blob: efd1f6a25786a31579babdae9a3afa29b44d0537 [file] [log] [blame]
Adam Lesinski970bd8d2017-09-25 13:21:55 -07001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#define ATRACE_TAG ATRACE_TAG_RESOURCES
18
19#include "androidfw/Idmap.h"
20
21#include "android-base/logging.h"
22#include "android-base/stringprintf.h"
Ryan Mitchella9093052020-03-26 17:15:01 -070023#include "androidfw/misc.h"
Ryan Mitchell8a891d82019-07-01 09:48:23 -070024#include "androidfw/ResourceTypes.h"
25#include "androidfw/Util.h"
Adam Lesinski970bd8d2017-09-25 13:21:55 -070026#include "utils/ByteOrder.h"
27#include "utils/Trace.h"
28
29#ifdef _WIN32
30#ifdef ERROR
31#undef ERROR
32#endif
33#endif
34
Adam Lesinski970bd8d2017-09-25 13:21:55 -070035using ::android::base::StringPrintf;
36
37namespace android {
38
Ryan Mitchell0699f1d2020-12-03 15:41:42 -080039// See frameworks/base/cmds/idmap2/include/idmap2/Idmap.h for full idmap file format specification.
40struct Idmap_header {
41 // Always 0x504D4449 ('IDMP')
42 uint32_t magic;
43 uint32_t version;
Adam Lesinski970bd8d2017-09-25 13:21:55 -070044
Ryan Mitchell0699f1d2020-12-03 15:41:42 -080045 uint32_t target_crc32;
46 uint32_t overlay_crc32;
47
48 uint32_t fulfilled_policies;
49 uint32_t enforce_overlayable;
50
51 // overlay_path, target_path, and other string values encoded in the idmap header and read and
52 // stored in separate structures. This allows the idmap header data to be casted to this struct
53 // without having to read/store each header entry separately.
54};
55
56struct Idmap_data_header {
Ryan Mitchell0699f1d2020-12-03 15:41:42 -080057 uint32_t target_entry_count;
58 uint32_t target_inline_entry_count;
59 uint32_t overlay_entry_count;
60
61 uint32_t string_pool_index_offset;
62};
63
64struct Idmap_target_entry {
65 uint32_t target_id;
66 uint32_t overlay_id;
67};
68
69struct Idmap_target_entry_inline {
70 uint32_t target_id;
71 Res_value value;
72};
73
74struct Idmap_overlay_entry {
75 uint32_t overlay_id;
76 uint32_t target_id;
77};
MÃ¥rten Kongstadd7e8a532019-10-11 08:32:04 +020078
Ryan Mitchell8a891d82019-07-01 09:48:23 -070079OverlayStringPool::OverlayStringPool(const LoadedIdmap* loaded_idmap)
Ryan Mitchell73bfe412019-11-12 16:22:04 -080080 : data_header_(loaded_idmap->data_header_),
81 idmap_string_pool_(loaded_idmap->string_pool_.get()) { };
Ryan Mitchell8a891d82019-07-01 09:48:23 -070082
83OverlayStringPool::~OverlayStringPool() {
84 uninit();
85}
86
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +000087base::expected<StringPiece16, NullOrIOError> OverlayStringPool::stringAt(size_t idx) const {
Ryan Mitchell8a891d82019-07-01 09:48:23 -070088 const size_t offset = dtohl(data_header_->string_pool_index_offset);
Ryan Mitchelldf9e7322019-12-12 10:23:54 -080089 if (idmap_string_pool_ != nullptr && idx >= ResStringPool::size() && idx >= offset) {
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +000090 return idmap_string_pool_->stringAt(idx - offset);
Adam Lesinski970bd8d2017-09-25 13:21:55 -070091 }
92
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +000093 return ResStringPool::stringAt(idx);
Ryan Mitchell8a891d82019-07-01 09:48:23 -070094}
95
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +000096base::expected<StringPiece, NullOrIOError> OverlayStringPool::string8At(size_t idx) const {
Ryan Mitchell8a891d82019-07-01 09:48:23 -070097 const size_t offset = dtohl(data_header_->string_pool_index_offset);
Ryan Mitchelldf9e7322019-12-12 10:23:54 -080098 if (idmap_string_pool_ != nullptr && idx >= ResStringPool::size() && idx >= offset) {
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +000099 return idmap_string_pool_->string8At(idx - offset);
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700100 }
101
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +0000102 return ResStringPool::string8At(idx);
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700103}
104
Ryan Mitchelldf9e7322019-12-12 10:23:54 -0800105size_t OverlayStringPool::size() const {
106 return ResStringPool::size() + (idmap_string_pool_ != nullptr ? idmap_string_pool_->size() : 0U);
107}
108
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700109OverlayDynamicRefTable::OverlayDynamicRefTable(const Idmap_data_header* data_header,
110 const Idmap_overlay_entry* entries,
111 uint8_t target_assigned_package_id)
112 : data_header_(data_header),
113 entries_(entries),
114 target_assigned_package_id_(target_assigned_package_id) { };
115
116status_t OverlayDynamicRefTable::lookupResourceId(uint32_t* resId) const {
117 const Idmap_overlay_entry* first_entry = entries_;
118 const Idmap_overlay_entry* end_entry = entries_ + dtohl(data_header_->overlay_entry_count);
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700119 auto entry = std::lower_bound(first_entry, end_entry, *resId,
120 [](const Idmap_overlay_entry& e1, const uint32_t overlay_id) {
121 return dtohl(e1.overlay_id) < overlay_id;
122 });
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700123
124 if (entry == end_entry || dtohl(entry->overlay_id) != *resId) {
125 // A mapping for the target resource id could not be found.
126 return DynamicRefTable::lookupResourceId(resId);
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700127 }
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700128
129 *resId = (0x00FFFFFFU & dtohl(entry->target_id))
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700130 | (((uint32_t) target_assigned_package_id_) << 24U);
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700131 return NO_ERROR;
132}
133
134status_t OverlayDynamicRefTable::lookupResourceIdNoRewrite(uint32_t* resId) const {
135 return DynamicRefTable::lookupResourceId(resId);
136}
137
138IdmapResMap::IdmapResMap(const Idmap_data_header* data_header,
139 const Idmap_target_entry* entries,
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700140 const Idmap_target_entry_inline* inline_entries,
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700141 uint8_t target_assigned_package_id,
142 const OverlayDynamicRefTable* overlay_ref_table)
143 : data_header_(data_header),
144 entries_(entries),
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700145 inline_entries_(inline_entries),
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700146 target_assigned_package_id_(target_assigned_package_id),
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700147 overlay_ref_table_(overlay_ref_table) { }
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700148
149IdmapResMap::Result IdmapResMap::Lookup(uint32_t target_res_id) const {
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700150 if ((target_res_id >> 24U) != target_assigned_package_id_) {
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700151 // The resource id must have the same package id as the target package.
152 return {};
153 }
154
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800155 // The resource ids encoded within the idmap are build-time resource ids so do not consider the
156 // package id when determining if the resource in the target package is overlaid.
157 target_res_id &= 0x00FFFFFFU;
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700158
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700159 // Check if the target resource is mapped to an overlay resource.
160 auto first_entry = entries_;
161 auto end_entry = entries_ + dtohl(data_header_->target_entry_count);
162 auto entry = std::lower_bound(first_entry, end_entry, target_res_id,
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800163 [](const Idmap_target_entry& e, const uint32_t target_id) {
164 return (0x00FFFFFFU & dtohl(e.target_id)) < target_id;
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700165 });
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700166
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800167 if (entry != end_entry && (0x00FFFFFFU & dtohl(entry->target_id)) == target_res_id) {
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700168 uint32_t overlay_resource_id = dtohl(entry->overlay_id);
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700169 // Lookup the resource without rewriting the overlay resource id back to the target resource id
170 // being looked up.
171 overlay_ref_table_->lookupResourceIdNoRewrite(&overlay_resource_id);
172 return Result(overlay_resource_id);
173 }
174
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700175 // Check if the target resources is mapped to an inline table entry.
176 auto first_inline_entry = inline_entries_;
177 auto end_inline_entry = inline_entries_ + dtohl(data_header_->target_inline_entry_count);
178 auto inline_entry = std::lower_bound(first_inline_entry, end_inline_entry, target_res_id,
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800179 [](const Idmap_target_entry_inline& e,
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700180 const uint32_t target_id) {
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800181 return (0x00FFFFFFU & dtohl(e.target_id)) < target_id;
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700182 });
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700183
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800184 if (inline_entry != end_inline_entry &&
185 (0x00FFFFFFU & dtohl(inline_entry->target_id)) == target_res_id) {
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700186 return Result(inline_entry->value);
187 }
188 return {};
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700189}
190
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800191namespace {
192template <typename T>
193const T* ReadType(const uint8_t** in_out_data_ptr, size_t* in_out_size, const std::string& label,
194 size_t count = 1) {
195 if (!util::IsFourByteAligned(*in_out_data_ptr)) {
196 LOG(ERROR) << "Idmap " << label << " is not word aligned.";
197 return {};
198 }
199 if ((*in_out_size / sizeof(T)) < count) {
200 LOG(ERROR) << "Idmap too small for the number of " << label << " entries ("
201 << count << ").";
202 return nullptr;
203 }
204 auto data_ptr = *in_out_data_ptr;
205 const size_t read_size = sizeof(T) * count;
206 *in_out_data_ptr += read_size;
207 *in_out_size -= read_size;
208 return reinterpret_cast<const T*>(data_ptr);
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700209}
210
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800211std::optional<std::string_view> ReadString(const uint8_t** in_out_data_ptr, size_t* in_out_size,
212 const std::string& label) {
213 const auto* len = ReadType<uint32_t>(in_out_data_ptr, in_out_size, label + " length");
214 if (len == nullptr) {
215 return {};
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700216 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800217 const auto* data = ReadType<char>(in_out_data_ptr, in_out_size, label, *len);
218 if (data == nullptr) {
219 return {};
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700220 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800221 // Strings are padded to the next 4 byte boundary.
222 const uint32_t padding_size = (4U - ((size_t)*in_out_data_ptr & 0x3U)) % 4U;
223 for (uint32_t i = 0; i < padding_size; i++) {
224 if (**in_out_data_ptr != 0) {
225 LOG(ERROR) << " Idmap padding of " << label << " is non-zero.";
226 return {};
227 }
228 *in_out_data_ptr += sizeof(uint8_t);
229 *in_out_size -= sizeof(uint8_t);
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700230 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800231 return std::string_view(data, *len);
232}
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800233} // namespace
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700234
Ryan Mitchella9093052020-03-26 17:15:01 -0700235LoadedIdmap::LoadedIdmap(std::string&& idmap_path,
Ryan Mitchella9093052020-03-26 17:15:01 -0700236 const Idmap_header* header,
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700237 const Idmap_data_header* data_header,
238 const Idmap_target_entry* target_entries,
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700239 const Idmap_target_entry_inline* target_inline_entries,
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700240 const Idmap_overlay_entry* overlay_entries,
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800241 std::unique_ptr<ResStringPool>&& string_pool,
242 std::string_view overlay_apk_path,
243 std::string_view target_apk_path)
Ryan Mitchell73bfe412019-11-12 16:22:04 -0800244 : header_(header),
245 data_header_(data_header),
246 target_entries_(target_entries),
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700247 target_inline_entries_(target_inline_entries),
Ryan Mitchell73bfe412019-11-12 16:22:04 -0800248 overlay_entries_(overlay_entries),
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800249 string_pool_(std::move(string_pool)),
Ryan Mitchella9093052020-03-26 17:15:01 -0700250 idmap_path_(std::move(idmap_path)),
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800251 overlay_apk_path_(overlay_apk_path),
252 target_apk_path_(target_apk_path),
253 idmap_last_mod_time_(getFileModDate(idmap_path_.data())) {}
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700254
Ryan Mitchell1a48fa62021-01-10 08:36:36 -0800255std::unique_ptr<LoadedIdmap> LoadedIdmap::Load(const StringPiece& idmap_path,
256 const StringPiece& idmap_data) {
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700257 ATRACE_CALL();
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800258 size_t data_size = idmap_data.size();
259 auto data_ptr = reinterpret_cast<const uint8_t*>(idmap_data.data());
260
261 // Parse the idmap header
262 auto header = ReadType<Idmap_header>(&data_ptr, &data_size, "header");
263 if (header == nullptr) {
264 return {};
265 }
266 if (dtohl(header->magic) != kIdmapMagic) {
267 LOG(ERROR) << StringPrintf("Invalid Idmap file: bad magic value (was 0x%08x, expected 0x%08x)",
268 dtohl(header->magic), kIdmapMagic);
269 return {};
270 }
271 if (dtohl(header->version) != kIdmapCurrentVersion) {
272 // We are strict about versions because files with this format are generated at runtime and
273 // don't need backwards compatibility.
274 LOG(ERROR) << StringPrintf("Version mismatch in Idmap (was 0x%08x, expected 0x%08x)",
275 dtohl(header->version), kIdmapCurrentVersion);
276 return {};
277 }
278 std::optional<std::string_view> overlay_path = ReadString(&data_ptr, &data_size, "overlay path");
279 if (!overlay_path) {
280 return {};
281 }
282 std::optional<std::string_view> target_path = ReadString(&data_ptr, &data_size, "target path");
283 if (!target_path) {
284 return {};
285 }
Ryan Mitchell30dc2e02020-12-02 11:43:18 -0800286 if (!ReadString(&data_ptr, &data_size, "target name") ||
287 !ReadString(&data_ptr, &data_size, "debug info")) {
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700288 return {};
289 }
290
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800291 // Parse the idmap data blocks. Currently idmap2 can only generate one data block.
292 auto data_header = ReadType<Idmap_data_header>(&data_ptr, &data_size, "data header");
293 if (data_header == nullptr) {
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700294 return {};
295 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800296 auto target_entries = ReadType<Idmap_target_entry>(&data_ptr, &data_size, "target",
297 dtohl(data_header->target_entry_count));
298 if (target_entries == nullptr) {
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700299 return {};
300 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800301 auto target_inline_entries = ReadType<Idmap_target_entry_inline>(
302 &data_ptr, &data_size, "target inline", dtohl(data_header->target_inline_entry_count));
303 if (target_inline_entries == nullptr) {
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700304 return {};
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700305 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800306 auto overlay_entries = ReadType<Idmap_overlay_entry>(&data_ptr, &data_size, "target inline",
307 dtohl(data_header->overlay_entry_count));
308 if (overlay_entries == nullptr) {
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700309 return {};
310 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800311 std::optional<std::string_view> string_pool = ReadString(&data_ptr, &data_size, "string pool");
312 if (!string_pool) {
313 return {};
314 }
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700315 auto idmap_string_pool = util::make_unique<ResStringPool>();
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800316 if (!string_pool->empty()) {
317 const status_t err = idmap_string_pool->setTo(string_pool->data(), string_pool->size());
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700318 if (err != NO_ERROR) {
319 LOG(ERROR) << "idmap string pool corrupt.";
320 return {};
321 }
322 }
323
Ryan Mitchell831b0722021-01-13 10:11:18 -0800324 if (data_size != 0) {
325 LOG(ERROR) << "idmap parsed with " << data_size << "bytes remaining";
326 return {};
327 }
328
Ryan Mitchell73bfe412019-11-12 16:22:04 -0800329 // Can't use make_unique because LoadedIdmap constructor is private.
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800330 return std::unique_ptr<LoadedIdmap>(
331 new LoadedIdmap(idmap_path.to_string(), header, data_header, target_entries,
332 target_inline_entries, overlay_entries, std::move(idmap_string_pool),
333 *target_path, *overlay_path));
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700334}
335
Ryan Mitchella9093052020-03-26 17:15:01 -0700336bool LoadedIdmap::IsUpToDate() const {
337 return idmap_last_mod_time_ == getFileModDate(idmap_path_.c_str());
338}
339
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700340} // namespace android