1 /*
2  * Copyright (C) 2019 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #if defined(ART_TARGET_ANDROID)
18 
19 #include "library_namespaces.h"
20 
21 #include <dirent.h>
22 #include <dlfcn.h>
23 
24 #include <regex>
25 #include <string>
26 #include <vector>
27 
28 #include <android-base/file.h>
29 #include <android-base/logging.h>
30 #include <android-base/macros.h>
31 #include <android-base/properties.h>
32 #include <android-base/result.h>
33 #include <android-base/strings.h>
34 #include <nativehelper/scoped_utf_chars.h>
35 
36 #include "nativeloader/dlext_namespaces.h"
37 #include "public_libraries.h"
38 #include "utils.h"
39 
40 namespace android::nativeloader {
41 
42 namespace {
43 
44 constexpr const char* kApexPath = "/apex/";
45 
46 // The device may be configured to have the vendor libraries loaded to a separate namespace.
47 // For historical reasons this namespace was named sphal but effectively it is intended
48 // to use to load vendor libraries to separate namespace with controlled interface between
49 // vendor and system namespaces.
50 constexpr const char* kVendorNamespaceName = "sphal";
51 constexpr const char* kVndkNamespaceName = "vndk";
52 constexpr const char* kVndkProductNamespaceName = "vndk_product";
53 constexpr const char* kArtNamespaceName = "com_android_art";
54 constexpr const char* kI18nNamespaceName = "com_android_i18n";
55 constexpr const char* kNeuralNetworksNamespaceName = "com_android_neuralnetworks";
56 constexpr const char* kStatsdNamespaceName = "com_android_os_statsd";
57 
58 // classloader-namespace is a linker namespace that is created for the loaded
59 // app. To be specific, it is created for the app classloader. When
60 // System.load() is called from a Java class that is loaded from the
61 // classloader, the classloader-namespace namespace associated with that
62 // classloader is selected for dlopen. The namespace is configured so that its
63 // search path is set to the app-local JNI directory and it is linked to the
64 // system namespace with the names of libs listed in the public.libraries.txt.
65 // This way an app can only load its own JNI libraries along with the public libs.
66 constexpr const char* kClassloaderNamespaceName = "classloader-namespace";
67 // Same thing for vendor APKs.
68 constexpr const char* kVendorClassloaderNamespaceName = "vendor-classloader-namespace";
69 // If the namespace is shared then add this suffix to form
70 // "classloader-namespace-shared" or "vendor-classloader-namespace-shared",
71 // respectively. A shared namespace (cf. ANDROID_NAMESPACE_TYPE_SHARED) has
72 // inherited all the libraries of the parent classloader namespace, or the
73 // system namespace for the main app classloader. It is used to give full
74 // access to the platform libraries for apps bundled in the system image,
75 // including their later updates installed in /data.
76 constexpr const char* kSharedNamespaceSuffix = "-shared";
77 
78 // (http://b/27588281) This is a workaround for apps using custom classloaders and calling
79 // System.load() with an absolute path which is outside of the classloader library search path.
80 // This list includes all directories app is allowed to access this way.
81 constexpr const char* kWhitelistedDirectories = "/data:/mnt/expand";
82 
83 constexpr const char* kVendorLibPath = "/vendor/" LIB;
84 constexpr const char* kProductLibPath = "/product/" LIB ":/system/product/" LIB;
85 
86 const std::regex kVendorDexPathRegex("(^|:)/vendor/");
87 const std::regex kProductDexPathRegex("(^|:)(/system)?/product/");
88 
89 // Define origin of APK if it is from vendor partition or product partition
90 using ApkOrigin = enum {
91   APK_ORIGIN_DEFAULT = 0,
92   APK_ORIGIN_VENDOR = 1,
93   APK_ORIGIN_PRODUCT = 2,
94 };
95 
GetParentClassLoader(JNIEnv * env,jobject class_loader)96 jobject GetParentClassLoader(JNIEnv* env, jobject class_loader) {
97   jclass class_loader_class = env->FindClass("java/lang/ClassLoader");
98   jmethodID get_parent =
99       env->GetMethodID(class_loader_class, "getParent", "()Ljava/lang/ClassLoader;");
100 
101   return env->CallObjectMethod(class_loader, get_parent);
102 }
103 
GetApkOriginFromDexPath(const std::string & dex_path)104 ApkOrigin GetApkOriginFromDexPath(const std::string& dex_path) {
105   ApkOrigin apk_origin = APK_ORIGIN_DEFAULT;
106   if (std::regex_search(dex_path, kVendorDexPathRegex)) {
107     apk_origin = APK_ORIGIN_VENDOR;
108   }
109   if (std::regex_search(dex_path, kProductDexPathRegex)) {
110     LOG_ALWAYS_FATAL_IF(apk_origin == APK_ORIGIN_VENDOR,
111                         "Dex path contains both vendor and product partition : %s",
112                         dex_path.c_str());
113 
114     apk_origin = APK_ORIGIN_PRODUCT;
115   }
116   return apk_origin;
117 }
118 
119 }  // namespace
120 
Initialize()121 void LibraryNamespaces::Initialize() {
122   // Once public namespace is initialized there is no
123   // point in running this code - it will have no effect
124   // on the current list of public libraries.
125   if (initialized_) {
126     return;
127   }
128 
129   // android_init_namespaces() expects all the public libraries
130   // to be loaded so that they can be found by soname alone.
131   //
132   // TODO(dimitry): this is a bit misleading since we do not know
133   // if the vendor public library is going to be opened from /vendor/lib
134   // we might as well end up loading them from /system/lib or /product/lib
135   // For now we rely on CTS test to catch things like this but
136   // it should probably be addressed in the future.
137   for (const auto& soname : android::base::Split(preloadable_public_libraries(), ":")) {
138     LOG_ALWAYS_FATAL_IF(dlopen(soname.c_str(), RTLD_NOW | RTLD_NODELETE) == nullptr,
139                         "Error preloading public library %s: %s", soname.c_str(), dlerror());
140   }
141 }
142 
143 // "ALL" is a magic name that allows all public libraries even when the
144 // target SDK is > 30. Currently this is used for (Java) shared libraries
145 // which don't use <uses-native-library>
146 // TODO(b/142191088) remove this hack
147 static constexpr const char LIBRARY_ALL[] = "ALL";
148 
149 // Returns the colon-separated list of library names by filtering uses_libraries from
150 // public_libraries. The returned names will actually be available to the app. If the app is pre-S
151 // (<= 30), the filtering is not done; the entire public_libraries are provided.
filter_public_libraries(uint32_t target_sdk_version,const std::vector<std::string> & uses_libraries,const std::string & public_libraries)152 static const std::string filter_public_libraries(
153     uint32_t target_sdk_version, const std::vector<std::string>& uses_libraries,
154     const std::string& public_libraries) {
155   // Apps targeting Android 11 or earlier gets all public libraries
156   if (target_sdk_version <= 30) {
157     return public_libraries;
158   }
159   if (std::find(uses_libraries.begin(), uses_libraries.end(), LIBRARY_ALL) !=
160       uses_libraries.end()) {
161     return public_libraries;
162   }
163   std::vector<std::string> filtered;
164   std::vector<std::string> orig = android::base::Split(public_libraries, ":");
165   for (const auto& lib : uses_libraries) {
166     if (std::find(orig.begin(), orig.end(), lib) != orig.end()) {
167       filtered.emplace_back(lib);
168     }
169   }
170   return android::base::Join(filtered, ":");
171 }
172 
Create(JNIEnv * env,uint32_t target_sdk_version,jobject class_loader,bool is_shared,jstring dex_path_j,jstring java_library_path,jstring java_permitted_path,jstring uses_library_list)173 Result<NativeLoaderNamespace*> LibraryNamespaces::Create(JNIEnv* env, uint32_t target_sdk_version,
174                                                          jobject class_loader, bool is_shared,
175                                                          jstring dex_path_j,
176                                                          jstring java_library_path,
177                                                          jstring java_permitted_path,
178                                                          jstring uses_library_list) {
179   std::string library_path;  // empty string by default.
180   std::string dex_path;
181 
182   if (java_library_path != nullptr) {
183     ScopedUtfChars library_path_utf_chars(env, java_library_path);
184     library_path = library_path_utf_chars.c_str();
185   }
186 
187   if (dex_path_j != nullptr) {
188     ScopedUtfChars dex_path_chars(env, dex_path_j);
189     dex_path = dex_path_chars.c_str();
190   }
191 
192   std::vector<std::string> uses_libraries;
193   if (uses_library_list != nullptr) {
194     ScopedUtfChars names(env, uses_library_list);
195     uses_libraries = android::base::Split(names.c_str(), ":");
196   } else {
197     // uses_library_list could be nullptr when System.loadLibrary is called from a
198     // custom classloader. In that case, we don't know the list of public
199     // libraries because we don't know which apk the classloader is for. Only
200     // choices we can have are 1) allowing all public libs (as before), or 2)
201     // not allowing all but NDK libs. Here we take #1 because #2 would surprise
202     // developers unnecessarily.
203     // TODO(b/142191088) finalize the policy here. We could either 1) allow all
204     // public libs, 2) disallow any lib, or 3) use the libs that were granted to
205     // the first (i.e. app main) classloader.
206     uses_libraries.emplace_back(LIBRARY_ALL);
207   }
208 
209   ApkOrigin apk_origin = GetApkOriginFromDexPath(dex_path);
210 
211   // (http://b/27588281) This is a workaround for apps using custom
212   // classloaders and calling System.load() with an absolute path which
213   // is outside of the classloader library search path.
214   //
215   // This part effectively allows such a classloader to access anything
216   // under /data and /mnt/expand
217   std::string permitted_path = kWhitelistedDirectories;
218 
219   if (java_permitted_path != nullptr) {
220     ScopedUtfChars path(env, java_permitted_path);
221     if (path.c_str() != nullptr && path.size() > 0) {
222       permitted_path = permitted_path + ":" + path.c_str();
223     }
224   }
225 
226   LOG_ALWAYS_FATAL_IF(FindNamespaceByClassLoader(env, class_loader) != nullptr,
227                       "There is already a namespace associated with this classloader");
228 
229   std::string system_exposed_libraries = default_public_libraries();
230   std::string namespace_name = kClassloaderNamespaceName;
231   ApkOrigin unbundled_app_origin = APK_ORIGIN_DEFAULT;
232   if ((apk_origin == APK_ORIGIN_VENDOR ||
233        (apk_origin == APK_ORIGIN_PRODUCT &&
234         is_product_vndk_version_defined())) &&
235       !is_shared) {
236     unbundled_app_origin = apk_origin;
237     // For vendor / product apks, give access to the vendor / product lib even though
238     // they are treated as unbundled; the libs and apks are still bundled
239     // together in the vendor / product partition.
240     const char* origin_partition;
241     const char* origin_lib_path;
242     const char* llndk_libraries;
243 
244     switch (apk_origin) {
245       case APK_ORIGIN_VENDOR:
246         origin_partition = "vendor";
247         origin_lib_path = kVendorLibPath;
248         llndk_libraries = llndk_libraries_vendor().c_str();
249         break;
250       case APK_ORIGIN_PRODUCT:
251         origin_partition = "product";
252         origin_lib_path = kProductLibPath;
253         llndk_libraries = llndk_libraries_product().c_str();
254         break;
255       default:
256         origin_partition = "unknown";
257         origin_lib_path = "";
258         llndk_libraries = "";
259     }
260     library_path = library_path + ":" + origin_lib_path;
261     permitted_path = permitted_path + ":" + origin_lib_path;
262 
263     // Also give access to LLNDK libraries since they are available to vendor or product
264     system_exposed_libraries = system_exposed_libraries + ":" + llndk_libraries;
265 
266     // Different name is useful for debugging
267     namespace_name = kVendorClassloaderNamespaceName;
268     ALOGD("classloader namespace configured for unbundled %s apk. library_path=%s",
269           origin_partition, library_path.c_str());
270   } else {
271     auto libs = filter_public_libraries(target_sdk_version, uses_libraries,
272                                         extended_public_libraries());
273     // extended public libraries are NOT available to vendor apks, otherwise it
274     // would be system->vendor violation.
275     if (!libs.empty()) {
276       system_exposed_libraries = system_exposed_libraries + ':' + libs;
277     }
278   }
279 
280   if (is_shared) {
281     // Show in the name that the namespace was created as shared, for debugging
282     // purposes.
283     namespace_name = namespace_name + kSharedNamespaceSuffix;
284   }
285 
286   // Create the app namespace
287   NativeLoaderNamespace* parent_ns = FindParentNamespaceByClassLoader(env, class_loader);
288   // Heuristic: the first classloader with non-empty library_path is assumed to
289   // be the main classloader for app
290   // TODO(b/139178525) remove this heuristic by determining this in LoadedApk (or its
291   // friends) and then passing it down to here.
292   bool is_main_classloader = app_main_namespace_ == nullptr && !library_path.empty();
293   // Policy: the namespace for the main classloader is also used as the
294   // anonymous namespace.
295   bool also_used_as_anonymous = is_main_classloader;
296   // Note: this function is executed with g_namespaces_mutex held, thus no
297   // racing here.
298   auto app_ns = NativeLoaderNamespace::Create(
299       namespace_name, library_path, permitted_path, parent_ns, is_shared,
300       target_sdk_version < 24 /* is_greylist_enabled */, also_used_as_anonymous);
301   if (!app_ns.ok()) {
302     return app_ns.error();
303   }
304   // ... and link to other namespaces to allow access to some public libraries
305   bool is_bridged = app_ns->IsBridged();
306 
307   auto system_ns = NativeLoaderNamespace::GetSystemNamespace(is_bridged);
308   if (!system_ns.ok()) {
309     return system_ns.error();
310   }
311 
312   auto linked = app_ns->Link(*system_ns, system_exposed_libraries);
313   if (!linked.ok()) {
314     return linked.error();
315   }
316 
317   auto art_ns = NativeLoaderNamespace::GetExportedNamespace(kArtNamespaceName, is_bridged);
318   // ART APEX does not exist on host, and under certain build conditions.
319   if (art_ns.ok()) {
320     linked = app_ns->Link(*art_ns, art_public_libraries());
321     if (!linked.ok()) {
322       return linked.error();
323     }
324   }
325 
326   auto i18n_ns = NativeLoaderNamespace::GetExportedNamespace(kI18nNamespaceName, is_bridged);
327   // i18n APEX does not exist on host, and under certain build conditions.
328   if (i18n_ns.ok()) {
329     linked = app_ns->Link(*i18n_ns, i18n_public_libraries());
330     if (!linked.ok()) {
331       return linked.error();
332     }
333   }
334 
335   // Give access to NNAPI libraries (apex-updated LLNDK library).
336   auto nnapi_ns =
337       NativeLoaderNamespace::GetExportedNamespace(kNeuralNetworksNamespaceName, is_bridged);
338   if (nnapi_ns.ok()) {
339     linked = app_ns->Link(*nnapi_ns, neuralnetworks_public_libraries());
340     if (!linked.ok()) {
341       return linked.error();
342     }
343   }
344 
345   // Give access to VNDK-SP libraries from the 'vndk' namespace for unbundled vendor apps.
346   if (unbundled_app_origin == APK_ORIGIN_VENDOR && !vndksp_libraries_vendor().empty()) {
347     auto vndk_ns = NativeLoaderNamespace::GetExportedNamespace(kVndkNamespaceName, is_bridged);
348     if (vndk_ns.ok()) {
349       linked = app_ns->Link(*vndk_ns, vndksp_libraries_vendor());
350       if (!linked.ok()) {
351         return linked.error();
352       }
353     }
354   }
355 
356   // Give access to VNDK-SP libraries from the 'vndk_product' namespace for unbundled product apps.
357   if (unbundled_app_origin == APK_ORIGIN_PRODUCT && !vndksp_libraries_product().empty()) {
358     auto vndk_ns = NativeLoaderNamespace::GetExportedNamespace(kVndkProductNamespaceName, is_bridged);
359     if (vndk_ns.ok()) {
360       linked = app_ns->Link(*vndk_ns, vndksp_libraries_product());
361       if (!linked.ok()) {
362         return linked.error();
363       }
364     }
365   }
366 
367   auto apex_ns_name = FindApexNamespaceName(dex_path);
368   if (apex_ns_name.ok()) {
369     const auto& jni_libs = apex_jni_libraries(*apex_ns_name);
370     if (jni_libs != "") {
371       auto apex_ns = NativeLoaderNamespace::GetExportedNamespace(*apex_ns_name, is_bridged);
372       if (apex_ns.ok()) {
373         auto link = app_ns->Link(*apex_ns, jni_libs);
374         if (!link.ok()) {
375           return linked.error();
376         }
377       }
378     }
379   }
380 
381   // Give access to StatsdAPI libraries
382   auto statsd_ns =
383       NativeLoaderNamespace::GetExportedNamespace(kStatsdNamespaceName, is_bridged);
384   if (statsd_ns.ok()) {
385     linked = app_ns->Link(*statsd_ns, statsd_public_libraries());
386     if (!linked.ok()) {
387       return linked.error();
388     }
389   }
390 
391   auto vendor_libs = filter_public_libraries(target_sdk_version, uses_libraries,
392                                              vendor_public_libraries());
393   if (!vendor_libs.empty()) {
394     auto vendor_ns = NativeLoaderNamespace::GetExportedNamespace(kVendorNamespaceName, is_bridged);
395     // when vendor_ns is not configured, link to the system namespace
396     auto target_ns = vendor_ns.ok() ? vendor_ns : system_ns;
397     if (target_ns.ok()) {
398       linked = app_ns->Link(*target_ns, vendor_libs);
399       if (!linked.ok()) {
400         return linked.error();
401       }
402     }
403   }
404 
405   auto& emplaced = namespaces_.emplace_back(
406       std::make_pair(env->NewWeakGlobalRef(class_loader), *app_ns));
407   if (is_main_classloader) {
408     app_main_namespace_ = &emplaced.second;
409   }
410   return &emplaced.second;
411 }
412 
FindNamespaceByClassLoader(JNIEnv * env,jobject class_loader)413 NativeLoaderNamespace* LibraryNamespaces::FindNamespaceByClassLoader(JNIEnv* env,
414                                                                      jobject class_loader) {
415   auto it = std::find_if(namespaces_.begin(), namespaces_.end(),
416                          [&](const std::pair<jweak, NativeLoaderNamespace>& value) {
417                            return env->IsSameObject(value.first, class_loader);
418                          });
419   if (it != namespaces_.end()) {
420     return &it->second;
421   }
422 
423   return nullptr;
424 }
425 
FindParentNamespaceByClassLoader(JNIEnv * env,jobject class_loader)426 NativeLoaderNamespace* LibraryNamespaces::FindParentNamespaceByClassLoader(JNIEnv* env,
427                                                                            jobject class_loader) {
428   jobject parent_class_loader = GetParentClassLoader(env, class_loader);
429 
430   while (parent_class_loader != nullptr) {
431     NativeLoaderNamespace* ns;
432     if ((ns = FindNamespaceByClassLoader(env, parent_class_loader)) != nullptr) {
433       return ns;
434     }
435 
436     parent_class_loader = GetParentClassLoader(env, parent_class_loader);
437   }
438 
439   return nullptr;
440 }
441 
FindApexNamespaceName(const std::string & location)442 base::Result<std::string> FindApexNamespaceName(const std::string& location) {
443   // Lots of implicit assumptions here: we expect `location` to be of the form:
444   // /apex/modulename/...
445   //
446   // And we extract from it 'modulename', and then apply mangling rule to get namespace name for it.
447   if (android::base::StartsWith(location, kApexPath)) {
448     size_t start_index = strlen(kApexPath);
449     size_t slash_index = location.find_first_of('/', start_index);
450     LOG_ALWAYS_FATAL_IF((slash_index == std::string::npos),
451                         "Error finding namespace of apex: no slash in path %s", location.c_str());
452     std::string name = location.substr(start_index, slash_index - start_index);
453     std::replace(name.begin(), name.end(), '.', '_');
454     return name;
455   }
456   return base::Error();
457 }
458 
459 }  // namespace android::nativeloader
460 
461 #endif  // defined(ART_TARGET_ANDROID)
462