Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(6092)

Unified Diff: chrome/browser/sync/engine/syncapi.cc

Issue 7044059: [Sync] Ensure all accesses to SyncInternal's observers are thread safe. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Review Created 9 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « no previous file | tools/valgrind/tsan/suppressions.txt » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: chrome/browser/sync/engine/syncapi.cc
diff --git a/chrome/browser/sync/engine/syncapi.cc b/chrome/browser/sync/engine/syncapi.cc
index 3546df4da92605e92423f708b6ed00cf3a873014..2d9d9e1dacbae695e6c32c5cf0f197c61ed5291c 100644
--- a/chrome/browser/sync/engine/syncapi.cc
+++ b/chrome/browser/sync/engine/syncapi.cc
@@ -1237,8 +1237,10 @@ class SyncManager::SyncInternal
virtual void StoreState(const std::string& cookie);
+ // Thread-safe observers_ accessors.
+ void CopyObservers(ObserverList<SyncManager::Observer>* observers_copy);
akalin 2011/06/08 23:14:41 this should be const, too
Nicolas Zea 2011/06/08 23:25:33 ObserverList does not have a const iterator, so th
+ bool HaveObservers() const;
void AddObserver(SyncManager::Observer* observer);
-
void RemoveObserver(SyncManager::Observer* observer);
// Accessors for the private members.
@@ -1527,6 +1529,9 @@ class SyncManager::SyncInternal
MessageLoop* core_message_loop_;
+ // We have to lock around every observers_ access because it can get accessed
+ // from any thread and added to/removed from on the core thread.
+ mutable base::Lock observers_lock_;
ObserverList<SyncManager::Observer> observers_;
browser_sync::JsEventRouter* parent_router_;
@@ -1808,8 +1813,10 @@ void SyncManager::SyncInternal::BootstrapEncryption(
nigori.CopyFrom(node.GetNigoriSpecifics());
Cryptographer::UpdateResult result = cryptographer->Update(nigori);
if (result == Cryptographer::NEEDS_PASSPHRASE) {
- FOR_EACH_OBSERVER(SyncManager::Observer, observers_,
- OnPassphraseRequired(sync_api::REASON_DECRYPTION));
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
+ OnPassphraseRequired(sync_api::REASON_DECRYPTION));
}
// Refresh list of encrypted datatypes.
@@ -1823,10 +1830,10 @@ void SyncManager::SyncInternal::BootstrapEncryption(
}
void SyncManager::SyncInternal::StartSyncingNormally() {
- // Start the syncer thread. This won't actually
- // result in any syncing until at least the
- // DirectoryManager broadcasts the OPENED event,
- // and a valid server connection is detected.
+ // Start the syncer thread. This won't actually
+ // result in any syncing until at least the
+ // DirectoryManager broadcasts the OPENED event,
+ // and a valid server connection is detected.
if (syncer_thread()) // NULL during certain unittests.
syncer_thread()->Start(SyncerThread::NORMAL_MODE, NULL);
}
@@ -1845,7 +1852,9 @@ void SyncManager::SyncInternal::MarkAndNotifyInitializationComplete() {
}
// Notify that initialization is complete.
- FOR_EACH_OBSERVER(SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnInitializationComplete());
}
@@ -1864,7 +1873,9 @@ bool SyncManager::SyncInternal::OpenDirectory() {
bool share_opened = dir_manager()->Open(username_for_share());
DCHECK(share_opened);
if (!share_opened) {
- FOR_EACH_OBSERVER(SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnStopSyncingPermanently());
LOG(ERROR) << "Could not open share for:" << username_for_share();
@@ -1949,8 +1960,9 @@ void SyncManager::SyncInternal::UpdateEnabledTypes() {
}
void SyncManager::SyncInternal::RaiseAuthNeededEvent() {
- FOR_EACH_OBSERVER(
- SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnAuthError(AuthError(AuthError::INVALID_GAIA_CREDENTIALS)));
}
@@ -1972,7 +1984,9 @@ void SyncManager::SyncInternal::SetPassphrase(
// We do not accept empty passphrases.
if (passphrase.empty()) {
VLOG(1) << "Rejecting empty passphrase.";
- FOR_EACH_OBSERVER(SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnPassphraseRequired(sync_api::REASON_SET_PASSPHRASE_FAILED));
return;
}
@@ -1985,7 +1999,9 @@ void SyncManager::SyncInternal::SetPassphrase(
if (cryptographer->has_pending_keys()) {
if (!cryptographer->DecryptPendingKeys(params)) {
VLOG(1) << "Passphrase failed to decrypt pending keys.";
- FOR_EACH_OBSERVER(SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnPassphraseRequired(sync_api::REASON_SET_PASSPHRASE_FAILED));
return;
}
@@ -2031,7 +2047,9 @@ void SyncManager::SyncInternal::SetPassphrase(
std::string bootstrap_token;
cryptographer->GetBootstrapToken(&bootstrap_token);
- FOR_EACH_OBSERVER(SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnPassphraseAccepted(bootstrap_token));
}
@@ -2150,7 +2168,9 @@ void SyncManager::SyncInternal::ReEncryptEverything(WriteTransaction* trans) {
}
}
- FOR_EACH_OBSERVER(SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnEncryptionComplete(encrypted_types));
}
@@ -2244,13 +2264,16 @@ void SyncManager::SyncInternal::OnServerConnectionEvent(
allstatus_.HandleServerConnectionEvent(event);
if (event.connection_code ==
browser_sync::HttpResponse::SERVER_CONNECTION_OK) {
- FOR_EACH_OBSERVER(SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnAuthError(AuthError::None()));
}
if (event.connection_code == browser_sync::HttpResponse::SYNC_AUTH_ERROR) {
- FOR_EACH_OBSERVER(
- SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnAuthError(AuthError(AuthError::INVALID_GAIA_CREDENTIALS)));
}
}
@@ -2260,13 +2283,15 @@ void SyncManager::SyncInternal::HandleTransactionCompleteChangeEvent(
// This notification happens immediately after the transaction mutex is
// released. This allows work to be performed without blocking other threads
// from acquiring a transaction.
- if (observers_.size() <= 0)
+ if (!HaveObservers())
return;
// Call commit.
for (int i = 0; i < syncable::MODEL_TYPE_COUNT; ++i) {
if (models_with_changes.test(i)) {
- FOR_EACH_OBSERVER(SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnChangesComplete(syncable::ModelTypeFromInt(i)));
}
}
@@ -2277,7 +2302,7 @@ ModelTypeBitSet SyncManager::SyncInternal::HandleTransactionEndingChangeEvent(
// This notification happens immediately before a syncable WriteTransaction
// falls out of scope. It happens while the channel mutex is still held,
// and while the transaction mutex is held, so it cannot be re-entrant.
- if (observers_.size() <= 0 || ChangeBuffersAreEmpty())
+ if (!HaveObservers() || ChangeBuffersAreEmpty())
return ModelTypeBitSet();
// This will continue the WriteTransaction using a read only wrapper.
@@ -2294,8 +2319,9 @@ ModelTypeBitSet SyncManager::SyncInternal::HandleTransactionEndingChangeEvent(
vector<ChangeRecord> ordered_changes;
change_buffers_[i].GetAllChangesInTreeOrder(&read_trans, &ordered_changes);
if (!ordered_changes.empty()) {
- FOR_EACH_OBSERVER(
- SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnChangesApplied(syncable::ModelTypeFromInt(i), &read_trans,
&ordered_changes[0], ordered_changes.size()));
models_with_changes.set(i, true);
@@ -2444,7 +2470,7 @@ void SyncManager::SyncInternal::RequestNudgeWithDataTypes(
void SyncManager::SyncInternal::OnSyncEngineEvent(
const SyncEngineEvent& event) {
- if (observers_.size() <= 0) {
+ if (!HaveObservers()) {
VLOG(0) << "OnSyncEngineEvent returning because observers_.size() is zero";
return;
}
@@ -2492,12 +2518,16 @@ void SyncManager::SyncInternal::OnSyncEngineEvent(
// yet, prompt the user for a passphrase.
if (cryptographer->has_pending_keys()) {
VLOG(1) << "OnPassPhraseRequired Sent";
- FOR_EACH_OBSERVER(SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnPassphraseRequired(sync_api::REASON_DECRYPTION));
} else if (!cryptographer->is_ready()) {
VLOG(1) << "OnPassphraseRequired sent because cryptographer is not "
<< "ready";
- FOR_EACH_OBSERVER(SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnPassphraseRequired(sync_api::REASON_ENCRYPTION));
}
// If everything is in order(we have the passphrase) then there is no
@@ -2515,7 +2545,9 @@ void SyncManager::SyncInternal::OnSyncEngineEvent(
if (!event.snapshot->has_more_to_sync) {
VLOG(1) << "OnSyncCycleCompleted sent";
- FOR_EACH_OBSERVER(SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnSyncCycleCompleted(event.snapshot));
}
@@ -2537,25 +2569,33 @@ void SyncManager::SyncInternal::OnSyncEngineEvent(
}
if (event.what_happened == SyncEngineEvent::STOP_SYNCING_PERMANENTLY) {
- FOR_EACH_OBSERVER(SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnStopSyncingPermanently());
return;
}
if (event.what_happened == SyncEngineEvent::CLEAR_SERVER_DATA_SUCCEEDED) {
- FOR_EACH_OBSERVER(SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnClearServerDataSucceeded());
return;
}
if (event.what_happened == SyncEngineEvent::CLEAR_SERVER_DATA_FAILED) {
- FOR_EACH_OBSERVER(SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnClearServerDataFailed());
return;
}
if (event.what_happened == SyncEngineEvent::UPDATED_TOKEN) {
- FOR_EACH_OBSERVER(SyncManager::Observer, observers_,
+ ObserverList<SyncManager::Observer> temp_obs_list;
+ CopyObservers(&temp_obs_list);
+ FOR_EACH_OBSERVER(SyncManager::Observer, temp_obs_list,
OnUpdatedToken(event.updated_token));
return;
}
@@ -2860,13 +2900,38 @@ void SyncManager::SyncInternal::StoreState(
lookup->SaveChanges();
}
+
+// Note: it is possible that an observer will remove itself after we have made
+// a copy, but before the copy is consumed. This could theoretically result
+// in accessing a garbage pointer, but can only occur when an about:sync window
+// is closed in the middle of a notification.
+// See crbug.com/85481.
+void SyncManager::SyncInternal::CopyObservers(
+ ObserverList<SyncManager::Observer>* observers_copy) {
+ DCHECK_EQ(0U, observers_copy->size());
+ base::AutoLock lock(observers_lock_);
+ if (observers_.size() == 0)
+ return;
+ ObserverListBase<SyncManager::Observer>::Iterator it(observers_);
+ SyncManager::Observer* obs;
+ while ((obs = it.GetNext()) != NULL)
+ observers_copy->AddObserver(obs);
+}
+
+bool SyncManager::SyncInternal::HaveObservers() const {
+ base::AutoLock lock(observers_lock_);
+ return observers_.size() > 0;
+}
+
void SyncManager::SyncInternal::AddObserver(
SyncManager::Observer* observer) {
+ base::AutoLock lock(observers_lock_);
observers_.AddObserver(observer);
}
void SyncManager::SyncInternal::RemoveObserver(
SyncManager::Observer* observer) {
+ base::AutoLock lock(observers_lock_);
observers_.RemoveObserver(observer);
}
« no previous file with comments | « no previous file | tools/valgrind/tsan/suppressions.txt » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698