| OLD | NEW |
| (Empty) |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "chrome/nacl/nacl_ipc_adapter.h" | |
| 6 | |
| 7 #include <limits.h> | |
| 8 #include <string.h> | |
| 9 | |
| 10 #include "base/basictypes.h" | |
| 11 #include "base/bind.h" | |
| 12 #include "base/location.h" | |
| 13 #include "base/memory/scoped_ptr.h" | |
| 14 #include "base/memory/shared_memory.h" | |
| 15 #include "build/build_config.h" | |
| 16 #include "ipc/ipc_channel.h" | |
| 17 #include "ipc/ipc_platform_file.h" | |
| 18 #include "native_client/src/trusted/desc/nacl_desc_base.h" | |
| 19 #include "native_client/src/trusted/desc/nacl_desc_custom.h" | |
| 20 #include "native_client/src/trusted/desc/nacl_desc_imc_shm.h" | |
| 21 #include "native_client/src/trusted/desc/nacl_desc_io.h" | |
| 22 #include "native_client/src/trusted/desc/nacl_desc_sync_socket.h" | |
| 23 #include "native_client/src/trusted/desc/nacl_desc_wrapper.h" | |
| 24 #include "native_client/src/trusted/service_runtime/include/sys/fcntl.h" | |
| 25 #include "ppapi/c/ppb_file_io.h" | |
| 26 #include "ppapi/proxy/ppapi_messages.h" | |
| 27 #include "ppapi/proxy/serialized_handle.h" | |
| 28 | |
| 29 namespace { | |
| 30 | |
| 31 enum BufferSizeStatus { | |
| 32 // The buffer contains a full message with no extra bytes. | |
| 33 MESSAGE_IS_COMPLETE, | |
| 34 | |
| 35 // The message doesn't fit and the buffer contains only some of it. | |
| 36 MESSAGE_IS_TRUNCATED, | |
| 37 | |
| 38 // The buffer contains a full message + extra data. | |
| 39 MESSAGE_HAS_EXTRA_DATA | |
| 40 }; | |
| 41 | |
| 42 BufferSizeStatus GetBufferStatus(const char* data, size_t len) { | |
| 43 if (len < sizeof(NaClIPCAdapter::NaClMessageHeader)) | |
| 44 return MESSAGE_IS_TRUNCATED; | |
| 45 | |
| 46 const NaClIPCAdapter::NaClMessageHeader* header = | |
| 47 reinterpret_cast<const NaClIPCAdapter::NaClMessageHeader*>(data); | |
| 48 uint32 message_size = | |
| 49 sizeof(NaClIPCAdapter::NaClMessageHeader) + header->payload_size; | |
| 50 | |
| 51 if (len == message_size) | |
| 52 return MESSAGE_IS_COMPLETE; | |
| 53 if (len > message_size) | |
| 54 return MESSAGE_HAS_EXTRA_DATA; | |
| 55 return MESSAGE_IS_TRUNCATED; | |
| 56 } | |
| 57 | |
| 58 // This object allows the NaClDesc to hold a reference to a NaClIPCAdapter and | |
| 59 // forward calls to it. | |
| 60 struct DescThunker { | |
| 61 explicit DescThunker(NaClIPCAdapter* adapter_param) | |
| 62 : adapter(adapter_param) { | |
| 63 } | |
| 64 scoped_refptr<NaClIPCAdapter> adapter; | |
| 65 }; | |
| 66 | |
| 67 NaClIPCAdapter* ToAdapter(void* handle) { | |
| 68 return static_cast<DescThunker*>(handle)->adapter.get(); | |
| 69 } | |
| 70 | |
| 71 // NaClDescCustom implementation. | |
| 72 void NaClDescCustomDestroy(void* handle) { | |
| 73 delete static_cast<DescThunker*>(handle); | |
| 74 } | |
| 75 | |
| 76 ssize_t NaClDescCustomSendMsg(void* handle, const NaClImcTypedMsgHdr* msg, | |
| 77 int /* flags */) { | |
| 78 return static_cast<ssize_t>(ToAdapter(handle)->Send(msg)); | |
| 79 } | |
| 80 | |
| 81 ssize_t NaClDescCustomRecvMsg(void* handle, NaClImcTypedMsgHdr* msg, | |
| 82 int /* flags */) { | |
| 83 return static_cast<ssize_t>(ToAdapter(handle)->BlockingReceive(msg)); | |
| 84 } | |
| 85 | |
| 86 NaClDesc* MakeNaClDescCustom(NaClIPCAdapter* adapter) { | |
| 87 NaClDescCustomFuncs funcs = NACL_DESC_CUSTOM_FUNCS_INITIALIZER; | |
| 88 funcs.Destroy = NaClDescCustomDestroy; | |
| 89 funcs.SendMsg = NaClDescCustomSendMsg; | |
| 90 funcs.RecvMsg = NaClDescCustomRecvMsg; | |
| 91 // NaClDescMakeCustomDesc gives us a reference on the returned NaClDesc. | |
| 92 return NaClDescMakeCustomDesc(new DescThunker(adapter), &funcs); | |
| 93 } | |
| 94 | |
| 95 void DeleteChannel(IPC::Channel* channel) { | |
| 96 delete channel; | |
| 97 } | |
| 98 | |
| 99 // Translates Pepper's read/write open flags into the NaCl equivalents. | |
| 100 // Since the host has already opened the file, flags such as O_CREAT, O_TRUNC, | |
| 101 // and O_EXCL don't make sense, so we filter those out. If no read or write | |
| 102 // flags are set, the function returns NACL_ABI_O_RDONLY as a safe fallback. | |
| 103 int TranslatePepperFileReadWriteOpenFlags(int32_t pp_open_flags) { | |
| 104 bool read = (pp_open_flags & PP_FILEOPENFLAG_READ) != 0; | |
| 105 bool write = (pp_open_flags & PP_FILEOPENFLAG_WRITE) != 0; | |
| 106 bool append = (pp_open_flags & PP_FILEOPENFLAG_APPEND) != 0; | |
| 107 | |
| 108 int nacl_open_flag = NACL_ABI_O_RDONLY; // NACL_ABI_O_RDONLY == 0. | |
| 109 if (read && (write || append)) { | |
| 110 nacl_open_flag = NACL_ABI_O_RDWR; | |
| 111 } else if (write || append) { | |
| 112 nacl_open_flag = NACL_ABI_O_WRONLY; | |
| 113 } else if (!read) { | |
| 114 DLOG(WARNING) << "One of PP_FILEOPENFLAG_READ, PP_FILEOPENFLAG_WRITE, " | |
| 115 << "or PP_FILEOPENFLAG_APPEND should be set."; | |
| 116 } | |
| 117 if (append) | |
| 118 nacl_open_flag |= NACL_ABI_O_APPEND; | |
| 119 | |
| 120 return nacl_open_flag; | |
| 121 } | |
| 122 | |
| 123 class NaClDescWrapper { | |
| 124 public: | |
| 125 explicit NaClDescWrapper(NaClDesc* desc): desc_(desc) {} | |
| 126 ~NaClDescWrapper() { | |
| 127 NaClDescUnref(desc_); | |
| 128 } | |
| 129 | |
| 130 NaClDesc* desc() { return desc_; } | |
| 131 | |
| 132 private: | |
| 133 NaClDesc* desc_; | |
| 134 DISALLOW_COPY_AND_ASSIGN(NaClDescWrapper); | |
| 135 }; | |
| 136 | |
| 137 } // namespace | |
| 138 | |
| 139 class NaClIPCAdapter::RewrittenMessage | |
| 140 : public base::RefCounted<RewrittenMessage> { | |
| 141 public: | |
| 142 RewrittenMessage(); | |
| 143 | |
| 144 bool is_consumed() const { return data_read_cursor_ == data_len_; } | |
| 145 | |
| 146 void SetData(const NaClIPCAdapter::NaClMessageHeader& header, | |
| 147 const void* payload, size_t payload_length); | |
| 148 | |
| 149 int Read(NaClImcTypedMsgHdr* msg); | |
| 150 | |
| 151 void AddDescriptor(NaClDescWrapper* desc) { descs_.push_back(desc); } | |
| 152 | |
| 153 size_t desc_count() const { return descs_.size(); } | |
| 154 | |
| 155 private: | |
| 156 friend class base::RefCounted<RewrittenMessage>; | |
| 157 ~RewrittenMessage() {} | |
| 158 | |
| 159 scoped_ptr<char[]> data_; | |
| 160 size_t data_len_; | |
| 161 | |
| 162 // Offset into data where the next read will happen. This will be equal to | |
| 163 // data_len_ when all data has been consumed. | |
| 164 size_t data_read_cursor_; | |
| 165 | |
| 166 // Wrapped descriptors for transfer to untrusted code. | |
| 167 ScopedVector<NaClDescWrapper> descs_; | |
| 168 }; | |
| 169 | |
| 170 NaClIPCAdapter::RewrittenMessage::RewrittenMessage() | |
| 171 : data_len_(0), | |
| 172 data_read_cursor_(0) { | |
| 173 } | |
| 174 | |
| 175 void NaClIPCAdapter::RewrittenMessage::SetData( | |
| 176 const NaClIPCAdapter::NaClMessageHeader& header, | |
| 177 const void* payload, | |
| 178 size_t payload_length) { | |
| 179 DCHECK(!data_.get() && data_len_ == 0); | |
| 180 size_t header_len = sizeof(NaClIPCAdapter::NaClMessageHeader); | |
| 181 data_len_ = header_len + payload_length; | |
| 182 data_.reset(new char[data_len_]); | |
| 183 | |
| 184 memcpy(data_.get(), &header, sizeof(NaClIPCAdapter::NaClMessageHeader)); | |
| 185 memcpy(&data_[header_len], payload, payload_length); | |
| 186 } | |
| 187 | |
| 188 int NaClIPCAdapter::RewrittenMessage::Read(NaClImcTypedMsgHdr* msg) { | |
| 189 CHECK(data_len_ >= data_read_cursor_); | |
| 190 char* dest_buffer = static_cast<char*>(msg->iov[0].base); | |
| 191 size_t dest_buffer_size = msg->iov[0].length; | |
| 192 size_t bytes_to_write = std::min(dest_buffer_size, | |
| 193 data_len_ - data_read_cursor_); | |
| 194 if (bytes_to_write == 0) | |
| 195 return 0; | |
| 196 | |
| 197 memcpy(dest_buffer, &data_[data_read_cursor_], bytes_to_write); | |
| 198 data_read_cursor_ += bytes_to_write; | |
| 199 | |
| 200 // Once all data has been consumed, transfer any file descriptors. | |
| 201 if (is_consumed()) { | |
| 202 nacl_abi_size_t desc_count = static_cast<nacl_abi_size_t>(descs_.size()); | |
| 203 CHECK(desc_count <= msg->ndesc_length); | |
| 204 msg->ndesc_length = desc_count; | |
| 205 for (nacl_abi_size_t i = 0; i < desc_count; i++) { | |
| 206 // Copy the NaClDesc to the buffer and add a ref so it won't be freed | |
| 207 // when we clear our ScopedVector. | |
| 208 msg->ndescv[i] = descs_[i]->desc(); | |
| 209 NaClDescRef(descs_[i]->desc()); | |
| 210 } | |
| 211 descs_.clear(); | |
| 212 } else { | |
| 213 msg->ndesc_length = 0; | |
| 214 } | |
| 215 return static_cast<int>(bytes_to_write); | |
| 216 } | |
| 217 | |
| 218 NaClIPCAdapter::LockedData::LockedData() | |
| 219 : channel_closed_(false) { | |
| 220 } | |
| 221 | |
| 222 NaClIPCAdapter::LockedData::~LockedData() { | |
| 223 } | |
| 224 | |
| 225 NaClIPCAdapter::IOThreadData::IOThreadData() { | |
| 226 } | |
| 227 | |
| 228 NaClIPCAdapter::IOThreadData::~IOThreadData() { | |
| 229 } | |
| 230 | |
| 231 NaClIPCAdapter::NaClIPCAdapter(const IPC::ChannelHandle& handle, | |
| 232 base::TaskRunner* runner) | |
| 233 : lock_(), | |
| 234 cond_var_(&lock_), | |
| 235 task_runner_(runner), | |
| 236 locked_data_() { | |
| 237 io_thread_data_.channel_.reset( | |
| 238 new IPC::Channel(handle, IPC::Channel::MODE_SERVER, this)); | |
| 239 // Note, we can not PostTask for ConnectChannelOnIOThread here. If we did, | |
| 240 // and that task ran before this constructor completes, the reference count | |
| 241 // would go to 1 and then to 0 because of the Task, before we've been returned | |
| 242 // to the owning scoped_refptr, which is supposed to give us our first | |
| 243 // ref-count. | |
| 244 } | |
| 245 | |
| 246 NaClIPCAdapter::NaClIPCAdapter(scoped_ptr<IPC::Channel> channel, | |
| 247 base::TaskRunner* runner) | |
| 248 : lock_(), | |
| 249 cond_var_(&lock_), | |
| 250 task_runner_(runner), | |
| 251 locked_data_() { | |
| 252 io_thread_data_.channel_ = channel.Pass(); | |
| 253 } | |
| 254 | |
| 255 void NaClIPCAdapter::ConnectChannel() { | |
| 256 task_runner_->PostTask(FROM_HERE, | |
| 257 base::Bind(&NaClIPCAdapter::ConnectChannelOnIOThread, this)); | |
| 258 } | |
| 259 | |
| 260 // Note that this message is controlled by the untrusted code. So we should be | |
| 261 // skeptical of anything it contains and quick to give up if anything is fishy. | |
| 262 int NaClIPCAdapter::Send(const NaClImcTypedMsgHdr* msg) { | |
| 263 if (msg->iov_length != 1) | |
| 264 return -1; | |
| 265 | |
| 266 base::AutoLock lock(lock_); | |
| 267 | |
| 268 const char* input_data = static_cast<char*>(msg->iov[0].base); | |
| 269 size_t input_data_len = msg->iov[0].length; | |
| 270 if (input_data_len > IPC::Channel::kMaximumMessageSize) { | |
| 271 ClearToBeSent(); | |
| 272 return -1; | |
| 273 } | |
| 274 | |
| 275 // current_message[_len] refers to the total input data received so far. | |
| 276 const char* current_message; | |
| 277 size_t current_message_len; | |
| 278 bool did_append_input_data; | |
| 279 if (locked_data_.to_be_sent_.empty()) { | |
| 280 // No accumulated data, we can avoid a copy by referring to the input | |
| 281 // buffer (the entire message fitting in one call is the common case). | |
| 282 current_message = input_data; | |
| 283 current_message_len = input_data_len; | |
| 284 did_append_input_data = false; | |
| 285 } else { | |
| 286 // We've already accumulated some data, accumulate this new data and | |
| 287 // point to the beginning of the buffer. | |
| 288 | |
| 289 // Make sure our accumulated message size doesn't overflow our max. Since | |
| 290 // we know that data_len < max size (checked above) and our current | |
| 291 // accumulated value is also < max size, we just need to make sure that | |
| 292 // 2x max size can never overflow. | |
| 293 COMPILE_ASSERT(IPC::Channel::kMaximumMessageSize < (UINT_MAX / 2), | |
| 294 MaximumMessageSizeWillOverflow); | |
| 295 size_t new_size = locked_data_.to_be_sent_.size() + input_data_len; | |
| 296 if (new_size > IPC::Channel::kMaximumMessageSize) { | |
| 297 ClearToBeSent(); | |
| 298 return -1; | |
| 299 } | |
| 300 | |
| 301 locked_data_.to_be_sent_.append(input_data, input_data_len); | |
| 302 current_message = &locked_data_.to_be_sent_[0]; | |
| 303 current_message_len = locked_data_.to_be_sent_.size(); | |
| 304 did_append_input_data = true; | |
| 305 } | |
| 306 | |
| 307 // Check the total data we've accumulated so far to see if it contains a full | |
| 308 // message. | |
| 309 switch (GetBufferStatus(current_message, current_message_len)) { | |
| 310 case MESSAGE_IS_COMPLETE: { | |
| 311 // Got a complete message, can send it out. This will be the common case. | |
| 312 bool success = SendCompleteMessage(current_message, current_message_len); | |
| 313 ClearToBeSent(); | |
| 314 return success ? static_cast<int>(input_data_len) : -1; | |
| 315 } | |
| 316 case MESSAGE_IS_TRUNCATED: | |
| 317 // For truncated messages, just accumulate the new data (if we didn't | |
| 318 // already do so above) and go back to waiting for more. | |
| 319 if (!did_append_input_data) | |
| 320 locked_data_.to_be_sent_.append(input_data, input_data_len); | |
| 321 return static_cast<int>(input_data_len); | |
| 322 case MESSAGE_HAS_EXTRA_DATA: | |
| 323 default: | |
| 324 // When the plugin gives us too much data, it's an error. | |
| 325 ClearToBeSent(); | |
| 326 return -1; | |
| 327 } | |
| 328 } | |
| 329 | |
| 330 int NaClIPCAdapter::BlockingReceive(NaClImcTypedMsgHdr* msg) { | |
| 331 if (msg->iov_length != 1) | |
| 332 return -1; | |
| 333 | |
| 334 int retval = 0; | |
| 335 { | |
| 336 base::AutoLock lock(lock_); | |
| 337 while (locked_data_.to_be_received_.empty() && | |
| 338 !locked_data_.channel_closed_) | |
| 339 cond_var_.Wait(); | |
| 340 if (locked_data_.channel_closed_) { | |
| 341 retval = -1; | |
| 342 } else { | |
| 343 retval = LockedReceive(msg); | |
| 344 DCHECK(retval > 0); | |
| 345 } | |
| 346 } | |
| 347 cond_var_.Signal(); | |
| 348 return retval; | |
| 349 } | |
| 350 | |
| 351 void NaClIPCAdapter::CloseChannel() { | |
| 352 { | |
| 353 base::AutoLock lock(lock_); | |
| 354 locked_data_.channel_closed_ = true; | |
| 355 } | |
| 356 cond_var_.Signal(); | |
| 357 | |
| 358 task_runner_->PostTask(FROM_HERE, | |
| 359 base::Bind(&NaClIPCAdapter::CloseChannelOnIOThread, this)); | |
| 360 } | |
| 361 | |
| 362 NaClDesc* NaClIPCAdapter::MakeNaClDesc() { | |
| 363 return MakeNaClDescCustom(this); | |
| 364 } | |
| 365 | |
| 366 #if defined(OS_POSIX) | |
| 367 int NaClIPCAdapter::TakeClientFileDescriptor() { | |
| 368 return io_thread_data_.channel_->TakeClientFileDescriptor(); | |
| 369 } | |
| 370 #endif | |
| 371 | |
| 372 bool NaClIPCAdapter::OnMessageReceived(const IPC::Message& msg) { | |
| 373 { | |
| 374 base::AutoLock lock(lock_); | |
| 375 | |
| 376 scoped_refptr<RewrittenMessage> rewritten_msg(new RewrittenMessage); | |
| 377 | |
| 378 typedef std::vector<ppapi::proxy::SerializedHandle> Handles; | |
| 379 Handles handles; | |
| 380 scoped_ptr<IPC::Message> new_msg_ptr; | |
| 381 bool success = locked_data_.handle_converter_.ConvertNativeHandlesToPosix( | |
| 382 msg, &handles, &new_msg_ptr); | |
| 383 if (!success) | |
| 384 return false; | |
| 385 | |
| 386 // Now add any descriptors we found to rewritten_msg. |handles| is usually | |
| 387 // empty, unless we read a message containing a FD or handle. | |
| 388 for (Handles::const_iterator iter = handles.begin(); | |
| 389 iter != handles.end(); | |
| 390 ++iter) { | |
| 391 scoped_ptr<NaClDescWrapper> nacl_desc; | |
| 392 switch (iter->type()) { | |
| 393 case ppapi::proxy::SerializedHandle::SHARED_MEMORY: { | |
| 394 const base::SharedMemoryHandle& shm_handle = iter->shmem(); | |
| 395 uint32_t size = iter->size(); | |
| 396 nacl_desc.reset(new NaClDescWrapper(NaClDescImcShmMake( | |
| 397 #if defined(OS_WIN) | |
| 398 shm_handle, | |
| 399 #else | |
| 400 shm_handle.fd, | |
| 401 #endif | |
| 402 static_cast<size_t>(size)))); | |
| 403 break; | |
| 404 } | |
| 405 case ppapi::proxy::SerializedHandle::SOCKET: { | |
| 406 nacl_desc.reset(new NaClDescWrapper(NaClDescSyncSocketMake( | |
| 407 #if defined(OS_WIN) | |
| 408 iter->descriptor() | |
| 409 #else | |
| 410 iter->descriptor().fd | |
| 411 #endif | |
| 412 ))); | |
| 413 break; | |
| 414 } | |
| 415 case ppapi::proxy::SerializedHandle::CHANNEL_HANDLE: { | |
| 416 // Check that this came from a PpapiMsg_CreateNaClChannel message. | |
| 417 // This code here is only appropriate for that message. | |
| 418 DCHECK(msg.type() == PpapiMsg_CreateNaClChannel::ID); | |
| 419 IPC::ChannelHandle channel_handle = | |
| 420 IPC::Channel::GenerateVerifiedChannelID("nacl"); | |
| 421 scoped_refptr<NaClIPCAdapter> ipc_adapter( | |
| 422 new NaClIPCAdapter(channel_handle, task_runner_.get())); | |
| 423 ipc_adapter->ConnectChannel(); | |
| 424 #if defined(OS_POSIX) | |
| 425 channel_handle.socket = base::FileDescriptor( | |
| 426 ipc_adapter->TakeClientFileDescriptor(), true); | |
| 427 #endif | |
| 428 nacl_desc.reset(new NaClDescWrapper(ipc_adapter->MakeNaClDesc())); | |
| 429 // Send back a message that the channel was created. | |
| 430 scoped_ptr<IPC::Message> response( | |
| 431 new PpapiHostMsg_ChannelCreated(channel_handle)); | |
| 432 task_runner_->PostTask(FROM_HERE, | |
| 433 base::Bind(&NaClIPCAdapter::SendMessageOnIOThread, this, | |
| 434 base::Passed(&response))); | |
| 435 break; | |
| 436 } | |
| 437 case ppapi::proxy::SerializedHandle::FILE: | |
| 438 nacl_desc.reset(new NaClDescWrapper(NaClDescIoDescFromHandleAllocCtor( | |
| 439 #if defined(OS_WIN) | |
| 440 iter->descriptor(), | |
| 441 #else | |
| 442 iter->descriptor().fd, | |
| 443 #endif | |
| 444 TranslatePepperFileReadWriteOpenFlags(iter->open_flag())))); | |
| 445 break; | |
| 446 case ppapi::proxy::SerializedHandle::INVALID: { | |
| 447 // Nothing to do. TODO(dmichael): Should we log this? Or is it | |
| 448 // sometimes okay to pass an INVALID handle? | |
| 449 break; | |
| 450 } | |
| 451 // No default, so the compiler will warn us if new types get added. | |
| 452 } | |
| 453 if (nacl_desc.get()) | |
| 454 rewritten_msg->AddDescriptor(nacl_desc.release()); | |
| 455 } | |
| 456 if (new_msg_ptr && !handles.empty()) | |
| 457 SaveMessage(*new_msg_ptr, rewritten_msg.get()); | |
| 458 else | |
| 459 SaveMessage(msg, rewritten_msg.get()); | |
| 460 } | |
| 461 cond_var_.Signal(); | |
| 462 return true; | |
| 463 } | |
| 464 | |
| 465 void NaClIPCAdapter::OnChannelConnected(int32 peer_pid) { | |
| 466 } | |
| 467 | |
| 468 void NaClIPCAdapter::OnChannelError() { | |
| 469 CloseChannel(); | |
| 470 } | |
| 471 | |
| 472 NaClIPCAdapter::~NaClIPCAdapter() { | |
| 473 // Make sure the channel is deleted on the IO thread. | |
| 474 task_runner_->PostTask(FROM_HERE, | |
| 475 base::Bind(&DeleteChannel, io_thread_data_.channel_.release())); | |
| 476 } | |
| 477 | |
| 478 int NaClIPCAdapter::LockedReceive(NaClImcTypedMsgHdr* msg) { | |
| 479 lock_.AssertAcquired(); | |
| 480 | |
| 481 if (locked_data_.to_be_received_.empty()) | |
| 482 return 0; | |
| 483 scoped_refptr<RewrittenMessage> current = | |
| 484 locked_data_.to_be_received_.front(); | |
| 485 | |
| 486 int retval = current->Read(msg); | |
| 487 | |
| 488 // When a message is entirely consumed, remove if from the waiting queue. | |
| 489 if (current->is_consumed()) | |
| 490 locked_data_.to_be_received_.pop(); | |
| 491 | |
| 492 return retval; | |
| 493 } | |
| 494 | |
| 495 bool NaClIPCAdapter::SendCompleteMessage(const char* buffer, | |
| 496 size_t buffer_len) { | |
| 497 lock_.AssertAcquired(); | |
| 498 // The message will have already been validated, so we know it's large enough | |
| 499 // for our header. | |
| 500 const NaClMessageHeader* header = | |
| 501 reinterpret_cast<const NaClMessageHeader*>(buffer); | |
| 502 | |
| 503 // Length of the message not including the body. The data passed to us by the | |
| 504 // plugin should match that in the message header. This should have already | |
| 505 // been validated by GetBufferStatus. | |
| 506 int body_len = static_cast<int>(buffer_len - sizeof(NaClMessageHeader)); | |
| 507 DCHECK(body_len == static_cast<int>(header->payload_size)); | |
| 508 | |
| 509 // We actually discard the flags and only copy the ones we care about. This | |
| 510 // is just because message doesn't have a constructor that takes raw flags. | |
| 511 scoped_ptr<IPC::Message> msg( | |
| 512 new IPC::Message(header->routing, header->type, | |
| 513 IPC::Message::PRIORITY_NORMAL)); | |
| 514 if (header->flags & IPC::Message::SYNC_BIT) | |
| 515 msg->set_sync(); | |
| 516 if (header->flags & IPC::Message::REPLY_BIT) | |
| 517 msg->set_reply(); | |
| 518 if (header->flags & IPC::Message::REPLY_ERROR_BIT) | |
| 519 msg->set_reply_error(); | |
| 520 if (header->flags & IPC::Message::UNBLOCK_BIT) | |
| 521 msg->set_unblock(true); | |
| 522 | |
| 523 msg->WriteBytes(&buffer[sizeof(NaClMessageHeader)], body_len); | |
| 524 | |
| 525 // Technically we didn't have to do any of the previous work in the lock. But | |
| 526 // sometimes our buffer will point to the to_be_sent_ string which is | |
| 527 // protected by the lock, and it's messier to factor Send() such that it can | |
| 528 // unlock for us. Holding the lock for the message construction, which is | |
| 529 // just some memcpys, shouldn't be a big deal. | |
| 530 lock_.AssertAcquired(); | |
| 531 if (locked_data_.channel_closed_) | |
| 532 return false; // TODO(brettw) clean up handles here when we add support! | |
| 533 | |
| 534 if (msg->is_sync()) { | |
| 535 locked_data_.handle_converter_.RegisterSyncMessageForReply(*msg); | |
| 536 } | |
| 537 // Actual send must be done on the I/O thread. | |
| 538 task_runner_->PostTask(FROM_HERE, | |
| 539 base::Bind(&NaClIPCAdapter::SendMessageOnIOThread, this, | |
| 540 base::Passed(&msg))); | |
| 541 return true; | |
| 542 } | |
| 543 | |
| 544 void NaClIPCAdapter::ClearToBeSent() { | |
| 545 lock_.AssertAcquired(); | |
| 546 | |
| 547 // Don't let the string keep its buffer behind our back. | |
| 548 std::string empty; | |
| 549 locked_data_.to_be_sent_.swap(empty); | |
| 550 } | |
| 551 | |
| 552 void NaClIPCAdapter::ConnectChannelOnIOThread() { | |
| 553 if (!io_thread_data_.channel_->Connect()) | |
| 554 NOTREACHED(); | |
| 555 } | |
| 556 | |
| 557 void NaClIPCAdapter::CloseChannelOnIOThread() { | |
| 558 io_thread_data_.channel_->Close(); | |
| 559 } | |
| 560 | |
| 561 void NaClIPCAdapter::SendMessageOnIOThread(scoped_ptr<IPC::Message> message) { | |
| 562 io_thread_data_.channel_->Send(message.release()); | |
| 563 } | |
| 564 | |
| 565 void NaClIPCAdapter::SaveMessage(const IPC::Message& msg, | |
| 566 RewrittenMessage* rewritten_msg) { | |
| 567 lock_.AssertAcquired(); | |
| 568 // There is some padding in this structure (the "padding" member is 16 | |
| 569 // bits but this then gets padded to 32 bits). We want to be sure not to | |
| 570 // leak data to the untrusted plugin, so zero everything out first. | |
| 571 NaClMessageHeader header; | |
| 572 memset(&header, 0, sizeof(NaClMessageHeader)); | |
| 573 | |
| 574 header.payload_size = static_cast<uint32>(msg.payload_size()); | |
| 575 header.routing = msg.routing_id(); | |
| 576 header.type = msg.type(); | |
| 577 header.flags = msg.flags(); | |
| 578 header.num_fds = static_cast<int>(rewritten_msg->desc_count()); | |
| 579 | |
| 580 rewritten_msg->SetData(header, msg.payload(), msg.payload_size()); | |
| 581 locked_data_.to_be_received_.push(rewritten_msg); | |
| 582 } | |
| 583 | |
| 584 int TranslatePepperFileReadWriteOpenFlagsForTesting(int32_t pp_open_flags) { | |
| 585 return TranslatePepperFileReadWriteOpenFlags(pp_open_flags); | |
| 586 } | |
| OLD | NEW |