blob: 5f98b8f8db43e8107ec8ea1cfff8400fa69686b4 [file] [log] [blame]
Adam Lesinski970bd8d2017-09-25 13:21:55 -07001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#define ATRACE_TAG ATRACE_TAG_RESOURCES
18
19#include "androidfw/Idmap.h"
20
21#include "android-base/logging.h"
22#include "android-base/stringprintf.h"
Ryan Mitchella9093052020-03-26 17:15:01 -070023#include "androidfw/misc.h"
Ryan Mitchell8a891d82019-07-01 09:48:23 -070024#include "androidfw/ResourceTypes.h"
25#include "androidfw/Util.h"
Adam Lesinski970bd8d2017-09-25 13:21:55 -070026#include "utils/ByteOrder.h"
27#include "utils/Trace.h"
28
29#ifdef _WIN32
30#ifdef ERROR
31#undef ERROR
32#endif
33#endif
34
Adam Lesinski970bd8d2017-09-25 13:21:55 -070035using ::android::base::StringPrintf;
36
37namespace android {
38
Ryan Mitchell0699f1d2020-12-03 15:41:42 -080039// See frameworks/base/cmds/idmap2/include/idmap2/Idmap.h for full idmap file format specification.
40struct Idmap_header {
41 // Always 0x504D4449 ('IDMP')
42 uint32_t magic;
43 uint32_t version;
Adam Lesinski970bd8d2017-09-25 13:21:55 -070044
Ryan Mitchell0699f1d2020-12-03 15:41:42 -080045 uint32_t target_crc32;
46 uint32_t overlay_crc32;
47
48 uint32_t fulfilled_policies;
49 uint32_t enforce_overlayable;
50
51 // overlay_path, target_path, and other string values encoded in the idmap header and read and
52 // stored in separate structures. This allows the idmap header data to be casted to this struct
53 // without having to read/store each header entry separately.
54};
55
56struct Idmap_data_header {
Ryan Mitchell0699f1d2020-12-03 15:41:42 -080057 uint32_t target_entry_count;
58 uint32_t target_inline_entry_count;
Jeremy Meyerbe2b7792022-08-23 17:42:50 +000059 uint32_t target_inline_entry_value_count;
60 uint32_t configuration_count;
Ryan Mitchell0699f1d2020-12-03 15:41:42 -080061 uint32_t overlay_entry_count;
62
63 uint32_t string_pool_index_offset;
64};
65
66struct Idmap_target_entry {
67 uint32_t target_id;
68 uint32_t overlay_id;
69};
70
71struct Idmap_target_entry_inline {
72 uint32_t target_id;
Jeremy Meyerbe2b7792022-08-23 17:42:50 +000073 uint32_t start_value_index;
74 uint32_t value_count;
75};
76
77struct Idmap_target_entry_inline_value {
78 uint32_t config_index;
Ryan Mitchell0699f1d2020-12-03 15:41:42 -080079 Res_value value;
80};
81
82struct Idmap_overlay_entry {
83 uint32_t overlay_id;
84 uint32_t target_id;
85};
MÃ¥rten Kongstadd7e8a532019-10-11 08:32:04 +020086
Ryan Mitchell8a891d82019-07-01 09:48:23 -070087OverlayStringPool::OverlayStringPool(const LoadedIdmap* loaded_idmap)
Ryan Mitchell73bfe412019-11-12 16:22:04 -080088 : data_header_(loaded_idmap->data_header_),
89 idmap_string_pool_(loaded_idmap->string_pool_.get()) { };
Ryan Mitchell8a891d82019-07-01 09:48:23 -070090
91OverlayStringPool::~OverlayStringPool() {
92 uninit();
93}
94
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +000095base::expected<StringPiece16, NullOrIOError> OverlayStringPool::stringAt(size_t idx) const {
Ryan Mitchell8a891d82019-07-01 09:48:23 -070096 const size_t offset = dtohl(data_header_->string_pool_index_offset);
Ryan Mitchelldf9e7322019-12-12 10:23:54 -080097 if (idmap_string_pool_ != nullptr && idx >= ResStringPool::size() && idx >= offset) {
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +000098 return idmap_string_pool_->stringAt(idx - offset);
Adam Lesinski970bd8d2017-09-25 13:21:55 -070099 }
100
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +0000101 return ResStringPool::stringAt(idx);
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700102}
103
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +0000104base::expected<StringPiece, NullOrIOError> OverlayStringPool::string8At(size_t idx) const {
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700105 const size_t offset = dtohl(data_header_->string_pool_index_offset);
Ryan Mitchelldf9e7322019-12-12 10:23:54 -0800106 if (idmap_string_pool_ != nullptr && idx >= ResStringPool::size() && idx >= offset) {
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +0000107 return idmap_string_pool_->string8At(idx - offset);
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700108 }
109
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +0000110 return ResStringPool::string8At(idx);
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700111}
112
Ryan Mitchelldf9e7322019-12-12 10:23:54 -0800113size_t OverlayStringPool::size() const {
114 return ResStringPool::size() + (idmap_string_pool_ != nullptr ? idmap_string_pool_->size() : 0U);
115}
116
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700117OverlayDynamicRefTable::OverlayDynamicRefTable(const Idmap_data_header* data_header,
118 const Idmap_overlay_entry* entries,
119 uint8_t target_assigned_package_id)
120 : data_header_(data_header),
121 entries_(entries),
122 target_assigned_package_id_(target_assigned_package_id) { };
123
124status_t OverlayDynamicRefTable::lookupResourceId(uint32_t* resId) const {
125 const Idmap_overlay_entry* first_entry = entries_;
126 const Idmap_overlay_entry* end_entry = entries_ + dtohl(data_header_->overlay_entry_count);
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700127 auto entry = std::lower_bound(first_entry, end_entry, *resId,
128 [](const Idmap_overlay_entry& e1, const uint32_t overlay_id) {
129 return dtohl(e1.overlay_id) < overlay_id;
130 });
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700131
132 if (entry == end_entry || dtohl(entry->overlay_id) != *resId) {
133 // A mapping for the target resource id could not be found.
134 return DynamicRefTable::lookupResourceId(resId);
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700135 }
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700136
137 *resId = (0x00FFFFFFU & dtohl(entry->target_id))
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700138 | (((uint32_t) target_assigned_package_id_) << 24U);
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700139 return NO_ERROR;
140}
141
142status_t OverlayDynamicRefTable::lookupResourceIdNoRewrite(uint32_t* resId) const {
143 return DynamicRefTable::lookupResourceId(resId);
144}
145
146IdmapResMap::IdmapResMap(const Idmap_data_header* data_header,
147 const Idmap_target_entry* entries,
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700148 const Idmap_target_entry_inline* inline_entries,
Jeremy Meyerbe2b7792022-08-23 17:42:50 +0000149 const Idmap_target_entry_inline_value* inline_entry_values,
150 const ConfigDescription* configs,
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700151 uint8_t target_assigned_package_id,
152 const OverlayDynamicRefTable* overlay_ref_table)
153 : data_header_(data_header),
154 entries_(entries),
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700155 inline_entries_(inline_entries),
Jeremy Meyerbe2b7792022-08-23 17:42:50 +0000156 inline_entry_values_(inline_entry_values),
157 configurations_(configs),
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700158 target_assigned_package_id_(target_assigned_package_id),
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700159 overlay_ref_table_(overlay_ref_table) { }
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700160
161IdmapResMap::Result IdmapResMap::Lookup(uint32_t target_res_id) const {
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700162 if ((target_res_id >> 24U) != target_assigned_package_id_) {
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700163 // The resource id must have the same package id as the target package.
164 return {};
165 }
166
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800167 // The resource ids encoded within the idmap are build-time resource ids so do not consider the
168 // package id when determining if the resource in the target package is overlaid.
169 target_res_id &= 0x00FFFFFFU;
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700170
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700171 // Check if the target resource is mapped to an overlay resource.
172 auto first_entry = entries_;
173 auto end_entry = entries_ + dtohl(data_header_->target_entry_count);
174 auto entry = std::lower_bound(first_entry, end_entry, target_res_id,
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800175 [](const Idmap_target_entry& e, const uint32_t target_id) {
176 return (0x00FFFFFFU & dtohl(e.target_id)) < target_id;
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700177 });
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700178
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800179 if (entry != end_entry && (0x00FFFFFFU & dtohl(entry->target_id)) == target_res_id) {
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700180 uint32_t overlay_resource_id = dtohl(entry->overlay_id);
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700181 // Lookup the resource without rewriting the overlay resource id back to the target resource id
182 // being looked up.
183 overlay_ref_table_->lookupResourceIdNoRewrite(&overlay_resource_id);
184 return Result(overlay_resource_id);
185 }
186
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700187 // Check if the target resources is mapped to an inline table entry.
188 auto first_inline_entry = inline_entries_;
189 auto end_inline_entry = inline_entries_ + dtohl(data_header_->target_inline_entry_count);
190 auto inline_entry = std::lower_bound(first_inline_entry, end_inline_entry, target_res_id,
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800191 [](const Idmap_target_entry_inline& e,
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700192 const uint32_t target_id) {
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800193 return (0x00FFFFFFU & dtohl(e.target_id)) < target_id;
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700194 });
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700195
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800196 if (inline_entry != end_inline_entry &&
197 (0x00FFFFFFU & dtohl(inline_entry->target_id)) == target_res_id) {
Jeremy Meyerbe2b7792022-08-23 17:42:50 +0000198 std::map<ConfigDescription, Res_value> values_map;
199 for (int i = 0; i < inline_entry->value_count; i++) {
200 const auto& value = inline_entry_values_[inline_entry->start_value_index + i];
201 const auto& config = configurations_[value.config_index];
202 values_map[config] = value.value;
203 }
Yurii Zubrytskyia5bc9582022-11-30 23:53:59 -0800204 return Result(std::move(values_map));
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700205 }
206 return {};
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700207}
208
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800209namespace {
210template <typename T>
211const T* ReadType(const uint8_t** in_out_data_ptr, size_t* in_out_size, const std::string& label,
212 size_t count = 1) {
213 if (!util::IsFourByteAligned(*in_out_data_ptr)) {
214 LOG(ERROR) << "Idmap " << label << " is not word aligned.";
215 return {};
216 }
217 if ((*in_out_size / sizeof(T)) < count) {
218 LOG(ERROR) << "Idmap too small for the number of " << label << " entries ("
219 << count << ").";
220 return nullptr;
221 }
222 auto data_ptr = *in_out_data_ptr;
223 const size_t read_size = sizeof(T) * count;
224 *in_out_data_ptr += read_size;
225 *in_out_size -= read_size;
226 return reinterpret_cast<const T*>(data_ptr);
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700227}
228
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800229std::optional<std::string_view> ReadString(const uint8_t** in_out_data_ptr, size_t* in_out_size,
230 const std::string& label) {
231 const auto* len = ReadType<uint32_t>(in_out_data_ptr, in_out_size, label + " length");
232 if (len == nullptr) {
233 return {};
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700234 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800235 const auto* data = ReadType<char>(in_out_data_ptr, in_out_size, label, *len);
236 if (data == nullptr) {
237 return {};
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700238 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800239 // Strings are padded to the next 4 byte boundary.
240 const uint32_t padding_size = (4U - ((size_t)*in_out_data_ptr & 0x3U)) % 4U;
241 for (uint32_t i = 0; i < padding_size; i++) {
242 if (**in_out_data_ptr != 0) {
243 LOG(ERROR) << " Idmap padding of " << label << " is non-zero.";
244 return {};
245 }
246 *in_out_data_ptr += sizeof(uint8_t);
247 *in_out_size -= sizeof(uint8_t);
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700248 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800249 return std::string_view(data, *len);
250}
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800251} // namespace
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700252
Yurii Zubrytskyia5bc9582022-11-30 23:53:59 -0800253LoadedIdmap::LoadedIdmap(std::string&& idmap_path, const Idmap_header* header,
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700254 const Idmap_data_header* data_header,
255 const Idmap_target_entry* target_entries,
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700256 const Idmap_target_entry_inline* target_inline_entries,
Jeremy Meyerbe2b7792022-08-23 17:42:50 +0000257 const Idmap_target_entry_inline_value* inline_entry_values,
258 const ConfigDescription* configs,
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700259 const Idmap_overlay_entry* overlay_entries,
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800260 std::unique_ptr<ResStringPool>&& string_pool,
Yurii Zubrytskyia5bc9582022-11-30 23:53:59 -0800261 std::string_view overlay_apk_path, std::string_view target_apk_path)
262 : header_(header),
263 data_header_(data_header),
264 target_entries_(target_entries),
265 target_inline_entries_(target_inline_entries),
266 inline_entry_values_(inline_entry_values),
267 configurations_(configs),
268 overlay_entries_(overlay_entries),
269 string_pool_(std::move(string_pool)),
270 idmap_path_(std::move(idmap_path)),
271 overlay_apk_path_(overlay_apk_path),
272 target_apk_path_(target_apk_path),
273 idmap_last_mod_time_(getFileModDate(idmap_path_.data())) {}
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700274
Yurii Zubrytskyia5775142022-11-02 17:49:49 -0700275std::unique_ptr<LoadedIdmap> LoadedIdmap::Load(StringPiece idmap_path, StringPiece idmap_data) {
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700276 ATRACE_CALL();
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800277 size_t data_size = idmap_data.size();
278 auto data_ptr = reinterpret_cast<const uint8_t*>(idmap_data.data());
279
280 // Parse the idmap header
281 auto header = ReadType<Idmap_header>(&data_ptr, &data_size, "header");
282 if (header == nullptr) {
283 return {};
284 }
285 if (dtohl(header->magic) != kIdmapMagic) {
286 LOG(ERROR) << StringPrintf("Invalid Idmap file: bad magic value (was 0x%08x, expected 0x%08x)",
287 dtohl(header->magic), kIdmapMagic);
288 return {};
289 }
290 if (dtohl(header->version) != kIdmapCurrentVersion) {
291 // We are strict about versions because files with this format are generated at runtime and
292 // don't need backwards compatibility.
293 LOG(ERROR) << StringPrintf("Version mismatch in Idmap (was 0x%08x, expected 0x%08x)",
294 dtohl(header->version), kIdmapCurrentVersion);
295 return {};
296 }
Brandon Liu9e93ae42023-03-23 00:16:19 +0000297 std::optional<std::string_view> target_path = ReadString(&data_ptr, &data_size, "target path");
298 if (!target_path) {
299 return {};
300 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800301 std::optional<std::string_view> overlay_path = ReadString(&data_ptr, &data_size, "overlay path");
302 if (!overlay_path) {
303 return {};
304 }
Ryan Mitchell30dc2e02020-12-02 11:43:18 -0800305 if (!ReadString(&data_ptr, &data_size, "target name") ||
306 !ReadString(&data_ptr, &data_size, "debug info")) {
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700307 return {};
308 }
309
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800310 // Parse the idmap data blocks. Currently idmap2 can only generate one data block.
311 auto data_header = ReadType<Idmap_data_header>(&data_ptr, &data_size, "data header");
312 if (data_header == nullptr) {
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700313 return {};
314 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800315 auto target_entries = ReadType<Idmap_target_entry>(&data_ptr, &data_size, "target",
316 dtohl(data_header->target_entry_count));
317 if (target_entries == nullptr) {
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700318 return {};
319 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800320 auto target_inline_entries = ReadType<Idmap_target_entry_inline>(
321 &data_ptr, &data_size, "target inline", dtohl(data_header->target_inline_entry_count));
322 if (target_inline_entries == nullptr) {
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700323 return {};
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700324 }
Jeremy Meyerbe2b7792022-08-23 17:42:50 +0000325
326 auto target_inline_entry_values = ReadType<Idmap_target_entry_inline_value>(
327 &data_ptr, &data_size, "target inline values",
328 dtohl(data_header->target_inline_entry_value_count));
329 if (target_inline_entry_values == nullptr) {
330 return {};
331 }
332
333 auto configurations = ReadType<ConfigDescription>(
334 &data_ptr, &data_size, "configurations",
335 dtohl(data_header->configuration_count));
336 if (configurations == nullptr) {
337 return {};
338 }
339
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800340 auto overlay_entries = ReadType<Idmap_overlay_entry>(&data_ptr, &data_size, "target inline",
341 dtohl(data_header->overlay_entry_count));
342 if (overlay_entries == nullptr) {
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700343 return {};
344 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800345 std::optional<std::string_view> string_pool = ReadString(&data_ptr, &data_size, "string pool");
346 if (!string_pool) {
347 return {};
348 }
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700349 auto idmap_string_pool = util::make_unique<ResStringPool>();
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800350 if (!string_pool->empty()) {
351 const status_t err = idmap_string_pool->setTo(string_pool->data(), string_pool->size());
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700352 if (err != NO_ERROR) {
353 LOG(ERROR) << "idmap string pool corrupt.";
354 return {};
355 }
356 }
357
Ryan Mitchell831b0722021-01-13 10:11:18 -0800358 if (data_size != 0) {
359 LOG(ERROR) << "idmap parsed with " << data_size << "bytes remaining";
360 return {};
361 }
362
Ryan Mitchell73bfe412019-11-12 16:22:04 -0800363 // Can't use make_unique because LoadedIdmap constructor is private.
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800364 return std::unique_ptr<LoadedIdmap>(
Yurii Zubrytskyia5775142022-11-02 17:49:49 -0700365 new LoadedIdmap(std::string(idmap_path), header, data_header, target_entries,
Jeremy Meyerbe2b7792022-08-23 17:42:50 +0000366 target_inline_entries, target_inline_entry_values, configurations,
Brandon Liu9e93ae42023-03-23 00:16:19 +0000367 overlay_entries, std::move(idmap_string_pool), *overlay_path, *target_path));
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700368}
369
Ryan Mitchella9093052020-03-26 17:15:01 -0700370bool LoadedIdmap::IsUpToDate() const {
371 return idmap_last_mod_time_ == getFileModDate(idmap_path_.c_str());
372}
373
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700374} // namespace android