OLD | NEW |
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "components/nacl/browser/nacl_file_host.h" | 5 #include "components/nacl/browser/nacl_file_host.h" |
6 | 6 |
7 #include <stddef.h> | 7 #include <stddef.h> |
8 #include <stdint.h> | 8 #include <stdint.h> |
9 #include <utility> | 9 #include <utility> |
10 | 10 |
11 #include "base/bind.h" | 11 #include "base/bind.h" |
12 #include "base/files/file.h" | 12 #include "base/files/file.h" |
13 #include "base/files/file_path.h" | 13 #include "base/files/file_path.h" |
14 #include "base/files/file_util.h" | 14 #include "base/files/file_util.h" |
15 #include "base/strings/utf_string_conversions.h" | 15 #include "base/strings/utf_string_conversions.h" |
16 #include "base/threading/sequenced_worker_pool.h" | 16 #include "base/threading/sequenced_worker_pool.h" |
17 #include "components/nacl/browser/bad_message.h" | 17 #include "components/nacl/browser/bad_message.h" |
18 #include "components/nacl/browser/nacl_browser.h" | 18 #include "components/nacl/browser/nacl_browser.h" |
19 #include "components/nacl/browser/nacl_browser_delegate.h" | 19 #include "components/nacl/browser/nacl_browser_delegate.h" |
20 #include "components/nacl/browser/nacl_host_message_filter.h" | |
21 #include "components/nacl/common/nacl_host_messages.h" | |
22 #include "content/public/browser/browser_thread.h" | 20 #include "content/public/browser/browser_thread.h" |
23 #include "content/public/browser/render_view_host.h" | 21 #include "content/public/browser/render_view_host.h" |
24 #include "content/public/browser/site_instance.h" | 22 #include "content/public/browser/site_instance.h" |
25 #include "ipc/ipc_platform_file.h" | |
26 | 23 |
27 using content::BrowserThread; | 24 using content::BrowserThread; |
28 | 25 |
| 26 namespace nacl_file_host { |
29 namespace { | 27 namespace { |
30 | 28 |
31 // Force a prefix to prevent user from opening "magic" files. | 29 // Force a prefix to prevent user from opening "magic" files. |
32 const char* kExpectedFilePrefix = "pnacl_public_"; | 30 const char* kExpectedFilePrefix = "pnacl_public_"; |
33 | 31 |
34 // Restrict PNaCl file lengths to reduce likelyhood of hitting bugs | 32 // Restrict PNaCl file lengths to reduce likelyhood of hitting bugs |
35 // in file name limit error-handling-code-paths, etc. | 33 // in file name limit error-handling-code-paths, etc. |
36 const size_t kMaxFileLength = 40; | 34 const size_t kMaxFileLength = 40; |
37 | 35 |
38 void NotifyRendererOfError( | 36 void NotifyRendererOfError( |
39 nacl::NaClHostMessageFilter* nacl_host_message_filter, | 37 const scoped_refptr<base::TaskRunner>& origin_task_runner, |
40 IPC::Message* reply_msg) { | 38 const OpenFileCallback& callback) { |
41 reply_msg->set_reply_error(); | 39 origin_task_runner->PostTask( |
42 nacl_host_message_filter->Send(reply_msg); | 40 FROM_HERE, base::Bind(callback, base::Passed(base::File()), 0, 0)); |
43 } | 41 } |
44 | 42 |
45 typedef void (*WriteFileInfoReply)(IPC::Message* reply_msg, | |
46 const IPC::PlatformFileForTransit& file_desc, | |
47 const uint64_t& file_token_lo, | |
48 const uint64_t& file_token_hi); | |
49 | |
50 void DoRegisterOpenedNaClExecutableFile( | 43 void DoRegisterOpenedNaClExecutableFile( |
51 scoped_refptr<nacl::NaClHostMessageFilter> nacl_host_message_filter, | |
52 base::File file, | 44 base::File file, |
53 base::FilePath file_path, | 45 base::FilePath file_path, |
54 IPC::Message* reply_msg, | 46 const scoped_refptr<base::TaskRunner>& origin_task_runner, |
55 WriteFileInfoReply write_reply_message) { | 47 const OpenFileCallback& callback) { |
56 // IO thread owns the NaClBrowser singleton. | 48 // IO thread owns the NaClBrowser singleton. |
57 DCHECK_CURRENTLY_ON(BrowserThread::IO); | 49 DCHECK_CURRENTLY_ON(BrowserThread::IO); |
58 | 50 |
59 nacl::NaClBrowser* nacl_browser = nacl::NaClBrowser::GetInstance(); | 51 nacl::NaClBrowser* nacl_browser = nacl::NaClBrowser::GetInstance(); |
60 uint64_t file_token_lo = 0; | 52 uint64_t file_token_lo = 0; |
61 uint64_t file_token_hi = 0; | 53 uint64_t file_token_hi = 0; |
62 nacl_browser->PutFilePath(file_path, &file_token_lo, &file_token_hi); | 54 nacl_browser->PutFilePath(file_path, &file_token_lo, &file_token_hi); |
63 | 55 |
64 IPC::PlatformFileForTransit file_desc = | 56 origin_task_runner->PostTask( |
65 IPC::TakePlatformFileForTransit(std::move(file)); | 57 FROM_HERE, |
66 | 58 base::Bind(callback, base::Passed(&file), file_token_lo, file_token_hi)); |
67 write_reply_message(reply_msg, file_desc, file_token_lo, file_token_hi); | |
68 nacl_host_message_filter->Send(reply_msg); | |
69 } | 59 } |
70 | 60 |
71 void DoOpenPnaclFile( | 61 void DoOpenPnaclFile(const std::string& filename, |
72 scoped_refptr<nacl::NaClHostMessageFilter> nacl_host_message_filter, | 62 bool is_executable, |
73 const std::string& filename, | 63 const scoped_refptr<base::TaskRunner>& origin_task_runner, |
74 bool is_executable, | 64 const OpenFileCallback& callback) { |
75 IPC::Message* reply_msg) { | |
76 DCHECK(BrowserThread::GetBlockingPool()->RunsTasksOnCurrentThread()); | 65 DCHECK(BrowserThread::GetBlockingPool()->RunsTasksOnCurrentThread()); |
77 base::FilePath full_filepath; | 66 base::FilePath full_filepath; |
78 | 67 |
79 // PNaCl must be installed. | 68 // PNaCl must be installed. |
80 base::FilePath pnacl_dir; | 69 base::FilePath pnacl_dir; |
81 if (!nacl::NaClBrowser::GetDelegate()->GetPnaclDirectory(&pnacl_dir) || | 70 if (!nacl::NaClBrowser::GetDelegate()->GetPnaclDirectory(&pnacl_dir) || |
82 !base::PathExists(pnacl_dir)) { | 71 !base::PathExists(pnacl_dir)) { |
83 NotifyRendererOfError(nacl_host_message_filter.get(), reply_msg); | 72 NotifyRendererOfError(origin_task_runner, callback); |
84 return; | 73 return; |
85 } | 74 } |
86 | 75 |
87 // Do some validation. | 76 // Do some validation. |
88 if (!nacl_file_host::PnaclCanOpenFile(filename, &full_filepath)) { | 77 if (!nacl_file_host::PnaclCanOpenFile(filename, &full_filepath)) { |
89 NotifyRendererOfError(nacl_host_message_filter.get(), reply_msg); | 78 NotifyRendererOfError(origin_task_runner, callback); |
90 return; | 79 return; |
91 } | 80 } |
92 | 81 |
93 base::File file_to_open = nacl::OpenNaClReadExecImpl(full_filepath, | 82 base::File file_to_open = nacl::OpenNaClReadExecImpl(full_filepath, |
94 is_executable); | 83 is_executable); |
95 if (!file_to_open.IsValid()) { | 84 if (!file_to_open.IsValid()) { |
96 NotifyRendererOfError(nacl_host_message_filter.get(), reply_msg); | 85 NotifyRendererOfError(origin_task_runner, callback); |
97 return; | 86 return; |
98 } | 87 } |
99 | 88 |
100 // This function is running on the blocking pool, but the path needs to be | 89 // This function is running on the blocking pool, but the path needs to be |
101 // registered in a structure owned by the IO thread. | 90 // registered in a structure owned by the IO thread. |
102 // Not all PNaCl files are executable. Only register those that are | 91 // Not all PNaCl files are executable. Only register those that are |
103 // executable in the NaCl file_path cache. | 92 // executable in the NaCl file_path cache. |
104 if (is_executable) { | 93 if (is_executable) { |
105 BrowserThread::PostTask( | 94 BrowserThread::PostTask( |
106 BrowserThread::IO, FROM_HERE, | 95 BrowserThread::IO, FROM_HERE, |
107 base::Bind(&DoRegisterOpenedNaClExecutableFile, | 96 base::Bind(&DoRegisterOpenedNaClExecutableFile, Passed(&file_to_open), |
108 nacl_host_message_filter, Passed(std::move(file_to_open)), | 97 full_filepath, origin_task_runner, callback)); |
109 full_filepath, reply_msg, | |
110 static_cast<WriteFileInfoReply>( | |
111 NaClHostMsg_GetReadonlyPnaclFD::WriteReplyParams))); | |
112 } else { | 98 } else { |
113 IPC::PlatformFileForTransit target_desc = | 99 constexpr uint64_t kDummyFileToken = 0; |
114 IPC::TakePlatformFileForTransit(std::move(file_to_open)); | 100 origin_task_runner->PostTask( |
115 uint64_t dummy_file_token = 0; | 101 FROM_HERE, base::Bind(callback, base::Passed(&file_to_open), |
116 NaClHostMsg_GetReadonlyPnaclFD::WriteReplyParams( | 102 kDummyFileToken, kDummyFileToken)); |
117 reply_msg, target_desc, dummy_file_token, dummy_file_token); | |
118 nacl_host_message_filter->Send(reply_msg); | |
119 } | 103 } |
120 } | 104 } |
121 | 105 |
122 // Convert the file URL into a file descriptor. | 106 // Convert the file URL into a file descriptor. |
123 // This function is security sensitive. Be sure to check with a security | 107 // This function is security sensitive. Be sure to check with a security |
124 // person before you modify it. | 108 // person before you modify it. |
125 void DoOpenNaClExecutableOnThreadPool( | 109 void DoOpenNaClExecutableOnThreadPool( |
126 scoped_refptr<nacl::NaClHostMessageFilter> nacl_host_message_filter, | |
127 const GURL& file_url, | 110 const GURL& file_url, |
128 bool enable_validation_caching, | 111 bool enable_validation_caching, |
129 IPC::Message* reply_msg) { | 112 const base::FilePath& profile_directory, |
| 113 const scoped_refptr<base::TaskRunner>& origin_task_runner, |
| 114 const OpenFileCallback& callback) { |
130 DCHECK(BrowserThread::GetBlockingPool()->RunsTasksOnCurrentThread()); | 115 DCHECK(BrowserThread::GetBlockingPool()->RunsTasksOnCurrentThread()); |
131 | 116 |
132 base::FilePath file_path; | 117 base::FilePath file_path; |
133 if (!nacl::NaClBrowser::GetDelegate()->MapUrlToLocalFilePath( | 118 if (!nacl::NaClBrowser::GetDelegate()->MapUrlToLocalFilePath( |
134 file_url, | 119 file_url, true /* use_blocking_api */, profile_directory, |
135 true /* use_blocking_api */, | |
136 nacl_host_message_filter->profile_directory(), | |
137 &file_path)) { | 120 &file_path)) { |
138 NotifyRendererOfError(nacl_host_message_filter.get(), reply_msg); | 121 NotifyRendererOfError(origin_task_runner, callback); |
139 return; | 122 return; |
140 } | 123 } |
141 | 124 |
142 base::File file = nacl::OpenNaClReadExecImpl(file_path, | 125 base::File file = nacl::OpenNaClReadExecImpl(file_path, |
143 true /* is_executable */); | 126 true /* is_executable */); |
144 if (file.IsValid()) { | 127 if (file.IsValid()) { |
145 // Opening a NaCl executable works with or without validation caching. | 128 // Opening a NaCl executable works with or without validation caching. |
146 // Validation caching requires that the file descriptor is registered now | 129 // Validation caching requires that the file descriptor is registered now |
147 // for later use, which will save time. | 130 // for later use, which will save time. |
148 // When validation caching isn't used (e.g. Non-SFI mode), there is no | 131 // When validation caching isn't used (e.g. Non-SFI mode), there is no |
149 // reason to do that unnecessary registration. | 132 // reason to do that unnecessary registration. |
150 if (enable_validation_caching) { | 133 if (enable_validation_caching) { |
151 // This function is running on the blocking pool, but the path needs to be | 134 // This function is running on the blocking pool, but the path needs to be |
152 // registered in a structure owned by the IO thread. | 135 // registered in a structure owned by the IO thread. |
153 BrowserThread::PostTask( | 136 BrowserThread::PostTask( |
154 BrowserThread::IO, FROM_HERE, | 137 BrowserThread::IO, FROM_HERE, |
155 base::Bind(&DoRegisterOpenedNaClExecutableFile, | 138 base::Bind(&DoRegisterOpenedNaClExecutableFile, Passed(&file), |
156 nacl_host_message_filter, Passed(std::move(file)), | 139 file_path, origin_task_runner, callback)); |
157 file_path, reply_msg, | |
158 static_cast<WriteFileInfoReply>( | |
159 NaClHostMsg_OpenNaClExecutable::WriteReplyParams))); | |
160 } else { | 140 } else { |
161 IPC::PlatformFileForTransit file_desc = | 141 constexpr uint64_t kDummyFileToken = 0; |
162 IPC::TakePlatformFileForTransit(std::move(file)); | 142 origin_task_runner->PostTask( |
163 uint64_t dummy_file_token = 0; | 143 FROM_HERE, base::Bind(callback, base::Passed(&file), kDummyFileToken, |
164 NaClHostMsg_OpenNaClExecutable::WriteReplyParams( | 144 kDummyFileToken)); |
165 reply_msg, file_desc, dummy_file_token, dummy_file_token); | |
166 nacl_host_message_filter->Send(reply_msg); | |
167 } | 145 } |
168 } else { | 146 } else { |
169 NotifyRendererOfError(nacl_host_message_filter.get(), reply_msg); | 147 NotifyRendererOfError(origin_task_runner, callback); |
170 return; | 148 return; |
171 } | 149 } |
172 } | 150 } |
173 | 151 |
174 } // namespace | 152 } // namespace |
175 | 153 |
176 namespace nacl_file_host { | 154 void GetReadonlyPnaclFd(const std::string& filename, |
177 | 155 bool is_executable, |
178 void GetReadonlyPnaclFd( | 156 const OpenFileCallback& callback) { |
179 scoped_refptr<nacl::NaClHostMessageFilter> nacl_host_message_filter, | |
180 const std::string& filename, | |
181 bool is_executable, | |
182 IPC::Message* reply_msg) { | |
183 if (!BrowserThread::PostBlockingPoolTask( | 157 if (!BrowserThread::PostBlockingPoolTask( |
184 FROM_HERE, | 158 FROM_HERE, |
185 base::Bind(&DoOpenPnaclFile, | 159 base::Bind(&DoOpenPnaclFile, filename, is_executable, |
186 nacl_host_message_filter, | 160 base::ThreadTaskRunnerHandle::Get(), callback))) { |
187 filename, | 161 NotifyRendererOfError(base::ThreadTaskRunnerHandle::Get(), callback); |
188 is_executable, | |
189 reply_msg))) { | |
190 NotifyRendererOfError(nacl_host_message_filter.get(), reply_msg); | |
191 } | 162 } |
192 } | 163 } |
193 | 164 |
194 // This function is security sensitive. Be sure to check with a security | 165 // This function is security sensitive. Be sure to check with a security |
195 // person before you modify it. | 166 // person before you modify it. |
196 bool PnaclCanOpenFile(const std::string& filename, | 167 bool PnaclCanOpenFile(const std::string& filename, |
197 base::FilePath* file_to_open) { | 168 base::FilePath* file_to_open) { |
198 if (filename.length() > kMaxFileLength) | 169 if (filename.length() > kMaxFileLength) |
199 return false; | 170 return false; |
200 | 171 |
(...skipping 17 matching lines...) Expand all Loading... |
218 return false; | 189 return false; |
219 | 190 |
220 // Prepend the prefix to restrict files to a whitelisted set. | 191 // Prepend the prefix to restrict files to a whitelisted set. |
221 base::FilePath full_path = pnacl_dir.AppendASCII( | 192 base::FilePath full_path = pnacl_dir.AppendASCII( |
222 std::string(kExpectedFilePrefix) + filename); | 193 std::string(kExpectedFilePrefix) + filename); |
223 *file_to_open = full_path; | 194 *file_to_open = full_path; |
224 return true; | 195 return true; |
225 } | 196 } |
226 | 197 |
227 void OpenNaClExecutable( | 198 void OpenNaClExecutable( |
228 scoped_refptr<nacl::NaClHostMessageFilter> nacl_host_message_filter, | |
229 int render_view_id, | 199 int render_view_id, |
230 const GURL& file_url, | 200 const GURL& file_url, |
231 bool enable_validation_caching, | 201 bool enable_validation_caching, |
232 IPC::Message* reply_msg) { | 202 int render_process_id, |
| 203 const base::FilePath& profile_directory, |
| 204 const scoped_refptr<base::TaskRunner>& origin_task_runner, |
| 205 const OpenFileCallback& callback) { |
233 if (!BrowserThread::CurrentlyOn(BrowserThread::UI)) { | 206 if (!BrowserThread::CurrentlyOn(BrowserThread::UI)) { |
234 BrowserThread::PostTask( | 207 BrowserThread::PostTask( |
235 BrowserThread::UI, FROM_HERE, | 208 BrowserThread::UI, FROM_HERE, |
236 base::Bind( | 209 base::Bind(&OpenNaClExecutable, render_view_id, file_url, |
237 &OpenNaClExecutable, | 210 enable_validation_caching, render_process_id, |
238 nacl_host_message_filter, | 211 profile_directory, origin_task_runner, callback)); |
239 render_view_id, | |
240 file_url, | |
241 enable_validation_caching, | |
242 reply_msg)); | |
243 return; | 212 return; |
244 } | 213 } |
245 | 214 |
246 // Make sure render_view_id is valid and that the URL is a part of the | 215 // Make sure render_view_id is valid and that the URL is a part of the |
247 // render view's site. Without these checks, apps could probe the extension | 216 // render view's site. Without these checks, apps could probe the extension |
248 // directory or run NaCl code from other extensions. | 217 // directory or run NaCl code from other extensions. |
249 content::RenderViewHost* rvh = content::RenderViewHost::FromID( | 218 content::RenderViewHost* rvh = |
250 nacl_host_message_filter->render_process_id(), render_view_id); | 219 content::RenderViewHost::FromID(render_process_id, render_view_id); |
251 if (!rvh) { | 220 if (!rvh) { |
252 nacl::bad_message::ReceivedBadMessage( | 221 nacl::bad_message::ReceivedBadMessage( |
253 nacl_host_message_filter.get(), | 222 render_process_id, |
254 nacl::bad_message::NFH_OPEN_EXECUTABLE_BAD_ROUTING_ID); | 223 nacl::bad_message::NFH_OPEN_EXECUTABLE_BAD_ROUTING_ID); |
255 delete reply_msg; | 224 // The callback must be called even if the message was invalid. |
| 225 NotifyRendererOfError(origin_task_runner, callback); |
256 return; | 226 return; |
257 } | 227 } |
258 content::SiteInstance* site_instance = rvh->GetSiteInstance(); | 228 content::SiteInstance* site_instance = rvh->GetSiteInstance(); |
259 if (!content::SiteInstance::IsSameWebSite(site_instance->GetBrowserContext(), | 229 if (!content::SiteInstance::IsSameWebSite(site_instance->GetBrowserContext(), |
260 site_instance->GetSiteURL(), | 230 site_instance->GetSiteURL(), |
261 file_url)) { | 231 file_url)) { |
262 NotifyRendererOfError(nacl_host_message_filter.get(), reply_msg); | 232 NotifyRendererOfError(origin_task_runner, callback); |
263 return; | 233 return; |
264 } | 234 } |
265 | 235 |
266 // The URL is part of the current app. Now query the extension system for the | 236 // The URL is part of the current app. Now query the extension system for the |
267 // file path and convert that to a file descriptor. This should be done on a | 237 // file path and convert that to a file descriptor. This should be done on a |
268 // blocking pool thread. | 238 // blocking pool thread. |
269 if (!BrowserThread::PostBlockingPoolTask( | 239 if (!BrowserThread::PostBlockingPoolTask( |
270 FROM_HERE, | 240 FROM_HERE, base::Bind(&DoOpenNaClExecutableOnThreadPool, file_url, |
271 base::Bind( | 241 enable_validation_caching, profile_directory, |
272 &DoOpenNaClExecutableOnThreadPool, | 242 origin_task_runner, callback))) { |
273 nacl_host_message_filter, | 243 NotifyRendererOfError(origin_task_runner, callback); |
274 file_url, | |
275 enable_validation_caching, | |
276 reply_msg))) { | |
277 NotifyRendererOfError(nacl_host_message_filter.get(), reply_msg); | |
278 } | 244 } |
279 } | 245 } |
280 | 246 |
281 } // namespace nacl_file_host | 247 } // namespace nacl_file_host |
OLD | NEW |