Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "content/browser/renderer_host/media/midi_host.h" | 5 #include "content/browser/renderer_host/media/midi_host.h" |
| 6 | 6 |
| 7 #include "base/bind.h" | 7 #include "base/bind.h" |
| 8 #include "base/bind_helpers.h" | 8 #include "base/bind_helpers.h" |
| 9 #include "base/debug/trace_event.h" | 9 #include "base/debug/trace_event.h" |
| 10 #include "base/process/process.h" | 10 #include "base/process/process.h" |
| 11 #include "content/browser/browser_main_loop.h" | 11 #include "content/browser/browser_main_loop.h" |
| 12 #include "content/browser/child_process_security_policy_impl.h" | 12 #include "content/browser/child_process_security_policy_impl.h" |
| 13 #include "content/browser/media/media_internals.h" | 13 #include "content/browser/media/media_internals.h" |
| 14 #include "content/common/media/midi_messages.h" | 14 #include "content/common/media/midi_messages.h" |
| 15 #include "content/public/browser/content_browser_client.h" | 15 #include "content/public/browser/content_browser_client.h" |
| 16 #include "content/public/browser/media_observer.h" | 16 #include "content/public/browser/media_observer.h" |
| 17 #include "content/public/browser/user_metrics.h" | 17 #include "content/public/browser/user_metrics.h" |
| 18 #include "media/midi/midi_manager.h" | 18 #include "media/midi/midi_manager.h" |
| 19 #include "media/midi/midi_message_queue.h" | |
| 19 | 20 |
| 20 using media::MIDIManager; | 21 using media::MIDIManager; |
| 21 using media::MIDIPortInfoList; | 22 using media::MIDIPortInfoList; |
| 22 | 23 |
| 23 // The total number of bytes which we're allowed to send to the OS | 24 // The total number of bytes which we're allowed to send to the OS |
| 24 // before knowing that they have been successfully sent. | 25 // before knowing that they have been successfully sent. |
| 25 static const size_t kMaxInFlightBytes = 10 * 1024 * 1024; // 10 MB. | 26 static const size_t kMaxInFlightBytes = 10 * 1024 * 1024; // 10 MB. |
| 26 | 27 |
| 27 // We keep track of the number of bytes successfully sent to | 28 // We keep track of the number of bytes successfully sent to |
| 28 // the hardware. Every once in a while we report back to the renderer | 29 // the hardware. Every once in a while we report back to the renderer |
| 29 // the number of bytes sent since the last report. This threshold determines | 30 // the number of bytes sent since the last report. This threshold determines |
| 30 // how many bytes will be sent before reporting back to the renderer. | 31 // how many bytes will be sent before reporting back to the renderer. |
| 31 static const size_t kAcknowledgementThresholdBytes = 1024 * 1024; // 1 MB. | 32 static const size_t kAcknowledgementThresholdBytes = 1024 * 1024; // 1 MB. |
| 32 | 33 |
| 33 static const uint8 kSysExMessage = 0xf0; | 34 static const uint8 kSysExMessage = 0xf0; |
| 34 | 35 |
| 35 namespace content { | 36 namespace content { |
| 37 namespace { | |
| 38 | |
| 39 // A class to check if current child process security policy allows the the | |
| 40 // renderer to use SysEx MIDI messages or not. This class fetches the policy | |
| 41 // lazily and caches the result to avoid redundant access check. | |
| 42 class CanSendMIDISysExMessageQuery { | |
| 43 public: | |
| 44 explicit CanSendMIDISysExMessageQuery(int renderer_process_id) | |
| 45 : renderer_process_id_(renderer_process_id), | |
| 46 value_(false), | |
| 47 initialized_(false) { | |
| 48 } | |
| 49 | |
| 50 bool get() { | |
| 51 if (!initialized_) { | |
| 52 value_ = ChildProcessSecurityPolicyImpl::GetInstance()-> | |
| 53 CanSendMIDISysExMessage(renderer_process_id_); | |
| 54 initialized_ = true; | |
| 55 } | |
| 56 return value_; | |
| 57 } | |
| 58 | |
| 59 private: | |
| 60 const int renderer_process_id_; | |
| 61 bool value_; | |
| 62 bool initialized_; | |
| 63 | |
| 64 DISALLOW_COPY_AND_ASSIGN(CanSendMIDISysExMessageQuery); | |
| 65 }; | |
| 66 | |
| 67 } // namespace | |
| 36 | 68 |
| 37 MIDIHost::MIDIHost(int renderer_process_id, media::MIDIManager* midi_manager) | 69 MIDIHost::MIDIHost(int renderer_process_id, media::MIDIManager* midi_manager) |
| 38 : renderer_process_id_(renderer_process_id), | 70 : renderer_process_id_(renderer_process_id), |
| 39 midi_manager_(midi_manager), | 71 midi_manager_(midi_manager), |
| 40 sent_bytes_in_flight_(0), | 72 sent_bytes_in_flight_(0), |
| 41 bytes_sent_since_last_acknowledgement_(0) { | 73 bytes_sent_since_last_acknowledgement_(0) { |
| 42 } | 74 } |
| 43 | 75 |
| 44 MIDIHost::~MIDIHost() { | 76 MIDIHost::~MIDIHost() { |
| 45 if (midi_manager_) | 77 if (midi_manager_) |
| (...skipping 22 matching lines...) Expand all Loading... | |
| 68 MIDIPortInfoList input_ports; | 100 MIDIPortInfoList input_ports; |
| 69 MIDIPortInfoList output_ports; | 101 MIDIPortInfoList output_ports; |
| 70 | 102 |
| 71 // Initialize devices and register to receive MIDI data. | 103 // Initialize devices and register to receive MIDI data. |
| 72 bool success = false; | 104 bool success = false; |
| 73 if (midi_manager_) { | 105 if (midi_manager_) { |
| 74 success = midi_manager_->StartSession(this); | 106 success = midi_manager_->StartSession(this); |
| 75 if (success) { | 107 if (success) { |
| 76 input_ports = midi_manager_->input_ports(); | 108 input_ports = midi_manager_->input_ports(); |
| 77 output_ports = midi_manager_->output_ports(); | 109 output_ports = midi_manager_->output_ports(); |
| 110 received_messages_queues_.clear(); | |
| 111 received_messages_queues_.resize(input_ports.size()); | |
| 78 } | 112 } |
| 79 } | 113 } |
| 80 | 114 |
| 81 Send(new MIDIMsg_SessionStarted( | 115 Send(new MIDIMsg_SessionStarted( |
| 82 client_id, | 116 client_id, |
| 83 success, | 117 success, |
| 84 input_ports, | 118 input_ports, |
| 85 output_ports)); | 119 output_ports)); |
| 86 } | 120 } |
| 87 | 121 |
| 88 void MIDIHost::OnSendData(uint32 port, | 122 void MIDIHost::OnSendData(uint32 port, |
| 89 const std::vector<uint8>& data, | 123 const std::vector<uint8>& data, |
| 90 double timestamp) { | 124 double timestamp) { |
| 91 if (!midi_manager_) | 125 if (!midi_manager_) |
| 92 return; | 126 return; |
| 93 | 127 |
| 94 if (data.empty()) | 128 if (data.empty()) |
| 95 return; | 129 return; |
| 96 | 130 |
| 97 base::AutoLock auto_lock(in_flight_lock_); | 131 CanSendMIDISysExMessageQuery can_send_sys_ex(renderer_process_id_); |
|
Takashi Toyoshima
2013/11/19 01:08:37
Can we make it a member variable?
IIRC, this code
yukawa
2013/11/19 09:41:41
Hmm, I think the construction cost of |can_send_sy
Takashi Toyoshima
2013/11/19 12:49:59
I see. It's ok to keep this code as is.
FYI, Chil
| |
| 98 | 132 |
| 99 // Sanity check that we won't send too much. | 133 // Note: In the spec, |data| can be any number of complete MIDI messages. |
| 100 if (sent_bytes_in_flight_ > kMaxInFlightBytes || | 134 // Running status is disallowed explicitly. |
| 101 data.size() > kMaxInFlightBytes || | 135 media::MIDIMessageQueue message_queue(false); |
| 102 data.size() + sent_bytes_in_flight_ > kMaxInFlightBytes) | 136 message_queue.Add(data); |
| 103 return; | 137 std::vector<uint8> message; |
| 138 while (true) { | |
| 139 message_queue.Get(&message); | |
| 140 if (message.empty()) | |
| 141 break; | |
| 104 | 142 |
| 105 if (data[0] >= kSysExMessage) { | 143 // Sanity check that we won't send too large message. |
|
Takashi Toyoshima
2013/11/19 01:08:37
Here, we concern the buffer size which may be allo
yukawa
2013/11/19 09:41:41
Done.
| |
| 106 // Blink running in a renderer checks permission to raise a SecurityError in | 144 if (message.size() > kMaxInFlightBytes) |
|
Takashi Toyoshima
2013/11/19 01:08:37
This check looks redundant.
yukawa
2013/11/19 09:41:41
I put this condition here as an early exit route b
| |
| 107 // JavaScript. The actual permission check for security perposes happens | 145 continue; |
| 108 // here in the browser process. | 146 |
| 109 if (!ChildProcessSecurityPolicyImpl::GetInstance()->CanSendMIDISysExMessage( | 147 if (message[0] == kSysExMessage && !can_send_sys_ex.get()) { |
| 110 renderer_process_id_)) { | 148 // Blink running in a renderer checks permission to raise a SecurityError |
| 149 // in JavaScript. The actual permission check for security purposes | |
| 150 // happens here in the browser process. | |
| 111 RecordAction(UserMetricsAction("BadMessageTerminate_MIDI")); | 151 RecordAction(UserMetricsAction("BadMessageTerminate_MIDI")); |
| 112 BadMessageReceived(); | 152 BadMessageReceived(); |
| 113 return; | 153 return; |
| 114 } | 154 } |
| 155 | |
| 156 base::AutoLock auto_lock(in_flight_lock_); | |
| 157 // Sanity check that we won't send too much data. | |
| 158 if (sent_bytes_in_flight_ > kMaxInFlightBytes || | |
| 159 message.size() + sent_bytes_in_flight_ > kMaxInFlightBytes) | |
|
Takashi Toyoshima
2013/11/19 01:08:37
Same TODO here, and any reason to check twice?
I f
yukawa
2013/11/19 09:41:41
Done.
BTW, the redundancy came from the original c
Takashi Toyoshima
2013/11/19 12:49:59
lol
| |
| 160 return; | |
| 161 midi_manager_->DispatchSendMIDIData(this, port, message, timestamp); | |
| 162 sent_bytes_in_flight_ += message.size(); | |
| 115 } | 163 } |
| 116 | |
| 117 midi_manager_->DispatchSendMIDIData( | |
| 118 this, | |
| 119 port, | |
| 120 data, | |
| 121 timestamp); | |
| 122 | |
| 123 sent_bytes_in_flight_ += data.size(); | |
| 124 } | 164 } |
| 125 | 165 |
| 126 void MIDIHost::ReceiveMIDIData( | 166 void MIDIHost::ReceiveMIDIData( |
| 127 uint32 port, | 167 uint32 port, |
| 128 const uint8* data, | 168 const uint8* data, |
| 129 size_t length, | 169 size_t length, |
| 130 double timestamp) { | 170 double timestamp) { |
| 131 TRACE_EVENT0("midi", "MIDIHost::ReceiveMIDIData"); | 171 TRACE_EVENT0("midi", "MIDIHost::ReceiveMIDIData"); |
| 132 | 172 |
| 133 // Check a process security policy to receive a system exclusive message. | 173 if (received_messages_queues_.size() <= port) |
| 134 if (length > 0 && data[0] >= kSysExMessage) { | 174 return; |
| 135 if (!ChildProcessSecurityPolicyImpl::GetInstance()->CanSendMIDISysExMessage( | 175 |
| 136 renderer_process_id_)) { | 176 // Lazy initialization |
| 137 // MIDI devices may send a system exclusive messages even if the renderer | 177 if (received_messages_queues_[port] == NULL) |
| 138 // doesn't have a permission to receive it. Don't kill the renderer as | 178 received_messages_queues_[port] = new media::MIDIMessageQueue(true); |
| 139 // OnSendData() does. | 179 |
| 140 return; | 180 CanSendMIDISysExMessageQuery can_send_sys_ex(renderer_process_id_); |
|
Takashi Toyoshima
2013/11/19 01:08:37
ditto. I think we can share the same instance betw
yukawa
2013/11/19 09:41:41
See my previous comment.
Takashi Toyoshima
2013/11/19 12:49:59
ok
| |
| 141 } | 181 |
| 182 received_messages_queues_[port]->Add(data, length); | |
| 183 std::vector<uint8> message; | |
| 184 while (true) { | |
| 185 received_messages_queues_[port]->Get(&message); | |
| 186 if (message.empty()) | |
| 187 break; | |
| 188 | |
| 189 // MIDI devices may send a system exclusive messages even if the renderer | |
| 190 // doesn't have a permission to receive it. Don't kill the renderer as | |
| 191 // OnSendData() does. | |
| 192 if (message[0] == kSysExMessage && !can_send_sys_ex.get()) | |
| 193 continue; | |
| 194 | |
| 195 // Send to the renderer. | |
| 196 Send(new MIDIMsg_DataReceived(port, message, timestamp)); | |
| 142 } | 197 } |
| 143 | |
| 144 // Send to the renderer. | |
| 145 std::vector<uint8> v(data, data + length); | |
| 146 Send(new MIDIMsg_DataReceived(port, v, timestamp)); | |
| 147 } | 198 } |
| 148 | 199 |
| 149 void MIDIHost::AccumulateMIDIBytesSent(size_t n) { | 200 void MIDIHost::AccumulateMIDIBytesSent(size_t n) { |
| 150 { | 201 { |
| 151 base::AutoLock auto_lock(in_flight_lock_); | 202 base::AutoLock auto_lock(in_flight_lock_); |
| 152 if (n <= sent_bytes_in_flight_) | 203 if (n <= sent_bytes_in_flight_) |
| 153 sent_bytes_in_flight_ -= n; | 204 sent_bytes_in_flight_ -= n; |
| 154 } | 205 } |
| 155 | 206 |
| 156 if (bytes_sent_since_last_acknowledgement_ + n >= | 207 if (bytes_sent_since_last_acknowledgement_ + n >= |
| 157 bytes_sent_since_last_acknowledgement_) | 208 bytes_sent_since_last_acknowledgement_) |
| 158 bytes_sent_since_last_acknowledgement_ += n; | 209 bytes_sent_since_last_acknowledgement_ += n; |
| 159 | 210 |
| 160 if (bytes_sent_since_last_acknowledgement_ >= | 211 if (bytes_sent_since_last_acknowledgement_ >= |
| 161 kAcknowledgementThresholdBytes) { | 212 kAcknowledgementThresholdBytes) { |
| 162 Send(new MIDIMsg_AcknowledgeSentData( | 213 Send(new MIDIMsg_AcknowledgeSentData( |
| 163 bytes_sent_since_last_acknowledgement_)); | 214 bytes_sent_since_last_acknowledgement_)); |
| 164 bytes_sent_since_last_acknowledgement_ = 0; | 215 bytes_sent_since_last_acknowledgement_ = 0; |
| 165 } | 216 } |
| 166 } | 217 } |
| 167 | 218 |
| 168 } // namespace content | 219 } // namespace content |
| OLD | NEW |