2004-01-19 19:16:10 +00:00
|
|
|
/*
|
|
|
|
* native ebml reader for the Matroska demuxer
|
2010-01-24 22:55:11 +00:00
|
|
|
* new parser copyright (c) 2010 Uoti Urpala
|
2009-05-08 21:51:13 +00:00
|
|
|
* copyright (c) 2004 Aurelien Jacobs <aurel@gnuage.org>
|
|
|
|
* based on the one written by Ronald Bultje for gstreamer
|
|
|
|
*
|
2015-04-13 07:36:54 +00:00
|
|
|
* This file is part of mpv.
|
2009-05-08 21:51:13 +00:00
|
|
|
*
|
2017-04-21 11:31:12 +00:00
|
|
|
* mpv is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
2009-05-08 21:51:13 +00:00
|
|
|
*
|
2015-04-13 07:36:54 +00:00
|
|
|
* mpv is distributed in the hope that it will be useful,
|
2009-05-08 21:51:13 +00:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
2017-04-21 11:31:12 +00:00
|
|
|
* GNU Lesser General Public License for more details.
|
2009-05-08 21:51:13 +00:00
|
|
|
*
|
2017-04-21 11:31:12 +00:00
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with mpv. If not, see <http://www.gnu.org/licenses/>.
|
2004-01-19 19:16:10 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
2010-01-24 22:55:11 +00:00
|
|
|
#include <stdbool.h>
|
|
|
|
#include <inttypes.h>
|
|
|
|
#include <stddef.h>
|
|
|
|
#include <assert.h>
|
|
|
|
|
2012-01-28 11:41:36 +00:00
|
|
|
#include <libavutil/intfloat.h>
|
2010-01-24 22:55:11 +00:00
|
|
|
#include <libavutil/common.h>
|
2016-01-11 18:03:40 +00:00
|
|
|
#include "mpv_talloc.h"
|
2004-01-19 19:16:10 +00:00
|
|
|
#include "ebml.h"
|
2010-01-24 22:55:11 +00:00
|
|
|
#include "stream/stream.h"
|
2013-12-17 01:39:45 +00:00
|
|
|
#include "common/msg.h"
|
2004-01-19 19:16:10 +00:00
|
|
|
|
2014-01-14 16:38:21 +00:00
|
|
|
// Whether the id is a known Matroska level 1 element (allowed as element on
|
|
|
|
// global file level, after the level 0 MATROSKA_ID_SEGMENT).
|
|
|
|
// This (intentionally) doesn't include "global" elements.
|
|
|
|
bool ebml_is_mkv_level1_id(uint32_t id)
|
|
|
|
{
|
|
|
|
switch (id) {
|
|
|
|
case MATROSKA_ID_SEEKHEAD:
|
|
|
|
case MATROSKA_ID_INFO:
|
|
|
|
case MATROSKA_ID_CLUSTER:
|
|
|
|
case MATROSKA_ID_TRACKS:
|
|
|
|
case MATROSKA_ID_CUES:
|
|
|
|
case MATROSKA_ID_ATTACHMENTS:
|
|
|
|
case MATROSKA_ID_CHAPTERS:
|
|
|
|
case MATROSKA_ID_TAGS:
|
|
|
|
return true;
|
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-01-19 19:16:10 +00:00
|
|
|
/*
|
|
|
|
* Read: the element content data ID.
|
|
|
|
* Return: the ID.
|
|
|
|
*/
|
2014-01-14 16:38:51 +00:00
|
|
|
uint32_t ebml_read_id(stream_t *s)
|
2004-01-19 19:16:10 +00:00
|
|
|
{
|
2009-12-29 19:06:21 +00:00
|
|
|
int i, len_mask = 0x80;
|
|
|
|
uint32_t id;
|
|
|
|
|
|
|
|
for (i = 0, id = stream_read_char(s); i < 4 && !(id & len_mask); i++)
|
|
|
|
len_mask >>= 1;
|
|
|
|
if (i >= 4)
|
|
|
|
return EBML_ID_INVALID;
|
|
|
|
while (i--)
|
|
|
|
id = (id << 8) | stream_read_char(s);
|
|
|
|
return id;
|
2004-01-19 19:16:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2017-11-05 15:36:18 +00:00
|
|
|
* Read: element content length.
|
2004-01-19 19:16:10 +00:00
|
|
|
*/
|
2017-11-05 15:36:18 +00:00
|
|
|
uint64_t ebml_read_length(stream_t *s)
|
2004-01-19 19:16:10 +00:00
|
|
|
{
|
2009-12-29 19:06:21 +00:00
|
|
|
int i, j, num_ffs = 0, len_mask = 0x80;
|
2017-11-05 15:36:18 +00:00
|
|
|
uint64_t len;
|
2013-04-12 15:25:51 +00:00
|
|
|
|
2017-11-05 15:36:18 +00:00
|
|
|
for (i = 0, len = stream_read_char(s); i < 8 && !(len & len_mask); i++)
|
2009-12-29 19:06:21 +00:00
|
|
|
len_mask >>= 1;
|
|
|
|
if (i >= 8)
|
|
|
|
return EBML_UINT_INVALID;
|
|
|
|
j = i + 1;
|
2017-11-05 15:36:18 +00:00
|
|
|
if ((int) (len &= (len_mask - 1)) == len_mask - 1)
|
2004-01-19 19:16:10 +00:00
|
|
|
num_ffs++;
|
2017-11-05 15:36:18 +00:00
|
|
|
while (i--) {
|
|
|
|
len = (len << 8) | stream_read_char(s);
|
|
|
|
if ((len & 0xFF) == 0xFF)
|
2009-12-29 19:06:21 +00:00
|
|
|
num_ffs++;
|
2004-01-19 19:16:10 +00:00
|
|
|
}
|
2009-12-29 19:06:21 +00:00
|
|
|
if (j == num_ffs)
|
|
|
|
return EBML_UINT_INVALID;
|
2017-11-05 15:36:18 +00:00
|
|
|
if (len >= 1ULL<<63) // Can happen if stream_read_char returns EOF
|
|
|
|
return EBML_UINT_INVALID;
|
|
|
|
return len;
|
2004-01-19 19:16:10 +00:00
|
|
|
}
|
|
|
|
|
2017-11-05 15:36:18 +00:00
|
|
|
|
2004-01-19 19:16:10 +00:00
|
|
|
/*
|
|
|
|
* Read a variable length signed int.
|
|
|
|
*/
|
2017-11-05 15:36:18 +00:00
|
|
|
int64_t ebml_read_signed_length(stream_t *s)
|
2004-01-19 19:16:10 +00:00
|
|
|
{
|
2009-12-29 19:06:21 +00:00
|
|
|
uint64_t unum;
|
|
|
|
int l;
|
2004-01-19 19:16:10 +00:00
|
|
|
|
2009-12-29 19:06:21 +00:00
|
|
|
/* read as unsigned number first */
|
2017-11-05 15:36:18 +00:00
|
|
|
uint64_t offset = stream_tell(s);
|
|
|
|
unum = ebml_read_length(s);
|
2009-12-29 19:06:21 +00:00
|
|
|
if (unum == EBML_UINT_INVALID)
|
|
|
|
return EBML_INT_INVALID;
|
2017-11-05 15:36:18 +00:00
|
|
|
l = stream_tell(s) - offset;
|
2004-01-19 19:16:10 +00:00
|
|
|
|
2017-01-09 12:37:04 +00:00
|
|
|
return unum - ((1LL << ((7 * l) - 1)) - 1);
|
2004-01-19 19:16:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Read the next element as an unsigned int.
|
|
|
|
*/
|
2014-01-14 16:38:51 +00:00
|
|
|
uint64_t ebml_read_uint(stream_t *s)
|
2004-01-19 19:16:10 +00:00
|
|
|
{
|
2009-12-29 19:06:21 +00:00
|
|
|
uint64_t len, value = 0;
|
2004-01-19 19:16:10 +00:00
|
|
|
|
2014-01-14 16:38:51 +00:00
|
|
|
len = ebml_read_length(s);
|
2015-06-24 12:34:05 +00:00
|
|
|
if (len == EBML_UINT_INVALID || len > 8)
|
2009-12-29 19:06:21 +00:00
|
|
|
return EBML_UINT_INVALID;
|
2004-01-19 19:16:10 +00:00
|
|
|
|
2009-12-29 19:06:21 +00:00
|
|
|
while (len--)
|
|
|
|
value = (value << 8) | stream_read_char(s);
|
2004-01-19 19:16:10 +00:00
|
|
|
|
2009-12-29 19:06:21 +00:00
|
|
|
return value;
|
2004-01-19 19:16:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Read the next element as a signed int.
|
|
|
|
*/
|
2014-01-14 16:38:51 +00:00
|
|
|
int64_t ebml_read_int(stream_t *s)
|
2004-01-19 19:16:10 +00:00
|
|
|
{
|
2014-11-08 09:21:12 +00:00
|
|
|
uint64_t value = 0;
|
2009-12-29 19:06:21 +00:00
|
|
|
uint64_t len;
|
|
|
|
int l;
|
|
|
|
|
2014-01-14 16:38:51 +00:00
|
|
|
len = ebml_read_length(s);
|
2015-06-24 12:34:05 +00:00
|
|
|
if (len == EBML_UINT_INVALID || len > 8)
|
2009-12-29 19:06:21 +00:00
|
|
|
return EBML_INT_INVALID;
|
2015-06-24 12:34:05 +00:00
|
|
|
if (!len)
|
|
|
|
return 0;
|
2009-12-29 19:06:21 +00:00
|
|
|
|
|
|
|
len--;
|
|
|
|
l = stream_read_char(s);
|
|
|
|
if (l & 0x80)
|
|
|
|
value = -1;
|
|
|
|
value = (value << 8) | l;
|
|
|
|
while (len--)
|
|
|
|
value = (value << 8) | stream_read_char(s);
|
|
|
|
|
2014-11-08 09:21:12 +00:00
|
|
|
return (int64_t)value; // assume complement of 2
|
2004-01-19 19:16:10 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
demux_mkv: improve robustness against broken files
Fixes test7.mkv from the Matroska test file collection, as well as some
real broken files I've found in the wild. (Unfortunately, true recovery
requires resetting the decoders and playback state with a manual seek,
but it's still better than just exiting.)
If there are broken EBML elements, try harder to skip them correctly.
Do this by searching for the next cluster element. The cluster element
intentionally has a long ID, so it's a suitable element for
resynchronizing (mkvmerge does something similar).
We know that data is corrupt if the ID or length fields of an element
are malformed. Additionally, if skipping an unknown element goes past
the end of the file, we assume it's corrupt and undo the seek. Do this
because it often happens that corrupt data is interpreted as correct
EBML elements. Since these elements will have a ridiculous values in
their length fields due to the large value range that is possible
(0-2^56-2), they will go past the end of the file. So instead of
skipping them (which would result in playback termination), try to
find the next cluster instead. (We still skip unknown elements that
are within the file, as this is needed for correct operation. Also, we
first execute the seek, because we don't really know where the file
ends. Doing it this way is better for unseekable streams too, because
it will still work in the non-error case.)
This is done as special case in the packet reading function only. On
the other hand, that's the only part of the file that's read after
initialization is done.
2013-03-27 23:01:17 +00:00
|
|
|
* Skip the current element.
|
2014-01-14 16:38:21 +00:00
|
|
|
* end: the end of the parent element or -1 (for robust error handling)
|
2004-01-19 19:16:10 +00:00
|
|
|
*/
|
2014-01-14 16:38:21 +00:00
|
|
|
int ebml_read_skip(struct mp_log *log, int64_t end, stream_t *s)
|
2004-01-19 19:16:10 +00:00
|
|
|
{
|
2009-12-29 19:06:21 +00:00
|
|
|
uint64_t len;
|
2004-01-19 19:16:10 +00:00
|
|
|
|
2014-01-14 16:38:21 +00:00
|
|
|
int64_t pos = stream_tell(s);
|
|
|
|
|
2014-01-14 16:38:51 +00:00
|
|
|
len = ebml_read_length(s);
|
2009-12-29 19:06:21 +00:00
|
|
|
if (len == EBML_UINT_INVALID)
|
2014-01-14 16:38:21 +00:00
|
|
|
goto invalid;
|
|
|
|
|
|
|
|
int64_t pos2 = stream_tell(s);
|
|
|
|
if (len >= INT64_MAX - pos2 || (end > 0 && pos2 + len > end))
|
|
|
|
goto invalid;
|
2004-01-19 19:16:10 +00:00
|
|
|
|
2019-11-14 11:59:14 +00:00
|
|
|
if (!stream_seek_skip(s, pos2 + len))
|
2014-01-14 16:38:21 +00:00
|
|
|
goto invalid;
|
2004-01-19 19:16:10 +00:00
|
|
|
|
2009-12-29 19:06:21 +00:00
|
|
|
return 0;
|
2014-01-14 16:38:21 +00:00
|
|
|
|
|
|
|
invalid:
|
|
|
|
mp_err(log, "Invalid EBML length at position %"PRId64"\n", pos);
|
2019-11-14 11:59:14 +00:00
|
|
|
stream_seek_skip(s, pos);
|
2014-01-14 16:38:21 +00:00
|
|
|
return 1;
|
2004-01-19 19:16:10 +00:00
|
|
|
}
|
|
|
|
|
demux_mkv: improve robustness against broken files
Fixes test7.mkv from the Matroska test file collection, as well as some
real broken files I've found in the wild. (Unfortunately, true recovery
requires resetting the decoders and playback state with a manual seek,
but it's still better than just exiting.)
If there are broken EBML elements, try harder to skip them correctly.
Do this by searching for the next cluster element. The cluster element
intentionally has a long ID, so it's a suitable element for
resynchronizing (mkvmerge does something similar).
We know that data is corrupt if the ID or length fields of an element
are malformed. Additionally, if skipping an unknown element goes past
the end of the file, we assume it's corrupt and undo the seek. Do this
because it often happens that corrupt data is interpreted as correct
EBML elements. Since these elements will have a ridiculous values in
their length fields due to the large value range that is possible
(0-2^56-2), they will go past the end of the file. So instead of
skipping them (which would result in playback termination), try to
find the next cluster instead. (We still skip unknown elements that
are within the file, as this is needed for correct operation. Also, we
first execute the seek, because we don't really know where the file
ends. Doing it this way is better for unseekable streams too, because
it will still work in the non-error case.)
This is done as special case in the packet reading function only. On
the other hand, that's the only part of the file that's read after
initialization is done.
2013-03-27 23:01:17 +00:00
|
|
|
/*
|
|
|
|
* Skip to (probable) next cluster (MATROSKA_ID_CLUSTER) element start position.
|
|
|
|
*/
|
2013-12-21 19:24:20 +00:00
|
|
|
int ebml_resync_cluster(struct mp_log *log, stream_t *s)
|
demux_mkv: improve robustness against broken files
Fixes test7.mkv from the Matroska test file collection, as well as some
real broken files I've found in the wild. (Unfortunately, true recovery
requires resetting the decoders and playback state with a manual seek,
but it's still better than just exiting.)
If there are broken EBML elements, try harder to skip them correctly.
Do this by searching for the next cluster element. The cluster element
intentionally has a long ID, so it's a suitable element for
resynchronizing (mkvmerge does something similar).
We know that data is corrupt if the ID or length fields of an element
are malformed. Additionally, if skipping an unknown element goes past
the end of the file, we assume it's corrupt and undo the seek. Do this
because it often happens that corrupt data is interpreted as correct
EBML elements. Since these elements will have a ridiculous values in
their length fields due to the large value range that is possible
(0-2^56-2), they will go past the end of the file. So instead of
skipping them (which would result in playback termination), try to
find the next cluster instead. (We still skip unknown elements that
are within the file, as this is needed for correct operation. Also, we
first execute the seek, because we don't really know where the file
ends. Doing it this way is better for unseekable streams too, because
it will still work in the non-error case.)
This is done as special case in the packet reading function only. On
the other hand, that's the only part of the file that's read after
initialization is done.
2013-03-27 23:01:17 +00:00
|
|
|
{
|
|
|
|
int64_t pos = stream_tell(s);
|
|
|
|
uint32_t last_4_bytes = 0;
|
2019-11-14 11:59:14 +00:00
|
|
|
stream_read_peek(s, &(char){0}, 1);
|
2015-03-09 21:33:53 +00:00
|
|
|
if (!s->eof) {
|
|
|
|
mp_err(log, "Corrupt file detected. "
|
|
|
|
"Trying to resync starting from position %"PRId64"...\n", pos);
|
|
|
|
}
|
demux_mkv: improve robustness against broken files
Fixes test7.mkv from the Matroska test file collection, as well as some
real broken files I've found in the wild. (Unfortunately, true recovery
requires resetting the decoders and playback state with a manual seek,
but it's still better than just exiting.)
If there are broken EBML elements, try harder to skip them correctly.
Do this by searching for the next cluster element. The cluster element
intentionally has a long ID, so it's a suitable element for
resynchronizing (mkvmerge does something similar).
We know that data is corrupt if the ID or length fields of an element
are malformed. Additionally, if skipping an unknown element goes past
the end of the file, we assume it's corrupt and undo the seek. Do this
because it often happens that corrupt data is interpreted as correct
EBML elements. Since these elements will have a ridiculous values in
their length fields due to the large value range that is possible
(0-2^56-2), they will go past the end of the file. So instead of
skipping them (which would result in playback termination), try to
find the next cluster instead. (We still skip unknown elements that
are within the file, as this is needed for correct operation. Also, we
first execute the seek, because we don't really know where the file
ends. Doing it this way is better for unseekable streams too, because
it will still work in the non-error case.)
This is done as special case in the packet reading function only. On
the other hand, that's the only part of the file that's read after
initialization is done.
2013-03-27 23:01:17 +00:00
|
|
|
while (!s->eof) {
|
|
|
|
// Assumes MATROSKA_ID_CLUSTER is 4 bytes, with no 0 bytes.
|
|
|
|
if (last_4_bytes == MATROSKA_ID_CLUSTER) {
|
2013-12-21 19:24:20 +00:00
|
|
|
mp_err(log, "Cluster found at %"PRId64".\n", pos - 4);
|
demux_mkv: improve robustness against broken files
Fixes test7.mkv from the Matroska test file collection, as well as some
real broken files I've found in the wild. (Unfortunately, true recovery
requires resetting the decoders and playback state with a manual seek,
but it's still better than just exiting.)
If there are broken EBML elements, try harder to skip them correctly.
Do this by searching for the next cluster element. The cluster element
intentionally has a long ID, so it's a suitable element for
resynchronizing (mkvmerge does something similar).
We know that data is corrupt if the ID or length fields of an element
are malformed. Additionally, if skipping an unknown element goes past
the end of the file, we assume it's corrupt and undo the seek. Do this
because it often happens that corrupt data is interpreted as correct
EBML elements. Since these elements will have a ridiculous values in
their length fields due to the large value range that is possible
(0-2^56-2), they will go past the end of the file. So instead of
skipping them (which would result in playback termination), try to
find the next cluster instead. (We still skip unknown elements that
are within the file, as this is needed for correct operation. Also, we
first execute the seek, because we don't really know where the file
ends. Doing it this way is better for unseekable streams too, because
it will still work in the non-error case.)
This is done as special case in the packet reading function only. On
the other hand, that's the only part of the file that's read after
initialization is done.
2013-03-27 23:01:17 +00:00
|
|
|
stream_seek(s, pos - 4);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
last_4_bytes = (last_4_bytes << 8) | stream_read_char(s);
|
|
|
|
pos++;
|
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2004-01-19 19:16:10 +00:00
|
|
|
|
2010-01-24 22:55:11 +00:00
|
|
|
|
|
|
|
#define EVALARGS(F, ...) F(__VA_ARGS__)
|
|
|
|
#define E(str, N, type) const struct ebml_elem_desc ebml_ ## N ## _desc = { str, type };
|
|
|
|
#define E_SN(str, count, N) const struct ebml_elem_desc ebml_ ## N ## _desc = { str, EBML_TYPE_SUBELEMENTS, sizeof(struct ebml_ ## N), count, (const struct ebml_field_desc[]){
|
|
|
|
#define E_S(str, count) EVALARGS(E_SN, str, count, N)
|
|
|
|
#define FN(id, name, multiple, N) { id, multiple, offsetof(struct ebml_ ## N, name), offsetof(struct ebml_ ## N, n_ ## name), &ebml_##name##_desc},
|
|
|
|
#define F(id, name, multiple) EVALARGS(FN, id, name, multiple, N)
|
2023-07-23 22:54:35 +00:00
|
|
|
#include "ebml_defs.inc"
|
2010-01-24 22:55:11 +00:00
|
|
|
#undef EVALARGS
|
|
|
|
#undef SN
|
|
|
|
#undef S
|
|
|
|
#undef FN
|
|
|
|
#undef F
|
|
|
|
|
|
|
|
// Used to read/write pointers to different struct types
|
|
|
|
struct generic;
|
|
|
|
#define generic_struct struct generic
|
|
|
|
|
2015-01-12 13:31:16 +00:00
|
|
|
static uint32_t ebml_parse_id(uint8_t *data, size_t data_len, int *length)
|
2010-01-24 22:55:11 +00:00
|
|
|
{
|
2015-01-12 13:31:16 +00:00
|
|
|
*length = -1;
|
|
|
|
uint8_t *end = data + data_len;
|
|
|
|
if (data == end)
|
|
|
|
return EBML_ID_INVALID;
|
2010-01-24 22:55:11 +00:00
|
|
|
int len = 1;
|
|
|
|
uint32_t id = *data++;
|
|
|
|
for (int len_mask = 0x80; !(id & len_mask); len_mask >>= 1) {
|
|
|
|
len++;
|
2015-01-12 13:31:16 +00:00
|
|
|
if (len > 4)
|
2010-01-24 22:55:11 +00:00
|
|
|
return EBML_ID_INVALID;
|
|
|
|
}
|
|
|
|
*length = len;
|
2015-01-12 13:31:16 +00:00
|
|
|
while (--len && data < end)
|
2010-01-24 22:55:11 +00:00
|
|
|
id = (id << 8) | *data++;
|
|
|
|
return id;
|
|
|
|
}
|
|
|
|
|
2015-01-12 01:11:51 +00:00
|
|
|
static uint64_t ebml_parse_length(uint8_t *data, size_t data_len, int *length)
|
2010-01-24 22:55:11 +00:00
|
|
|
{
|
2015-01-12 13:31:16 +00:00
|
|
|
*length = -1;
|
2015-01-12 01:11:51 +00:00
|
|
|
uint8_t *end = data + data_len;
|
|
|
|
if (data == end)
|
|
|
|
return -1;
|
2010-01-24 22:55:11 +00:00
|
|
|
uint64_t r = *data++;
|
|
|
|
int len = 1;
|
|
|
|
int len_mask;
|
|
|
|
for (len_mask = 0x80; !(r & len_mask); len_mask >>= 1) {
|
|
|
|
len++;
|
2015-01-12 13:31:16 +00:00
|
|
|
if (len > 8)
|
2010-01-24 22:55:11 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
r &= len_mask - 1;
|
|
|
|
|
|
|
|
int num_allones = 0;
|
|
|
|
if (r == len_mask - 1)
|
|
|
|
num_allones++;
|
|
|
|
for (int i = 1; i < len; i++) {
|
2015-01-12 01:11:51 +00:00
|
|
|
if (data == end)
|
|
|
|
return -1;
|
2010-01-24 22:55:11 +00:00
|
|
|
if (*data == 255)
|
|
|
|
num_allones++;
|
|
|
|
r = (r << 8) | *data++;
|
|
|
|
}
|
2015-01-12 13:31:16 +00:00
|
|
|
// According to Matroska specs this means "unknown length"
|
|
|
|
// Could be supported if there are any actual files using it
|
|
|
|
if (num_allones == len)
|
2010-01-24 22:55:11 +00:00
|
|
|
return -1;
|
|
|
|
*length = len;
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
static uint64_t ebml_parse_uint(uint8_t *data, int length)
|
|
|
|
{
|
2015-06-24 12:34:05 +00:00
|
|
|
assert(length >= 0 && length <= 8);
|
2010-01-24 22:55:11 +00:00
|
|
|
uint64_t r = 0;
|
|
|
|
while (length--)
|
|
|
|
r = (r << 8) + *data++;
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int64_t ebml_parse_sint(uint8_t *data, int length)
|
|
|
|
{
|
2015-06-24 12:34:05 +00:00
|
|
|
assert(length >= 0 && length <= 8);
|
|
|
|
if (!length)
|
|
|
|
return 0;
|
2014-11-08 09:21:12 +00:00
|
|
|
uint64_t r = 0;
|
2010-01-24 22:55:11 +00:00
|
|
|
if (*data & 0x80)
|
|
|
|
r = -1;
|
|
|
|
while (length--)
|
|
|
|
r = (r << 8) | *data++;
|
2014-11-08 09:21:12 +00:00
|
|
|
return (int64_t)r; // assume complement of 2
|
2010-01-24 22:55:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static double ebml_parse_float(uint8_t *data, int length)
|
|
|
|
{
|
2015-06-24 12:34:05 +00:00
|
|
|
assert(length == 0 || length == 4 || length == 8);
|
2010-01-24 22:55:11 +00:00
|
|
|
uint64_t i = ebml_parse_uint(data, length);
|
|
|
|
if (length == 4)
|
2012-01-28 11:41:36 +00:00
|
|
|
return av_int2float(i);
|
2010-01-24 22:55:11 +00:00
|
|
|
else
|
2012-01-28 11:41:36 +00:00
|
|
|
return av_int2double(i);
|
2010-01-24 22:55:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// target must be initialized to zero
|
|
|
|
static void ebml_parse_element(struct ebml_parse_ctx *ctx, void *target,
|
|
|
|
uint8_t *data, int size,
|
|
|
|
const struct ebml_elem_desc *type, int level)
|
|
|
|
{
|
|
|
|
assert(type->type == EBML_TYPE_SUBELEMENTS);
|
|
|
|
assert(level < 8);
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_TRACE(ctx, "%.*sParsing element %s\n", level, " ", type->name);
|
2010-01-24 22:55:11 +00:00
|
|
|
|
|
|
|
char *s = target;
|
|
|
|
uint8_t *end = data + size;
|
|
|
|
uint8_t *p = data;
|
2014-06-29 21:22:07 +00:00
|
|
|
int num_elems[MAX_EBML_SUBELEMENTS] = {0};
|
2010-01-24 22:55:11 +00:00
|
|
|
while (p < end) {
|
|
|
|
uint8_t *startp = p;
|
2013-07-22 22:45:23 +00:00
|
|
|
int len;
|
2015-01-12 13:31:16 +00:00
|
|
|
uint32_t id = ebml_parse_id(p, end - p, &len);
|
2010-01-24 22:55:11 +00:00
|
|
|
if (len > end - p)
|
|
|
|
goto past_end_error;
|
|
|
|
if (len < 0) {
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_ERR(ctx, "Error parsing subelement id\n");
|
2010-01-24 22:55:11 +00:00
|
|
|
goto other_error;
|
|
|
|
}
|
|
|
|
p += len;
|
2015-01-12 01:11:51 +00:00
|
|
|
uint64_t length = ebml_parse_length(p, end - p, &len);
|
2010-01-24 22:55:11 +00:00
|
|
|
if (len > end - p)
|
|
|
|
goto past_end_error;
|
|
|
|
if (len < 0) {
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_ERR(ctx, "Error parsing subelement length\n");
|
2010-01-24 22:55:11 +00:00
|
|
|
goto other_error;
|
|
|
|
}
|
|
|
|
p += len;
|
|
|
|
|
|
|
|
int field_idx = -1;
|
|
|
|
for (int i = 0; i < type->field_count; i++)
|
|
|
|
if (type->fields[i].id == id) {
|
|
|
|
field_idx = i;
|
|
|
|
num_elems[i]++;
|
2014-06-29 21:22:07 +00:00
|
|
|
if (num_elems[i] >= 0x70000000) {
|
|
|
|
MP_ERR(ctx, "Too many EBML subelements.\n");
|
|
|
|
goto other_error;
|
|
|
|
}
|
2010-01-24 22:55:11 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (length > end - p) {
|
|
|
|
if (field_idx >= 0 && type->fields[field_idx].desc->type
|
|
|
|
!= EBML_TYPE_SUBELEMENTS) {
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_ERR(ctx, "Subelement content goes "
|
2010-01-24 22:55:11 +00:00
|
|
|
"past end of containing element\n");
|
|
|
|
goto other_error;
|
|
|
|
}
|
|
|
|
// Try to parse what is possible from inside this partial element
|
|
|
|
ctx->has_errors = true;
|
|
|
|
length = end - p;
|
|
|
|
}
|
|
|
|
p += length;
|
|
|
|
|
|
|
|
continue;
|
|
|
|
|
|
|
|
past_end_error:
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_ERR(ctx, "Subelement headers go past end of containing element\n");
|
2010-01-24 22:55:11 +00:00
|
|
|
other_error:
|
|
|
|
ctx->has_errors = true;
|
|
|
|
end = startp;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2015-06-24 12:02:40 +00:00
|
|
|
for (int i = 0; i < type->field_count; i++) {
|
2010-01-24 22:55:11 +00:00
|
|
|
if (num_elems[i] && type->fields[i].multiple) {
|
|
|
|
char *ptr = s + type->fields[i].offset;
|
|
|
|
switch (type->fields[i].desc->type) {
|
2014-09-04 17:20:30 +00:00
|
|
|
case EBML_TYPE_SUBELEMENTS: {
|
|
|
|
size_t max = 1000000000 / type->fields[i].desc->size;
|
|
|
|
if (num_elems[i] > max) {
|
|
|
|
MP_ERR(ctx, "Too many subelements.\n");
|
|
|
|
num_elems[i] = max;
|
|
|
|
}
|
2013-07-22 22:45:23 +00:00
|
|
|
int sz = num_elems[i] * type->fields[i].desc->size;
|
|
|
|
*(generic_struct **) ptr = talloc_zero_size(ctx->talloc_ctx, sz);
|
2010-01-24 22:55:11 +00:00
|
|
|
break;
|
2014-09-04 17:20:30 +00:00
|
|
|
}
|
2010-01-24 22:55:11 +00:00
|
|
|
case EBML_TYPE_UINT:
|
|
|
|
*(uint64_t **) ptr = talloc_zero_array(ctx->talloc_ctx,
|
|
|
|
uint64_t, num_elems[i]);
|
|
|
|
break;
|
|
|
|
case EBML_TYPE_SINT:
|
|
|
|
*(int64_t **) ptr = talloc_zero_array(ctx->talloc_ctx,
|
|
|
|
int64_t, num_elems[i]);
|
|
|
|
break;
|
|
|
|
case EBML_TYPE_FLOAT:
|
|
|
|
*(double **) ptr = talloc_zero_array(ctx->talloc_ctx,
|
|
|
|
double, num_elems[i]);
|
|
|
|
break;
|
|
|
|
case EBML_TYPE_STR:
|
2015-06-24 12:02:40 +00:00
|
|
|
*(char ***) ptr = talloc_zero_array(ctx->talloc_ctx,
|
|
|
|
char *, num_elems[i]);
|
|
|
|
break;
|
2010-01-24 22:55:11 +00:00
|
|
|
case EBML_TYPE_BINARY:
|
|
|
|
*(struct bstr **) ptr = talloc_zero_array(ctx->talloc_ctx,
|
|
|
|
struct bstr,
|
|
|
|
num_elems[i]);
|
|
|
|
break;
|
|
|
|
case EBML_TYPE_EBML_ID:
|
|
|
|
*(int32_t **) ptr = talloc_zero_array(ctx->talloc_ctx,
|
|
|
|
uint32_t, num_elems[i]);
|
|
|
|
break;
|
|
|
|
default:
|
2023-01-10 18:26:51 +00:00
|
|
|
MP_ASSERT_UNREACHABLE();
|
2010-01-24 22:55:11 +00:00
|
|
|
}
|
|
|
|
}
|
2015-06-24 12:02:40 +00:00
|
|
|
}
|
2010-01-24 22:55:11 +00:00
|
|
|
|
|
|
|
while (data < end) {
|
|
|
|
int len;
|
2015-01-12 13:31:16 +00:00
|
|
|
uint32_t id = ebml_parse_id(data, end - data, &len);
|
2015-01-12 01:11:51 +00:00
|
|
|
if (len < 0 || len > end - data) {
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_ERR(ctx, "Error parsing subelement\n");
|
2015-01-12 01:11:51 +00:00
|
|
|
break;
|
|
|
|
}
|
2010-01-24 22:55:11 +00:00
|
|
|
data += len;
|
2015-01-12 01:11:51 +00:00
|
|
|
uint64_t length = ebml_parse_length(data, end - data, &len);
|
|
|
|
if (len < 0 || len > end - data) {
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_ERR(ctx, "Error parsing subelement length\n");
|
2015-01-12 01:11:51 +00:00
|
|
|
break;
|
|
|
|
}
|
2010-01-24 22:55:11 +00:00
|
|
|
data += len;
|
|
|
|
if (length > end - data) {
|
|
|
|
// Try to parse what is possible from inside this partial element
|
|
|
|
length = end - data;
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_ERR(ctx, "Next subelement content goes "
|
2010-01-24 22:55:11 +00:00
|
|
|
"past end of containing element, will be truncated\n");
|
|
|
|
}
|
|
|
|
int field_idx = -1;
|
|
|
|
for (int i = 0; i < type->field_count; i++)
|
|
|
|
if (type->fields[i].id == id) {
|
|
|
|
field_idx = i;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (field_idx < 0) {
|
2018-04-26 16:05:51 +00:00
|
|
|
if (id == 0xec) {
|
|
|
|
MP_TRACE(ctx, "%.*sIgnoring Void element "
|
|
|
|
"size: %"PRIu64"\n", level+1, " ", length);
|
|
|
|
} else if (id == 0xbf) {
|
|
|
|
MP_TRACE(ctx, "%.*sIgnoring CRC-32 "
|
|
|
|
"element size: %"PRIu64"\n", level+1, " ",
|
|
|
|
length);
|
|
|
|
} else {
|
2013-12-21 19:24:20 +00:00
|
|
|
MP_DBG(ctx, "Ignoring unrecognized "
|
2010-01-24 22:55:11 +00:00
|
|
|
"subelement. ID: %x size: %"PRIu64"\n", id, length);
|
2018-04-26 16:05:51 +00:00
|
|
|
}
|
2010-01-24 22:55:11 +00:00
|
|
|
data += length;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
const struct ebml_field_desc *fd = &type->fields[field_idx];
|
|
|
|
const struct ebml_elem_desc *ed = fd->desc;
|
|
|
|
bool multiple = fd->multiple;
|
|
|
|
int *countptr = (int *) (s + fd->count_offset);
|
|
|
|
if (*countptr >= num_elems[field_idx]) {
|
2017-10-23 08:53:28 +00:00
|
|
|
// Shouldn't happen on any sane file without bugs
|
|
|
|
MP_ERR(ctx, "Too many subelements.\n");
|
2010-01-24 22:55:11 +00:00
|
|
|
ctx->has_errors = true;
|
|
|
|
data += length;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (*countptr > 0 && !multiple) {
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_WARN(ctx, "Another subelement of type "
|
|
|
|
"%x %s (size: %"PRIu64"). Only one allowed. Ignoring.\n",
|
|
|
|
id, ed->name, length);
|
2010-01-24 22:55:11 +00:00
|
|
|
ctx->has_errors = true;
|
|
|
|
data += length;
|
|
|
|
continue;
|
|
|
|
}
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_TRACE(ctx, "%.*sParsing %x %s size: %"PRIu64
|
|
|
|
" value: ", level+1, " ", id, ed->name, length);
|
2010-01-24 22:55:11 +00:00
|
|
|
|
|
|
|
char *fieldptr = s + fd->offset;
|
|
|
|
switch (ed->type) {
|
|
|
|
case EBML_TYPE_SUBELEMENTS:
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_TRACE(ctx, "subelements\n");
|
2010-01-24 22:55:11 +00:00
|
|
|
char *subelptr;
|
|
|
|
if (multiple) {
|
|
|
|
char *array_start = (char *) *(generic_struct **) fieldptr;
|
|
|
|
subelptr = array_start + *countptr * ed->size;
|
|
|
|
} else
|
|
|
|
subelptr = fieldptr;
|
|
|
|
ebml_parse_element(ctx, subelptr, data, length, ed, level + 1);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case EBML_TYPE_UINT:;
|
|
|
|
uint64_t *uintptr;
|
|
|
|
#define GETPTR(subelptr, fieldtype) \
|
|
|
|
if (multiple) \
|
|
|
|
subelptr = *(fieldtype **) fieldptr + *countptr; \
|
|
|
|
else \
|
|
|
|
subelptr = (fieldtype *) fieldptr
|
|
|
|
GETPTR(uintptr, uint64_t);
|
|
|
|
if (length < 1 || length > 8) {
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_ERR(ctx, "uint invalid length %"PRIu64"\n", length);
|
2010-01-24 22:55:11 +00:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
*uintptr = ebml_parse_uint(data, length);
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_TRACE(ctx, "uint %"PRIu64"\n", *uintptr);
|
2010-01-24 22:55:11 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case EBML_TYPE_SINT:;
|
|
|
|
int64_t *sintptr;
|
|
|
|
GETPTR(sintptr, int64_t);
|
2015-06-24 12:34:05 +00:00
|
|
|
if (length > 8) {
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_ERR(ctx, "sint invalid length %"PRIu64"\n", length);
|
2010-01-24 22:55:11 +00:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
*sintptr = ebml_parse_sint(data, length);
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_TRACE(ctx, "sint %"PRId64"\n", *sintptr);
|
2010-01-24 22:55:11 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case EBML_TYPE_FLOAT:;
|
|
|
|
double *floatptr;
|
|
|
|
GETPTR(floatptr, double);
|
2015-06-24 12:34:05 +00:00
|
|
|
if (length != 0 && length != 4 && length != 8) {
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_ERR(ctx, "float invalid length %"PRIu64"\n", length);
|
2010-01-24 22:55:11 +00:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
*floatptr = ebml_parse_float(data, length);
|
2013-12-21 19:24:20 +00:00
|
|
|
MP_DBG(ctx, "float %f\n", *floatptr);
|
2010-01-24 22:55:11 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case EBML_TYPE_STR:
|
2015-06-24 12:02:40 +00:00
|
|
|
if (length > 1024 * 1024) {
|
|
|
|
MP_ERR(ctx, "Not reading overly long string element.\n");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
char **strptr;
|
|
|
|
GETPTR(strptr, char *);
|
|
|
|
*strptr = talloc_strndup(ctx->talloc_ctx, data, length);
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_TRACE(ctx, "string \"%s\"\n", *strptr);
|
2015-06-24 12:02:40 +00:00
|
|
|
break;
|
|
|
|
|
2010-01-24 22:55:11 +00:00
|
|
|
case EBML_TYPE_BINARY:;
|
2014-06-29 21:22:07 +00:00
|
|
|
if (length > 0x80000000) {
|
|
|
|
MP_ERR(ctx, "Not reading overly long EBML element.\n");
|
|
|
|
break;
|
|
|
|
}
|
2015-06-24 12:02:40 +00:00
|
|
|
struct bstr *binptr;
|
|
|
|
GETPTR(binptr, struct bstr);
|
|
|
|
binptr->start = data;
|
|
|
|
binptr->len = length;
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_TRACE(ctx, "binary %zd bytes\n", binptr->len);
|
2010-01-24 22:55:11 +00:00
|
|
|
break;
|
|
|
|
|
|
|
|
case EBML_TYPE_EBML_ID:;
|
|
|
|
uint32_t *idptr;
|
|
|
|
GETPTR(idptr, uint32_t);
|
2015-01-12 13:31:16 +00:00
|
|
|
*idptr = ebml_parse_id(data, end - data, &len);
|
2010-01-24 22:55:11 +00:00
|
|
|
if (len != length) {
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_ERR(ctx, "ebml_id broken value\n");
|
2010-01-24 22:55:11 +00:00
|
|
|
goto error;
|
|
|
|
}
|
2018-04-26 16:05:51 +00:00
|
|
|
MP_TRACE(ctx, "ebml_id %x\n", (unsigned)*idptr);
|
2010-01-24 22:55:11 +00:00
|
|
|
break;
|
|
|
|
default:
|
2023-01-10 18:26:51 +00:00
|
|
|
MP_ASSERT_UNREACHABLE();
|
2010-01-24 22:55:11 +00:00
|
|
|
}
|
|
|
|
*countptr += 1;
|
|
|
|
error:
|
|
|
|
data += length;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// target must be initialized to zero
|
|
|
|
int ebml_read_element(struct stream *s, struct ebml_parse_ctx *ctx,
|
|
|
|
void *target, const struct ebml_elem_desc *desc)
|
|
|
|
{
|
|
|
|
ctx->has_errors = false;
|
2013-12-21 20:41:18 +00:00
|
|
|
int msglevel = ctx->no_error_messages ? MSGL_DEBUG : MSGL_WARN;
|
2014-01-14 16:38:51 +00:00
|
|
|
uint64_t length = ebml_read_length(s);
|
2010-01-24 22:55:11 +00:00
|
|
|
if (s->eof) {
|
2013-12-21 19:24:20 +00:00
|
|
|
MP_MSG(ctx, msglevel, "Unexpected end of file "
|
2010-01-24 22:55:11 +00:00
|
|
|
"- partial or corrupt file?\n");
|
|
|
|
return -1;
|
|
|
|
}
|
2015-09-03 11:39:00 +00:00
|
|
|
if (length == EBML_UINT_INVALID) {
|
|
|
|
MP_MSG(ctx, msglevel, "EBML element with unknown length - unsupported\n");
|
|
|
|
return -1;
|
|
|
|
}
|
2010-01-24 22:55:11 +00:00
|
|
|
if (length > 1000000000) {
|
2013-12-21 19:24:20 +00:00
|
|
|
MP_MSG(ctx, msglevel, "Refusing to read element over 100 MB in size\n");
|
2010-01-24 22:55:11 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2015-01-12 01:11:51 +00:00
|
|
|
ctx->talloc_ctx = talloc_size(NULL, length);
|
2010-01-24 22:55:11 +00:00
|
|
|
int read_len = stream_read(s, ctx->talloc_ctx, length);
|
2015-01-12 01:11:51 +00:00
|
|
|
if (read_len < length)
|
2013-12-21 19:24:20 +00:00
|
|
|
MP_MSG(ctx, msglevel, "Unexpected end of file - partial or corrupt file?\n");
|
2010-01-24 22:55:11 +00:00
|
|
|
ebml_parse_element(ctx, target, ctx->talloc_ctx, read_len, desc, 0);
|
|
|
|
if (ctx->has_errors)
|
2013-12-21 19:24:20 +00:00
|
|
|
MP_MSG(ctx, msglevel, "Error parsing element %s\n", desc->name);
|
2010-01-24 22:55:11 +00:00
|
|
|
return 0;
|
|
|
|
}
|