patchoat.cc revision daab38ca60c5b91787e29c87a161a2bb8c1b6f11
1/*
2 * Copyright (C) 2014 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 *      http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16#include "patchoat.h"
17
18#include <stdio.h>
19#include <stdlib.h>
20#include <sys/file.h>
21#include <sys/stat.h>
22#include <unistd.h>
23
24#include <string>
25#include <vector>
26
27#include "base/scoped_flock.h"
28#include "base/stringpiece.h"
29#include "base/stringprintf.h"
30#include "elf_utils.h"
31#include "elf_file.h"
32#include "gc/space/image_space.h"
33#include "image.h"
34#include "instruction_set.h"
35#include "mirror/art_field.h"
36#include "mirror/art_field-inl.h"
37#include "mirror/art_method.h"
38#include "mirror/art_method-inl.h"
39#include "mirror/object.h"
40#include "mirror/object-inl.h"
41#include "mirror/reference.h"
42#include "noop_compiler_callbacks.h"
43#include "offsets.h"
44#include "os.h"
45#include "runtime.h"
46#include "scoped_thread_state_change.h"
47#include "thread.h"
48#include "utils.h"
49
50namespace art {
51
52static InstructionSet ElfISAToInstructionSet(Elf32_Word isa) {
53  switch (isa) {
54    case EM_ARM:
55      return kArm;
56    case EM_AARCH64:
57      return kArm64;
58    case EM_386:
59      return kX86;
60    case EM_X86_64:
61      return kX86_64;
62    case EM_MIPS:
63      return kMips;
64    default:
65      return kNone;
66  }
67}
68
69static bool LocationToFilename(const std::string& location, InstructionSet isa,
70                               std::string* filename) {
71  bool has_system = false;
72  bool has_cache = false;
73  // image_location = /system/framework/boot.art
74  // system_image_location = /system/framework/<image_isa>/boot.art
75  std::string system_filename(GetSystemImageFilename(location.c_str(), isa));
76  if (OS::FileExists(system_filename.c_str())) {
77    has_system = true;
78  }
79
80  bool have_android_data = false;
81  bool dalvik_cache_exists = false;
82  std::string dalvik_cache;
83  GetDalvikCache(GetInstructionSetString(isa), false, &dalvik_cache,
84                 &have_android_data, &dalvik_cache_exists);
85
86  std::string cache_filename;
87  if (have_android_data && dalvik_cache_exists) {
88    // Always set output location even if it does not exist,
89    // so that the caller knows where to create the image.
90    //
91    // image_location = /system/framework/boot.art
92    // *image_filename = /data/dalvik-cache/<image_isa>/boot.art
93    std::string error_msg;
94    if (GetDalvikCacheFilename(location.c_str(), dalvik_cache.c_str(),
95                               &cache_filename, &error_msg)) {
96      has_cache = true;
97    }
98  }
99  if (has_system) {
100    *filename = system_filename;
101    return true;
102  } else if (has_cache) {
103    *filename = cache_filename;
104    return true;
105  } else {
106    return false;
107  }
108}
109
110bool PatchOat::Patch(const std::string& image_location, off_t delta,
111                     File* output_image, InstructionSet isa,
112                     TimingLogger* timings) {
113  CHECK(Runtime::Current() == nullptr);
114  CHECK(output_image != nullptr);
115  CHECK_GE(output_image->Fd(), 0);
116  CHECK(!image_location.empty()) << "image file must have a filename.";
117  CHECK_NE(isa, kNone);
118
119  TimingLogger::ScopedTiming t("Runtime Setup", timings);
120  const char *isa_name = GetInstructionSetString(isa);
121  std::string image_filename;
122  if (!LocationToFilename(image_location, isa, &image_filename)) {
123    LOG(ERROR) << "Unable to find image at location " << image_location;
124    return false;
125  }
126  std::unique_ptr<File> input_image(OS::OpenFileForReading(image_filename.c_str()));
127  if (input_image.get() == nullptr) {
128    LOG(ERROR) << "unable to open input image file at " << image_filename
129               << " for location " << image_location;
130    return false;
131  }
132  int64_t image_len = input_image->GetLength();
133  if (image_len < 0) {
134    LOG(ERROR) << "Error while getting image length";
135    return false;
136  }
137  ImageHeader image_header;
138  if (sizeof(image_header) != input_image->Read(reinterpret_cast<char*>(&image_header),
139                                              sizeof(image_header), 0)) {
140    LOG(ERROR) << "Unable to read image header from image file " << input_image->GetPath();
141    return false;
142  }
143
144  // Set up the runtime
145  RuntimeOptions options;
146  NoopCompilerCallbacks callbacks;
147  options.push_back(std::make_pair("compilercallbacks", &callbacks));
148  std::string img = "-Ximage:" + image_location;
149  options.push_back(std::make_pair(img.c_str(), nullptr));
150  options.push_back(std::make_pair("imageinstructionset", reinterpret_cast<const void*>(isa_name)));
151  if (!Runtime::Create(options, false)) {
152    LOG(ERROR) << "Unable to initialize runtime";
153    return false;
154  }
155  // Runtime::Create acquired the mutator_lock_ that is normally given away when we Runtime::Start,
156  // give it away now and then switch to a more manageable ScopedObjectAccess.
157  Thread::Current()->TransitionFromRunnableToSuspended(kNative);
158  ScopedObjectAccess soa(Thread::Current());
159
160  t.NewTiming("Image and oat Patching setup");
161  // Create the map where we will write the image patches to.
162  std::string error_msg;
163  std::unique_ptr<MemMap> image(MemMap::MapFile(image_len, PROT_READ | PROT_WRITE, MAP_PRIVATE,
164                                                input_image->Fd(), 0,
165                                                input_image->GetPath().c_str(),
166                                                &error_msg));
167  if (image.get() == nullptr) {
168    LOG(ERROR) << "unable to map image file " << input_image->GetPath() << " : " << error_msg;
169    return false;
170  }
171  gc::space::ImageSpace* ispc = Runtime::Current()->GetHeap()->GetImageSpace();
172
173  PatchOat p(image.release(), ispc->GetLiveBitmap(), ispc->GetMemMap(),
174             delta, timings);
175  t.NewTiming("Patching files");
176  if (!p.PatchImage()) {
177    LOG(ERROR) << "Failed to patch image file " << input_image->GetPath();
178    return false;
179  }
180
181  t.NewTiming("Writing files");
182  if (!p.WriteImage(output_image)) {
183    return false;
184  }
185  return true;
186}
187
188bool PatchOat::Patch(const File* input_oat, const std::string& image_location, off_t delta,
189                     File* output_oat, File* output_image, InstructionSet isa,
190                     TimingLogger* timings) {
191  CHECK(Runtime::Current() == nullptr);
192  CHECK(output_image != nullptr);
193  CHECK_GE(output_image->Fd(), 0);
194  CHECK(input_oat != nullptr);
195  CHECK(output_oat != nullptr);
196  CHECK_GE(input_oat->Fd(), 0);
197  CHECK_GE(output_oat->Fd(), 0);
198  CHECK(!image_location.empty()) << "image file must have a filename.";
199
200  TimingLogger::ScopedTiming t("Runtime Setup", timings);
201
202  if (isa == kNone) {
203    Elf32_Ehdr elf_hdr;
204    if (sizeof(elf_hdr) != input_oat->Read(reinterpret_cast<char*>(&elf_hdr), sizeof(elf_hdr), 0)) {
205      LOG(ERROR) << "unable to read elf header";
206      return false;
207    }
208    isa = ElfISAToInstructionSet(elf_hdr.e_machine);
209  }
210  const char* isa_name = GetInstructionSetString(isa);
211  std::string image_filename;
212  if (!LocationToFilename(image_location, isa, &image_filename)) {
213    LOG(ERROR) << "Unable to find image at location " << image_location;
214    return false;
215  }
216  std::unique_ptr<File> input_image(OS::OpenFileForReading(image_filename.c_str()));
217  if (input_image.get() == nullptr) {
218    LOG(ERROR) << "unable to open input image file at " << image_filename
219               << " for location " << image_location;
220    return false;
221  }
222  int64_t image_len = input_image->GetLength();
223  if (image_len < 0) {
224    LOG(ERROR) << "Error while getting image length";
225    return false;
226  }
227  ImageHeader image_header;
228  if (sizeof(image_header) != input_image->Read(reinterpret_cast<char*>(&image_header),
229                                              sizeof(image_header), 0)) {
230    LOG(ERROR) << "Unable to read image header from image file " << input_image->GetPath();
231  }
232
233  // Set up the runtime
234  RuntimeOptions options;
235  NoopCompilerCallbacks callbacks;
236  options.push_back(std::make_pair("compilercallbacks", &callbacks));
237  std::string img = "-Ximage:" + image_location;
238  options.push_back(std::make_pair(img.c_str(), nullptr));
239  options.push_back(std::make_pair("imageinstructionset", reinterpret_cast<const void*>(isa_name)));
240  if (!Runtime::Create(options, false)) {
241    LOG(ERROR) << "Unable to initialize runtime";
242    return false;
243  }
244  // Runtime::Create acquired the mutator_lock_ that is normally given away when we Runtime::Start,
245  // give it away now and then switch to a more manageable ScopedObjectAccess.
246  Thread::Current()->TransitionFromRunnableToSuspended(kNative);
247  ScopedObjectAccess soa(Thread::Current());
248
249  t.NewTiming("Image and oat Patching setup");
250  // Create the map where we will write the image patches to.
251  std::string error_msg;
252  std::unique_ptr<MemMap> image(MemMap::MapFile(image_len, PROT_READ | PROT_WRITE, MAP_PRIVATE,
253                                                input_image->Fd(), 0,
254                                                input_image->GetPath().c_str(),
255                                                &error_msg));
256  if (image.get() == nullptr) {
257    LOG(ERROR) << "unable to map image file " << input_image->GetPath() << " : " << error_msg;
258    return false;
259  }
260  gc::space::ImageSpace* ispc = Runtime::Current()->GetHeap()->GetImageSpace();
261
262  std::unique_ptr<ElfFile> elf(ElfFile::Open(const_cast<File*>(input_oat),
263                                             PROT_READ | PROT_WRITE, MAP_PRIVATE, &error_msg));
264  if (elf.get() == nullptr) {
265    LOG(ERROR) << "unable to open oat file " << input_oat->GetPath() << " : " << error_msg;
266    return false;
267  }
268
269  PatchOat p(elf.release(), image.release(), ispc->GetLiveBitmap(), ispc->GetMemMap(),
270             delta, timings);
271  t.NewTiming("Patching files");
272  if (!p.PatchElf()) {
273    LOG(ERROR) << "Failed to patch oat file " << input_oat->GetPath();
274    return false;
275  }
276  if (!p.PatchImage()) {
277    LOG(ERROR) << "Failed to patch image file " << input_image->GetPath();
278    return false;
279  }
280
281  t.NewTiming("Writing files");
282  if (!p.WriteElf(output_oat)) {
283    return false;
284  }
285  if (!p.WriteImage(output_image)) {
286    return false;
287  }
288  return true;
289}
290
291bool PatchOat::WriteElf(File* out) {
292  TimingLogger::ScopedTiming t("Writing Elf File", timings_);
293
294  CHECK(oat_file_.get() != nullptr);
295  CHECK(out != nullptr);
296  size_t expect = oat_file_->Size();
297  if (out->WriteFully(reinterpret_cast<char*>(oat_file_->Begin()), expect) &&
298      out->SetLength(expect) == 0) {
299    return true;
300  } else {
301    LOG(ERROR) << "Writing to oat file " << out->GetPath() << " failed.";
302    return false;
303  }
304}
305
306bool PatchOat::WriteImage(File* out) {
307  TimingLogger::ScopedTiming t("Writing image File", timings_);
308  std::string error_msg;
309
310  ScopedFlock img_flock;
311  img_flock.Init(out, &error_msg);
312
313  CHECK(image_ != nullptr);
314  CHECK(out != nullptr);
315  size_t expect = image_->Size();
316  if (out->WriteFully(reinterpret_cast<char*>(image_->Begin()), expect) &&
317      out->SetLength(expect) == 0) {
318    return true;
319  } else {
320    LOG(ERROR) << "Writing to image file " << out->GetPath() << " failed.";
321    return false;
322  }
323}
324
325bool PatchOat::PatchImage() {
326  ImageHeader* image_header = reinterpret_cast<ImageHeader*>(image_->Begin());
327  CHECK_GT(image_->Size(), sizeof(ImageHeader));
328  // These are the roots from the original file.
329  mirror::Object* img_roots = image_header->GetImageRoots();
330  image_header->RelocateImage(delta_);
331
332  VisitObject(img_roots);
333  if (!image_header->IsValid()) {
334    LOG(ERROR) << "reloction renders image header invalid";
335    return false;
336  }
337
338  {
339    TimingLogger::ScopedTiming t("Walk Bitmap", timings_);
340    // Walk the bitmap.
341    WriterMutexLock mu(Thread::Current(), *Locks::heap_bitmap_lock_);
342    bitmap_->Walk(PatchOat::BitmapCallback, this);
343  }
344  return true;
345}
346
347bool PatchOat::InHeap(mirror::Object* o) {
348  uintptr_t begin = reinterpret_cast<uintptr_t>(heap_->Begin());
349  uintptr_t end = reinterpret_cast<uintptr_t>(heap_->End());
350  uintptr_t obj = reinterpret_cast<uintptr_t>(o);
351  return o == nullptr || (begin <= obj && obj < end);
352}
353
354void PatchOat::PatchVisitor::operator() (mirror::Object* obj, MemberOffset off,
355                                         bool is_static_unused) const {
356  mirror::Object* referent = obj->GetFieldObject<mirror::Object, kVerifyNone>(off);
357  DCHECK(patcher_->InHeap(referent)) << "Referent is not in the heap.";
358  mirror::Object* moved_object = patcher_->RelocatedAddressOf(referent);
359  copy_->SetFieldObjectWithoutWriteBarrier<false, true, kVerifyNone>(off, moved_object);
360}
361
362void PatchOat::PatchVisitor::operator() (mirror::Class* cls, mirror::Reference* ref) const {
363  MemberOffset off = mirror::Reference::ReferentOffset();
364  mirror::Object* referent = ref->GetReferent();
365  DCHECK(patcher_->InHeap(referent)) << "Referent is not in the heap.";
366  mirror::Object* moved_object = patcher_->RelocatedAddressOf(referent);
367  copy_->SetFieldObjectWithoutWriteBarrier<false, true, kVerifyNone>(off, moved_object);
368}
369
370mirror::Object* PatchOat::RelocatedCopyOf(mirror::Object* obj) {
371  if (obj == nullptr) {
372    return nullptr;
373  }
374  DCHECK_GT(reinterpret_cast<uintptr_t>(obj), reinterpret_cast<uintptr_t>(heap_->Begin()));
375  DCHECK_LT(reinterpret_cast<uintptr_t>(obj), reinterpret_cast<uintptr_t>(heap_->End()));
376  uintptr_t heap_off =
377      reinterpret_cast<uintptr_t>(obj) - reinterpret_cast<uintptr_t>(heap_->Begin());
378  DCHECK_LT(heap_off, image_->Size());
379  return reinterpret_cast<mirror::Object*>(image_->Begin() + heap_off);
380}
381
382mirror::Object* PatchOat::RelocatedAddressOf(mirror::Object* obj) {
383  if (obj == nullptr) {
384    return nullptr;
385  } else {
386    return reinterpret_cast<mirror::Object*>(reinterpret_cast<byte*>(obj) + delta_);
387  }
388}
389
390// Called by BitmapCallback
391void PatchOat::VisitObject(mirror::Object* object) {
392  mirror::Object* copy = RelocatedCopyOf(object);
393  CHECK(copy != nullptr);
394  if (kUseBakerOrBrooksReadBarrier) {
395    object->AssertReadBarrierPointer();
396    if (kUseBrooksReadBarrier) {
397      mirror::Object* moved_to = RelocatedAddressOf(object);
398      copy->SetReadBarrierPointer(moved_to);
399      DCHECK_EQ(copy->GetReadBarrierPointer(), moved_to);
400    }
401  }
402  PatchOat::PatchVisitor visitor(this, copy);
403  object->VisitReferences<true, kVerifyNone>(visitor, visitor);
404  if (object->IsArtMethod<kVerifyNone>()) {
405    FixupMethod(static_cast<mirror::ArtMethod*>(object),
406                static_cast<mirror::ArtMethod*>(copy));
407  }
408}
409
410void PatchOat::FixupMethod(mirror::ArtMethod* object, mirror::ArtMethod* copy) {
411  // Just update the entry points if it looks like we should.
412  // TODO: sanity check all the pointers' values
413  uintptr_t portable = reinterpret_cast<uintptr_t>(
414      object->GetEntryPointFromPortableCompiledCode<kVerifyNone>());
415  if (portable != 0) {
416    copy->SetEntryPointFromPortableCompiledCode(reinterpret_cast<void*>(portable + delta_));
417  }
418  uintptr_t quick= reinterpret_cast<uintptr_t>(
419      object->GetEntryPointFromQuickCompiledCode<kVerifyNone>());
420  if (quick != 0) {
421    copy->SetEntryPointFromQuickCompiledCode(reinterpret_cast<void*>(quick + delta_));
422  }
423  uintptr_t interpreter = reinterpret_cast<uintptr_t>(
424      object->GetEntryPointFromInterpreter<kVerifyNone>());
425  if (interpreter != 0) {
426    copy->SetEntryPointFromInterpreter(
427        reinterpret_cast<mirror::EntryPointFromInterpreter*>(interpreter + delta_));
428  }
429
430  uintptr_t native_method = reinterpret_cast<uintptr_t>(object->GetNativeMethod());
431  if (native_method != 0) {
432    copy->SetNativeMethod(reinterpret_cast<void*>(native_method + delta_));
433  }
434
435  uintptr_t native_gc_map = reinterpret_cast<uintptr_t>(object->GetNativeGcMap());
436  if (native_gc_map != 0) {
437    copy->SetNativeGcMap(reinterpret_cast<uint8_t*>(native_gc_map + delta_));
438  }
439}
440
441bool PatchOat::Patch(File* input_oat, off_t delta, File* output_oat, TimingLogger* timings) {
442  CHECK(input_oat != nullptr);
443  CHECK(output_oat != nullptr);
444  CHECK_GE(input_oat->Fd(), 0);
445  CHECK_GE(output_oat->Fd(), 0);
446  TimingLogger::ScopedTiming t("Setup Oat File Patching", timings);
447
448  std::string error_msg;
449  std::unique_ptr<ElfFile> elf(ElfFile::Open(const_cast<File*>(input_oat),
450                                             PROT_READ | PROT_WRITE, MAP_PRIVATE, &error_msg));
451  if (elf.get() == nullptr) {
452    LOG(ERROR) << "unable to open oat file " << input_oat->GetPath() << " : " << error_msg;
453    return false;
454  }
455
456  PatchOat p(elf.release(), delta, timings);
457  t.NewTiming("Patch Oat file");
458  if (!p.PatchElf()) {
459    return false;
460  }
461
462  t.NewTiming("Writing oat file");
463  if (!p.WriteElf(output_oat)) {
464    return false;
465  }
466  return true;
467}
468
469template <typename ptr_t>
470bool PatchOat::CheckOatFile(const Elf32_Shdr& patches_sec) {
471  if (patches_sec.sh_type != SHT_OAT_PATCH) {
472    return false;
473  }
474  ptr_t* patches = reinterpret_cast<ptr_t*>(oat_file_->Begin() + patches_sec.sh_offset);
475  ptr_t* patches_end = patches + (patches_sec.sh_size / sizeof(ptr_t));
476  Elf32_Shdr* oat_data_sec = oat_file_->FindSectionByName(".rodata");
477  Elf32_Shdr* oat_text_sec = oat_file_->FindSectionByName(".text");
478  if (oat_data_sec == nullptr) {
479    return false;
480  }
481  if (oat_text_sec == nullptr) {
482    return false;
483  }
484  if (oat_text_sec->sh_offset <= oat_data_sec->sh_offset) {
485    return false;
486  }
487
488  for (; patches < patches_end; patches++) {
489    if (oat_text_sec->sh_size <= *patches) {
490      return false;
491    }
492  }
493
494  return true;
495}
496
497bool PatchOat::PatchOatHeader() {
498  Elf32_Shdr *rodata_sec = oat_file_->FindSectionByName(".rodata");
499  if (rodata_sec == nullptr) {
500    return false;
501  }
502  OatHeader* oat_header = reinterpret_cast<OatHeader*>(oat_file_->Begin() + rodata_sec->sh_offset);
503  if (!oat_header->IsValid()) {
504    LOG(ERROR) << "Elf file " << oat_file_->GetFile().GetPath() << " has an invalid oat header";
505    return false;
506  }
507  oat_header->RelocateOat(delta_);
508  return true;
509}
510
511bool PatchOat::PatchElf() {
512  TimingLogger::ScopedTiming t("Fixup Elf Text Section", timings_);
513  if (!PatchTextSection()) {
514    return false;
515  }
516
517  if (!PatchOatHeader()) {
518    return false;
519  }
520
521  bool need_fixup = false;
522  t.NewTiming("Fixup Elf Headers");
523  // Fixup Phdr's
524  for (unsigned int i = 0; i < oat_file_->GetProgramHeaderNum(); i++) {
525    Elf32_Phdr* hdr = oat_file_->GetProgramHeader(i);
526    CHECK(hdr != nullptr);
527    if (hdr->p_vaddr != 0 && hdr->p_vaddr != hdr->p_offset) {
528      need_fixup = true;
529      hdr->p_vaddr += delta_;
530    }
531    if (hdr->p_paddr != 0 && hdr->p_paddr != hdr->p_offset) {
532      need_fixup = true;
533      hdr->p_paddr += delta_;
534    }
535  }
536  if (!need_fixup) {
537    // This was never passed through ElfFixup so all headers/symbols just have their offset as
538    // their addr. Therefore we do not need to update these parts.
539    return true;
540  }
541  t.NewTiming("Fixup Section Headers");
542  for (unsigned int i = 0; i < oat_file_->GetSectionHeaderNum(); i++) {
543    Elf32_Shdr* hdr = oat_file_->GetSectionHeader(i);
544    CHECK(hdr != nullptr);
545    if (hdr->sh_addr != 0) {
546      hdr->sh_addr += delta_;
547    }
548  }
549
550  t.NewTiming("Fixup Dynamics");
551  for (Elf32_Word i = 0; i < oat_file_->GetDynamicNum(); i++) {
552    Elf32_Dyn& dyn = oat_file_->GetDynamic(i);
553    if (IsDynamicSectionPointer(dyn.d_tag, oat_file_->GetHeader().e_machine)) {
554      dyn.d_un.d_ptr += delta_;
555    }
556  }
557
558  t.NewTiming("Fixup Elf Symbols");
559  // Fixup dynsym
560  Elf32_Shdr* dynsym_sec = oat_file_->FindSectionByName(".dynsym");
561  CHECK(dynsym_sec != nullptr);
562  if (!PatchSymbols(dynsym_sec)) {
563    return false;
564  }
565
566  // Fixup symtab
567  Elf32_Shdr* symtab_sec = oat_file_->FindSectionByName(".symtab");
568  if (symtab_sec != nullptr) {
569    if (!PatchSymbols(symtab_sec)) {
570      return false;
571    }
572  }
573
574  t.NewTiming("Fixup Debug Sections");
575  if (!oat_file_->FixupDebugSections(delta_)) {
576    return false;
577  }
578
579  return true;
580}
581
582bool PatchOat::PatchSymbols(Elf32_Shdr* section) {
583  Elf32_Sym* syms = reinterpret_cast<Elf32_Sym*>(oat_file_->Begin() + section->sh_offset);
584  const Elf32_Sym* last_sym =
585      reinterpret_cast<Elf32_Sym*>(oat_file_->Begin() + section->sh_offset + section->sh_size);
586  CHECK_EQ(section->sh_size % sizeof(Elf32_Sym), 0u)
587      << "Symtab section size is not multiple of symbol size";
588  for (; syms < last_sym; syms++) {
589    uint8_t sttype = ELF32_ST_TYPE(syms->st_info);
590    Elf32_Word shndx = syms->st_shndx;
591    if (shndx != SHN_ABS && shndx != SHN_COMMON && shndx != SHN_UNDEF &&
592        (sttype == STT_FUNC || sttype == STT_OBJECT)) {
593      CHECK_NE(syms->st_value, 0u);
594      syms->st_value += delta_;
595    }
596  }
597  return true;
598}
599
600bool PatchOat::PatchTextSection() {
601  Elf32_Shdr* patches_sec = oat_file_->FindSectionByName(".oat_patches");
602  if (patches_sec == nullptr) {
603    LOG(ERROR) << ".oat_patches section not found. Aborting patch";
604    return false;
605  }
606  if (patches_sec->sh_type != SHT_OAT_PATCH) {
607    LOG(ERROR) << "Unexpected type of .oat_patches";
608    return false;
609  }
610
611  switch (patches_sec->sh_entsize) {
612    case sizeof(uint32_t):
613      return PatchTextSection<uint32_t>(*patches_sec);
614    case sizeof(uint64_t):
615      return PatchTextSection<uint64_t>(*patches_sec);
616    default:
617      LOG(ERROR) << ".oat_patches Entsize of " << patches_sec->sh_entsize << "bits "
618                 << "is not valid";
619      return false;
620  }
621}
622
623template <typename ptr_t>
624bool PatchOat::PatchTextSection(const Elf32_Shdr& patches_sec) {
625  DCHECK(CheckOatFile<ptr_t>(patches_sec)) << "Oat file invalid";
626  ptr_t* patches = reinterpret_cast<ptr_t*>(oat_file_->Begin() + patches_sec.sh_offset);
627  ptr_t* patches_end = patches + (patches_sec.sh_size / sizeof(ptr_t));
628  Elf32_Shdr* oat_text_sec = oat_file_->FindSectionByName(".text");
629  CHECK(oat_text_sec != nullptr);
630  byte* to_patch = oat_file_->Begin() + oat_text_sec->sh_offset;
631  uintptr_t to_patch_end = reinterpret_cast<uintptr_t>(to_patch) + oat_text_sec->sh_size;
632
633  for (; patches < patches_end; patches++) {
634    CHECK_LT(*patches, oat_text_sec->sh_size) << "Bad Patch";
635    uint32_t* patch_loc = reinterpret_cast<uint32_t*>(to_patch + *patches);
636    CHECK_LT(reinterpret_cast<uintptr_t>(patch_loc), to_patch_end);
637    *patch_loc += delta_;
638  }
639  return true;
640}
641
642static int orig_argc;
643static char** orig_argv;
644
645static std::string CommandLine() {
646  std::vector<std::string> command;
647  for (int i = 0; i < orig_argc; ++i) {
648    command.push_back(orig_argv[i]);
649  }
650  return Join(command, ' ');
651}
652
653static void UsageErrorV(const char* fmt, va_list ap) {
654  std::string error;
655  StringAppendV(&error, fmt, ap);
656  LOG(ERROR) << error;
657}
658
659static void UsageError(const char* fmt, ...) {
660  va_list ap;
661  va_start(ap, fmt);
662  UsageErrorV(fmt, ap);
663  va_end(ap);
664}
665
666static void Usage(const char *fmt, ...) {
667  va_list ap;
668  va_start(ap, fmt);
669  UsageErrorV(fmt, ap);
670  va_end(ap);
671
672  UsageError("Command: %s", CommandLine().c_str());
673  UsageError("Usage: patchoat [options]...");
674  UsageError("");
675  UsageError("  --instruction-set=<isa>: Specifies the instruction set the patched code is");
676  UsageError("      compiled for. Required if you use --input-oat-location");
677  UsageError("");
678  UsageError("  --input-oat-file=<file.oat>: Specifies the exact filename of the oat file to be");
679  UsageError("      patched.");
680  UsageError("");
681  UsageError("  --input-oat-fd=<file-descriptor>: Specifies the file-descriptor of the oat file");
682  UsageError("      to be patched.");
683  UsageError("");
684  UsageError("  --input-oat-location=<file.oat>: Specifies the 'location' to read the patched");
685  UsageError("      oat file from. If used one must also supply the --instruction-set");
686  UsageError("");
687  UsageError("  --input-image-location=<file.art>: Specifies the 'location' of the image file to");
688  UsageError("      be patched. If --instruction-set is not given it will use the instruction set");
689  UsageError("      extracted from the --input-oat-file.");
690  UsageError("");
691  UsageError("  --output-oat-file=<file.oat>: Specifies the exact file to write the patched oat");
692  UsageError("      file to.");
693  UsageError("");
694  UsageError("  --output-oat-fd=<file-descriptor>: Specifies the file-descriptor to write the");
695  UsageError("      the patched oat file to.");
696  UsageError("");
697  UsageError("  --output-image-file=<file.art>: Specifies the exact file to write the patched");
698  UsageError("      image file to.");
699  UsageError("");
700  UsageError("  --output-image-fd=<file-descriptor>: Specifies the file-descriptor to write the");
701  UsageError("      the patched image file to.");
702  UsageError("");
703  UsageError("  --orig-base-offset=<original-base-offset>: Specify the base offset the input file");
704  UsageError("      was compiled with. This is needed if one is specifying a --base-offset");
705  UsageError("");
706  UsageError("  --base-offset=<new-base-offset>: Specify the base offset we will repatch the");
707  UsageError("      given files to use. This requires that --orig-base-offset is also given.");
708  UsageError("");
709  UsageError("  --base-offset-delta=<delta>: Specify the amount to change the old base-offset by.");
710  UsageError("      This value may be negative.");
711  UsageError("");
712  UsageError("  --patched-image-file=<file.art>: Use the same patch delta as was used to patch");
713  UsageError("      the given image file.");
714  UsageError("");
715  UsageError("  --patched-image-location=<file.art>: Use the same patch delta as was used to");
716  UsageError("      patch the given image location. If used one must also specify the");
717  UsageError("      --instruction-set flag. It will search for this image in the same way that");
718  UsageError("      is done when loading one.");
719  UsageError("");
720  UsageError("  --lock-output: Obtain a flock on output oat file before starting.");
721  UsageError("");
722  UsageError("  --no-lock-output: Do not attempt to obtain a flock on output oat file.");
723  UsageError("");
724  UsageError("  --dump-timings: dump out patch timing information");
725  UsageError("");
726  UsageError("  --no-dump-timings: do not dump out patch timing information");
727  UsageError("");
728
729  exit(EXIT_FAILURE);
730}
731
732static bool ReadBaseDelta(const char* name, off_t* delta, std::string* error_msg) {
733  CHECK(name != nullptr);
734  CHECK(delta != nullptr);
735  std::unique_ptr<File> file;
736  if (OS::FileExists(name)) {
737    file.reset(OS::OpenFileForReading(name));
738    if (file.get() == nullptr) {
739      *error_msg = "Failed to open file %s for reading";
740      return false;
741    }
742  } else {
743    *error_msg = "File %s does not exist";
744    return false;
745  }
746  CHECK(file.get() != nullptr);
747  ImageHeader hdr;
748  if (sizeof(hdr) != file->Read(reinterpret_cast<char*>(&hdr), sizeof(hdr), 0)) {
749    *error_msg = "Failed to read file %s";
750    return false;
751  }
752  if (!hdr.IsValid()) {
753    *error_msg = "%s does not contain a valid image header.";
754    return false;
755  }
756  *delta = hdr.GetPatchDelta();
757  return true;
758}
759
760static File* CreateOrOpen(const char* name, bool* created) {
761  if (OS::FileExists(name)) {
762    *created = false;
763    return OS::OpenFileReadWrite(name);
764  } else {
765    *created = true;
766    std::unique_ptr<File> f(OS::CreateEmptyFile(name));
767    if (f.get() != nullptr) {
768      if (fchmod(f->Fd(), 0644) != 0) {
769        PLOG(ERROR) << "Unable to make " << name << " world readable";
770        unlink(name);
771        return nullptr;
772      }
773    }
774    return f.release();
775  }
776}
777
778static int patchoat(int argc, char **argv) {
779  InitLogging(argv);
780  const bool debug = kIsDebugBuild;
781  orig_argc = argc;
782  orig_argv = argv;
783  TimingLogger timings("patcher", false, false);
784
785  InitLogging(argv);
786
787  // Skip over the command name.
788  argv++;
789  argc--;
790
791  if (argc == 0) {
792    Usage("No arguments specified");
793  }
794
795  timings.StartTiming("Patchoat");
796
797  // cmd line args
798  bool isa_set = false;
799  InstructionSet isa = kNone;
800  std::string input_oat_filename;
801  std::string input_oat_location;
802  int input_oat_fd = -1;
803  bool have_input_oat = false;
804  std::string input_image_location;
805  std::string output_oat_filename;
806  int output_oat_fd = -1;
807  bool have_output_oat = false;
808  std::string output_image_filename;
809  int output_image_fd = -1;
810  bool have_output_image = false;
811  uintptr_t base_offset = 0;
812  bool base_offset_set = false;
813  uintptr_t orig_base_offset = 0;
814  bool orig_base_offset_set = false;
815  off_t base_delta = 0;
816  bool base_delta_set = false;
817  std::string patched_image_filename;
818  std::string patched_image_location;
819  bool dump_timings = kIsDebugBuild;
820  bool lock_output = true;
821
822  for (int i = 0; i < argc; i++) {
823    const StringPiece option(argv[i]);
824    const bool log_options = false;
825    if (log_options) {
826      LOG(INFO) << "patchoat: option[" << i << "]=" << argv[i];
827    }
828    if (option.starts_with("--instruction-set=")) {
829      isa_set = true;
830      const char* isa_str = option.substr(strlen("--instruction-set=")).data();
831      isa = GetInstructionSetFromString(isa_str);
832      if (isa == kNone) {
833        Usage("Unknown or invalid instruction set %s", isa_str);
834      }
835    } else if (option.starts_with("--input-oat-location=")) {
836      if (have_input_oat) {
837        Usage("Only one of --input-oat-file, --input-oat-location and --input-oat-fd may be used.");
838      }
839      have_input_oat = true;
840      input_oat_location = option.substr(strlen("--input-oat-location=")).data();
841    } else if (option.starts_with("--input-oat-file=")) {
842      if (have_input_oat) {
843        Usage("Only one of --input-oat-file, --input-oat-location and --input-oat-fd may be used.");
844      }
845      have_input_oat = true;
846      input_oat_filename = option.substr(strlen("--input-oat-file=")).data();
847    } else if (option.starts_with("--input-oat-fd=")) {
848      if (have_input_oat) {
849        Usage("Only one of --input-oat-file, --input-oat-location and --input-oat-fd may be used.");
850      }
851      have_input_oat = true;
852      const char* oat_fd_str = option.substr(strlen("--input-oat-fd=")).data();
853      if (!ParseInt(oat_fd_str, &input_oat_fd)) {
854        Usage("Failed to parse --input-oat-fd argument '%s' as an integer", oat_fd_str);
855      }
856      if (input_oat_fd < 0) {
857        Usage("--input-oat-fd pass a negative value %d", input_oat_fd);
858      }
859    } else if (option.starts_with("--input-image-location=")) {
860      input_image_location = option.substr(strlen("--input-image-location=")).data();
861    } else if (option.starts_with("--output-oat-file=")) {
862      if (have_output_oat) {
863        Usage("Only one of --output-oat-file, and --output-oat-fd may be used.");
864      }
865      have_output_oat = true;
866      output_oat_filename = option.substr(strlen("--output-oat-file=")).data();
867    } else if (option.starts_with("--output-oat-fd=")) {
868      if (have_output_oat) {
869        Usage("Only one of --output-oat-file, --output-oat-fd may be used.");
870      }
871      have_output_oat = true;
872      const char* oat_fd_str = option.substr(strlen("--output-oat-fd=")).data();
873      if (!ParseInt(oat_fd_str, &output_oat_fd)) {
874        Usage("Failed to parse --output-oat-fd argument '%s' as an integer", oat_fd_str);
875      }
876      if (output_oat_fd < 0) {
877        Usage("--output-oat-fd pass a negative value %d", output_oat_fd);
878      }
879    } else if (option.starts_with("--output-image-file=")) {
880      if (have_output_image) {
881        Usage("Only one of --output-image-file, and --output-image-fd may be used.");
882      }
883      have_output_image = true;
884      output_image_filename = option.substr(strlen("--output-image-file=")).data();
885    } else if (option.starts_with("--output-image-fd=")) {
886      if (have_output_image) {
887        Usage("Only one of --output-image-file, and --output-image-fd may be used.");
888      }
889      have_output_image = true;
890      const char* image_fd_str = option.substr(strlen("--output-image-fd=")).data();
891      if (!ParseInt(image_fd_str, &output_image_fd)) {
892        Usage("Failed to parse --output-image-fd argument '%s' as an integer", image_fd_str);
893      }
894      if (output_image_fd < 0) {
895        Usage("--output-image-fd pass a negative value %d", output_image_fd);
896      }
897    } else if (option.starts_with("--orig-base-offset=")) {
898      const char* orig_base_offset_str = option.substr(strlen("--orig-base-offset=")).data();
899      orig_base_offset_set = true;
900      if (!ParseUint(orig_base_offset_str, &orig_base_offset)) {
901        Usage("Failed to parse --orig-base-offset argument '%s' as an uintptr_t",
902              orig_base_offset_str);
903      }
904    } else if (option.starts_with("--base-offset=")) {
905      const char* base_offset_str = option.substr(strlen("--base-offset=")).data();
906      base_offset_set = true;
907      if (!ParseUint(base_offset_str, &base_offset)) {
908        Usage("Failed to parse --base-offset argument '%s' as an uintptr_t", base_offset_str);
909      }
910    } else if (option.starts_with("--base-offset-delta=")) {
911      const char* base_delta_str = option.substr(strlen("--base-offset-delta=")).data();
912      base_delta_set = true;
913      if (!ParseInt(base_delta_str, &base_delta)) {
914        Usage("Failed to parse --base-offset-delta argument '%s' as an off_t", base_delta_str);
915      }
916    } else if (option.starts_with("--patched-image-location=")) {
917      patched_image_location = option.substr(strlen("--patched-image-location=")).data();
918    } else if (option.starts_with("--patched-image-file=")) {
919      patched_image_filename = option.substr(strlen("--patched-image-file=")).data();
920    } else if (option == "--lock-output") {
921      lock_output = true;
922    } else if (option == "--no-lock-output") {
923      lock_output = false;
924    } else if (option == "--dump-timings") {
925      dump_timings = true;
926    } else if (option == "--no-dump-timings") {
927      dump_timings = false;
928    } else {
929      Usage("Unknown argument %s", option.data());
930    }
931  }
932
933  {
934    // Only 1 of these may be set.
935    uint32_t cnt = 0;
936    cnt += (base_delta_set) ? 1 : 0;
937    cnt += (base_offset_set && orig_base_offset_set) ? 1 : 0;
938    cnt += (!patched_image_filename.empty()) ? 1 : 0;
939    cnt += (!patched_image_location.empty()) ? 1 : 0;
940    if (cnt > 1) {
941      Usage("Only one of --base-offset/--orig-base-offset, --base-offset-delta, "
942            "--patched-image-filename or --patched-image-location may be used.");
943    } else if (cnt == 0) {
944      Usage("Must specify --base-offset-delta, --base-offset and --orig-base-offset, "
945            "--patched-image-location or --patched-image-file");
946    }
947  }
948
949  if (have_input_oat != have_output_oat) {
950    Usage("Either both input and output oat must be supplied or niether must be.");
951  }
952
953  if ((!input_image_location.empty()) != have_output_image) {
954    Usage("Either both input and output image must be supplied or niether must be.");
955  }
956
957  // We know we have both the input and output so rename for clarity.
958  bool have_image_files = have_output_image;
959  bool have_oat_files = have_output_oat;
960
961  if (!have_oat_files && !have_image_files) {
962    Usage("Must be patching either an oat or an image file or both.");
963  }
964
965  if (!have_oat_files && !isa_set) {
966    Usage("Must include ISA if patching an image file without an oat file.");
967  }
968
969  if (!input_oat_location.empty()) {
970    if (!isa_set) {
971      Usage("specifying a location requires specifying an instruction set");
972    }
973    if (!LocationToFilename(input_oat_location, isa, &input_oat_filename)) {
974      Usage("Unable to find filename for input oat location %s", input_oat_location.c_str());
975    }
976    if (debug) {
977      LOG(INFO) << "Using input-oat-file " << input_oat_filename;
978    }
979  }
980  if (!patched_image_location.empty()) {
981    if (!isa_set) {
982      Usage("specifying a location requires specifying an instruction set");
983    }
984    std::string system_filename;
985    bool has_system = false;
986    std::string cache_filename;
987    bool has_cache = false;
988    bool has_android_data_unused = false;
989    if (!gc::space::ImageSpace::FindImageFilename(patched_image_location.c_str(), isa,
990                                                  &system_filename, &has_system, &cache_filename,
991                                                  &has_android_data_unused, &has_cache)) {
992      Usage("Unable to determine image file for location %s", patched_image_location.c_str());
993    }
994    if (has_cache) {
995      patched_image_filename = cache_filename;
996    } else if (has_system) {
997      LOG(WARNING) << "Only image file found was in /system for image location "
998                   << patched_image_location;
999      patched_image_filename = system_filename;
1000    } else {
1001      Usage("Unable to determine image file for location %s", patched_image_location.c_str());
1002    }
1003    if (debug) {
1004      LOG(INFO) << "Using patched-image-file " << patched_image_filename;
1005    }
1006  }
1007
1008  if (!base_delta_set) {
1009    if (orig_base_offset_set && base_offset_set) {
1010      base_delta_set = true;
1011      base_delta = base_offset - orig_base_offset;
1012    } else if (!patched_image_filename.empty()) {
1013      base_delta_set = true;
1014      std::string error_msg;
1015      if (!ReadBaseDelta(patched_image_filename.c_str(), &base_delta, &error_msg)) {
1016        Usage(error_msg.c_str(), patched_image_filename.c_str());
1017      }
1018    } else {
1019      if (base_offset_set) {
1020        Usage("Unable to determine original base offset.");
1021      } else {
1022        Usage("Must supply a desired new offset or delta.");
1023      }
1024    }
1025  }
1026
1027  if (!IsAligned<kPageSize>(base_delta)) {
1028    Usage("Base offset/delta must be alligned to a pagesize (0x%08x) boundary.", kPageSize);
1029  }
1030
1031  // Do we need to cleanup output files if we fail?
1032  bool new_image_out = false;
1033  bool new_oat_out = false;
1034
1035  std::unique_ptr<File> input_oat;
1036  std::unique_ptr<File> output_oat;
1037  std::unique_ptr<File> output_image;
1038
1039  if (have_image_files) {
1040    CHECK(!input_image_location.empty());
1041
1042    if (output_image_fd != -1) {
1043      if (output_image_filename.empty()) {
1044        output_image_filename = "output-image-file";
1045      }
1046      output_image.reset(new File(output_image_fd, output_image_filename));
1047    } else {
1048      CHECK(!output_image_filename.empty());
1049      output_image.reset(CreateOrOpen(output_image_filename.c_str(), &new_image_out));
1050    }
1051  } else {
1052    CHECK(output_image_filename.empty() && output_image_fd == -1 && input_image_location.empty());
1053  }
1054
1055  if (have_oat_files) {
1056    if (input_oat_fd != -1) {
1057      if (input_oat_filename.empty()) {
1058        input_oat_filename = "input-oat-file";
1059      }
1060      input_oat.reset(new File(input_oat_fd, input_oat_filename));
1061    } else {
1062      CHECK(!input_oat_filename.empty());
1063      input_oat.reset(OS::OpenFileForReading(input_oat_filename.c_str()));
1064      if (input_oat.get() == nullptr) {
1065        LOG(ERROR) << "Could not open input oat file: " << strerror(errno);
1066      }
1067    }
1068
1069    if (output_oat_fd != -1) {
1070      if (output_oat_filename.empty()) {
1071        output_oat_filename = "output-oat-file";
1072      }
1073      output_oat.reset(new File(output_oat_fd, output_oat_filename));
1074    } else {
1075      CHECK(!output_oat_filename.empty());
1076      output_oat.reset(CreateOrOpen(output_oat_filename.c_str(), &new_oat_out));
1077    }
1078  }
1079
1080  auto cleanup = [&output_image_filename, &output_oat_filename,
1081                  &new_oat_out, &new_image_out, &timings, &dump_timings](bool success) {
1082    timings.EndTiming();
1083    if (!success) {
1084      if (new_oat_out) {
1085        CHECK(!output_oat_filename.empty());
1086        unlink(output_oat_filename.c_str());
1087      }
1088      if (new_image_out) {
1089        CHECK(!output_image_filename.empty());
1090        unlink(output_image_filename.c_str());
1091      }
1092    }
1093    if (dump_timings) {
1094      LOG(INFO) << Dumpable<TimingLogger>(timings);
1095    }
1096  };
1097
1098  if ((have_oat_files && (input_oat.get() == nullptr || output_oat.get() == nullptr)) ||
1099      (have_image_files && output_image.get() == nullptr)) {
1100    cleanup(false);
1101    return EXIT_FAILURE;
1102  }
1103
1104  ScopedFlock output_oat_lock;
1105  if (lock_output) {
1106    std::string error_msg;
1107    if (have_oat_files && !output_oat_lock.Init(output_oat.get(), &error_msg)) {
1108      LOG(ERROR) << "Unable to lock output oat " << output_image->GetPath() << ": " << error_msg;
1109      cleanup(false);
1110      return EXIT_FAILURE;
1111    }
1112  }
1113
1114  if (debug) {
1115    LOG(INFO) << "moving offset by " << base_delta
1116              << " (0x" << std::hex << base_delta << ") bytes or "
1117              << std::dec << (base_delta/kPageSize) << " pages.";
1118  }
1119
1120  bool ret;
1121  if (have_image_files && have_oat_files) {
1122    TimingLogger::ScopedTiming pt("patch image and oat", &timings);
1123    ret = PatchOat::Patch(input_oat.get(), input_image_location, base_delta,
1124                          output_oat.get(), output_image.get(), isa, &timings);
1125  } else if (have_oat_files) {
1126    TimingLogger::ScopedTiming pt("patch oat", &timings);
1127    ret = PatchOat::Patch(input_oat.get(), base_delta, output_oat.get(), &timings);
1128  } else {
1129    TimingLogger::ScopedTiming pt("patch image", &timings);
1130    CHECK(have_image_files);
1131    ret = PatchOat::Patch(input_image_location, base_delta, output_image.get(), isa, &timings);
1132  }
1133  cleanup(ret);
1134  return (ret) ? EXIT_SUCCESS : EXIT_FAILURE;
1135}
1136
1137}  // namespace art
1138
1139int main(int argc, char **argv) {
1140  return art::patchoat(argc, argv);
1141}
1142