| Index: content/browser/renderer_host/media/midi_host.cc
|
| diff --git a/content/browser/renderer_host/media/midi_host.cc b/content/browser/renderer_host/media/midi_host.cc
|
| index 934d5a21f1839fa97a5740fc60d28bba1936a05a..976ba5bc34991283d9bc557f728c01a1e47086f4 100644
|
| --- a/content/browser/renderer_host/media/midi_host.cc
|
| +++ b/content/browser/renderer_host/media/midi_host.cc
|
| @@ -16,6 +16,7 @@
|
| #include "content/public/browser/media_observer.h"
|
| #include "content/public/browser/user_metrics.h"
|
| #include "media/midi/midi_manager.h"
|
| +#include "media/midi/midi_message_util.h"
|
|
|
| using media::MIDIManager;
|
| using media::MIDIPortInfoList;
|
| @@ -36,6 +37,7 @@ namespace content {
|
|
|
| MIDIHost::MIDIHost(int renderer_process_id, media::MIDIManager* midi_manager)
|
| : renderer_process_id_(renderer_process_id),
|
| + has_sys_ex_permission_(false),
|
| midi_manager_(midi_manager),
|
| sent_bytes_in_flight_(0),
|
| bytes_sent_since_last_acknowledgement_(0) {
|
| @@ -75,6 +77,12 @@ void MIDIHost::OnStartSession(int client_id) {
|
| if (success) {
|
| input_ports = midi_manager_->input_ports();
|
| output_ports = midi_manager_->output_ports();
|
| + received_messages_queues_.clear();
|
| + received_messages_queues_.resize(input_ports.size());
|
| + // ChildSecurityPolicy is set just before OnStartSession by
|
| + // MIDIDispatcherHost. So we can safely cache the policy.
|
| + has_sys_ex_permission_ = ChildProcessSecurityPolicyImpl::GetInstance()->
|
| + CanSendMIDISysExMessage(renderer_process_id_);
|
| }
|
| }
|
|
|
| @@ -94,32 +102,26 @@ void MIDIHost::OnSendData(uint32 port,
|
| if (data.empty())
|
| return;
|
|
|
| - base::AutoLock auto_lock(in_flight_lock_);
|
| -
|
| - // Sanity check that we won't send too much.
|
| - if (sent_bytes_in_flight_ > kMaxInFlightBytes ||
|
| - data.size() > kMaxInFlightBytes ||
|
| - data.size() + sent_bytes_in_flight_ > kMaxInFlightBytes)
|
| + // Blink running in a renderer checks permission to raise a SecurityError
|
| + // in JavaScript. The actual permission check for security purposes
|
| + // happens here in the browser process.
|
| + if (!has_sys_ex_permission_ &&
|
| + (std::find(data.begin(), data.end(), kSysExMessage) != data.end())) {
|
| + RecordAction(UserMetricsAction("BadMessageTerminate_MIDI"));
|
| + BadMessageReceived();
|
| return;
|
| -
|
| - if (data[0] >= kSysExMessage) {
|
| - // Blink running in a renderer checks permission to raise a SecurityError in
|
| - // JavaScript. The actual permission check for security perposes happens
|
| - // here in the browser process.
|
| - if (!ChildProcessSecurityPolicyImpl::GetInstance()->CanSendMIDISysExMessage(
|
| - renderer_process_id_)) {
|
| - RecordAction(UserMetricsAction("BadMessageTerminate_MIDI"));
|
| - BadMessageReceived();
|
| - return;
|
| - }
|
| }
|
|
|
| - midi_manager_->DispatchSendMIDIData(
|
| - this,
|
| - port,
|
| - data,
|
| - timestamp);
|
| + if (!media::IsValidWebMIDIMessage(data))
|
| + return;
|
|
|
| + base::AutoLock auto_lock(in_flight_lock_);
|
| + // Sanity check that we won't send too much data.
|
| + // TODO(yukawa): Consider to send an error event back to the renderer
|
| + // after some future discussion in W3C.
|
| + if (data.size() + sent_bytes_in_flight_ > kMaxInFlightBytes)
|
| + return;
|
| + midi_manager_->DispatchSendMIDIData(this, port, data, timestamp);
|
| sent_bytes_in_flight_ += data.size();
|
| }
|
|
|
| @@ -130,20 +132,29 @@ void MIDIHost::ReceiveMIDIData(
|
| double timestamp) {
|
| TRACE_EVENT0("midi", "MIDIHost::ReceiveMIDIData");
|
|
|
| - // Check a process security policy to receive a system exclusive message.
|
| - if (length > 0 && data[0] >= kSysExMessage) {
|
| - if (!ChildProcessSecurityPolicyImpl::GetInstance()->CanSendMIDISysExMessage(
|
| - renderer_process_id_)) {
|
| - // MIDI devices may send a system exclusive messages even if the renderer
|
| - // doesn't have a permission to receive it. Don't kill the renderer as
|
| - // OnSendData() does.
|
| - return;
|
| - }
|
| - }
|
| + if (received_messages_queues_.size() <= port)
|
| + return;
|
|
|
| - // Send to the renderer.
|
| - std::vector<uint8> v(data, data + length);
|
| - Send(new MIDIMsg_DataReceived(port, v, timestamp));
|
| + // Lazy initialization
|
| + if (received_messages_queues_[port] == NULL)
|
| + received_messages_queues_[port] = new media::MIDIMessageQueue(true);
|
| +
|
| + received_messages_queues_[port]->Add(data, length);
|
| + std::vector<uint8> message;
|
| + while (true) {
|
| + received_messages_queues_[port]->Get(&message);
|
| + if (message.empty())
|
| + break;
|
| +
|
| + // MIDI devices may send a system exclusive messages even if the renderer
|
| + // doesn't have a permission to receive it. Don't kill the renderer as
|
| + // OnSendData() does.
|
| + if (message[0] == kSysExMessage && !has_sys_ex_permission_)
|
| + continue;
|
| +
|
| + // Send to the renderer.
|
| + Send(new MIDIMsg_DataReceived(port, message, timestamp));
|
| + }
|
| }
|
|
|
| void MIDIHost::AccumulateMIDIBytesSent(size_t n) {
|
|
|