mirror of
https://github.com/mozilla/gecko-dev.git
synced 2024-12-02 10:00:54 +00:00
b280988bb5
Differential Revision: https://phabricator.services.mozilla.com/D82353
293 lines
8.1 KiB
C++
293 lines
8.1 KiB
C++
/* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
|
|
/* This Source Code Form is subject to the terms of the Mozilla Public
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
* file, You can obtain one at http://mozilla.org/MPL/2.0/. */
|
|
|
|
#include "SocketProcessHost.h"
|
|
|
|
#include "ProcessUtils.h"
|
|
#include "SocketProcessParent.h"
|
|
#include "mozilla/ipc/FileDescriptor.h"
|
|
#include "nsAppRunner.h"
|
|
#include "nsIOService.h"
|
|
#include "nsIObserverService.h"
|
|
|
|
#if defined(XP_LINUX) && defined(MOZ_SANDBOX)
|
|
# include "mozilla/SandboxBroker.h"
|
|
# include "mozilla/SandboxBrokerPolicyFactory.h"
|
|
# include "mozilla/SandboxSettings.h"
|
|
#endif
|
|
|
|
#ifdef MOZ_GECKO_PROFILER
|
|
# include "ProfilerParent.h"
|
|
#endif
|
|
|
|
#if defined(XP_MACOSX) && defined(MOZ_SANDBOX)
|
|
# include "mozilla/Sandbox.h"
|
|
#endif
|
|
|
|
using namespace mozilla::ipc;
|
|
|
|
namespace mozilla {
|
|
namespace net {
|
|
|
|
#if defined(XP_MACOSX) && defined(MOZ_SANDBOX)
|
|
bool SocketProcessHost::sLaunchWithMacSandbox = false;
|
|
#endif
|
|
|
|
SocketProcessHost::SocketProcessHost(Listener* aListener)
|
|
: GeckoChildProcessHost(GeckoProcessType_Socket),
|
|
mListener(aListener),
|
|
mTaskFactory(this),
|
|
mLaunchPhase(LaunchPhase::Unlaunched),
|
|
mShutdownRequested(false),
|
|
mChannelClosed(false) {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
MOZ_COUNT_CTOR(SocketProcessHost);
|
|
#if defined(XP_MACOSX) && defined(MOZ_SANDBOX)
|
|
if (!sLaunchWithMacSandbox) {
|
|
sLaunchWithMacSandbox =
|
|
(PR_GetEnv("MOZ_DISABLE_SOCKET_PROCESS_SANDBOX") == nullptr);
|
|
}
|
|
mDisableOSActivityMode = sLaunchWithMacSandbox;
|
|
#endif
|
|
}
|
|
|
|
SocketProcessHost::~SocketProcessHost() { MOZ_COUNT_DTOR(SocketProcessHost); }
|
|
|
|
bool SocketProcessHost::Launch() {
|
|
MOZ_ASSERT(mLaunchPhase == LaunchPhase::Unlaunched);
|
|
MOZ_ASSERT(!mSocketProcessParent);
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
std::vector<std::string> extraArgs;
|
|
|
|
nsAutoCString parentBuildID(mozilla::PlatformBuildID());
|
|
extraArgs.push_back("-parentBuildID");
|
|
extraArgs.push_back(parentBuildID.get());
|
|
|
|
SharedPreferenceSerializer prefSerializer;
|
|
if (!prefSerializer.SerializeToSharedMemory()) {
|
|
return false;
|
|
}
|
|
prefSerializer.AddSharedPrefCmdLineArgs(*this, extraArgs);
|
|
|
|
mLaunchPhase = LaunchPhase::Waiting;
|
|
if (!GeckoChildProcessHost::LaunchAndWaitForProcessHandle(extraArgs)) {
|
|
mLaunchPhase = LaunchPhase::Complete;
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
void SocketProcessHost::OnChannelConnected(int32_t peer_pid) {
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
|
|
|
GeckoChildProcessHost::OnChannelConnected(peer_pid);
|
|
|
|
// Post a task to the main thread. Take the lock because mTaskFactory is not
|
|
// thread-safe.
|
|
RefPtr<Runnable> runnable;
|
|
{
|
|
MonitorAutoLock lock(mMonitor);
|
|
runnable = mTaskFactory.NewRunnableMethod(
|
|
&SocketProcessHost::OnChannelConnectedTask);
|
|
}
|
|
NS_DispatchToMainThread(runnable);
|
|
}
|
|
|
|
void SocketProcessHost::OnChannelError() {
|
|
MOZ_ASSERT(!NS_IsMainThread());
|
|
GeckoChildProcessHost::OnChannelError();
|
|
|
|
// Post a task to the main thread. Take the lock because mTaskFactory is not
|
|
// thread-safe.
|
|
RefPtr<Runnable> runnable;
|
|
{
|
|
MonitorAutoLock lock(mMonitor);
|
|
runnable =
|
|
mTaskFactory.NewRunnableMethod(&SocketProcessHost::OnChannelErrorTask);
|
|
}
|
|
NS_DispatchToMainThread(runnable);
|
|
}
|
|
|
|
void SocketProcessHost::OnChannelConnectedTask() {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
if (mLaunchPhase == LaunchPhase::Waiting) {
|
|
InitAfterConnect(true);
|
|
}
|
|
}
|
|
|
|
void SocketProcessHost::OnChannelErrorTask() {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
if (mLaunchPhase == LaunchPhase::Waiting) {
|
|
InitAfterConnect(false);
|
|
}
|
|
}
|
|
|
|
void SocketProcessHost::InitAfterConnect(bool aSucceeded) {
|
|
MOZ_ASSERT(mLaunchPhase == LaunchPhase::Waiting);
|
|
MOZ_ASSERT(!mSocketProcessParent);
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
mLaunchPhase = LaunchPhase::Complete;
|
|
if (!aSucceeded) {
|
|
if (mListener) {
|
|
mListener->OnProcessLaunchComplete(this, false);
|
|
}
|
|
return;
|
|
}
|
|
|
|
mSocketProcessParent = MakeUnique<SocketProcessParent>(this);
|
|
DebugOnly<bool> rv = mSocketProcessParent->Open(
|
|
TakeChannel(), base::GetProcId(GetChildProcessHandle()));
|
|
MOZ_ASSERT(rv);
|
|
|
|
SocketPorcessInitAttributes attributes;
|
|
nsCOMPtr<nsIIOService> ioService(do_GetIOService());
|
|
MOZ_ASSERT(ioService, "No IO service?");
|
|
DebugOnly<nsresult> result = ioService->GetOffline(&attributes.mOffline());
|
|
MOZ_ASSERT(NS_SUCCEEDED(result), "Failed getting offline?");
|
|
result = ioService->GetConnectivity(&attributes.mConnectivity());
|
|
MOZ_ASSERT(NS_SUCCEEDED(result), "Failed getting connectivity?");
|
|
|
|
attributes.mInitSandbox() = false;
|
|
|
|
#if defined(XP_LINUX) && defined(MOZ_SANDBOX)
|
|
if (GetEffectiveSocketProcessSandboxLevel() > 0) {
|
|
auto policy = SandboxBrokerPolicyFactory::GetSocketProcessPolicy(
|
|
GetActor()->OtherPid());
|
|
if (policy != nullptr) {
|
|
attributes.mSandboxBroker() = Some(FileDescriptor());
|
|
mSandboxBroker =
|
|
SandboxBroker::Create(std::move(policy), GetActor()->OtherPid(),
|
|
attributes.mSandboxBroker().ref());
|
|
// This is unlikely to fail and probably indicates OS resource
|
|
// exhaustion.
|
|
Unused << NS_WARN_IF(mSandboxBroker == nullptr);
|
|
MOZ_ASSERT(attributes.mSandboxBroker().ref().IsValid());
|
|
}
|
|
attributes.mInitSandbox() = true;
|
|
}
|
|
#endif // XP_LINUX && MOZ_SANDBOX
|
|
|
|
Unused << GetActor()->SendInit(attributes);
|
|
|
|
#ifdef MOZ_GECKO_PROFILER
|
|
Unused << GetActor()->SendInitProfiler(
|
|
ProfilerParent::CreateForProcess(GetActor()->OtherPid()));
|
|
#endif
|
|
|
|
if (mListener) {
|
|
mListener->OnProcessLaunchComplete(this, true);
|
|
}
|
|
}
|
|
|
|
void SocketProcessHost::Shutdown() {
|
|
MOZ_ASSERT(!mShutdownRequested);
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
mListener = nullptr;
|
|
|
|
if (mSocketProcessParent) {
|
|
// OnChannelClosed uses this to check if the shutdown was expected or
|
|
// unexpected.
|
|
mShutdownRequested = true;
|
|
|
|
// The channel might already be closed if we got here unexpectedly.
|
|
if (!mChannelClosed) {
|
|
mSocketProcessParent->Close();
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
DestroyProcess();
|
|
}
|
|
|
|
void SocketProcessHost::OnChannelClosed() {
|
|
MOZ_ASSERT(NS_IsMainThread());
|
|
|
|
mChannelClosed = true;
|
|
|
|
if (!mShutdownRequested && mListener) {
|
|
// This is an unclean shutdown. Notify our listener that we're going away.
|
|
mListener->OnProcessUnexpectedShutdown(this);
|
|
} else {
|
|
DestroyProcess();
|
|
}
|
|
|
|
// Release the actor.
|
|
SocketProcessParent::Destroy(std::move(mSocketProcessParent));
|
|
MOZ_ASSERT(!mSocketProcessParent);
|
|
}
|
|
|
|
void SocketProcessHost::DestroyProcess() {
|
|
{
|
|
MonitorAutoLock lock(mMonitor);
|
|
mTaskFactory.RevokeAll();
|
|
}
|
|
|
|
GetCurrentSerialEventTarget()->Dispatch(NS_NewRunnableFunction(
|
|
"DestroySocketProcessRunnable", [this] { Destroy(); }));
|
|
}
|
|
|
|
#if defined(XP_MACOSX) && defined(MOZ_SANDBOX)
|
|
bool SocketProcessHost::FillMacSandboxInfo(MacSandboxInfo& aInfo) {
|
|
GeckoChildProcessHost::FillMacSandboxInfo(aInfo);
|
|
if (!aInfo.shouldLog && PR_GetEnv("MOZ_SANDBOX_SOCKET_PROCESS_LOGGING")) {
|
|
aInfo.shouldLog = true;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
/* static */
|
|
MacSandboxType SocketProcessHost::GetMacSandboxType() {
|
|
return MacSandboxType_Socket;
|
|
}
|
|
#endif
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// SocketProcessMemoryReporter
|
|
//-----------------------------------------------------------------------------
|
|
|
|
bool SocketProcessMemoryReporter::IsAlive() const {
|
|
MOZ_ASSERT(gIOService);
|
|
|
|
if (!gIOService->mSocketProcess) {
|
|
return false;
|
|
}
|
|
|
|
return gIOService->mSocketProcess->IsConnected();
|
|
}
|
|
|
|
bool SocketProcessMemoryReporter::SendRequestMemoryReport(
|
|
const uint32_t& aGeneration, const bool& aAnonymize,
|
|
const bool& aMinimizeMemoryUsage,
|
|
const Maybe<ipc::FileDescriptor>& aDMDFile) {
|
|
MOZ_ASSERT(gIOService);
|
|
|
|
if (!gIOService->mSocketProcess) {
|
|
return false;
|
|
}
|
|
|
|
SocketProcessParent* actor = gIOService->mSocketProcess->GetActor();
|
|
if (!actor) {
|
|
return false;
|
|
}
|
|
|
|
return actor->SendRequestMemoryReport(aGeneration, aAnonymize,
|
|
aMinimizeMemoryUsage, aDMDFile);
|
|
}
|
|
|
|
int32_t SocketProcessMemoryReporter::Pid() const {
|
|
MOZ_ASSERT(gIOService);
|
|
return gIOService->SocketProcessPid();
|
|
}
|
|
|
|
} // namespace net
|
|
} // namespace mozilla
|