Chromium Code Reviews| Index: chrome/browser/sync/engine/syncapi.cc |
| diff --git a/chrome/browser/sync/engine/syncapi.cc b/chrome/browser/sync/engine/syncapi.cc |
| index 3546df4da92605e92423f708b6ed00cf3a873014..2d9d9e1dacbae695e6c32c5cf0f197c61ed5291c 100644 |
| --- a/chrome/browser/sync/engine/syncapi.cc |
| +++ b/chrome/browser/sync/engine/syncapi.cc |
| @@ -1237,8 +1237,10 @@ class SyncManager::SyncInternal |
| virtual void StoreState(const std::string& cookie); |
| + // Thread-safe observers_ accessors. |
| + void CopyObservers(ObserverList<SyncManager::Observer>* observers_copy); |
|
akalin
2011/06/08 23:14:41
this should be const, too
Nicolas Zea
2011/06/08 23:25:33
ObserverList does not have a const iterator, so th
|
| + bool HaveObservers() const; |
| void AddObserver(SyncManager::Observer* observer); |
| - |
| void RemoveObserver(SyncManager::Observer* observer); |
| // Accessors for the private members. |
| @@ -1527,6 +1529,9 @@ class SyncManager::SyncInternal |
| MessageLoop* core_message_loop_; |
| + // We have to lock around every observers_ access because it can get accessed |
| + // from any thread and added to/removed from on the core thread. |
| + mutable base::Lock observers_lock_; |
| ObserverList<SyncManager::Observer> observers_; |
| browser_sync::JsEventRouter* parent_router_; |
| @@ -1808,8 +1813,10 @@ void SyncManager::SyncInternal::BootstrapEncryption( |
| nigori.CopyFrom(node.GetNigoriSpecifics()); |
| Cryptographer::UpdateResult result = cryptographer->Update(nigori); |
| if (result == Cryptographer::NEEDS_PASSPHRASE) { |
| - FOR_EACH_OBSERVER(SyncManager::Observer, observers_, |
| - OnPassphraseRequired(sync_api::REASON_DECRYPTION)); |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| + OnPassphraseRequired(sync_api::REASON_DECRYPTION)); |
| } |
| // Refresh list of encrypted datatypes. |
| @@ -1823,10 +1830,10 @@ void SyncManager::SyncInternal::BootstrapEncryption( |
| } |
| void SyncManager::SyncInternal::StartSyncingNormally() { |
| - // Start the syncer thread. This won't actually |
| - // result in any syncing until at least the |
| - // DirectoryManager broadcasts the OPENED event, |
| - // and a valid server connection is detected. |
| + // Start the syncer thread. This won't actually |
| + // result in any syncing until at least the |
| + // DirectoryManager broadcasts the OPENED event, |
| + // and a valid server connection is detected. |
| if (syncer_thread()) // NULL during certain unittests. |
| syncer_thread()->Start(SyncerThread::NORMAL_MODE, NULL); |
| } |
| @@ -1845,7 +1852,9 @@ void SyncManager::SyncInternal::MarkAndNotifyInitializationComplete() { |
| } |
| // Notify that initialization is complete. |
| - FOR_EACH_OBSERVER(SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnInitializationComplete()); |
| } |
| @@ -1864,7 +1873,9 @@ bool SyncManager::SyncInternal::OpenDirectory() { |
| bool share_opened = dir_manager()->Open(username_for_share()); |
| DCHECK(share_opened); |
| if (!share_opened) { |
| - FOR_EACH_OBSERVER(SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnStopSyncingPermanently()); |
| LOG(ERROR) << "Could not open share for:" << username_for_share(); |
| @@ -1949,8 +1960,9 @@ void SyncManager::SyncInternal::UpdateEnabledTypes() { |
| } |
| void SyncManager::SyncInternal::RaiseAuthNeededEvent() { |
| - FOR_EACH_OBSERVER( |
| - SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnAuthError(AuthError(AuthError::INVALID_GAIA_CREDENTIALS))); |
| } |
| @@ -1972,7 +1984,9 @@ void SyncManager::SyncInternal::SetPassphrase( |
| // We do not accept empty passphrases. |
| if (passphrase.empty()) { |
| VLOG(1) << "Rejecting empty passphrase."; |
| - FOR_EACH_OBSERVER(SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnPassphraseRequired(sync_api::REASON_SET_PASSPHRASE_FAILED)); |
| return; |
| } |
| @@ -1985,7 +1999,9 @@ void SyncManager::SyncInternal::SetPassphrase( |
| if (cryptographer->has_pending_keys()) { |
| if (!cryptographer->DecryptPendingKeys(params)) { |
| VLOG(1) << "Passphrase failed to decrypt pending keys."; |
| - FOR_EACH_OBSERVER(SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnPassphraseRequired(sync_api::REASON_SET_PASSPHRASE_FAILED)); |
| return; |
| } |
| @@ -2031,7 +2047,9 @@ void SyncManager::SyncInternal::SetPassphrase( |
| std::string bootstrap_token; |
| cryptographer->GetBootstrapToken(&bootstrap_token); |
| - FOR_EACH_OBSERVER(SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnPassphraseAccepted(bootstrap_token)); |
| } |
| @@ -2150,7 +2168,9 @@ void SyncManager::SyncInternal::ReEncryptEverything(WriteTransaction* trans) { |
| } |
| } |
| - FOR_EACH_OBSERVER(SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnEncryptionComplete(encrypted_types)); |
| } |
| @@ -2244,13 +2264,16 @@ void SyncManager::SyncInternal::OnServerConnectionEvent( |
| allstatus_.HandleServerConnectionEvent(event); |
| if (event.connection_code == |
| browser_sync::HttpResponse::SERVER_CONNECTION_OK) { |
| - FOR_EACH_OBSERVER(SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnAuthError(AuthError::None())); |
| } |
| if (event.connection_code == browser_sync::HttpResponse::SYNC_AUTH_ERROR) { |
| - FOR_EACH_OBSERVER( |
| - SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnAuthError(AuthError(AuthError::INVALID_GAIA_CREDENTIALS))); |
| } |
| } |
| @@ -2260,13 +2283,15 @@ void SyncManager::SyncInternal::HandleTransactionCompleteChangeEvent( |
| // This notification happens immediately after the transaction mutex is |
| // released. This allows work to be performed without blocking other threads |
| // from acquiring a transaction. |
| - if (observers_.size() <= 0) |
| + if (!HaveObservers()) |
| return; |
| // Call commit. |
| for (int i = 0; i < syncable::MODEL_TYPE_COUNT; ++i) { |
| if (models_with_changes.test(i)) { |
| - FOR_EACH_OBSERVER(SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnChangesComplete(syncable::ModelTypeFromInt(i))); |
| } |
| } |
| @@ -2277,7 +2302,7 @@ ModelTypeBitSet SyncManager::SyncInternal::HandleTransactionEndingChangeEvent( |
| // This notification happens immediately before a syncable WriteTransaction |
| // falls out of scope. It happens while the channel mutex is still held, |
| // and while the transaction mutex is held, so it cannot be re-entrant. |
| - if (observers_.size() <= 0 || ChangeBuffersAreEmpty()) |
| + if (!HaveObservers() || ChangeBuffersAreEmpty()) |
| return ModelTypeBitSet(); |
| // This will continue the WriteTransaction using a read only wrapper. |
| @@ -2294,8 +2319,9 @@ ModelTypeBitSet SyncManager::SyncInternal::HandleTransactionEndingChangeEvent( |
| vector<ChangeRecord> ordered_changes; |
| change_buffers_[i].GetAllChangesInTreeOrder(&read_trans, &ordered_changes); |
| if (!ordered_changes.empty()) { |
| - FOR_EACH_OBSERVER( |
| - SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnChangesApplied(syncable::ModelTypeFromInt(i), &read_trans, |
| &ordered_changes[0], ordered_changes.size())); |
| models_with_changes.set(i, true); |
| @@ -2444,7 +2470,7 @@ void SyncManager::SyncInternal::RequestNudgeWithDataTypes( |
| void SyncManager::SyncInternal::OnSyncEngineEvent( |
| const SyncEngineEvent& event) { |
| - if (observers_.size() <= 0) { |
| + if (!HaveObservers()) { |
| VLOG(0) << "OnSyncEngineEvent returning because observers_.size() is zero"; |
| return; |
| } |
| @@ -2492,12 +2518,16 @@ void SyncManager::SyncInternal::OnSyncEngineEvent( |
| // yet, prompt the user for a passphrase. |
| if (cryptographer->has_pending_keys()) { |
| VLOG(1) << "OnPassPhraseRequired Sent"; |
| - FOR_EACH_OBSERVER(SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnPassphraseRequired(sync_api::REASON_DECRYPTION)); |
| } else if (!cryptographer->is_ready()) { |
| VLOG(1) << "OnPassphraseRequired sent because cryptographer is not " |
| << "ready"; |
| - FOR_EACH_OBSERVER(SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnPassphraseRequired(sync_api::REASON_ENCRYPTION)); |
| } |
| // If everything is in order(we have the passphrase) then there is no |
| @@ -2515,7 +2545,9 @@ void SyncManager::SyncInternal::OnSyncEngineEvent( |
| if (!event.snapshot->has_more_to_sync) { |
| VLOG(1) << "OnSyncCycleCompleted sent"; |
| - FOR_EACH_OBSERVER(SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnSyncCycleCompleted(event.snapshot)); |
| } |
| @@ -2537,25 +2569,33 @@ void SyncManager::SyncInternal::OnSyncEngineEvent( |
| } |
| if (event.what_happened == SyncEngineEvent::STOP_SYNCING_PERMANENTLY) { |
| - FOR_EACH_OBSERVER(SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnStopSyncingPermanently()); |
| return; |
| } |
| if (event.what_happened == SyncEngineEvent::CLEAR_SERVER_DATA_SUCCEEDED) { |
| - FOR_EACH_OBSERVER(SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnClearServerDataSucceeded()); |
| return; |
| } |
| if (event.what_happened == SyncEngineEvent::CLEAR_SERVER_DATA_FAILED) { |
| - FOR_EACH_OBSERVER(SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnClearServerDataFailed()); |
| return; |
| } |
| if (event.what_happened == SyncEngineEvent::UPDATED_TOKEN) { |
| - FOR_EACH_OBSERVER(SyncManager::Observer, observers_, |
| + ObserverList<SyncManager::Observer> temp_obs_list; |
| + CopyObservers(&temp_obs_list); |
| + FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list, |
| OnUpdatedToken(event.updated_token)); |
| return; |
| } |
| @@ -2860,13 +2900,38 @@ void SyncManager::SyncInternal::StoreState( |
| lookup->SaveChanges(); |
| } |
| + |
| +// Note: it is possible that an observer will remove itself after we have made |
| +// a copy, but before the copy is consumed. This could theoretically result |
| +// in accessing a garbage pointer, but can only occur when an about:sync window |
| +// is closed in the middle of a notification. |
| +// See crbug.com/85481. |
| +void SyncManager::SyncInternal::CopyObservers( |
| + ObserverList<SyncManager::Observer>* observers_copy) { |
| + DCHECK_EQ(0U, observers_copy->size()); |
| + base::AutoLock lock(observers_lock_); |
| + if (observers_.size() == 0) |
| + return; |
| + ObserverListBase<SyncManager::Observer>::Iterator it(observers_); |
| + SyncManager::Observer* obs; |
| + while ((obs = it.GetNext()) != NULL) |
| + observers_copy->AddObserver(obs); |
| +} |
| + |
| +bool SyncManager::SyncInternal::HaveObservers() const { |
| + base::AutoLock lock(observers_lock_); |
| + return observers_.size() > 0; |
| +} |
| + |
| void SyncManager::SyncInternal::AddObserver( |
| SyncManager::Observer* observer) { |
| + base::AutoLock lock(observers_lock_); |
| observers_.AddObserver(observer); |
| } |
| void SyncManager::SyncInternal::RemoveObserver( |
| SyncManager::Observer* observer) { |
| + base::AutoLock lock(observers_lock_); |
| observers_.RemoveObserver(observer); |
| } |