Index: trunk/src/content/browser/renderer_host/media/midi_host.cc |
=================================================================== |
--- trunk/src/content/browser/renderer_host/media/midi_host.cc (revision 237659) |
+++ trunk/src/content/browser/renderer_host/media/midi_host.cc (working copy) |
@@ -16,41 +16,26 @@ |
#include "content/public/browser/media_observer.h" |
#include "content/public/browser/user_metrics.h" |
#include "media/midi/midi_manager.h" |
-#include "media/midi/midi_message_queue.h" |
-#include "media/midi/midi_message_util.h" |
using media::MIDIManager; |
using media::MIDIPortInfoList; |
-namespace content { |
-namespace { |
- |
// The total number of bytes which we're allowed to send to the OS |
// before knowing that they have been successfully sent. |
-const size_t kMaxInFlightBytes = 10 * 1024 * 1024; // 10 MB. |
+static const size_t kMaxInFlightBytes = 10 * 1024 * 1024; // 10 MB. |
// We keep track of the number of bytes successfully sent to |
// the hardware. Every once in a while we report back to the renderer |
// the number of bytes sent since the last report. This threshold determines |
// how many bytes will be sent before reporting back to the renderer. |
-const size_t kAcknowledgementThresholdBytes = 1024 * 1024; // 1 MB. |
+static const size_t kAcknowledgementThresholdBytes = 1024 * 1024; // 1 MB. |
-const uint8 kSysExMessage = 0xf0; |
-const uint8 kEndOfSysExMessage = 0xf7; |
+static const uint8 kSysExMessage = 0xf0; |
-bool IsDataByte(uint8 data) { |
- return (data & 0x80) == 0; |
-} |
+namespace content { |
-bool IsSystemRealTimeMessage(uint8 data) { |
- return 0xf8 <= data && data <= 0xff; |
-} |
- |
-} // namespace |
- |
MIDIHost::MIDIHost(int renderer_process_id, media::MIDIManager* midi_manager) |
: renderer_process_id_(renderer_process_id), |
- has_sys_ex_permission_(false), |
midi_manager_(midi_manager), |
sent_bytes_in_flight_(0), |
bytes_sent_since_last_acknowledgement_(0) { |
@@ -90,12 +75,6 @@ |
if (success) { |
input_ports = midi_manager_->input_ports(); |
output_ports = midi_manager_->output_ports(); |
- received_messages_queues_.clear(); |
- received_messages_queues_.resize(input_ports.size()); |
- // ChildSecurityPolicy is set just before OnStartSession by |
- // MIDIDispatcherHost. So we can safely cache the policy. |
- has_sys_ex_permission_ = ChildProcessSecurityPolicyImpl::GetInstance()-> |
- CanSendMIDISysExMessage(renderer_process_id_); |
} |
} |
@@ -115,26 +94,32 @@ |
if (data.empty()) |
return; |
- // Blink running in a renderer checks permission to raise a SecurityError |
- // in JavaScript. The actual permission check for security purposes |
- // happens here in the browser process. |
- if (!has_sys_ex_permission_ && |
- (std::find(data.begin(), data.end(), kSysExMessage) != data.end())) { |
- RecordAction(UserMetricsAction("BadMessageTerminate_MIDI")); |
- BadMessageReceived(); |
+ base::AutoLock auto_lock(in_flight_lock_); |
+ |
+ // Sanity check that we won't send too much. |
+ if (sent_bytes_in_flight_ > kMaxInFlightBytes || |
+ data.size() > kMaxInFlightBytes || |
+ data.size() + sent_bytes_in_flight_ > kMaxInFlightBytes) |
return; |
+ |
+ if (data[0] >= kSysExMessage) { |
+ // Blink running in a renderer checks permission to raise a SecurityError in |
+ // JavaScript. The actual permission check for security perposes happens |
+ // here in the browser process. |
+ if (!ChildProcessSecurityPolicyImpl::GetInstance()->CanSendMIDISysExMessage( |
+ renderer_process_id_)) { |
+ RecordAction(UserMetricsAction("BadMessageTerminate_MIDI")); |
+ BadMessageReceived(); |
+ return; |
+ } |
} |
- if (!IsValidWebMIDIData(data)) |
- return; |
+ midi_manager_->DispatchSendMIDIData( |
+ this, |
+ port, |
+ data, |
+ timestamp); |
- base::AutoLock auto_lock(in_flight_lock_); |
- // Sanity check that we won't send too much data. |
- // TODO(yukawa): Consider to send an error event back to the renderer |
- // after some future discussion in W3C. |
- if (data.size() + sent_bytes_in_flight_ > kMaxInFlightBytes) |
- return; |
- midi_manager_->DispatchSendMIDIData(this, port, data, timestamp); |
sent_bytes_in_flight_ += data.size(); |
} |
@@ -145,29 +130,20 @@ |
double timestamp) { |
TRACE_EVENT0("midi", "MIDIHost::ReceiveMIDIData"); |
- if (received_messages_queues_.size() <= port) |
- return; |
- |
- // Lazy initialization |
- if (received_messages_queues_[port] == NULL) |
- received_messages_queues_[port] = new media::MIDIMessageQueue(true); |
- |
- received_messages_queues_[port]->Add(data, length); |
- std::vector<uint8> message; |
- while (true) { |
- received_messages_queues_[port]->Get(&message); |
- if (message.empty()) |
- break; |
- |
- // MIDI devices may send a system exclusive messages even if the renderer |
- // doesn't have a permission to receive it. Don't kill the renderer as |
- // OnSendData() does. |
- if (message[0] == kSysExMessage && !has_sys_ex_permission_) |
- continue; |
- |
- // Send to the renderer. |
- Send(new MIDIMsg_DataReceived(port, message, timestamp)); |
+ // Check a process security policy to receive a system exclusive message. |
+ if (length > 0 && data[0] >= kSysExMessage) { |
+ if (!ChildProcessSecurityPolicyImpl::GetInstance()->CanSendMIDISysExMessage( |
+ renderer_process_id_)) { |
+ // MIDI devices may send a system exclusive messages even if the renderer |
+ // doesn't have a permission to receive it. Don't kill the renderer as |
+ // OnSendData() does. |
+ return; |
+ } |
} |
+ |
+ // Send to the renderer. |
+ std::vector<uint8> v(data, data + length); |
+ Send(new MIDIMsg_DataReceived(port, v, timestamp)); |
} |
void MIDIHost::AccumulateMIDIBytesSent(size_t n) { |
@@ -189,37 +165,4 @@ |
} |
} |
-// static |
-bool MIDIHost::IsValidWebMIDIData(const std::vector<uint8>& data) { |
- bool in_sysex = false; |
- size_t waiting_data_length = 0; |
- for (size_t i = 0; i < data.size(); ++i) { |
- const uint8 current = data[i]; |
- if (IsSystemRealTimeMessage(current)) |
- continue; // Real time message can be placed at any point. |
- if (waiting_data_length > 0) { |
- if (!IsDataByte(current)) |
- return false; // Error: |current| should have been data byte. |
- --waiting_data_length; |
- continue; // Found data byte as expected. |
- } |
- if (in_sysex) { |
- if (data[i] == kEndOfSysExMessage) |
- in_sysex = false; |
- else if (!IsDataByte(current)) |
- return false; // Error: |current| should have been data byte. |
- continue; // Found data byte as expected. |
- } |
- if (current == kSysExMessage) { |
- in_sysex = true; |
- continue; // Found SysEX |
- } |
- waiting_data_length = media::GetMIDIMessageLength(current); |
- if (waiting_data_length == 0) |
- return false; // Error: |current| should have been a valid status byte. |
- --waiting_data_length; // Found status byte |
- } |
- return waiting_data_length == 0 && !in_sysex; |
-} |
- |
} // namespace content |