blob: 1012ea0128f55e018645d7cac076ad86c9528848 [file] [log] [blame]
Dimitry Ivanovac1b1912015-12-01 13:56:44 -08001/*
2 * Copyright (C) 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "nativeloader/native_loader.h"
Steven Moreland00fe3ad2017-07-18 16:53:54 -070018#include <nativehelper/ScopedUtfChars.h>
Dimitry Ivanovac1b1912015-12-01 13:56:44 -080019
20#include <dlfcn.h>
21#ifdef __ANDROID__
Dimitry Ivanov7f9a1aa2016-03-22 13:59:59 -070022#define LOG_TAG "libnativeloader"
Jesse Hallb75d82b2017-01-09 16:04:28 -080023#include "nativeloader/dlext_namespaces.h"
Mark Salyzyn30f991f2017-01-10 13:19:54 -080024#include "log/log.h"
Dimitry Ivanovac1b1912015-12-01 13:56:44 -080025#endif
Jiyong Parkd1006fe2017-11-08 18:44:09 +090026#include <dirent.h>
27#include <sys/types.h>
Zhenhua WANGf2804e52016-05-30 11:16:08 +080028#include "nativebridge/native_bridge.h"
Dimitry Ivanovac1b1912015-12-01 13:56:44 -080029
30#include <algorithm>
Victor Khimenko1443ec42018-07-09 17:01:22 +020031#include <list>
Jiyong Parkd1006fe2017-11-08 18:44:09 +090032#include <memory>
Dimitry Ivanovac1b1912015-12-01 13:56:44 -080033#include <mutex>
Kiyoung Kim4639f692019-02-20 18:04:39 +090034#include <regex>
Jiyong Parkd1006fe2017-11-08 18:44:09 +090035#include <string>
36#include <vector>
Dimitry Ivanovac1b1912015-12-01 13:56:44 -080037
Mark Salyzynff2dcd92016-09-28 15:54:45 -070038#include <android-base/file.h>
39#include <android-base/macros.h>
40#include <android-base/strings.h>
Dimitry Ivanovac1b1912015-12-01 13:56:44 -080041
Justin Yun4a1d1102017-11-27 17:04:14 +090042#ifdef __BIONIC__
43#include <android-base/properties.h>
44#endif
45
Zhenhua WANGf2804e52016-05-30 11:16:08 +080046#define CHECK(predicate) LOG_ALWAYS_FATAL_IF(!(predicate),\
47 "%s:%d: %s CHECK '" #predicate "' failed.",\
48 __FILE__, __LINE__, __FUNCTION__)
49
Inseob Kim67cb0562018-05-04 11:39:12 +090050using namespace std::string_literals;
51
Dimitry Ivanovac1b1912015-12-01 13:56:44 -080052namespace android {
53
Dimitry Ivanov4b0e9632016-03-15 13:51:26 -070054#if defined(__ANDROID__)
Nicolas Geoffrayc3a73dc2019-01-12 15:01:20 +000055struct NativeLoaderNamespace {
Zhenhua WANGf2804e52016-05-30 11:16:08 +080056 public:
57 NativeLoaderNamespace()
58 : android_ns_(nullptr), native_bridge_ns_(nullptr) { }
59
60 explicit NativeLoaderNamespace(android_namespace_t* ns)
61 : android_ns_(ns), native_bridge_ns_(nullptr) { }
62
63 explicit NativeLoaderNamespace(native_bridge_namespace_t* ns)
64 : android_ns_(nullptr), native_bridge_ns_(ns) { }
65
66 NativeLoaderNamespace(NativeLoaderNamespace&& that) = default;
67 NativeLoaderNamespace(const NativeLoaderNamespace& that) = default;
68
69 NativeLoaderNamespace& operator=(const NativeLoaderNamespace& that) = default;
70
71 android_namespace_t* get_android_ns() const {
72 CHECK(native_bridge_ns_ == nullptr);
73 return android_ns_;
74 }
75
76 native_bridge_namespace_t* get_native_bridge_ns() const {
77 CHECK(android_ns_ == nullptr);
78 return native_bridge_ns_;
79 }
80
81 bool is_android_namespace() const {
82 return native_bridge_ns_ == nullptr;
83 }
84
85 private:
86 // Only one of them can be not null
87 android_namespace_t* android_ns_;
88 native_bridge_namespace_t* native_bridge_ns_;
89};
90
Jiyong Parkd1006fe2017-11-08 18:44:09 +090091static constexpr const char kPublicNativeLibrariesSystemConfigPathFromRoot[] =
92 "/etc/public.libraries.txt";
93static constexpr const char kPublicNativeLibrariesExtensionConfigPrefix[] = "public.libraries-";
94static constexpr const size_t kPublicNativeLibrariesExtensionConfigPrefixLen =
95 sizeof(kPublicNativeLibrariesExtensionConfigPrefix) - 1;
96static constexpr const char kPublicNativeLibrariesExtensionConfigSuffix[] = ".txt";
97static constexpr const size_t kPublicNativeLibrariesExtensionConfigSuffixLen =
98 sizeof(kPublicNativeLibrariesExtensionConfigSuffix) - 1;
99static constexpr const char kPublicNativeLibrariesVendorConfig[] =
100 "/vendor/etc/public.libraries.txt";
101static constexpr const char kLlndkNativeLibrariesSystemConfigPathFromRoot[] =
102 "/etc/llndk.libraries.txt";
103static constexpr const char kVndkspNativeLibrariesSystemConfigPathFromRoot[] =
104 "/etc/vndksp.libraries.txt";
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800105
Victor Chang7a20a902019-01-28 18:43:24 +0000106static const std::vector<const std::string> kRuntimePublicLibraries = {
107 "libicuuc.so",
108 "libicui18n.so",
109};
110
Dimitry Ivanov882cad22017-05-01 15:12:49 -0700111// The device may be configured to have the vendor libraries loaded to a separate namespace.
112// For historical reasons this namespace was named sphal but effectively it is intended
113// to use to load vendor libraries to separate namespace with controlled interface between
114// vendor and system namespaces.
115static constexpr const char* kVendorNamespaceName = "sphal";
116
Jiyong Parka07f3052017-08-22 10:26:10 +0900117static constexpr const char* kVndkNamespaceName = "vndk";
118
Martin Stjernholm7888b5c2019-02-23 02:10:14 +0000119static constexpr const char* kDefaultNamespaceName = "default";
120static constexpr const char* kPlatformNamespaceName = "platform";
Victor Chang7a20a902019-01-28 18:43:24 +0000121static constexpr const char* kRuntimeNamespaceName = "runtime";
122
Martin Stjernholmb78f6ec2019-02-06 21:47:26 +0000123// classloader-namespace is a linker namespace that is created for the loaded
124// app. To be specific, it is created for the app classloader. When
125// System.load() is called from a Java class that is loaded from the
126// classloader, the classloader-namespace namespace associated with that
127// classloader is selected for dlopen. The namespace is configured so that its
128// search path is set to the app-local JNI directory and it is linked to the
Martin Stjernholmc57ed292019-04-25 16:20:32 +0100129// platform namespace with the names of libs listed in the public.libraries.txt.
Martin Stjernholmb78f6ec2019-02-06 21:47:26 +0000130// This way an app can only load its own JNI libraries along with the public libs.
Jiyong Parka07f3052017-08-22 10:26:10 +0900131static constexpr const char* kClassloaderNamespaceName = "classloader-namespace";
Martin Stjernholmb78f6ec2019-02-06 21:47:26 +0000132// Same thing for vendor APKs.
Jiyong Parka07f3052017-08-22 10:26:10 +0900133static constexpr const char* kVendorClassloaderNamespaceName = "vendor-classloader-namespace";
134
Dimitry Ivanovf334cbf2016-05-10 10:39:48 -0700135// (http://b/27588281) This is a workaround for apps using custom classloaders and calling
136// System.load() with an absolute path which is outside of the classloader library search path.
137// This list includes all directories app is allowed to access this way.
138static constexpr const char* kWhitelistedDirectories = "/data:/mnt/expand";
139
Nicolas Geoffray890e3bf2019-01-22 09:11:57 +0000140static constexpr const char* kApexPath = "/apex/";
141
Victor Changf70a2fe2019-02-01 20:01:27 +0000142#if defined(__LP64__)
143static constexpr const char* kRuntimeApexLibPath = "/apex/com.android.runtime/lib64";
Kiyoung Kim4639f692019-02-20 18:04:39 +0900144static constexpr const char* kVendorLibPath = "/vendor/lib64";
145static constexpr const char* kProductLibPath = "/product/lib64:/system/product/lib64";
Victor Changf70a2fe2019-02-01 20:01:27 +0000146#else
147static constexpr const char* kRuntimeApexLibPath = "/apex/com.android.runtime/lib";
Kiyoung Kim4639f692019-02-20 18:04:39 +0900148static constexpr const char* kVendorLibPath = "/vendor/lib";
149static constexpr const char* kProductLibPath = "/product/lib:/system/product/lib";
Victor Changf70a2fe2019-02-01 20:01:27 +0000150#endif
151
Kiyoung Kim4639f692019-02-20 18:04:39 +0900152static const std::regex kVendorDexPathRegex("(^|:)/vendor/");
153static const std::regex kProductDexPathRegex("(^|:)(/system)?/product/");
154
155// Define origin of APK if it is from vendor partition or product partition
156typedef enum {
157 APK_ORIGIN_DEFAULT = 0,
158 APK_ORIGIN_VENDOR = 1,
159 APK_ORIGIN_PRODUCT = 2,
160} ApkOrigin;
161
Dimitry Ivanov7d028292016-05-05 17:30:24 -0700162static bool is_debuggable() {
Orion Hodson34b126b2019-02-21 17:18:44 +0000163 bool debuggable = false;
164#ifdef __BIONIC__
165 debuggable = android::base::GetBoolProperty("ro.debuggable", false);
166#endif
167 return debuggable;
Dimitry Ivanov7d028292016-05-05 17:30:24 -0700168}
169
Justin Yun4a1d1102017-11-27 17:04:14 +0900170static std::string vndk_version_str() {
171#ifdef __BIONIC__
172 std::string version = android::base::GetProperty("ro.vndk.version", "");
173 if (version != "" && version != "current") {
174 return "." + version;
175 }
176#endif
177 return "";
178}
179
180static void insert_vndk_version_str(std::string* file_name) {
181 CHECK(file_name != nullptr);
182 size_t insert_pos = file_name->find_last_of(".");
183 if (insert_pos == std::string::npos) {
184 insert_pos = file_name->length();
185 }
186 file_name->insert(insert_pos, vndk_version_str());
187}
188
Jiyong Parkd1006fe2017-11-08 18:44:09 +0900189static const std::function<bool(const std::string&, std::string*)> always_true =
190 [](const std::string&, std::string*) { return true; };
191
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800192class LibraryNamespaces {
193 public:
Dimitry Ivanov426799d2016-02-22 11:27:48 -0800194 LibraryNamespaces() : initialized_(false) { }
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800195
Nicolas Geoffrayc3a73dc2019-01-12 15:01:20 +0000196 NativeLoaderNamespace* Create(JNIEnv* env, uint32_t target_sdk_version, jobject class_loader,
Kiyoung Kim4639f692019-02-20 18:04:39 +0900197 bool is_shared, jstring dex_path, jstring java_library_path,
Nicolas Geoffrayc3a73dc2019-01-12 15:01:20 +0000198 jstring java_permitted_path, std::string* error_msg) {
Dimitry Ivanovcf9892b2016-05-09 10:55:50 -0700199 std::string library_path; // empty string by default.
200
201 if (java_library_path != nullptr) {
202 ScopedUtfChars library_path_utf_chars(env, java_library_path);
203 library_path = library_path_utf_chars.c_str();
204 }
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800205
Kiyoung Kim4639f692019-02-20 18:04:39 +0900206 ApkOrigin apk_origin = GetApkOriginFromDexPath(env, dex_path);
207
Dimitry Ivanovf334cbf2016-05-10 10:39:48 -0700208 // (http://b/27588281) This is a workaround for apps using custom
209 // classloaders and calling System.load() with an absolute path which
210 // is outside of the classloader library search path.
211 //
212 // This part effectively allows such a classloader to access anything
213 // under /data and /mnt/expand
214 std::string permitted_path = kWhitelistedDirectories;
215
Dimitry Ivanov0d6e5942015-12-08 11:16:56 -0800216 if (java_permitted_path != nullptr) {
217 ScopedUtfChars path(env, java_permitted_path);
Dimitry Ivanovd0b15312016-05-10 16:21:25 -0700218 if (path.c_str() != nullptr && path.size() > 0) {
219 permitted_path = permitted_path + ":" + path.c_str();
220 }
Dimitry Ivanov0d6e5942015-12-08 11:16:56 -0800221 }
222
Andreas Gampeb9df7d92019-04-26 08:51:50 -0700223 // Initialize the anonymous namespace with the first non-empty library path.
224 if (!library_path.empty() && !initialized_ &&
225 !InitPublicNamespace(library_path.c_str(), error_msg)) {
Victor Khimenko1443ec42018-07-09 17:01:22 +0200226 return nullptr;
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800227 }
228
Victor Khimenko1443ec42018-07-09 17:01:22 +0200229 bool found = FindNamespaceByClassLoader(env, class_loader);
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800230
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800231 LOG_ALWAYS_FATAL_IF(found,
Dimitry Ivanov4b0e9632016-03-15 13:51:26 -0700232 "There is already a namespace associated with this classloader");
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800233
Dimitry Ivanovd2a62202015-12-15 11:06:57 -0800234 uint64_t namespace_type = ANDROID_NAMESPACE_TYPE_ISOLATED;
235 if (is_shared) {
236 namespace_type |= ANDROID_NAMESPACE_TYPE_SHARED;
237 }
238
Dimitry Ivanov9e253ce2017-05-08 22:24:24 -0700239 if (target_sdk_version < 24) {
240 namespace_type |= ANDROID_NAMESPACE_TYPE_GREYLIST_ENABLED;
241 }
242
Victor Khimenko1443ec42018-07-09 17:01:22 +0200243 NativeLoaderNamespace* parent_ns = FindParentNamespaceByClassLoader(env, class_loader);
Dimitry Ivanov24db75c2016-05-12 15:34:41 -0700244
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800245 bool is_native_bridge = false;
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800246
Victor Khimenko1443ec42018-07-09 17:01:22 +0200247 if (parent_ns != nullptr) {
248 is_native_bridge = !parent_ns->is_android_namespace();
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800249 } else if (!library_path.empty()) {
250 is_native_bridge = NativeBridgeIsPathSupported(library_path.c_str());
Dimitry Ivanovd047c922016-02-23 14:23:51 -0800251 }
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800252
Jiyong Parka07f3052017-08-22 10:26:10 +0900253 std::string system_exposed_libraries = system_public_libraries_;
254 const char* namespace_name = kClassloaderNamespaceName;
255 android_namespace_t* vndk_ns = nullptr;
Kiyoung Kim4639f692019-02-20 18:04:39 +0900256 if ((apk_origin == APK_ORIGIN_VENDOR ||
257 (apk_origin == APK_ORIGIN_PRODUCT && target_sdk_version > 29)) &&
258 !is_shared) {
259 LOG_FATAL_IF(is_native_bridge,
260 "Unbundled vendor / product apk must not use translated architecture");
Jiyong Parka07f3052017-08-22 10:26:10 +0900261
Kiyoung Kim4639f692019-02-20 18:04:39 +0900262 // For vendor / product apks, give access to the vendor / product lib even though
Jiyong Parka07f3052017-08-22 10:26:10 +0900263 // they are treated as unbundled; the libs and apks are still bundled
Kiyoung Kim4639f692019-02-20 18:04:39 +0900264 // together in the vendor / product partition.
265 const char* origin_partition;
266 const char* origin_lib_path;
267
268 switch (apk_origin) {
269 case APK_ORIGIN_VENDOR:
270 origin_partition = "vendor";
271 origin_lib_path = kVendorLibPath;
272 break;
273 case APK_ORIGIN_PRODUCT:
274 origin_partition = "product";
275 origin_lib_path = kProductLibPath;
276 break;
277 default:
278 origin_partition = "unknown";
279 origin_lib_path = "";
280 }
281
282 LOG_FATAL_IF(is_native_bridge, "Unbundled %s apk must not use translated architecture",
283 origin_partition);
284
285 library_path = library_path + ":" + origin_lib_path;
286 permitted_path = permitted_path + ":" + origin_lib_path;
Jiyong Parka07f3052017-08-22 10:26:10 +0900287
288 // Also give access to LLNDK libraries since they are available to vendors
289 system_exposed_libraries = system_exposed_libraries + ":" + system_llndk_libraries_.c_str();
290
291 // Give access to VNDK-SP libraries from the 'vndk' namespace.
292 vndk_ns = android_get_exported_namespace(kVndkNamespaceName);
Kiyoung Kim23ff8eb2019-03-21 16:56:05 +0900293 if (vndk_ns == nullptr) {
294 ALOGW("Cannot find \"%s\" namespace for %s apks", kVndkNamespaceName, origin_partition);
295 }
Jiyong Parka07f3052017-08-22 10:26:10 +0900296
297 // Different name is useful for debugging
298 namespace_name = kVendorClassloaderNamespaceName;
Kiyoung Kim4639f692019-02-20 18:04:39 +0900299 ALOGD("classloader namespace configured for unbundled %s apk. library_path=%s",
300 origin_partition, library_path.c_str());
Inseob Kim67cb0562018-05-04 11:39:12 +0900301 } else {
302 // oem and product public libraries are NOT available to vendor apks, otherwise it
Jiyong Parke0319942018-01-15 21:14:53 +0900303 // would be system->vendor violation.
Inseob Kim67cb0562018-05-04 11:39:12 +0900304 if (!oem_public_libraries_.empty()) {
305 system_exposed_libraries = system_exposed_libraries + ':' + oem_public_libraries_;
306 }
307 if (!product_public_libraries_.empty()) {
308 system_exposed_libraries = system_exposed_libraries + ':' + product_public_libraries_;
309 }
Jiyong Parka07f3052017-08-22 10:26:10 +0900310 }
311
Martin Stjernholmc57ed292019-04-25 16:20:32 +0100312 std::string runtime_exposed_libraries = runtime_public_libraries_;
Victor Chang7a20a902019-01-28 18:43:24 +0000313
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800314 NativeLoaderNamespace native_loader_ns;
315 if (!is_native_bridge) {
Martin Stjernholmc57ed292019-04-25 16:20:32 +0100316 // The platform namespace is called "default" for binaries in /system and
317 // "platform" for those in the Runtime APEX. Try "platform" first since
318 // "default" always exists.
319 android_namespace_t* platform_ns = android_get_exported_namespace(kPlatformNamespaceName);
320 if (platform_ns == nullptr) {
321 platform_ns = android_get_exported_namespace(kDefaultNamespaceName);
322 }
323
Martin Stjernholm7888b5c2019-02-23 02:10:14 +0000324 android_namespace_t* android_parent_ns;
325 if (parent_ns != nullptr) {
326 android_parent_ns = parent_ns->get_android_ns();
327 } else {
Martin Stjernholmc57ed292019-04-25 16:20:32 +0100328 // Fall back to the platform namespace if no parent is found.
329 android_parent_ns = platform_ns;
Martin Stjernholm7888b5c2019-02-23 02:10:14 +0000330 }
331
Jiyong Parka07f3052017-08-22 10:26:10 +0900332 android_namespace_t* ns = android_create_namespace(namespace_name,
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800333 nullptr,
334 library_path.c_str(),
335 namespace_type,
336 permitted_path.c_str(),
Victor Khimenko1443ec42018-07-09 17:01:22 +0200337 android_parent_ns);
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800338 if (ns == nullptr) {
339 *error_msg = dlerror();
Victor Khimenko1443ec42018-07-09 17:01:22 +0200340 return nullptr;
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800341 }
342
Dimitry Ivanov882cad22017-05-01 15:12:49 -0700343 // Note that when vendor_ns is not configured this function will return nullptr
344 // and it will result in linking vendor_public_libraries_ to the default namespace
345 // which is expected behavior in this case.
346 android_namespace_t* vendor_ns = android_get_exported_namespace(kVendorNamespaceName);
347
Victor Chang7a20a902019-01-28 18:43:24 +0000348 android_namespace_t* runtime_ns = android_get_exported_namespace(kRuntimeNamespaceName);
349
Martin Stjernholmc57ed292019-04-25 16:20:32 +0100350 if (!android_link_namespaces(ns, platform_ns, system_exposed_libraries.c_str())) {
Dimitry Ivanov26e1a842017-02-03 14:11:27 -0800351 *error_msg = dlerror();
Victor Khimenko1443ec42018-07-09 17:01:22 +0200352 return nullptr;
Dimitry Ivanov26e1a842017-02-03 14:11:27 -0800353 }
354
Victor Chang7a20a902019-01-28 18:43:24 +0000355 // Runtime apex does not exist in host, and under certain build conditions.
356 if (runtime_ns != nullptr) {
357 if (!android_link_namespaces(ns, runtime_ns, runtime_exposed_libraries.c_str())) {
358 *error_msg = dlerror();
359 return nullptr;
360 }
361 }
362
Jiyong Parka07f3052017-08-22 10:26:10 +0900363 if (vndk_ns != nullptr && !system_vndksp_libraries_.empty()) {
364 // vendor apks are allowed to use VNDK-SP libraries.
365 if (!android_link_namespaces(ns, vndk_ns, system_vndksp_libraries_.c_str())) {
366 *error_msg = dlerror();
Victor Khimenko1443ec42018-07-09 17:01:22 +0200367 return nullptr;
Jiyong Parka07f3052017-08-22 10:26:10 +0900368 }
369 }
370
Dimitry Ivanov882cad22017-05-01 15:12:49 -0700371 if (!vendor_public_libraries_.empty()) {
372 if (!android_link_namespaces(ns, vendor_ns, vendor_public_libraries_.c_str())) {
373 *error_msg = dlerror();
Victor Khimenko1443ec42018-07-09 17:01:22 +0200374 return nullptr;
Dimitry Ivanov882cad22017-05-01 15:12:49 -0700375 }
376 }
377
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800378 native_loader_ns = NativeLoaderNamespace(ns);
379 } else {
Martin Stjernholmc57ed292019-04-25 16:20:32 +0100380 // Same functionality as in the branch above, but calling through native bridge.
381
382 native_bridge_namespace_t* platform_ns =
383 NativeBridgeGetExportedNamespace(kPlatformNamespaceName);
384 if (platform_ns == nullptr) {
385 platform_ns = NativeBridgeGetExportedNamespace(kDefaultNamespaceName);
386 }
387
Martin Stjernholm7888b5c2019-02-23 02:10:14 +0000388 native_bridge_namespace_t* native_bridge_parent_namespace;
389 if (parent_ns != nullptr) {
390 native_bridge_parent_namespace = parent_ns->get_native_bridge_ns();
391 } else {
Martin Stjernholmc57ed292019-04-25 16:20:32 +0100392 native_bridge_parent_namespace = platform_ns;
Martin Stjernholm7888b5c2019-02-23 02:10:14 +0000393 }
394
Jiyong Parka07f3052017-08-22 10:26:10 +0900395 native_bridge_namespace_t* ns = NativeBridgeCreateNamespace(namespace_name,
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800396 nullptr,
397 library_path.c_str(),
398 namespace_type,
399 permitted_path.c_str(),
Victor Khimenko1443ec42018-07-09 17:01:22 +0200400 native_bridge_parent_namespace);
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800401 if (ns == nullptr) {
402 *error_msg = NativeBridgeGetError();
Victor Khimenko1443ec42018-07-09 17:01:22 +0200403 return nullptr;
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800404 }
405
dimitryd2ace382019-02-04 15:06:43 +0100406 native_bridge_namespace_t* vendor_ns = NativeBridgeGetExportedNamespace(kVendorNamespaceName);
Victor Chang7a20a902019-01-28 18:43:24 +0000407 native_bridge_namespace_t* runtime_ns =
408 NativeBridgeGetExportedNamespace(kRuntimeNamespaceName);
Dimitry Ivanov882cad22017-05-01 15:12:49 -0700409
Martin Stjernholmc57ed292019-04-25 16:20:32 +0100410 if (!NativeBridgeLinkNamespaces(ns, platform_ns, system_exposed_libraries.c_str())) {
Zhenhua WANGe8fb11d2017-02-27 10:14:45 +0800411 *error_msg = NativeBridgeGetError();
Victor Khimenko1443ec42018-07-09 17:01:22 +0200412 return nullptr;
Zhenhua WANGe8fb11d2017-02-27 10:14:45 +0800413 }
414
Victor Chang7a20a902019-01-28 18:43:24 +0000415 // Runtime apex does not exist in host, and under certain build conditions.
416 if (runtime_ns != nullptr) {
417 if (!NativeBridgeLinkNamespaces(ns, runtime_ns, runtime_exposed_libraries.c_str())) {
418 *error_msg = NativeBridgeGetError();
419 return nullptr;
420 }
421 }
Dimitry Ivanov882cad22017-05-01 15:12:49 -0700422 if (!vendor_public_libraries_.empty()) {
423 if (!NativeBridgeLinkNamespaces(ns, vendor_ns, vendor_public_libraries_.c_str())) {
424 *error_msg = NativeBridgeGetError();
Victor Khimenko1443ec42018-07-09 17:01:22 +0200425 return nullptr;
Dimitry Ivanov882cad22017-05-01 15:12:49 -0700426 }
427 }
428
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800429 native_loader_ns = NativeLoaderNamespace(ns);
430 }
431
432 namespaces_.push_back(std::make_pair(env->NewWeakGlobalRef(class_loader), native_loader_ns));
433
Victor Khimenko1443ec42018-07-09 17:01:22 +0200434 return &(namespaces_.back().second);
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800435 }
436
Victor Khimenko1443ec42018-07-09 17:01:22 +0200437 NativeLoaderNamespace* FindNamespaceByClassLoader(JNIEnv* env, jobject class_loader) {
Dimitry Ivanovf44ecde2016-02-22 13:48:22 -0800438 auto it = std::find_if(namespaces_.begin(), namespaces_.end(),
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800439 [&](const std::pair<jweak, NativeLoaderNamespace>& value) {
Dimitry Ivanovf44ecde2016-02-22 13:48:22 -0800440 return env->IsSameObject(value.first, class_loader);
441 });
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800442 if (it != namespaces_.end()) {
Victor Khimenko1443ec42018-07-09 17:01:22 +0200443 return &it->second;
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800444 }
445
Victor Khimenko1443ec42018-07-09 17:01:22 +0200446 return nullptr;
Dimitry Ivanovf44ecde2016-02-22 13:48:22 -0800447 }
448
Dimitry Ivanov4b0e9632016-03-15 13:51:26 -0700449 void Initialize() {
Dimitry Ivanov80ddb8f2016-05-09 18:12:00 -0700450 // Once public namespace is initialized there is no
451 // point in running this code - it will have no effect
452 // on the current list of public libraries.
453 if (initialized_) {
454 return;
455 }
456
Dimitry Ivanovb6140452016-04-06 18:24:08 -0700457 std::vector<std::string> sonames;
Dimitry Ivanov0b5651e2016-04-21 16:42:48 -0700458 const char* android_root_env = getenv("ANDROID_ROOT");
459 std::string root_dir = android_root_env != nullptr ? android_root_env : "/system";
460 std::string public_native_libraries_system_config =
461 root_dir + kPublicNativeLibrariesSystemConfigPathFromRoot;
Martin Stjernholmc57ed292019-04-25 16:20:32 +0100462 std::string runtime_public_libraries = base::Join(kRuntimePublicLibraries, ":");
Jiyong Parka07f3052017-08-22 10:26:10 +0900463 std::string llndk_native_libraries_system_config =
464 root_dir + kLlndkNativeLibrariesSystemConfigPathFromRoot;
465 std::string vndksp_native_libraries_system_config =
466 root_dir + kVndkspNativeLibrariesSystemConfigPathFromRoot;
Dimitry Ivanovb6140452016-04-06 18:24:08 -0700467
Inseob Kim67cb0562018-05-04 11:39:12 +0900468 std::string product_public_native_libraries_dir = "/product/etc";
469
Christopher Ferris39da84b2016-06-21 16:11:23 -0700470 std::string error_msg;
Jiyong Parkd1006fe2017-11-08 18:44:09 +0900471 LOG_ALWAYS_FATAL_IF(
472 !ReadConfig(public_native_libraries_system_config, &sonames, always_true, &error_msg),
473 "Error reading public native library list from \"%s\": %s",
474 public_native_libraries_system_config.c_str(), error_msg.c_str());
475
Jiyong Parke0319942018-01-15 21:14:53 +0900476 // For debuggable platform builds use ANDROID_ADDITIONAL_PUBLIC_LIBRARIES environment
477 // variable to add libraries to the list. This is intended for platform tests only.
478 if (is_debuggable()) {
479 const char* additional_libs = getenv("ANDROID_ADDITIONAL_PUBLIC_LIBRARIES");
480 if (additional_libs != nullptr && additional_libs[0] != '\0') {
481 std::vector<std::string> additional_libs_vector = base::Split(additional_libs, ":");
482 std::copy(additional_libs_vector.begin(), additional_libs_vector.end(),
483 std::back_inserter(sonames));
Martin Stjernholmc57ed292019-04-25 16:20:32 +0100484 // Apply the same list to the runtime namespace, since some libraries
485 // might reside there.
486 CHECK(sizeof(kRuntimePublicLibraries) > 0);
487 runtime_public_libraries = runtime_public_libraries + ':' + additional_libs;
Jiyong Parke0319942018-01-15 21:14:53 +0900488 }
489 }
490
Victor Changf70a2fe2019-02-01 20:01:27 +0000491 // Remove the public libs in the runtime namespace.
492 // These libs are listed in public.android.txt, but we don't want the rest of android
493 // in default namespace to dlopen the libs.
494 // For example, libicuuc.so is exposed to classloader namespace from runtime namespace.
495 // Unfortunately, it does not have stable C symbols, and default namespace should only use
496 // stable symbols in libandroidicu.so. http://b/120786417
497 removePublicLibsIfExistsInRuntimeApex(sonames);
498
Jiyong Parke0319942018-01-15 21:14:53 +0900499 // android_init_namespaces() expects all the public libraries
500 // to be loaded so that they can be found by soname alone.
501 //
502 // TODO(dimitry): this is a bit misleading since we do not know
503 // if the vendor public library is going to be opened from /vendor/lib
Inseob Kim67cb0562018-05-04 11:39:12 +0900504 // we might as well end up loading them from /system/lib or /product/lib
Jiyong Parke0319942018-01-15 21:14:53 +0900505 // For now we rely on CTS test to catch things like this but
506 // it should probably be addressed in the future.
507 for (const auto& soname : sonames) {
508 LOG_ALWAYS_FATAL_IF(dlopen(soname.c_str(), RTLD_NOW | RTLD_NODELETE) == nullptr,
509 "Error preloading public library %s: %s", soname.c_str(), dlerror());
510 }
511
512 system_public_libraries_ = base::Join(sonames, ':');
Martin Stjernholmc57ed292019-04-25 16:20:32 +0100513 runtime_public_libraries_ = runtime_public_libraries;
Jiyong Parke0319942018-01-15 21:14:53 +0900514
Jiyong Parkd1006fe2017-11-08 18:44:09 +0900515 // read /system/etc/public.libraries-<companyname>.txt which contain partner defined
516 // system libs that are exposed to apps. The libs in the txt files must be
517 // named as lib<name>.<companyname>.so.
Jiyong Parke0319942018-01-15 21:14:53 +0900518 sonames.clear();
Inseob Kim67cb0562018-05-04 11:39:12 +0900519 ReadExtensionLibraries(base::Dirname(public_native_libraries_system_config).c_str(), &sonames);
Jiyong Parke0319942018-01-15 21:14:53 +0900520 oem_public_libraries_ = base::Join(sonames, ':');
Dimitry Ivanov7d028292016-05-05 17:30:24 -0700521
Inseob Kim67cb0562018-05-04 11:39:12 +0900522 // read /product/etc/public.libraries-<companyname>.txt which contain partner defined
523 // product libs that are exposed to apps.
524 sonames.clear();
525 ReadExtensionLibraries(product_public_native_libraries_dir.c_str(), &sonames);
526 product_public_libraries_ = base::Join(sonames, ':');
527
Justin Yun4a1d1102017-11-27 17:04:14 +0900528 // Insert VNDK version to llndk and vndksp config file names.
529 insert_vndk_version_str(&llndk_native_libraries_system_config);
530 insert_vndk_version_str(&vndksp_native_libraries_system_config);
531
Dimitry Ivanov882cad22017-05-01 15:12:49 -0700532 sonames.clear();
Jiyong Parkd1006fe2017-11-08 18:44:09 +0900533 ReadConfig(llndk_native_libraries_system_config, &sonames, always_true);
Jiyong Parka07f3052017-08-22 10:26:10 +0900534 system_llndk_libraries_ = base::Join(sonames, ':');
535
536 sonames.clear();
Jiyong Parkd1006fe2017-11-08 18:44:09 +0900537 ReadConfig(vndksp_native_libraries_system_config, &sonames, always_true);
Jiyong Parka07f3052017-08-22 10:26:10 +0900538 system_vndksp_libraries_ = base::Join(sonames, ':');
539
540 sonames.clear();
Dimitry Ivanov882cad22017-05-01 15:12:49 -0700541 // This file is optional, quietly ignore if the file does not exist.
Jiyong Parkd1006fe2017-11-08 18:44:09 +0900542 ReadConfig(kPublicNativeLibrariesVendorConfig, &sonames, always_true, nullptr);
Dimitry Ivanov882cad22017-05-01 15:12:49 -0700543
544 vendor_public_libraries_ = base::Join(sonames, ':');
Dimitry Ivanovb6140452016-04-06 18:24:08 -0700545 }
546
Inseob Kim67cb0562018-05-04 11:39:12 +0900547 void Reset() { namespaces_.clear(); }
Dimitry Ivanovbe4ca3a2016-05-02 10:43:16 -0700548
Dimitry Ivanovb6140452016-04-06 18:24:08 -0700549 private:
Inseob Kim67cb0562018-05-04 11:39:12 +0900550 void ReadExtensionLibraries(const char* dirname, std::vector<std::string>* sonames) {
551 std::unique_ptr<DIR, decltype(&closedir)> dir(opendir(dirname), closedir);
552 if (dir != nullptr) {
553 // Failing to opening the dir is not an error, which can happen in
554 // webview_zygote.
555 while (struct dirent* ent = readdir(dir.get())) {
556 if (ent->d_type != DT_REG && ent->d_type != DT_LNK) {
557 continue;
558 }
559 const std::string filename(ent->d_name);
560 if (android::base::StartsWith(filename, kPublicNativeLibrariesExtensionConfigPrefix) &&
561 android::base::EndsWith(filename, kPublicNativeLibrariesExtensionConfigSuffix)) {
562 const size_t start = kPublicNativeLibrariesExtensionConfigPrefixLen;
563 const size_t end = filename.size() - kPublicNativeLibrariesExtensionConfigSuffixLen;
564 const std::string company_name = filename.substr(start, end - start);
565 const std::string config_file_path = dirname + "/"s + filename;
566 LOG_ALWAYS_FATAL_IF(
567 company_name.empty(),
568 "Error extracting company name from public native library list file path \"%s\"",
569 config_file_path.c_str());
570
571 std::string error_msg;
572
573 LOG_ALWAYS_FATAL_IF(
574 !ReadConfig(
575 config_file_path, sonames,
576 [&company_name](const std::string& soname, std::string* error_msg) {
577 if (android::base::StartsWith(soname, "lib") &&
578 android::base::EndsWith(soname, "." + company_name + ".so")) {
579 return true;
580 } else {
581 *error_msg = "Library name \"" + soname +
582 "\" does not end with the company name: " + company_name + ".";
583 return false;
584 }
585 },
586 &error_msg),
587 "Error reading public native library list from \"%s\": %s", config_file_path.c_str(),
588 error_msg.c_str());
589 }
590 }
591 }
592 }
593
Victor Changf70a2fe2019-02-01 20:01:27 +0000594 /**
595 * Remove the public libs in runtime namespace
596 */
597 void removePublicLibsIfExistsInRuntimeApex(std::vector<std::string>& sonames) {
598 for (const std::string& lib_name : kRuntimePublicLibraries) {
599 std::string path(kRuntimeApexLibPath);
600 path.append("/").append(lib_name);
601
602 struct stat s;
603 // Do nothing if the path in /apex does not exist.
604 // Runtime APEX must be mounted since libnativeloader is in the same APEX
605 if (stat(path.c_str(), &s) != 0) {
606 continue;
607 }
608
609 auto it = std::find(sonames.begin(), sonames.end(), lib_name);
610 if (it != sonames.end()) {
611 sonames.erase(it);
612 }
613 }
614 }
Inseob Kim67cb0562018-05-04 11:39:12 +0900615
Christopher Ferris39da84b2016-06-21 16:11:23 -0700616 bool ReadConfig(const std::string& configFile, std::vector<std::string>* sonames,
Jiyong Parkd1006fe2017-11-08 18:44:09 +0900617 const std::function<bool(const std::string& /* soname */,
618 std::string* /* error_msg */)>& check_soname,
Christopher Ferris39da84b2016-06-21 16:11:23 -0700619 std::string* error_msg = nullptr) {
Dimitry Ivanov4b0e9632016-03-15 13:51:26 -0700620 // Read list of public native libraries from the config file.
621 std::string file_content;
Dimitry Ivanovb6140452016-04-06 18:24:08 -0700622 if(!base::ReadFileToString(configFile, &file_content)) {
Christopher Ferris39da84b2016-06-21 16:11:23 -0700623 if (error_msg) *error_msg = strerror(errno);
Dimitry Ivanovb6140452016-04-06 18:24:08 -0700624 return false;
625 }
Dimitry Ivanov4b0e9632016-03-15 13:51:26 -0700626
627 std::vector<std::string> lines = base::Split(file_content, "\n");
628
Christopher Ferris39da84b2016-06-21 16:11:23 -0700629 for (auto& line : lines) {
Dimitry Ivanov4b0e9632016-03-15 13:51:26 -0700630 auto trimmed_line = base::Trim(line);
631 if (trimmed_line[0] == '#' || trimmed_line.empty()) {
632 continue;
633 }
Christopher Ferris39da84b2016-06-21 16:11:23 -0700634 size_t space_pos = trimmed_line.rfind(' ');
635 if (space_pos != std::string::npos) {
636 std::string type = trimmed_line.substr(space_pos + 1);
637 if (type != "32" && type != "64") {
638 if (error_msg) *error_msg = "Malformed line: " + line;
639 return false;
640 }
641#if defined(__LP64__)
642 // Skip 32 bit public library.
643 if (type == "32") {
644 continue;
645 }
646#else
647 // Skip 64 bit public library.
648 if (type == "64") {
649 continue;
650 }
651#endif
652 trimmed_line.resize(space_pos);
653 }
Dimitry Ivanov4b0e9632016-03-15 13:51:26 -0700654
Jiyong Parkd1006fe2017-11-08 18:44:09 +0900655 if (check_soname(trimmed_line, error_msg)) {
656 sonames->push_back(trimmed_line);
657 } else {
658 return false;
659 }
Dimitry Ivanov4b0e9632016-03-15 13:51:26 -0700660 }
661
Dimitry Ivanovb6140452016-04-06 18:24:08 -0700662 return true;
Dimitry Ivanovd68c8e92016-02-10 14:09:22 -0800663 }
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800664
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800665 bool InitPublicNamespace(const char* library_path, std::string* error_msg) {
666 // Ask native bride if this apps library path should be handled by it
667 bool is_native_bridge = NativeBridgeIsPathSupported(library_path);
668
Dimitry Ivanov4b0e9632016-03-15 13:51:26 -0700669 // (http://b/25844435) - Some apps call dlopen from generated code (mono jited
670 // code is one example) unknown to linker in which case linker uses anonymous
671 // namespace. The second argument specifies the search path for the anonymous
672 // namespace which is the library_path of the classloader.
Dimitry Ivanov882cad22017-05-01 15:12:49 -0700673 initialized_ = android_init_anonymous_namespace(system_public_libraries_.c_str(),
Dimitry Ivanov26e1a842017-02-03 14:11:27 -0800674 is_native_bridge ? nullptr : library_path);
Dimitry Ivanovd836ab02016-11-02 18:03:10 -0700675 if (!initialized_) {
676 *error_msg = dlerror();
677 return false;
678 }
679
680 // and now initialize native bridge namespaces if necessary.
681 if (NativeBridgeInitialized()) {
Dimitry Ivanov882cad22017-05-01 15:12:49 -0700682 initialized_ = NativeBridgeInitAnonymousNamespace(system_public_libraries_.c_str(),
Zhenhua WANGe8fb11d2017-02-27 10:14:45 +0800683 is_native_bridge ? library_path : nullptr);
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800684 if (!initialized_) {
685 *error_msg = NativeBridgeGetError();
686 }
687 }
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800688
689 return initialized_;
690 }
691
Dimitry Ivanov24db75c2016-05-12 15:34:41 -0700692 jobject GetParentClassLoader(JNIEnv* env, jobject class_loader) {
693 jclass class_loader_class = env->FindClass("java/lang/ClassLoader");
694 jmethodID get_parent = env->GetMethodID(class_loader_class,
695 "getParent",
696 "()Ljava/lang/ClassLoader;");
697
698 return env->CallObjectMethod(class_loader, get_parent);
699 }
700
Victor Khimenko1443ec42018-07-09 17:01:22 +0200701 NativeLoaderNamespace* FindParentNamespaceByClassLoader(JNIEnv* env, jobject class_loader) {
Dimitry Ivanov24db75c2016-05-12 15:34:41 -0700702 jobject parent_class_loader = GetParentClassLoader(env, class_loader);
703
704 while (parent_class_loader != nullptr) {
Victor Khimenko1443ec42018-07-09 17:01:22 +0200705 NativeLoaderNamespace* ns;
706 if ((ns = FindNamespaceByClassLoader(env, parent_class_loader)) != nullptr) {
707 return ns;
Dimitry Ivanov24db75c2016-05-12 15:34:41 -0700708 }
709
710 parent_class_loader = GetParentClassLoader(env, parent_class_loader);
711 }
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800712
Victor Khimenko1443ec42018-07-09 17:01:22 +0200713 return nullptr;
Dimitry Ivanov24db75c2016-05-12 15:34:41 -0700714 }
715
Kiyoung Kim4639f692019-02-20 18:04:39 +0900716 ApkOrigin GetApkOriginFromDexPath(JNIEnv* env, jstring dex_path) {
717 ApkOrigin apk_origin = APK_ORIGIN_DEFAULT;
718
719 if (dex_path != nullptr) {
720 ScopedUtfChars dex_path_utf_chars(env, dex_path);
721
722 if (std::regex_search(dex_path_utf_chars.c_str(), kVendorDexPathRegex)) {
723 apk_origin = APK_ORIGIN_VENDOR;
724 }
725
726 if (std::regex_search(dex_path_utf_chars.c_str(), kProductDexPathRegex)) {
727 LOG_ALWAYS_FATAL_IF(apk_origin == APK_ORIGIN_VENDOR,
728 "Dex path contains both vendor and product partition : %s",
729 dex_path_utf_chars.c_str());
730
731 apk_origin = APK_ORIGIN_PRODUCT;
732 }
733 }
734
735 return apk_origin;
736 }
737
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800738 bool initialized_;
Victor Khimenko1443ec42018-07-09 17:01:22 +0200739 std::list<std::pair<jweak, NativeLoaderNamespace>> namespaces_;
Dimitry Ivanov882cad22017-05-01 15:12:49 -0700740 std::string system_public_libraries_;
Martin Stjernholmc57ed292019-04-25 16:20:32 +0100741 std::string runtime_public_libraries_;
Dimitry Ivanov882cad22017-05-01 15:12:49 -0700742 std::string vendor_public_libraries_;
Jiyong Parke0319942018-01-15 21:14:53 +0900743 std::string oem_public_libraries_;
Inseob Kim67cb0562018-05-04 11:39:12 +0900744 std::string product_public_libraries_;
Jiyong Parka07f3052017-08-22 10:26:10 +0900745 std::string system_llndk_libraries_;
746 std::string system_vndksp_libraries_;
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800747
748 DISALLOW_COPY_AND_ASSIGN(LibraryNamespaces);
749};
750
Dimitry Ivanov34d5a202016-02-29 13:21:43 -0800751static std::mutex g_namespaces_mutex;
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800752static LibraryNamespaces* g_namespaces = new LibraryNamespaces;
753#endif
754
Dimitry Ivanov4b0e9632016-03-15 13:51:26 -0700755void InitializeNativeLoader() {
Dimitry Ivanov426799d2016-02-22 11:27:48 -0800756#if defined(__ANDROID__)
Dimitry Ivanov34d5a202016-02-29 13:21:43 -0800757 std::lock_guard<std::mutex> guard(g_namespaces_mutex);
Dimitry Ivanov4b0e9632016-03-15 13:51:26 -0700758 g_namespaces->Initialize();
Dimitry Ivanov426799d2016-02-22 11:27:48 -0800759#endif
760}
761
Dimitry Ivanovbe4ca3a2016-05-02 10:43:16 -0700762void ResetNativeLoader() {
763#if defined(__ANDROID__)
764 std::lock_guard<std::mutex> guard(g_namespaces_mutex);
765 g_namespaces->Reset();
766#endif
767}
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800768
Kiyoung Kim4639f692019-02-20 18:04:39 +0900769jstring CreateClassLoaderNamespace(JNIEnv* env, int32_t target_sdk_version, jobject class_loader,
770 bool is_shared, jstring dex_path, jstring library_path,
Dimitry Ivanovd047c922016-02-23 14:23:51 -0800771 jstring permitted_path) {
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800772#if defined(__ANDROID__)
Dimitry Ivanov34d5a202016-02-29 13:21:43 -0800773 std::lock_guard<std::mutex> guard(g_namespaces_mutex);
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800774
775 std::string error_msg;
Kiyoung Kim4639f692019-02-20 18:04:39 +0900776 bool success = g_namespaces->Create(env, target_sdk_version, class_loader, is_shared, dex_path,
777 library_path, permitted_path, &error_msg) != nullptr;
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800778 if (!success) {
779 return env->NewStringUTF(error_msg.c_str());
Dimitry Ivanovd047c922016-02-23 14:23:51 -0800780 }
781#else
Kiyoung Kim4639f692019-02-20 18:04:39 +0900782 UNUSED(env, target_sdk_version, class_loader, is_shared, dex_path, library_path, permitted_path);
Dimitry Ivanovd047c922016-02-23 14:23:51 -0800783#endif
784 return nullptr;
785}
786
Nicolas Geoffray890e3bf2019-01-22 09:11:57 +0000787#if defined(__ANDROID__)
788static android_namespace_t* FindExportedNamespace(const char* caller_location) {
789 std::string location = caller_location;
790 // Lots of implicit assumptions here: we expect `caller_location` to be of the form:
791 // /apex/com.android...modulename/...
792 //
793 // And we extract from it 'modulename', which is the name of the linker namespace.
794 if (android::base::StartsWith(location, kApexPath)) {
795 size_t slash_index = location.find_first_of('/', strlen(kApexPath));
796 LOG_ALWAYS_FATAL_IF((slash_index == std::string::npos),
797 "Error finding namespace of apex: no slash in path %s", caller_location);
798 size_t dot_index = location.find_last_of('.', slash_index);
799 LOG_ALWAYS_FATAL_IF((dot_index == std::string::npos),
800 "Error finding namespace of apex: no dot in apex name %s", caller_location);
801 std::string name = location.substr(dot_index + 1, slash_index - dot_index - 1);
802 android_namespace_t* boot_namespace = android_get_exported_namespace(name.c_str());
803 LOG_ALWAYS_FATAL_IF((boot_namespace == nullptr),
804 "Error finding namespace of apex: no namespace called %s", name.c_str());
805 return boot_namespace;
806 }
807 return nullptr;
808}
809#endif
810
Nicolas Geoffrayc3a73dc2019-01-12 15:01:20 +0000811void* OpenNativeLibrary(JNIEnv* env, int32_t target_sdk_version, const char* path,
Nicolas Geoffray53535022019-01-18 10:05:13 +0000812 jobject class_loader, const char* caller_location, jstring library_path,
813 bool* needs_native_bridge, char** error_msg) {
Dimitry Ivanovd047c922016-02-23 14:23:51 -0800814#if defined(__ANDROID__)
Dimitry Ivanov5539db02016-04-20 16:07:30 -0700815 UNUSED(target_sdk_version);
816 if (class_loader == nullptr) {
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800817 *needs_native_bridge = false;
Nicolas Geoffray890e3bf2019-01-22 09:11:57 +0000818 if (caller_location != nullptr) {
819 android_namespace_t* boot_namespace = FindExportedNamespace(caller_location);
820 if (boot_namespace != nullptr) {
821 const android_dlextinfo dlextinfo = {
822 .flags = ANDROID_DLEXT_USE_NAMESPACE,
823 .library_namespace = boot_namespace,
824 };
825 void* handle = android_dlopen_ext(path, RTLD_NOW, &dlextinfo);
826 if (handle == nullptr) {
827 *error_msg = strdup(dlerror());
828 }
829 return handle;
830 }
831 }
Pete Bentley632f1422018-12-19 13:33:33 +0000832 void* handle = dlopen(path, RTLD_NOW);
833 if (handle == nullptr) {
Nicolas Geoffrayd06cb942019-01-16 20:20:27 +0000834 *error_msg = strdup(dlerror());
Pete Bentley632f1422018-12-19 13:33:33 +0000835 }
836 return handle;
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800837 }
838
Dimitry Ivanov34d5a202016-02-29 13:21:43 -0800839 std::lock_guard<std::mutex> guard(g_namespaces_mutex);
Victor Khimenko1443ec42018-07-09 17:01:22 +0200840 NativeLoaderNamespace* ns;
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800841
Victor Khimenko1443ec42018-07-09 17:01:22 +0200842 if ((ns = g_namespaces->FindNamespaceByClassLoader(env, class_loader)) == nullptr) {
Dimitry Ivanovd047c922016-02-23 14:23:51 -0800843 // This is the case where the classloader was not created by ApplicationLoaders
844 // In this case we create an isolated not-shared namespace for it.
Nicolas Geoffrayc3a73dc2019-01-12 15:01:20 +0000845 std::string create_error_msg;
846 if ((ns = g_namespaces->Create(env, target_sdk_version, class_loader, false /* is_shared */,
Kiyoung Kim4639f692019-02-20 18:04:39 +0900847 nullptr, library_path, nullptr, &create_error_msg)) == nullptr) {
Nicolas Geoffrayc3a73dc2019-01-12 15:01:20 +0000848 *error_msg = strdup(create_error_msg.c_str());
Dimitry Ivanovd047c922016-02-23 14:23:51 -0800849 return nullptr;
850 }
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800851 }
852
Nicolas Geoffrayc3a73dc2019-01-12 15:01:20 +0000853 return OpenNativeLibraryInNamespace(ns, path, needs_native_bridge, error_msg);
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800854#else
Nicolas Geoffray53535022019-01-18 10:05:13 +0000855 UNUSED(env, target_sdk_version, class_loader, caller_location);
Andreas Gampe5c7d5822017-12-28 19:08:13 -0800856
857 // Do some best effort to emulate library-path support. It will not
858 // work for dependencies.
859 //
860 // Note: null has a special meaning and must be preserved.
861 std::string c_library_path; // Empty string by default.
862 if (library_path != nullptr && path != nullptr && path[0] != '/') {
863 ScopedUtfChars library_path_utf_chars(env, library_path);
864 c_library_path = library_path_utf_chars.c_str();
865 }
866
867 std::vector<std::string> library_paths = base::Split(c_library_path, ":");
868
869 for (const std::string& lib_path : library_paths) {
870 *needs_native_bridge = false;
871 const char* path_arg;
872 std::string complete_path;
873 if (path == nullptr) {
874 // Preserve null.
875 path_arg = nullptr;
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800876 } else {
Andreas Gampe5c7d5822017-12-28 19:08:13 -0800877 complete_path = lib_path;
878 if (!complete_path.empty()) {
879 complete_path.append("/");
880 }
881 complete_path.append(path);
882 path_arg = complete_path.c_str();
883 }
884 void* handle = dlopen(path_arg, RTLD_NOW);
885 if (handle != nullptr) {
886 return handle;
887 }
888 if (NativeBridgeIsSupported(path_arg)) {
889 *needs_native_bridge = true;
890 handle = NativeBridgeLoadLibrary(path_arg, RTLD_NOW);
891 if (handle != nullptr) {
892 return handle;
893 }
Nicolas Geoffrayc3a73dc2019-01-12 15:01:20 +0000894 *error_msg = strdup(NativeBridgeGetError());
Andreas Gampe5c7d5822017-12-28 19:08:13 -0800895 } else {
Nicolas Geoffrayc3a73dc2019-01-12 15:01:20 +0000896 *error_msg = strdup(dlerror());
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800897 }
898 }
Andreas Gampe5c7d5822017-12-28 19:08:13 -0800899 return nullptr;
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800900#endif
901}
902
Nicolas Geoffrayc3a73dc2019-01-12 15:01:20 +0000903bool CloseNativeLibrary(void* handle, const bool needs_native_bridge, char** error_msg) {
dimitry3150f7c2018-09-12 01:09:19 +0200904 bool success;
905 if (needs_native_bridge) {
906 success = (NativeBridgeUnloadLibrary(handle) == 0);
907 if (!success) {
Nicolas Geoffrayc3a73dc2019-01-12 15:01:20 +0000908 *error_msg = strdup(NativeBridgeGetError());
dimitry3150f7c2018-09-12 01:09:19 +0200909 }
910 } else {
911 success = (dlclose(handle) == 0);
912 if (!success) {
Nicolas Geoffrayc3a73dc2019-01-12 15:01:20 +0000913 *error_msg = strdup(dlerror());
dimitry3150f7c2018-09-12 01:09:19 +0200914 }
915 }
916
917 return success;
Dimitry Ivanov09a516b2016-05-03 14:55:25 -0700918}
919
Nicolas Geoffrayc3a73dc2019-01-12 15:01:20 +0000920void NativeLoaderFreeErrorMessage(char* msg) {
921 // The error messages get allocated through strdup, so we must call free on them.
922 free(msg);
923}
924
Dimitry Ivanovf44ecde2016-02-22 13:48:22 -0800925#if defined(__ANDROID__)
Nicolas Geoffrayc3a73dc2019-01-12 15:01:20 +0000926void* OpenNativeLibraryInNamespace(NativeLoaderNamespace* ns, const char* path,
927 bool* needs_native_bridge, char** error_msg) {
Victor Khimenko1443ec42018-07-09 17:01:22 +0200928 if (ns->is_android_namespace()) {
929 android_dlextinfo extinfo;
930 extinfo.flags = ANDROID_DLEXT_USE_NAMESPACE;
931 extinfo.library_namespace = ns->get_android_ns();
932
933 void* handle = android_dlopen_ext(path, RTLD_NOW, &extinfo);
934 if (handle == nullptr) {
Nicolas Geoffrayc3a73dc2019-01-12 15:01:20 +0000935 *error_msg = strdup(dlerror());
Victor Khimenko1443ec42018-07-09 17:01:22 +0200936 }
937 *needs_native_bridge = false;
938 return handle;
939 } else {
940 void* handle = NativeBridgeLoadLibraryExt(path, RTLD_NOW, ns->get_native_bridge_ns());
941 if (handle == nullptr) {
Nicolas Geoffrayc3a73dc2019-01-12 15:01:20 +0000942 *error_msg = strdup(NativeBridgeGetError());
Victor Khimenko1443ec42018-07-09 17:01:22 +0200943 }
944 *needs_native_bridge = true;
945 return handle;
946 }
947}
948
Dimitry Ivanov800083d2016-11-01 14:17:00 -0700949// native_bridge_namespaces are not supported for callers of this function.
950// This function will return nullptr in the case when application is running
951// on native bridge.
Dimitry Ivanovf44ecde2016-02-22 13:48:22 -0800952android_namespace_t* FindNamespaceByClassLoader(JNIEnv* env, jobject class_loader) {
Dimitry Ivanov34d5a202016-02-29 13:21:43 -0800953 std::lock_guard<std::mutex> guard(g_namespaces_mutex);
Victor Khimenko1443ec42018-07-09 17:01:22 +0200954 NativeLoaderNamespace* ns = g_namespaces->FindNamespaceByClassLoader(env, class_loader);
955 if (ns != nullptr) {
956 return ns->is_android_namespace() ? ns->get_android_ns() : nullptr;
Zhenhua WANGf2804e52016-05-30 11:16:08 +0800957 }
958
959 return nullptr;
Dimitry Ivanovf44ecde2016-02-22 13:48:22 -0800960}
Victor Khimenko1443ec42018-07-09 17:01:22 +0200961NativeLoaderNamespace* FindNativeLoaderNamespaceByClassLoader(JNIEnv* env, jobject class_loader) {
962 std::lock_guard<std::mutex> guard(g_namespaces_mutex);
963 return g_namespaces->FindNamespaceByClassLoader(env, class_loader);
964}
Dimitry Ivanovf44ecde2016-02-22 13:48:22 -0800965#endif
966
Dimitry Ivanovac1b1912015-12-01 13:56:44 -0800967}; // android namespace