2018-11-30 22:52:05 +03:00
|
|
|
/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*-
|
2018-11-30 18:39:55 +03:00
|
|
|
* vim: sw=2 ts=4 et :
|
2009-07-25 03:24:27 +04:00
|
|
|
*/
|
2012-05-21 15:12:37 +04:00
|
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
2009-07-02 09:45:19 +04:00
|
|
|
|
|
|
|
#ifndef mozilla_ipc_ProtocolUtils_h
|
|
|
|
#define mozilla_ipc_ProtocolUtils_h 1
|
|
|
|
|
2009-10-28 00:52:37 +03:00
|
|
|
#include "base/process.h"
|
2009-12-03 11:16:03 +03:00
|
|
|
#include "base/process_util.h"
|
2009-07-02 09:45:19 +04:00
|
|
|
#include "chrome/common/ipc_message_utils.h"
|
|
|
|
|
2009-10-29 20:50:28 +03:00
|
|
|
#include "prenv.h"
|
|
|
|
|
2011-06-03 22:33:56 +04:00
|
|
|
#include "IPCMessageStart.h"
|
2016-10-29 06:46:59 +03:00
|
|
|
#include "mozilla/AlreadyAddRefed.h"
|
2013-08-22 18:39:32 +04:00
|
|
|
#include "mozilla/Attributes.h"
|
2017-11-29 18:11:15 +03:00
|
|
|
#include "mozilla/ipc/ByteBuf.h"
|
2012-08-16 08:02:32 +04:00
|
|
|
#include "mozilla/ipc/FileDescriptor.h"
|
2018-04-23 21:13:36 +03:00
|
|
|
#include "mozilla/ipc/MessageChannel.h"
|
2009-12-04 21:45:21 +03:00
|
|
|
#include "mozilla/ipc/Shmem.h"
|
2011-06-03 22:33:56 +04:00
|
|
|
#include "mozilla/ipc/Transport.h"
|
2013-05-31 17:16:57 +04:00
|
|
|
#include "mozilla/ipc/MessageLink.h"
|
|
|
|
#include "mozilla/LinkedList.h"
|
2016-05-21 11:07:56 +03:00
|
|
|
#include "mozilla/Maybe.h"
|
2017-03-16 12:36:15 +03:00
|
|
|
#include "mozilla/MozPromise.h"
|
2015-02-27 09:31:00 +03:00
|
|
|
#include "mozilla/Mutex.h"
|
2016-11-15 06:26:00 +03:00
|
|
|
#include "mozilla/NotNull.h"
|
2018-06-07 22:33:40 +03:00
|
|
|
#include "mozilla/Scoped.h"
|
2016-07-07 04:51:20 +03:00
|
|
|
#include "mozilla/UniquePtr.h"
|
2014-07-04 22:04:13 +04:00
|
|
|
#include "MainThreadUtils.h"
|
2009-12-03 11:16:28 +03:00
|
|
|
|
2020-05-28 18:55:16 +03:00
|
|
|
#include "nsDataHashtable.h"
|
|
|
|
#include "nsHashKeys.h"
|
|
|
|
|
2014-02-03 17:11:50 +04:00
|
|
|
#if defined(ANDROID) && defined(DEBUG)
|
|
|
|
# include <android/log.h>
|
|
|
|
#endif
|
|
|
|
|
2015-10-07 21:30:33 +03:00
|
|
|
template <typename T>
|
|
|
|
class nsTHashtable;
|
|
|
|
template <typename T>
|
|
|
|
class nsPtrHashKey;
|
|
|
|
|
2009-12-03 11:16:28 +03:00
|
|
|
// WARNING: this takes into account the private, special-message-type
|
|
|
|
// enum in ipc_channel.h. They need to be kept in sync.
|
|
|
|
namespace {
|
2011-06-03 22:33:56 +04:00
|
|
|
// XXX the max message ID is actually kuint32max now ... when this
|
|
|
|
// changed, the assumptions of the special message IDs changed in that
|
|
|
|
// they're not carving out messages from likely-unallocated space, but
|
|
|
|
// rather carving out messages from the end of space allocated to
|
|
|
|
// protocol 0. Oops! We can get away with this until protocol 0
|
|
|
|
// starts approaching its 65,536th message.
|
2009-12-03 11:16:28 +03:00
|
|
|
enum {
|
2020-05-22 21:21:59 +03:00
|
|
|
IMPENDING_SHUTDOWN_MESSAGE_TYPE = kuint16max - 9,
|
2018-05-08 17:31:44 +03:00
|
|
|
BUILD_IDS_MATCH_MESSAGE_TYPE = kuint16max - 8,
|
|
|
|
BUILD_ID_MESSAGE_TYPE = kuint16max - 7, // unused
|
|
|
|
CHANNEL_OPENED_MESSAGE_TYPE = kuint16max - 6,
|
|
|
|
SHMEM_DESTROYED_MESSAGE_TYPE = kuint16max - 5,
|
|
|
|
SHMEM_CREATED_MESSAGE_TYPE = kuint16max - 4,
|
|
|
|
GOODBYE_MESSAGE_TYPE = kuint16max - 3,
|
|
|
|
CANCEL_MESSAGE_TYPE = kuint16max - 2,
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2013-06-21 01:32:02 +04:00
|
|
|
// kuint16max - 1 is used by ipc_channel.h.
|
2009-12-03 11:16:28 +03:00
|
|
|
};
|
2015-07-13 18:25:42 +03:00
|
|
|
|
|
|
|
} // namespace
|
2009-07-02 09:45:19 +04:00
|
|
|
|
2016-10-29 06:46:59 +03:00
|
|
|
class nsIEventTarget;
|
|
|
|
|
2009-07-02 09:45:19 +04:00
|
|
|
namespace mozilla {
|
2017-07-20 02:23:01 +03:00
|
|
|
class SchedulerGroup;
|
|
|
|
|
2013-05-31 17:16:57 +04:00
|
|
|
namespace dom {
|
|
|
|
class ContentParent;
|
2015-07-13 18:25:42 +03:00
|
|
|
} // namespace dom
|
2013-05-31 17:16:57 +04:00
|
|
|
|
|
|
|
namespace net {
|
|
|
|
class NeckoParent;
|
2015-07-13 18:25:42 +03:00
|
|
|
} // namespace net
|
2013-05-31 17:16:57 +04:00
|
|
|
|
2009-07-02 09:45:19 +04:00
|
|
|
namespace ipc {
|
|
|
|
|
2018-08-20 21:46:05 +03:00
|
|
|
#ifdef FUZZING
|
|
|
|
class ProtocolFuzzerHelper;
|
|
|
|
#endif
|
|
|
|
|
2016-11-02 02:50:07 +03:00
|
|
|
class MessageChannel;
|
|
|
|
|
2014-02-25 17:12:49 +04:00
|
|
|
#ifdef XP_WIN
|
|
|
|
const base::ProcessHandle kInvalidProcessHandle = INVALID_HANDLE_VALUE;
|
2015-04-01 11:40:35 +03:00
|
|
|
|
|
|
|
// In theory, on Windows, this is a valid process ID, but in practice they are
|
|
|
|
// currently divisible by four. Process IDs share the kernel handle allocation
|
|
|
|
// code and they are guaranteed to be divisible by four.
|
|
|
|
// As this could change for process IDs we shouldn't generally rely on this
|
|
|
|
// property, however even if that were to change, it seems safe to rely on this
|
|
|
|
// particular value never being used.
|
|
|
|
const base::ProcessId kInvalidProcessId = kuint32max;
|
2014-02-25 17:12:49 +04:00
|
|
|
#else
|
|
|
|
const base::ProcessHandle kInvalidProcessHandle = -1;
|
2015-04-01 11:40:35 +03:00
|
|
|
const base::ProcessId kInvalidProcessId = -1;
|
2014-02-25 17:12:49 +04:00
|
|
|
#endif
|
2015-04-01 11:40:35 +03:00
|
|
|
|
|
|
|
// Scoped base::ProcessHandle to ensure base::CloseProcessHandle is called.
|
|
|
|
struct ScopedProcessHandleTraits {
|
|
|
|
typedef base::ProcessHandle type;
|
|
|
|
|
|
|
|
static type empty() { return kInvalidProcessHandle; }
|
|
|
|
|
|
|
|
static void release(type aProcessHandle) {
|
|
|
|
if (aProcessHandle && aProcessHandle != kInvalidProcessHandle) {
|
|
|
|
base::CloseProcessHandle(aProcessHandle);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
typedef mozilla::Scoped<ScopedProcessHandleTraits> ScopedProcessHandle;
|
2014-02-25 17:12:49 +04:00
|
|
|
|
2013-05-31 17:16:57 +04:00
|
|
|
class ProtocolFdMapping;
|
|
|
|
class ProtocolCloneContext;
|
2009-07-02 09:45:19 +04:00
|
|
|
|
2009-07-25 03:24:27 +04:00
|
|
|
// Used to pass references to protocol actors across the wire.
|
|
|
|
// Actors created on the parent-side have a positive ID, and actors
|
|
|
|
// allocated on the child side have a negative ID.
|
2009-07-02 09:45:19 +04:00
|
|
|
struct ActorHandle {
|
2009-07-25 03:24:27 +04:00
|
|
|
int mId;
|
2009-07-02 09:45:19 +04:00
|
|
|
};
|
|
|
|
|
2016-10-30 21:26:40 +03:00
|
|
|
// What happens if Interrupt calls race?
|
|
|
|
enum RacyInterruptPolicy { RIPError, RIPChildWins, RIPParentWins };
|
2018-04-30 22:22:18 +03:00
|
|
|
|
2019-05-21 20:04:14 +03:00
|
|
|
enum class LinkStatus : uint8_t {
|
|
|
|
// The actor has not established a link yet, or the actor is no longer in use
|
|
|
|
// by IPC, and its 'Dealloc' method has been called or is being called.
|
|
|
|
//
|
|
|
|
// NOTE: This state is used instead of an explicit `Freed` state when IPC no
|
|
|
|
// longer holds references to the current actor as we currently re-open
|
|
|
|
// existing actors. Once we fix these poorly behaved actors, this loopback
|
|
|
|
// state can be split to have the final state not be the same as the initial
|
|
|
|
// state.
|
|
|
|
Inactive,
|
|
|
|
|
|
|
|
// A live link is connected to the other side of this actor.
|
|
|
|
Connected,
|
|
|
|
|
|
|
|
// The link has begun being destroyed. Messages may still be received, but
|
|
|
|
// cannot be sent. (exception: sync/intr replies may be sent while Doomed).
|
|
|
|
Doomed,
|
|
|
|
|
|
|
|
// The link has been destroyed, and messages will no longer be sent or
|
|
|
|
// received.
|
|
|
|
Destroyed,
|
|
|
|
};
|
|
|
|
|
2019-05-24 23:21:35 +03:00
|
|
|
typedef IPCMessageStart ProtocolId;
|
|
|
|
|
2019-05-25 01:36:49 +03:00
|
|
|
// Generated by IPDL compiler
|
|
|
|
const char* ProtocolIdToName(IPCMessageStart aId);
|
|
|
|
|
2016-10-29 06:46:59 +03:00
|
|
|
class IToplevelProtocol;
|
2019-05-21 20:04:14 +03:00
|
|
|
class ActorLifecycleProxy;
|
2016-10-29 06:46:59 +03:00
|
|
|
|
2016-10-30 21:26:40 +03:00
|
|
|
class IProtocol : public HasResultCodes {
|
2009-07-02 09:45:19 +04:00
|
|
|
public:
|
2009-12-03 11:16:28 +03:00
|
|
|
enum ActorDestroyReason {
|
2011-03-21 19:00:00 +03:00
|
|
|
FailedConstructor,
|
2009-12-03 11:16:28 +03:00
|
|
|
Deletion,
|
|
|
|
AncestorDeletion,
|
|
|
|
NormalShutdown,
|
|
|
|
AbnormalShutdown
|
|
|
|
};
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2016-10-29 07:26:21 +03:00
|
|
|
typedef base::ProcessId ProcessId;
|
|
|
|
typedef IPC::Message Message;
|
2016-05-21 11:07:56 +03:00
|
|
|
typedef IPC::MessageInfo MessageInfo;
|
2016-10-30 21:26:40 +03:00
|
|
|
|
2019-06-06 17:57:34 +03:00
|
|
|
IProtocol(ProtocolId aProtoId, Side aSide)
|
|
|
|
: mId(0),
|
|
|
|
mProtocolId(aProtoId),
|
|
|
|
mSide(aSide),
|
|
|
|
mLinkStatus(LinkStatus::Inactive),
|
|
|
|
mLifecycleProxy(nullptr),
|
|
|
|
mManager(nullptr),
|
|
|
|
mToplevel(nullptr) {}
|
2016-10-30 21:26:40 +03:00
|
|
|
|
2019-06-06 17:57:34 +03:00
|
|
|
IToplevelProtocol* ToplevelProtocol() { return mToplevel; }
|
2016-10-29 20:38:31 +03:00
|
|
|
|
2019-06-06 17:57:34 +03:00
|
|
|
// The following methods either directly forward to the toplevel protocol, or
|
|
|
|
// almost directly do.
|
|
|
|
int32_t Register(IProtocol* aRouted);
|
|
|
|
int32_t RegisterID(IProtocol* aRouted, int32_t aId);
|
|
|
|
IProtocol* Lookup(int32_t aId);
|
|
|
|
void Unregister(int32_t aId);
|
2016-10-29 20:38:31 +03:00
|
|
|
|
2016-11-01 02:00:00 +03:00
|
|
|
Shmem::SharedMemory* CreateSharedMemory(size_t aSize,
|
|
|
|
SharedMemory::SharedMemoryType aType,
|
2019-06-06 17:57:34 +03:00
|
|
|
bool aUnsafe, int32_t* aId);
|
|
|
|
Shmem::SharedMemory* LookupSharedMemory(int32_t aId);
|
|
|
|
bool IsTrackingSharedMemory(Shmem::SharedMemory* aSegment);
|
|
|
|
bool DestroySharedMemory(Shmem& aShmem);
|
2016-11-01 02:00:00 +03:00
|
|
|
|
2019-06-06 17:57:34 +03:00
|
|
|
MessageChannel* GetIPCChannel();
|
|
|
|
const MessageChannel* GetIPCChannel() const;
|
2016-10-29 06:46:59 +03:00
|
|
|
|
2019-06-06 17:57:34 +03:00
|
|
|
// Sets an event target to which all messages for aActor will be
|
|
|
|
// dispatched. This method must be called before right before the SendPFoo
|
|
|
|
// message for aActor is sent. And SendPFoo *must* be called if
|
|
|
|
// SetEventTargetForActor is called. The receiver when calling
|
|
|
|
// SetEventTargetForActor must be the actor that will be the manager for
|
|
|
|
// aActor.
|
|
|
|
void SetEventTargetForActor(IProtocol* aActor, nsIEventTarget* aEventTarget);
|
|
|
|
|
|
|
|
// Replace the event target for the messages of aActor. There must not be
|
|
|
|
// any messages of aActor in the task queue, or we might run into some
|
|
|
|
// unexpected behavior.
|
|
|
|
void ReplaceEventTargetForActor(IProtocol* aActor,
|
|
|
|
nsIEventTarget* aEventTarget);
|
|
|
|
|
|
|
|
nsIEventTarget* GetActorEventTarget();
|
|
|
|
already_AddRefed<nsIEventTarget> GetActorEventTarget(IProtocol* aActor);
|
|
|
|
|
|
|
|
ProcessId OtherPid() const;
|
|
|
|
|
|
|
|
// Actor lifecycle and other properties.
|
|
|
|
ProtocolId GetProtocolId() const { return mProtocolId; }
|
|
|
|
const char* GetProtocolName() const { return ProtocolIdToName(mProtocolId); }
|
|
|
|
|
|
|
|
int32_t Id() const { return mId; }
|
|
|
|
IProtocol* Manager() const { return mManager; }
|
|
|
|
|
|
|
|
ActorLifecycleProxy* GetLifecycleProxy() { return mLifecycleProxy; }
|
|
|
|
|
|
|
|
Side GetSide() const { return mSide; }
|
2019-05-21 20:04:14 +03:00
|
|
|
bool CanSend() const { return mLinkStatus == LinkStatus::Connected; }
|
|
|
|
bool CanRecv() const {
|
|
|
|
return mLinkStatus == LinkStatus::Connected ||
|
|
|
|
mLinkStatus == LinkStatus::Doomed;
|
|
|
|
}
|
|
|
|
|
2019-06-06 17:57:34 +03:00
|
|
|
// Remove or deallocate a managee given its type.
|
|
|
|
virtual void RemoveManagee(int32_t, IProtocol*) = 0;
|
|
|
|
virtual void DeallocManagee(int32_t, IProtocol*) = 0;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2017-03-21 06:57:56 +03:00
|
|
|
Maybe<IProtocol*> ReadActor(const IPC::Message* aMessage,
|
|
|
|
PickleIterator* aIter, bool aNullable,
|
|
|
|
const char* aActorDescription,
|
|
|
|
int32_t aProtocolTypeId);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2016-10-30 21:26:40 +03:00
|
|
|
virtual Result OnMessageReceived(const Message& aMessage) = 0;
|
|
|
|
virtual Result OnMessageReceived(const Message& aMessage,
|
|
|
|
Message*& aReply) = 0;
|
2017-03-21 06:57:56 +03:00
|
|
|
virtual Result OnCallReceived(const Message& aMessage, Message*& aReply) = 0;
|
|
|
|
bool AllocShmem(size_t aSize, Shmem::SharedMemory::SharedMemoryType aType,
|
2016-11-01 02:00:00 +03:00
|
|
|
Shmem* aOutMem);
|
2016-06-15 15:49:13 +03:00
|
|
|
bool AllocUnsafeShmem(size_t aSize,
|
2017-03-21 06:57:56 +03:00
|
|
|
Shmem::SharedMemory::SharedMemoryType aType,
|
|
|
|
Shmem* aOutMem);
|
2018-04-23 21:13:37 +03:00
|
|
|
bool DeallocShmem(Shmem& aMem);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2019-06-06 17:57:34 +03:00
|
|
|
void FatalError(const char* const aErrorMsg) const;
|
|
|
|
virtual void HandleFatalError(const char* aErrorMsg) const;
|
2019-05-21 20:04:14 +03:00
|
|
|
|
2016-10-29 20:38:31 +03:00
|
|
|
protected:
|
2019-05-21 20:04:14 +03:00
|
|
|
virtual ~IProtocol();
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2016-10-29 06:46:59 +03:00
|
|
|
friend class IToplevelProtocol;
|
2019-05-21 20:04:14 +03:00
|
|
|
friend class ActorLifecycleProxy;
|
|
|
|
|
|
|
|
void SetId(int32_t aId);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2018-04-23 21:13:37 +03:00
|
|
|
// We have separate functions because the accessibility code manually
|
|
|
|
// calls SetManager.
|
2016-10-29 06:46:59 +03:00
|
|
|
void SetManager(IProtocol* aManager);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2018-04-23 21:13:37 +03:00
|
|
|
// Sets the manager for the protocol and registers the protocol with
|
|
|
|
// its manager, setting up channels for the protocol as well. Not
|
|
|
|
// for use outside of IPDL.
|
|
|
|
void SetManagerAndRegister(IProtocol* aManager);
|
|
|
|
void SetManagerAndRegister(IProtocol* aManager, int32_t aId);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2019-05-21 20:04:35 +03:00
|
|
|
// Helpers for calling `Send` on our underlying IPC channel.
|
|
|
|
bool ChannelSend(IPC::Message* aMsg);
|
|
|
|
bool ChannelSend(IPC::Message* aMsg, IPC::Message* aReply);
|
|
|
|
bool ChannelCall(IPC::Message* aMsg, IPC::Message* aReply);
|
|
|
|
template <typename Value>
|
|
|
|
void ChannelSend(IPC::Message* aMsg, ResolveCallback<Value>&& aResolve,
|
|
|
|
RejectCallback&& aReject) {
|
|
|
|
UniquePtr<IPC::Message> msg(aMsg);
|
|
|
|
if (CanSend()) {
|
|
|
|
GetIPCChannel()->Send(msg.release(), this, std::move(aResolve),
|
|
|
|
std::move(aReject));
|
|
|
|
} else {
|
|
|
|
NS_WARNING("IPC message discarded: actor cannot send");
|
|
|
|
aReject(ResponseRejectReason::SendError);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-05-21 20:04:14 +03:00
|
|
|
// Collect all actors managed by this object in an array. To make this safer
|
|
|
|
// to iterate, `ActorLifecycleProxy` references are returned rather than raw
|
|
|
|
// actor pointers.
|
|
|
|
virtual void AllManagedActors(
|
|
|
|
nsTArray<RefPtr<ActorLifecycleProxy>>& aActors) const = 0;
|
|
|
|
|
|
|
|
// Internal method called when the actor becomes connected.
|
|
|
|
void ActorConnected();
|
|
|
|
|
|
|
|
// Called immediately before setting the actor state to doomed, and triggering
|
|
|
|
// async actor destruction. Messages may be sent from this callback, but no
|
|
|
|
// later.
|
|
|
|
// FIXME(nika): This is currently unused!
|
|
|
|
virtual void ActorDoom() {}
|
|
|
|
void DoomSubtree();
|
|
|
|
|
|
|
|
// Called when the actor has been destroyed due to an error, a __delete__
|
|
|
|
// message, or a __doom__ reply.
|
|
|
|
virtual void ActorDestroy(ActorDestroyReason aWhy) {}
|
|
|
|
void DestroySubtree(ActorDestroyReason aWhy);
|
|
|
|
|
2019-07-29 22:54:16 +03:00
|
|
|
// Called when IPC has acquired its first reference to the actor. This method
|
|
|
|
// may take references which will later be freed by `ActorDealloc`.
|
|
|
|
virtual void ActorAlloc() {}
|
|
|
|
|
2019-05-21 20:04:14 +03:00
|
|
|
// Called when IPC has released its final reference to the actor. It will call
|
|
|
|
// the dealloc method, causing the actor to be actually freed.
|
|
|
|
//
|
|
|
|
// The actor has been freed after this method returns.
|
|
|
|
virtual void ActorDealloc() {
|
|
|
|
if (Manager()) {
|
2019-05-24 23:21:35 +03:00
|
|
|
Manager()->DeallocManagee(mProtocolId, this);
|
2019-05-21 20:04:14 +03:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-29 06:46:59 +03:00
|
|
|
static const int32_t kNullActorId = 0;
|
|
|
|
static const int32_t kFreedActorId = 1;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2016-10-29 20:38:31 +03:00
|
|
|
private:
|
2016-11-04 01:48:58 +03:00
|
|
|
int32_t mId;
|
2019-05-24 23:21:35 +03:00
|
|
|
ProtocolId mProtocolId;
|
2016-11-01 02:27:08 +03:00
|
|
|
Side mSide;
|
2019-05-21 20:04:14 +03:00
|
|
|
LinkStatus mLinkStatus;
|
|
|
|
ActorLifecycleProxy* mLifecycleProxy;
|
2016-10-29 20:38:31 +03:00
|
|
|
IProtocol* mManager;
|
2019-06-06 17:57:34 +03:00
|
|
|
IToplevelProtocol* mToplevel;
|
2013-05-31 17:16:57 +04:00
|
|
|
};
|
|
|
|
|
2016-11-15 06:26:00 +03:00
|
|
|
#define IPC_OK() mozilla::ipc::IPCResult::Ok()
|
|
|
|
#define IPC_FAIL(actor, why) \
|
|
|
|
mozilla::ipc::IPCResult::Fail(WrapNotNull(actor), __func__, (why))
|
|
|
|
#define IPC_FAIL_NO_REASON(actor) \
|
|
|
|
mozilla::ipc::IPCResult::Fail(WrapNotNull(actor), __func__)
|
|
|
|
|
|
|
|
/**
|
|
|
|
* All message deserializer and message handler should return this
|
|
|
|
* type via above macros. We use a less generic name here to avoid
|
|
|
|
* conflict with mozilla::Result because we have quite a few using
|
|
|
|
* namespace mozilla::ipc; in the code base.
|
|
|
|
*/
|
|
|
|
class IPCResult {
|
|
|
|
public:
|
|
|
|
static IPCResult Ok() { return IPCResult(true); }
|
|
|
|
static IPCResult Fail(NotNull<IProtocol*> aActor, const char* aWhere,
|
|
|
|
const char* aWhy = "");
|
|
|
|
MOZ_IMPLICIT operator bool() const { return mSuccess; }
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2016-11-15 06:26:00 +03:00
|
|
|
private:
|
|
|
|
explicit IPCResult(bool aResult) : mSuccess(aResult) {}
|
|
|
|
bool mSuccess;
|
|
|
|
};
|
|
|
|
|
2015-11-01 06:02:08 +03:00
|
|
|
template <class PFooSide>
|
|
|
|
class Endpoint;
|
|
|
|
|
2013-05-31 17:16:57 +04:00
|
|
|
/**
|
|
|
|
* All top-level protocols should inherit this class.
|
|
|
|
*
|
|
|
|
* IToplevelProtocol tracks all top-level protocol actors created from
|
|
|
|
* this protocol actor.
|
|
|
|
*/
|
2016-10-29 07:42:23 +03:00
|
|
|
class IToplevelProtocol : public IProtocol {
|
2019-06-06 17:57:34 +03:00
|
|
|
#ifdef FUZZING
|
|
|
|
friend class mozilla::ipc::ProtocolFuzzerHelper;
|
|
|
|
#endif
|
|
|
|
|
2015-11-01 06:02:08 +03:00
|
|
|
template <class PFooSide>
|
|
|
|
friend class Endpoint;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2015-02-27 09:31:00 +03:00
|
|
|
protected:
|
2018-04-23 21:13:36 +03:00
|
|
|
explicit IToplevelProtocol(const char* aName, ProtocolId aProtoId,
|
|
|
|
Side aSide);
|
2020-02-07 01:41:56 +03:00
|
|
|
~IToplevelProtocol() = default;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2013-05-31 17:16:57 +04:00
|
|
|
public:
|
2019-06-06 17:57:34 +03:00
|
|
|
// Shadow methods on IProtocol which are implemented directly on toplevel
|
|
|
|
// actors.
|
|
|
|
int32_t Register(IProtocol* aRouted);
|
|
|
|
int32_t RegisterID(IProtocol* aRouted, int32_t aId);
|
|
|
|
IProtocol* Lookup(int32_t aId);
|
|
|
|
void Unregister(int32_t aId);
|
2018-04-23 21:13:37 +03:00
|
|
|
|
2019-06-06 17:57:34 +03:00
|
|
|
Shmem::SharedMemory* CreateSharedMemory(size_t aSize,
|
|
|
|
SharedMemory::SharedMemoryType aType,
|
|
|
|
bool aUnsafe, int32_t* aId);
|
|
|
|
Shmem::SharedMemory* LookupSharedMemory(int32_t aId);
|
|
|
|
bool IsTrackingSharedMemory(Shmem::SharedMemory* aSegment);
|
|
|
|
bool DestroySharedMemory(Shmem& aShmem);
|
|
|
|
|
2020-02-27 20:39:15 +03:00
|
|
|
MessageChannel* GetIPCChannel() { return &mChannel; }
|
|
|
|
const MessageChannel* GetIPCChannel() const { return &mChannel; }
|
2018-04-23 21:13:37 +03:00
|
|
|
|
2019-06-06 17:57:34 +03:00
|
|
|
// NOTE: The target actor's Manager must already be set.
|
|
|
|
void SetEventTargetForActorInternal(IProtocol* aActor,
|
|
|
|
nsIEventTarget* aEventTarget);
|
|
|
|
void ReplaceEventTargetForActor(IProtocol* aActor,
|
|
|
|
nsIEventTarget* aEventTarget);
|
|
|
|
nsIEventTarget* GetActorEventTarget();
|
|
|
|
already_AddRefed<nsIEventTarget> GetActorEventTarget(IProtocol* aActor);
|
2018-04-23 21:13:36 +03:00
|
|
|
|
2019-06-06 17:57:34 +03:00
|
|
|
ProcessId OtherPid() const;
|
|
|
|
void SetOtherProcessId(base::ProcessId aOtherPid);
|
2018-04-23 21:13:37 +03:00
|
|
|
|
2016-10-30 21:26:40 +03:00
|
|
|
virtual void OnChannelClose() = 0;
|
|
|
|
virtual void OnChannelError() = 0;
|
2016-11-02 02:50:07 +03:00
|
|
|
virtual void ProcessingError(Result aError, const char* aMsgName) {}
|
2016-10-30 21:26:40 +03:00
|
|
|
virtual void OnChannelConnected(int32_t peer_pid) {}
|
2016-11-02 02:50:07 +03:00
|
|
|
|
2020-02-07 01:41:56 +03:00
|
|
|
bool Open(UniquePtr<Transport> aTransport, base::ProcessId aOtherPid,
|
2016-11-02 02:58:33 +03:00
|
|
|
MessageLoop* aThread = nullptr,
|
|
|
|
mozilla::ipc::Side aSide = mozilla::ipc::UnknownSide);
|
|
|
|
|
|
|
|
bool Open(MessageChannel* aChannel, MessageLoop* aMessageLoop,
|
|
|
|
mozilla::ipc::Side aSide = mozilla::ipc::UnknownSide);
|
|
|
|
|
2017-08-03 12:21:44 +03:00
|
|
|
bool Open(MessageChannel* aChannel, nsIEventTarget* aEventTarget,
|
|
|
|
mozilla::ipc::Side aSide = mozilla::ipc::UnknownSide);
|
|
|
|
|
2018-08-30 01:00:05 +03:00
|
|
|
// Open a toplevel actor such that both ends of the actor's channel are on
|
|
|
|
// the same thread. This method should be called on the thread to perform
|
|
|
|
// the link.
|
|
|
|
//
|
|
|
|
// WARNING: Attempting to send a sync or intr message on the same thread
|
|
|
|
// will crash.
|
|
|
|
bool OpenOnSameThread(MessageChannel* aChannel,
|
|
|
|
mozilla::ipc::Side aSide = mozilla::ipc::UnknownSide);
|
|
|
|
|
2020-05-22 21:21:59 +03:00
|
|
|
/**
|
|
|
|
* This sends a special message that is processed on the IO thread, so that
|
|
|
|
* other actors can know that the process will soon shutdown.
|
|
|
|
*/
|
|
|
|
void NotifyImpendingShutdown();
|
|
|
|
|
2016-11-02 02:58:33 +03:00
|
|
|
void Close();
|
|
|
|
|
|
|
|
void SetReplyTimeoutMs(int32_t aTimeoutMs);
|
|
|
|
|
2019-06-06 17:57:34 +03:00
|
|
|
void DeallocShmems();
|
|
|
|
bool ShmemCreated(const Message& aMsg);
|
|
|
|
bool ShmemDestroyed(const Message& aMsg);
|
2016-11-02 07:05:38 +03:00
|
|
|
|
2016-11-02 02:50:07 +03:00
|
|
|
virtual bool ShouldContinueFromReplyTimeout() { return false; }
|
2016-10-30 21:26:40 +03:00
|
|
|
|
|
|
|
// WARNING: This function is called with the MessageChannel monitor held.
|
|
|
|
virtual void IntentionalCrash() { MOZ_CRASH("Intentional IPDL crash"); }
|
|
|
|
|
|
|
|
// The code here is only useful for fuzzing. It should not be used for any
|
|
|
|
// other purpose.
|
|
|
|
#ifdef DEBUG
|
|
|
|
// Returns true if we should simulate a timeout.
|
|
|
|
// WARNING: This is a testing-only function that is called with the
|
|
|
|
// MessageChannel monitor held. Don't do anything fancy here or we could
|
|
|
|
// deadlock.
|
|
|
|
virtual bool ArtificialTimeout() { return false; }
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2016-10-30 21:26:40 +03:00
|
|
|
// Returns true if we want to cause the worker thread to sleep with the
|
|
|
|
// monitor unlocked.
|
|
|
|
virtual bool NeedArtificialSleep() { return false; }
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2016-10-30 21:26:40 +03:00
|
|
|
// This function should be implemented to sleep for some amount of time on
|
|
|
|
// the worker thread. Will only be called if NeedArtificialSleep() returns
|
|
|
|
// true.
|
|
|
|
virtual void ArtificialSleep() {}
|
|
|
|
#else
|
|
|
|
bool ArtificialTimeout() { return false; }
|
|
|
|
bool NeedArtificialSleep() { return false; }
|
|
|
|
void ArtificialSleep() {}
|
|
|
|
#endif
|
|
|
|
|
2016-11-02 02:50:07 +03:00
|
|
|
virtual void EnteredCxxStack() {}
|
|
|
|
virtual void ExitedCxxStack() {}
|
|
|
|
virtual void EnteredCall() {}
|
|
|
|
virtual void ExitedCall() {}
|
|
|
|
|
|
|
|
bool IsOnCxxStack() const;
|
|
|
|
|
2016-10-30 21:26:40 +03:00
|
|
|
virtual RacyInterruptPolicy MediateInterruptRace(const MessageInfo& parent,
|
|
|
|
const MessageInfo& child) {
|
|
|
|
return RIPChildWins;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Return true if windows messages can be handled while waiting for a reply
|
|
|
|
* to a sync IPDL message.
|
|
|
|
*/
|
|
|
|
virtual bool HandleWindowsMessages(const Message& aMsg) const { return true; }
|
|
|
|
|
|
|
|
virtual void OnEnteredSyncSend() {}
|
|
|
|
virtual void OnExitedSyncSend() {}
|
|
|
|
|
|
|
|
virtual void ProcessRemoteNativeEventsInInterruptCall() {}
|
|
|
|
|
2017-05-02 15:10:00 +03:00
|
|
|
virtual void OnChannelReceivedMessage(const Message& aMsg) {}
|
2017-05-10 22:52:20 +03:00
|
|
|
|
2019-06-06 17:57:34 +03:00
|
|
|
void OnIPCChannelOpened() { ActorConnected(); }
|
2017-05-10 22:52:20 +03:00
|
|
|
|
2019-06-06 17:57:34 +03:00
|
|
|
already_AddRefed<nsIEventTarget> GetMessageEventTarget(const Message& aMsg);
|
2018-04-23 21:13:37 +03:00
|
|
|
|
2016-10-29 06:46:59 +03:00
|
|
|
private:
|
2019-06-06 17:57:34 +03:00
|
|
|
base::ProcessId OtherPidMaybeInvalid() const { return mOtherPid; }
|
|
|
|
|
|
|
|
int32_t NextId();
|
2018-03-13 19:54:35 +03:00
|
|
|
|
2020-05-28 18:55:16 +03:00
|
|
|
template <class T>
|
|
|
|
using IDMap = nsDataHashtable<nsUint32HashKey, T>;
|
|
|
|
|
2016-11-02 03:02:48 +03:00
|
|
|
base::ProcessId mOtherPid;
|
2019-06-06 17:57:34 +03:00
|
|
|
|
|
|
|
// NOTE NOTE NOTE
|
|
|
|
// Used to be on mState
|
|
|
|
int32_t mLastLocalId;
|
|
|
|
IDMap<IProtocol*> mActorMap;
|
|
|
|
IDMap<Shmem::SharedMemory*> mShmemMap;
|
|
|
|
|
|
|
|
// XXX: We no longer need mEventTargetMap for Quantum DOM, so it may be
|
|
|
|
// worthwhile to remove it before people start depending on it for other weird
|
|
|
|
// things.
|
|
|
|
Mutex mEventTargetMutex;
|
|
|
|
IDMap<nsCOMPtr<nsIEventTarget>> mEventTargetMap;
|
|
|
|
|
|
|
|
MessageChannel mChannel;
|
2009-07-02 09:45:19 +04:00
|
|
|
};
|
|
|
|
|
2016-06-15 15:49:13 +03:00
|
|
|
class IShmemAllocator {
|
|
|
|
public:
|
|
|
|
virtual bool AllocShmem(size_t aSize,
|
|
|
|
mozilla::ipc::SharedMemory::SharedMemoryType aShmType,
|
|
|
|
mozilla::ipc::Shmem* aShmem) = 0;
|
|
|
|
virtual bool AllocUnsafeShmem(
|
|
|
|
size_t aSize, mozilla::ipc::SharedMemory::SharedMemoryType aShmType,
|
|
|
|
mozilla::ipc::Shmem* aShmem) = 0;
|
|
|
|
virtual bool DeallocShmem(mozilla::ipc::Shmem& aShmem) = 0;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define FORWARD_SHMEM_ALLOCATOR_TO(aImplClass) \
|
|
|
|
virtual bool AllocShmem( \
|
|
|
|
size_t aSize, mozilla::ipc::SharedMemory::SharedMemoryType aShmType, \
|
|
|
|
mozilla::ipc::Shmem* aShmem) override { \
|
|
|
|
return aImplClass::AllocShmem(aSize, aShmType, aShmem); \
|
|
|
|
} \
|
|
|
|
virtual bool AllocUnsafeShmem( \
|
|
|
|
size_t aSize, mozilla::ipc::SharedMemory::SharedMemoryType aShmType, \
|
|
|
|
mozilla::ipc::Shmem* aShmem) override { \
|
|
|
|
return aImplClass::AllocUnsafeShmem(aSize, aShmType, aShmem); \
|
|
|
|
} \
|
|
|
|
virtual bool DeallocShmem(mozilla::ipc::Shmem& aShmem) override { \
|
|
|
|
return aImplClass::DeallocShmem(aShmem); \
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2009-10-29 20:50:28 +03:00
|
|
|
inline bool LoggingEnabled() {
|
2017-02-08 09:08:00 +03:00
|
|
|
#if defined(DEBUG) || defined(FUZZING)
|
2009-10-29 20:50:28 +03:00
|
|
|
return !!PR_GetEnv("MOZ_IPC_MESSAGE_LOG");
|
|
|
|
#else
|
|
|
|
return false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2014-08-20 23:49:11 +04:00
|
|
|
inline bool LoggingEnabledFor(const char* aTopLevelProtocol) {
|
2017-02-14 14:38:22 +03:00
|
|
|
#if defined(DEBUG) || defined(FUZZING)
|
2014-08-20 23:49:11 +04:00
|
|
|
const char* filter = PR_GetEnv("MOZ_IPC_MESSAGE_LOG");
|
|
|
|
if (!filter) {
|
|
|
|
return false;
|
2018-11-30 13:46:48 +03:00
|
|
|
}
|
2014-08-20 23:49:11 +04:00
|
|
|
return strcmp(filter, "1") == 0 || strcmp(filter, aTopLevelProtocol) == 0;
|
2018-11-30 13:46:48 +03:00
|
|
|
#else
|
2014-08-20 23:49:11 +04:00
|
|
|
return false;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2016-03-26 00:02:38 +03:00
|
|
|
MOZ_NEVER_INLINE void LogMessageForProtocol(const char* aTopLevelProtocol,
|
|
|
|
base::ProcessId aOtherPid,
|
|
|
|
const char* aContextDescription,
|
2016-10-13 09:18:45 +03:00
|
|
|
uint32_t aMessageId,
|
2016-03-26 00:02:38 +03:00
|
|
|
MessageDirection aDirection);
|
|
|
|
|
2013-07-24 20:38:24 +04:00
|
|
|
MOZ_NEVER_INLINE void ProtocolErrorBreakpoint(const char* aMsg);
|
2009-12-04 21:45:21 +03:00
|
|
|
|
2016-04-06 17:53:06 +03:00
|
|
|
// The code generator calls this function for errors which come from the
|
|
|
|
// methods of protocols. Doing this saves codesize by making the error
|
|
|
|
// cases significantly smaller.
|
2018-04-23 21:13:36 +03:00
|
|
|
MOZ_NEVER_INLINE void FatalError(const char* aMsg, bool aIsParent);
|
2013-08-22 18:39:32 +04:00
|
|
|
|
2016-04-06 17:53:06 +03:00
|
|
|
// The code generator calls this function for errors which are not
|
|
|
|
// protocol-specific: errors in generated struct methods or errors in
|
|
|
|
// transition functions, for instance. Doing this saves codesize by
|
|
|
|
// by making the error cases significantly smaller.
|
|
|
|
MOZ_NEVER_INLINE void LogicError(const char* aMsg);
|
|
|
|
|
2016-05-21 11:07:56 +03:00
|
|
|
MOZ_NEVER_INLINE void ActorIdReadError(const char* aActorDescription);
|
|
|
|
|
|
|
|
MOZ_NEVER_INLINE void BadActorIdError(const char* aActorDescription);
|
|
|
|
|
|
|
|
MOZ_NEVER_INLINE void ActorLookupError(const char* aActorDescription);
|
|
|
|
|
|
|
|
MOZ_NEVER_INLINE void MismatchedActorTypeError(const char* aActorDescription);
|
|
|
|
|
2016-05-21 11:07:56 +03:00
|
|
|
MOZ_NEVER_INLINE void UnionTypeReadError(const char* aUnionName);
|
|
|
|
|
2016-05-21 11:07:56 +03:00
|
|
|
MOZ_NEVER_INLINE void ArrayLengthReadError(const char* aElementName);
|
|
|
|
|
2017-03-10 00:37:55 +03:00
|
|
|
MOZ_NEVER_INLINE void SentinelReadError(const char* aElementName);
|
|
|
|
|
2011-06-03 22:33:56 +04:00
|
|
|
struct PrivateIPDLInterface {};
|
|
|
|
|
2015-04-01 11:40:35 +03:00
|
|
|
#if defined(XP_WIN)
|
|
|
|
// This is a restricted version of Windows' DuplicateHandle() function
|
|
|
|
// that works inside the sandbox and can send handles but not retrieve
|
|
|
|
// them. Unlike DuplicateHandle(), it takes a process ID rather than
|
|
|
|
// a process handle. It returns true on success, false otherwise.
|
|
|
|
bool DuplicateHandle(HANDLE aSourceHandle, DWORD aTargetProcessId,
|
|
|
|
HANDLE* aTargetHandle, DWORD aDesiredAccess,
|
|
|
|
DWORD aOptions);
|
|
|
|
#endif
|
|
|
|
|
2016-04-01 09:33:52 +03:00
|
|
|
/**
|
2016-04-19 14:08:55 +03:00
|
|
|
* Annotate the crash reporter with the error code from the most recent system
|
|
|
|
* call. Returns the system error.
|
2016-04-01 09:33:52 +03:00
|
|
|
*/
|
|
|
|
void AnnotateSystemError();
|
|
|
|
|
2015-11-01 06:02:08 +03:00
|
|
|
/**
|
|
|
|
* An endpoint represents one end of a partially initialized IPDL channel. To
|
|
|
|
* set up a new top-level protocol:
|
|
|
|
*
|
|
|
|
* Endpoint<PFooParent> parentEp;
|
|
|
|
* Endpoint<PFooChild> childEp;
|
|
|
|
* nsresult rv;
|
|
|
|
* rv = PFoo::CreateEndpoints(parentPid, childPid, &parentEp, &childEp);
|
|
|
|
*
|
|
|
|
* You're required to pass in parentPid and childPid, which are the pids of the
|
|
|
|
* processes in which the parent and child endpoints will be used.
|
|
|
|
*
|
|
|
|
* Endpoints can be passed in IPDL messages or sent to other threads using
|
|
|
|
* PostTask. Once an Endpoint has arrived at its destination process and thread,
|
|
|
|
* you need to create the top-level actor and bind it to the endpoint:
|
|
|
|
*
|
|
|
|
* FooParent* parent = new FooParent();
|
|
|
|
* bool rv1 = parentEp.Bind(parent, processActor);
|
|
|
|
* bool rv2 = parent->SendBar(...);
|
|
|
|
*
|
|
|
|
* (See Bind below for an explanation of processActor.) Once the actor is bound
|
|
|
|
* to the endpoint, it can send and receive messages.
|
|
|
|
*/
|
|
|
|
template <class PFooSide>
|
|
|
|
class Endpoint {
|
|
|
|
public:
|
|
|
|
typedef base::ProcessId ProcessId;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2015-11-01 06:02:08 +03:00
|
|
|
Endpoint()
|
|
|
|
: mValid(false),
|
2018-06-14 08:48:43 +03:00
|
|
|
mMode(static_cast<mozilla::ipc::Transport::Mode>(0)),
|
|
|
|
mMyPid(0),
|
|
|
|
mOtherPid(0) {}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2015-11-01 06:02:08 +03:00
|
|
|
Endpoint(const PrivateIPDLInterface&, mozilla::ipc::Transport::Mode aMode,
|
|
|
|
TransportDescriptor aTransport, ProcessId aMyPid,
|
2017-07-27 20:32:15 +03:00
|
|
|
ProcessId aOtherPid)
|
2015-11-01 06:02:08 +03:00
|
|
|
: mValid(true),
|
|
|
|
mMode(aMode),
|
|
|
|
mTransport(aTransport),
|
|
|
|
mMyPid(aMyPid),
|
|
|
|
mOtherPid(aOtherPid) {}
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2015-11-01 06:02:08 +03:00
|
|
|
Endpoint(Endpoint&& aOther)
|
|
|
|
: mValid(aOther.mValid),
|
|
|
|
mTransport(aOther.mTransport),
|
2018-06-14 08:48:43 +03:00
|
|
|
mMyPid(aOther.mMyPid),
|
2015-11-01 06:02:08 +03:00
|
|
|
mOtherPid(aOther.mOtherPid) {
|
2018-06-14 08:48:43 +03:00
|
|
|
if (aOther.mValid) {
|
2017-10-02 09:03:00 +03:00
|
|
|
mMode = aOther.mMode;
|
2018-11-30 13:46:48 +03:00
|
|
|
}
|
2015-11-01 06:02:08 +03:00
|
|
|
aOther.mValid = false;
|
2018-06-14 08:48:43 +03:00
|
|
|
}
|
2015-11-01 06:02:08 +03:00
|
|
|
|
|
|
|
Endpoint& operator=(Endpoint&& aOther) {
|
|
|
|
mValid = aOther.mValid;
|
2017-10-02 09:03:00 +03:00
|
|
|
if (aOther.mValid) {
|
|
|
|
mMode = aOther.mMode;
|
2015-11-01 06:02:08 +03:00
|
|
|
}
|
|
|
|
mTransport = aOther.mTransport;
|
|
|
|
mMyPid = aOther.mMyPid;
|
|
|
|
mOtherPid = aOther.mOtherPid;
|
|
|
|
|
|
|
|
aOther.mValid = false;
|
|
|
|
return *this;
|
|
|
|
}
|
|
|
|
|
|
|
|
~Endpoint() {
|
|
|
|
if (mValid) {
|
|
|
|
CloseDescriptor(mTransport);
|
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
}
|
2015-11-01 06:02:08 +03:00
|
|
|
|
2016-07-20 10:18:30 +03:00
|
|
|
ProcessId OtherPid() const { return mOtherPid; }
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2015-11-01 06:02:08 +03:00
|
|
|
// This method binds aActor to this endpoint. After this call, the actor can
|
2016-09-02 23:13:50 +03:00
|
|
|
// be used to send and receive messages. The endpoint becomes invalid.
|
|
|
|
bool Bind(PFooSide* aActor) {
|
2015-11-01 06:02:08 +03:00
|
|
|
MOZ_RELEASE_ASSERT(mValid);
|
2020-02-27 20:39:15 +03:00
|
|
|
MOZ_RELEASE_ASSERT(mMyPid == base::GetCurrentProcId());
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2020-02-07 01:41:56 +03:00
|
|
|
UniquePtr<Transport> transport =
|
|
|
|
mozilla::ipc::OpenDescriptor(mTransport, mMode);
|
|
|
|
if (!transport) {
|
2016-07-20 10:18:30 +03:00
|
|
|
return false;
|
2018-11-30 13:46:48 +03:00
|
|
|
}
|
2016-07-07 04:51:20 +03:00
|
|
|
if (!aActor->Open(
|
2020-02-07 01:41:56 +03:00
|
|
|
std::move(transport), mOtherPid, XRE_GetIOMessageLoop(),
|
2015-11-01 06:02:08 +03:00
|
|
|
mMode == Transport::MODE_SERVER ? ParentSide : ChildSide)) {
|
|
|
|
return false;
|
2016-07-20 10:18:30 +03:00
|
|
|
}
|
2015-11-01 06:02:08 +03:00
|
|
|
mValid = false;
|
|
|
|
return true;
|
2018-11-30 13:46:48 +03:00
|
|
|
}
|
2016-07-20 10:18:30 +03:00
|
|
|
|
2018-07-22 14:51:30 +03:00
|
|
|
bool IsValid() const { return mValid; }
|
2015-11-01 06:02:08 +03:00
|
|
|
|
2016-09-20 05:18:20 +03:00
|
|
|
private:
|
|
|
|
friend struct IPC::ParamTraits<Endpoint<PFooSide>>;
|
2015-11-01 06:02:08 +03:00
|
|
|
|
|
|
|
Endpoint(const Endpoint&) = delete;
|
|
|
|
Endpoint& operator=(const Endpoint&) = delete;
|
|
|
|
|
|
|
|
bool mValid;
|
|
|
|
mozilla::ipc::Transport::Mode mMode;
|
|
|
|
TransportDescriptor mTransport;
|
|
|
|
ProcessId mMyPid, mOtherPid;
|
|
|
|
};
|
|
|
|
|
2017-10-10 13:06:35 +03:00
|
|
|
#if defined(XP_MACOSX)
|
Bug 1348273 - Convert crash annotations into a machine-readable list of constants; r=ted.mielczarek,njn,dholbert,mak,cpearce,mcmanus,froydnj,Dexter,jrmuizel,jchen,jimm,bz,surkov
This introduces the machinery needed to generate crash annotations from a YAML
file. The relevant C++ functions are updated to take a typed enum. JavaScript
calls are unaffected but they will throw if the string argument does not
correspond to one of the known entries in the C++ enum. The existing whitelists
and blacklists of annotations are also generated from the YAML file and all
duplicate code related to them has been consolidated. Once written out to the
.extra file the annotations are converted in string form and are no different
than the existing ones.
All existing annotations have been included in the list (and some obsolete ones
have been removed) and all call sites have been updated including tests where
appropriate.
--HG--
extra : source : 4f6c43f2830701ec5552e08e3f1b06fe6d045860
2018-07-05 16:42:11 +03:00
|
|
|
void AnnotateCrashReportWithErrno(CrashReporter::Annotation tag, int error);
|
2016-08-23 08:52:04 +03:00
|
|
|
#else
|
Bug 1348273 - Convert crash annotations into a machine-readable list of constants; r=ted.mielczarek,njn,dholbert,mak,cpearce,mcmanus,froydnj,Dexter,jrmuizel,jchen,jimm,bz,surkov
This introduces the machinery needed to generate crash annotations from a YAML
file. The relevant C++ functions are updated to take a typed enum. JavaScript
calls are unaffected but they will throw if the string argument does not
correspond to one of the known entries in the C++ enum. The existing whitelists
and blacklists of annotations are also generated from the YAML file and all
duplicate code related to them has been consolidated. Once written out to the
.extra file the annotations are converted in string form and are no different
than the existing ones.
All existing annotations have been included in the list (and some obsolete ones
have been removed) and all call sites have been updated including tests where
appropriate.
--HG--
extra : source : 4f6c43f2830701ec5552e08e3f1b06fe6d045860
2018-07-05 16:42:11 +03:00
|
|
|
static inline void AnnotateCrashReportWithErrno(CrashReporter::Annotation tag,
|
|
|
|
int error) {}
|
2016-08-23 08:52:04 +03:00
|
|
|
#endif
|
|
|
|
|
2015-11-01 06:02:08 +03:00
|
|
|
// This function is used internally to create a pair of Endpoints. See the
|
|
|
|
// comment above Endpoint for a description of how it might be used.
|
|
|
|
template <class PFooParent, class PFooChild>
|
|
|
|
nsresult CreateEndpoints(const PrivateIPDLInterface& aPrivate,
|
|
|
|
base::ProcessId aParentDestPid,
|
|
|
|
base::ProcessId aChildDestPid,
|
|
|
|
Endpoint<PFooParent>* aParentEndpoint,
|
|
|
|
Endpoint<PFooChild>* aChildEndpoint) {
|
|
|
|
MOZ_RELEASE_ASSERT(aParentDestPid);
|
|
|
|
MOZ_RELEASE_ASSERT(aChildDestPid);
|
|
|
|
|
|
|
|
TransportDescriptor parentTransport, childTransport;
|
|
|
|
nsresult rv;
|
|
|
|
if (NS_FAILED(rv = CreateTransport(aParentDestPid, &parentTransport,
|
|
|
|
&childTransport))) {
|
Bug 1348273 - Convert crash annotations into a machine-readable list of constants; r=ted.mielczarek,njn,dholbert,mak,cpearce,mcmanus,froydnj,Dexter,jrmuizel,jchen,jimm,bz,surkov
This introduces the machinery needed to generate crash annotations from a YAML
file. The relevant C++ functions are updated to take a typed enum. JavaScript
calls are unaffected but they will throw if the string argument does not
correspond to one of the known entries in the C++ enum. The existing whitelists
and blacklists of annotations are also generated from the YAML file and all
duplicate code related to them has been consolidated. Once written out to the
.extra file the annotations are converted in string form and are no different
than the existing ones.
All existing annotations have been included in the list (and some obsolete ones
have been removed) and all call sites have been updated including tests where
appropriate.
--HG--
extra : source : 4f6c43f2830701ec5552e08e3f1b06fe6d045860
2018-07-05 16:42:11 +03:00
|
|
|
AnnotateCrashReportWithErrno(
|
|
|
|
CrashReporter::Annotation::IpcCreateEndpointsNsresult, int(rv));
|
2015-11-01 06:02:08 +03:00
|
|
|
return rv;
|
|
|
|
}
|
|
|
|
|
|
|
|
*aParentEndpoint =
|
|
|
|
Endpoint<PFooParent>(aPrivate, mozilla::ipc::Transport::MODE_SERVER,
|
2017-07-27 20:32:15 +03:00
|
|
|
parentTransport, aParentDestPid, aChildDestPid);
|
2015-11-01 06:02:08 +03:00
|
|
|
|
|
|
|
*aChildEndpoint =
|
|
|
|
Endpoint<PFooChild>(aPrivate, mozilla::ipc::Transport::MODE_CLIENT,
|
2017-07-27 20:32:15 +03:00
|
|
|
childTransport, aChildDestPid, aParentDestPid);
|
2015-11-01 06:02:08 +03:00
|
|
|
|
|
|
|
return NS_OK;
|
|
|
|
}
|
|
|
|
|
2019-03-28 23:02:50 +03:00
|
|
|
/**
|
|
|
|
* A managed endpoint represents one end of a partially initialized managed
|
|
|
|
* IPDL actor. It is used for situations where the usual IPDL Constructor
|
|
|
|
* methods do not give sufficient control over the construction of actors, such
|
|
|
|
* as when constructing actors within replies, or constructing multiple related
|
|
|
|
* actors simultaneously.
|
|
|
|
*
|
|
|
|
* FooParent* parent = new FooParent();
|
|
|
|
* ManagedEndpoint<PFooChild> childEp = parentMgr->OpenPFooEndpoint(parent);
|
|
|
|
*
|
|
|
|
* ManagedEndpoints should be sent using IPDL messages or other mechanisms to
|
|
|
|
* the other side of the manager channel. Once the ManagedEndpoint has arrived
|
|
|
|
* at its destination, you can create the actor, and bind it to the endpoint.
|
|
|
|
*
|
|
|
|
* FooChild* child = new FooChild();
|
|
|
|
* childMgr->BindPFooEndpoint(childEp, child);
|
|
|
|
*
|
|
|
|
* WARNING: If the remote side of an endpoint has not been bound before it
|
|
|
|
* begins to receive messages, an IPC routing error will occur, likely causing
|
|
|
|
* a browser crash.
|
|
|
|
*/
|
|
|
|
template <class PFooSide>
|
|
|
|
class ManagedEndpoint {
|
|
|
|
public:
|
|
|
|
ManagedEndpoint() : mId(0) {}
|
|
|
|
|
|
|
|
ManagedEndpoint(const PrivateIPDLInterface&, int32_t aId) : mId(aId) {}
|
|
|
|
|
|
|
|
ManagedEndpoint(ManagedEndpoint&& aOther) : mId(aOther.mId) {
|
|
|
|
aOther.mId = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
ManagedEndpoint& operator=(ManagedEndpoint&& aOther) {
|
|
|
|
mId = aOther.mId;
|
|
|
|
aOther.mId = 0;
|
|
|
|
return *this;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool IsValid() const { return mId != 0; }
|
|
|
|
|
|
|
|
Maybe<int32_t> ActorId() const { return IsValid() ? Some(mId) : Nothing(); }
|
|
|
|
|
2019-03-05 17:46:10 +03:00
|
|
|
bool operator==(const ManagedEndpoint& _o) const { return mId == _o.mId; }
|
|
|
|
|
2019-03-28 23:02:50 +03:00
|
|
|
private:
|
|
|
|
friend struct IPC::ParamTraits<ManagedEndpoint<PFooSide>>;
|
|
|
|
|
|
|
|
ManagedEndpoint(const ManagedEndpoint&) = delete;
|
|
|
|
ManagedEndpoint& operator=(const ManagedEndpoint&) = delete;
|
|
|
|
|
|
|
|
// The routing ID for the to-be-created endpoint.
|
|
|
|
int32_t mId;
|
|
|
|
|
|
|
|
// XXX(nika): Might be nice to have other info for assertions?
|
|
|
|
// e.g. mManagerId, mManagerType, etc.
|
|
|
|
};
|
|
|
|
|
2019-05-21 20:04:14 +03:00
|
|
|
// The ActorLifecycleProxy is a helper type used internally by IPC to maintain a
|
|
|
|
// maybe-owning reference to an IProtocol object. For well-behaved actors
|
|
|
|
// which are not freed until after their `Dealloc` method is called, a
|
|
|
|
// reference to an actor's `ActorLifecycleProxy` object is an owning one, as the
|
|
|
|
// `Dealloc` method will only be called when all references to the
|
|
|
|
// `ActorLifecycleProxy` are released.
|
|
|
|
//
|
|
|
|
// Unfortunately, some actors may be destroyed before their `Dealloc` method
|
|
|
|
// is called. For these actors, `ActorLifecycleProxy` acts as a weak pointer,
|
|
|
|
// and will begin to return `nullptr` from its `Get()` method once the
|
|
|
|
// corresponding actor object has been destroyed.
|
|
|
|
//
|
|
|
|
// When calling a `Recv` method, IPC will hold a `ActorLifecycleProxy` reference
|
|
|
|
// to the target actor, meaning that well-behaved actors can behave as though a
|
|
|
|
// strong reference is being held.
|
|
|
|
//
|
|
|
|
// Generic IPC code MUST treat ActorLifecycleProxy references as weak
|
|
|
|
// references!
|
|
|
|
class ActorLifecycleProxy {
|
|
|
|
public:
|
|
|
|
NS_INLINE_DECL_REFCOUNTING(ActorLifecycleProxy)
|
|
|
|
|
|
|
|
IProtocol* Get() { return mActor; }
|
|
|
|
|
|
|
|
private:
|
|
|
|
friend class IProtocol;
|
|
|
|
|
|
|
|
explicit ActorLifecycleProxy(IProtocol* aActor);
|
|
|
|
~ActorLifecycleProxy();
|
|
|
|
|
|
|
|
ActorLifecycleProxy(const ActorLifecycleProxy&) = delete;
|
|
|
|
ActorLifecycleProxy& operator=(const ActorLifecycleProxy&) = delete;
|
|
|
|
|
|
|
|
IProtocol* MOZ_NON_OWNING_REF mActor;
|
|
|
|
|
|
|
|
// Hold a reference to the actor's manager's ActorLifecycleProxy to help
|
|
|
|
// prevent it from dying while we're still alive!
|
|
|
|
RefPtr<ActorLifecycleProxy> mManager;
|
|
|
|
};
|
|
|
|
|
2016-08-30 03:41:22 +03:00
|
|
|
void TableToArray(const nsTHashtable<nsPtrHashKey<void>>& aTable,
|
|
|
|
nsTArray<void*>& aArray);
|
|
|
|
|
2009-07-02 09:45:19 +04:00
|
|
|
} // namespace ipc
|
2015-10-08 03:15:56 +03:00
|
|
|
|
2015-10-07 21:30:33 +03:00
|
|
|
template <typename Protocol>
|
2016-08-30 03:41:22 +03:00
|
|
|
class ManagedContainer : public nsTHashtable<nsPtrHashKey<Protocol>> {
|
|
|
|
typedef nsTHashtable<nsPtrHashKey<Protocol>> BaseClass;
|
|
|
|
|
|
|
|
public:
|
|
|
|
// Having the core logic work on void pointers, rather than typed pointers,
|
|
|
|
// means that we can have one instance of this code out-of-line, rather
|
|
|
|
// than several hundred instances of this code out-of-lined. (Those
|
|
|
|
// repeated instances don't necessarily get folded together by the linker
|
|
|
|
// because they contain member offsets and such that differ between the
|
|
|
|
// functions.) We do have to pay for it with some eye-bleedingly bad casts,
|
|
|
|
// though.
|
|
|
|
void ToArray(nsTArray<Protocol*>& aArray) const {
|
|
|
|
::mozilla::ipc::TableToArray(
|
|
|
|
*reinterpret_cast<const nsTHashtable<nsPtrHashKey<void>>*>(
|
|
|
|
static_cast<const BaseClass*>(this)),
|
|
|
|
reinterpret_cast<nsTArray<void*>&>(aArray));
|
|
|
|
}
|
|
|
|
};
|
2015-10-07 21:30:33 +03:00
|
|
|
|
2015-10-08 03:15:56 +03:00
|
|
|
template <typename Protocol>
|
2015-12-22 18:14:23 +03:00
|
|
|
Protocol* LoneManagedOrNullAsserts(
|
|
|
|
const ManagedContainer<Protocol>& aManagees) {
|
2015-10-07 21:30:33 +03:00
|
|
|
if (aManagees.IsEmpty()) {
|
2015-10-08 03:15:56 +03:00
|
|
|
return nullptr;
|
|
|
|
}
|
2015-10-07 21:30:33 +03:00
|
|
|
MOZ_ASSERT(aManagees.Count() == 1);
|
|
|
|
return aManagees.ConstIter().Get()->GetKey();
|
2015-10-08 03:15:56 +03:00
|
|
|
}
|
|
|
|
|
2015-12-22 18:14:23 +03:00
|
|
|
template <typename Protocol>
|
|
|
|
Protocol* SingleManagedOrNull(const ManagedContainer<Protocol>& aManagees) {
|
|
|
|
if (aManagees.Count() != 1) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
|
|
|
return aManagees.ConstIter().Get()->GetKey();
|
|
|
|
}
|
|
|
|
|
2009-07-02 09:45:19 +04:00
|
|
|
} // namespace mozilla
|
|
|
|
|
|
|
|
namespace IPC {
|
|
|
|
|
|
|
|
template <>
|
|
|
|
struct ParamTraits<mozilla::ipc::ActorHandle> {
|
2009-07-25 03:24:27 +04:00
|
|
|
typedef mozilla::ipc::ActorHandle paramType;
|
|
|
|
|
|
|
|
static void Write(Message* aMsg, const paramType& aParam) {
|
|
|
|
IPC::WriteParam(aMsg, aParam.mId);
|
|
|
|
}
|
|
|
|
|
2016-04-21 07:09:15 +03:00
|
|
|
static bool Read(const Message* aMsg, PickleIterator* aIter,
|
|
|
|
paramType* aResult) {
|
2009-07-25 03:24:27 +04:00
|
|
|
int id;
|
|
|
|
if (IPC::ReadParam(aMsg, aIter, &id)) {
|
|
|
|
aResult->mId = id;
|
|
|
|
return true;
|
2009-07-02 09:45:19 +04:00
|
|
|
}
|
2015-11-01 06:02:08 +03:00
|
|
|
return false;
|
2018-11-30 13:46:48 +03:00
|
|
|
}
|
2009-07-02 09:45:19 +04:00
|
|
|
|
2009-07-25 03:24:27 +04:00
|
|
|
static void Log(const paramType& aParam, std::wstring* aLog) {
|
|
|
|
aLog->append(StringPrintf(L"(%d)", aParam.mId));
|
|
|
|
}
|
2009-07-02 09:45:19 +04:00
|
|
|
};
|
|
|
|
|
2015-11-01 06:02:08 +03:00
|
|
|
template <class PFooSide>
|
|
|
|
struct ParamTraits<mozilla::ipc::Endpoint<PFooSide>> {
|
|
|
|
typedef mozilla::ipc::Endpoint<PFooSide> paramType;
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2015-11-01 06:02:08 +03:00
|
|
|
static void Write(Message* aMsg, const paramType& aParam) {
|
2016-09-20 05:18:20 +03:00
|
|
|
IPC::WriteParam(aMsg, aParam.mValid);
|
|
|
|
if (!aParam.mValid) {
|
2015-11-01 06:02:08 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2016-04-21 07:09:15 +03:00
|
|
|
IPC::WriteParam(aMsg, static_cast<uint32_t>(aParam.mMode));
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2016-04-21 07:09:15 +03:00
|
|
|
// We duplicate the descriptor so that our own file descriptor remains
|
|
|
|
// valid after the write. An alternative would be to set
|
|
|
|
// aParam.mTransport.mValid to false, but that won't work because aParam
|
2016-09-20 05:18:20 +03:00
|
|
|
// is const.
|
2015-11-01 06:02:08 +03:00
|
|
|
mozilla::ipc::TransportDescriptor desc =
|
|
|
|
mozilla::ipc::DuplicateDescriptor(aParam.mTransport);
|
|
|
|
IPC::WriteParam(aMsg, desc);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2015-11-01 06:02:08 +03:00
|
|
|
IPC::WriteParam(aMsg, aParam.mMyPid);
|
|
|
|
IPC::WriteParam(aMsg, aParam.mOtherPid);
|
2018-11-30 13:46:48 +03:00
|
|
|
}
|
|
|
|
|
2015-11-01 06:02:08 +03:00
|
|
|
static bool Read(const Message* aMsg, PickleIterator* aIter,
|
|
|
|
paramType* aResult) {
|
|
|
|
MOZ_RELEASE_ASSERT(!aResult->mValid);
|
2018-11-30 13:46:48 +03:00
|
|
|
|
2017-07-27 20:32:15 +03:00
|
|
|
if (!IPC::ReadParam(aMsg, aIter, &aResult->mValid)) {
|
2015-11-01 06:02:08 +03:00
|
|
|
return false;
|
|
|
|
}
|
2016-01-06 01:19:43 +03:00
|
|
|
if (!aResult->mValid) {
|
|
|
|
// Object is empty, but read succeeded.
|
2015-11-01 06:02:08 +03:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t mode;
|
|
|
|
if (!IPC::ReadParam(aMsg, aIter, &mode) ||
|
|
|
|
!IPC::ReadParam(aMsg, aIter, &aResult->mTransport) ||
|
|
|
|
!IPC::ReadParam(aMsg, aIter, &aResult->mMyPid) ||
|
|
|
|
!IPC::ReadParam(aMsg, aIter, &aResult->mOtherPid)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
aResult->mMode = Channel::Mode(mode);
|
2016-09-20 05:18:20 +03:00
|
|
|
return true;
|
2015-11-01 06:02:08 +03:00
|
|
|
}
|
|
|
|
|
2009-07-02 09:45:19 +04:00
|
|
|
static void Log(const paramType& aParam, std::wstring* aLog) {
|
2015-11-01 06:02:08 +03:00
|
|
|
aLog->append(StringPrintf(L"Endpoint"));
|
2009-07-02 09:45:19 +04:00
|
|
|
}
|
2018-11-30 13:46:48 +03:00
|
|
|
};
|
2009-07-02 09:45:19 +04:00
|
|
|
|
2019-03-28 23:02:50 +03:00
|
|
|
template <class PFooSide>
|
|
|
|
struct ParamTraits<mozilla::ipc::ManagedEndpoint<PFooSide>> {
|
|
|
|
typedef mozilla::ipc::ManagedEndpoint<PFooSide> paramType;
|
|
|
|
|
|
|
|
static void Write(Message* aMsg, const paramType& aParam) {
|
|
|
|
IPC::WriteParam(aMsg, aParam.mId);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool Read(const Message* aMsg, PickleIterator* aIter,
|
|
|
|
paramType* aResult) {
|
|
|
|
MOZ_RELEASE_ASSERT(aResult->mId == 0);
|
|
|
|
|
|
|
|
if (!IPC::ReadParam(aMsg, aIter, &aResult->mId)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void Log(const paramType& aParam, std::wstring* aLog) {
|
|
|
|
aLog->append(StringPrintf(L"ManagedEndpoint"));
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2009-07-02 09:45:19 +04:00
|
|
|
} // namespace IPC
|
|
|
|
|
|
|
|
#endif // mozilla_ipc_ProtocolUtils_h
|