
->OnFoundPluginProcessHost(plugin_host
);
503 plugin_host
->OpenChannelToPlugin(client
);
509 bool PluginServiceImpl::GetPluginInfoArray(
511 const std::string
& mime_type
,
513 std::vector
<WebPluginInfo
>* plugins
,
514 std::vector
<std::string
>* actual_mime_types
) {
515 bool use_stale
= false;
516 PluginList::Singleton()->GetPluginInfoArray(
517 url
, mime_type
, allow_wildcard
, &use_stale
, NPAPIPluginsSupported(),
518 plugins
, actual_mime_types
);
522 bool PluginServiceImpl::GetPluginInfo(int render_process_id
,
524 ResourceContext
* context
,
526 const GURL
& page_url
,
527 const std::string
& mime_type
,
531 std::string
* actual_mime_type
) {
532 std::vector
<WebPluginInfo
> plugins
;
533 std::vector
<std::string
> mime_types
;
534 bool stale
= GetPluginInfoArray(
535 url
, mime_type
, allow_wildcard
, &plugins
, &mime_types
);
539 for (size_t i
= 0; i
< plugins
.size(); ++i
) {
540 if (!filter_
|| filter_
->IsPluginAvailable(render_process_id
,
547 if (actual_mime_type
)
548 *actual_mime_type
= mime_types
[i
];
555 bool PluginServiceImpl::GetPluginInfoByPath(const base::FilePath
& plugin_path
,
556 WebPluginInfo
* info
) {
557 std::vector
<WebPluginInfo
> plugins
;
558 PluginList::Singleton()->GetPluginsNoRefresh(&plugins
);
560 for (std::vector
<WebPluginInfo
>::iterator it
= plugins
.begin();
563 if (it
->path
== plugin_path
) {
572 base::string16
PluginServiceImpl::GetPluginDisplayNameByPath(
573 const base::FilePath
& path
) {
574 base::string16 plugin_name
= path
.LossyDisplayName();
576 if (PluginService::GetInstance()->GetPluginInfoByPath(path
, &info
) &&
577 !info
.name
.empty()) {
578 plugin_name
= info
.name
;
579 #if defined(OS_MACOSX)
580 // Many plugins on the Mac have .plugin in the actual name, which looks
581 // terrible, so look for that and strip it off if present.
582 const std::string kPluginExtension
= ".plugin";
583 if (EndsWith(plugin_name
, base::ASCIIToUTF16(kPluginExtension
), true))
584 plugin_name
.erase(plugin_name
.length() - kPluginExtension
.length());
590 void PluginServiceImpl::GetPlugins(const GetPluginsCallback
& callback
) {
591 scoped_refptr
<base::MessageLoopProxy
> target_loop(
592 base::MessageLoop::current()->message_loop_proxy());
594 if (LoadPluginListInProcess()) {
595 BrowserThread::GetBlockingPool()->
596 PostSequencedWorkerTaskWithShutdownBehavior(
599 base::Bind(&PluginServiceImpl::GetPluginsInternal
,
600 base::Unretained(this),
601 target_loop
, callback
),
602 base::SequencedWorkerPool::SKIP_ON_SHUTDOWN
);
605 #if defined(OS_POSIX)
606 BrowserThread::PostTask(BrowserThread::IO
, FROM_HERE
,
607 base::Bind(&PluginServiceImpl::GetPluginsOnIOThread
,
608 base::Unretained(this), target_loop
, callback
));
614 void PluginServiceImpl::GetPluginsInternal(
615 base::MessageLoopProxy
* target_loop
,
616 const PluginService::GetPluginsCallback
& callback
) {
617 DCHECK(BrowserThread::GetBlockingPool()->IsRunningSequenceOnCurrentThread(
618 plugin_list_token_
));
620 std::vector
<WebPluginInfo
> plugins
;
621 PluginList::Singleton()->GetPlugins(&plugins
, NPAPIPluginsSupported());
623 target_loop
->PostTask(FROM_HERE
,
624 base::Bind(callback
, plugins
));
627 #if defined(OS_POSIX)
628 void PluginServiceImpl::GetPluginsOnIOThread(
629 base::MessageLoopProxy
* target_loop
,
630 const GetPluginsCallback
& callback
) {
631 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO
));
633 // If we switch back to loading plugins in process, then we need to make
634 // sure g_thread_init() gets called since plugins may call glib at load.
637 plugin_loader_
= new PluginLoaderPosix
;
639 plugin_loader_
->GetPlugins(
640 base::Bind(&ForwardCallback
, make_scoped_refptr(target_loop
), callback
));
644 void PluginServiceImpl::OnWaitableEventSignaled(
645 base::WaitableEvent
* waitable_event
) {
647 if (waitable_event
== hkcu_event_
) {
648 hkcu_key_
.StartWatching();
650 hklm_key_
.StartWatching();
653 PluginList::Singleton()->RefreshPlugins();
654 PurgePluginListCache(NULL
, false);
656 // This event should only get signaled on a Windows machine.
658 #endif // defined(OS_WIN)
661 void PluginServiceImpl::RegisterPepperPlugins() {
662 ComputePepperPluginList(&ppapi_plugins_
);
663 for (size_t i
= 0; i
< ppapi_plugins_
.size(); ++i
) {
664 RegisterInternalPlugin(ppapi_plugins_
[i
].ToWebPluginInfo(), true);
668 // There should generally be very few plugins so a brute-force search is fine.
669 PepperPluginInfo
* PluginServiceImpl::GetRegisteredPpapiPluginInfo(
670 const base::FilePath
& plugin_path
) {
671 PepperPluginInfo
* info
= NULL
;
672 for (size_t i
= 0; i
< ppapi_plugins_
.size(); ++i
) {
673 if (ppapi_plugins_
[i
].path
== plugin_path
) {
674 info
= &ppapi_plugins_
[i
];
680 // We did not find the plugin in our list. But wait! the plugin can also
681 // be a latecomer, as it happens with pepper flash. This information
682 // can be obtained from the PluginList singleton and we can use it to
683 // construct it and add it to the list. This same deal needs to be done
684 // in the renderer side in PepperPluginRegistry.
685 WebPluginInfo webplugin_info
;
686 if (!GetPluginInfoByPath(plugin_path
, &webplugin_info
))
688 PepperPluginInfo new_pepper_info
;
689 if (!MakePepperPluginInfo(webplugin_info
, &new_pepper_info
))
691 ppapi_plugins_
.push_back(new_pepper_info
);
692 return &ppapi_plugins_
[ppapi_plugins_
.size() - 1];
695 #if defined(OS_POSIX) && !defined(OS_OPENBSD) && !defined(OS_ANDROID)
697 void PluginServiceImpl::RegisterFilePathWatcher(FilePathWatcher
* watcher
,
698 const base::FilePath
& path
) {
699 bool result
= watcher
->Watch(path
, false,
700 base::Bind(&NotifyPluginDirChanged
));
705 void PluginServiceImpl::SetFilter(PluginServiceFilter
* filter
) {
709 PluginServiceFilter
* PluginServiceImpl::GetFilter() {
713 void PluginServiceImpl::ForcePluginShutdown(const base::FilePath
& plugin_path
) {
714 if (!BrowserThread::CurrentlyOn(BrowserThread::IO
)) {
715 BrowserThread::PostTask(
716 BrowserThread::IO
, FROM_HERE
,
717 base::Bind(&PluginServiceImpl::ForcePluginShutdown
,
718 base::Unretained(this), plugin_path
));
722 PluginProcessHost
* plugin
= FindNpapiPluginProcess(plugin_path
);
724 plugin
->ForceShutdown();
727 static const unsigned int kMaxCrashesPerInterval
= 3;
728 static const unsigned int kCrashesInterval
= 120;
730 void PluginServiceImpl::RegisterPluginCrash(const base::FilePath
& path
) {
731 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO
));
732 std::map
<base::FilePath
, std::vector
<base::Time
> >::iterator i
=
733 crash_times_
.find(path
);
734 if (i
== crash_times_
.end()) {
735 crash_times_
[path
] = std::vector
<base::Time
>();
736 i
= crash_times_
.find(path
);
738 if (i
->second
.size() == kMaxCrashesPerInterval
) {
739 i
->second
.erase(i
->second
.begin());
741 base::Time time
= base::Time::Now();
742 i
->second
.push_back(time
);
745 bool PluginServiceImpl::IsPluginUnstable(const base::FilePath
& path
) {
746 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO
));
747 std::map
<base::FilePath
, std::vector
<base::Time
> >::const_iterator i
=
748 crash_times_
.find(path
);
749 if (i
== crash_times_
.end()) {
752 if (i
->second
.size() != kMaxCrashesPerInterval
) {
755 base::TimeDelta delta
= base::Time::Now() - i
->second
[0];
756 return delta
.InSeconds() <= kCrashesInterval
;
759 void PluginServiceImpl::RefreshPlugins() {
760 PluginList::Singleton()->RefreshPlugins();
763 void PluginServiceImpl::AddExtraPluginPath(const base::FilePath
& path
) {
764 if (!NPAPIPluginsSupported()) {
765 // TODO(jam): remove and just have CHECK once we're sure this doesn't get
767 DVLOG(0) << "NPAPI plugins not supported";
770 PluginList::Singleton()->AddExtraPluginPath(path
);
773 void PluginServiceImpl::RemoveExtraPluginPath(const base::FilePath
& path
) {
774 PluginList::Singleton()->RemoveExtraPluginPath(path
);
777 void PluginServiceImpl::AddExtraPluginDir(const base::FilePath
& path
) {
778 PluginList::Singleton()->AddExtraPluginDir(path
);
781 void PluginServiceImpl::RegisterInternalPlugin(
782 const WebPluginInfo
& info
,
783 bool add_at_beginning
) {
784 if (!NPAPIPluginsSupported() &&
785 info
.type
== WebPluginInfo::PLUGIN_TYPE_NPAPI
) {
786 DVLOG(0) << "Don't register NPAPI plugins when they're not supported";
789 PluginList::Singleton()->RegisterInternalPlugin(info
, add_at_beginning
);
792 void PluginServiceImpl::UnregisterInternalPlugin(const base::FilePath
& path
) {
793 PluginList::Singleton()->UnregisterInternalPlugin(path
);
796 void PluginServiceImpl::GetInternalPlugins(
797 std::vector
<WebPluginInfo
>* plugins
) {
798 PluginList::Singleton()->GetInternalPlugins(plugins
);
801 bool PluginServiceImpl::NPAPIPluginsSupported() {
802 #if defined(OS_WIN) || defined(OS_MACOSX) || defined(OS_BSD) || \
803 (defined(OS_LINUX) && !defined(USE_AURA))
810 void PluginServiceImpl::DisablePluginsDiscoveryForTesting() {
811 PluginList::Singleton()->DisablePluginsDiscovery();
814 #if defined(OS_MACOSX)
815 void PluginServiceImpl::AppActivated() {
816 BrowserThread::PostTask(BrowserThread::IO
, FROM_HERE
,
817 base::Bind(&NotifyPluginsOfActivation
));
819 #elif defined(OS_WIN)
821 bool GetPluginPropertyFromWindow(
822 HWND window
, const wchar_t* plugin_atom_property
,
823 base::string16
* plugin_property
) {
824 ATOM plugin_atom
= reinterpret_cast<ATOM
>(
825 GetPropW(window
, plugin_atom_property
));
826 if (plugin_atom
!= 0) {
827 WCHAR plugin_property_local
[MAX_PATH
] = {0};
828 GlobalGetAtomNameW(plugin_atom
,
829 plugin_property_local
,
830 ARRAYSIZE(plugin_property_local
));
831 *plugin_property
= plugin_property_local
;
837 bool PluginServiceImpl::GetPluginInfoFromWindow(
839 base::string16
* plugin_name
,
840 base::string16
* plugin_version
) {
841 if (!IsPluginWindow(window
))
844 GetPluginPropertyFromWindow(
845 window
, kPluginNameAtomProperty
, plugin_name
);
846 GetPluginPropertyFromWindow(
847 window
, kPluginVersionAtomProperty
, plugin_version
);
851 bool PluginServiceImpl::IsPluginWindow(HWND window
) {
852 return gfx::GetClassName(window
) == base::string16(kNativeWindowClassName
);
856 bool PluginServiceImpl::PpapiDevChannelSupported() {
857 return content::GetContentClient()->browser()->
858 IsPluginAllowedToUseDevChannelAPIs();
861 } // namespace content