Index: components/nacl/loader/nacl_ipc_adapter.cc |
diff --git a/components/nacl/loader/nacl_ipc_adapter.cc b/components/nacl/loader/nacl_ipc_adapter.cc |
index 879fa2cd57872e0c44121c0487b26ec5fc9f79bb..fd957964682641544e42dd04ceca93ce3046459b 100644 |
--- a/components/nacl/loader/nacl_ipc_adapter.cc |
+++ b/components/nacl/loader/nacl_ipc_adapter.cc |
@@ -12,6 +12,7 @@ |
#include "base/location.h" |
#include "base/memory/scoped_ptr.h" |
#include "base/memory/shared_memory.h" |
+#include "base/task_runner_util.h" |
#include "build/build_config.h" |
#include "ipc/ipc_channel.h" |
#include "ipc/ipc_platform_file.h" |
@@ -24,6 +25,7 @@ |
#include "native_client/src/trusted/desc/nacl_desc_sync_socket.h" |
#include "native_client/src/trusted/desc/nacl_desc_wrapper.h" |
#include "native_client/src/trusted/service_runtime/include/sys/fcntl.h" |
+#include "native_client/src/trusted/validator/rich_file_info.h" |
#include "ppapi/c/ppb_file_io.h" |
#include "ppapi/proxy/ppapi_messages.h" |
#include "ppapi/proxy/serialized_handle.h" |
@@ -465,6 +467,7 @@ int NaClIPCAdapter::TakeClientFileDescriptor() { |
bool NaClIPCAdapter::OnMessageReceived(const IPC::Message& msg) { |
uint32_t type = msg.type(); |
+ |
if (type == IPC_REPLY_ID) { |
int id = IPC::SyncMessage::GetMessageId(msg); |
IOThreadData::PendingSyncMsgMap::iterator it = |
@@ -475,7 +478,49 @@ bool NaClIPCAdapter::OnMessageReceived(const IPC::Message& msg) { |
io_thread_data_.pending_sync_msgs_.erase(it); |
} |
} |
+ // Handle PpapiHostMsg_OpenResource outside the lock as it requires sending |
+ // IPC to handle properly. |
+ if (type == PpapiHostMsg_OpenResource::ID) { |
+ PickleIterator iter = IPC::SyncMessage::GetDataIterator(&msg); |
+ ppapi::proxy::SerializedHandle sh; |
+ uint64_t token_lo; |
+ uint64_t token_hi; |
+ if (!IPC::ReadParam(&msg, &iter, &sh) || |
+ !IPC::ReadParam(&msg, &iter, &token_lo) || |
+ !IPC::ReadParam(&msg, &iter, &token_hi)) { |
+ return false; |
+ } |
+ if (sh.IsHandleValid() && (token_lo != 0 || token_hi != 0)) { |
+ // We've received a valid file token. Instead of using the file |
+ // descriptor received, we send the file token to the browser in |
+ // exchange for a new file descriptor and file path information. |
+ // That file descriptor can be used to construct a NaClDesc with |
+ // identity-based validation caching. |
+ // |
+ // We do not use file descriptors from the renderer with validation |
+ // caching; a compromised renderer should not be able to run |
+ // arbitrary code in a plugin process. |
+ DCHECK(!resolve_file_token_cb_.is_null()); |
+ |
+ // resolve_file_token_cb_ must be invoked from the main thread. |
+ resolve_file_token_cb_.Run( |
+ token_lo, |
+ token_hi, |
+ base::Bind(&NaClIPCAdapter::OnFileTokenResolved, |
+ this, |
+ msg)); |
+ |
+ // In this case, we don't release the message to NaCl untrusted code |
+ // immediately. We defer it until we get an async message back from the |
+ // browser process. |
+ return true; |
+ } |
+ } |
+ return RewriteMessage(msg, type); |
+} |
+ |
+bool NaClIPCAdapter::RewriteMessage(const IPC::Message& msg, uint32_t type) { |
{ |
base::AutoLock lock(lock_); |
scoped_refptr<RewrittenMessage> rewritten_msg(new RewrittenMessage); |
@@ -538,8 +583,7 @@ bool NaClIPCAdapter::OnMessageReceived(const IPC::Message& msg) { |
} |
case ppapi::proxy::SerializedHandle::INVALID: { |
- // Nothing to do. TODO(dmichael): Should we log this? Or is it |
- // sometimes okay to pass an INVALID handle? |
+ // Nothing to do. |
break; |
} |
// No default, so the compiler will warn us if new types get added. |
@@ -556,6 +600,105 @@ bool NaClIPCAdapter::OnMessageReceived(const IPC::Message& msg) { |
return true; |
} |
+scoped_ptr<IPC::Message> CreateOpenResourceReply( |
+ const IPC::Message& orig_msg, |
+ ppapi::proxy::SerializedHandle sh) { |
+ // The creation of new_msg must be kept in sync with |
+ // SyncMessage::WriteSyncHeader. |
+ scoped_ptr<IPC::Message> new_msg(new IPC::Message( |
+ orig_msg.routing_id(), |
+ orig_msg.type(), |
+ IPC::Message::PRIORITY_NORMAL)); |
+ new_msg->set_reply(); |
+ new_msg->WriteInt(IPC::SyncMessage::GetMessageId(orig_msg)); |
+ |
+ ppapi::proxy::SerializedHandle::WriteHeader(sh.header(), |
+ new_msg.get()); |
+ new_msg->WriteBool(true); // valid == true |
+ // The file descriptor is at index 0. There's only ever one file |
+ // descriptor provided for this message type, so this will be correct. |
+ new_msg->WriteInt(0); |
+ |
+ // Write empty file tokens. |
+ new_msg->WriteUInt64(0); // token_lo |
+ new_msg->WriteUInt64(0); // token_hi |
+ return new_msg.Pass(); |
+} |
+ |
+void NaClIPCAdapter::OnFileTokenResolved(const IPC::Message& orig_msg, |
+ IPC::PlatformFileForTransit ipc_fd, |
+ base::FilePath file_path) { |
+ // The path where an invalid ipc_fd is returned isn't currently |
+ // covered by any tests. |
+ if (ipc_fd == IPC::InvalidPlatformFileForTransit()) { |
+ // The file token didn't resolve successfully, so we give the |
+ // original FD to the client without making a validated NaClDesc. |
+ // However, we must rewrite the message to clear the file tokens. |
+ PickleIterator iter = IPC::SyncMessage::GetDataIterator(&orig_msg); |
+ ppapi::proxy::SerializedHandle sh; |
+ |
+ // We know that this can be read safely; see the original read in |
+ // OnMessageReceived(). |
+ CHECK(IPC::ReadParam(&orig_msg, &iter, &sh)); |
+ scoped_ptr<IPC::Message> new_msg = CreateOpenResourceReply(orig_msg, sh); |
+ |
+ scoped_ptr<NaClDescWrapper> desc_wrapper(new NaClDescWrapper( |
+ NaClDescIoDescFromHandleAllocCtor( |
+#if defined(OS_WIN) |
+ sh.descriptor(), |
+#else |
+ sh.descriptor().fd, |
+#endif |
+ NACL_ABI_O_RDONLY))); |
+ |
+ scoped_refptr<RewrittenMessage> rewritten_msg(new RewrittenMessage); |
+ rewritten_msg->AddDescriptor(desc_wrapper.release()); |
+ { |
+ base::AutoLock lock(lock_); |
+ SaveMessage(*new_msg, rewritten_msg.get()); |
+ cond_var_.Signal(); |
+ } |
+ return; |
+ } |
+ |
+ // The file token was sucessfully resolved. |
+ std::string file_path_str = file_path.AsUTF8Unsafe(); |
+ base::PlatformFile handle = |
+ IPC::PlatformFileForTransitToPlatformFile(ipc_fd); |
+ // The file token was resolved successfully, so we populate the new |
+ // NaClDesc with that information. |
+ char* alloc_file_path = static_cast<char*>( |
+ malloc(file_path_str.length() + 1)); |
+ strcpy(alloc_file_path, file_path_str.c_str()); |
+ scoped_ptr<NaClDescWrapper> desc_wrapper(new NaClDescWrapper( |
+ NaClDescIoDescFromHandleAllocCtor(handle, NACL_ABI_O_RDONLY))); |
+ |
+ // Mark the desc as OK for mapping as executable memory. |
+ NaClDescMarkSafeForMmap(desc_wrapper->desc()); |
+ |
+ // Provide metadata for validation. |
+ struct NaClRichFileInfo info; |
+ NaClRichFileInfoCtor(&info); |
+ info.known_file = 1; |
+ info.file_path = alloc_file_path; // Takes ownership. |
+ info.file_path_length = |
+ static_cast<uint32_t>(file_path_str.length()); |
+ NaClSetFileOriginInfo(desc_wrapper->desc(), &info); |
+ NaClRichFileInfoDtor(&info); |
+ |
+ ppapi::proxy::SerializedHandle sh; |
+ sh.set_file_handle(ipc_fd, PP_FILEOPENFLAG_READ, 0); |
+ scoped_ptr<IPC::Message> new_msg = CreateOpenResourceReply(orig_msg, sh); |
+ scoped_refptr<RewrittenMessage> rewritten_msg(new RewrittenMessage); |
+ |
+ rewritten_msg->AddDescriptor(desc_wrapper.release()); |
+ { |
+ base::AutoLock lock(lock_); |
+ SaveMessage(*new_msg, rewritten_msg.get()); |
+ cond_var_.Signal(); |
+ } |
+} |
+ |
void NaClIPCAdapter::OnChannelConnected(int32 peer_pid) { |
} |