1 /*
2 * Copyright (C) 2019 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #if defined(ART_TARGET_ANDROID)
18
19 #include "library_namespaces.h"
20
21 #include <dirent.h>
22 #include <dlfcn.h>
23
24 #include <regex>
25 #include <string>
26 #include <vector>
27
28 #include <android-base/file.h>
29 #include <android-base/logging.h>
30 #include <android-base/macros.h>
31 #include <android-base/properties.h>
32 #include <android-base/result.h>
33 #include <android-base/strings.h>
34 #include <nativehelper/scoped_utf_chars.h>
35
36 #include "nativeloader/dlext_namespaces.h"
37 #include "public_libraries.h"
38 #include "utils.h"
39
40 namespace android::nativeloader {
41
42 namespace {
43
44 constexpr const char* kApexPath = "/apex/";
45
46 // The device may be configured to have the vendor libraries loaded to a separate namespace.
47 // For historical reasons this namespace was named sphal but effectively it is intended
48 // to use to load vendor libraries to separate namespace with controlled interface between
49 // vendor and system namespaces.
50 constexpr const char* kVendorNamespaceName = "sphal";
51 constexpr const char* kVndkNamespaceName = "vndk";
52 constexpr const char* kVndkProductNamespaceName = "vndk_product";
53 constexpr const char* kArtNamespaceName = "com_android_art";
54 constexpr const char* kI18nNamespaceName = "com_android_i18n";
55 constexpr const char* kNeuralNetworksNamespaceName = "com_android_neuralnetworks";
56 constexpr const char* kStatsdNamespaceName = "com_android_os_statsd";
57
58 // classloader-namespace is a linker namespace that is created for the loaded
59 // app. To be specific, it is created for the app classloader. When
60 // System.load() is called from a Java class that is loaded from the
61 // classloader, the classloader-namespace namespace associated with that
62 // classloader is selected for dlopen. The namespace is configured so that its
63 // search path is set to the app-local JNI directory and it is linked to the
64 // system namespace with the names of libs listed in the public.libraries.txt.
65 // This way an app can only load its own JNI libraries along with the public libs.
66 constexpr const char* kClassloaderNamespaceName = "classloader-namespace";
67 // Same thing for vendor APKs.
68 constexpr const char* kVendorClassloaderNamespaceName = "vendor-classloader-namespace";
69 // If the namespace is shared then add this suffix to form
70 // "classloader-namespace-shared" or "vendor-classloader-namespace-shared",
71 // respectively. A shared namespace (cf. ANDROID_NAMESPACE_TYPE_SHARED) has
72 // inherited all the libraries of the parent classloader namespace, or the
73 // system namespace for the main app classloader. It is used to give full
74 // access to the platform libraries for apps bundled in the system image,
75 // including their later updates installed in /data.
76 constexpr const char* kSharedNamespaceSuffix = "-shared";
77
78 // (http://b/27588281) This is a workaround for apps using custom classloaders and calling
79 // System.load() with an absolute path which is outside of the classloader library search path.
80 // This list includes all directories app is allowed to access this way.
81 constexpr const char* kWhitelistedDirectories = "/data:/mnt/expand";
82
83 constexpr const char* kVendorLibPath = "/vendor/" LIB;
84 constexpr const char* kProductLibPath = "/product/" LIB ":/system/product/" LIB;
85
86 const std::regex kVendorDexPathRegex("(^|:)/vendor/");
87 const std::regex kProductDexPathRegex("(^|:)(/system)?/product/");
88
89 // Define origin of APK if it is from vendor partition or product partition
90 using ApkOrigin = enum {
91 APK_ORIGIN_DEFAULT = 0,
92 APK_ORIGIN_VENDOR = 1,
93 APK_ORIGIN_PRODUCT = 2,
94 };
95
GetParentClassLoader(JNIEnv * env,jobject class_loader)96 jobject GetParentClassLoader(JNIEnv* env, jobject class_loader) {
97 jclass class_loader_class = env->FindClass("java/lang/ClassLoader");
98 jmethodID get_parent =
99 env->GetMethodID(class_loader_class, "getParent", "()Ljava/lang/ClassLoader;");
100
101 return env->CallObjectMethod(class_loader, get_parent);
102 }
103
GetApkOriginFromDexPath(const std::string & dex_path)104 ApkOrigin GetApkOriginFromDexPath(const std::string& dex_path) {
105 ApkOrigin apk_origin = APK_ORIGIN_DEFAULT;
106 if (std::regex_search(dex_path, kVendorDexPathRegex)) {
107 apk_origin = APK_ORIGIN_VENDOR;
108 }
109 if (std::regex_search(dex_path, kProductDexPathRegex)) {
110 LOG_ALWAYS_FATAL_IF(apk_origin == APK_ORIGIN_VENDOR,
111 "Dex path contains both vendor and product partition : %s",
112 dex_path.c_str());
113
114 apk_origin = APK_ORIGIN_PRODUCT;
115 }
116 return apk_origin;
117 }
118
119 } // namespace
120
Initialize()121 void LibraryNamespaces::Initialize() {
122 // Once public namespace is initialized there is no
123 // point in running this code - it will have no effect
124 // on the current list of public libraries.
125 if (initialized_) {
126 return;
127 }
128
129 // android_init_namespaces() expects all the public libraries
130 // to be loaded so that they can be found by soname alone.
131 //
132 // TODO(dimitry): this is a bit misleading since we do not know
133 // if the vendor public library is going to be opened from /vendor/lib
134 // we might as well end up loading them from /system/lib or /product/lib
135 // For now we rely on CTS test to catch things like this but
136 // it should probably be addressed in the future.
137 for (const auto& soname : android::base::Split(preloadable_public_libraries(), ":")) {
138 LOG_ALWAYS_FATAL_IF(dlopen(soname.c_str(), RTLD_NOW | RTLD_NODELETE) == nullptr,
139 "Error preloading public library %s: %s", soname.c_str(), dlerror());
140 }
141 }
142
143 // "ALL" is a magic name that allows all public libraries even when the
144 // target SDK is > 30. Currently this is used for (Java) shared libraries
145 // which don't use <uses-native-library>
146 // TODO(b/142191088) remove this hack
147 static constexpr const char LIBRARY_ALL[] = "ALL";
148
149 // Returns the colon-separated list of library names by filtering uses_libraries from
150 // public_libraries. The returned names will actually be available to the app. If the app is pre-S
151 // (<= 30), the filtering is not done; the entire public_libraries are provided.
filter_public_libraries(uint32_t target_sdk_version,const std::vector<std::string> & uses_libraries,const std::string & public_libraries)152 static const std::string filter_public_libraries(
153 uint32_t target_sdk_version, const std::vector<std::string>& uses_libraries,
154 const std::string& public_libraries) {
155 // Apps targeting Android 11 or earlier gets all public libraries
156 if (target_sdk_version <= 30) {
157 return public_libraries;
158 }
159 if (std::find(uses_libraries.begin(), uses_libraries.end(), LIBRARY_ALL) !=
160 uses_libraries.end()) {
161 return public_libraries;
162 }
163 std::vector<std::string> filtered;
164 std::vector<std::string> orig = android::base::Split(public_libraries, ":");
165 for (const auto& lib : uses_libraries) {
166 if (std::find(orig.begin(), orig.end(), lib) != orig.end()) {
167 filtered.emplace_back(lib);
168 }
169 }
170 return android::base::Join(filtered, ":");
171 }
172
Create(JNIEnv * env,uint32_t target_sdk_version,jobject class_loader,bool is_shared,jstring dex_path_j,jstring java_library_path,jstring java_permitted_path,jstring uses_library_list)173 Result<NativeLoaderNamespace*> LibraryNamespaces::Create(JNIEnv* env, uint32_t target_sdk_version,
174 jobject class_loader, bool is_shared,
175 jstring dex_path_j,
176 jstring java_library_path,
177 jstring java_permitted_path,
178 jstring uses_library_list) {
179 std::string library_path; // empty string by default.
180 std::string dex_path;
181
182 if (java_library_path != nullptr) {
183 ScopedUtfChars library_path_utf_chars(env, java_library_path);
184 library_path = library_path_utf_chars.c_str();
185 }
186
187 if (dex_path_j != nullptr) {
188 ScopedUtfChars dex_path_chars(env, dex_path_j);
189 dex_path = dex_path_chars.c_str();
190 }
191
192 std::vector<std::string> uses_libraries;
193 if (uses_library_list != nullptr) {
194 ScopedUtfChars names(env, uses_library_list);
195 uses_libraries = android::base::Split(names.c_str(), ":");
196 } else {
197 // uses_library_list could be nullptr when System.loadLibrary is called from a
198 // custom classloader. In that case, we don't know the list of public
199 // libraries because we don't know which apk the classloader is for. Only
200 // choices we can have are 1) allowing all public libs (as before), or 2)
201 // not allowing all but NDK libs. Here we take #1 because #2 would surprise
202 // developers unnecessarily.
203 // TODO(b/142191088) finalize the policy here. We could either 1) allow all
204 // public libs, 2) disallow any lib, or 3) use the libs that were granted to
205 // the first (i.e. app main) classloader.
206 uses_libraries.emplace_back(LIBRARY_ALL);
207 }
208
209 ApkOrigin apk_origin = GetApkOriginFromDexPath(dex_path);
210
211 // (http://b/27588281) This is a workaround for apps using custom
212 // classloaders and calling System.load() with an absolute path which
213 // is outside of the classloader library search path.
214 //
215 // This part effectively allows such a classloader to access anything
216 // under /data and /mnt/expand
217 std::string permitted_path = kWhitelistedDirectories;
218
219 if (java_permitted_path != nullptr) {
220 ScopedUtfChars path(env, java_permitted_path);
221 if (path.c_str() != nullptr && path.size() > 0) {
222 permitted_path = permitted_path + ":" + path.c_str();
223 }
224 }
225
226 LOG_ALWAYS_FATAL_IF(FindNamespaceByClassLoader(env, class_loader) != nullptr,
227 "There is already a namespace associated with this classloader");
228
229 std::string system_exposed_libraries = default_public_libraries();
230 std::string namespace_name = kClassloaderNamespaceName;
231 ApkOrigin unbundled_app_origin = APK_ORIGIN_DEFAULT;
232 if ((apk_origin == APK_ORIGIN_VENDOR ||
233 (apk_origin == APK_ORIGIN_PRODUCT &&
234 is_product_vndk_version_defined())) &&
235 !is_shared) {
236 unbundled_app_origin = apk_origin;
237 // For vendor / product apks, give access to the vendor / product lib even though
238 // they are treated as unbundled; the libs and apks are still bundled
239 // together in the vendor / product partition.
240 const char* origin_partition;
241 const char* origin_lib_path;
242 const char* llndk_libraries;
243
244 switch (apk_origin) {
245 case APK_ORIGIN_VENDOR:
246 origin_partition = "vendor";
247 origin_lib_path = kVendorLibPath;
248 llndk_libraries = llndk_libraries_vendor().c_str();
249 break;
250 case APK_ORIGIN_PRODUCT:
251 origin_partition = "product";
252 origin_lib_path = kProductLibPath;
253 llndk_libraries = llndk_libraries_product().c_str();
254 break;
255 default:
256 origin_partition = "unknown";
257 origin_lib_path = "";
258 llndk_libraries = "";
259 }
260 library_path = library_path + ":" + origin_lib_path;
261 permitted_path = permitted_path + ":" + origin_lib_path;
262
263 // Also give access to LLNDK libraries since they are available to vendor or product
264 system_exposed_libraries = system_exposed_libraries + ":" + llndk_libraries;
265
266 // Different name is useful for debugging
267 namespace_name = kVendorClassloaderNamespaceName;
268 ALOGD("classloader namespace configured for unbundled %s apk. library_path=%s",
269 origin_partition, library_path.c_str());
270 } else {
271 auto libs = filter_public_libraries(target_sdk_version, uses_libraries,
272 extended_public_libraries());
273 // extended public libraries are NOT available to vendor apks, otherwise it
274 // would be system->vendor violation.
275 if (!libs.empty()) {
276 system_exposed_libraries = system_exposed_libraries + ':' + libs;
277 }
278 }
279
280 if (is_shared) {
281 // Show in the name that the namespace was created as shared, for debugging
282 // purposes.
283 namespace_name = namespace_name + kSharedNamespaceSuffix;
284 }
285
286 // Create the app namespace
287 NativeLoaderNamespace* parent_ns = FindParentNamespaceByClassLoader(env, class_loader);
288 // Heuristic: the first classloader with non-empty library_path is assumed to
289 // be the main classloader for app
290 // TODO(b/139178525) remove this heuristic by determining this in LoadedApk (or its
291 // friends) and then passing it down to here.
292 bool is_main_classloader = app_main_namespace_ == nullptr && !library_path.empty();
293 // Policy: the namespace for the main classloader is also used as the
294 // anonymous namespace.
295 bool also_used_as_anonymous = is_main_classloader;
296 // Note: this function is executed with g_namespaces_mutex held, thus no
297 // racing here.
298 auto app_ns = NativeLoaderNamespace::Create(
299 namespace_name, library_path, permitted_path, parent_ns, is_shared,
300 target_sdk_version < 24 /* is_greylist_enabled */, also_used_as_anonymous);
301 if (!app_ns.ok()) {
302 return app_ns.error();
303 }
304 // ... and link to other namespaces to allow access to some public libraries
305 bool is_bridged = app_ns->IsBridged();
306
307 auto system_ns = NativeLoaderNamespace::GetSystemNamespace(is_bridged);
308 if (!system_ns.ok()) {
309 return system_ns.error();
310 }
311
312 auto linked = app_ns->Link(*system_ns, system_exposed_libraries);
313 if (!linked.ok()) {
314 return linked.error();
315 }
316
317 auto art_ns = NativeLoaderNamespace::GetExportedNamespace(kArtNamespaceName, is_bridged);
318 // ART APEX does not exist on host, and under certain build conditions.
319 if (art_ns.ok()) {
320 linked = app_ns->Link(*art_ns, art_public_libraries());
321 if (!linked.ok()) {
322 return linked.error();
323 }
324 }
325
326 auto i18n_ns = NativeLoaderNamespace::GetExportedNamespace(kI18nNamespaceName, is_bridged);
327 // i18n APEX does not exist on host, and under certain build conditions.
328 if (i18n_ns.ok()) {
329 linked = app_ns->Link(*i18n_ns, i18n_public_libraries());
330 if (!linked.ok()) {
331 return linked.error();
332 }
333 }
334
335 // Give access to NNAPI libraries (apex-updated LLNDK library).
336 auto nnapi_ns =
337 NativeLoaderNamespace::GetExportedNamespace(kNeuralNetworksNamespaceName, is_bridged);
338 if (nnapi_ns.ok()) {
339 linked = app_ns->Link(*nnapi_ns, neuralnetworks_public_libraries());
340 if (!linked.ok()) {
341 return linked.error();
342 }
343 }
344
345 // Give access to VNDK-SP libraries from the 'vndk' namespace for unbundled vendor apps.
346 if (unbundled_app_origin == APK_ORIGIN_VENDOR && !vndksp_libraries_vendor().empty()) {
347 auto vndk_ns = NativeLoaderNamespace::GetExportedNamespace(kVndkNamespaceName, is_bridged);
348 if (vndk_ns.ok()) {
349 linked = app_ns->Link(*vndk_ns, vndksp_libraries_vendor());
350 if (!linked.ok()) {
351 return linked.error();
352 }
353 }
354 }
355
356 // Give access to VNDK-SP libraries from the 'vndk_product' namespace for unbundled product apps.
357 if (unbundled_app_origin == APK_ORIGIN_PRODUCT && !vndksp_libraries_product().empty()) {
358 auto vndk_ns = NativeLoaderNamespace::GetExportedNamespace(kVndkProductNamespaceName, is_bridged);
359 if (vndk_ns.ok()) {
360 linked = app_ns->Link(*vndk_ns, vndksp_libraries_product());
361 if (!linked.ok()) {
362 return linked.error();
363 }
364 }
365 }
366
367 auto apex_ns_name = FindApexNamespaceName(dex_path);
368 if (apex_ns_name.ok()) {
369 const auto& jni_libs = apex_jni_libraries(*apex_ns_name);
370 if (jni_libs != "") {
371 auto apex_ns = NativeLoaderNamespace::GetExportedNamespace(*apex_ns_name, is_bridged);
372 if (apex_ns.ok()) {
373 auto link = app_ns->Link(*apex_ns, jni_libs);
374 if (!link.ok()) {
375 return linked.error();
376 }
377 }
378 }
379 }
380
381 // Give access to StatsdAPI libraries
382 auto statsd_ns =
383 NativeLoaderNamespace::GetExportedNamespace(kStatsdNamespaceName, is_bridged);
384 if (statsd_ns.ok()) {
385 linked = app_ns->Link(*statsd_ns, statsd_public_libraries());
386 if (!linked.ok()) {
387 return linked.error();
388 }
389 }
390
391 auto vendor_libs = filter_public_libraries(target_sdk_version, uses_libraries,
392 vendor_public_libraries());
393 if (!vendor_libs.empty()) {
394 auto vendor_ns = NativeLoaderNamespace::GetExportedNamespace(kVendorNamespaceName, is_bridged);
395 // when vendor_ns is not configured, link to the system namespace
396 auto target_ns = vendor_ns.ok() ? vendor_ns : system_ns;
397 if (target_ns.ok()) {
398 linked = app_ns->Link(*target_ns, vendor_libs);
399 if (!linked.ok()) {
400 return linked.error();
401 }
402 }
403 }
404
405 auto& emplaced = namespaces_.emplace_back(
406 std::make_pair(env->NewWeakGlobalRef(class_loader), *app_ns));
407 if (is_main_classloader) {
408 app_main_namespace_ = &emplaced.second;
409 }
410 return &emplaced.second;
411 }
412
FindNamespaceByClassLoader(JNIEnv * env,jobject class_loader)413 NativeLoaderNamespace* LibraryNamespaces::FindNamespaceByClassLoader(JNIEnv* env,
414 jobject class_loader) {
415 auto it = std::find_if(namespaces_.begin(), namespaces_.end(),
416 [&](const std::pair<jweak, NativeLoaderNamespace>& value) {
417 return env->IsSameObject(value.first, class_loader);
418 });
419 if (it != namespaces_.end()) {
420 return &it->second;
421 }
422
423 return nullptr;
424 }
425
FindParentNamespaceByClassLoader(JNIEnv * env,jobject class_loader)426 NativeLoaderNamespace* LibraryNamespaces::FindParentNamespaceByClassLoader(JNIEnv* env,
427 jobject class_loader) {
428 jobject parent_class_loader = GetParentClassLoader(env, class_loader);
429
430 while (parent_class_loader != nullptr) {
431 NativeLoaderNamespace* ns;
432 if ((ns = FindNamespaceByClassLoader(env, parent_class_loader)) != nullptr) {
433 return ns;
434 }
435
436 parent_class_loader = GetParentClassLoader(env, parent_class_loader);
437 }
438
439 return nullptr;
440 }
441
FindApexNamespaceName(const std::string & location)442 base::Result<std::string> FindApexNamespaceName(const std::string& location) {
443 // Lots of implicit assumptions here: we expect `location` to be of the form:
444 // /apex/modulename/...
445 //
446 // And we extract from it 'modulename', and then apply mangling rule to get namespace name for it.
447 if (android::base::StartsWith(location, kApexPath)) {
448 size_t start_index = strlen(kApexPath);
449 size_t slash_index = location.find_first_of('/', start_index);
450 LOG_ALWAYS_FATAL_IF((slash_index == std::string::npos),
451 "Error finding namespace of apex: no slash in path %s", location.c_str());
452 std::string name = location.substr(start_index, slash_index - start_index);
453 std::replace(name.begin(), name.end(), '.', '_');
454 return name;
455 }
456 return base::Error();
457 }
458
459 } // namespace android::nativeloader
460
461 #endif // defined(ART_TARGET_ANDROID)
462