blob: f79b32db44a05f554e207c9daa366e62b13f067d [file] [log] [blame]
Chong Zhanga4f67512017-04-24 17:18:25 -07001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17//#define LOG_NDEBUG 0
18#define LOG_TAG "android.hardware.cas@1.0-DescramblerImpl"
19
20#include <hidlmemory/mapping.h>
Henry Fangd3fbe192020-06-08 14:54:41 -070021#include <inttypes.h>
Chong Zhanga4f67512017-04-24 17:18:25 -070022#include <media/cas/DescramblerAPI.h>
Chong Zhang16a3cd02017-10-24 22:42:30 -070023#include <media/hardware/CryptoAPI.h>
Chong Zhang521f6952019-01-04 12:12:25 -080024#include <media/stagefright/foundation/AString.h>
Chong Zhang16a3cd02017-10-24 22:42:30 -070025#include <media/stagefright/foundation/AUtils.h>
Chong Zhanga4f67512017-04-24 17:18:25 -070026#include <utils/Log.h>
27
28#include "DescramblerImpl.h"
29#include "SharedLibrary.h"
30#include "TypeConvert.h"
31
32namespace android {
33using hidl::memory::V1_0::IMemory;
34
35namespace hardware {
36namespace cas {
37namespace V1_0 {
38namespace implementation {
39
40#define CHECK_SUBSAMPLE_DEF(type) \
41static_assert(sizeof(SubSample) == sizeof(type::SubSample), \
42 "SubSample: size doesn't match"); \
43static_assert(offsetof(SubSample, numBytesOfClearData) \
44 == offsetof(type::SubSample, mNumBytesOfClearData), \
45 "SubSample: numBytesOfClearData offset doesn't match"); \
46static_assert(offsetof(SubSample, numBytesOfEncryptedData) \
47 == offsetof(type::SubSample, mNumBytesOfEncryptedData), \
48 "SubSample: numBytesOfEncryptedData offset doesn't match")
49
50CHECK_SUBSAMPLE_DEF(DescramblerPlugin);
51CHECK_SUBSAMPLE_DEF(CryptoPlugin);
52
53DescramblerImpl::DescramblerImpl(
54 const sp<SharedLibrary>& library, DescramblerPlugin *plugin) :
Chong Zhangaddcb3a2018-03-21 15:52:21 -070055 mLibrary(library), mPluginHolder(plugin) {
56 ALOGV("CTOR: plugin=%p", mPluginHolder.get());
Chong Zhanga4f67512017-04-24 17:18:25 -070057}
58
59DescramblerImpl::~DescramblerImpl() {
Chong Zhangaddcb3a2018-03-21 15:52:21 -070060 ALOGV("DTOR: plugin=%p", mPluginHolder.get());
Chong Zhanga4f67512017-04-24 17:18:25 -070061 release();
62}
63
64Return<Status> DescramblerImpl::setMediaCasSession(const HidlCasSessionId& sessionId) {
65 ALOGV("%s: sessionId=%s", __FUNCTION__,
66 sessionIdToString(sessionId).string());
67
Chong Zhangaddcb3a2018-03-21 15:52:21 -070068 std::shared_ptr<DescramblerPlugin> holder = std::atomic_load(&mPluginHolder);
69 if (holder.get() == nullptr) {
70 return toStatus(INVALID_OPERATION);
71 }
72
73 return toStatus(holder->setMediaCasSession(sessionId));
Chong Zhanga4f67512017-04-24 17:18:25 -070074}
75
76Return<bool> DescramblerImpl::requiresSecureDecoderComponent(
77 const hidl_string& mime) {
Chong Zhangaddcb3a2018-03-21 15:52:21 -070078 std::shared_ptr<DescramblerPlugin> holder = std::atomic_load(&mPluginHolder);
79 if (holder.get() == nullptr) {
80 return false;
81 }
82
83 return holder->requiresSecureDecoderComponent(String8(mime.c_str()));
Chong Zhanga4f67512017-04-24 17:18:25 -070084}
85
Chong Zhang16a3cd02017-10-24 22:42:30 -070086static inline bool validateRangeForSize(
87 uint64_t offset, uint64_t length, uint64_t size) {
88 return isInRange<uint64_t, uint64_t>(0, size, offset, length);
89}
90
Chong Zhanga4f67512017-04-24 17:18:25 -070091Return<void> DescramblerImpl::descramble(
92 ScramblingControl scramblingControl,
93 const hidl_vec<SubSample>& subSamples,
94 const SharedBuffer& srcBuffer,
95 uint64_t srcOffset,
96 const DestinationBuffer& dstBuffer,
97 uint64_t dstOffset,
98 descramble_cb _hidl_cb) {
99 ALOGV("%s", __FUNCTION__);
100
Chong Zhange1ce7452018-05-10 13:53:12 -0700101 // hidl_memory's size is stored in uint64_t, but mapMemory's mmap will map
102 // size in size_t. If size is over SIZE_MAX, mapMemory mapMemory could succeed
103 // but the mapped memory's actual size will be smaller than the reported size.
104 if (srcBuffer.heapBase.size() > SIZE_MAX) {
Henry Fangd3fbe192020-06-08 14:54:41 -0700105 ALOGE("Invalid hidl_memory size: %" PRIu64 "", srcBuffer.heapBase.size());
Chong Zhange1ce7452018-05-10 13:53:12 -0700106 android_errorWriteLog(0x534e4554, "79376389");
107 _hidl_cb(toStatus(BAD_VALUE), 0, NULL);
Chong Zhangaddcb3a2018-03-21 15:52:21 -0700108 return Void();
109 }
110
Chong Zhanga4f67512017-04-24 17:18:25 -0700111 sp<IMemory> srcMem = mapMemory(srcBuffer.heapBase);
Chong Zhang16a3cd02017-10-24 22:42:30 -0700112
113 // Validate if the offset and size in the SharedBuffer is consistent with the
114 // mapped ashmem, since the offset and size is controlled by client.
115 if (srcMem == NULL) {
116 ALOGE("Failed to map src buffer.");
117 _hidl_cb(toStatus(BAD_VALUE), 0, NULL);
118 return Void();
119 }
120 if (!validateRangeForSize(
121 srcBuffer.offset, srcBuffer.size, (uint64_t)srcMem->getSize())) {
Henry Fangd3fbe192020-06-08 14:54:41 -0700122 ALOGE("Invalid src buffer range: offset %" PRIu64 ", size %" PRIu64 ", srcMem"
123 "size %" PRIu64 "", srcBuffer.offset, srcBuffer.size, (uint64_t)srcMem->getSize());
Chong Zhang16a3cd02017-10-24 22:42:30 -0700124 android_errorWriteLog(0x534e4554, "67962232");
125 _hidl_cb(toStatus(BAD_VALUE), 0, NULL);
126 return Void();
127 }
128
129 // use 64-bit here to catch bad subsample size that might be overflowing.
130 uint64_t totalBytesInSubSamples = 0;
131 for (size_t i = 0; i < subSamples.size(); i++) {
132 totalBytesInSubSamples += (uint64_t)subSamples[i].numBytesOfClearData +
133 subSamples[i].numBytesOfEncryptedData;
134 }
135 // Further validate if the specified srcOffset and requested total subsample size
136 // is consistent with the source shared buffer size.
137 if (!validateRangeForSize(srcOffset, totalBytesInSubSamples, srcBuffer.size)) {
138 ALOGE("Invalid srcOffset and subsample size: "
Henry Fangd3fbe192020-06-08 14:54:41 -0700139 "srcOffset %" PRIu64 ", totalBytesInSubSamples %" PRIu64 ", srcBuffer"
140 "size %" PRIu64 "", srcOffset, totalBytesInSubSamples, srcBuffer.size);
Chong Zhang16a3cd02017-10-24 22:42:30 -0700141 android_errorWriteLog(0x534e4554, "67962232");
142 _hidl_cb(toStatus(BAD_VALUE), 0, NULL);
143 return Void();
144 }
145
Chong Zhanga4f67512017-04-24 17:18:25 -0700146 void *srcPtr = (uint8_t *)(void *)srcMem->getPointer() + srcBuffer.offset;
147 void *dstPtr = NULL;
148 if (dstBuffer.type == BufferType::SHARED_MEMORY) {
149 // When using shared memory, src buffer is also used as dst,
150 // we don't map it again here.
151 dstPtr = srcPtr;
Chong Zhang16a3cd02017-10-24 22:42:30 -0700152
153 // In this case the dst and src would be the same buffer, need to validate
154 // dstOffset against the buffer size too.
155 if (!validateRangeForSize(dstOffset, totalBytesInSubSamples, srcBuffer.size)) {
156 ALOGE("Invalid dstOffset and subsample size: "
Henry Fangd3fbe192020-06-08 14:54:41 -0700157 "dstOffset %" PRIu64 ", totalBytesInSubSamples %" PRIu64 ", srcBuffer"
158 "size %" PRIu64 "", dstOffset, totalBytesInSubSamples, srcBuffer.size);
Chong Zhang16a3cd02017-10-24 22:42:30 -0700159 android_errorWriteLog(0x534e4554, "67962232");
160 _hidl_cb(toStatus(BAD_VALUE), 0, NULL);
161 return Void();
162 }
Chong Zhanga4f67512017-04-24 17:18:25 -0700163 } else {
164 native_handle_t *handle = const_cast<native_handle_t *>(
165 dstBuffer.secureMemory.getNativeHandle());
166 dstPtr = static_cast<void *>(handle);
167 }
Chong Zhange1ce7452018-05-10 13:53:12 -0700168
169 // Get a local copy of the shared_ptr for the plugin. Note that before
170 // calling the HIDL callback, this shared_ptr must be manually reset,
171 // since the client side could proceed as soon as the callback is called
172 // without waiting for this method to go out of scope.
173 std::shared_ptr<DescramblerPlugin> holder = std::atomic_load(&mPluginHolder);
174 if (holder.get() == nullptr) {
175 _hidl_cb(toStatus(INVALID_OPERATION), 0, NULL);
176 return Void();
177 }
178
Chong Zhanga4f67512017-04-24 17:18:25 -0700179 // Casting hidl SubSample to DescramblerPlugin::SubSample, but need
180 // to ensure structs are actually idential
181
Chong Zhang521f6952019-01-04 12:12:25 -0800182 AString detailedError;
Chong Zhangaddcb3a2018-03-21 15:52:21 -0700183 int32_t result = holder->descramble(
Chong Zhanga4f67512017-04-24 17:18:25 -0700184 dstBuffer.type != BufferType::SHARED_MEMORY,
185 (DescramblerPlugin::ScramblingControl)scramblingControl,
186 subSamples.size(),
187 (DescramblerPlugin::SubSample*)subSamples.data(),
188 srcPtr,
189 srcOffset,
190 dstPtr,
191 dstOffset,
Chong Zhang521f6952019-01-04 12:12:25 -0800192 &detailedError);
Chong Zhanga4f67512017-04-24 17:18:25 -0700193
Chong Zhangaddcb3a2018-03-21 15:52:21 -0700194 holder.reset();
Chong Zhang521f6952019-01-04 12:12:25 -0800195 _hidl_cb(toStatus(result >= 0 ? OK : result), result, detailedError.c_str());
Chong Zhanga4f67512017-04-24 17:18:25 -0700196 return Void();
197}
198
199Return<Status> DescramblerImpl::release() {
Chong Zhangaddcb3a2018-03-21 15:52:21 -0700200 ALOGV("%s: plugin=%p", __FUNCTION__, mPluginHolder.get());
Chong Zhanga4f67512017-04-24 17:18:25 -0700201
Chong Zhangaddcb3a2018-03-21 15:52:21 -0700202 std::shared_ptr<DescramblerPlugin> holder(nullptr);
203 std::atomic_store(&mPluginHolder, holder);
204
Chong Zhanga4f67512017-04-24 17:18:25 -0700205 return Status::OK;
206}
207
208} // namespace implementation
209} // namespace V1_0
210} // namespace cas
211} // namespace hardware
212} // namespace android