// Copyright 2014 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "extensions/browser/extension_function_dispatcher.h" #include "base/bind.h" #include "base/json/json_string_value_serializer.h" #include "base/lazy_instance.h" #include "base/logging.h" #include "base/memory/ref_counted.h" #include "base/metrics/histogram_macros.h" #include "base/metrics/sparse_histogram.h" #include "base/process/process.h" #include "base/profiler/scoped_profile.h" #include "base/values.h" #include "build/build_config.h" #include "content/public/browser/browser_thread.h" #include "content/public/browser/render_frame_host.h" #include "content/public/browser/render_process_host.h" #include "content/public/browser/render_view_host.h" #include "content/public/browser/user_metrics.h" #include "content/public/browser/web_contents.h" #include "content/public/browser/web_contents_observer.h" #include "content/public/common/result_codes.h" #include "extensions/browser/api_activity_monitor.h" #include "extensions/browser/extension_function_registry.h" #include "extensions/browser/extension_registry.h" #include "extensions/browser/extension_system.h" #include "extensions/browser/extensions_browser_client.h" #include "extensions/browser/io_thread_extension_message_filter.h" #include "extensions/browser/process_manager.h" #include "extensions/browser/process_map.h" #include "extensions/browser/quota_service.h" #include "extensions/common/extension_api.h" #include "extensions/common/extension_messages.h" #include "extensions/common/extension_set.h" #include "ipc/ipc_message.h" #include "ipc/ipc_message_macros.h" using content::BrowserThread; using content::RenderViewHost; namespace extensions { namespace { // Notifies the ApiActivityMonitor that an extension API function has been // called. May be called from any thread. void NotifyApiFunctionCalled(const std::string& extension_id, const std::string& api_name, scoped_ptr args, content::BrowserContext* browser_context) { // The ApiActivityMonitor can only be accessed from the main (UI) thread. If // we're running on the wrong thread, re-dispatch from the main thread. if (!BrowserThread::CurrentlyOn(BrowserThread::UI)) { BrowserThread::PostTask(BrowserThread::UI, FROM_HERE, base::Bind(&NotifyApiFunctionCalled, extension_id, api_name, base::Passed(&args), browser_context)); return; } // The BrowserContext may become invalid after the task above is posted. if (!ExtensionsBrowserClient::Get()->IsValidContext(browser_context)) return; ApiActivityMonitor* monitor = ExtensionsBrowserClient::Get()->GetApiActivityMonitor(browser_context); if (monitor) monitor->OnApiFunctionCalled(extension_id, api_name, args.Pass()); } // Separate copy of ExtensionAPI used for IO thread extension functions. We need // this because ExtensionAPI has mutable data. It should be possible to remove // this once all the extension APIs are updated to the feature system. struct Static { Static() : api(ExtensionAPI::CreateWithDefaultConfiguration()) {} scoped_ptr api; }; base::LazyInstance g_global_io_data = LAZY_INSTANCE_INITIALIZER; // Kills the specified process because it sends us a malformed message. // Track the specific function's |histogram_value|, as this may indicate a bug // in that API's implementation on the renderer. void KillBadMessageSender(const base::Process& process, functions::HistogramValue histogram_value) { NOTREACHED(); content::RecordAction(base::UserMetricsAction("BadMessageTerminate_EFD")); UMA_HISTOGRAM_ENUMERATION("Extensions.BadMessageFunctionName", histogram_value, functions::ENUM_BOUNDARY); if (process.IsValid()) process.Terminate(content::RESULT_CODE_KILLED_BAD_MESSAGE, false); } void CommonResponseCallback(IPC::Sender* ipc_sender, int routing_id, const base::Process& peer_process, int request_id, ExtensionFunction::ResponseType type, const base::ListValue& results, const std::string& error, functions::HistogramValue histogram_value) { DCHECK(ipc_sender); if (type == ExtensionFunction::BAD_MESSAGE) { // The renderer has done validation before sending extension api requests. // Therefore, we should never receive a request that is invalid in a way // that JSON validation in the renderer should have caught. It could be an // attacker trying to exploit the browser, so we crash the renderer instead. LOG(ERROR) << "Terminating renderer because of malformed extension message."; if (content::RenderProcessHost::run_renderer_in_process()) { // In single process mode it is better if we don't suicide but just crash. CHECK(false); } else { KillBadMessageSender(peer_process, histogram_value); } return; } ipc_sender->Send(new ExtensionMsg_Response( routing_id, request_id, type == ExtensionFunction::SUCCEEDED, results, error)); } void IOThreadResponseCallback( const base::WeakPtr& ipc_sender, int routing_id, int request_id, ExtensionFunction::ResponseType type, const base::ListValue& results, const std::string& error, functions::HistogramValue histogram_value) { if (!ipc_sender.get()) return; base::Process peer_process = base::Process::DeprecatedGetProcessFromHandle(ipc_sender->PeerHandle()); CommonResponseCallback(ipc_sender.get(), routing_id, peer_process, request_id, type, results, error, histogram_value); } } // namespace class ExtensionFunctionDispatcher::UIThreadResponseCallbackWrapper : public content::WebContentsObserver { public: UIThreadResponseCallbackWrapper( const base::WeakPtr& dispatcher, content::RenderFrameHost* render_frame_host) : content::WebContentsObserver( content::WebContents::FromRenderFrameHost(render_frame_host)), dispatcher_(dispatcher), render_frame_host_(render_frame_host), weak_ptr_factory_(this) { } ~UIThreadResponseCallbackWrapper() override {} // content::WebContentsObserver overrides. void RenderFrameDeleted( content::RenderFrameHost* render_frame_host) override { DCHECK_CURRENTLY_ON(BrowserThread::UI); if (render_frame_host != render_frame_host_) return; if (dispatcher_.get()) { dispatcher_->ui_thread_response_callback_wrappers_ .erase(render_frame_host); } delete this; } ExtensionFunction::ResponseCallback CreateCallback(int request_id) { return base::Bind( &UIThreadResponseCallbackWrapper::OnExtensionFunctionCompleted, weak_ptr_factory_.GetWeakPtr(), request_id); } private: void OnExtensionFunctionCompleted(int request_id, ExtensionFunction::ResponseType type, const base::ListValue& results, const std::string& error, functions::HistogramValue histogram_value) { base::Process process = content::RenderProcessHost::run_renderer_in_process() ? base::Process::Current() : base::Process::DeprecatedGetProcessFromHandle( render_frame_host_->GetProcess()->GetHandle()); CommonResponseCallback(render_frame_host_, render_frame_host_->GetRoutingID(), process, request_id, type, results, error, histogram_value); } base::WeakPtr dispatcher_; content::RenderFrameHost* render_frame_host_; base::WeakPtrFactory weak_ptr_factory_; DISALLOW_COPY_AND_ASSIGN(UIThreadResponseCallbackWrapper); }; WindowController* ExtensionFunctionDispatcher::Delegate::GetExtensionWindowController() const { return nullptr; } content::WebContents* ExtensionFunctionDispatcher::Delegate::GetAssociatedWebContents() const { return nullptr; } content::WebContents* ExtensionFunctionDispatcher::Delegate::GetVisibleWebContents() const { return GetAssociatedWebContents(); } bool ExtensionFunctionDispatcher::OverrideFunction( const std::string& name, ExtensionFunctionFactory factory) { return ExtensionFunctionRegistry::GetInstance()->OverrideFunction(name, factory); } // static void ExtensionFunctionDispatcher::DispatchOnIOThread( InfoMap* extension_info_map, void* profile_id, int render_process_id, base::WeakPtr ipc_sender, int routing_id, const ExtensionHostMsg_Request_Params& params) { const Extension* extension = extension_info_map->extensions().GetByID(params.extension_id); ExtensionFunction::ResponseCallback callback( base::Bind(&IOThreadResponseCallback, ipc_sender, routing_id, params.request_id)); scoped_refptr function( CreateExtensionFunction(params, extension, render_process_id, extension_info_map->process_map(), g_global_io_data.Get().api.get(), profile_id, callback)); if (!function.get()) return; IOThreadExtensionFunction* function_io = function->AsIOThreadExtensionFunction(); if (!function_io) { NOTREACHED(); return; } function_io->set_ipc_sender(ipc_sender, routing_id); function_io->set_extension_info_map(extension_info_map); if (extension) { function->set_include_incognito( extension_info_map->IsIncognitoEnabled(extension->id())); } if (!CheckPermissions(function.get(), params, callback)) return; if (!extension) { // Skip all of the UMA, quota, event page, activity logging stuff if there // isn't an extension, e.g. if the function call was from WebUI. function->Run()->Execute(); return; } QuotaService* quota = extension_info_map->GetQuotaService(); std::string violation_error = quota->Assess(extension->id(), function.get(), ¶ms.arguments, base::TimeTicks::Now()); if (violation_error.empty()) { scoped_ptr args(params.arguments.DeepCopy()); NotifyApiFunctionCalled(extension->id(), params.name, args.Pass(), static_cast(profile_id)); UMA_HISTOGRAM_SPARSE_SLOWLY("Extensions.FunctionCalls", function->histogram_value()); tracked_objects::ScopedProfile scoped_profile( FROM_HERE_WITH_EXPLICIT_FUNCTION(function->name()), tracked_objects::ScopedProfile::ENABLED); function->Run()->Execute(); } else { function->OnQuotaExceeded(violation_error); } } ExtensionFunctionDispatcher::ExtensionFunctionDispatcher( content::BrowserContext* browser_context) : browser_context_(browser_context) { } ExtensionFunctionDispatcher::~ExtensionFunctionDispatcher() { } void ExtensionFunctionDispatcher::Dispatch( const ExtensionHostMsg_Request_Params& params, content::RenderFrameHost* render_frame_host) { UIThreadResponseCallbackWrapperMap::const_iterator iter = ui_thread_response_callback_wrappers_.find(render_frame_host); UIThreadResponseCallbackWrapper* callback_wrapper = nullptr; if (iter == ui_thread_response_callback_wrappers_.end()) { callback_wrapper = new UIThreadResponseCallbackWrapper(AsWeakPtr(), render_frame_host); ui_thread_response_callback_wrappers_[render_frame_host] = callback_wrapper; } else { callback_wrapper = iter->second; } DispatchWithCallbackInternal( params, render_frame_host, callback_wrapper->CreateCallback(params.request_id)); } void ExtensionFunctionDispatcher::DispatchWithCallbackInternal( const ExtensionHostMsg_Request_Params& params, content::RenderFrameHost* render_frame_host, const ExtensionFunction::ResponseCallback& callback) { DCHECK(render_frame_host); // TODO(yzshen): There is some shared logic between this method and // DispatchOnIOThread(). It is nice to deduplicate. ProcessMap* process_map = ProcessMap::Get(browser_context_); if (!process_map) return; ExtensionRegistry* registry = ExtensionRegistry::Get(browser_context_); const Extension* extension = registry->enabled_extensions().GetByID(params.extension_id); if (!extension) { extension = registry->enabled_extensions().GetHostedAppByURL(params.source_url); } int process_id = render_frame_host->GetProcess()->GetID(); scoped_refptr function( CreateExtensionFunction(params, extension, process_id, *process_map, ExtensionAPI::GetSharedInstance(), browser_context_, callback)); if (!function.get()) return; UIThreadExtensionFunction* function_ui = function->AsUIThreadExtensionFunction(); if (!function_ui) { NOTREACHED(); return; } function_ui->SetRenderFrameHost(render_frame_host); function_ui->set_dispatcher(AsWeakPtr()); function_ui->set_browser_context(browser_context_); if (extension && ExtensionsBrowserClient::Get()->CanExtensionCrossIncognito( extension, browser_context_)) { function->set_include_incognito(true); } if (!CheckPermissions(function.get(), params, callback)) return; if (!extension) { // Skip all of the UMA, quota, event page, activity logging stuff if there // isn't an extension, e.g. if the function call was from WebUI. function->Run()->Execute(); return; } // Fetch the ProcessManager before |this| is possibly invalidated. ProcessManager* process_manager = ProcessManager::Get(browser_context_); ExtensionSystem* extension_system = ExtensionSystem::Get(browser_context_); QuotaService* quota = extension_system->quota_service(); std::string violation_error = quota->Assess(extension->id(), function.get(), ¶ms.arguments, base::TimeTicks::Now()); if (violation_error.empty()) { scoped_ptr args(params.arguments.DeepCopy()); // See crbug.com/39178. ExtensionsBrowserClient::Get()->PermitExternalProtocolHandler(); NotifyApiFunctionCalled( extension->id(), params.name, args.Pass(), browser_context_); UMA_HISTOGRAM_SPARSE_SLOWLY("Extensions.FunctionCalls", function->histogram_value()); tracked_objects::ScopedProfile scoped_profile( FROM_HERE_WITH_EXPLICIT_FUNCTION(function->name()), tracked_objects::ScopedProfile::ENABLED); function->Run()->Execute(); } else { function->OnQuotaExceeded(violation_error); } // Note: do not access |this| after this point. We may have been deleted // if function->Run() ended up closing the tab that owns us. // Check if extension was uninstalled by management.uninstall. if (!registry->enabled_extensions().GetByID(params.extension_id)) return; // We only adjust the keepalive count for UIThreadExtensionFunction for // now, largely for simplicity's sake. This is OK because currently, only // the webRequest API uses IOThreadExtensionFunction, and that API is not // compatible with lazy background pages. process_manager->IncrementLazyKeepaliveCount(extension); } void ExtensionFunctionDispatcher::OnExtensionFunctionCompleted( const Extension* extension) { if (extension) { ProcessManager::Get(browser_context_) ->DecrementLazyKeepaliveCount(extension); } } WindowController* ExtensionFunctionDispatcher::GetExtensionWindowController() const { return delegate_ ? delegate_->GetExtensionWindowController() : nullptr; } content::WebContents* ExtensionFunctionDispatcher::GetAssociatedWebContents() const { return delegate_ ? delegate_->GetAssociatedWebContents() : nullptr; } content::WebContents* ExtensionFunctionDispatcher::GetVisibleWebContents() const { return delegate_ ? delegate_->GetVisibleWebContents() : GetAssociatedWebContents(); } // static bool ExtensionFunctionDispatcher::CheckPermissions( ExtensionFunction* function, const ExtensionHostMsg_Request_Params& params, const ExtensionFunction::ResponseCallback& callback) { if (!function->HasPermission()) { LOG(ERROR) << "Permission denied for " << params.name; SendAccessDenied(callback, function->histogram_value()); return false; } return true; } // static ExtensionFunction* ExtensionFunctionDispatcher::CreateExtensionFunction( const ExtensionHostMsg_Request_Params& params, const Extension* extension, int requesting_process_id, const ProcessMap& process_map, ExtensionAPI* api, void* profile_id, const ExtensionFunction::ResponseCallback& callback) { ExtensionFunction* function = ExtensionFunctionRegistry::GetInstance()->NewFunction(params.name); if (!function) { LOG(ERROR) << "Unknown Extension API - " << params.name; SendAccessDenied(callback, function->histogram_value()); return NULL; } function->SetArgs(¶ms.arguments); function->set_source_url(params.source_url); function->set_request_id(params.request_id); function->set_has_callback(params.has_callback); function->set_user_gesture(params.user_gesture); function->set_extension(extension); function->set_profile_id(profile_id); function->set_response_callback(callback); function->set_source_tab_id(params.source_tab_id); function->set_source_context_type( process_map.GetMostLikelyContextType(extension, requesting_process_id)); function->set_source_process_id(requesting_process_id); return function; } // static void ExtensionFunctionDispatcher::SendAccessDenied( const ExtensionFunction::ResponseCallback& callback, functions::HistogramValue histogram_value) { base::ListValue empty_list; callback.Run(ExtensionFunction::FAILED, empty_list, "Access to extension API denied.", histogram_value); } } // namespace extensions