1 /* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* vim: set ts=8 sts=2 et sw=2 tw=80: */
3 /* This Source Code Form is subject to the terms of the Mozilla Public
4 * License, v. 2.0. If a copy of the MPL was not distributed with this
5 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
7 #ifndef __IPC_GLUE_GECKOCHILDPROCESSHOST_H__
8 #define __IPC_GLUE_GECKOCHILDPROCESSHOST_H__
10 #include "base/file_path.h"
11 #include "base/process_util.h"
12 #include "base/waitable_event.h"
13 #include "chrome/common/ipc_message.h"
14 #include "mojo/core/ports/port_ref.h"
16 #include "mozilla/ipc/Endpoint.h"
17 #include "mozilla/ipc/FileDescriptor.h"
18 #include "mozilla/ipc/NodeChannel.h"
19 #include "mozilla/ipc/LaunchError.h"
20 #include "mozilla/ipc/ScopedPort.h"
21 #include "mozilla/Atomics.h"
22 #include "mozilla/Buffer.h"
23 #include "mozilla/LinkedList.h"
24 #include "mozilla/Monitor.h"
25 #include "mozilla/MozPromise.h"
26 #include "mozilla/RWLock.h"
27 #include "mozilla/StaticMutex.h"
28 #include "mozilla/StaticPtr.h"
29 #include "mozilla/UniquePtr.h"
32 #include "nsExceptionHandler.h"
33 #include "nsXULAppAPI.h" // for GeckoProcessType
36 #if defined(XP_WIN) && defined(MOZ_SANDBOX)
37 # include "sandboxBroker.h"
40 #if defined(XP_MACOSX) && defined(MOZ_SANDBOX)
41 # include "mozilla/Sandbox.h"
44 #if defined(MOZ_SANDBOX)
45 # include "mozilla/ipc/UtilityProcessSandboxing.h"
48 #if (defined(XP_WIN) && defined(_ARM64_)) || \
49 (defined(XP_MACOSX) && defined(__aarch64__))
50 # define ALLOW_GECKO_CHILD_PROCESS_ARCH
53 struct _MacSandboxInfo
;
54 typedef _MacSandboxInfo MacSandboxInfo
;
59 typedef mozilla::MozPromise
<base::ProcessHandle
, LaunchError
, false>
62 class GeckoChildProcessHost
: public SupportsWeakPtr
,
63 public LinkedListElement
<GeckoChildProcessHost
> {
65 typedef mozilla::Monitor Monitor
;
66 typedef std::vector
<std::string
> StringVector
;
69 using ProcessId
= base::ProcessId
;
70 using ProcessHandle
= base::ProcessHandle
;
72 explicit GeckoChildProcessHost(GeckoProcessType aProcessType
,
73 bool aIsFileContent
= false);
75 // Causes the object to be deleted, on the I/O thread, after any
76 // pending asynchronous work (like launching) is complete. This
77 // method can be called from any thread. If called from the I/O
78 // thread itself, deletion won't happen until the event loop spins;
79 // otherwise, it could happen immediately.
81 // GeckoChildProcessHost instances must not be deleted except
82 // through this method.
85 static uint32_t GetUniqueID();
87 // Call this before launching to set an environment variable for the
88 // child process. The arguments must be UTF-8.
89 void SetEnv(const char* aKey
, const char* aValue
);
91 // Does not block. The IPC channel may not be initialized yet, and
92 // the child process may or may not have been created when this
94 bool AsyncLaunch(StringVector aExtraOpts
= StringVector());
96 virtual bool WaitUntilConnected(int32_t aTimeoutMs
= 0);
98 // Block until the IPC channel for our subprocess is initialized and
99 // the OS process is created. The subprocess may or may not have
100 // connected back to us when this method returns.
102 // NB: on POSIX, this method is relatively cheap, and doesn't
103 // require disk IO. On win32 however, it requires at least the
104 // analogue of stat(). This difference induces a semantic
105 // difference in this method: on POSIX, when we return, we know the
106 // subprocess has been created, but we don't know whether its
107 // executable image can be loaded. On win32, we do know that when
108 // we return. But we don't know if dynamic linking succeeded on
110 bool LaunchAndWaitForProcessHandle(StringVector aExtraOpts
= StringVector());
111 bool WaitForProcessHandle();
113 // Block until the child process has been created and it connects to
114 // the IPC channel, meaning it's fully initialized. (Or until an
116 bool SyncLaunch(StringVector aExtraOpts
= StringVector(),
117 int32_t timeoutMs
= 0);
119 virtual void OnChannelConnected(base::ProcessId peer_pid
);
121 // Resolves to the process handle when it's available (see
122 // LaunchAndWaitForProcessHandle); use with AsyncLaunch.
123 RefPtr
<ProcessHandlePromise
> WhenProcessHandleReady();
125 void InitializeChannel(IPC::Channel::ChannelHandle
&& aServerHandle
);
127 virtual bool CanShutdown() { return true; }
129 UntypedEndpoint
TakeInitialEndpoint() {
130 return UntypedEndpoint
{PrivateIPDLInterface
{}, std::move(mInitialPort
),
131 mInitialChannelId
, base::GetCurrentProcId(),
132 GetChildProcessId()};
135 // Returns a "borrowed" handle to the child process - the handle returned
136 // by this function must not be closed by the caller. The handle is also
137 // not guaranteed to remain valid; if the caller is using it for anything
138 // more than logging or asserting non-null, it will need to deal with
141 // Warning: the null value here is 0, not kInvalidProcessHandle.
142 ProcessHandle
GetChildProcessHandle();
144 // Returns the child's process ID; as for GetChildProcessHandle, there is
145 // no inherent guarantee that it will remain valid or continue to
146 // reference the same process.
148 // The null value here is also 0; this matches the result of
149 // GetProcId on a zero or (on Windows) invalid handle.
150 ProcessId
GetChildProcessId();
152 GeckoProcessType
GetProcessType() { return mProcessType
; }
155 task_t
GetChildTask();
160 void AddHandleToShare(HANDLE aHandle
) {
161 mLaunchOptions
->handles_to_inherit
.push_back(aHandle
);
164 void AddFdToRemap(int aSrcFd
, int aDstFd
) {
165 mLaunchOptions
->fds_to_remap
.push_back(std::make_pair(aSrcFd
, aDstFd
));
169 #ifdef ALLOW_GECKO_CHILD_PROCESS_ARCH
170 void SetLaunchArchitecture(uint32_t aArch
) { mLaunchArch
= aArch
; }
173 // For bug 943174: Skip the EnsureProcessTerminated call in the destructor.
174 void SetAlreadyDead();
176 #if defined(MOZ_SANDBOX) && defined(XP_MACOSX)
177 // Start the sandbox from the child process.
178 static bool StartMacSandbox(int aArgc
, char** aArgv
,
179 std::string
& aErrorMessage
);
181 // The sandbox type that will be use when sandboxing is
182 // enabled in the derived class and FillMacSandboxInfo
183 // has not been overridden.
184 static MacSandboxType
GetDefaultMacSandboxType() {
185 return MacSandboxType_Utility
;
188 // Must be called before the process is launched. Determines if
189 // child processes will be launched with OS_ACTIVITY_MODE set to
190 // "disabled" or not. When |mDisableOSActivityMode| is set to true,
191 // child processes will be launched with OS_ACTIVITY_MODE
192 // disabled to avoid connection attempts to diagnosticd(8) which are
193 // blocked in child processes due to sandboxing.
194 void DisableOSActivityMode();
195 #endif // defined(MOZ_SANDBOX) && defined(XP_MACOSX)
196 typedef std::function
<void(GeckoChildProcessHost
*)> GeckoProcessCallback
;
198 // Iterates over all instances and calls aCallback with each one of them.
199 // This method will lock any addition/removal of new processes
200 // so you need to make sure the callback is as fast as possible.
202 // To reiterate: the callbacks are executed synchronously.
203 static void GetAll(const GeckoProcessCallback
& aCallback
);
205 friend class BaseProcessLauncher
;
206 friend class PosixProcessLauncher
;
207 friend class WindowsProcessLauncher
;
210 virtual ~GeckoChildProcessHost();
211 GeckoProcessType mProcessType
;
214 FilePath mProcessPath
;
215 #ifdef ALLOW_GECKO_CHILD_PROCESS_ARCH
216 // Used on platforms where we may launch a child process with a different
217 // architecture than the parent process.
218 uint32_t mLaunchArch
= base::PROCESS_ARCH_INVALID
;
220 // GeckoChildProcessHost holds the launch options so they can be set
221 // up on the main thread using main-thread-only APIs like prefs, and
222 // then used for the actual launch on another thread. This pointer
223 // is set to null to free the options after the child is launched.
224 UniquePtr
<base::LaunchOptions
> mLaunchOptions
;
225 ScopedPort mInitialPort
;
226 nsID mInitialChannelId
;
227 RefPtr
<NodeController
> mNodeController
;
228 RefPtr
<NodeChannel
> mNodeChannel
;
230 // This value must be accessed while holding mMonitor.
232 // This object has been constructed, but the OS process has not
234 CREATING_CHANNEL
= 0,
235 // The IPC channel for our subprocess has been created, but the OS
236 // process has still not been created.
238 // The OS process has been created, but it hasn't yet connected to
241 // The process is launched and connected to our IPC channel. All
245 } mProcessState
MOZ_GUARDED_BY(mMonitor
);
247 void PrepareLaunch();
250 void InitWindowsGroupID();
252 CrashReporter::WindowsErrorReportingData mWerData
;
254 RefPtr
<AbstractSandboxBroker
> mSandboxBroker
;
255 std::vector
<std::wstring
> mAllowedFilesRead
;
256 bool mEnableSandboxLogging
;
257 int32_t mSandboxLevel
;
261 #if defined(MOZ_SANDBOX)
262 SandboxingKind mSandbox
;
265 mozilla::RWLock mHandleLock
;
266 ProcessHandle mChildProcessHandle
MOZ_GUARDED_BY(mHandleLock
);
267 #if defined(XP_DARWIN)
268 task_t mChildTask
MOZ_GUARDED_BY(mHandleLock
);
270 RefPtr
<ProcessHandlePromise
> mHandlePromise
;
272 #if defined(XP_MACOSX) && defined(MOZ_SANDBOX)
273 bool mDisableOSActivityMode
;
276 bool OpenPrivilegedHandle(base::ProcessId aPid
) MOZ_REQUIRES(mHandleLock
);
278 #if defined(XP_MACOSX) && defined(MOZ_SANDBOX)
279 // Override this method to return true to launch the child process
280 // using the Mac utility (by default) sandbox. Override
281 // FillMacSandboxInfo() to change the sandbox type and settings.
282 virtual bool IsMacSandboxLaunchEnabled() { return false; }
284 // Fill a MacSandboxInfo to configure the sandbox
285 virtual bool FillMacSandboxInfo(MacSandboxInfo
& aInfo
);
287 // Adds the command line arguments needed to enable
288 // sandboxing of the child process at startup before
289 // the child event loop is up.
290 virtual bool AppendMacSandboxParams(StringVector
& aArgs
);
294 DISALLOW_EVIL_CONSTRUCTORS(GeckoChildProcessHost
);
296 // Removes the instance from sGeckoChildProcessHosts
297 void RemoveFromProcessList();
299 // Linux-Only. Set this up before we're called from a different thread.
300 nsCString mTmpDirName
;
301 // Mac and Windows. Set this up before we're called from a different thread.
302 nsCOMPtr
<nsIFile
> mProfileDir
;
304 mozilla::Atomic
<bool> mDestroying
;
306 static uint32_t sNextUniqueID
;
307 static StaticAutoPtr
<LinkedList
<GeckoChildProcessHost
>>
308 sGeckoChildProcessHosts
MOZ_GUARDED_BY(sMutex
);
309 static StaticMutex sMutex
;
312 nsCOMPtr
<nsIEventTarget
> GetIPCLauncher();
314 } /* namespace ipc */
315 } /* namespace mozilla */
317 #endif /* __IPC_GLUE_GECKOCHILDPROCESSHOST_H__ */