| Index: base/android/java/src/org/chromium/base/library_loader/LegacyLinker.java
|
| diff --git a/base/android/java/src/org/chromium/base/library_loader/LegacyLinker.java b/base/android/java/src/org/chromium/base/library_loader/LegacyLinker.java
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..81ac754d3c97b9f113b582eec702476e970936d0
|
| --- /dev/null
|
| +++ b/base/android/java/src/org/chromium/base/library_loader/LegacyLinker.java
|
| @@ -0,0 +1,736 @@
|
| +// Copyright 2015 The Chromium Authors. All rights reserved.
|
| +// Use of this source code is governed by a BSD-style license that can be
|
| +// found in the LICENSE file.
|
| +
|
| +package org.chromium.base.library_loader;
|
| +
|
| +import android.os.Bundle;
|
| +import android.os.Parcel;
|
| +
|
| +import org.chromium.base.CalledByNative;
|
| +import org.chromium.base.Log;
|
| +import org.chromium.base.SysUtils;
|
| +import org.chromium.base.ThreadUtils;
|
| +
|
| +import java.util.HashMap;
|
| +import java.util.Locale;
|
| +import java.util.Map;
|
| +
|
| +import javax.annotation.Nullable;
|
| +
|
| +/*
|
| + * For more, see Technical note, Security considerations, and the explanation
|
| + * of how this class is supposed to be used in Linker.java.
|
| + */
|
| +
|
| +/**
|
| + * Provides a concrete implementation of the Chromium Linker.
|
| + *
|
| + * This Linker implementation uses the crazy linker to map and then run Chrome
|
| + * for Android.
|
| + *
|
| + * For more on the operations performed by the Linker, see {@link Linker}.
|
| + */
|
| +class LegacyLinker extends Linker {
|
| + // Log tag for this class.
|
| + private static final String TAG = "cr.library_loader";
|
| +
|
| + // Name of the library that contains our JNI code.
|
| + private static final String LINKER_JNI_LIBRARY = "chromium_android_linker";
|
| +
|
| + // Becomes true after linker initialization.
|
| + private boolean mInitialized = false;
|
| +
|
| + // Set to true to indicate that the system supports safe sharing of RELRO sections.
|
| + private boolean mRelroSharingSupported = false;
|
| +
|
| + // Set to true if this runs in the browser process. Disabled by initServiceProcess().
|
| + // TODO(petrcermak): This flag can be incorrectly set to false (even though this might run in
|
| + // the browser process) on low-memory devices.
|
| + private boolean mInBrowserProcess = true;
|
| +
|
| + // Becomes true to indicate this process needs to wait for a shared RELRO in
|
| + // finishLibraryLoad().
|
| + private boolean mWaitForSharedRelros = false;
|
| +
|
| + // Becomes true when initialization determines that the browser process can use the
|
| + // shared RELRO.
|
| + private boolean mBrowserUsesSharedRelro = false;
|
| +
|
| + // The map of all RELRO sections either created or used in this process.
|
| + private Bundle mSharedRelros = null;
|
| +
|
| + // Current common random base load address.
|
| + private long mBaseLoadAddress = 0;
|
| +
|
| + // Current fixed-location load address for the next library called by loadLibrary().
|
| + private long mCurrentLoadAddress = 0;
|
| +
|
| + // Becomes true once prepareLibraryLoad() has been called.
|
| + private boolean mPrepareLibraryLoadCalled = false;
|
| +
|
| + // The map of libraries that are currently loaded in this process.
|
| + protected HashMap<String, LibInfo> mLoadedLibraries = null;
|
| +
|
| + // Used internally to initialize the linker's static data. Assume lock is held.
|
| + private void ensureInitializedLocked() {
|
| + assert Thread.holdsLock(mLock);
|
| +
|
| + if (mInitialized) {
|
| + return;
|
| + }
|
| +
|
| + mRelroSharingSupported = false;
|
| + if (NativeLibraries.sUseLinker) {
|
| + if (DEBUG) {
|
| + Log.i(TAG, "Loading lib" + LINKER_JNI_LIBRARY + ".so");
|
| + }
|
| + try {
|
| + System.loadLibrary(LINKER_JNI_LIBRARY);
|
| + } catch (UnsatisfiedLinkError e) {
|
| + // In a component build, the ".cr" suffix is added to each library name.
|
| + Log.w(TAG, "Couldn't load lib" + LINKER_JNI_LIBRARY + ".so, "
|
| + + "trying lib" + LINKER_JNI_LIBRARY + ".cr.so");
|
| + System.loadLibrary(LINKER_JNI_LIBRARY + ".cr");
|
| + }
|
| + mRelroSharingSupported = nativeCanUseSharedRelro();
|
| + if (!mRelroSharingSupported) {
|
| + Log.w(TAG, "This system cannot safely share RELRO sections");
|
| + } else {
|
| + if (DEBUG) {
|
| + Log.i(TAG, "This system supports safe shared RELRO sections");
|
| + }
|
| + }
|
| +
|
| + if (mMemoryDeviceConfig == MEMORY_DEVICE_CONFIG_INIT) {
|
| + if (SysUtils.isLowEndDevice()) {
|
| + mMemoryDeviceConfig = MEMORY_DEVICE_CONFIG_LOW;
|
| + } else {
|
| + mMemoryDeviceConfig = MEMORY_DEVICE_CONFIG_NORMAL;
|
| + }
|
| + }
|
| +
|
| + switch (BROWSER_SHARED_RELRO_CONFIG) {
|
| + case BROWSER_SHARED_RELRO_CONFIG_NEVER:
|
| + mBrowserUsesSharedRelro = false;
|
| + break;
|
| + case BROWSER_SHARED_RELRO_CONFIG_LOW_RAM_ONLY:
|
| + if (mMemoryDeviceConfig == MEMORY_DEVICE_CONFIG_LOW) {
|
| + mBrowserUsesSharedRelro = true;
|
| + Log.w(TAG, "Low-memory device: shared RELROs used in all processes");
|
| + } else {
|
| + mBrowserUsesSharedRelro = false;
|
| + }
|
| + break;
|
| + case BROWSER_SHARED_RELRO_CONFIG_ALWAYS:
|
| + Log.w(TAG, "Beware: shared RELROs used in all processes!");
|
| + mBrowserUsesSharedRelro = true;
|
| + break;
|
| + default:
|
| + assert false : "Unreached";
|
| + break;
|
| + }
|
| + } else {
|
| + if (DEBUG) {
|
| + Log.i(TAG, "Linker disabled");
|
| + }
|
| + }
|
| +
|
| + if (!mRelroSharingSupported) {
|
| + // Sanity.
|
| + mBrowserUsesSharedRelro = false;
|
| + mWaitForSharedRelros = false;
|
| + }
|
| +
|
| + mInitialized = true;
|
| + }
|
| +
|
| + /**
|
| + * Call this method to determine if this chromium project must
|
| + * use this linker. If not, System.loadLibrary() should be used to load
|
| + * libraries instead.
|
| + */
|
| + @Override
|
| + public boolean isUsed() {
|
| + // Only GYP targets that are APKs and have the 'use_chromium_linker' variable
|
| + // defined as 1 will use this linker. For all others (the default), the
|
| + // auto-generated NativeLibraries.sUseLinker variable will be false.
|
| + if (!NativeLibraries.sUseLinker) return false;
|
| +
|
| + synchronized (mLock) {
|
| + ensureInitializedLocked();
|
| + // At the moment, there is also no point in using this linker if the
|
| + // system does not support RELRO sharing safely.
|
| + return mRelroSharingSupported;
|
| + }
|
| + }
|
| +
|
| + /**
|
| + * Call this method to determine if the linker will try to use shared RELROs
|
| + * for the browser process.
|
| + */
|
| + @Override
|
| + public boolean isUsingBrowserSharedRelros() {
|
| + synchronized (mLock) {
|
| + ensureInitializedLocked();
|
| + return mBrowserUsesSharedRelro;
|
| + }
|
| + }
|
| +
|
| + /**
|
| + * Call this method to determine if the chromium project must load
|
| + * the library directly from the zip file.
|
| + */
|
| + @Override
|
| + public boolean isInZipFile() {
|
| + return NativeLibraries.sUseLibraryInZipFile;
|
| + }
|
| +
|
| + /**
|
| + * Call this method just before loading any native shared libraries in this process.
|
| + */
|
| + @Override
|
| + public void prepareLibraryLoad() {
|
| + if (DEBUG) {
|
| + Log.i(TAG, "prepareLibraryLoad() called");
|
| + }
|
| + synchronized (mLock) {
|
| + mPrepareLibraryLoadCalled = true;
|
| +
|
| + if (mInBrowserProcess) {
|
| + // Force generation of random base load address, as well
|
| + // as creation of shared RELRO sections in this process.
|
| + setupBaseLoadAddressLocked();
|
| + }
|
| + }
|
| + }
|
| +
|
| + /**
|
| + * Call this method just after loading all native shared libraries in this process.
|
| + * Note that when in a service process, this will block until the RELRO bundle is
|
| + * received, i.e. when another thread calls useSharedRelros().
|
| + */
|
| + @Override
|
| + public void finishLibraryLoad() {
|
| + if (DEBUG) {
|
| + Log.i(TAG, "finishLibraryLoad() called");
|
| + }
|
| + synchronized (mLock) {
|
| + if (DEBUG) {
|
| + Log.i(TAG,
|
| + String.format(Locale.US,
|
| + "mInBrowserProcess=%s mBrowserUsesSharedRelro=%s mWaitForSharedRelros=%s",
|
| + mInBrowserProcess ? "true" : "false",
|
| + mBrowserUsesSharedRelro ? "true" : "false",
|
| + mWaitForSharedRelros ? "true" : "false"));
|
| + }
|
| +
|
| + if (mLoadedLibraries == null) {
|
| + if (DEBUG) {
|
| + Log.i(TAG, "No libraries loaded");
|
| + }
|
| + } else {
|
| + if (mInBrowserProcess) {
|
| + // Create new Bundle containing RELRO section information
|
| + // for all loaded libraries. Make it available to getSharedRelros().
|
| + mSharedRelros = createBundleFromLibInfoMap(mLoadedLibraries);
|
| + if (DEBUG) {
|
| + Log.i(TAG, "Shared RELRO created");
|
| + dumpBundle(mSharedRelros);
|
| + }
|
| +
|
| + if (mBrowserUsesSharedRelro) {
|
| + useSharedRelrosLocked(mSharedRelros);
|
| + }
|
| + }
|
| +
|
| + if (mWaitForSharedRelros) {
|
| + assert !mInBrowserProcess;
|
| +
|
| + // Wait until the shared relro bundle is received from useSharedRelros().
|
| + while (mSharedRelros == null) {
|
| + try {
|
| + mLock.wait();
|
| + } catch (InterruptedException ie) {
|
| + // no-op
|
| + }
|
| + }
|
| + useSharedRelrosLocked(mSharedRelros);
|
| + // Clear the Bundle to ensure its file descriptor references can't be reused.
|
| + mSharedRelros.clear();
|
| + mSharedRelros = null;
|
| + }
|
| + }
|
| +
|
| + if (NativeLibraries.sEnableLinkerTests && mTestRunnerClassName != null) {
|
| + // The TestRunner implementation must be instantiated _after_
|
| + // all libraries are loaded to ensure that its native methods
|
| + // are properly registered.
|
| + if (DEBUG) {
|
| + Log.i(TAG, "Instantiating " + mTestRunnerClassName);
|
| + }
|
| + TestRunner testRunner = null;
|
| + try {
|
| + testRunner = (TestRunner) Class.forName(mTestRunnerClassName).newInstance();
|
| + } catch (Exception e) {
|
| + Log.e(TAG, "Could not extract test runner class name", e);
|
| + testRunner = null;
|
| + }
|
| + if (testRunner != null) {
|
| + if (!testRunner.runChecks(mMemoryDeviceConfig, mInBrowserProcess)) {
|
| + Log.wtf(TAG, "Linker runtime tests failed in this process!!");
|
| + assert false;
|
| + } else {
|
| + Log.i(TAG, "All linker tests passed!");
|
| + }
|
| + }
|
| + }
|
| + }
|
| + if (DEBUG) {
|
| + Log.i(TAG, "finishLibraryLoad() exiting");
|
| + }
|
| + }
|
| +
|
| + /**
|
| + * Call this to send a Bundle containing the shared RELRO sections to be
|
| + * used in this process. If initServiceProcess() was previously called,
|
| + * finishLibraryLoad() will not exit until this method is called in another
|
| + * thread with a non-null value.
|
| + * @param bundle The Bundle instance containing a map of shared RELRO sections
|
| + * to use in this process.
|
| + */
|
| + @Override
|
| + public void useSharedRelros(Bundle bundle) {
|
| + // Ensure the bundle uses the application's class loader, not the framework
|
| + // one which doesn't know anything about LibInfo.
|
| + // Also, hold a fresh copy of it so the caller can't recycle it.
|
| + Bundle clonedBundle = null;
|
| + if (bundle != null) {
|
| + bundle.setClassLoader(LibInfo.class.getClassLoader());
|
| + clonedBundle = new Bundle(LibInfo.class.getClassLoader());
|
| + Parcel parcel = Parcel.obtain();
|
| + bundle.writeToParcel(parcel, 0);
|
| + parcel.setDataPosition(0);
|
| + clonedBundle.readFromParcel(parcel);
|
| + parcel.recycle();
|
| + }
|
| + if (DEBUG) {
|
| + Log.i(TAG, "useSharedRelros() called with " + bundle + ", cloned " + clonedBundle);
|
| + }
|
| + synchronized (mLock) {
|
| + // Note that in certain cases, this can be called before
|
| + // initServiceProcess() in service processes.
|
| + mSharedRelros = clonedBundle;
|
| + // Tell any listener blocked in finishLibraryLoad() about it.
|
| + mLock.notifyAll();
|
| + }
|
| + }
|
| +
|
| + /**
|
| + * Call this to retrieve the shared RELRO sections created in this process,
|
| + * after loading all libraries.
|
| + * @return a new Bundle instance, or null if RELRO sharing is disabled on
|
| + * this system, or if initServiceProcess() was called previously.
|
| + */
|
| + @Override
|
| + public Bundle getSharedRelros() {
|
| + if (DEBUG) {
|
| + Log.i(TAG, "getSharedRelros() called");
|
| + }
|
| + synchronized (mLock) {
|
| + if (!mInBrowserProcess) {
|
| + if (DEBUG) {
|
| + Log.i(TAG, "... returning null Bundle");
|
| + }
|
| + return null;
|
| + }
|
| +
|
| + // Return the Bundle created in finishLibraryLoad().
|
| + if (DEBUG) {
|
| + Log.i(TAG, "... returning " + mSharedRelros);
|
| + }
|
| + return mSharedRelros;
|
| + }
|
| + }
|
| +
|
| + /**
|
| + * Call this method before loading any libraries to indicate that this
|
| + * process shall neither create or reuse shared RELRO sections.
|
| + */
|
| + @Override
|
| + public void disableSharedRelros() {
|
| + if (DEBUG) {
|
| + Log.i(TAG, "disableSharedRelros() called");
|
| + }
|
| + synchronized (mLock) {
|
| + mInBrowserProcess = false;
|
| + mWaitForSharedRelros = false;
|
| + mBrowserUsesSharedRelro = false;
|
| + }
|
| + }
|
| +
|
| + /**
|
| + * Call this method before loading any libraries to indicate that this
|
| + * process is ready to reuse shared RELRO sections from another one.
|
| + * Typically used when starting service processes.
|
| + * @param baseLoadAddress the base library load address to use.
|
| + */
|
| + @Override
|
| + public void initServiceProcess(long baseLoadAddress) {
|
| + if (DEBUG) {
|
| + Log.i(TAG,
|
| + String.format(Locale.US, "initServiceProcess(0x%x) called", baseLoadAddress));
|
| + }
|
| + synchronized (mLock) {
|
| + ensureInitializedLocked();
|
| + mInBrowserProcess = false;
|
| + mBrowserUsesSharedRelro = false;
|
| + if (mRelroSharingSupported) {
|
| + mWaitForSharedRelros = true;
|
| + mBaseLoadAddress = baseLoadAddress;
|
| + mCurrentLoadAddress = baseLoadAddress;
|
| + }
|
| + }
|
| + }
|
| +
|
| + /**
|
| + * Retrieve the base load address of all shared RELRO sections.
|
| + * This also enforces the creation of shared RELRO sections in
|
| + * prepareLibraryLoad(), which can later be retrieved with getSharedRelros().
|
| + * @return a common, random base load address, or 0 if RELRO sharing is
|
| + * disabled.
|
| + */
|
| + @Override
|
| + public long getBaseLoadAddress() {
|
| + synchronized (mLock) {
|
| + ensureInitializedLocked();
|
| + if (!mInBrowserProcess) {
|
| + Log.w(TAG, "Shared RELRO sections are disabled in this process!");
|
| + return 0;
|
| + }
|
| +
|
| + setupBaseLoadAddressLocked();
|
| + if (DEBUG) {
|
| + Log.i(TAG, String.format(Locale.US, "getBaseLoadAddress() returns 0x%x",
|
| + mBaseLoadAddress));
|
| + }
|
| + return mBaseLoadAddress;
|
| + }
|
| + }
|
| +
|
| + // Used internally to lazily setup the common random base load address.
|
| + private void setupBaseLoadAddressLocked() {
|
| + assert Thread.holdsLock(mLock);
|
| + if (mBaseLoadAddress == 0) {
|
| + long address = computeRandomBaseLoadAddress();
|
| + mBaseLoadAddress = address;
|
| + mCurrentLoadAddress = address;
|
| + if (address == 0) {
|
| + // If the computed address is 0, there are issues with finding enough
|
| + // free address space, so disable RELRO shared / fixed load addresses.
|
| + Log.w(TAG, "Disabling shared RELROs due address space pressure");
|
| + mBrowserUsesSharedRelro = false;
|
| + mWaitForSharedRelros = false;
|
| + }
|
| + }
|
| + }
|
| +
|
| + /**
|
| + * Compute a random base load address at which to place loaded libraries.
|
| + * @return new base load address, or 0 if the system does not support
|
| + * RELRO sharing.
|
| + */
|
| + private long computeRandomBaseLoadAddress() {
|
| + // nativeGetRandomBaseLoadAddress() returns an address at which it has previously
|
| + // successfully mapped an area of the given size, on the basis that we will be
|
| + // able, with high probability, to map our library into it.
|
| + //
|
| + // One issue with this is that we do not yet know the size of the library that
|
| + // we will load is. So here we pass a value that we expect will always be larger
|
| + // than that needed. If it is smaller the library mapping may still succeed. The
|
| + // other issue is that although highly unlikely, there is no guarantee that
|
| + // something else does not map into the area we are going to use between here and
|
| + // when we try to map into it.
|
| + //
|
| + // The above notes mean that all of this is probablistic. It is however okay to do
|
| + // because if, worst case and unlikely, we get unlucky in our choice of address,
|
| + // the back-out and retry without the shared RELRO in the ChildProcessService will
|
| + // keep things running.
|
| + final long maxExpectedBytes = 192 * 1024 * 1024;
|
| + final long address = nativeGetRandomBaseLoadAddress(maxExpectedBytes);
|
| + if (DEBUG) {
|
| + Log.i(TAG, String.format(Locale.US, "Random native base load address: 0x%x", address));
|
| + }
|
| + return address;
|
| + }
|
| +
|
| + // Used for debugging only.
|
| + private void dumpBundle(Bundle bundle) {
|
| + if (DEBUG) {
|
| + Log.i(TAG, "Bundle has " + bundle.size() + " items: " + bundle);
|
| + }
|
| + }
|
| +
|
| + /**
|
| + * Use the shared RELRO section from a Bundle received form another process.
|
| + * Call this after calling setBaseLoadAddress() then loading all libraries
|
| + * with loadLibrary().
|
| + * @param bundle Bundle instance generated with createSharedRelroBundle() in
|
| + * another process.
|
| + */
|
| + private void useSharedRelrosLocked(Bundle bundle) {
|
| + assert Thread.holdsLock(mLock);
|
| +
|
| + if (DEBUG) {
|
| + Log.i(TAG, "Linker.useSharedRelrosLocked() called");
|
| + }
|
| +
|
| + if (bundle == null) {
|
| + if (DEBUG) {
|
| + Log.i(TAG, "null bundle!");
|
| + }
|
| + return;
|
| + }
|
| +
|
| + if (!mRelroSharingSupported) {
|
| + if (DEBUG) {
|
| + Log.i(TAG, "System does not support RELRO sharing");
|
| + }
|
| + return;
|
| + }
|
| +
|
| + if (mLoadedLibraries == null) {
|
| + if (DEBUG) {
|
| + Log.i(TAG, "No libraries loaded!");
|
| + }
|
| + return;
|
| + }
|
| +
|
| + if (DEBUG) {
|
| + dumpBundle(bundle);
|
| + }
|
| + HashMap<String, LibInfo> relroMap = createLibInfoMapFromBundle(bundle);
|
| +
|
| + // Apply the RELRO section to all libraries that were already loaded.
|
| + for (Map.Entry<String, LibInfo> entry : relroMap.entrySet()) {
|
| + String libName = entry.getKey();
|
| + LibInfo libInfo = entry.getValue();
|
| + if (!nativeUseSharedRelro(libName, libInfo)) {
|
| + Log.w(TAG, "Could not use shared RELRO section for " + libName);
|
| + } else {
|
| + if (DEBUG) {
|
| + Log.i(TAG, "Using shared RELRO section for " + libName);
|
| + }
|
| + }
|
| + }
|
| +
|
| + // In service processes, close all file descriptors from the map now.
|
| + if (!mInBrowserProcess) closeLibInfoMap(relroMap);
|
| +
|
| + if (DEBUG) {
|
| + Log.i(TAG, "Linker.useSharedRelrosLocked() exiting");
|
| + }
|
| + }
|
| +
|
| + /**
|
| + * Load a native shared library with the Chromium linker. If the zip file
|
| + * is not null, the shared library must be uncompressed and page aligned
|
| + * inside the zipfile. Note the crazy linker treats libraries and files as
|
| + * equivalent, so you can only open one library in a given zip file. The
|
| + * library must not be the Chromium linker library.
|
| + *
|
| + * @param zipFilePath The path of the zip file containing the library (or null).
|
| + * @param libFilePath The path of the library (possibly in the zip file).
|
| + */
|
| + @Override
|
| + public void loadLibrary(@Nullable String zipFilePath, String libFilePath) {
|
| + if (DEBUG) {
|
| + Log.i(TAG, "loadLibrary: " + zipFilePath + ", " + libFilePath);
|
| + }
|
| +
|
| + synchronized (mLock) {
|
| + ensureInitializedLocked();
|
| +
|
| + // Security: Ensure prepareLibraryLoad() was called before.
|
| + // In theory, this can be done lazily here, but it's more consistent
|
| + // to use a pair of functions (i.e. prepareLibraryLoad() + finishLibraryLoad())
|
| + // that wrap all calls to loadLibrary() in the library loader.
|
| + assert mPrepareLibraryLoadCalled;
|
| +
|
| + if (mLoadedLibraries == null) {
|
| + mLoadedLibraries = new HashMap<String, LibInfo>();
|
| + }
|
| +
|
| + if (mLoadedLibraries.containsKey(libFilePath)) {
|
| + if (DEBUG) {
|
| + Log.i(TAG, "Not loading " + libFilePath + " twice");
|
| + }
|
| + return;
|
| + }
|
| +
|
| + LibInfo libInfo = new LibInfo();
|
| + long loadAddress = 0;
|
| + if ((mInBrowserProcess && mBrowserUsesSharedRelro) || mWaitForSharedRelros) {
|
| + // Load the library at a fixed address.
|
| + loadAddress = mCurrentLoadAddress;
|
| + }
|
| +
|
| + String sharedRelRoName = libFilePath;
|
| + if (zipFilePath != null) {
|
| + if (!nativeLoadLibraryInZipFile(zipFilePath, libFilePath, loadAddress, libInfo)) {
|
| + String errorMessage =
|
| + "Unable to load library: " + libFilePath + ", in: " + zipFilePath;
|
| + Log.e(TAG, errorMessage);
|
| + throw new UnsatisfiedLinkError(errorMessage);
|
| + }
|
| + sharedRelRoName = zipFilePath;
|
| + } else {
|
| + if (!nativeLoadLibrary(libFilePath, loadAddress, libInfo)) {
|
| + String errorMessage = "Unable to load library: " + libFilePath;
|
| + Log.e(TAG, errorMessage);
|
| + throw new UnsatisfiedLinkError(errorMessage);
|
| + }
|
| + }
|
| +
|
| + // Print the load address to the logcat when testing the linker. The format
|
| + // of the string is expected by the Python test_runner script as one of:
|
| + // BROWSER_LIBRARY_ADDRESS: <library-name> <address>
|
| + // RENDERER_LIBRARY_ADDRESS: <library-name> <address>
|
| + // Where <library-name> is the library name, and <address> is the hexadecimal load
|
| + // address.
|
| + if (NativeLibraries.sEnableLinkerTests) {
|
| + Log.i(TAG, String.format(Locale.US, "%s_LIBRARY_ADDRESS: %s %x",
|
| + mInBrowserProcess ? "BROWSER" : "RENDERER", libFilePath,
|
| + libInfo.mLoadAddress));
|
| + }
|
| +
|
| + if (mInBrowserProcess) {
|
| + // Create a new shared RELRO section at the 'current' fixed load address.
|
| + if (!nativeCreateSharedRelro(sharedRelRoName, mCurrentLoadAddress, libInfo)) {
|
| + Log.w(TAG,
|
| + String.format(Locale.US, "Could not create shared RELRO for %s at %x",
|
| + libFilePath, mCurrentLoadAddress));
|
| + } else {
|
| + if (DEBUG) {
|
| + Log.i(TAG,
|
| + String.format(Locale.US, "Created shared RELRO for %s at %x: %s",
|
| + sharedRelRoName, mCurrentLoadAddress, libInfo.toString()));
|
| + }
|
| + }
|
| + }
|
| +
|
| + if (mCurrentLoadAddress != 0) {
|
| + // Compute the next current load address. If mBaseLoadAddress
|
| + // is not 0, this is an explicit library load address. Otherwise,
|
| + // this is an explicit load address for relocated RELRO sections
|
| + // only.
|
| + mCurrentLoadAddress = libInfo.mLoadAddress + libInfo.mLoadSize;
|
| + }
|
| +
|
| + mLoadedLibraries.put(sharedRelRoName, libInfo);
|
| + if (DEBUG) {
|
| + Log.i(TAG, "Library details " + libInfo.toString());
|
| + }
|
| + }
|
| + }
|
| +
|
| + /**
|
| + * Determine whether a library is the linker library. Also deal with the
|
| + * component build that adds a .cr suffix to the name.
|
| + */
|
| + @Override
|
| + public boolean isChromiumLinkerLibrary(String library) {
|
| + return library.equals(LINKER_JNI_LIBRARY) || library.equals(LINKER_JNI_LIBRARY + ".cr");
|
| + }
|
| +
|
| + /**
|
| + * Move activity from the native thread to the main UI thread.
|
| + * Called from native code on its own thread. Posts a callback from
|
| + * the UI thread back to native code.
|
| + *
|
| + * @param opaque Opaque argument.
|
| + */
|
| + @CalledByNative
|
| + public static void postCallbackOnMainThread(final long opaque) {
|
| + ThreadUtils.postOnUiThread(new Runnable() {
|
| + @Override
|
| + public void run() {
|
| + nativeRunCallbackOnUiThread(opaque);
|
| + }
|
| + });
|
| + }
|
| +
|
| + /**
|
| + * Native method to run callbacks on the main UI thread.
|
| + * Supplied by the crazy linker and called by postCallbackOnMainThread.
|
| + * @param opaque Opaque crazy linker arguments.
|
| + */
|
| + private static native void nativeRunCallbackOnUiThread(long opaque);
|
| +
|
| + /**
|
| + * Native method used to load a library.
|
| + * @param library Platform specific library name (e.g. libfoo.so)
|
| + * @param loadAddress Explicit load address, or 0 for randomized one.
|
| + * @param libInfo If not null, the mLoadAddress and mLoadSize fields
|
| + * of this LibInfo instance will set on success.
|
| + * @return true for success, false otherwise.
|
| + */
|
| + private static native boolean nativeLoadLibrary(
|
| + String library, long loadAddress, LibInfo libInfo);
|
| +
|
| + /**
|
| + * Native method used to load a library which is inside a zipfile.
|
| + * @param zipfileName Filename of the zip file containing the library.
|
| + * @param library Platform specific library name (e.g. libfoo.so)
|
| + * @param loadAddress Explicit load address, or 0 for randomized one.
|
| + * @param libInfo If not null, the mLoadAddress and mLoadSize fields
|
| + * of this LibInfo instance will set on success.
|
| + * @return true for success, false otherwise.
|
| + */
|
| + private static native boolean nativeLoadLibraryInZipFile(
|
| + String zipfileName, String libraryName, long loadAddress, LibInfo libInfo);
|
| +
|
| + /**
|
| + * Native method used to create a shared RELRO section.
|
| + * If the library was already loaded at the same address using
|
| + * nativeLoadLibrary(), this creates the RELRO for it. Otherwise,
|
| + * this loads a new temporary library at the specified address,
|
| + * creates and extracts the RELRO section from it, then unloads it.
|
| + * @param library Library name.
|
| + * @param loadAddress load address, which can be different from the one
|
| + * used to load the library in the current process!
|
| + * @param libInfo libInfo instance. On success, the mRelroStart, mRelroSize
|
| + * and mRelroFd will be set.
|
| + * @return true on success, false otherwise.
|
| + */
|
| + private static native boolean nativeCreateSharedRelro(
|
| + String library, long loadAddress, LibInfo libInfo);
|
| +
|
| + /**
|
| + * Native method used to use a shared RELRO section.
|
| + * @param library Library name.
|
| + * @param libInfo A LibInfo instance containing valid RELRO information
|
| + * @return true on success.
|
| + */
|
| + private static native boolean nativeUseSharedRelro(String library, LibInfo libInfo);
|
| +
|
| + /**
|
| + * Checks that the system supports shared RELROs. Old Android kernels
|
| + * have a bug in the way they check Ashmem region protection flags, which
|
| + * makes using shared RELROs unsafe. This method performs a simple runtime
|
| + * check for this misfeature, even though nativeEnableSharedRelro() will
|
| + * always fail if this returns false.
|
| + */
|
| + private static native boolean nativeCanUseSharedRelro();
|
| +
|
| + /**
|
| + * Return a random address that should be free to be mapped with the given size.
|
| + * Maps an area of size bytes, and if successful then unmaps it and returns
|
| + * the address of the area allocated by the system (with ASLR). The idea is
|
| + * that this area should remain free of other mappings until we map our library
|
| + * into it.
|
| + * @param sizeBytes Size of area in bytes to search for.
|
| + * @return address to pass to future mmap, or 0 on error.
|
| + */
|
| + private static native long nativeGetRandomBaseLoadAddress(long sizeBytes);
|
| +}
|
|
|