Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(355)

Side by Side Diff: base/memory/shared_memory_mac.cc

Issue 2550723002: Resurrect POSIX shared memory support on mac (Closed)
Patch Set: git cl format Created 4 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "base/memory/shared_memory.h" 5 #include "base/memory/shared_memory.h"
6 6
7 #include <errno.h>
8 #include <fcntl.h>
7 #include <mach/mach_vm.h> 9 #include <mach/mach_vm.h>
10 #include <stddef.h>
11 #include <sys/mman.h>
12 #include <sys/stat.h>
13 #include <unistd.h>
8 14
9 #include "base/files/file_util.h" 15 #include "base/files/file_util.h"
10 #include "base/files/scoped_file.h" 16 #include "base/files/scoped_file.h"
11 #include "base/logging.h" 17 #include "base/logging.h"
12 #include "base/mac/foundation_util.h" 18 #include "base/mac/foundation_util.h"
13 #include "base/mac/mac_util.h" 19 #include "base/mac/mac_util.h"
14 #include "base/mac/scoped_mach_vm.h" 20 #include "base/mac/scoped_mach_vm.h"
15 #include "base/metrics/field_trial.h" 21 #include "base/metrics/field_trial.h"
16 #include "base/metrics/histogram_macros.h" 22 #include "base/metrics/histogram_macros.h"
23 #include "base/posix/eintr_wrapper.h"
24 #include "base/posix/safe_strerror.h"
17 #include "base/process/process_metrics.h" 25 #include "base/process/process_metrics.h"
18 #include "base/profiler/scoped_tracker.h" 26 #include "base/profiler/scoped_tracker.h"
19 #include "base/scoped_generic.h" 27 #include "base/scoped_generic.h"
20 #include "base/strings/utf_string_conversions.h" 28 #include "base/strings/utf_string_conversions.h"
21 #include "build/build_config.h" 29 #include "build/build_config.h"
22 30
31 #if defined(OS_MACOSX)
32 #include "base/mac/foundation_util.h"
33 #endif // OS_MACOSX
34
23 namespace base { 35 namespace base {
24 36
25 namespace { 37 namespace {
26 38
27 // Returns whether the operation succeeded. 39 // Returns whether the operation succeeded.
28 // |new_handle| is an output variable, populated on success. The caller takes 40 // |new_handle| is an output variable, populated on success. The caller takes
29 // ownership of the underlying memory object. 41 // ownership of the underlying memory object.
30 // |handle| is the handle to copy. 42 // |handle| is the handle to copy.
31 // If |handle| is already mapped, |mapped_addr| is its mapped location. 43 // If |handle| is already mapped, |mapped_addr| is its mapped location.
32 // Otherwise, |mapped_addr| should be |nullptr|. 44 // Otherwise, |mapped_addr| should be |nullptr|.
(...skipping 27 matching lines...) Expand all
60 mach_task_self(), reinterpret_cast<memory_object_size_t*>(&size), 72 mach_task_self(), reinterpret_cast<memory_object_size_t*>(&size),
61 reinterpret_cast<memory_object_offset_t>(temp_addr), VM_PROT_READ, 73 reinterpret_cast<memory_object_offset_t>(temp_addr), VM_PROT_READ,
62 &named_right, MACH_PORT_NULL); 74 &named_right, MACH_PORT_NULL);
63 if (kr != KERN_SUCCESS) 75 if (kr != KERN_SUCCESS)
64 return false; 76 return false;
65 77
66 *new_handle = SharedMemoryHandle(named_right, size, base::GetCurrentProcId()); 78 *new_handle = SharedMemoryHandle(named_right, size, base::GetCurrentProcId());
67 return true; 79 return true;
68 } 80 }
69 81
82 struct ScopedPathUnlinkedTraits {
83 static FilePath* InvalidValue() { return nullptr; }
84
85 static void Free(FilePath* path) {
86 // TODO(erikchen): Remove ScopedTracker below once http://crbug.com/466437
87 // is fixed.
88 tracked_objects::ScopedTracker tracking_profile(
89 FROM_HERE_WITH_EXPLICIT_FUNCTION(
90 "466437 SharedMemory::Create::Unlink"));
91 if (unlink(path->value().c_str()))
92 PLOG(WARNING) << "unlink";
93 }
94 };
95
96 // Unlinks the FilePath when the object is destroyed.
97 typedef ScopedGeneric<FilePath*, ScopedPathUnlinkedTraits> ScopedPathUnlinker;
98
99 // Makes a temporary file, fdopens it, and then unlinks it. |fp| is populated
100 // with the fdopened FILE. |readonly_fd| is populated with the opened fd if
101 // options.share_read_only is true. |path| is populated with the location of
102 // the file before it was unlinked.
103 // Returns false if there's an unhandled failure.
104 bool CreateAnonymousSharedMemory(const SharedMemoryCreateOptions& options,
105 ScopedFILE* fp,
106 ScopedFD* readonly_fd,
107 FilePath* path) {
108 // Q: Why not use the shm_open() etc. APIs?
109 // A: Because they're limited to 4mb on OS X. FFFFFFFUUUUUUUUUUU
110 FilePath directory;
111 ScopedPathUnlinker path_unlinker;
112 if (GetShmemTempDir(options.executable, &directory)) {
113 // TODO(erikchen): Remove ScopedTracker below once http://crbug.com/466437
114 // is fixed.
115 tracked_objects::ScopedTracker tracking_profile(
116 FROM_HERE_WITH_EXPLICIT_FUNCTION(
117 "466437 SharedMemory::Create::OpenTemporaryFile"));
118 fp->reset(CreateAndOpenTemporaryFileInDir(directory, path));
119
120 // Deleting the file prevents anyone else from mapping it in (making it
121 // private), and prevents the need for cleanup (once the last fd is closed,
122 // it is truly freed).
123 if (*fp)
124 path_unlinker.reset(path);
125 }
126
127 if (*fp) {
128 if (options.share_read_only) {
129 // TODO(erikchen): Remove ScopedTracker below once
130 // http://crbug.com/466437 is fixed.
131 tracked_objects::ScopedTracker tracking_profile(
132 FROM_HERE_WITH_EXPLICIT_FUNCTION(
133 "466437 SharedMemory::Create::OpenReadonly"));
134 // Also open as readonly so that we can ShareReadOnlyToProcess.
135 readonly_fd->reset(HANDLE_EINTR(open(path->value().c_str(), O_RDONLY)));
136 if (!readonly_fd->is_valid()) {
137 DPLOG(ERROR) << "open(\"" << path->value() << "\", O_RDONLY) failed";
138 fp->reset();
139 return false;
140 }
141 }
142 }
143 return true;
144 }
145
70 } // namespace 146 } // namespace
71 147
72 SharedMemory::SharedMemory() 148 SharedMemory::SharedMemory()
73 : mapped_size_(0), memory_(NULL), read_only_(false), requested_size_(0) {} 149 : mapped_memory_mechanism_(SharedMemoryHandle::MACH),
150 readonly_mapped_file_(-1),
151 mapped_size_(0),
152 memory_(NULL),
153 read_only_(false),
154 requested_size_(0) {}
74 155
75 SharedMemory::SharedMemory(const SharedMemoryHandle& handle, bool read_only) 156 SharedMemory::SharedMemory(const SharedMemoryHandle& handle, bool read_only)
76 : shm_(handle), 157 : shm_(handle),
158 mapped_memory_mechanism_(SharedMemoryHandle::MACH), // shouldn't this be
159 // the type of the
160 // handle?
161 readonly_mapped_file_(-1),
77 mapped_size_(0), 162 mapped_size_(0),
78 memory_(NULL), 163 memory_(NULL),
79 read_only_(read_only), 164 read_only_(read_only),
80 requested_size_(0) {} 165 requested_size_(0) {}
81 166
82 SharedMemory::~SharedMemory() { 167 SharedMemory::~SharedMemory() {
83 Unmap(); 168 Unmap();
84 Close(); 169 Close();
85 } 170 }
86 171
(...skipping 17 matching lines...) Expand all
104 // This should be effectively unlimited on OS X. 189 // This should be effectively unlimited on OS X.
105 return 10000; 190 return 10000;
106 } 191 }
107 192
108 // static 193 // static
109 SharedMemoryHandle SharedMemory::DuplicateHandle( 194 SharedMemoryHandle SharedMemory::DuplicateHandle(
110 const SharedMemoryHandle& handle) { 195 const SharedMemoryHandle& handle) {
111 return handle.Duplicate(); 196 return handle.Duplicate();
112 } 197 }
113 198
199 // static
200 int SharedMemory::GetFdFromSharedMemoryHandle(
201 const SharedMemoryHandle& handle) {
202 return handle.GetFileDescriptor().fd;
203 }
204
114 bool SharedMemory::CreateAndMapAnonymous(size_t size) { 205 bool SharedMemory::CreateAndMapAnonymous(size_t size) {
115 return CreateAnonymous(size) && Map(size); 206 return CreateAnonymous(size) && Map(size);
116 } 207 }
117 208
209 bool SharedMemory::CreateAndMapAnonymousPosix(size_t size) {
210 return CreateAnonymousPosix(size) && Map(size);
211 }
212
213 bool SharedMemory::CreateAnonymousPosix(size_t size) {
214 SharedMemoryCreateOptions options;
215 options.type = SharedMemoryHandle::POSIX;
216 options.size = size;
217 return Create(options);
218 }
219
118 // static 220 // static
119 bool SharedMemory::GetSizeFromSharedMemoryHandle( 221 bool SharedMemory::GetSizeFromSharedMemoryHandle(
120 const SharedMemoryHandle& handle, 222 const SharedMemoryHandle& handle,
121 size_t* size) { 223 size_t* size) {
122 return handle.GetSize(size); 224 return handle.GetSize(size);
123 } 225 }
124 226
125 // Chromium mostly only uses the unique/private shmem as specified by 227 // Chromium mostly only uses the unique/private shmem as specified by
126 // "name == L"". The exception is in the StatsTable. 228 // "name == L"". The exception is in the StatsTable.
127 bool SharedMemory::Create(const SharedMemoryCreateOptions& options) { 229 bool SharedMemory::Create(const SharedMemoryCreateOptions& options) {
128 // TODO(erikchen): Remove ScopedTracker below once http://crbug.com/466437 230 // TODO(erikchen): Remove ScopedTracker below once http://crbug.com/466437
129 // is fixed. 231 // is fixed.
130 tracked_objects::ScopedTracker tracking_profile1( 232 tracked_objects::ScopedTracker tracking_profile1(
131 FROM_HERE_WITH_EXPLICIT_FUNCTION( 233 FROM_HERE_WITH_EXPLICIT_FUNCTION(
132 "466437 SharedMemory::Create::Start")); 234 "466437 SharedMemory::Create::Start"));
133 DCHECK(!shm_.IsValid()); 235 DCHECK(!shm_.IsValid());
134 if (options.size == 0) return false; 236 if (options.size == 0) return false;
135 237
136 if (options.size > static_cast<size_t>(std::numeric_limits<int>::max())) 238 if (options.size > static_cast<size_t>(std::numeric_limits<int>::max()))
137 return false; 239 return false;
138 240
139 shm_ = SharedMemoryHandle(options.size); 241 if (options.type == SharedMemoryHandle::MACH) {
242 shm_ = SharedMemoryHandle(options.size);
243 requested_size_ = options.size;
244 return shm_.IsValid();
245 }
246
247 // This function theoretically can block on the disk. Both profiling of real
248 // users and local instrumentation shows that this is a real problem.
249 // https://code.google.com/p/chromium/issues/detail?id=466437
250 base::ThreadRestrictions::ScopedAllowIO allow_io;
251
252 ScopedFILE fp;
253 ScopedFD readonly_fd;
254
255 FilePath path;
256 bool result = CreateAnonymousSharedMemory(options, &fp, &readonly_fd, &path);
257 if (!result)
258 return false;
259
260 if (!fp) {
261 PLOG(ERROR) << "Creating shared memory in " << path.value() << " failed";
262 return false;
263 }
264
265 // Get current size;
266 struct stat stat;
267 if (fstat(fileno(fp.get()), &stat) != 0)
268 return false;
269 const size_t current_size = stat.st_size;
270 if (current_size != options.size) {
271 if (HANDLE_EINTR(ftruncate(fileno(fp.get()), options.size)) != 0)
272 return false;
273 }
140 requested_size_ = options.size; 274 requested_size_ = options.size;
141 return shm_.IsValid(); 275
276 return PrepareMapFile(std::move(fp), std::move(readonly_fd));
142 } 277 }
143 278
144 bool SharedMemory::MapAt(off_t offset, size_t bytes) { 279 bool SharedMemory::MapAt(off_t offset, size_t bytes) {
145 if (!shm_.IsValid()) 280 if (!shm_.IsValid())
146 return false; 281 return false;
147 if (bytes > static_cast<size_t>(std::numeric_limits<int>::max())) 282 if (bytes > static_cast<size_t>(std::numeric_limits<int>::max()))
148 return false; 283 return false;
149 if (memory_) 284 if (memory_)
150 return false; 285 return false;
151 286
152 bool success = shm_.MapAt(offset, bytes, &memory_, read_only_); 287 bool success = shm_.MapAt(offset, bytes, &memory_, read_only_);
153 if (success) { 288 if (success) {
154 mapped_size_ = bytes; 289 mapped_size_ = bytes;
155 DCHECK_EQ(0U, reinterpret_cast<uintptr_t>(memory_) & 290 DCHECK_EQ(0U, reinterpret_cast<uintptr_t>(memory_) &
156 (SharedMemory::MAP_MINIMUM_ALIGNMENT - 1)); 291 (SharedMemory::MAP_MINIMUM_ALIGNMENT - 1));
292 mapped_memory_mechanism_ = shm_.GetType();
157 } else { 293 } else {
158 memory_ = NULL; 294 memory_ = NULL;
159 } 295 }
160 296
161 return success; 297 return success;
162 } 298 }
163 299
164 bool SharedMemory::Unmap() { 300 bool SharedMemory::Unmap() {
165 if (memory_ == NULL) 301 if (memory_ == NULL)
166 return false; 302 return false;
167 303
168 mach_vm_deallocate(mach_task_self(), 304 switch (mapped_memory_mechanism_) {
169 reinterpret_cast<mach_vm_address_t>(memory_), 305 case SharedMemoryHandle::POSIX:
170 mapped_size_); 306 munmap(memory_, mapped_size_);
307 break;
308 case SharedMemoryHandle::MACH:
309 mach_vm_deallocate(mach_task_self(),
310 reinterpret_cast<mach_vm_address_t>(memory_),
311 mapped_size_);
312 break;
313 }
314
171 memory_ = NULL; 315 memory_ = NULL;
172 mapped_size_ = 0; 316 mapped_size_ = 0;
173 return true; 317 return true;
174 } 318 }
175 319
176 SharedMemoryHandle SharedMemory::handle() const { 320 SharedMemoryHandle SharedMemory::handle() const {
177 return shm_; 321 switch (shm_.GetType()) {
322 case SharedMemoryHandle::POSIX:
323 return SharedMemoryHandle(shm_.GetFileDescriptor().fd, false);
324 case SharedMemoryHandle::MACH:
325 return shm_;
326 }
178 } 327 }
179 328
180 SharedMemoryHandle SharedMemory::TakeHandle() { 329 SharedMemoryHandle SharedMemory::TakeHandle() {
181 SharedMemoryHandle dup = DuplicateHandle(handle()); 330 SharedMemoryHandle dup = DuplicateHandle(handle());
182 Close(); 331 Close();
183 return dup; 332 return dup;
184 } 333 }
185 334
186 void SharedMemory::Close() { 335 void SharedMemory::Close() {
187 shm_.Close(); 336 shm_.Close();
188 shm_ = SharedMemoryHandle(); 337 shm_ = SharedMemoryHandle();
338 if (shm_.GetType() == SharedMemoryHandle::POSIX) {
339 if (readonly_mapped_file_ > 0) {
340 if (IGNORE_EINTR(close(readonly_mapped_file_)) < 0)
341 PLOG(ERROR) << "close";
342 readonly_mapped_file_ = -1;
343 }
344 }
345 }
346
347 bool SharedMemory::PrepareMapFile(ScopedFILE fp, ScopedFD readonly_fd) {
348 DCHECK(!shm_.IsValid());
349 DCHECK_EQ(-1, readonly_mapped_file_);
350 if (fp == NULL)
351 return false;
352
353 // This function theoretically can block on the disk, but realistically
354 // the temporary files we create will just go into the buffer cache
355 // and be deleted before they ever make it out to disk.
356 base::ThreadRestrictions::ScopedAllowIO allow_io;
357
358 struct stat st = {};
359 if (fstat(fileno(fp.get()), &st))
360 NOTREACHED();
361 if (readonly_fd.is_valid()) {
362 struct stat readonly_st = {};
363 if (fstat(readonly_fd.get(), &readonly_st))
364 NOTREACHED();
365 if (st.st_dev != readonly_st.st_dev || st.st_ino != readonly_st.st_ino) {
366 LOG(ERROR) << "writable and read-only inodes don't match; bailing";
367 return false;
368 }
369 }
370
371 int mapped_file = HANDLE_EINTR(dup(fileno(fp.get())));
372 if (mapped_file == -1) {
373 if (errno == EMFILE) {
374 LOG(WARNING) << "Shared memory creation failed; out of file descriptors";
375 return false;
376 } else {
377 NOTREACHED() << "Call to dup failed, errno=" << errno;
378 }
379 }
380 shm_ = SharedMemoryHandle(mapped_file, false);
381 readonly_mapped_file_ = readonly_fd.release();
382
383 return true;
189 } 384 }
190 385
191 bool SharedMemory::ShareToProcessCommon(ProcessHandle process, 386 bool SharedMemory::ShareToProcessCommon(ProcessHandle process,
192 SharedMemoryHandle* new_handle, 387 SharedMemoryHandle* new_handle,
193 bool close_self, 388 bool close_self,
194 ShareMode share_mode) { 389 ShareMode share_mode) {
195 DCHECK(shm_.IsValid()); 390 if (shm_.GetType() == SharedMemoryHandle::MACH) {
391 DCHECK(shm_.IsValid());
392 bool success = false;
393 switch (share_mode) {
394 case SHARE_CURRENT_MODE:
395 *new_handle = shm_.Duplicate();
396 success = true;
397 break;
398 case SHARE_READONLY:
399 success = MakeMachSharedMemoryHandleReadOnly(new_handle, shm_, memory_);
400 break;
401 }
196 402
197 bool success = false; 403 if (success)
404 new_handle->SetOwnershipPassesToIPC(true);
405
406 if (close_self) {
407 Unmap();
408 Close();
409 }
410
411 return success;
412 }
413
414 int handle_to_dup = -1;
198 switch (share_mode) { 415 switch (share_mode) {
199 case SHARE_CURRENT_MODE: 416 case SHARE_CURRENT_MODE:
200 *new_handle = shm_.Duplicate(); 417 handle_to_dup = shm_.GetFileDescriptor().fd;
201 success = true;
202 break; 418 break;
203 case SHARE_READONLY: 419 case SHARE_READONLY:
204 success = MakeMachSharedMemoryHandleReadOnly(new_handle, shm_, memory_); 420 // We could imagine re-opening the file from /dev/fd, but that can't make
421 // it readonly on Mac: https://codereview.chromium.org/27265002/#msg10
422 CHECK_GE(readonly_mapped_file_, 0);
423 handle_to_dup = readonly_mapped_file_;
205 break; 424 break;
206 } 425 }
207 426
208 if (success) 427 const int new_fd = HANDLE_EINTR(dup(handle_to_dup));
209 new_handle->SetOwnershipPassesToIPC(true); 428 if (new_fd < 0) {
429 if (close_self) {
430 Unmap();
431 Close();
432 }
433 DPLOG(ERROR) << "dup() failed.";
434 return false;
435 }
436
437 new_handle->SetFileHandle(new_fd, true);
210 438
211 if (close_self) { 439 if (close_self) {
212 Unmap(); 440 Unmap();
213 Close(); 441 Close();
214 } 442 }
215 443
216 return success; 444 return true;
217 } 445 }
218 446
219 } // namespace base 447 } // namespace base
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698