patchoat.cc revision 208a5cb383dd9dcd3461f89b74af5df67dc8d794
1/* 2 * Copyright (C) 2014 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16#include "patchoat.h" 17 18#include <stdio.h> 19#include <stdlib.h> 20#include <sys/file.h> 21#include <sys/stat.h> 22#include <unistd.h> 23 24#include <string> 25#include <vector> 26 27#include "art_field-inl.h" 28#include "art_method-inl.h" 29#include "base/dumpable.h" 30#include "base/scoped_flock.h" 31#include "base/stringpiece.h" 32#include "base/stringprintf.h" 33#include "base/unix_file/fd_file.h" 34#include "elf_utils.h" 35#include "elf_file.h" 36#include "elf_file_impl.h" 37#include "gc/space/image_space.h" 38#include "image.h" 39#include "mirror/abstract_method.h" 40#include "mirror/object-inl.h" 41#include "mirror/method.h" 42#include "mirror/reference.h" 43#include "noop_compiler_callbacks.h" 44#include "offsets.h" 45#include "os.h" 46#include "runtime.h" 47#include "scoped_thread_state_change.h" 48#include "thread.h" 49#include "utils.h" 50 51namespace art { 52 53static bool LocationToFilename(const std::string& location, InstructionSet isa, 54 std::string* filename) { 55 bool has_system = false; 56 bool has_cache = false; 57 // image_location = /system/framework/boot.art 58 // system_image_filename = /system/framework/<image_isa>/boot.art 59 std::string system_filename(GetSystemImageFilename(location.c_str(), isa)); 60 if (OS::FileExists(system_filename.c_str())) { 61 has_system = true; 62 } 63 64 bool have_android_data = false; 65 bool dalvik_cache_exists = false; 66 bool is_global_cache = false; 67 std::string dalvik_cache; 68 GetDalvikCache(GetInstructionSetString(isa), false, &dalvik_cache, 69 &have_android_data, &dalvik_cache_exists, &is_global_cache); 70 71 std::string cache_filename; 72 if (have_android_data && dalvik_cache_exists) { 73 // Always set output location even if it does not exist, 74 // so that the caller knows where to create the image. 75 // 76 // image_location = /system/framework/boot.art 77 // *image_filename = /data/dalvik-cache/<image_isa>/boot.art 78 std::string error_msg; 79 if (GetDalvikCacheFilename(location.c_str(), dalvik_cache.c_str(), 80 &cache_filename, &error_msg)) { 81 has_cache = true; 82 } 83 } 84 if (has_system) { 85 *filename = system_filename; 86 return true; 87 } else if (has_cache) { 88 *filename = cache_filename; 89 return true; 90 } else { 91 return false; 92 } 93} 94 95static const OatHeader* GetOatHeader(const ElfFile* elf_file) { 96 uint64_t off = 0; 97 if (!elf_file->GetSectionOffsetAndSize(".rodata", &off, nullptr)) { 98 return nullptr; 99 } 100 101 OatHeader* oat_header = reinterpret_cast<OatHeader*>(elf_file->Begin() + off); 102 return oat_header; 103} 104 105// This function takes an elf file and reads the current patch delta value 106// encoded in its oat header value 107static bool ReadOatPatchDelta(const ElfFile* elf_file, off_t* delta, std::string* error_msg) { 108 const OatHeader* oat_header = GetOatHeader(elf_file); 109 if (oat_header == nullptr) { 110 *error_msg = "Unable to get oat header from elf file."; 111 return false; 112 } 113 if (!oat_header->IsValid()) { 114 *error_msg = "Elf file has an invalid oat header"; 115 return false; 116 } 117 *delta = oat_header->GetImagePatchDelta(); 118 return true; 119} 120 121bool PatchOat::Patch(const std::string& image_location, off_t delta, 122 File* output_image, InstructionSet isa, 123 TimingLogger* timings) { 124 CHECK(Runtime::Current() == nullptr); 125 CHECK(output_image != nullptr); 126 CHECK_GE(output_image->Fd(), 0); 127 CHECK(!image_location.empty()) << "image file must have a filename."; 128 CHECK_NE(isa, kNone); 129 130 TimingLogger::ScopedTiming t("Runtime Setup", timings); 131 const char *isa_name = GetInstructionSetString(isa); 132 std::string image_filename; 133 if (!LocationToFilename(image_location, isa, &image_filename)) { 134 LOG(ERROR) << "Unable to find image at location " << image_location; 135 return false; 136 } 137 std::unique_ptr<File> input_image(OS::OpenFileForReading(image_filename.c_str())); 138 if (input_image.get() == nullptr) { 139 LOG(ERROR) << "unable to open input image file at " << image_filename 140 << " for location " << image_location; 141 return false; 142 } 143 144 int64_t image_len = input_image->GetLength(); 145 if (image_len < 0) { 146 LOG(ERROR) << "Error while getting image length"; 147 return false; 148 } 149 ImageHeader image_header; 150 if (sizeof(image_header) != input_image->Read(reinterpret_cast<char*>(&image_header), 151 sizeof(image_header), 0)) { 152 LOG(ERROR) << "Unable to read image header from image file " << input_image->GetPath(); 153 return false; 154 } 155 156 /*bool is_image_pic = */IsImagePic(image_header, input_image->GetPath()); 157 // Nothing special to do right now since the image always needs to get patched. 158 // Perhaps in some far-off future we may have images with relative addresses that are true-PIC. 159 160 // Set up the runtime 161 RuntimeOptions options; 162 NoopCompilerCallbacks callbacks; 163 options.push_back(std::make_pair("compilercallbacks", &callbacks)); 164 std::string img = "-Ximage:" + image_location; 165 options.push_back(std::make_pair(img.c_str(), nullptr)); 166 options.push_back(std::make_pair("imageinstructionset", reinterpret_cast<const void*>(isa_name))); 167 options.push_back(std::make_pair("-Xno-sig-chain", nullptr)); 168 if (!Runtime::Create(options, false)) { 169 LOG(ERROR) << "Unable to initialize runtime"; 170 return false; 171 } 172 // Runtime::Create acquired the mutator_lock_ that is normally given away when we Runtime::Start, 173 // give it away now and then switch to a more manageable ScopedObjectAccess. 174 Thread::Current()->TransitionFromRunnableToSuspended(kNative); 175 ScopedObjectAccess soa(Thread::Current()); 176 177 t.NewTiming("Image and oat Patching setup"); 178 // Create the map where we will write the image patches to. 179 std::string error_msg; 180 std::unique_ptr<MemMap> image(MemMap::MapFile(image_len, 181 PROT_READ | PROT_WRITE, 182 MAP_PRIVATE, 183 input_image->Fd(), 184 0, 185 /*low_4gb*/false, 186 input_image->GetPath().c_str(), 187 &error_msg)); 188 if (image.get() == nullptr) { 189 LOG(ERROR) << "unable to map image file " << input_image->GetPath() << " : " << error_msg; 190 return false; 191 } 192 gc::space::ImageSpace* ispc = Runtime::Current()->GetHeap()->GetBootImageSpace(); 193 194 PatchOat p(isa, image.release(), ispc->GetLiveBitmap(), ispc->GetMemMap(), delta, timings); 195 t.NewTiming("Patching files"); 196 if (!p.PatchImage()) { 197 LOG(ERROR) << "Failed to patch image file " << input_image->GetPath(); 198 return false; 199 } 200 201 t.NewTiming("Writing files"); 202 if (!p.WriteImage(output_image)) { 203 return false; 204 } 205 return true; 206} 207 208bool PatchOat::Patch(File* input_oat, const std::string& image_location, off_t delta, 209 File* output_oat, File* output_image, InstructionSet isa, 210 TimingLogger* timings, 211 bool output_oat_opened_from_fd, 212 bool new_oat_out) { 213 CHECK(Runtime::Current() == nullptr); 214 CHECK(output_image != nullptr); 215 CHECK_GE(output_image->Fd(), 0); 216 CHECK(input_oat != nullptr); 217 CHECK(output_oat != nullptr); 218 CHECK_GE(input_oat->Fd(), 0); 219 CHECK_GE(output_oat->Fd(), 0); 220 CHECK(!image_location.empty()) << "image file must have a filename."; 221 222 TimingLogger::ScopedTiming t("Runtime Setup", timings); 223 224 if (isa == kNone) { 225 Elf32_Ehdr elf_hdr; 226 if (sizeof(elf_hdr) != input_oat->Read(reinterpret_cast<char*>(&elf_hdr), sizeof(elf_hdr), 0)) { 227 LOG(ERROR) << "unable to read elf header"; 228 return false; 229 } 230 isa = GetInstructionSetFromELF(elf_hdr.e_machine, elf_hdr.e_flags); 231 } 232 const char* isa_name = GetInstructionSetString(isa); 233 std::string image_filename; 234 if (!LocationToFilename(image_location, isa, &image_filename)) { 235 LOG(ERROR) << "Unable to find image at location " << image_location; 236 return false; 237 } 238 std::unique_ptr<File> input_image(OS::OpenFileForReading(image_filename.c_str())); 239 if (input_image.get() == nullptr) { 240 LOG(ERROR) << "unable to open input image file at " << image_filename 241 << " for location " << image_location; 242 return false; 243 } 244 int64_t image_len = input_image->GetLength(); 245 if (image_len < 0) { 246 LOG(ERROR) << "Error while getting image length"; 247 return false; 248 } 249 ImageHeader image_header; 250 if (sizeof(image_header) != input_image->Read(reinterpret_cast<char*>(&image_header), 251 sizeof(image_header), 0)) { 252 LOG(ERROR) << "Unable to read image header from image file " << input_image->GetPath(); 253 } 254 255 /*bool is_image_pic = */IsImagePic(image_header, input_image->GetPath()); 256 // Nothing special to do right now since the image always needs to get patched. 257 // Perhaps in some far-off future we may have images with relative addresses that are true-PIC. 258 259 // Set up the runtime 260 RuntimeOptions options; 261 NoopCompilerCallbacks callbacks; 262 options.push_back(std::make_pair("compilercallbacks", &callbacks)); 263 std::string img = "-Ximage:" + image_location; 264 options.push_back(std::make_pair(img.c_str(), nullptr)); 265 options.push_back(std::make_pair("imageinstructionset", reinterpret_cast<const void*>(isa_name))); 266 options.push_back(std::make_pair("-Xno-sig-chain", nullptr)); 267 if (!Runtime::Create(options, false)) { 268 LOG(ERROR) << "Unable to initialize runtime"; 269 return false; 270 } 271 // Runtime::Create acquired the mutator_lock_ that is normally given away when we Runtime::Start, 272 // give it away now and then switch to a more manageable ScopedObjectAccess. 273 Thread::Current()->TransitionFromRunnableToSuspended(kNative); 274 ScopedObjectAccess soa(Thread::Current()); 275 276 t.NewTiming("Image and oat Patching setup"); 277 // Create the map where we will write the image patches to. 278 std::string error_msg; 279 std::unique_ptr<MemMap> image(MemMap::MapFile(image_len, 280 PROT_READ | PROT_WRITE, 281 MAP_PRIVATE, 282 input_image->Fd(), 283 0, 284 /*low_4gb*/false, 285 input_image->GetPath().c_str(), 286 &error_msg)); 287 if (image.get() == nullptr) { 288 LOG(ERROR) << "unable to map image file " << input_image->GetPath() << " : " << error_msg; 289 return false; 290 } 291 gc::space::ImageSpace* ispc = Runtime::Current()->GetHeap()->GetBootImageSpace(); 292 293 std::unique_ptr<ElfFile> elf(ElfFile::Open(input_oat, 294 PROT_READ | PROT_WRITE, MAP_PRIVATE, &error_msg)); 295 if (elf.get() == nullptr) { 296 LOG(ERROR) << "unable to open oat file " << input_oat->GetPath() << " : " << error_msg; 297 return false; 298 } 299 300 bool skip_patching_oat = false; 301 MaybePic is_oat_pic = IsOatPic(elf.get()); 302 if (is_oat_pic >= ERROR_FIRST) { 303 // Error logged by IsOatPic 304 return false; 305 } else if (is_oat_pic == PIC) { 306 // Do not need to do ELF-file patching. Create a symlink and skip the ELF patching. 307 if (!ReplaceOatFileWithSymlink(input_oat->GetPath(), 308 output_oat->GetPath(), 309 output_oat_opened_from_fd, 310 new_oat_out)) { 311 // Errors already logged by above call. 312 return false; 313 } 314 // Don't patch the OAT, since we just symlinked it. Image still needs patching. 315 skip_patching_oat = true; 316 } else { 317 CHECK(is_oat_pic == NOT_PIC); 318 } 319 320 PatchOat p(isa, elf.release(), image.release(), ispc->GetLiveBitmap(), ispc->GetMemMap(), 321 delta, timings); 322 t.NewTiming("Patching files"); 323 if (!skip_patching_oat && !p.PatchElf()) { 324 LOG(ERROR) << "Failed to patch oat file " << input_oat->GetPath(); 325 return false; 326 } 327 if (!p.PatchImage()) { 328 LOG(ERROR) << "Failed to patch image file " << input_image->GetPath(); 329 return false; 330 } 331 332 t.NewTiming("Writing files"); 333 if (!skip_patching_oat && !p.WriteElf(output_oat)) { 334 LOG(ERROR) << "Failed to write oat file " << input_oat->GetPath(); 335 return false; 336 } 337 if (!p.WriteImage(output_image)) { 338 LOG(ERROR) << "Failed to write image file " << input_image->GetPath(); 339 return false; 340 } 341 return true; 342} 343 344bool PatchOat::WriteElf(File* out) { 345 TimingLogger::ScopedTiming t("Writing Elf File", timings_); 346 347 CHECK(oat_file_.get() != nullptr); 348 CHECK(out != nullptr); 349 size_t expect = oat_file_->Size(); 350 if (out->WriteFully(reinterpret_cast<char*>(oat_file_->Begin()), expect) && 351 out->SetLength(expect) == 0) { 352 return true; 353 } else { 354 LOG(ERROR) << "Writing to oat file " << out->GetPath() << " failed."; 355 return false; 356 } 357} 358 359bool PatchOat::WriteImage(File* out) { 360 TimingLogger::ScopedTiming t("Writing image File", timings_); 361 std::string error_msg; 362 363 ScopedFlock img_flock; 364 img_flock.Init(out, &error_msg); 365 366 CHECK(image_ != nullptr); 367 CHECK(out != nullptr); 368 size_t expect = image_->Size(); 369 if (out->WriteFully(reinterpret_cast<char*>(image_->Begin()), expect) && 370 out->SetLength(expect) == 0) { 371 return true; 372 } else { 373 LOG(ERROR) << "Writing to image file " << out->GetPath() << " failed."; 374 return false; 375 } 376} 377 378bool PatchOat::IsImagePic(const ImageHeader& image_header, const std::string& image_path) { 379 if (!image_header.CompilePic()) { 380 if (kIsDebugBuild) { 381 LOG(INFO) << "image at location " << image_path << " was *not* compiled pic"; 382 } 383 return false; 384 } 385 386 if (kIsDebugBuild) { 387 LOG(INFO) << "image at location " << image_path << " was compiled PIC"; 388 } 389 390 return true; 391} 392 393PatchOat::MaybePic PatchOat::IsOatPic(const ElfFile* oat_in) { 394 if (oat_in == nullptr) { 395 LOG(ERROR) << "No ELF input oat fie available"; 396 return ERROR_OAT_FILE; 397 } 398 399 const std::string& file_path = oat_in->GetFile().GetPath(); 400 401 const OatHeader* oat_header = GetOatHeader(oat_in); 402 if (oat_header == nullptr) { 403 LOG(ERROR) << "Failed to find oat header in oat file " << file_path; 404 return ERROR_OAT_FILE; 405 } 406 407 if (!oat_header->IsValid()) { 408 LOG(ERROR) << "Elf file " << file_path << " has an invalid oat header"; 409 return ERROR_OAT_FILE; 410 } 411 412 bool is_pic = oat_header->IsPic(); 413 if (kIsDebugBuild) { 414 LOG(INFO) << "Oat file at " << file_path << " is " << (is_pic ? "PIC" : "not pic"); 415 } 416 417 return is_pic ? PIC : NOT_PIC; 418} 419 420bool PatchOat::ReplaceOatFileWithSymlink(const std::string& input_oat_filename, 421 const std::string& output_oat_filename, 422 bool output_oat_opened_from_fd, 423 bool new_oat_out) { 424 // Need a file when we are PIC, since we symlink over it. Refusing to symlink into FD. 425 if (output_oat_opened_from_fd) { 426 // TODO: installd uses --output-oat-fd. Should we change class linking logic for PIC? 427 LOG(ERROR) << "No output oat filename specified, needs filename for when we are PIC"; 428 return false; 429 } 430 431 // Image was PIC. Create symlink where the oat is supposed to go. 432 if (!new_oat_out) { 433 LOG(ERROR) << "Oat file " << output_oat_filename << " already exists, refusing to overwrite"; 434 return false; 435 } 436 437 // Delete the original file, since we won't need it. 438 TEMP_FAILURE_RETRY(unlink(output_oat_filename.c_str())); 439 440 // Create a symlink from the old oat to the new oat 441 if (symlink(input_oat_filename.c_str(), output_oat_filename.c_str()) < 0) { 442 int err = errno; 443 LOG(ERROR) << "Failed to create symlink at " << output_oat_filename 444 << " error(" << err << "): " << strerror(err); 445 return false; 446 } 447 448 if (kIsDebugBuild) { 449 LOG(INFO) << "Created symlink " << output_oat_filename << " -> " << input_oat_filename; 450 } 451 452 return true; 453} 454 455class PatchOatArtFieldVisitor : public ArtFieldVisitor { 456 public: 457 explicit PatchOatArtFieldVisitor(PatchOat* patch_oat) : patch_oat_(patch_oat) {} 458 459 void Visit(ArtField* field) OVERRIDE SHARED_REQUIRES(Locks::mutator_lock_) { 460 ArtField* const dest = patch_oat_->RelocatedCopyOf(field); 461 dest->SetDeclaringClass(patch_oat_->RelocatedAddressOfPointer(field->GetDeclaringClass())); 462 } 463 464 private: 465 PatchOat* const patch_oat_; 466}; 467 468void PatchOat::PatchArtFields(const ImageHeader* image_header) { 469 PatchOatArtFieldVisitor visitor(this); 470 const auto& section = image_header->GetImageSection(ImageHeader::kSectionArtFields); 471 section.VisitPackedArtFields(&visitor, heap_->Begin()); 472} 473 474class PatchOatArtMethodVisitor : public ArtMethodVisitor { 475 public: 476 explicit PatchOatArtMethodVisitor(PatchOat* patch_oat) : patch_oat_(patch_oat) {} 477 478 void Visit(ArtMethod* method) OVERRIDE SHARED_REQUIRES(Locks::mutator_lock_) { 479 ArtMethod* const dest = patch_oat_->RelocatedCopyOf(method); 480 patch_oat_->FixupMethod(method, dest); 481 } 482 483 private: 484 PatchOat* const patch_oat_; 485}; 486 487void PatchOat::PatchArtMethods(const ImageHeader* image_header) { 488 const auto& section = image_header->GetMethodsSection(); 489 const size_t pointer_size = InstructionSetPointerSize(isa_); 490 PatchOatArtMethodVisitor visitor(this); 491 section.VisitPackedArtMethods(&visitor, heap_->Begin(), pointer_size); 492} 493 494class FixupRootVisitor : public RootVisitor { 495 public: 496 explicit FixupRootVisitor(const PatchOat* patch_oat) : patch_oat_(patch_oat) { 497 } 498 499 void VisitRoots(mirror::Object*** roots, size_t count, const RootInfo& info ATTRIBUTE_UNUSED) 500 OVERRIDE SHARED_REQUIRES(Locks::mutator_lock_) { 501 for (size_t i = 0; i < count; ++i) { 502 *roots[i] = patch_oat_->RelocatedAddressOfPointer(*roots[i]); 503 } 504 } 505 506 void VisitRoots(mirror::CompressedReference<mirror::Object>** roots, size_t count, 507 const RootInfo& info ATTRIBUTE_UNUSED) 508 OVERRIDE SHARED_REQUIRES(Locks::mutator_lock_) { 509 for (size_t i = 0; i < count; ++i) { 510 roots[i]->Assign(patch_oat_->RelocatedAddressOfPointer(roots[i]->AsMirrorPtr())); 511 } 512 } 513 514 private: 515 const PatchOat* const patch_oat_; 516}; 517 518void PatchOat::PatchInternedStrings(const ImageHeader* image_header) { 519 const auto& section = image_header->GetImageSection(ImageHeader::kSectionInternedStrings); 520 InternTable temp_table; 521 // Note that we require that ReadFromMemory does not make an internal copy of the elements. 522 // This also relies on visit roots not doing any verification which could fail after we update 523 // the roots to be the image addresses. 524 temp_table.ReadFromMemory(image_->Begin() + section.Offset()); 525 FixupRootVisitor visitor(this); 526 temp_table.VisitRoots(&visitor, kVisitRootFlagAllRoots); 527} 528 529void PatchOat::PatchClassTable(const ImageHeader* image_header) { 530 const auto& section = image_header->GetImageSection(ImageHeader::kSectionClassTable); 531 // ClassTable temp_table; 532 // Note that we require that ReadFromMemory does not make an internal copy of the elements. 533 // This also relies on visit roots not doing any verification which could fail after we update 534 // the roots to be the image addresses. 535 WriterMutexLock mu(Thread::Current(), *Locks::classlinker_classes_lock_); 536 ClassTable temp_table; 537 temp_table.ReadFromMemory(image_->Begin() + section.Offset()); 538 FixupRootVisitor visitor(this); 539 BufferedRootVisitor<kDefaultBufferedRootCount> buffered_visitor(&visitor, RootInfo(kRootUnknown)); 540 temp_table.VisitRoots(buffered_visitor); 541} 542 543 544class RelocatedPointerVisitor { 545 public: 546 explicit RelocatedPointerVisitor(PatchOat* patch_oat) : patch_oat_(patch_oat) {} 547 548 template <typename T> 549 T* operator()(T* ptr) const { 550 return patch_oat_->RelocatedAddressOfPointer(ptr); 551 } 552 553 private: 554 PatchOat* const patch_oat_; 555}; 556 557void PatchOat::PatchDexFileArrays(mirror::ObjectArray<mirror::Object>* img_roots) { 558 auto* dex_caches = down_cast<mirror::ObjectArray<mirror::DexCache>*>( 559 img_roots->Get(ImageHeader::kDexCaches)); 560 const size_t pointer_size = InstructionSetPointerSize(isa_); 561 for (size_t i = 0, count = dex_caches->GetLength(); i < count; ++i) { 562 auto* orig_dex_cache = dex_caches->GetWithoutChecks(i); 563 auto* copy_dex_cache = RelocatedCopyOf(orig_dex_cache); 564 // Though the DexCache array fields are usually treated as native pointers, we set the full 565 // 64-bit values here, clearing the top 32 bits for 32-bit targets. The zero-extension is 566 // done by casting to the unsigned type uintptr_t before casting to int64_t, i.e. 567 // static_cast<int64_t>(reinterpret_cast<uintptr_t>(image_begin_ + offset))). 568 GcRoot<mirror::String>* orig_strings = orig_dex_cache->GetStrings(); 569 GcRoot<mirror::String>* relocated_strings = RelocatedAddressOfPointer(orig_strings); 570 copy_dex_cache->SetField64<false>( 571 mirror::DexCache::StringsOffset(), 572 static_cast<int64_t>(reinterpret_cast<uintptr_t>(relocated_strings))); 573 if (orig_strings != nullptr) { 574 orig_dex_cache->FixupStrings(RelocatedCopyOf(orig_strings), RelocatedPointerVisitor(this)); 575 } 576 GcRoot<mirror::Class>* orig_types = orig_dex_cache->GetResolvedTypes(); 577 GcRoot<mirror::Class>* relocated_types = RelocatedAddressOfPointer(orig_types); 578 copy_dex_cache->SetField64<false>( 579 mirror::DexCache::ResolvedTypesOffset(), 580 static_cast<int64_t>(reinterpret_cast<uintptr_t>(relocated_types))); 581 if (orig_types != nullptr) { 582 orig_dex_cache->FixupResolvedTypes(RelocatedCopyOf(orig_types), 583 RelocatedPointerVisitor(this)); 584 } 585 ArtMethod** orig_methods = orig_dex_cache->GetResolvedMethods(); 586 ArtMethod** relocated_methods = RelocatedAddressOfPointer(orig_methods); 587 copy_dex_cache->SetField64<false>( 588 mirror::DexCache::ResolvedMethodsOffset(), 589 static_cast<int64_t>(reinterpret_cast<uintptr_t>(relocated_methods))); 590 if (orig_methods != nullptr) { 591 ArtMethod** copy_methods = RelocatedCopyOf(orig_methods); 592 for (size_t j = 0, num = orig_dex_cache->NumResolvedMethods(); j != num; ++j) { 593 ArtMethod* orig = mirror::DexCache::GetElementPtrSize(orig_methods, j, pointer_size); 594 ArtMethod* copy = RelocatedAddressOfPointer(orig); 595 mirror::DexCache::SetElementPtrSize(copy_methods, j, copy, pointer_size); 596 } 597 } 598 ArtField** orig_fields = orig_dex_cache->GetResolvedFields(); 599 ArtField** relocated_fields = RelocatedAddressOfPointer(orig_fields); 600 copy_dex_cache->SetField64<false>( 601 mirror::DexCache::ResolvedFieldsOffset(), 602 static_cast<int64_t>(reinterpret_cast<uintptr_t>(relocated_fields))); 603 if (orig_fields != nullptr) { 604 ArtField** copy_fields = RelocatedCopyOf(orig_fields); 605 for (size_t j = 0, num = orig_dex_cache->NumResolvedFields(); j != num; ++j) { 606 ArtField* orig = mirror::DexCache::GetElementPtrSize(orig_fields, j, pointer_size); 607 ArtField* copy = RelocatedAddressOfPointer(orig); 608 mirror::DexCache::SetElementPtrSize(copy_fields, j, copy, pointer_size); 609 } 610 } 611 } 612} 613 614bool PatchOat::PatchImage() { 615 ImageHeader* image_header = reinterpret_cast<ImageHeader*>(image_->Begin()); 616 CHECK_GT(image_->Size(), sizeof(ImageHeader)); 617 // These are the roots from the original file. 618 auto* img_roots = image_header->GetImageRoots(); 619 image_header->RelocateImage(delta_); 620 621 PatchArtFields(image_header); 622 PatchArtMethods(image_header); 623 PatchInternedStrings(image_header); 624 PatchClassTable(image_header); 625 // Patch dex file int/long arrays which point to ArtFields. 626 PatchDexFileArrays(img_roots); 627 628 VisitObject(img_roots); 629 if (!image_header->IsValid()) { 630 LOG(ERROR) << "reloction renders image header invalid"; 631 return false; 632 } 633 634 { 635 TimingLogger::ScopedTiming t("Walk Bitmap", timings_); 636 // Walk the bitmap. 637 WriterMutexLock mu(Thread::Current(), *Locks::heap_bitmap_lock_); 638 bitmap_->Walk(PatchOat::BitmapCallback, this); 639 } 640 return true; 641} 642 643bool PatchOat::InHeap(mirror::Object* o) { 644 uintptr_t begin = reinterpret_cast<uintptr_t>(heap_->Begin()); 645 uintptr_t end = reinterpret_cast<uintptr_t>(heap_->End()); 646 uintptr_t obj = reinterpret_cast<uintptr_t>(o); 647 return o == nullptr || (begin <= obj && obj < end); 648} 649 650void PatchOat::PatchVisitor::operator() (mirror::Object* obj, MemberOffset off, 651 bool is_static_unused ATTRIBUTE_UNUSED) const { 652 mirror::Object* referent = obj->GetFieldObject<mirror::Object, kVerifyNone>(off); 653 DCHECK(patcher_->InHeap(referent)) << "Referent is not in the heap."; 654 mirror::Object* moved_object = patcher_->RelocatedAddressOfPointer(referent); 655 copy_->SetFieldObjectWithoutWriteBarrier<false, true, kVerifyNone>(off, moved_object); 656} 657 658void PatchOat::PatchVisitor::operator() (mirror::Class* cls ATTRIBUTE_UNUSED, 659 mirror::Reference* ref) const { 660 MemberOffset off = mirror::Reference::ReferentOffset(); 661 mirror::Object* referent = ref->GetReferent(); 662 DCHECK(patcher_->InHeap(referent)) << "Referent is not in the heap."; 663 mirror::Object* moved_object = patcher_->RelocatedAddressOfPointer(referent); 664 copy_->SetFieldObjectWithoutWriteBarrier<false, true, kVerifyNone>(off, moved_object); 665} 666 667// Called by BitmapCallback 668void PatchOat::VisitObject(mirror::Object* object) { 669 mirror::Object* copy = RelocatedCopyOf(object); 670 CHECK(copy != nullptr); 671 if (kUseBakerOrBrooksReadBarrier) { 672 object->AssertReadBarrierPointer(); 673 if (kUseBrooksReadBarrier) { 674 mirror::Object* moved_to = RelocatedAddressOfPointer(object); 675 copy->SetReadBarrierPointer(moved_to); 676 DCHECK_EQ(copy->GetReadBarrierPointer(), moved_to); 677 } 678 } 679 PatchOat::PatchVisitor visitor(this, copy); 680 object->VisitReferences<kVerifyNone>(visitor, visitor); 681 if (object->IsClass<kVerifyNone>()) { 682 const size_t pointer_size = InstructionSetPointerSize(isa_); 683 mirror::Class* klass = object->AsClass(); 684 mirror::Class* copy_klass = down_cast<mirror::Class*>(copy); 685 RelocatedPointerVisitor native_visitor(this); 686 klass->FixupNativePointers(copy_klass, pointer_size, native_visitor); 687 auto* vtable = klass->GetVTable(); 688 if (vtable != nullptr) { 689 vtable->Fixup(RelocatedCopyOf(vtable), pointer_size, native_visitor); 690 } 691 auto* iftable = klass->GetIfTable(); 692 if (iftable != nullptr) { 693 for (int32_t i = 0; i < klass->GetIfTableCount(); ++i) { 694 if (iftable->GetMethodArrayCount(i) > 0) { 695 auto* method_array = iftable->GetMethodArray(i); 696 CHECK(method_array != nullptr); 697 method_array->Fixup(RelocatedCopyOf(method_array), pointer_size, native_visitor); 698 } 699 } 700 } 701 } else if (object->GetClass() == mirror::Method::StaticClass() || 702 object->GetClass() == mirror::Constructor::StaticClass()) { 703 // Need to go update the ArtMethod. 704 auto* dest = down_cast<mirror::AbstractMethod*>(copy); 705 auto* src = down_cast<mirror::AbstractMethod*>(object); 706 dest->SetArtMethod(RelocatedAddressOfPointer(src->GetArtMethod())); 707 } 708} 709 710void PatchOat::FixupMethod(ArtMethod* object, ArtMethod* copy) { 711 const size_t pointer_size = InstructionSetPointerSize(isa_); 712 copy->CopyFrom(object, pointer_size); 713 // Just update the entry points if it looks like we should. 714 // TODO: sanity check all the pointers' values 715 copy->SetDeclaringClass(RelocatedAddressOfPointer(object->GetDeclaringClass())); 716 copy->SetDexCacheResolvedMethods( 717 RelocatedAddressOfPointer(object->GetDexCacheResolvedMethods(pointer_size)), pointer_size); 718 copy->SetDexCacheResolvedTypes( 719 RelocatedAddressOfPointer(object->GetDexCacheResolvedTypes(pointer_size)), pointer_size); 720 copy->SetEntryPointFromQuickCompiledCodePtrSize(RelocatedAddressOfPointer( 721 object->GetEntryPointFromQuickCompiledCodePtrSize(pointer_size)), pointer_size); 722 copy->SetEntryPointFromJniPtrSize(RelocatedAddressOfPointer( 723 object->GetEntryPointFromJniPtrSize(pointer_size)), pointer_size); 724} 725 726bool PatchOat::Patch(File* input_oat, off_t delta, File* output_oat, TimingLogger* timings, 727 bool output_oat_opened_from_fd, bool new_oat_out) { 728 CHECK(input_oat != nullptr); 729 CHECK(output_oat != nullptr); 730 CHECK_GE(input_oat->Fd(), 0); 731 CHECK_GE(output_oat->Fd(), 0); 732 TimingLogger::ScopedTiming t("Setup Oat File Patching", timings); 733 734 std::string error_msg; 735 std::unique_ptr<ElfFile> elf(ElfFile::Open(input_oat, 736 PROT_READ | PROT_WRITE, MAP_PRIVATE, &error_msg)); 737 if (elf.get() == nullptr) { 738 LOG(ERROR) << "unable to open oat file " << input_oat->GetPath() << " : " << error_msg; 739 return false; 740 } 741 742 MaybePic is_oat_pic = IsOatPic(elf.get()); 743 if (is_oat_pic >= ERROR_FIRST) { 744 // Error logged by IsOatPic 745 return false; 746 } else if (is_oat_pic == PIC) { 747 // Do not need to do ELF-file patching. Create a symlink and skip the rest. 748 // Any errors will be logged by the function call. 749 return ReplaceOatFileWithSymlink(input_oat->GetPath(), 750 output_oat->GetPath(), 751 output_oat_opened_from_fd, 752 new_oat_out); 753 } else { 754 CHECK(is_oat_pic == NOT_PIC); 755 } 756 757 PatchOat p(elf.release(), delta, timings); 758 t.NewTiming("Patch Oat file"); 759 if (!p.PatchElf()) { 760 return false; 761 } 762 763 t.NewTiming("Writing oat file"); 764 if (!p.WriteElf(output_oat)) { 765 return false; 766 } 767 return true; 768} 769 770template <typename ElfFileImpl> 771bool PatchOat::PatchOatHeader(ElfFileImpl* oat_file) { 772 auto rodata_sec = oat_file->FindSectionByName(".rodata"); 773 if (rodata_sec == nullptr) { 774 return false; 775 } 776 OatHeader* oat_header = reinterpret_cast<OatHeader*>(oat_file->Begin() + rodata_sec->sh_offset); 777 if (!oat_header->IsValid()) { 778 LOG(ERROR) << "Elf file " << oat_file->GetFile().GetPath() << " has an invalid oat header"; 779 return false; 780 } 781 oat_header->RelocateOat(delta_); 782 return true; 783} 784 785bool PatchOat::PatchElf() { 786 if (oat_file_->Is64Bit()) 787 return PatchElf<ElfFileImpl64>(oat_file_->GetImpl64()); 788 else 789 return PatchElf<ElfFileImpl32>(oat_file_->GetImpl32()); 790} 791 792template <typename ElfFileImpl> 793bool PatchOat::PatchElf(ElfFileImpl* oat_file) { 794 TimingLogger::ScopedTiming t("Fixup Elf Text Section", timings_); 795 796 // Fix up absolute references to locations within the boot image. 797 if (!oat_file->ApplyOatPatchesTo(".text", delta_)) { 798 return false; 799 } 800 801 // Update the OatHeader fields referencing the boot image. 802 if (!PatchOatHeader<ElfFileImpl>(oat_file)) { 803 return false; 804 } 805 806 bool need_boot_oat_fixup = true; 807 for (unsigned int i = 0; i < oat_file->GetProgramHeaderNum(); ++i) { 808 auto hdr = oat_file->GetProgramHeader(i); 809 if (hdr->p_type == PT_LOAD && hdr->p_vaddr == 0u) { 810 need_boot_oat_fixup = false; 811 break; 812 } 813 } 814 if (!need_boot_oat_fixup) { 815 // This is an app oat file that can be loaded at an arbitrary address in memory. 816 // Boot image references were patched above and there's nothing else to do. 817 return true; 818 } 819 820 // This is a boot oat file that's loaded at a particular address and we need 821 // to patch all absolute addresses, starting with ELF program headers. 822 823 t.NewTiming("Fixup Elf Headers"); 824 // Fixup Phdr's 825 oat_file->FixupProgramHeaders(delta_); 826 827 t.NewTiming("Fixup Section Headers"); 828 // Fixup Shdr's 829 oat_file->FixupSectionHeaders(delta_); 830 831 t.NewTiming("Fixup Dynamics"); 832 oat_file->FixupDynamic(delta_); 833 834 t.NewTiming("Fixup Elf Symbols"); 835 // Fixup dynsym 836 if (!oat_file->FixupSymbols(delta_, true)) { 837 return false; 838 } 839 // Fixup symtab 840 if (!oat_file->FixupSymbols(delta_, false)) { 841 return false; 842 } 843 844 t.NewTiming("Fixup Debug Sections"); 845 if (!oat_file->FixupDebugSections(delta_)) { 846 return false; 847 } 848 849 return true; 850} 851 852static int orig_argc; 853static char** orig_argv; 854 855static std::string CommandLine() { 856 std::vector<std::string> command; 857 for (int i = 0; i < orig_argc; ++i) { 858 command.push_back(orig_argv[i]); 859 } 860 return Join(command, ' '); 861} 862 863static void UsageErrorV(const char* fmt, va_list ap) { 864 std::string error; 865 StringAppendV(&error, fmt, ap); 866 LOG(ERROR) << error; 867} 868 869static void UsageError(const char* fmt, ...) { 870 va_list ap; 871 va_start(ap, fmt); 872 UsageErrorV(fmt, ap); 873 va_end(ap); 874} 875 876NO_RETURN static void Usage(const char *fmt, ...) { 877 va_list ap; 878 va_start(ap, fmt); 879 UsageErrorV(fmt, ap); 880 va_end(ap); 881 882 UsageError("Command: %s", CommandLine().c_str()); 883 UsageError("Usage: patchoat [options]..."); 884 UsageError(""); 885 UsageError(" --instruction-set=<isa>: Specifies the instruction set the patched code is"); 886 UsageError(" compiled for. Required if you use --input-oat-location"); 887 UsageError(""); 888 UsageError(" --input-oat-file=<file.oat>: Specifies the exact filename of the oat file to be"); 889 UsageError(" patched."); 890 UsageError(""); 891 UsageError(" --input-oat-fd=<file-descriptor>: Specifies the file-descriptor of the oat file"); 892 UsageError(" to be patched."); 893 UsageError(""); 894 UsageError(" --input-oat-location=<file.oat>: Specifies the 'location' to read the patched"); 895 UsageError(" oat file from. If used one must also supply the --instruction-set"); 896 UsageError(""); 897 UsageError(" --input-image-location=<file.art>: Specifies the 'location' of the image file to"); 898 UsageError(" be patched. If --instruction-set is not given it will use the instruction set"); 899 UsageError(" extracted from the --input-oat-file."); 900 UsageError(""); 901 UsageError(" --output-oat-file=<file.oat>: Specifies the exact file to write the patched oat"); 902 UsageError(" file to."); 903 UsageError(""); 904 UsageError(" --output-oat-fd=<file-descriptor>: Specifies the file-descriptor to write the"); 905 UsageError(" the patched oat file to."); 906 UsageError(""); 907 UsageError(" --output-image-file=<file.art>: Specifies the exact file to write the patched"); 908 UsageError(" image file to."); 909 UsageError(""); 910 UsageError(" --output-image-fd=<file-descriptor>: Specifies the file-descriptor to write the"); 911 UsageError(" the patched image file to."); 912 UsageError(""); 913 UsageError(" --orig-base-offset=<original-base-offset>: Specify the base offset the input file"); 914 UsageError(" was compiled with. This is needed if one is specifying a --base-offset"); 915 UsageError(""); 916 UsageError(" --base-offset=<new-base-offset>: Specify the base offset we will repatch the"); 917 UsageError(" given files to use. This requires that --orig-base-offset is also given."); 918 UsageError(""); 919 UsageError(" --base-offset-delta=<delta>: Specify the amount to change the old base-offset by."); 920 UsageError(" This value may be negative."); 921 UsageError(""); 922 UsageError(" --patched-image-file=<file.art>: Relocate the oat file to be the same as the"); 923 UsageError(" given image file."); 924 UsageError(""); 925 UsageError(" --patched-image-location=<file.art>: Relocate the oat file to be the same as the"); 926 UsageError(" image at the given location. If used one must also specify the"); 927 UsageError(" --instruction-set flag. It will search for this image in the same way that"); 928 UsageError(" is done when loading one."); 929 UsageError(""); 930 UsageError(" --lock-output: Obtain a flock on output oat file before starting."); 931 UsageError(""); 932 UsageError(" --no-lock-output: Do not attempt to obtain a flock on output oat file."); 933 UsageError(""); 934 UsageError(" --dump-timings: dump out patch timing information"); 935 UsageError(""); 936 UsageError(" --no-dump-timings: do not dump out patch timing information"); 937 UsageError(""); 938 939 exit(EXIT_FAILURE); 940} 941 942static bool ReadBaseDelta(const char* name, off_t* delta, std::string* error_msg) { 943 CHECK(name != nullptr); 944 CHECK(delta != nullptr); 945 std::unique_ptr<File> file; 946 if (OS::FileExists(name)) { 947 file.reset(OS::OpenFileForReading(name)); 948 if (file.get() == nullptr) { 949 *error_msg = "Failed to open file %s for reading"; 950 return false; 951 } 952 } else { 953 *error_msg = "File %s does not exist"; 954 return false; 955 } 956 CHECK(file.get() != nullptr); 957 ImageHeader hdr; 958 if (sizeof(hdr) != file->Read(reinterpret_cast<char*>(&hdr), sizeof(hdr), 0)) { 959 *error_msg = "Failed to read file %s"; 960 return false; 961 } 962 if (!hdr.IsValid()) { 963 *error_msg = "%s does not contain a valid image header."; 964 return false; 965 } 966 *delta = hdr.GetPatchDelta(); 967 return true; 968} 969 970static File* CreateOrOpen(const char* name, bool* created) { 971 if (OS::FileExists(name)) { 972 *created = false; 973 return OS::OpenFileReadWrite(name); 974 } else { 975 *created = true; 976 std::unique_ptr<File> f(OS::CreateEmptyFile(name)); 977 if (f.get() != nullptr) { 978 if (fchmod(f->Fd(), 0644) != 0) { 979 PLOG(ERROR) << "Unable to make " << name << " world readable"; 980 TEMP_FAILURE_RETRY(unlink(name)); 981 return nullptr; 982 } 983 } 984 return f.release(); 985 } 986} 987 988// Either try to close the file (close=true), or erase it. 989static bool FinishFile(File* file, bool close) { 990 if (close) { 991 if (file->FlushCloseOrErase() != 0) { 992 PLOG(ERROR) << "Failed to flush and close file."; 993 return false; 994 } 995 return true; 996 } else { 997 file->Erase(); 998 return false; 999 } 1000} 1001 1002static int patchoat(int argc, char **argv) { 1003 InitLogging(argv); 1004 MemMap::Init(); 1005 const bool debug = kIsDebugBuild; 1006 orig_argc = argc; 1007 orig_argv = argv; 1008 TimingLogger timings("patcher", false, false); 1009 1010 InitLogging(argv); 1011 1012 // Skip over the command name. 1013 argv++; 1014 argc--; 1015 1016 if (argc == 0) { 1017 Usage("No arguments specified"); 1018 } 1019 1020 timings.StartTiming("Patchoat"); 1021 1022 // cmd line args 1023 bool isa_set = false; 1024 InstructionSet isa = kNone; 1025 std::string input_oat_filename; 1026 std::string input_oat_location; 1027 int input_oat_fd = -1; 1028 bool have_input_oat = false; 1029 std::string input_image_location; 1030 std::string output_oat_filename; 1031 int output_oat_fd = -1; 1032 bool have_output_oat = false; 1033 std::string output_image_filename; 1034 int output_image_fd = -1; 1035 bool have_output_image = false; 1036 uintptr_t base_offset = 0; 1037 bool base_offset_set = false; 1038 uintptr_t orig_base_offset = 0; 1039 bool orig_base_offset_set = false; 1040 off_t base_delta = 0; 1041 bool base_delta_set = false; 1042 bool match_delta = false; 1043 std::string patched_image_filename; 1044 std::string patched_image_location; 1045 bool dump_timings = kIsDebugBuild; 1046 bool lock_output = true; 1047 1048 for (int i = 0; i < argc; ++i) { 1049 const StringPiece option(argv[i]); 1050 const bool log_options = false; 1051 if (log_options) { 1052 LOG(INFO) << "patchoat: option[" << i << "]=" << argv[i]; 1053 } 1054 if (option.starts_with("--instruction-set=")) { 1055 isa_set = true; 1056 const char* isa_str = option.substr(strlen("--instruction-set=")).data(); 1057 isa = GetInstructionSetFromString(isa_str); 1058 if (isa == kNone) { 1059 Usage("Unknown or invalid instruction set %s", isa_str); 1060 } 1061 } else if (option.starts_with("--input-oat-location=")) { 1062 if (have_input_oat) { 1063 Usage("Only one of --input-oat-file, --input-oat-location and --input-oat-fd may be used."); 1064 } 1065 have_input_oat = true; 1066 input_oat_location = option.substr(strlen("--input-oat-location=")).data(); 1067 } else if (option.starts_with("--input-oat-file=")) { 1068 if (have_input_oat) { 1069 Usage("Only one of --input-oat-file, --input-oat-location and --input-oat-fd may be used."); 1070 } 1071 have_input_oat = true; 1072 input_oat_filename = option.substr(strlen("--input-oat-file=")).data(); 1073 } else if (option.starts_with("--input-oat-fd=")) { 1074 if (have_input_oat) { 1075 Usage("Only one of --input-oat-file, --input-oat-location and --input-oat-fd may be used."); 1076 } 1077 have_input_oat = true; 1078 const char* oat_fd_str = option.substr(strlen("--input-oat-fd=")).data(); 1079 if (!ParseInt(oat_fd_str, &input_oat_fd)) { 1080 Usage("Failed to parse --input-oat-fd argument '%s' as an integer", oat_fd_str); 1081 } 1082 if (input_oat_fd < 0) { 1083 Usage("--input-oat-fd pass a negative value %d", input_oat_fd); 1084 } 1085 } else if (option.starts_with("--input-image-location=")) { 1086 input_image_location = option.substr(strlen("--input-image-location=")).data(); 1087 } else if (option.starts_with("--output-oat-file=")) { 1088 if (have_output_oat) { 1089 Usage("Only one of --output-oat-file, and --output-oat-fd may be used."); 1090 } 1091 have_output_oat = true; 1092 output_oat_filename = option.substr(strlen("--output-oat-file=")).data(); 1093 } else if (option.starts_with("--output-oat-fd=")) { 1094 if (have_output_oat) { 1095 Usage("Only one of --output-oat-file, --output-oat-fd may be used."); 1096 } 1097 have_output_oat = true; 1098 const char* oat_fd_str = option.substr(strlen("--output-oat-fd=")).data(); 1099 if (!ParseInt(oat_fd_str, &output_oat_fd)) { 1100 Usage("Failed to parse --output-oat-fd argument '%s' as an integer", oat_fd_str); 1101 } 1102 if (output_oat_fd < 0) { 1103 Usage("--output-oat-fd pass a negative value %d", output_oat_fd); 1104 } 1105 } else if (option.starts_with("--output-image-file=")) { 1106 if (have_output_image) { 1107 Usage("Only one of --output-image-file, and --output-image-fd may be used."); 1108 } 1109 have_output_image = true; 1110 output_image_filename = option.substr(strlen("--output-image-file=")).data(); 1111 } else if (option.starts_with("--output-image-fd=")) { 1112 if (have_output_image) { 1113 Usage("Only one of --output-image-file, and --output-image-fd may be used."); 1114 } 1115 have_output_image = true; 1116 const char* image_fd_str = option.substr(strlen("--output-image-fd=")).data(); 1117 if (!ParseInt(image_fd_str, &output_image_fd)) { 1118 Usage("Failed to parse --output-image-fd argument '%s' as an integer", image_fd_str); 1119 } 1120 if (output_image_fd < 0) { 1121 Usage("--output-image-fd pass a negative value %d", output_image_fd); 1122 } 1123 } else if (option.starts_with("--orig-base-offset=")) { 1124 const char* orig_base_offset_str = option.substr(strlen("--orig-base-offset=")).data(); 1125 orig_base_offset_set = true; 1126 if (!ParseUint(orig_base_offset_str, &orig_base_offset)) { 1127 Usage("Failed to parse --orig-base-offset argument '%s' as an uintptr_t", 1128 orig_base_offset_str); 1129 } 1130 } else if (option.starts_with("--base-offset=")) { 1131 const char* base_offset_str = option.substr(strlen("--base-offset=")).data(); 1132 base_offset_set = true; 1133 if (!ParseUint(base_offset_str, &base_offset)) { 1134 Usage("Failed to parse --base-offset argument '%s' as an uintptr_t", base_offset_str); 1135 } 1136 } else if (option.starts_with("--base-offset-delta=")) { 1137 const char* base_delta_str = option.substr(strlen("--base-offset-delta=")).data(); 1138 base_delta_set = true; 1139 if (!ParseInt(base_delta_str, &base_delta)) { 1140 Usage("Failed to parse --base-offset-delta argument '%s' as an off_t", base_delta_str); 1141 } 1142 } else if (option.starts_with("--patched-image-location=")) { 1143 patched_image_location = option.substr(strlen("--patched-image-location=")).data(); 1144 } else if (option.starts_with("--patched-image-file=")) { 1145 patched_image_filename = option.substr(strlen("--patched-image-file=")).data(); 1146 } else if (option == "--lock-output") { 1147 lock_output = true; 1148 } else if (option == "--no-lock-output") { 1149 lock_output = false; 1150 } else if (option == "--dump-timings") { 1151 dump_timings = true; 1152 } else if (option == "--no-dump-timings") { 1153 dump_timings = false; 1154 } else { 1155 Usage("Unknown argument %s", option.data()); 1156 } 1157 } 1158 1159 { 1160 // Only 1 of these may be set. 1161 uint32_t cnt = 0; 1162 cnt += (base_delta_set) ? 1 : 0; 1163 cnt += (base_offset_set && orig_base_offset_set) ? 1 : 0; 1164 cnt += (!patched_image_filename.empty()) ? 1 : 0; 1165 cnt += (!patched_image_location.empty()) ? 1 : 0; 1166 if (cnt > 1) { 1167 Usage("Only one of --base-offset/--orig-base-offset, --base-offset-delta, " 1168 "--patched-image-filename or --patched-image-location may be used."); 1169 } else if (cnt == 0) { 1170 Usage("Must specify --base-offset-delta, --base-offset and --orig-base-offset, " 1171 "--patched-image-location or --patched-image-file"); 1172 } 1173 } 1174 1175 if (have_input_oat != have_output_oat) { 1176 Usage("Either both input and output oat must be supplied or niether must be."); 1177 } 1178 1179 if ((!input_image_location.empty()) != have_output_image) { 1180 Usage("Either both input and output image must be supplied or niether must be."); 1181 } 1182 1183 // We know we have both the input and output so rename for clarity. 1184 bool have_image_files = have_output_image; 1185 bool have_oat_files = have_output_oat; 1186 1187 if (!have_oat_files && !have_image_files) { 1188 Usage("Must be patching either an oat or an image file or both."); 1189 } 1190 1191 if (!have_oat_files && !isa_set) { 1192 Usage("Must include ISA if patching an image file without an oat file."); 1193 } 1194 1195 if (!input_oat_location.empty()) { 1196 if (!isa_set) { 1197 Usage("specifying a location requires specifying an instruction set"); 1198 } 1199 if (!LocationToFilename(input_oat_location, isa, &input_oat_filename)) { 1200 Usage("Unable to find filename for input oat location %s", input_oat_location.c_str()); 1201 } 1202 if (debug) { 1203 LOG(INFO) << "Using input-oat-file " << input_oat_filename; 1204 } 1205 } 1206 if (!patched_image_location.empty()) { 1207 if (!isa_set) { 1208 Usage("specifying a location requires specifying an instruction set"); 1209 } 1210 std::string system_filename; 1211 bool has_system = false; 1212 std::string cache_filename; 1213 bool has_cache = false; 1214 bool has_android_data_unused = false; 1215 bool is_global_cache = false; 1216 if (!gc::space::ImageSpace::FindImageFilename(patched_image_location.c_str(), isa, 1217 &system_filename, &has_system, &cache_filename, 1218 &has_android_data_unused, &has_cache, 1219 &is_global_cache)) { 1220 Usage("Unable to determine image file for location %s", patched_image_location.c_str()); 1221 } 1222 if (has_cache) { 1223 patched_image_filename = cache_filename; 1224 } else if (has_system) { 1225 LOG(WARNING) << "Only image file found was in /system for image location " 1226 << patched_image_location; 1227 patched_image_filename = system_filename; 1228 } else { 1229 Usage("Unable to determine image file for location %s", patched_image_location.c_str()); 1230 } 1231 if (debug) { 1232 LOG(INFO) << "Using patched-image-file " << patched_image_filename; 1233 } 1234 } 1235 1236 if (!base_delta_set) { 1237 if (orig_base_offset_set && base_offset_set) { 1238 base_delta_set = true; 1239 base_delta = base_offset - orig_base_offset; 1240 } else if (!patched_image_filename.empty()) { 1241 if (have_image_files) { 1242 Usage("--patched-image-location should not be used when patching other images"); 1243 } 1244 base_delta_set = true; 1245 match_delta = true; 1246 std::string error_msg; 1247 if (!ReadBaseDelta(patched_image_filename.c_str(), &base_delta, &error_msg)) { 1248 Usage(error_msg.c_str(), patched_image_filename.c_str()); 1249 } 1250 } else { 1251 if (base_offset_set) { 1252 Usage("Unable to determine original base offset."); 1253 } else { 1254 Usage("Must supply a desired new offset or delta."); 1255 } 1256 } 1257 } 1258 1259 if (!IsAligned<kPageSize>(base_delta)) { 1260 Usage("Base offset/delta must be alligned to a pagesize (0x%08x) boundary.", kPageSize); 1261 } 1262 1263 // Do we need to cleanup output files if we fail? 1264 bool new_image_out = false; 1265 bool new_oat_out = false; 1266 1267 std::unique_ptr<File> input_oat; 1268 std::unique_ptr<File> output_oat; 1269 std::unique_ptr<File> output_image; 1270 1271 if (have_image_files) { 1272 CHECK(!input_image_location.empty()); 1273 1274 if (output_image_fd != -1) { 1275 if (output_image_filename.empty()) { 1276 output_image_filename = "output-image-file"; 1277 } 1278 output_image.reset(new File(output_image_fd, output_image_filename, true)); 1279 } else { 1280 CHECK(!output_image_filename.empty()); 1281 output_image.reset(CreateOrOpen(output_image_filename.c_str(), &new_image_out)); 1282 } 1283 } else { 1284 CHECK(output_image_filename.empty() && output_image_fd == -1 && input_image_location.empty()); 1285 } 1286 1287 if (have_oat_files) { 1288 if (input_oat_fd != -1) { 1289 if (input_oat_filename.empty()) { 1290 input_oat_filename = "input-oat-file"; 1291 } 1292 input_oat.reset(new File(input_oat_fd, input_oat_filename, false)); 1293 if (input_oat_fd == output_oat_fd) { 1294 input_oat.get()->DisableAutoClose(); 1295 } 1296 if (input_oat == nullptr) { 1297 // Unlikely, but ensure exhaustive logging in non-0 exit code case 1298 LOG(ERROR) << "Failed to open input oat file by its FD" << input_oat_fd; 1299 } 1300 } else { 1301 CHECK(!input_oat_filename.empty()); 1302 input_oat.reset(OS::OpenFileForReading(input_oat_filename.c_str())); 1303 if (input_oat == nullptr) { 1304 int err = errno; 1305 LOG(ERROR) << "Failed to open input oat file " << input_oat_filename 1306 << ": " << strerror(err) << "(" << err << ")"; 1307 } 1308 } 1309 1310 if (output_oat_fd != -1) { 1311 if (output_oat_filename.empty()) { 1312 output_oat_filename = "output-oat-file"; 1313 } 1314 output_oat.reset(new File(output_oat_fd, output_oat_filename, true)); 1315 if (output_oat == nullptr) { 1316 // Unlikely, but ensure exhaustive logging in non-0 exit code case 1317 LOG(ERROR) << "Failed to open output oat file by its FD" << output_oat_fd; 1318 } 1319 } else { 1320 CHECK(!output_oat_filename.empty()); 1321 output_oat.reset(CreateOrOpen(output_oat_filename.c_str(), &new_oat_out)); 1322 if (output_oat == nullptr) { 1323 int err = errno; 1324 LOG(ERROR) << "Failed to open output oat file " << output_oat_filename 1325 << ": " << strerror(err) << "(" << err << ")"; 1326 } 1327 } 1328 } 1329 1330 // TODO: get rid of this. 1331 auto cleanup = [&output_image_filename, &output_oat_filename, 1332 &new_oat_out, &new_image_out, &timings, &dump_timings](bool success) { 1333 timings.EndTiming(); 1334 if (!success) { 1335 if (new_oat_out) { 1336 CHECK(!output_oat_filename.empty()); 1337 TEMP_FAILURE_RETRY(unlink(output_oat_filename.c_str())); 1338 } 1339 if (new_image_out) { 1340 CHECK(!output_image_filename.empty()); 1341 TEMP_FAILURE_RETRY(unlink(output_image_filename.c_str())); 1342 } 1343 } 1344 if (dump_timings) { 1345 LOG(INFO) << Dumpable<TimingLogger>(timings); 1346 } 1347 1348 if (kIsDebugBuild) { 1349 LOG(INFO) << "Cleaning up.. success? " << success; 1350 } 1351 }; 1352 1353 if (have_oat_files && (input_oat.get() == nullptr || output_oat.get() == nullptr)) { 1354 LOG(ERROR) << "Failed to open input/output oat files"; 1355 cleanup(false); 1356 return EXIT_FAILURE; 1357 } else if (have_image_files && output_image.get() == nullptr) { 1358 LOG(ERROR) << "Failed to open output image file"; 1359 cleanup(false); 1360 return EXIT_FAILURE; 1361 } 1362 1363 if (match_delta) { 1364 CHECK(!have_image_files); // We will not do this with images. 1365 std::string error_msg; 1366 // Figure out what the current delta is so we can match it to the desired delta. 1367 std::unique_ptr<ElfFile> elf(ElfFile::Open(input_oat.get(), PROT_READ, MAP_PRIVATE, 1368 &error_msg)); 1369 off_t current_delta = 0; 1370 if (elf.get() == nullptr) { 1371 LOG(ERROR) << "unable to open oat file " << input_oat->GetPath() << " : " << error_msg; 1372 cleanup(false); 1373 return EXIT_FAILURE; 1374 } else if (!ReadOatPatchDelta(elf.get(), ¤t_delta, &error_msg)) { 1375 LOG(ERROR) << "Unable to get current delta: " << error_msg; 1376 cleanup(false); 1377 return EXIT_FAILURE; 1378 } 1379 // Before this line base_delta is the desired final delta. We need it to be the actual amount to 1380 // change everything by. We subtract the current delta from it to make it this. 1381 base_delta -= current_delta; 1382 if (!IsAligned<kPageSize>(base_delta)) { 1383 LOG(ERROR) << "Given image file was relocated by an illegal delta"; 1384 cleanup(false); 1385 return false; 1386 } 1387 } 1388 1389 if (debug) { 1390 LOG(INFO) << "moving offset by " << base_delta 1391 << " (0x" << std::hex << base_delta << ") bytes or " 1392 << std::dec << (base_delta/kPageSize) << " pages."; 1393 } 1394 1395 // TODO: is it going to be promatic to unlink a file that was flock-ed? 1396 ScopedFlock output_oat_lock; 1397 if (lock_output) { 1398 std::string error_msg; 1399 if (have_oat_files && !output_oat_lock.Init(output_oat.get(), &error_msg)) { 1400 LOG(ERROR) << "Unable to lock output oat " << output_image->GetPath() << ": " << error_msg; 1401 cleanup(false); 1402 return EXIT_FAILURE; 1403 } 1404 } 1405 1406 bool ret; 1407 if (have_image_files && have_oat_files) { 1408 TimingLogger::ScopedTiming pt("patch image and oat", &timings); 1409 ret = PatchOat::Patch(input_oat.get(), input_image_location, base_delta, 1410 output_oat.get(), output_image.get(), isa, &timings, 1411 output_oat_fd >= 0, // was it opened from FD? 1412 new_oat_out); 1413 // The order here doesn't matter. If the first one is successfully saved and the second one 1414 // erased, ImageSpace will still detect a problem and not use the files. 1415 ret = FinishFile(output_image.get(), ret); 1416 ret = FinishFile(output_oat.get(), ret); 1417 } else if (have_oat_files) { 1418 TimingLogger::ScopedTiming pt("patch oat", &timings); 1419 ret = PatchOat::Patch(input_oat.get(), base_delta, output_oat.get(), &timings, 1420 output_oat_fd >= 0, // was it opened from FD? 1421 new_oat_out); 1422 ret = FinishFile(output_oat.get(), ret); 1423 } else if (have_image_files) { 1424 TimingLogger::ScopedTiming pt("patch image", &timings); 1425 ret = PatchOat::Patch(input_image_location, base_delta, output_image.get(), isa, &timings); 1426 ret = FinishFile(output_image.get(), ret); 1427 } else { 1428 CHECK(false); 1429 ret = true; 1430 } 1431 1432 if (kIsDebugBuild) { 1433 LOG(INFO) << "Exiting with return ... " << ret; 1434 } 1435 cleanup(ret); 1436 return (ret) ? EXIT_SUCCESS : EXIT_FAILURE; 1437} 1438 1439} // namespace art 1440 1441int main(int argc, char **argv) { 1442 return art::patchoat(argc, argv); 1443} 1444