| // Copyright 2013 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "content/browser/renderer_host/pepper/pepper_renderer_connection.h" |
| |
| #include <stddef.h> |
| #include <stdint.h> |
| #include <memory> |
| #include <utility> |
| |
| #include "base/bind.h" |
| #include "base/memory/raw_ptr.h" |
| #include "base/memory/ref_counted.h" |
| #include "content/browser/bad_message.h" |
| #include "content/browser/browser_child_process_host_impl.h" |
| #include "content/browser/child_process_security_policy_impl.h" |
| #include "content/browser/plugin_service_impl.h" |
| #include "content/browser/ppapi_plugin_process_host.h" |
| #include "content/browser/renderer_host/pepper/browser_ppapi_host_impl.h" |
| #include "content/browser/renderer_host/pepper/pepper_file_ref_host.h" |
| #include "content/browser/renderer_host/pepper/pepper_file_system_browser_host.h" |
| #include "content/common/pepper_renderer_instance_data.h" |
| #include "content/public/browser/browser_context.h" |
| #include "content/public/browser/browser_thread.h" |
| #include "content/public/browser/content_browser_client.h" |
| #include "content/public/browser/storage_partition.h" |
| #include "content/public/common/content_client.h" |
| #include "ipc/ipc_message_macros.h" |
| #include "ppapi/host/resource_host.h" |
| #include "ppapi/proxy/ppapi_message_utils.h" |
| #include "ppapi/proxy/ppapi_messages.h" |
| #include "ppapi/proxy/resource_message_params.h" |
| |
| namespace content { |
| |
| namespace { |
| |
| // Responsible for creating the pending resource hosts, holding their IDs until |
| // all of them have been created for a single message, and sending the reply to |
| // say that the hosts have been created. |
| class PendingHostCreator : public base::RefCounted<PendingHostCreator> { |
| public: |
| PendingHostCreator(BrowserPpapiHostImpl* host, |
| BrowserMessageFilter* connection, |
| int routing_id, |
| int sequence_id, |
| size_t nested_msgs_size); |
| |
| // Adds the given resource host as a pending one. The host is remembered as |
| // host number |index|, and will ultimately be sent to the plugin to be |
| // attached to a real resource. |
| void AddPendingResourceHost( |
| size_t index, |
| std::unique_ptr<ppapi::host::ResourceHost> resource_host); |
| |
| private: |
| friend class base::RefCounted<PendingHostCreator>; |
| |
| // When the last reference to this class is released, all of the resource |
| // hosts would have been added. This destructor sends the message to the |
| // plugin to tell it to attach real hosts to all of the pending hosts that |
| // have been added by this object. |
| ~PendingHostCreator(); |
| |
| raw_ptr<BrowserPpapiHostImpl> host_; |
| raw_ptr<BrowserMessageFilter> connection_; |
| int routing_id_; |
| int sequence_id_; |
| std::vector<int> pending_resource_host_ids_; |
| }; |
| |
| PendingHostCreator::PendingHostCreator(BrowserPpapiHostImpl* host, |
| BrowserMessageFilter* connection, |
| int routing_id, |
| int sequence_id, |
| size_t nested_msgs_size) |
| : host_(host), |
| connection_(connection), |
| routing_id_(routing_id), |
| sequence_id_(sequence_id), |
| pending_resource_host_ids_(nested_msgs_size, 0) {} |
| |
| void PendingHostCreator::AddPendingResourceHost( |
| size_t index, |
| std::unique_ptr<ppapi::host::ResourceHost> resource_host) { |
| pending_resource_host_ids_[index] = |
| host_->GetPpapiHost()->AddPendingResourceHost(std::move(resource_host)); |
| } |
| |
| PendingHostCreator::~PendingHostCreator() { |
| connection_->Send(new PpapiHostMsg_CreateResourceHostsFromHostReply( |
| routing_id_, sequence_id_, pending_resource_host_ids_)); |
| } |
| |
| } // namespace |
| |
| class PepperRendererConnection::OpenChannelToPpapiPluginCallback |
| : public PpapiPluginProcessHost::PluginClient { |
| public: |
| OpenChannelToPpapiPluginCallback( |
| PepperRendererConnection* filter, |
| mojom::PepperHost::OpenChannelToPepperPluginCallback callback) |
| : callback_(std::move(callback)), filter_(filter) {} |
| |
| void GetPpapiChannelInfo(base::ProcessHandle* renderer_handle, |
| int* renderer_id) override { |
| // base::kNullProcessHandle indicates that the channel will be used by the |
| // browser itself. Make sure we never output that value here. |
| if (filter_->PeerHandle() == base::kNullProcessHandle) { |
| return; |
| } |
| *renderer_handle = filter_->PeerHandle(); |
| *renderer_id = filter_->render_process_id_; |
| } |
| |
| void OnPpapiChannelOpened(const IPC::ChannelHandle& channel_handle, |
| base::ProcessId plugin_pid, |
| int plugin_child_id) override { |
| std::move(callback_).Run(mojo::MakeScopedHandle(channel_handle.mojo_handle), |
| plugin_pid, plugin_child_id); |
| delete this; |
| } |
| |
| bool Incognito() override { return filter_->incognito_; } |
| |
| private: |
| mojom::PepperHost::OpenChannelToPepperPluginCallback callback_; |
| scoped_refptr<PepperRendererConnection> filter_; |
| }; |
| |
| PepperRendererConnection::PepperRendererConnection( |
| int render_process_id, |
| PluginServiceImpl* plugin_service, |
| BrowserContext* browser_context, |
| StoragePartition* storage_partition) |
| : BrowserMessageFilter(PpapiMsgStart), |
| render_process_id_(render_process_id), |
| incognito_(browser_context->IsOffTheRecord()), |
| plugin_service_(plugin_service), |
| profile_data_directory_(storage_partition->GetPath()) { |
| // Only give the renderer permission for stable APIs. |
| in_process_host_ = std::make_unique<BrowserPpapiHostImpl>( |
| this, ppapi::PpapiPermissions(), "", base::FilePath(), base::FilePath(), |
| true /* in_process */, false /* external_plugin */); |
| } |
| |
| PepperRendererConnection::~PepperRendererConnection() {} |
| |
| BrowserPpapiHostImpl* PepperRendererConnection::GetHostForChildProcess( |
| int child_process_id) const { |
| DCHECK_CURRENTLY_ON(content::BrowserThread::UI); |
| |
| // Find the plugin which this message refers to. Check NaCl plugins first. |
| BrowserPpapiHostImpl* host = static_cast<BrowserPpapiHostImpl*>( |
| GetContentClient()->browser()->GetExternalBrowserPpapiHost( |
| child_process_id)); |
| |
| if (!host) { |
| // Check trusted pepper plugins. |
| for (PpapiPluginProcessHostIterator iter; !iter.Done(); ++iter) { |
| if (iter->process() && |
| iter->process()->GetData().id == child_process_id) { |
| // Found the plugin. |
| host = iter->host_impl(); |
| break; |
| } |
| } |
| } |
| |
| // If the message is being sent from an in-process plugin, we own the |
| // BrowserPpapiHost. |
| if (!host && child_process_id == 0) { |
| host = in_process_host_.get(); |
| } |
| |
| return host; |
| } |
| |
| void PepperRendererConnection::OverrideThreadForMessage( |
| const IPC::Message& message, |
| content::BrowserThread::ID* thread) { |
| if (IPC_MESSAGE_ID_CLASS(message.type()) == PpapiMsgStart) { |
| *thread = content::BrowserThread::UI; |
| } |
| } |
| |
| bool PepperRendererConnection::OnMessageReceived(const IPC::Message& msg) { |
| if (in_process_host_->GetPpapiHost()->OnMessageReceived(msg)) |
| return true; |
| |
| bool handled = true; |
| IPC_BEGIN_MESSAGE_MAP(PepperRendererConnection, msg) |
| IPC_MESSAGE_HANDLER(PpapiHostMsg_CreateResourceHostsFromHost, |
| OnMsgCreateResourceHostsFromHost) |
| IPC_MESSAGE_UNHANDLED(handled = false) |
| IPC_END_MESSAGE_MAP() |
| |
| return handled; |
| } |
| |
| void PepperRendererConnection::OnMsgCreateResourceHostsFromHost( |
| int routing_id, |
| int child_process_id, |
| const ppapi::proxy::ResourceMessageCallParams& params, |
| PP_Instance instance, |
| const std::vector<IPC::Message>& nested_msgs) { |
| BrowserPpapiHostImpl* host = GetHostForChildProcess(child_process_id); |
| if (!host) { |
| DLOG(ERROR) << "Invalid plugin process ID."; |
| return; |
| } |
| |
| scoped_refptr<PendingHostCreator> creator = new PendingHostCreator( |
| host, this, routing_id, params.sequence(), nested_msgs.size()); |
| for (size_t i = 0; i < nested_msgs.size(); ++i) { |
| const IPC::Message& nested_msg = nested_msgs[i]; |
| std::unique_ptr<ppapi::host::ResourceHost> resource_host; |
| if (host->IsValidInstance(instance)) { |
| if (nested_msg.type() == PpapiHostMsg_FileRef_CreateForRawFS::ID) { |
| // FileRef_CreateForRawFS is only permitted from the renderer. Because |
| // of this, we handle this message here and not in |
| // content_browser_pepper_host_factory.cc. |
| base::FilePath external_path; |
| if (ppapi::UnpackMessage<PpapiHostMsg_FileRef_CreateForRawFS>( |
| nested_msg, &external_path)) { |
| resource_host = std::make_unique<PepperFileRefHost>( |
| host, instance, params.pp_resource(), external_path); |
| } |
| } else if (nested_msg.type() == |
| PpapiHostMsg_FileSystem_CreateFromRenderer::ID) { |
| // Similarly, FileSystem_CreateFromRenderer is only permitted from the |
| // renderer. |
| std::string root_url; |
| PP_FileSystemType file_system_type; |
| if (ppapi::UnpackMessage<PpapiHostMsg_FileSystem_CreateFromRenderer>( |
| nested_msg, &root_url, &file_system_type)) { |
| PepperFileSystemBrowserHost* browser_host = |
| new PepperFileSystemBrowserHost( |
| host, instance, params.pp_resource(), file_system_type); |
| resource_host.reset(browser_host); |
| // Open the file system resource host. This is an asynchronous |
| // operation, and we must only add the pending resource host and |
| // send the message once it completes. |
| browser_host->OpenExisting( |
| GURL(root_url), |
| base::BindOnce(&PendingHostCreator::AddPendingResourceHost, |
| creator, i, std::move(resource_host))); |
| // Do not fall through; the fall-through case adds the pending |
| // resource host to the list. We must do this asynchronously. |
| continue; |
| } |
| } |
| } |
| |
| if (!resource_host.get()) { |
| resource_host = host->GetPpapiHost()->CreateResourceHost( |
| params.pp_resource(), instance, nested_msg); |
| } |
| |
| if (resource_host.get()) |
| creator->AddPendingResourceHost(i, std::move(resource_host)); |
| } |
| |
| // Note: All of the pending host IDs that were added as part of this |
| // operation will automatically be sent to the plugin when |creator| is |
| // released. This may happen immediately, or (if there are asynchronous |
| // requests to create resource hosts), once all of them complete. |
| } |
| |
| void PepperRendererConnection::DidCreateInProcessInstance( |
| int32_t instance, |
| int32_t render_frame_id, |
| const GURL& document_url, |
| const GURL& plugin_url) { |
| // We don't need to know if it's a privileged context for in-process plugins. |
| // In process plugins are deprecated and the only in-process plugin that |
| // exists is the "NaCl plugin" which will never need to know this. |
| PepperRendererInstanceData instance_data{render_process_id_, render_frame_id, |
| document_url, plugin_url, |
| /*secure=*/false}; |
| |
| // 'instance' is possibly invalid. The host must be careful not to trust it. |
| in_process_host_->AddInstance(instance, instance_data); |
| } |
| |
| void PepperRendererConnection::DidDeleteInProcessInstance(int32_t instance) { |
| // 'instance' is possibly invalid. The host must be careful not to trust it. |
| in_process_host_->DeleteInstance(instance); |
| } |
| |
| void PepperRendererConnection::DidCreateOutOfProcessPepperInstance( |
| int32_t plugin_child_id, |
| int32_t pp_instance, |
| bool is_external, |
| int32_t render_frame_id, |
| const GURL& document_url, |
| const GURL& plugin_url, |
| bool is_privileged_context, |
| mojom::PepperHost::DidCreateOutOfProcessPepperInstanceCallback callback) { |
| // It's important that we supply the render process ID ourselves based on the |
| // channel the message arrived on. We use the |
| // PP_Instance -> (process id, frame id) |
| // mapping to decide how to handle messages received from the (untrusted) |
| // plugin. An exploited renderer must not be able to insert fake mappings |
| // that may allow it access to other render processes. |
| PepperRendererInstanceData instance_data{render_process_id_, render_frame_id, |
| document_url, plugin_url, |
| is_privileged_context}; |
| if (is_external) { |
| // We provide the BrowserPpapiHost to the embedder, so it's safe to cast. |
| BrowserPpapiHostImpl* host = static_cast<BrowserPpapiHostImpl*>( |
| GetContentClient()->browser()->GetExternalBrowserPpapiHost( |
| plugin_child_id)); |
| if (host) |
| host->AddInstance(pp_instance, instance_data); |
| } else { |
| PpapiPluginProcessHost::DidCreateOutOfProcessInstance( |
| plugin_child_id, pp_instance, instance_data); |
| } |
| std::move(callback).Run(); |
| } |
| |
| void PepperRendererConnection::DidDeleteOutOfProcessPepperInstance( |
| int32_t plugin_child_id, |
| int32_t pp_instance, |
| bool is_external) { |
| if (is_external) { |
| // We provide the BrowserPpapiHost to the embedder, so it's safe to cast. |
| BrowserPpapiHostImpl* host = static_cast<BrowserPpapiHostImpl*>( |
| GetContentClient()->browser()->GetExternalBrowserPpapiHost( |
| plugin_child_id)); |
| if (host) |
| host->DeleteInstance(pp_instance); |
| } else { |
| PpapiPluginProcessHost::DidDeleteOutOfProcessInstance(plugin_child_id, |
| pp_instance); |
| } |
| } |
| |
| void PepperRendererConnection::OpenChannelToPepperPlugin( |
| const url::Origin& embedder_origin, |
| const base::FilePath& path, |
| const absl::optional<url::Origin>& origin_lock, |
| mojom::PepperHost::OpenChannelToPepperPluginCallback callback) { |
| // Enforce that the sender of the IPC (i.e. |render_process_id_|) is actually |
| // able/allowed to host a frame with |embedder_origin|. |
| auto* policy = ChildProcessSecurityPolicyImpl::GetInstance(); |
| if (!policy->CanAccessDataForOrigin(render_process_id_, embedder_origin)) { |
| bad_message::ReceivedBadMessage( |
| this, bad_message::RFMF_INVALID_PLUGIN_EMBEDDER_ORIGIN); |
| return; |
| } |
| |
| plugin_service_->OpenChannelToPpapiPlugin( |
| render_process_id_, path, profile_data_directory_, origin_lock, |
| new OpenChannelToPpapiPluginCallback(this, std::move(callback))); |
| } |
| |
| } // namespace content |