xref: /aosp_15_r20/hardware/interfaces/cas/1.0/default/DescramblerImpl.cpp (revision 4d7e907c777eeecc4c5bd7cf640a754fac206ff7)
1*4d7e907cSAndroid Build Coastguard Worker /*
2*4d7e907cSAndroid Build Coastguard Worker  * Copyright (C) 2017 The Android Open Source Project
3*4d7e907cSAndroid Build Coastguard Worker  *
4*4d7e907cSAndroid Build Coastguard Worker  * Licensed under the Apache License, Version 2.0 (the "License");
5*4d7e907cSAndroid Build Coastguard Worker  * you may not use this file except in compliance with the License.
6*4d7e907cSAndroid Build Coastguard Worker  * You may obtain a copy of the License at
7*4d7e907cSAndroid Build Coastguard Worker  *
8*4d7e907cSAndroid Build Coastguard Worker  *      http://www.apache.org/licenses/LICENSE-2.0
9*4d7e907cSAndroid Build Coastguard Worker  *
10*4d7e907cSAndroid Build Coastguard Worker  * Unless required by applicable law or agreed to in writing, software
11*4d7e907cSAndroid Build Coastguard Worker  * distributed under the License is distributed on an "AS IS" BASIS,
12*4d7e907cSAndroid Build Coastguard Worker  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*4d7e907cSAndroid Build Coastguard Worker  * See the License for the specific language governing permissions and
14*4d7e907cSAndroid Build Coastguard Worker  * limitations under the License.
15*4d7e907cSAndroid Build Coastguard Worker  */
16*4d7e907cSAndroid Build Coastguard Worker 
17*4d7e907cSAndroid Build Coastguard Worker //#define LOG_NDEBUG 0
18*4d7e907cSAndroid Build Coastguard Worker #define LOG_TAG "[email protected]"
19*4d7e907cSAndroid Build Coastguard Worker 
20*4d7e907cSAndroid Build Coastguard Worker #include <hidlmemory/mapping.h>
21*4d7e907cSAndroid Build Coastguard Worker #include <inttypes.h>
22*4d7e907cSAndroid Build Coastguard Worker #include <media/cas/DescramblerAPI.h>
23*4d7e907cSAndroid Build Coastguard Worker #include <media/hardware/CryptoAPI.h>
24*4d7e907cSAndroid Build Coastguard Worker #include <media/stagefright/foundation/AString.h>
25*4d7e907cSAndroid Build Coastguard Worker #include <media/stagefright/foundation/AUtils.h>
26*4d7e907cSAndroid Build Coastguard Worker #include <utils/Log.h>
27*4d7e907cSAndroid Build Coastguard Worker 
28*4d7e907cSAndroid Build Coastguard Worker #include "DescramblerImpl.h"
29*4d7e907cSAndroid Build Coastguard Worker #include "SharedLibrary.h"
30*4d7e907cSAndroid Build Coastguard Worker #include "TypeConvert.h"
31*4d7e907cSAndroid Build Coastguard Worker 
32*4d7e907cSAndroid Build Coastguard Worker namespace android {
33*4d7e907cSAndroid Build Coastguard Worker using hidl::memory::V1_0::IMemory;
34*4d7e907cSAndroid Build Coastguard Worker 
35*4d7e907cSAndroid Build Coastguard Worker namespace hardware {
36*4d7e907cSAndroid Build Coastguard Worker namespace cas {
37*4d7e907cSAndroid Build Coastguard Worker namespace V1_0 {
38*4d7e907cSAndroid Build Coastguard Worker namespace implementation {
39*4d7e907cSAndroid Build Coastguard Worker 
40*4d7e907cSAndroid Build Coastguard Worker #define CHECK_SUBSAMPLE_DEF(type) \
41*4d7e907cSAndroid Build Coastguard Worker static_assert(sizeof(SubSample) == sizeof(type::SubSample), \
42*4d7e907cSAndroid Build Coastguard Worker         "SubSample: size doesn't match"); \
43*4d7e907cSAndroid Build Coastguard Worker static_assert(offsetof(SubSample, numBytesOfClearData) \
44*4d7e907cSAndroid Build Coastguard Worker         == offsetof(type::SubSample, mNumBytesOfClearData), \
45*4d7e907cSAndroid Build Coastguard Worker         "SubSample: numBytesOfClearData offset doesn't match"); \
46*4d7e907cSAndroid Build Coastguard Worker static_assert(offsetof(SubSample, numBytesOfEncryptedData) \
47*4d7e907cSAndroid Build Coastguard Worker         == offsetof(type::SubSample, mNumBytesOfEncryptedData), \
48*4d7e907cSAndroid Build Coastguard Worker         "SubSample: numBytesOfEncryptedData offset doesn't match")
49*4d7e907cSAndroid Build Coastguard Worker 
50*4d7e907cSAndroid Build Coastguard Worker CHECK_SUBSAMPLE_DEF(DescramblerPlugin);
51*4d7e907cSAndroid Build Coastguard Worker CHECK_SUBSAMPLE_DEF(CryptoPlugin);
52*4d7e907cSAndroid Build Coastguard Worker 
DescramblerImpl(const sp<SharedLibrary> & library,DescramblerPlugin * plugin)53*4d7e907cSAndroid Build Coastguard Worker DescramblerImpl::DescramblerImpl(
54*4d7e907cSAndroid Build Coastguard Worker         const sp<SharedLibrary>& library, DescramblerPlugin *plugin) :
55*4d7e907cSAndroid Build Coastguard Worker         mLibrary(library), mPluginHolder(plugin) {
56*4d7e907cSAndroid Build Coastguard Worker     ALOGV("CTOR: plugin=%p", mPluginHolder.get());
57*4d7e907cSAndroid Build Coastguard Worker }
58*4d7e907cSAndroid Build Coastguard Worker 
~DescramblerImpl()59*4d7e907cSAndroid Build Coastguard Worker DescramblerImpl::~DescramblerImpl() {
60*4d7e907cSAndroid Build Coastguard Worker     ALOGV("DTOR: plugin=%p", mPluginHolder.get());
61*4d7e907cSAndroid Build Coastguard Worker     release();
62*4d7e907cSAndroid Build Coastguard Worker }
63*4d7e907cSAndroid Build Coastguard Worker 
setMediaCasSession(const HidlCasSessionId & sessionId)64*4d7e907cSAndroid Build Coastguard Worker Return<Status> DescramblerImpl::setMediaCasSession(const HidlCasSessionId& sessionId) {
65*4d7e907cSAndroid Build Coastguard Worker     ALOGV("%s: sessionId=%s", __FUNCTION__, sessionIdToString(sessionId).c_str());
66*4d7e907cSAndroid Build Coastguard Worker 
67*4d7e907cSAndroid Build Coastguard Worker     std::shared_ptr<DescramblerPlugin> holder = std::atomic_load(&mPluginHolder);
68*4d7e907cSAndroid Build Coastguard Worker     if (holder.get() == nullptr) {
69*4d7e907cSAndroid Build Coastguard Worker         return toStatus(INVALID_OPERATION);
70*4d7e907cSAndroid Build Coastguard Worker     }
71*4d7e907cSAndroid Build Coastguard Worker 
72*4d7e907cSAndroid Build Coastguard Worker     return toStatus(holder->setMediaCasSession(sessionId));
73*4d7e907cSAndroid Build Coastguard Worker }
74*4d7e907cSAndroid Build Coastguard Worker 
requiresSecureDecoderComponent(const hidl_string & mime)75*4d7e907cSAndroid Build Coastguard Worker Return<bool> DescramblerImpl::requiresSecureDecoderComponent(
76*4d7e907cSAndroid Build Coastguard Worker         const hidl_string& mime) {
77*4d7e907cSAndroid Build Coastguard Worker     std::shared_ptr<DescramblerPlugin> holder = std::atomic_load(&mPluginHolder);
78*4d7e907cSAndroid Build Coastguard Worker     if (holder.get() == nullptr) {
79*4d7e907cSAndroid Build Coastguard Worker         return false;
80*4d7e907cSAndroid Build Coastguard Worker     }
81*4d7e907cSAndroid Build Coastguard Worker 
82*4d7e907cSAndroid Build Coastguard Worker     return holder->requiresSecureDecoderComponent(mime.c_str());
83*4d7e907cSAndroid Build Coastguard Worker }
84*4d7e907cSAndroid Build Coastguard Worker 
validateRangeForSize(uint64_t offset,uint64_t length,uint64_t size)85*4d7e907cSAndroid Build Coastguard Worker static inline bool validateRangeForSize(
86*4d7e907cSAndroid Build Coastguard Worker         uint64_t offset, uint64_t length, uint64_t size) {
87*4d7e907cSAndroid Build Coastguard Worker     return isInRange<uint64_t, uint64_t>(0, size, offset, length);
88*4d7e907cSAndroid Build Coastguard Worker }
89*4d7e907cSAndroid Build Coastguard Worker 
descramble(ScramblingControl scramblingControl,const hidl_vec<SubSample> & subSamples,const SharedBuffer & srcBuffer,uint64_t srcOffset,const DestinationBuffer & dstBuffer,uint64_t dstOffset,descramble_cb _hidl_cb)90*4d7e907cSAndroid Build Coastguard Worker Return<void> DescramblerImpl::descramble(
91*4d7e907cSAndroid Build Coastguard Worker         ScramblingControl scramblingControl,
92*4d7e907cSAndroid Build Coastguard Worker         const hidl_vec<SubSample>& subSamples,
93*4d7e907cSAndroid Build Coastguard Worker         const SharedBuffer& srcBuffer,
94*4d7e907cSAndroid Build Coastguard Worker         uint64_t srcOffset,
95*4d7e907cSAndroid Build Coastguard Worker         const DestinationBuffer& dstBuffer,
96*4d7e907cSAndroid Build Coastguard Worker         uint64_t dstOffset,
97*4d7e907cSAndroid Build Coastguard Worker         descramble_cb _hidl_cb) {
98*4d7e907cSAndroid Build Coastguard Worker     ALOGV("%s", __FUNCTION__);
99*4d7e907cSAndroid Build Coastguard Worker 
100*4d7e907cSAndroid Build Coastguard Worker     // hidl_memory's size is stored in uint64_t, but mapMemory's mmap will map
101*4d7e907cSAndroid Build Coastguard Worker     // size in size_t. If size is over SIZE_MAX, mapMemory mapMemory could succeed
102*4d7e907cSAndroid Build Coastguard Worker     // but the mapped memory's actual size will be smaller than the reported size.
103*4d7e907cSAndroid Build Coastguard Worker     if (srcBuffer.heapBase.size() > SIZE_MAX) {
104*4d7e907cSAndroid Build Coastguard Worker         ALOGE("Invalid hidl_memory size: %" PRIu64 "", srcBuffer.heapBase.size());
105*4d7e907cSAndroid Build Coastguard Worker         android_errorWriteLog(0x534e4554, "79376389");
106*4d7e907cSAndroid Build Coastguard Worker         _hidl_cb(toStatus(BAD_VALUE), 0, NULL);
107*4d7e907cSAndroid Build Coastguard Worker         return Void();
108*4d7e907cSAndroid Build Coastguard Worker     }
109*4d7e907cSAndroid Build Coastguard Worker 
110*4d7e907cSAndroid Build Coastguard Worker     sp<IMemory> srcMem = mapMemory(srcBuffer.heapBase);
111*4d7e907cSAndroid Build Coastguard Worker 
112*4d7e907cSAndroid Build Coastguard Worker     // Validate if the offset and size in the SharedBuffer is consistent with the
113*4d7e907cSAndroid Build Coastguard Worker     // mapped ashmem, since the offset and size is controlled by client.
114*4d7e907cSAndroid Build Coastguard Worker     if (srcMem == NULL) {
115*4d7e907cSAndroid Build Coastguard Worker         ALOGE("Failed to map src buffer.");
116*4d7e907cSAndroid Build Coastguard Worker         _hidl_cb(toStatus(BAD_VALUE), 0, NULL);
117*4d7e907cSAndroid Build Coastguard Worker         return Void();
118*4d7e907cSAndroid Build Coastguard Worker     }
119*4d7e907cSAndroid Build Coastguard Worker     if (!validateRangeForSize(
120*4d7e907cSAndroid Build Coastguard Worker             srcBuffer.offset, srcBuffer.size, (uint64_t)srcMem->getSize())) {
121*4d7e907cSAndroid Build Coastguard Worker         ALOGE("Invalid src buffer range: offset %" PRIu64 ", size %" PRIu64 ", srcMem"
122*4d7e907cSAndroid Build Coastguard Worker               "size %" PRIu64 "", srcBuffer.offset, srcBuffer.size, (uint64_t)srcMem->getSize());
123*4d7e907cSAndroid Build Coastguard Worker         android_errorWriteLog(0x534e4554, "67962232");
124*4d7e907cSAndroid Build Coastguard Worker         _hidl_cb(toStatus(BAD_VALUE), 0, NULL);
125*4d7e907cSAndroid Build Coastguard Worker         return Void();
126*4d7e907cSAndroid Build Coastguard Worker     }
127*4d7e907cSAndroid Build Coastguard Worker 
128*4d7e907cSAndroid Build Coastguard Worker     // use 64-bit here to catch bad subsample size that might be overflowing.
129*4d7e907cSAndroid Build Coastguard Worker     uint64_t totalBytesInSubSamples = 0;
130*4d7e907cSAndroid Build Coastguard Worker     for (size_t i = 0; i < subSamples.size(); i++) {
131*4d7e907cSAndroid Build Coastguard Worker         totalBytesInSubSamples += (uint64_t)subSamples[i].numBytesOfClearData +
132*4d7e907cSAndroid Build Coastguard Worker                 subSamples[i].numBytesOfEncryptedData;
133*4d7e907cSAndroid Build Coastguard Worker     }
134*4d7e907cSAndroid Build Coastguard Worker     // Further validate if the specified srcOffset and requested total subsample size
135*4d7e907cSAndroid Build Coastguard Worker     // is consistent with the source shared buffer size.
136*4d7e907cSAndroid Build Coastguard Worker     if (!validateRangeForSize(srcOffset, totalBytesInSubSamples, srcBuffer.size)) {
137*4d7e907cSAndroid Build Coastguard Worker         ALOGE("Invalid srcOffset and subsample size: "
138*4d7e907cSAndroid Build Coastguard Worker                 "srcOffset %" PRIu64 ", totalBytesInSubSamples %" PRIu64 ", srcBuffer"
139*4d7e907cSAndroid Build Coastguard Worker                 "size %" PRIu64 "", srcOffset, totalBytesInSubSamples, srcBuffer.size);
140*4d7e907cSAndroid Build Coastguard Worker         android_errorWriteLog(0x534e4554, "67962232");
141*4d7e907cSAndroid Build Coastguard Worker         _hidl_cb(toStatus(BAD_VALUE), 0, NULL);
142*4d7e907cSAndroid Build Coastguard Worker         return Void();
143*4d7e907cSAndroid Build Coastguard Worker     }
144*4d7e907cSAndroid Build Coastguard Worker 
145*4d7e907cSAndroid Build Coastguard Worker     void *srcPtr = (uint8_t *)(void *)srcMem->getPointer() + srcBuffer.offset;
146*4d7e907cSAndroid Build Coastguard Worker     void *dstPtr = NULL;
147*4d7e907cSAndroid Build Coastguard Worker     if (dstBuffer.type == BufferType::SHARED_MEMORY) {
148*4d7e907cSAndroid Build Coastguard Worker         // When using shared memory, src buffer is also used as dst,
149*4d7e907cSAndroid Build Coastguard Worker         // we don't map it again here.
150*4d7e907cSAndroid Build Coastguard Worker         dstPtr = srcPtr;
151*4d7e907cSAndroid Build Coastguard Worker 
152*4d7e907cSAndroid Build Coastguard Worker         // In this case the dst and src would be the same buffer, need to validate
153*4d7e907cSAndroid Build Coastguard Worker         // dstOffset against the buffer size too.
154*4d7e907cSAndroid Build Coastguard Worker         if (!validateRangeForSize(dstOffset, totalBytesInSubSamples, srcBuffer.size)) {
155*4d7e907cSAndroid Build Coastguard Worker             ALOGE("Invalid dstOffset and subsample size: "
156*4d7e907cSAndroid Build Coastguard Worker                     "dstOffset %" PRIu64 ", totalBytesInSubSamples %" PRIu64 ", srcBuffer"
157*4d7e907cSAndroid Build Coastguard Worker                     "size %" PRIu64 "", dstOffset, totalBytesInSubSamples, srcBuffer.size);
158*4d7e907cSAndroid Build Coastguard Worker             android_errorWriteLog(0x534e4554, "67962232");
159*4d7e907cSAndroid Build Coastguard Worker             _hidl_cb(toStatus(BAD_VALUE), 0, NULL);
160*4d7e907cSAndroid Build Coastguard Worker             return Void();
161*4d7e907cSAndroid Build Coastguard Worker         }
162*4d7e907cSAndroid Build Coastguard Worker     } else {
163*4d7e907cSAndroid Build Coastguard Worker         native_handle_t *handle = const_cast<native_handle_t *>(
164*4d7e907cSAndroid Build Coastguard Worker                 dstBuffer.secureMemory.getNativeHandle());
165*4d7e907cSAndroid Build Coastguard Worker         dstPtr = static_cast<void *>(handle);
166*4d7e907cSAndroid Build Coastguard Worker     }
167*4d7e907cSAndroid Build Coastguard Worker 
168*4d7e907cSAndroid Build Coastguard Worker     // Get a local copy of the shared_ptr for the plugin. Note that before
169*4d7e907cSAndroid Build Coastguard Worker     // calling the HIDL callback, this shared_ptr must be manually reset,
170*4d7e907cSAndroid Build Coastguard Worker     // since the client side could proceed as soon as the callback is called
171*4d7e907cSAndroid Build Coastguard Worker     // without waiting for this method to go out of scope.
172*4d7e907cSAndroid Build Coastguard Worker     std::shared_ptr<DescramblerPlugin> holder = std::atomic_load(&mPluginHolder);
173*4d7e907cSAndroid Build Coastguard Worker     if (holder.get() == nullptr) {
174*4d7e907cSAndroid Build Coastguard Worker         _hidl_cb(toStatus(INVALID_OPERATION), 0, NULL);
175*4d7e907cSAndroid Build Coastguard Worker         return Void();
176*4d7e907cSAndroid Build Coastguard Worker     }
177*4d7e907cSAndroid Build Coastguard Worker 
178*4d7e907cSAndroid Build Coastguard Worker     // Casting hidl SubSample to DescramblerPlugin::SubSample, but need
179*4d7e907cSAndroid Build Coastguard Worker     // to ensure structs are actually idential
180*4d7e907cSAndroid Build Coastguard Worker 
181*4d7e907cSAndroid Build Coastguard Worker     AString detailedError;
182*4d7e907cSAndroid Build Coastguard Worker     int32_t result = holder->descramble(
183*4d7e907cSAndroid Build Coastguard Worker             dstBuffer.type != BufferType::SHARED_MEMORY,
184*4d7e907cSAndroid Build Coastguard Worker             (DescramblerPlugin::ScramblingControl)scramblingControl,
185*4d7e907cSAndroid Build Coastguard Worker             subSamples.size(),
186*4d7e907cSAndroid Build Coastguard Worker             (DescramblerPlugin::SubSample*)subSamples.data(),
187*4d7e907cSAndroid Build Coastguard Worker             srcPtr,
188*4d7e907cSAndroid Build Coastguard Worker             srcOffset,
189*4d7e907cSAndroid Build Coastguard Worker             dstPtr,
190*4d7e907cSAndroid Build Coastguard Worker             dstOffset,
191*4d7e907cSAndroid Build Coastguard Worker             &detailedError);
192*4d7e907cSAndroid Build Coastguard Worker 
193*4d7e907cSAndroid Build Coastguard Worker     holder.reset();
194*4d7e907cSAndroid Build Coastguard Worker     _hidl_cb(toStatus(result >= 0 ? OK : result), result, detailedError.c_str());
195*4d7e907cSAndroid Build Coastguard Worker     return Void();
196*4d7e907cSAndroid Build Coastguard Worker }
197*4d7e907cSAndroid Build Coastguard Worker 
release()198*4d7e907cSAndroid Build Coastguard Worker Return<Status> DescramblerImpl::release() {
199*4d7e907cSAndroid Build Coastguard Worker     ALOGV("%s: plugin=%p", __FUNCTION__, mPluginHolder.get());
200*4d7e907cSAndroid Build Coastguard Worker 
201*4d7e907cSAndroid Build Coastguard Worker     std::shared_ptr<DescramblerPlugin> holder(nullptr);
202*4d7e907cSAndroid Build Coastguard Worker     std::atomic_store(&mPluginHolder, holder);
203*4d7e907cSAndroid Build Coastguard Worker 
204*4d7e907cSAndroid Build Coastguard Worker     return Status::OK;
205*4d7e907cSAndroid Build Coastguard Worker }
206*4d7e907cSAndroid Build Coastguard Worker 
207*4d7e907cSAndroid Build Coastguard Worker } // namespace implementation
208*4d7e907cSAndroid Build Coastguard Worker } // namespace V1_0
209*4d7e907cSAndroid Build Coastguard Worker } // namespace cas
210*4d7e907cSAndroid Build Coastguard Worker } // namespace hardware
211*4d7e907cSAndroid Build Coastguard Worker } // namespace android
212