/* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #ifndef nsSocketTransport2_h__ #define nsSocketTransport2_h__ #ifdef DEBUG_darinf # define ENABLE_SOCKET_TRACING #endif #include #include "mozilla/Mutex.h" #include "nsSocketTransportService2.h" #include "nsString.h" #include "nsCOMPtr.h" #include "nsIInterfaceRequestor.h" #include "nsISocketTransport.h" #include "nsIAsyncInputStream.h" #include "nsIAsyncOutputStream.h" #include "nsIDNSListener.h" #include "nsIDNSRecord.h" #include "nsIClassInfo.h" #include "mozilla/net/DNS.h" #include "nsASocketHandler.h" #include "mozilla/Telemetry.h" #include "prerror.h" #include "ssl.h" class nsICancelable; class nsIDNSRecord; class nsIInterfaceRequestor; //----------------------------------------------------------------------------- // after this short interval, we will return to PR_Poll #define NS_SOCKET_CONNECT_TIMEOUT PR_MillisecondsToInterval(20) //----------------------------------------------------------------------------- namespace mozilla { namespace net { nsresult ErrorAccordingToNSPR(PRErrorCode errorCode); class nsSocketInputStream; class nsSocketOutputStream; //----------------------------------------------------------------------------- class nsSocketTransport final : public nsASocketHandler, public nsISocketTransport, public nsIDNSListener, public nsIClassInfo, public nsIInterfaceRequestor { public: NS_DECL_THREADSAFE_ISUPPORTS NS_DECL_NSITRANSPORT NS_DECL_NSISOCKETTRANSPORT NS_DECL_NSIDNSLISTENER NS_DECL_NSICLASSINFO NS_DECL_NSIINTERFACEREQUESTOR nsSocketTransport(); // this method instructs the socket transport to open a socket of the // given type(s) to the given host or proxy. nsresult Init(const nsTArray& socketTypes, const nsACString& host, uint16_t port, const nsACString& hostRoute, uint16_t portRoute, nsIProxyInfo* proxyInfo, nsIDNSRecord* dnsRecord); // this method instructs the socket transport to use an already connected // socket with the given address. nsresult InitWithConnectedSocket(PRFileDesc* socketFD, const NetAddr* addr); // this method instructs the socket transport to use an already connected // socket with the given address, and additionally supplies the security // callbacks interface requestor. nsresult InitWithConnectedSocket(PRFileDesc* aFD, const NetAddr* aAddr, nsIInterfaceRequestor* aCallbacks); #ifdef XP_UNIX // This method instructs the socket transport to open a socket // connected to the given Unix domain address. We can only create // unlayered, simple, stream sockets. nsresult InitWithFilename(const char* filename); // This method instructs the socket transport to open a socket // connected to the given Unix domain address that includes abstract // socket address. If using abstract socket address, first character of // name parameter has to be \0. // We can only create unlayered, simple, stream sockets. nsresult InitWithName(const char* name, size_t len); #endif // nsASocketHandler methods: void OnSocketReady(PRFileDesc*, int16_t outFlags) override; void OnSocketDetached(PRFileDesc*) override; void IsLocal(bool* aIsLocal) override; void OnKeepaliveEnabledPrefChange(bool aEnabled) final; // called when a socket event is handled void OnSocketEvent(uint32_t type, nsresult status, nsISupports* param, std::function&& task); uint64_t ByteCountReceived() override; uint64_t ByteCountSent() override; static void CloseSocket(PRFileDesc* aFd, bool aTelemetryEnabled); static void SendPRBlockingTelemetry( PRIntervalTime aStart, Telemetry::HistogramID aIDNormal, Telemetry::HistogramID aIDShutdown, Telemetry::HistogramID aIDConnectivityChange, Telemetry::HistogramID aIDLinkChange, Telemetry::HistogramID aIDOffline); protected: virtual ~nsSocketTransport(); private: // event types enum { MSG_ENSURE_CONNECT, MSG_DNS_LOOKUP_COMPLETE, MSG_RETRY_INIT_SOCKET, MSG_TIMEOUT_CHANGED, MSG_INPUT_CLOSED, MSG_INPUT_PENDING, MSG_OUTPUT_CLOSED, MSG_OUTPUT_PENDING }; nsresult PostEvent(uint32_t type, nsresult status = NS_OK, nsISupports* param = nullptr, std::function&& task = nullptr); enum { STATE_CLOSED, STATE_IDLE, STATE_RESOLVING, STATE_CONNECTING, STATE_TRANSFERRING }; // Safer way to get and automatically release PRFileDesc objects. class MOZ_STACK_CLASS PRFileDescAutoLock { public: explicit PRFileDescAutoLock(nsSocketTransport* aSocketTransport, nsresult* aConditionWhileLocked = nullptr) : mSocketTransport(aSocketTransport), mFd(nullptr) { MOZ_ASSERT(aSocketTransport); MutexAutoLock lock(mSocketTransport->mLock); if (aConditionWhileLocked) { *aConditionWhileLocked = mSocketTransport->mCondition; if (NS_FAILED(mSocketTransport->mCondition)) { return; } } mFd = mSocketTransport->GetFD_Locked(); } ~PRFileDescAutoLock() { MutexAutoLock lock(mSocketTransport->mLock); if (mFd) { mSocketTransport->ReleaseFD_Locked(mFd); } } bool IsInitialized() { return mFd; } operator PRFileDesc*() { return mFd; } nsresult SetKeepaliveEnabled(bool aEnable); nsresult SetKeepaliveVals(bool aEnabled, int aIdleTime, int aRetryInterval, int aProbeCount); private: operator PRFileDescAutoLock*() { return nullptr; } // Weak ptr to nsSocketTransport since this is a stack class only. nsSocketTransport* mSocketTransport; PRFileDesc* mFd; }; friend class PRFileDescAutoLock; class LockedPRFileDesc { public: explicit LockedPRFileDesc(nsSocketTransport* aSocketTransport) : mSocketTransport(aSocketTransport), mFd(nullptr) { MOZ_ASSERT(aSocketTransport); } ~LockedPRFileDesc() = default; bool IsInitialized() { return mFd; } LockedPRFileDesc& operator=(PRFileDesc* aFd) { mSocketTransport->mLock.AssertCurrentThreadOwns(); mFd = aFd; return *this; } operator PRFileDesc*() { if (mSocketTransport->mAttached) { mSocketTransport->mLock.AssertCurrentThreadOwns(); } return mFd; } bool operator==(PRFileDesc* aFd) { mSocketTransport->mLock.AssertCurrentThreadOwns(); return mFd == aFd; } private: operator LockedPRFileDesc*() { return nullptr; } // Weak ptr to nsSocketTransport since it owns this class. nsSocketTransport* mSocketTransport; PRFileDesc* mFd; }; friend class LockedPRFileDesc; //------------------------------------------------------------------------- // these members are "set" at initialization time and are never modified // afterwards. this allows them to be safely accessed from any thread. //------------------------------------------------------------------------- // socket type info: nsTArray mTypes; nsCString mHost; nsCString mProxyHost; nsCString mOriginHost; uint16_t mPort{0}; nsCOMPtr mProxyInfo; uint16_t mProxyPort{0}; uint16_t mOriginPort{0}; bool mProxyTransparent{false}; bool mProxyTransparentResolvesHost{false}; bool mHttpsProxy{false}; uint32_t mConnectionFlags{0}; // When we fail to connect using a prefered IP family, we tell the consumer to // reset the IP family preference on the connection entry. bool mResetFamilyPreference{false}; uint32_t mTlsFlags{0}; bool mReuseAddrPort{false}; // The origin attributes are used to create sockets. The first party domain // will eventually be used to isolate OCSP cache and is only non-empty when // "privacy.firstparty.isolate" is enabled. Setting this is the only way to // carry origin attributes down to NSPR layers which are final consumers. // It must be set before the socket transport is built. OriginAttributes mOriginAttributes; uint16_t SocketPort() { return (!mProxyHost.IsEmpty() && !mProxyTransparent) ? mProxyPort : mPort; } const nsCString& SocketHost() { return (!mProxyHost.IsEmpty() && !mProxyTransparent) ? mProxyHost : mHost; } Atomic mInputClosed{true}; Atomic mOutputClosed{true}; //------------------------------------------------------------------------- // members accessible only on the socket transport thread: // (the exception being initialization/shutdown time) //------------------------------------------------------------------------- // socket state vars: uint32_t mState{STATE_CLOSED}; // STATE_??? flags bool mAttached{false}; // this flag is used to determine if the results of a host lookup arrive // recursively or not. this flag is not protected by any lock. bool mResolving{false}; nsCOMPtr mDNSRequest; nsCOMPtr mDNSRecord; nsCString mEchConfig; bool mEchConfigUsed = false; bool mResolvedByTRR{false}; nsIRequest::TRRMode mEffectiveTRRMode{nsIRequest::TRR_DEFAULT_MODE}; nsITRRSkipReason::value mTRRSkipReason{nsITRRSkipReason::TRR_UNSET}; nsCOMPtr mInputCopyContext; nsCOMPtr mOutputCopyContext; // mNetAddr/mSelfAddr is valid from GetPeerAddr()/GetSelfAddr() once we have // reached STATE_TRANSFERRING. It must not change after that. void SetSocketName(PRFileDesc* fd); NetAddr mNetAddr; NetAddr mSelfAddr; // getsockname() Atomic mNetAddrIsSet{false}; Atomic mSelfAddrIsSet{false}; UniquePtr mBindAddr; // socket methods (these can only be called on the socket thread): void SendStatus(nsresult status); nsresult ResolveHost(); nsresult BuildSocket(PRFileDesc*&, bool&, bool&); nsresult InitiateSocket(); bool RecoverFromError(); void OnMsgInputPending() { MOZ_ASSERT(OnSocketThread(), "not on socket thread"); if (mState == STATE_TRANSFERRING) { mPollFlags |= (PR_POLL_READ | PR_POLL_EXCEPT); } } void OnMsgOutputPending() { MOZ_ASSERT(OnSocketThread(), "not on socket thread"); if (mState == STATE_TRANSFERRING) { mPollFlags |= (PR_POLL_WRITE | PR_POLL_EXCEPT); } } void OnMsgInputClosed(nsresult reason); void OnMsgOutputClosed(nsresult reason); // called when the socket is connected void OnSocketConnected(); //------------------------------------------------------------------------- // socket input/output objects. these may be accessed on any thread with // the exception of some specific methods (XXX). // protects members in this section. Mutex mLock{"nsSocketTransport.mLock"}; LockedPRFileDesc mFD MOZ_GUARDED_BY(mLock); // mFD is closed when mFDref goes to zero. nsrefcnt mFDref MOZ_GUARDED_BY(mLock){0}; // mFD is available to consumer when TRUE. bool mFDconnected MOZ_GUARDED_BY(mLock){false}; // A delete protector reference to gSocketTransportService held for lifetime // of 'this'. Sometimes used interchangably with gSocketTransportService due // to scoping. RefPtr mSocketTransportService; nsCOMPtr mCallbacks; nsCOMPtr mEventSink; nsCOMPtr mTLSSocketControl; UniquePtr mInput; UniquePtr mOutput; friend class nsSocketInputStream; friend class nsSocketOutputStream; // socket timeouts are protected by mLock. uint16_t mTimeouts[2]{0}; // linger options to use when closing bool mLingerPolarity{false}; int16_t mLingerTimeout{0}; // QoS setting for socket uint8_t mQoSBits{0x00}; // // mFD access methods: called with mLock held. // PRFileDesc* GetFD_Locked() MOZ_REQUIRES(mLock); void ReleaseFD_Locked(PRFileDesc* fd) MOZ_REQUIRES(mLock); // // stream state changes (called outside mLock): // void OnInputClosed(nsresult reason) { // no need to post an event if called on the socket thread if (OnSocketThread()) { OnMsgInputClosed(reason); } else { PostEvent(MSG_INPUT_CLOSED, reason); } } void OnInputPending() { // no need to post an event if called on the socket thread if (OnSocketThread()) { OnMsgInputPending(); } else { PostEvent(MSG_INPUT_PENDING); } } void OnOutputClosed(nsresult reason) { // no need to post an event if called on the socket thread if (OnSocketThread()) { OnMsgOutputClosed(reason); // XXX need to not be inside lock! } else { PostEvent(MSG_OUTPUT_CLOSED, reason); } } void OnOutputPending() { // no need to post an event if called on the socket thread if (OnSocketThread()) { OnMsgOutputPending(); } else { PostEvent(MSG_OUTPUT_PENDING); } } #ifdef ENABLE_SOCKET_TRACING void TraceInBuf(const char* buf, int32_t n); void TraceOutBuf(const char* buf, int32_t n); #endif // Reads prefs to get default keepalive config. nsresult EnsureKeepaliveValsAreInitialized(); // Groups calls to fd.SetKeepaliveEnabled and fd.SetKeepaliveVals. nsresult SetKeepaliveEnabledInternal(bool aEnable); // True if keepalive has been enabled by the socket owner. Note: Keepalive // must also be enabled globally for it to be enabled in TCP. bool mKeepaliveEnabled{false}; // Keepalive config (support varies by platform). int32_t mKeepaliveIdleTimeS{-1}; int32_t mKeepaliveRetryIntervalS{-1}; int32_t mKeepaliveProbeCount{-1}; Atomic mDoNotRetryToConnect{false}; // Whether the port remapping has already been applied. We definitely want to // prevent duplicate calls in case of chaining remapping. bool mPortRemappingApplied = false; bool mExternalDNSResolution = false; bool mRetryDnsIfPossible = false; }; class nsSocketInputStream : public nsIAsyncInputStream { public: NS_DECL_ISUPPORTS_INHERITED NS_DECL_NSIINPUTSTREAM NS_DECL_NSIASYNCINPUTSTREAM explicit nsSocketInputStream(nsSocketTransport*); virtual ~nsSocketInputStream() = default; // nsSocketTransport holds a ref to us bool IsReferenced() { return mReaderRefCnt > 0; } nsresult Condition() { MutexAutoLock lock(mTransport->mLock); return mCondition; } uint64_t ByteCount() { MutexAutoLock lock(mTransport->mLock); return mByteCount; } uint64_t ByteCount(MutexAutoLock&) MOZ_NO_THREAD_SAFETY_ANALYSIS { return mByteCount; } // called by the socket transport on the socket thread... void OnSocketReady(nsresult condition); private: nsSocketTransport* mTransport; ThreadSafeAutoRefCnt mReaderRefCnt{0}; // access to these should be protected by mTransport->mLock but we // can't order things to allow using MOZ_GUARDED_BY(). nsresult mCondition MOZ_GUARDED_BY(mTransport->mLock){NS_OK}; nsCOMPtr mCallback MOZ_GUARDED_BY(mTransport->mLock); uint32_t mCallbackFlags MOZ_GUARDED_BY(mTransport->mLock){0}; uint64_t mByteCount MOZ_GUARDED_BY(mTransport->mLock){0}; }; //----------------------------------------------------------------------------- class nsSocketOutputStream : public nsIAsyncOutputStream { public: NS_DECL_ISUPPORTS_INHERITED NS_DECL_NSIOUTPUTSTREAM NS_DECL_NSIASYNCOUTPUTSTREAM explicit nsSocketOutputStream(nsSocketTransport*); virtual ~nsSocketOutputStream() = default; // nsSocketTransport holds a ref to us bool IsReferenced() { return mWriterRefCnt > 0; } nsresult Condition() { MutexAutoLock lock(mTransport->mLock); return mCondition; } uint64_t ByteCount() { MutexAutoLock lock(mTransport->mLock); return mByteCount; } uint64_t ByteCount(MutexAutoLock&) MOZ_NO_THREAD_SAFETY_ANALYSIS { return mByteCount; } // called by the socket transport on the socket thread... void OnSocketReady(nsresult condition); private: static nsresult WriteFromSegments(nsIInputStream*, void*, const char*, uint32_t offset, uint32_t count, uint32_t* countRead); nsSocketTransport* mTransport; ThreadSafeAutoRefCnt mWriterRefCnt{0}; // access to these should be protected by mTransport->mLock but we // can't order things to allow using MOZ_GUARDED_BY(). nsresult mCondition MOZ_GUARDED_BY(mTransport->mLock){NS_OK}; nsCOMPtr mCallback MOZ_GUARDED_BY(mTransport->mLock); uint32_t mCallbackFlags MOZ_GUARDED_BY(mTransport->mLock){0}; uint64_t mByteCount MOZ_GUARDED_BY(mTransport->mLock){0}; }; } // namespace net } // namespace mozilla #endif // !nsSocketTransport_h__