1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 2 // Use of this source code is governed by a BSD-style license that can be 3 // found in the LICENSE file. 4 5 #ifndef IPC_IPC_CHANNEL_H_ 6 #define IPC_IPC_CHANNEL_H_ 7 8 #include <string> 9 10 #if defined(OS_POSIX) 11 #include <sys/types.h> 12 #endif 13 14 #include "base/compiler_specific.h" 15 #include "base/process/process.h" 16 #include "ipc/ipc_channel_handle.h" 17 #include "ipc/ipc_message.h" 18 #include "ipc/ipc_sender.h" 19 20 namespace IPC { 21 22 class Listener; 23 24 //------------------------------------------------------------------------------ 25 // See 26 // http://www.chromium.org/developers/design-documents/inter-process-communication 27 // for overview of IPC in Chromium. 28 29 // Channels are implemented using named pipes on Windows, and 30 // socket pairs (or in some special cases unix domain sockets) on POSIX. 31 // On Windows we access pipes in various processes by name. 32 // On POSIX we pass file descriptors to child processes and assign names to them 33 // in a lookup table. 34 // In general on POSIX we do not use unix domain sockets due to security 35 // concerns and the fact that they can leave garbage around the file system 36 // (MacOS does not support abstract named unix domain sockets). 37 // You can use unix domain sockets if you like on POSIX by constructing the 38 // the channel with the mode set to one of the NAMED modes. NAMED modes are 39 // currently used by automation and service processes. 40 41 class IPC_EXPORT Channel : public Sender { 42 // Security tests need access to the pipe handle. 43 friend class ChannelTest; 44 45 public: 46 // Flags to test modes 47 enum ModeFlags { 48 MODE_NO_FLAG = 0x0, 49 MODE_SERVER_FLAG = 0x1, 50 MODE_CLIENT_FLAG = 0x2, 51 MODE_NAMED_FLAG = 0x4, 52 #if defined(OS_POSIX) 53 MODE_OPEN_ACCESS_FLAG = 0x8, // Don't restrict access based on client UID. 54 #endif 55 }; 56 57 // Some Standard Modes 58 // TODO(morrita): These are under deprecation work. You should use Create*() 59 // functions instead. 60 enum Mode { 61 MODE_NONE = MODE_NO_FLAG, 62 MODE_SERVER = MODE_SERVER_FLAG, 63 MODE_CLIENT = MODE_CLIENT_FLAG, 64 MODE_NAMED_SERVER = MODE_SERVER_FLAG | MODE_NAMED_FLAG, 65 MODE_NAMED_CLIENT = MODE_CLIENT_FLAG | MODE_NAMED_FLAG, 66 #if defined(OS_POSIX) 67 MODE_OPEN_NAMED_SERVER = MODE_OPEN_ACCESS_FLAG | MODE_SERVER_FLAG | 68 MODE_NAMED_FLAG 69 #endif 70 }; 71 72 // Messages internal to the IPC implementation are defined here. 73 // Uses Maximum value of message type (uint16), to avoid conflicting 74 // with normal message types, which are enumeration constants starting from 0. 75 enum { 76 // The Hello message is sent by the peer when the channel is connected. 77 // The message contains just the process id (pid). 78 // The message has a special routing_id (MSG_ROUTING_NONE) 79 // and type (HELLO_MESSAGE_TYPE). 80 HELLO_MESSAGE_TYPE = kuint16max, 81 // The CLOSE_FD_MESSAGE_TYPE is used in the IPC class to 82 // work around a bug in sendmsg() on Mac. When an FD is sent 83 // over the socket, a CLOSE_FD_MESSAGE is sent with hops = 2. 84 // The client will return the message with hops = 1, *after* it 85 // has received the message that contains the FD. When we 86 // receive it again on the sender side, we close the FD. 87 CLOSE_FD_MESSAGE_TYPE = HELLO_MESSAGE_TYPE - 1 88 }; 89 90 // The maximum message size in bytes. Attempting to receive a message of this 91 // size or bigger results in a channel error. 92 static const size_t kMaximumMessageSize = 128 * 1024 * 1024; 93 94 // Amount of data to read at once from the pipe. 95 static const size_t kReadBufferSize = 4 * 1024; 96 97 // Initialize a Channel. 98 // 99 // |channel_handle| identifies the communication Channel. For POSIX, if 100 // the file descriptor in the channel handle is != -1, the channel takes 101 // ownership of the file descriptor and will close it appropriately, otherwise 102 // it will create a new descriptor internally. 103 // |listener| receives a callback on the current thread for each newly 104 // received message. 105 // 106 // There are four type of modes how channels operate: 107 // 108 // - Server and named server: In these modes, the Channel is 109 // responsible for settingb up the IPC object 110 // - An "open" named server: It accepts connections from ANY client. 111 // The caller must then implement their own access-control based on the 112 // client process' user Id. 113 // - Client and named client: In these mode, the Channel merely 114 // connects to the already established IPC object. 115 // 116 // Each mode has its own Create*() API to create the Channel object. 117 // 118 // TODO(morrita): Replace CreateByModeForProxy() with one of above Create*(). 119 // 120 static scoped_ptr<Channel> Create( 121 const IPC::ChannelHandle &channel_handle, Mode mode,Listener* listener); 122 123 static scoped_ptr<Channel> CreateClient( 124 const IPC::ChannelHandle &channel_handle, Listener* listener); 125 126 // Channels on Windows are named by default and accessible from other 127 // processes. On POSIX channels are anonymous by default and not accessible 128 // from other processes. Named channels work via named unix domain sockets. 129 // On Windows MODE_NAMED_SERVER is equivalent to MODE_SERVER and 130 // MODE_NAMED_CLIENT is equivalent to MODE_CLIENT. 131 static scoped_ptr<Channel> CreateNamedServer( 132 const IPC::ChannelHandle &channel_handle, Listener* listener); 133 static scoped_ptr<Channel> CreateNamedClient( 134 const IPC::ChannelHandle &channel_handle, Listener* listener); 135 #if defined(OS_POSIX) 136 // An "open" named server accepts connections from ANY client. 137 // The caller must then implement their own access-control based on the 138 // client process' user Id. 139 static scoped_ptr<Channel> CreateOpenNamedServer( 140 const IPC::ChannelHandle &channel_handle, Listener* listener); 141 #endif 142 static scoped_ptr<Channel> CreateServer( 143 const IPC::ChannelHandle &channel_handle, Listener* listener); 144 145 146 virtual ~Channel(); 147 148 // Connect the pipe. On the server side, this will initiate 149 // waiting for connections. On the client, it attempts to 150 // connect to a pre-existing pipe. Note, calling Connect() 151 // will not block the calling thread and may complete 152 // asynchronously. 153 virtual bool Connect() WARN_UNUSED_RESULT = 0; 154 155 // Close this Channel explicitly. May be called multiple times. 156 // On POSIX calling close on an IPC channel that listens for connections will 157 // cause it to close any accepted connections, and it will stop listening for 158 // new connections. If you just want to close the currently accepted 159 // connection and listen for new ones, use ResetToAcceptingConnectionState. 160 virtual void Close() = 0; 161 162 // Get the process ID for the connected peer. 163 // 164 // Returns base::kNullProcessId if the peer is not connected yet. Watch out 165 // for race conditions. You can easily get a channel to another process, but 166 // if your process has not yet processed the "hello" message from the remote 167 // side, this will fail. You should either make sure calling this is either 168 // in response to a message from the remote side (which guarantees that it's 169 // been connected), or you wait for the "connected" notification on the 170 // listener. 171 virtual base::ProcessId GetPeerPID() const = 0; 172 173 // Send a message over the Channel to the listener on the other end. 174 // 175 // |message| must be allocated using operator new. This object will be 176 // deleted once the contents of the Message have been sent. 177 virtual bool Send(Message* message) = 0; 178 179 #if defined(OS_POSIX) && !defined(OS_NACL) 180 // On POSIX an IPC::Channel wraps a socketpair(), this method returns the 181 // FD # for the client end of the socket. 182 // This method may only be called on the server side of a channel. 183 // This method can be called on any thread. 184 virtual int GetClientFileDescriptor() const = 0; 185 186 // Same as GetClientFileDescriptor, but transfers the ownership of the 187 // file descriptor to the caller. 188 // This method can be called on any thread. 189 virtual int TakeClientFileDescriptor() = 0; 190 #endif // defined(OS_POSIX) && !defined(OS_NACL) 191 192 // Returns true if a named server channel is initialized on the given channel 193 // ID. Even if true, the server may have already accepted a connection. 194 static bool IsNamedServerInitialized(const std::string& channel_id); 195 196 #if !defined(OS_NACL) 197 // Generates a channel ID that's non-predictable and unique. 198 static std::string GenerateUniqueRandomChannelID(); 199 200 // Generates a channel ID that, if passed to the client as a shared secret, 201 // will validate that the client's authenticity. On platforms that do not 202 // require additional this is simply calls GenerateUniqueRandomChannelID(). 203 // For portability the prefix should not include the \ character. 204 static std::string GenerateVerifiedChannelID(const std::string& prefix); 205 #endif 206 207 #if defined(OS_LINUX) 208 // Sandboxed processes live in a PID namespace, so when sending the IPC hello 209 // message from client to server we need to send the PID from the global 210 // PID namespace. 211 static void SetGlobalPid(int pid); 212 #endif 213 214 #if defined(OS_ANDROID) 215 // Most tests are single process and work the same on all platforms. However 216 // in some cases we want to test multi-process, and Android differs in that it 217 // can't 'exec' after forking. This callback resets any data in the forked 218 // process such that it acts similar to if it was exec'd, for tests. 219 static void NotifyProcessForkedForTesting(); 220 #endif 221 222 }; 223 224 #if defined(OS_POSIX) 225 // SocketPair() creates a pair of socket FDs suitable for using with 226 // IPC::Channel. 227 IPC_EXPORT bool SocketPair(int* fd1, int* fd2); 228 #endif 229 230 } // namespace IPC 231 232 #endif // IPC_IPC_CHANNEL_H_ 233