/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- * vim: sw=4 ts=4 et : * This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #include "GMPLoader.h" #include #include "mozilla/Attributes.h" #include "mozilla/NullPtr.h" #include "gmp-entrypoints.h" #include "prlink.h" #include #if defined(XP_WIN) && defined(MOZ_SANDBOX) #include "mozilla/sandboxTarget.h" #include "windows.h" #include #include #endif #if defined(HASH_NODE_ID_WITH_DEVICE_ID) // In order to provide EME plugins with a "device binding" capability, // in the parent we generate and store some random bytes as salt for every // (origin, urlBarOrigin) pair that uses EME. We store these bytes so // that every time we revisit the same origin we get the same salt. // We send this salt to the child on startup. The child collects some // device specific data and munges that with the salt to create the // "node id" that we expose to EME plugins. It then overwrites the device // specific data, and activates the sandbox. #include "rlz/lib/machine_id.h" #include "rlz/lib/string_utils.h" #include "sha256.h" #endif namespace mozilla { namespace gmp { class GMPLoaderImpl : public GMPLoader { public: explicit GMPLoaderImpl(SandboxStarter* aStarter) : mSandboxStarter(aStarter) {} virtual ~GMPLoaderImpl() {} virtual bool Load(const char* aLibPath, uint32_t aLibPathLen, char* aOriginSalt, uint32_t aOriginSaltLen, const GMPPlatformAPI* aPlatformAPI) MOZ_OVERRIDE; virtual GMPErr GetAPI(const char* aAPIName, void* aHostAPI, void** aPluginAPI) MOZ_OVERRIDE; virtual void Shutdown() MOZ_OVERRIDE; #ifdef SANDBOX_NOT_STATICALLY_LINKED_INTO_PLUGIN_CONTAINER virtual void SetStartSandboxStarter(SandboxStarter* aStarter) MOZ_OVERRIDE { mSandboxStarter = aStarter; } #endif private: PRLibrary* mLib; GMPGetAPIFunc mGetAPIFunc; SandboxStarter* mSandboxStarter; }; GMPLoader* CreateGMPLoader(SandboxStarter* aStarter) { return static_cast(new GMPLoaderImpl(aStarter)); } #if defined(XP_WIN) && defined(HASH_NODE_ID_WITH_DEVICE_ID) MOZ_NEVER_INLINE static bool GetStackAfterCurrentFrame(uint8_t** aOutTop, uint8_t** aOutBottom) { // "Top" of the free space on the stack is directly after the memory // holding our return address. uint8_t* top = (uint8_t*)_AddressOfReturnAddress(); // Look down the stack until we find the guard page... MEMORY_BASIC_INFORMATION memInfo = {0}; uint8_t* bottom = top; while (1) { if (!VirtualQuery(bottom, &memInfo, sizeof(memInfo))) { return false; } if ((memInfo.Protect & PAGE_GUARD) == PAGE_GUARD) { bottom = (uint8_t*)memInfo.BaseAddress + memInfo.RegionSize; #ifdef DEBUG if (!VirtualQuery(bottom, &memInfo, sizeof(memInfo))) { return false; } assert(!(memInfo.Protect & PAGE_GUARD)); // Should have found boundary. #endif break; } else if (memInfo.State != MEM_COMMIT || (memInfo.AllocationProtect & PAGE_READWRITE) != PAGE_READWRITE) { return false; } bottom = (uint8_t*)memInfo.BaseAddress - 1; } *aOutTop = top; *aOutBottom = bottom; return true; } #endif bool GMPLoaderImpl::Load(const char* aLibPath, uint32_t aLibPathLen, char* aOriginSalt, uint32_t aOriginSaltLen, const GMPPlatformAPI* aPlatformAPI) { std::string nodeId; #ifdef HASH_NODE_ID_WITH_DEVICE_ID if (aOriginSaltLen > 0) { string16 deviceId; int volumeId; if (!rlz_lib::GetRawMachineId(&deviceId, &volumeId)) { return false; } SHA256Context ctx; SHA256_Begin(&ctx); SHA256_Update(&ctx, (const uint8_t*)aOriginSalt, aOriginSaltLen); SHA256_Update(&ctx, (const uint8_t*)deviceId.c_str(), deviceId.size() * sizeof(string16::value_type)); SHA256_Update(&ctx, (const uint8_t*)&volumeId, sizeof(int)); uint8_t digest[SHA256_LENGTH] = {0}; unsigned int digestLen = 0; SHA256_End(&ctx, digest, &digestLen, SHA256_LENGTH); // Overwrite all data involved in calculation as it could potentially // identify the user, so there's no chance a GMP can read it and use // it for identity tracking. memset(&ctx, 0, sizeof(ctx)); memset(aOriginSalt, 0, aOriginSaltLen); volumeId = 0; memset(&deviceId[0], '*', sizeof(string16::value_type) * deviceId.size()); deviceId = L""; if (!rlz_lib::BytesToString(digest, SHA256_LENGTH, &nodeId)) { return false; } // We've successfully bound the origin salt to node id. // rlz_lib::GetRawMachineId and/or the system functions it // called could have left user identifiable data on the stack, // so carefully zero the stack down to the guard page. uint8_t* top; uint8_t* bottom; if (!GetStackAfterCurrentFrame(&top, &bottom)) { return false; } assert(top >= bottom); SecureZeroMemory(bottom, (top - bottom)); } else #endif { nodeId = std::string(aOriginSalt, aOriginSalt + aOriginSaltLen); } // Start the sandbox now that we've generated the device bound node id. // This must happen after the node id is bound to the device id, as // generating the device id requires privileges. if (mSandboxStarter) { mSandboxStarter->Start(aLibPath); } // Load the GMP. PRLibSpec libSpec; libSpec.value.pathname = aLibPath; libSpec.type = PR_LibSpec_Pathname; mLib = PR_LoadLibraryWithFlags(libSpec, 0); if (!mLib) { return false; } GMPInitFunc initFunc = reinterpret_cast(PR_FindFunctionSymbol(mLib, "GMPInit")); if (!initFunc) { return false; } if (initFunc(aPlatformAPI) != GMPNoErr) { return false; } GMPSetNodeIdFunc setNodeIdFunc = reinterpret_cast(PR_FindFunctionSymbol(mLib, "GMPSetNodeId")); if (setNodeIdFunc) { setNodeIdFunc(nodeId.c_str(), nodeId.size()); } mGetAPIFunc = reinterpret_cast(PR_FindFunctionSymbol(mLib, "GMPGetAPI")); if (!mGetAPIFunc) { return false; } return true; } GMPErr GMPLoaderImpl::GetAPI(const char* aAPIName, void* aHostAPI, void** aPluginAPI) { return mGetAPIFunc ? mGetAPIFunc(aAPIName, aHostAPI, aPluginAPI) : GMPGenericErr; } void GMPLoaderImpl::Shutdown() { if (mLib) { GMPShutdownFunc shutdownFunc = reinterpret_cast(PR_FindFunctionSymbol(mLib, "GMPShutdown")); if (shutdownFunc) { shutdownFunc(); } PR_UnloadLibrary(mLib); mLib = nullptr; } } } // namespace gmp } // namespace mozilla