blob: e122d4844ee9c17b7e98a6ae7e3991dd9106a128 [file] [log] [blame]
Adam Lesinski970bd8d2017-09-25 13:21:55 -07001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#define ATRACE_TAG ATRACE_TAG_RESOURCES
18
19#include "androidfw/Idmap.h"
20
21#include "android-base/logging.h"
22#include "android-base/stringprintf.h"
Ryan Mitchella9093052020-03-26 17:15:01 -070023#include "androidfw/misc.h"
Ryan Mitchell8a891d82019-07-01 09:48:23 -070024#include "androidfw/ResourceTypes.h"
25#include "androidfw/Util.h"
Adam Lesinski970bd8d2017-09-25 13:21:55 -070026#include "utils/ByteOrder.h"
27#include "utils/Trace.h"
28
29#ifdef _WIN32
30#ifdef ERROR
31#undef ERROR
32#endif
33#endif
34
Adam Lesinski970bd8d2017-09-25 13:21:55 -070035using ::android::base::StringPrintf;
36
37namespace android {
38
Ryan Mitchell0699f1d2020-12-03 15:41:42 -080039// See frameworks/base/cmds/idmap2/include/idmap2/Idmap.h for full idmap file format specification.
40struct Idmap_header {
41 // Always 0x504D4449 ('IDMP')
42 uint32_t magic;
43 uint32_t version;
Adam Lesinski970bd8d2017-09-25 13:21:55 -070044
Ryan Mitchell0699f1d2020-12-03 15:41:42 -080045 uint32_t target_crc32;
46 uint32_t overlay_crc32;
47
48 uint32_t fulfilled_policies;
49 uint32_t enforce_overlayable;
50
51 // overlay_path, target_path, and other string values encoded in the idmap header and read and
52 // stored in separate structures. This allows the idmap header data to be casted to this struct
53 // without having to read/store each header entry separately.
54};
55
56struct Idmap_data_header {
Ryan Mitchell0699f1d2020-12-03 15:41:42 -080057 uint32_t target_entry_count;
58 uint32_t target_inline_entry_count;
Jeremy Meyerbe2b7792022-08-23 17:42:50 +000059 uint32_t target_inline_entry_value_count;
60 uint32_t configuration_count;
Ryan Mitchell0699f1d2020-12-03 15:41:42 -080061 uint32_t overlay_entry_count;
62
63 uint32_t string_pool_index_offset;
64};
65
66struct Idmap_target_entry {
67 uint32_t target_id;
68 uint32_t overlay_id;
69};
70
71struct Idmap_target_entry_inline {
72 uint32_t target_id;
Jeremy Meyerbe2b7792022-08-23 17:42:50 +000073 uint32_t start_value_index;
74 uint32_t value_count;
75};
76
77struct Idmap_target_entry_inline_value {
78 uint32_t config_index;
Ryan Mitchell0699f1d2020-12-03 15:41:42 -080079 Res_value value;
80};
81
82struct Idmap_overlay_entry {
83 uint32_t overlay_id;
84 uint32_t target_id;
85};
MÃ¥rten Kongstadd7e8a532019-10-11 08:32:04 +020086
Ryan Mitchell8a891d82019-07-01 09:48:23 -070087OverlayStringPool::OverlayStringPool(const LoadedIdmap* loaded_idmap)
Ryan Mitchell73bfe412019-11-12 16:22:04 -080088 : data_header_(loaded_idmap->data_header_),
89 idmap_string_pool_(loaded_idmap->string_pool_.get()) { };
Ryan Mitchell8a891d82019-07-01 09:48:23 -070090
91OverlayStringPool::~OverlayStringPool() {
92 uninit();
93}
94
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +000095base::expected<StringPiece16, NullOrIOError> OverlayStringPool::stringAt(size_t idx) const {
Ryan Mitchell8a891d82019-07-01 09:48:23 -070096 const size_t offset = dtohl(data_header_->string_pool_index_offset);
Ryan Mitchelldf9e7322019-12-12 10:23:54 -080097 if (idmap_string_pool_ != nullptr && idx >= ResStringPool::size() && idx >= offset) {
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +000098 return idmap_string_pool_->stringAt(idx - offset);
Adam Lesinski970bd8d2017-09-25 13:21:55 -070099 }
100
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +0000101 return ResStringPool::stringAt(idx);
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700102}
103
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +0000104base::expected<StringPiece, NullOrIOError> OverlayStringPool::string8At(size_t idx) const {
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700105 const size_t offset = dtohl(data_header_->string_pool_index_offset);
Ryan Mitchelldf9e7322019-12-12 10:23:54 -0800106 if (idmap_string_pool_ != nullptr && idx >= ResStringPool::size() && idx >= offset) {
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +0000107 return idmap_string_pool_->string8At(idx - offset);
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700108 }
109
Ryan Mitchelldb21f09a2020-11-16 23:08:18 +0000110 return ResStringPool::string8At(idx);
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700111}
112
Ryan Mitchelldf9e7322019-12-12 10:23:54 -0800113size_t OverlayStringPool::size() const {
114 return ResStringPool::size() + (idmap_string_pool_ != nullptr ? idmap_string_pool_->size() : 0U);
115}
116
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700117OverlayDynamicRefTable::OverlayDynamicRefTable(const Idmap_data_header* data_header,
118 const Idmap_overlay_entry* entries,
119 uint8_t target_assigned_package_id)
120 : data_header_(data_header),
121 entries_(entries),
122 target_assigned_package_id_(target_assigned_package_id) { };
123
124status_t OverlayDynamicRefTable::lookupResourceId(uint32_t* resId) const {
125 const Idmap_overlay_entry* first_entry = entries_;
126 const Idmap_overlay_entry* end_entry = entries_ + dtohl(data_header_->overlay_entry_count);
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700127 auto entry = std::lower_bound(first_entry, end_entry, *resId,
128 [](const Idmap_overlay_entry& e1, const uint32_t overlay_id) {
129 return dtohl(e1.overlay_id) < overlay_id;
130 });
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700131
132 if (entry == end_entry || dtohl(entry->overlay_id) != *resId) {
133 // A mapping for the target resource id could not be found.
134 return DynamicRefTable::lookupResourceId(resId);
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700135 }
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700136
137 *resId = (0x00FFFFFFU & dtohl(entry->target_id))
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700138 | (((uint32_t) target_assigned_package_id_) << 24U);
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700139 return NO_ERROR;
140}
141
142status_t OverlayDynamicRefTable::lookupResourceIdNoRewrite(uint32_t* resId) const {
143 return DynamicRefTable::lookupResourceId(resId);
144}
145
146IdmapResMap::IdmapResMap(const Idmap_data_header* data_header,
147 const Idmap_target_entry* entries,
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700148 const Idmap_target_entry_inline* inline_entries,
Jeremy Meyerbe2b7792022-08-23 17:42:50 +0000149 const Idmap_target_entry_inline_value* inline_entry_values,
150 const ConfigDescription* configs,
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700151 uint8_t target_assigned_package_id,
152 const OverlayDynamicRefTable* overlay_ref_table)
153 : data_header_(data_header),
154 entries_(entries),
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700155 inline_entries_(inline_entries),
Jeremy Meyerbe2b7792022-08-23 17:42:50 +0000156 inline_entry_values_(inline_entry_values),
157 configurations_(configs),
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700158 target_assigned_package_id_(target_assigned_package_id),
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700159 overlay_ref_table_(overlay_ref_table) { }
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700160
161IdmapResMap::Result IdmapResMap::Lookup(uint32_t target_res_id) const {
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700162 if ((target_res_id >> 24U) != target_assigned_package_id_) {
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700163 // The resource id must have the same package id as the target package.
164 return {};
165 }
166
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800167 // The resource ids encoded within the idmap are build-time resource ids so do not consider the
168 // package id when determining if the resource in the target package is overlaid.
169 target_res_id &= 0x00FFFFFFU;
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700170
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700171 // Check if the target resource is mapped to an overlay resource.
172 auto first_entry = entries_;
173 auto end_entry = entries_ + dtohl(data_header_->target_entry_count);
174 auto entry = std::lower_bound(first_entry, end_entry, target_res_id,
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800175 [](const Idmap_target_entry& e, const uint32_t target_id) {
176 return (0x00FFFFFFU & dtohl(e.target_id)) < target_id;
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700177 });
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700178
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800179 if (entry != end_entry && (0x00FFFFFFU & dtohl(entry->target_id)) == target_res_id) {
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700180 uint32_t overlay_resource_id = dtohl(entry->overlay_id);
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700181 // Lookup the resource without rewriting the overlay resource id back to the target resource id
182 // being looked up.
183 overlay_ref_table_->lookupResourceIdNoRewrite(&overlay_resource_id);
184 return Result(overlay_resource_id);
185 }
186
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700187 // Check if the target resources is mapped to an inline table entry.
188 auto first_inline_entry = inline_entries_;
189 auto end_inline_entry = inline_entries_ + dtohl(data_header_->target_inline_entry_count);
190 auto inline_entry = std::lower_bound(first_inline_entry, end_inline_entry, target_res_id,
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800191 [](const Idmap_target_entry_inline& e,
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700192 const uint32_t target_id) {
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800193 return (0x00FFFFFFU & dtohl(e.target_id)) < target_id;
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700194 });
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700195
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800196 if (inline_entry != end_inline_entry &&
197 (0x00FFFFFFU & dtohl(inline_entry->target_id)) == target_res_id) {
Jeremy Meyerbe2b7792022-08-23 17:42:50 +0000198 std::map<ConfigDescription, Res_value> values_map;
199 for (int i = 0; i < inline_entry->value_count; i++) {
200 const auto& value = inline_entry_values_[inline_entry->start_value_index + i];
201 const auto& config = configurations_[value.config_index];
202 values_map[config] = value.value;
203 }
204 return Result(values_map);
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700205 }
206 return {};
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700207}
208
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800209namespace {
210template <typename T>
211const T* ReadType(const uint8_t** in_out_data_ptr, size_t* in_out_size, const std::string& label,
212 size_t count = 1) {
213 if (!util::IsFourByteAligned(*in_out_data_ptr)) {
214 LOG(ERROR) << "Idmap " << label << " is not word aligned.";
215 return {};
216 }
217 if ((*in_out_size / sizeof(T)) < count) {
218 LOG(ERROR) << "Idmap too small for the number of " << label << " entries ("
219 << count << ").";
220 return nullptr;
221 }
222 auto data_ptr = *in_out_data_ptr;
223 const size_t read_size = sizeof(T) * count;
224 *in_out_data_ptr += read_size;
225 *in_out_size -= read_size;
226 return reinterpret_cast<const T*>(data_ptr);
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700227}
228
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800229std::optional<std::string_view> ReadString(const uint8_t** in_out_data_ptr, size_t* in_out_size,
230 const std::string& label) {
231 const auto* len = ReadType<uint32_t>(in_out_data_ptr, in_out_size, label + " length");
232 if (len == nullptr) {
233 return {};
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700234 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800235 const auto* data = ReadType<char>(in_out_data_ptr, in_out_size, label, *len);
236 if (data == nullptr) {
237 return {};
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700238 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800239 // Strings are padded to the next 4 byte boundary.
240 const uint32_t padding_size = (4U - ((size_t)*in_out_data_ptr & 0x3U)) % 4U;
241 for (uint32_t i = 0; i < padding_size; i++) {
242 if (**in_out_data_ptr != 0) {
243 LOG(ERROR) << " Idmap padding of " << label << " is non-zero.";
244 return {};
245 }
246 *in_out_data_ptr += sizeof(uint8_t);
247 *in_out_size -= sizeof(uint8_t);
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700248 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800249 return std::string_view(data, *len);
250}
Ryan Mitchell2ed8bfa2021-01-08 13:34:28 -0800251} // namespace
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700252
Ryan Mitchella9093052020-03-26 17:15:01 -0700253LoadedIdmap::LoadedIdmap(std::string&& idmap_path,
Ryan Mitchella9093052020-03-26 17:15:01 -0700254 const Idmap_header* header,
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700255 const Idmap_data_header* data_header,
256 const Idmap_target_entry* target_entries,
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700257 const Idmap_target_entry_inline* target_inline_entries,
Jeremy Meyerbe2b7792022-08-23 17:42:50 +0000258 const Idmap_target_entry_inline_value* inline_entry_values,
259 const ConfigDescription* configs,
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700260 const Idmap_overlay_entry* overlay_entries,
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800261 std::unique_ptr<ResStringPool>&& string_pool,
262 std::string_view overlay_apk_path,
263 std::string_view target_apk_path)
Ryan Mitchell73bfe412019-11-12 16:22:04 -0800264 : header_(header),
265 data_header_(data_header),
266 target_entries_(target_entries),
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700267 target_inline_entries_(target_inline_entries),
Jeremy Meyerbe2b7792022-08-23 17:42:50 +0000268 inline_entry_values_(inline_entry_values),
269 configurations_(configs),
Ryan Mitchell73bfe412019-11-12 16:22:04 -0800270 overlay_entries_(overlay_entries),
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800271 string_pool_(std::move(string_pool)),
Ryan Mitchella9093052020-03-26 17:15:01 -0700272 idmap_path_(std::move(idmap_path)),
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800273 overlay_apk_path_(overlay_apk_path),
274 target_apk_path_(target_apk_path),
275 idmap_last_mod_time_(getFileModDate(idmap_path_.data())) {}
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700276
Ryan Mitchell1a48fa62021-01-10 08:36:36 -0800277std::unique_ptr<LoadedIdmap> LoadedIdmap::Load(const StringPiece& idmap_path,
278 const StringPiece& idmap_data) {
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700279 ATRACE_CALL();
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800280 size_t data_size = idmap_data.size();
281 auto data_ptr = reinterpret_cast<const uint8_t*>(idmap_data.data());
282
283 // Parse the idmap header
284 auto header = ReadType<Idmap_header>(&data_ptr, &data_size, "header");
285 if (header == nullptr) {
286 return {};
287 }
288 if (dtohl(header->magic) != kIdmapMagic) {
289 LOG(ERROR) << StringPrintf("Invalid Idmap file: bad magic value (was 0x%08x, expected 0x%08x)",
290 dtohl(header->magic), kIdmapMagic);
291 return {};
292 }
293 if (dtohl(header->version) != kIdmapCurrentVersion) {
294 // We are strict about versions because files with this format are generated at runtime and
295 // don't need backwards compatibility.
296 LOG(ERROR) << StringPrintf("Version mismatch in Idmap (was 0x%08x, expected 0x%08x)",
297 dtohl(header->version), kIdmapCurrentVersion);
298 return {};
299 }
300 std::optional<std::string_view> overlay_path = ReadString(&data_ptr, &data_size, "overlay path");
301 if (!overlay_path) {
302 return {};
303 }
304 std::optional<std::string_view> target_path = ReadString(&data_ptr, &data_size, "target path");
305 if (!target_path) {
306 return {};
307 }
Ryan Mitchell30dc2e02020-12-02 11:43:18 -0800308 if (!ReadString(&data_ptr, &data_size, "target name") ||
309 !ReadString(&data_ptr, &data_size, "debug info")) {
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700310 return {};
311 }
312
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800313 // Parse the idmap data blocks. Currently idmap2 can only generate one data block.
314 auto data_header = ReadType<Idmap_data_header>(&data_ptr, &data_size, "data header");
315 if (data_header == nullptr) {
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700316 return {};
317 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800318 auto target_entries = ReadType<Idmap_target_entry>(&data_ptr, &data_size, "target",
319 dtohl(data_header->target_entry_count));
320 if (target_entries == nullptr) {
Ryan Mitchellbf1f45b2020-09-29 17:22:52 -0700321 return {};
322 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800323 auto target_inline_entries = ReadType<Idmap_target_entry_inline>(
324 &data_ptr, &data_size, "target inline", dtohl(data_header->target_inline_entry_count));
325 if (target_inline_entries == nullptr) {
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700326 return {};
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700327 }
Jeremy Meyerbe2b7792022-08-23 17:42:50 +0000328
329 auto target_inline_entry_values = ReadType<Idmap_target_entry_inline_value>(
330 &data_ptr, &data_size, "target inline values",
331 dtohl(data_header->target_inline_entry_value_count));
332 if (target_inline_entry_values == nullptr) {
333 return {};
334 }
335
336 auto configurations = ReadType<ConfigDescription>(
337 &data_ptr, &data_size, "configurations",
338 dtohl(data_header->configuration_count));
339 if (configurations == nullptr) {
340 return {};
341 }
342
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800343 auto overlay_entries = ReadType<Idmap_overlay_entry>(&data_ptr, &data_size, "target inline",
344 dtohl(data_header->overlay_entry_count));
345 if (overlay_entries == nullptr) {
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700346 return {};
347 }
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800348 std::optional<std::string_view> string_pool = ReadString(&data_ptr, &data_size, "string pool");
349 if (!string_pool) {
350 return {};
351 }
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700352 auto idmap_string_pool = util::make_unique<ResStringPool>();
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800353 if (!string_pool->empty()) {
354 const status_t err = idmap_string_pool->setTo(string_pool->data(), string_pool->size());
Ryan Mitchell8a891d82019-07-01 09:48:23 -0700355 if (err != NO_ERROR) {
356 LOG(ERROR) << "idmap string pool corrupt.";
357 return {};
358 }
359 }
360
Ryan Mitchell831b0722021-01-13 10:11:18 -0800361 if (data_size != 0) {
362 LOG(ERROR) << "idmap parsed with " << data_size << "bytes remaining";
363 return {};
364 }
365
Ryan Mitchell73bfe412019-11-12 16:22:04 -0800366 // Can't use make_unique because LoadedIdmap constructor is private.
Ryan Mitchell0699f1d2020-12-03 15:41:42 -0800367 return std::unique_ptr<LoadedIdmap>(
368 new LoadedIdmap(idmap_path.to_string(), header, data_header, target_entries,
Jeremy Meyerbe2b7792022-08-23 17:42:50 +0000369 target_inline_entries, target_inline_entry_values, configurations,
370 overlay_entries, std::move(idmap_string_pool), *target_path, *overlay_path));
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700371}
372
Ryan Mitchella9093052020-03-26 17:15:01 -0700373bool LoadedIdmap::IsUpToDate() const {
374 return idmap_last_mod_time_ == getFileModDate(idmap_path_.c_str());
375}
376
Adam Lesinski970bd8d2017-09-25 13:21:55 -0700377} // namespace android