/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ /* vim: set ts=8 sts=2 et sw=2 tw=80: */ /* This Source Code Form is subject to the terms of the Mozilla Public * License, v. 2.0. If a copy of the MPL was not distributed with this * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ #ifndef mozilla_glue_WindowsDllServices_h #define mozilla_glue_WindowsDllServices_h #include "mozilla/Assertions.h" #include "mozilla/Authenticode.h" #include "mozilla/LoaderAPIInterfaces.h" #include "mozilla/mozalloc.h" #include "mozilla/UniquePtr.h" #include "mozilla/Vector.h" #include "mozilla/WindowsDllBlocklist.h" #if defined(MOZILLA_INTERNAL_API) # include "MainThreadUtils.h" # include "mozilla/SystemGroup.h" # include "nsISupportsImpl.h" # include "nsString.h" # include "nsThreadUtils.h" # include "prthread.h" #endif // defined(MOZILLA_INTERNAL_API) // For PCUNICODE_STRING #include namespace mozilla { namespace glue { namespace detail { class DllServicesBase : public Authenticode { public: /** * WARNING: This method is called from within an unsafe context that holds * multiple locks inside the Windows loader. The only thing that * this function should be used for is dispatching the event to our * event loop so that it may be handled in a safe context. */ virtual void DispatchDllLoadNotification(ModuleLoadInfo&& aModLoadInfo) = 0; /** * This function accepts module load events to be processed later for * the untrusted modules telemetry ping. * * WARNING: This method is run from within the Windows loader and should * only perform trivial, loader-friendly operations. */ virtual void DispatchModuleLoadBacklogNotification( ModuleLoadInfoVec&& aEvents) = 0; void SetAuthenticodeImpl(Authenticode* aAuthenticode) { mAuthenticode = aAuthenticode; } // In debug builds we override GetBinaryOrgName to add a Gecko-specific // assertion. OTOH, we normally do not want people overriding this function, // so we'll make it final in the release case, thus covering all bases. #if defined(DEBUG) UniquePtr GetBinaryOrgName( const wchar_t* aFilePath, AuthenticodeFlags aFlags = AuthenticodeFlags::Default) override #else UniquePtr GetBinaryOrgName( const wchar_t* aFilePath, AuthenticodeFlags aFlags = AuthenticodeFlags::Default) final #endif // defined(DEBUG) { if (!mAuthenticode) { return nullptr; } return mAuthenticode->GetBinaryOrgName(aFilePath, aFlags); } void DisableFull() { DllBlocklist_SetFullDllServices(nullptr); } DllServicesBase(const DllServicesBase&) = delete; DllServicesBase(DllServicesBase&&) = delete; DllServicesBase& operator=(const DllServicesBase&) = delete; DllServicesBase& operator=(DllServicesBase&&) = delete; protected: DllServicesBase() : mAuthenticode(nullptr) {} virtual ~DllServicesBase() = default; void EnableFull() { DllBlocklist_SetFullDllServices(this); } void EnableBasic() { DllBlocklist_SetBasicDllServices(this); } private: Authenticode* mAuthenticode; }; } // namespace detail #if defined(MOZILLA_INTERNAL_API) struct EnhancedModuleLoadInfo final { explicit EnhancedModuleLoadInfo(ModuleLoadInfo&& aModLoadInfo) : mNtLoadInfo(std::move(aModLoadInfo)) { // Only populate mThreadName when we're on the same thread as the event if (mNtLoadInfo.mThreadId == ::GetCurrentThreadId()) { mThreadName = PR_GetThreadName(PR_GetCurrentThread()); } MOZ_ASSERT(!mNtLoadInfo.mSectionName.IsEmpty()); } EnhancedModuleLoadInfo(EnhancedModuleLoadInfo&&) = default; EnhancedModuleLoadInfo& operator=(EnhancedModuleLoadInfo&&) = default; EnhancedModuleLoadInfo(const EnhancedModuleLoadInfo&) = delete; EnhancedModuleLoadInfo& operator=(const EnhancedModuleLoadInfo&) = delete; nsDependentString GetSectionName() const { return mNtLoadInfo.mSectionName.AsString(); } using BacktraceType = decltype(ModuleLoadInfo::mBacktrace); ModuleLoadInfo mNtLoadInfo; nsCString mThreadName; }; class DllServices : public detail::DllServicesBase { public: void DispatchDllLoadNotification(ModuleLoadInfo&& aModLoadInfo) final { nsCOMPtr runnable( NewRunnableMethod>( "DllServices::NotifyDllLoad", this, &DllServices::NotifyDllLoad, std::move(aModLoadInfo))); SystemGroup::Dispatch(TaskCategory::Other, runnable.forget()); } void DispatchModuleLoadBacklogNotification( ModuleLoadInfoVec&& aEvents) final { nsCOMPtr runnable( NewRunnableMethod>( "DllServices::NotifyModuleLoadBacklog", this, &DllServices::NotifyModuleLoadBacklog, std::move(aEvents))); SystemGroup::Dispatch(TaskCategory::Other, runnable.forget()); } # if defined(DEBUG) UniquePtr GetBinaryOrgName( const wchar_t* aFilePath, AuthenticodeFlags aFlags = AuthenticodeFlags::Default) final { // This function may perform disk I/O, so we should never call it on the // main thread. MOZ_ASSERT(!NS_IsMainThread()); return detail::DllServicesBase::GetBinaryOrgName(aFilePath, aFlags); } # endif // defined(DEBUG) NS_INLINE_DECL_THREADSAFE_VIRTUAL_REFCOUNTING(DllServices) protected: DllServices() = default; ~DllServices() = default; virtual void NotifyDllLoad(EnhancedModuleLoadInfo&& aModLoadInfo) = 0; virtual void NotifyModuleLoadBacklog(ModuleLoadInfoVec&& aEvents) = 0; }; #else class BasicDllServices final : public detail::DllServicesBase { public: BasicDllServices() { EnableBasic(); } ~BasicDllServices() = default; // Not useful in this class, so provide a default implementation virtual void DispatchDllLoadNotification( ModuleLoadInfo&& aModLoadInfo) override {} virtual void DispatchModuleLoadBacklogNotification( ModuleLoadInfoVec&& aEvents) override {} }; #endif // defined(MOZILLA_INTERNAL_API) } // namespace glue } // namespace mozilla #endif // mozilla_glue_WindowsDllServices_h