blob: f89a4f7122a9ae89bdc3c564b308653507351dd4 [file] [log] [blame]
Alex Light53cb16b2014-06-12 11:26:29 -07001/*
2 * Copyright (C) 2014 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16#include "patchoat.h"
17
18#include <stdio.h>
19#include <stdlib.h>
Alex Lighta59dd802014-07-02 16:28:08 -070020#include <sys/file.h>
Alex Light53cb16b2014-06-12 11:26:29 -070021#include <sys/stat.h>
Alex Lighta59dd802014-07-02 16:28:08 -070022#include <unistd.h>
Alex Light53cb16b2014-06-12 11:26:29 -070023
24#include <string>
25#include <vector>
26
Alex Lighta59dd802014-07-02 16:28:08 -070027#include "base/scoped_flock.h"
Alex Light53cb16b2014-06-12 11:26:29 -070028#include "base/stringpiece.h"
29#include "base/stringprintf.h"
30#include "elf_utils.h"
31#include "elf_file.h"
Ian Rogerse63db272014-07-15 15:36:11 -070032#include "gc/space/image_space.h"
Alex Light53cb16b2014-06-12 11:26:29 -070033#include "image.h"
34#include "instruction_set.h"
35#include "mirror/art_field.h"
36#include "mirror/art_field-inl.h"
37#include "mirror/art_method.h"
38#include "mirror/art_method-inl.h"
39#include "mirror/object.h"
40#include "mirror/object-inl.h"
41#include "mirror/reference.h"
42#include "noop_compiler_callbacks.h"
43#include "offsets.h"
44#include "os.h"
45#include "runtime.h"
46#include "scoped_thread_state_change.h"
47#include "thread.h"
48#include "utils.h"
49
50namespace art {
51
52static InstructionSet ElfISAToInstructionSet(Elf32_Word isa) {
53 switch (isa) {
54 case EM_ARM:
55 return kArm;
56 case EM_AARCH64:
57 return kArm64;
58 case EM_386:
59 return kX86;
60 case EM_X86_64:
61 return kX86_64;
62 case EM_MIPS:
63 return kMips;
64 default:
65 return kNone;
66 }
67}
68
Alex Lightcf4bf382014-07-24 11:29:14 -070069static bool LocationToFilename(const std::string& location, InstructionSet isa,
70 std::string* filename) {
71 bool has_system = false;
72 bool has_cache = false;
73 // image_location = /system/framework/boot.art
74 // system_image_location = /system/framework/<image_isa>/boot.art
75 std::string system_filename(GetSystemImageFilename(location.c_str(), isa));
76 if (OS::FileExists(system_filename.c_str())) {
77 has_system = true;
78 }
79
80 bool have_android_data = false;
81 bool dalvik_cache_exists = false;
82 std::string dalvik_cache;
83 GetDalvikCache(GetInstructionSetString(isa), false, &dalvik_cache,
84 &have_android_data, &dalvik_cache_exists);
85
86 std::string cache_filename;
87 if (have_android_data && dalvik_cache_exists) {
88 // Always set output location even if it does not exist,
89 // so that the caller knows where to create the image.
90 //
91 // image_location = /system/framework/boot.art
92 // *image_filename = /data/dalvik-cache/<image_isa>/boot.art
93 std::string error_msg;
94 if (GetDalvikCacheFilename(location.c_str(), dalvik_cache.c_str(),
95 &cache_filename, &error_msg)) {
96 has_cache = true;
97 }
98 }
99 if (has_system) {
100 *filename = system_filename;
101 return true;
102 } else if (has_cache) {
103 *filename = cache_filename;
104 return true;
105 } else {
106 return false;
107 }
108}
109
Alex Light53cb16b2014-06-12 11:26:29 -0700110bool PatchOat::Patch(const std::string& image_location, off_t delta,
111 File* output_image, InstructionSet isa,
Alex Lighteefbe392014-07-08 09:53:18 -0700112 TimingLogger* timings) {
Alex Light53cb16b2014-06-12 11:26:29 -0700113 CHECK(Runtime::Current() == nullptr);
114 CHECK(output_image != nullptr);
115 CHECK_GE(output_image->Fd(), 0);
116 CHECK(!image_location.empty()) << "image file must have a filename.";
117 CHECK_NE(isa, kNone);
118
Alex Lighteefbe392014-07-08 09:53:18 -0700119 TimingLogger::ScopedTiming t("Runtime Setup", timings);
Alex Light53cb16b2014-06-12 11:26:29 -0700120 const char *isa_name = GetInstructionSetString(isa);
Alex Lightcf4bf382014-07-24 11:29:14 -0700121 std::string image_filename;
122 if (!LocationToFilename(image_location, isa, &image_filename)) {
123 LOG(ERROR) << "Unable to find image at location " << image_location;
124 return false;
125 }
Alex Light53cb16b2014-06-12 11:26:29 -0700126 std::unique_ptr<File> input_image(OS::OpenFileForReading(image_filename.c_str()));
127 if (input_image.get() == nullptr) {
Alex Lightcf4bf382014-07-24 11:29:14 -0700128 LOG(ERROR) << "unable to open input image file at " << image_filename
129 << " for location " << image_location;
Alex Light53cb16b2014-06-12 11:26:29 -0700130 return false;
131 }
132 int64_t image_len = input_image->GetLength();
133 if (image_len < 0) {
134 LOG(ERROR) << "Error while getting image length";
135 return false;
136 }
137 ImageHeader image_header;
138 if (sizeof(image_header) != input_image->Read(reinterpret_cast<char*>(&image_header),
139 sizeof(image_header), 0)) {
140 LOG(ERROR) << "Unable to read image header from image file " << input_image->GetPath();
141 return false;
142 }
143
144 // Set up the runtime
Ian Rogerse63db272014-07-15 15:36:11 -0700145 RuntimeOptions options;
Alex Light53cb16b2014-06-12 11:26:29 -0700146 NoopCompilerCallbacks callbacks;
147 options.push_back(std::make_pair("compilercallbacks", &callbacks));
148 std::string img = "-Ximage:" + image_location;
149 options.push_back(std::make_pair(img.c_str(), nullptr));
150 options.push_back(std::make_pair("imageinstructionset", reinterpret_cast<const void*>(isa_name)));
151 if (!Runtime::Create(options, false)) {
152 LOG(ERROR) << "Unable to initialize runtime";
153 return false;
154 }
155 // Runtime::Create acquired the mutator_lock_ that is normally given away when we Runtime::Start,
156 // give it away now and then switch to a more manageable ScopedObjectAccess.
157 Thread::Current()->TransitionFromRunnableToSuspended(kNative);
158 ScopedObjectAccess soa(Thread::Current());
159
160 t.NewTiming("Image and oat Patching setup");
161 // Create the map where we will write the image patches to.
Alex Lighteefbe392014-07-08 09:53:18 -0700162 std::string error_msg;
Alex Light53cb16b2014-06-12 11:26:29 -0700163 std::unique_ptr<MemMap> image(MemMap::MapFile(image_len, PROT_READ | PROT_WRITE, MAP_PRIVATE,
164 input_image->Fd(), 0,
165 input_image->GetPath().c_str(),
166 &error_msg));
167 if (image.get() == nullptr) {
168 LOG(ERROR) << "unable to map image file " << input_image->GetPath() << " : " << error_msg;
169 return false;
170 }
171 gc::space::ImageSpace* ispc = Runtime::Current()->GetHeap()->GetImageSpace();
172
173 PatchOat p(image.release(), ispc->GetLiveBitmap(), ispc->GetMemMap(),
174 delta, timings);
175 t.NewTiming("Patching files");
176 if (!p.PatchImage()) {
Alex Lighta59dd802014-07-02 16:28:08 -0700177 LOG(ERROR) << "Failed to patch image file " << input_image->GetPath();
Alex Light53cb16b2014-06-12 11:26:29 -0700178 return false;
179 }
180
181 t.NewTiming("Writing files");
182 if (!p.WriteImage(output_image)) {
183 return false;
184 }
185 return true;
186}
187
188bool PatchOat::Patch(const File* input_oat, const std::string& image_location, off_t delta,
189 File* output_oat, File* output_image, InstructionSet isa,
Alex Lighteefbe392014-07-08 09:53:18 -0700190 TimingLogger* timings) {
Alex Light53cb16b2014-06-12 11:26:29 -0700191 CHECK(Runtime::Current() == nullptr);
192 CHECK(output_image != nullptr);
193 CHECK_GE(output_image->Fd(), 0);
194 CHECK(input_oat != nullptr);
195 CHECK(output_oat != nullptr);
196 CHECK_GE(input_oat->Fd(), 0);
197 CHECK_GE(output_oat->Fd(), 0);
198 CHECK(!image_location.empty()) << "image file must have a filename.";
199
Alex Lighteefbe392014-07-08 09:53:18 -0700200 TimingLogger::ScopedTiming t("Runtime Setup", timings);
Alex Light53cb16b2014-06-12 11:26:29 -0700201
202 if (isa == kNone) {
203 Elf32_Ehdr elf_hdr;
204 if (sizeof(elf_hdr) != input_oat->Read(reinterpret_cast<char*>(&elf_hdr), sizeof(elf_hdr), 0)) {
205 LOG(ERROR) << "unable to read elf header";
206 return false;
207 }
208 isa = ElfISAToInstructionSet(elf_hdr.e_machine);
209 }
210 const char* isa_name = GetInstructionSetString(isa);
Alex Lightcf4bf382014-07-24 11:29:14 -0700211 std::string image_filename;
212 if (!LocationToFilename(image_location, isa, &image_filename)) {
213 LOG(ERROR) << "Unable to find image at location " << image_location;
214 return false;
215 }
Alex Light53cb16b2014-06-12 11:26:29 -0700216 std::unique_ptr<File> input_image(OS::OpenFileForReading(image_filename.c_str()));
217 if (input_image.get() == nullptr) {
Alex Lightcf4bf382014-07-24 11:29:14 -0700218 LOG(ERROR) << "unable to open input image file at " << image_filename
219 << " for location " << image_location;
Alex Light53cb16b2014-06-12 11:26:29 -0700220 return false;
221 }
222 int64_t image_len = input_image->GetLength();
223 if (image_len < 0) {
224 LOG(ERROR) << "Error while getting image length";
225 return false;
226 }
227 ImageHeader image_header;
228 if (sizeof(image_header) != input_image->Read(reinterpret_cast<char*>(&image_header),
229 sizeof(image_header), 0)) {
230 LOG(ERROR) << "Unable to read image header from image file " << input_image->GetPath();
231 }
232
233 // Set up the runtime
Ian Rogerse63db272014-07-15 15:36:11 -0700234 RuntimeOptions options;
Alex Light53cb16b2014-06-12 11:26:29 -0700235 NoopCompilerCallbacks callbacks;
236 options.push_back(std::make_pair("compilercallbacks", &callbacks));
237 std::string img = "-Ximage:" + image_location;
238 options.push_back(std::make_pair(img.c_str(), nullptr));
239 options.push_back(std::make_pair("imageinstructionset", reinterpret_cast<const void*>(isa_name)));
240 if (!Runtime::Create(options, false)) {
241 LOG(ERROR) << "Unable to initialize runtime";
242 return false;
243 }
244 // Runtime::Create acquired the mutator_lock_ that is normally given away when we Runtime::Start,
245 // give it away now and then switch to a more manageable ScopedObjectAccess.
246 Thread::Current()->TransitionFromRunnableToSuspended(kNative);
247 ScopedObjectAccess soa(Thread::Current());
248
249 t.NewTiming("Image and oat Patching setup");
250 // Create the map where we will write the image patches to.
Alex Lighteefbe392014-07-08 09:53:18 -0700251 std::string error_msg;
Alex Light53cb16b2014-06-12 11:26:29 -0700252 std::unique_ptr<MemMap> image(MemMap::MapFile(image_len, PROT_READ | PROT_WRITE, MAP_PRIVATE,
253 input_image->Fd(), 0,
254 input_image->GetPath().c_str(),
255 &error_msg));
256 if (image.get() == nullptr) {
257 LOG(ERROR) << "unable to map image file " << input_image->GetPath() << " : " << error_msg;
258 return false;
259 }
260 gc::space::ImageSpace* ispc = Runtime::Current()->GetHeap()->GetImageSpace();
261
262 std::unique_ptr<ElfFile> elf(ElfFile::Open(const_cast<File*>(input_oat),
263 PROT_READ | PROT_WRITE, MAP_PRIVATE, &error_msg));
264 if (elf.get() == nullptr) {
265 LOG(ERROR) << "unable to open oat file " << input_oat->GetPath() << " : " << error_msg;
266 return false;
267 }
268
269 PatchOat p(elf.release(), image.release(), ispc->GetLiveBitmap(), ispc->GetMemMap(),
270 delta, timings);
271 t.NewTiming("Patching files");
272 if (!p.PatchElf()) {
Alex Lighta59dd802014-07-02 16:28:08 -0700273 LOG(ERROR) << "Failed to patch oat file " << input_oat->GetPath();
Alex Light53cb16b2014-06-12 11:26:29 -0700274 return false;
275 }
276 if (!p.PatchImage()) {
Alex Lighta59dd802014-07-02 16:28:08 -0700277 LOG(ERROR) << "Failed to patch image file " << input_image->GetPath();
Alex Light53cb16b2014-06-12 11:26:29 -0700278 return false;
279 }
280
281 t.NewTiming("Writing files");
282 if (!p.WriteElf(output_oat)) {
283 return false;
284 }
285 if (!p.WriteImage(output_image)) {
286 return false;
287 }
288 return true;
289}
290
291bool PatchOat::WriteElf(File* out) {
Alex Lighteefbe392014-07-08 09:53:18 -0700292 TimingLogger::ScopedTiming t("Writing Elf File", timings_);
Alex Lighta59dd802014-07-02 16:28:08 -0700293
Alex Light53cb16b2014-06-12 11:26:29 -0700294 CHECK(oat_file_.get() != nullptr);
295 CHECK(out != nullptr);
296 size_t expect = oat_file_->Size();
297 if (out->WriteFully(reinterpret_cast<char*>(oat_file_->Begin()), expect) &&
298 out->SetLength(expect) == 0) {
299 return true;
300 } else {
301 LOG(ERROR) << "Writing to oat file " << out->GetPath() << " failed.";
302 return false;
303 }
304}
305
306bool PatchOat::WriteImage(File* out) {
Alex Lighteefbe392014-07-08 09:53:18 -0700307 TimingLogger::ScopedTiming t("Writing image File", timings_);
Alex Lighta59dd802014-07-02 16:28:08 -0700308 std::string error_msg;
309
Alex Lightcf4bf382014-07-24 11:29:14 -0700310 ScopedFlock img_flock;
311 img_flock.Init(out, &error_msg);
Alex Lighta59dd802014-07-02 16:28:08 -0700312
Alex Light53cb16b2014-06-12 11:26:29 -0700313 CHECK(image_ != nullptr);
314 CHECK(out != nullptr);
315 size_t expect = image_->Size();
316 if (out->WriteFully(reinterpret_cast<char*>(image_->Begin()), expect) &&
317 out->SetLength(expect) == 0) {
318 return true;
319 } else {
320 LOG(ERROR) << "Writing to image file " << out->GetPath() << " failed.";
321 return false;
322 }
323}
324
325bool PatchOat::PatchImage() {
326 ImageHeader* image_header = reinterpret_cast<ImageHeader*>(image_->Begin());
327 CHECK_GT(image_->Size(), sizeof(ImageHeader));
328 // These are the roots from the original file.
329 mirror::Object* img_roots = image_header->GetImageRoots();
330 image_header->RelocateImage(delta_);
331
332 VisitObject(img_roots);
333 if (!image_header->IsValid()) {
334 LOG(ERROR) << "reloction renders image header invalid";
335 return false;
336 }
337
338 {
Alex Lighteefbe392014-07-08 09:53:18 -0700339 TimingLogger::ScopedTiming t("Walk Bitmap", timings_);
Alex Light53cb16b2014-06-12 11:26:29 -0700340 // Walk the bitmap.
341 WriterMutexLock mu(Thread::Current(), *Locks::heap_bitmap_lock_);
342 bitmap_->Walk(PatchOat::BitmapCallback, this);
343 }
344 return true;
345}
346
347bool PatchOat::InHeap(mirror::Object* o) {
348 uintptr_t begin = reinterpret_cast<uintptr_t>(heap_->Begin());
349 uintptr_t end = reinterpret_cast<uintptr_t>(heap_->End());
350 uintptr_t obj = reinterpret_cast<uintptr_t>(o);
351 return o == nullptr || (begin <= obj && obj < end);
352}
353
354void PatchOat::PatchVisitor::operator() (mirror::Object* obj, MemberOffset off,
355 bool is_static_unused) const {
356 mirror::Object* referent = obj->GetFieldObject<mirror::Object, kVerifyNone>(off);
357 DCHECK(patcher_->InHeap(referent)) << "Referent is not in the heap.";
358 mirror::Object* moved_object = patcher_->RelocatedAddressOf(referent);
359 copy_->SetFieldObjectWithoutWriteBarrier<false, true, kVerifyNone>(off, moved_object);
360}
361
362void PatchOat::PatchVisitor::operator() (mirror::Class* cls, mirror::Reference* ref) const {
363 MemberOffset off = mirror::Reference::ReferentOffset();
364 mirror::Object* referent = ref->GetReferent();
365 DCHECK(patcher_->InHeap(referent)) << "Referent is not in the heap.";
366 mirror::Object* moved_object = patcher_->RelocatedAddressOf(referent);
367 copy_->SetFieldObjectWithoutWriteBarrier<false, true, kVerifyNone>(off, moved_object);
368}
369
370mirror::Object* PatchOat::RelocatedCopyOf(mirror::Object* obj) {
371 if (obj == nullptr) {
372 return nullptr;
373 }
374 DCHECK_GT(reinterpret_cast<uintptr_t>(obj), reinterpret_cast<uintptr_t>(heap_->Begin()));
375 DCHECK_LT(reinterpret_cast<uintptr_t>(obj), reinterpret_cast<uintptr_t>(heap_->End()));
376 uintptr_t heap_off =
377 reinterpret_cast<uintptr_t>(obj) - reinterpret_cast<uintptr_t>(heap_->Begin());
378 DCHECK_LT(heap_off, image_->Size());
379 return reinterpret_cast<mirror::Object*>(image_->Begin() + heap_off);
380}
381
382mirror::Object* PatchOat::RelocatedAddressOf(mirror::Object* obj) {
383 if (obj == nullptr) {
384 return nullptr;
385 } else {
386 return reinterpret_cast<mirror::Object*>(reinterpret_cast<byte*>(obj) + delta_);
387 }
388}
389
390// Called by BitmapCallback
391void PatchOat::VisitObject(mirror::Object* object) {
392 mirror::Object* copy = RelocatedCopyOf(object);
393 CHECK(copy != nullptr);
394 if (kUseBakerOrBrooksReadBarrier) {
395 object->AssertReadBarrierPointer();
396 if (kUseBrooksReadBarrier) {
397 mirror::Object* moved_to = RelocatedAddressOf(object);
398 copy->SetReadBarrierPointer(moved_to);
399 DCHECK_EQ(copy->GetReadBarrierPointer(), moved_to);
400 }
401 }
402 PatchOat::PatchVisitor visitor(this, copy);
403 object->VisitReferences<true, kVerifyNone>(visitor, visitor);
404 if (object->IsArtMethod<kVerifyNone>()) {
405 FixupMethod(static_cast<mirror::ArtMethod*>(object),
406 static_cast<mirror::ArtMethod*>(copy));
407 }
408}
409
410void PatchOat::FixupMethod(mirror::ArtMethod* object, mirror::ArtMethod* copy) {
411 // Just update the entry points if it looks like we should.
Alex Lighteefbe392014-07-08 09:53:18 -0700412 // TODO: sanity check all the pointers' values
Alex Light53cb16b2014-06-12 11:26:29 -0700413 uintptr_t portable = reinterpret_cast<uintptr_t>(
414 object->GetEntryPointFromPortableCompiledCode<kVerifyNone>());
415 if (portable != 0) {
416 copy->SetEntryPointFromPortableCompiledCode(reinterpret_cast<void*>(portable + delta_));
417 }
418 uintptr_t quick= reinterpret_cast<uintptr_t>(
419 object->GetEntryPointFromQuickCompiledCode<kVerifyNone>());
420 if (quick != 0) {
421 copy->SetEntryPointFromQuickCompiledCode(reinterpret_cast<void*>(quick + delta_));
422 }
423 uintptr_t interpreter = reinterpret_cast<uintptr_t>(
424 object->GetEntryPointFromInterpreter<kVerifyNone>());
425 if (interpreter != 0) {
426 copy->SetEntryPointFromInterpreter(
427 reinterpret_cast<mirror::EntryPointFromInterpreter*>(interpreter + delta_));
428 }
429
430 uintptr_t native_method = reinterpret_cast<uintptr_t>(object->GetNativeMethod());
431 if (native_method != 0) {
432 copy->SetNativeMethod(reinterpret_cast<void*>(native_method + delta_));
433 }
434
435 uintptr_t native_gc_map = reinterpret_cast<uintptr_t>(object->GetNativeGcMap());
436 if (native_gc_map != 0) {
437 copy->SetNativeGcMap(reinterpret_cast<uint8_t*>(native_gc_map + delta_));
438 }
439}
440
Alex Lighteefbe392014-07-08 09:53:18 -0700441bool PatchOat::Patch(File* input_oat, off_t delta, File* output_oat, TimingLogger* timings) {
Alex Light53cb16b2014-06-12 11:26:29 -0700442 CHECK(input_oat != nullptr);
443 CHECK(output_oat != nullptr);
444 CHECK_GE(input_oat->Fd(), 0);
445 CHECK_GE(output_oat->Fd(), 0);
Alex Lighteefbe392014-07-08 09:53:18 -0700446 TimingLogger::ScopedTiming t("Setup Oat File Patching", timings);
Alex Light53cb16b2014-06-12 11:26:29 -0700447
448 std::string error_msg;
449 std::unique_ptr<ElfFile> elf(ElfFile::Open(const_cast<File*>(input_oat),
450 PROT_READ | PROT_WRITE, MAP_PRIVATE, &error_msg));
451 if (elf.get() == nullptr) {
452 LOG(ERROR) << "unable to open oat file " << input_oat->GetPath() << " : " << error_msg;
453 return false;
454 }
455
456 PatchOat p(elf.release(), delta, timings);
457 t.NewTiming("Patch Oat file");
458 if (!p.PatchElf()) {
459 return false;
460 }
461
462 t.NewTiming("Writing oat file");
463 if (!p.WriteElf(output_oat)) {
464 return false;
465 }
466 return true;
467}
468
Alex Light4b0d2d92014-08-06 13:37:23 -0700469template <typename ptr_t>
470bool PatchOat::CheckOatFile(const Elf32_Shdr& patches_sec) {
471 if (patches_sec.sh_type != SHT_OAT_PATCH) {
Alex Light53cb16b2014-06-12 11:26:29 -0700472 return false;
473 }
Alex Light4b0d2d92014-08-06 13:37:23 -0700474 ptr_t* patches = reinterpret_cast<ptr_t*>(oat_file_->Begin() + patches_sec.sh_offset);
475 ptr_t* patches_end = patches + (patches_sec.sh_size / sizeof(ptr_t));
Alex Light53cb16b2014-06-12 11:26:29 -0700476 Elf32_Shdr* oat_data_sec = oat_file_->FindSectionByName(".rodata");
477 Elf32_Shdr* oat_text_sec = oat_file_->FindSectionByName(".text");
478 if (oat_data_sec == nullptr) {
479 return false;
480 }
481 if (oat_text_sec == nullptr) {
482 return false;
483 }
484 if (oat_text_sec->sh_offset <= oat_data_sec->sh_offset) {
485 return false;
486 }
487
488 for (; patches < patches_end; patches++) {
489 if (oat_text_sec->sh_size <= *patches) {
490 return false;
491 }
492 }
493
494 return true;
495}
496
Alex Lighta59dd802014-07-02 16:28:08 -0700497bool PatchOat::PatchOatHeader() {
498 Elf32_Shdr *rodata_sec = oat_file_->FindSectionByName(".rodata");
499 if (rodata_sec == nullptr) {
500 return false;
501 }
502 OatHeader* oat_header = reinterpret_cast<OatHeader*>(oat_file_->Begin() + rodata_sec->sh_offset);
503 if (!oat_header->IsValid()) {
504 LOG(ERROR) << "Elf file " << oat_file_->GetFile().GetPath() << " has an invalid oat header";
505 return false;
506 }
507 oat_header->RelocateOat(delta_);
508 return true;
509}
510
Alex Light53cb16b2014-06-12 11:26:29 -0700511bool PatchOat::PatchElf() {
Alex Lighta59dd802014-07-02 16:28:08 -0700512 TimingLogger::ScopedTiming t("Fixup Elf Text Section", timings_);
513 if (!PatchTextSection()) {
514 return false;
515 }
516
517 if (!PatchOatHeader()) {
518 return false;
519 }
520
521 bool need_fixup = false;
522 t.NewTiming("Fixup Elf Headers");
Alex Light53cb16b2014-06-12 11:26:29 -0700523 // Fixup Phdr's
524 for (unsigned int i = 0; i < oat_file_->GetProgramHeaderNum(); i++) {
Andreas Gampedaab38c2014-09-12 18:38:24 -0700525 Elf32_Phdr* hdr = oat_file_->GetProgramHeader(i);
526 CHECK(hdr != nullptr);
527 if (hdr->p_vaddr != 0 && hdr->p_vaddr != hdr->p_offset) {
Alex Lighta59dd802014-07-02 16:28:08 -0700528 need_fixup = true;
Andreas Gampedaab38c2014-09-12 18:38:24 -0700529 hdr->p_vaddr += delta_;
Alex Light53cb16b2014-06-12 11:26:29 -0700530 }
Andreas Gampedaab38c2014-09-12 18:38:24 -0700531 if (hdr->p_paddr != 0 && hdr->p_paddr != hdr->p_offset) {
Alex Lighta59dd802014-07-02 16:28:08 -0700532 need_fixup = true;
Andreas Gampedaab38c2014-09-12 18:38:24 -0700533 hdr->p_paddr += delta_;
Alex Light53cb16b2014-06-12 11:26:29 -0700534 }
535 }
Alex Lighta59dd802014-07-02 16:28:08 -0700536 if (!need_fixup) {
537 // This was never passed through ElfFixup so all headers/symbols just have their offset as
538 // their addr. Therefore we do not need to update these parts.
539 return true;
540 }
541 t.NewTiming("Fixup Section Headers");
Alex Light53cb16b2014-06-12 11:26:29 -0700542 for (unsigned int i = 0; i < oat_file_->GetSectionHeaderNum(); i++) {
Andreas Gampedaab38c2014-09-12 18:38:24 -0700543 Elf32_Shdr* hdr = oat_file_->GetSectionHeader(i);
544 CHECK(hdr != nullptr);
545 if (hdr->sh_addr != 0) {
546 hdr->sh_addr += delta_;
Alex Light53cb16b2014-06-12 11:26:29 -0700547 }
548 }
549
Alex Lighta59dd802014-07-02 16:28:08 -0700550 t.NewTiming("Fixup Dynamics");
Alex Light53cb16b2014-06-12 11:26:29 -0700551 for (Elf32_Word i = 0; i < oat_file_->GetDynamicNum(); i++) {
552 Elf32_Dyn& dyn = oat_file_->GetDynamic(i);
553 if (IsDynamicSectionPointer(dyn.d_tag, oat_file_->GetHeader().e_machine)) {
554 dyn.d_un.d_ptr += delta_;
555 }
556 }
557
558 t.NewTiming("Fixup Elf Symbols");
559 // Fixup dynsym
560 Elf32_Shdr* dynsym_sec = oat_file_->FindSectionByName(".dynsym");
561 CHECK(dynsym_sec != nullptr);
562 if (!PatchSymbols(dynsym_sec)) {
563 return false;
564 }
565
566 // Fixup symtab
567 Elf32_Shdr* symtab_sec = oat_file_->FindSectionByName(".symtab");
568 if (symtab_sec != nullptr) {
569 if (!PatchSymbols(symtab_sec)) {
570 return false;
571 }
572 }
573
Yevgeny Roubane3ea8382014-08-08 16:29:38 +0700574 t.NewTiming("Fixup Debug Sections");
575 if (!oat_file_->FixupDebugSections(delta_)) {
576 return false;
577 }
578
Alex Light53cb16b2014-06-12 11:26:29 -0700579 return true;
580}
581
582bool PatchOat::PatchSymbols(Elf32_Shdr* section) {
583 Elf32_Sym* syms = reinterpret_cast<Elf32_Sym*>(oat_file_->Begin() + section->sh_offset);
584 const Elf32_Sym* last_sym =
585 reinterpret_cast<Elf32_Sym*>(oat_file_->Begin() + section->sh_offset + section->sh_size);
586 CHECK_EQ(section->sh_size % sizeof(Elf32_Sym), 0u)
587 << "Symtab section size is not multiple of symbol size";
588 for (; syms < last_sym; syms++) {
589 uint8_t sttype = ELF32_ST_TYPE(syms->st_info);
590 Elf32_Word shndx = syms->st_shndx;
591 if (shndx != SHN_ABS && shndx != SHN_COMMON && shndx != SHN_UNDEF &&
592 (sttype == STT_FUNC || sttype == STT_OBJECT)) {
593 CHECK_NE(syms->st_value, 0u);
594 syms->st_value += delta_;
595 }
596 }
597 return true;
598}
599
600bool PatchOat::PatchTextSection() {
601 Elf32_Shdr* patches_sec = oat_file_->FindSectionByName(".oat_patches");
602 if (patches_sec == nullptr) {
Alex Lighta59dd802014-07-02 16:28:08 -0700603 LOG(ERROR) << ".oat_patches section not found. Aborting patch";
Alex Light53cb16b2014-06-12 11:26:29 -0700604 return false;
605 }
Alex Light4b0d2d92014-08-06 13:37:23 -0700606 if (patches_sec->sh_type != SHT_OAT_PATCH) {
607 LOG(ERROR) << "Unexpected type of .oat_patches";
608 return false;
609 }
610
611 switch (patches_sec->sh_entsize) {
612 case sizeof(uint32_t):
613 return PatchTextSection<uint32_t>(*patches_sec);
614 case sizeof(uint64_t):
615 return PatchTextSection<uint64_t>(*patches_sec);
616 default:
617 LOG(ERROR) << ".oat_patches Entsize of " << patches_sec->sh_entsize << "bits "
618 << "is not valid";
619 return false;
620 }
621}
622
623template <typename ptr_t>
624bool PatchOat::PatchTextSection(const Elf32_Shdr& patches_sec) {
625 DCHECK(CheckOatFile<ptr_t>(patches_sec)) << "Oat file invalid";
626 ptr_t* patches = reinterpret_cast<ptr_t*>(oat_file_->Begin() + patches_sec.sh_offset);
627 ptr_t* patches_end = patches + (patches_sec.sh_size / sizeof(ptr_t));
Alex Light53cb16b2014-06-12 11:26:29 -0700628 Elf32_Shdr* oat_text_sec = oat_file_->FindSectionByName(".text");
629 CHECK(oat_text_sec != nullptr);
630 byte* to_patch = oat_file_->Begin() + oat_text_sec->sh_offset;
631 uintptr_t to_patch_end = reinterpret_cast<uintptr_t>(to_patch) + oat_text_sec->sh_size;
632
633 for (; patches < patches_end; patches++) {
634 CHECK_LT(*patches, oat_text_sec->sh_size) << "Bad Patch";
635 uint32_t* patch_loc = reinterpret_cast<uint32_t*>(to_patch + *patches);
636 CHECK_LT(reinterpret_cast<uintptr_t>(patch_loc), to_patch_end);
637 *patch_loc += delta_;
638 }
Alex Light53cb16b2014-06-12 11:26:29 -0700639 return true;
640}
641
642static int orig_argc;
643static char** orig_argv;
644
645static std::string CommandLine() {
646 std::vector<std::string> command;
647 for (int i = 0; i < orig_argc; ++i) {
648 command.push_back(orig_argv[i]);
649 }
650 return Join(command, ' ');
651}
652
653static void UsageErrorV(const char* fmt, va_list ap) {
654 std::string error;
655 StringAppendV(&error, fmt, ap);
656 LOG(ERROR) << error;
657}
658
659static void UsageError(const char* fmt, ...) {
660 va_list ap;
661 va_start(ap, fmt);
662 UsageErrorV(fmt, ap);
663 va_end(ap);
664}
665
666static void Usage(const char *fmt, ...) {
667 va_list ap;
668 va_start(ap, fmt);
669 UsageErrorV(fmt, ap);
670 va_end(ap);
671
672 UsageError("Command: %s", CommandLine().c_str());
673 UsageError("Usage: patchoat [options]...");
674 UsageError("");
675 UsageError(" --instruction-set=<isa>: Specifies the instruction set the patched code is");
676 UsageError(" compiled for. Required if you use --input-oat-location");
677 UsageError("");
678 UsageError(" --input-oat-file=<file.oat>: Specifies the exact filename of the oat file to be");
679 UsageError(" patched.");
680 UsageError("");
681 UsageError(" --input-oat-fd=<file-descriptor>: Specifies the file-descriptor of the oat file");
682 UsageError(" to be patched.");
683 UsageError("");
684 UsageError(" --input-oat-location=<file.oat>: Specifies the 'location' to read the patched");
685 UsageError(" oat file from. If used one must also supply the --instruction-set");
686 UsageError("");
687 UsageError(" --input-image-location=<file.art>: Specifies the 'location' of the image file to");
688 UsageError(" be patched. If --instruction-set is not given it will use the instruction set");
689 UsageError(" extracted from the --input-oat-file.");
690 UsageError("");
691 UsageError(" --output-oat-file=<file.oat>: Specifies the exact file to write the patched oat");
692 UsageError(" file to.");
693 UsageError("");
Alex Light53cb16b2014-06-12 11:26:29 -0700694 UsageError(" --output-oat-fd=<file-descriptor>: Specifies the file-descriptor to write the");
695 UsageError(" the patched oat file to.");
696 UsageError("");
697 UsageError(" --output-image-file=<file.art>: Specifies the exact file to write the patched");
698 UsageError(" image file to.");
699 UsageError("");
700 UsageError(" --output-image-fd=<file-descriptor>: Specifies the file-descriptor to write the");
701 UsageError(" the patched image file to.");
702 UsageError("");
Alex Light53cb16b2014-06-12 11:26:29 -0700703 UsageError(" --orig-base-offset=<original-base-offset>: Specify the base offset the input file");
704 UsageError(" was compiled with. This is needed if one is specifying a --base-offset");
705 UsageError("");
706 UsageError(" --base-offset=<new-base-offset>: Specify the base offset we will repatch the");
707 UsageError(" given files to use. This requires that --orig-base-offset is also given.");
708 UsageError("");
709 UsageError(" --base-offset-delta=<delta>: Specify the amount to change the old base-offset by.");
710 UsageError(" This value may be negative.");
711 UsageError("");
712 UsageError(" --patched-image-file=<file.art>: Use the same patch delta as was used to patch");
713 UsageError(" the given image file.");
714 UsageError("");
715 UsageError(" --patched-image-location=<file.art>: Use the same patch delta as was used to");
716 UsageError(" patch the given image location. If used one must also specify the");
Alex Lighta59dd802014-07-02 16:28:08 -0700717 UsageError(" --instruction-set flag. It will search for this image in the same way that");
718 UsageError(" is done when loading one.");
Alex Light53cb16b2014-06-12 11:26:29 -0700719 UsageError("");
Alex Lightcf4bf382014-07-24 11:29:14 -0700720 UsageError(" --lock-output: Obtain a flock on output oat file before starting.");
721 UsageError("");
722 UsageError(" --no-lock-output: Do not attempt to obtain a flock on output oat file.");
723 UsageError("");
Alex Light53cb16b2014-06-12 11:26:29 -0700724 UsageError(" --dump-timings: dump out patch timing information");
725 UsageError("");
726 UsageError(" --no-dump-timings: do not dump out patch timing information");
727 UsageError("");
728
729 exit(EXIT_FAILURE);
730}
731
Alex Lighteefbe392014-07-08 09:53:18 -0700732static bool ReadBaseDelta(const char* name, off_t* delta, std::string* error_msg) {
Alex Light53cb16b2014-06-12 11:26:29 -0700733 CHECK(name != nullptr);
734 CHECK(delta != nullptr);
735 std::unique_ptr<File> file;
736 if (OS::FileExists(name)) {
737 file.reset(OS::OpenFileForReading(name));
738 if (file.get() == nullptr) {
Alex Lighteefbe392014-07-08 09:53:18 -0700739 *error_msg = "Failed to open file %s for reading";
Alex Light53cb16b2014-06-12 11:26:29 -0700740 return false;
741 }
742 } else {
Alex Lighteefbe392014-07-08 09:53:18 -0700743 *error_msg = "File %s does not exist";
Alex Light53cb16b2014-06-12 11:26:29 -0700744 return false;
745 }
746 CHECK(file.get() != nullptr);
747 ImageHeader hdr;
748 if (sizeof(hdr) != file->Read(reinterpret_cast<char*>(&hdr), sizeof(hdr), 0)) {
Alex Lighteefbe392014-07-08 09:53:18 -0700749 *error_msg = "Failed to read file %s";
Alex Light53cb16b2014-06-12 11:26:29 -0700750 return false;
751 }
752 if (!hdr.IsValid()) {
Alex Lighteefbe392014-07-08 09:53:18 -0700753 *error_msg = "%s does not contain a valid image header.";
Alex Light53cb16b2014-06-12 11:26:29 -0700754 return false;
755 }
756 *delta = hdr.GetPatchDelta();
757 return true;
758}
759
760static File* CreateOrOpen(const char* name, bool* created) {
761 if (OS::FileExists(name)) {
762 *created = false;
763 return OS::OpenFileReadWrite(name);
764 } else {
765 *created = true;
Alex Lightcf4bf382014-07-24 11:29:14 -0700766 std::unique_ptr<File> f(OS::CreateEmptyFile(name));
767 if (f.get() != nullptr) {
768 if (fchmod(f->Fd(), 0644) != 0) {
769 PLOG(ERROR) << "Unable to make " << name << " world readable";
770 unlink(name);
771 return nullptr;
772 }
773 }
774 return f.release();
Alex Light53cb16b2014-06-12 11:26:29 -0700775 }
776}
777
Alex Lighteefbe392014-07-08 09:53:18 -0700778static int patchoat(int argc, char **argv) {
Alex Light53cb16b2014-06-12 11:26:29 -0700779 InitLogging(argv);
780 const bool debug = kIsDebugBuild;
781 orig_argc = argc;
782 orig_argv = argv;
783 TimingLogger timings("patcher", false, false);
784
785 InitLogging(argv);
786
787 // Skip over the command name.
788 argv++;
789 argc--;
790
791 if (argc == 0) {
792 Usage("No arguments specified");
793 }
794
795 timings.StartTiming("Patchoat");
796
797 // cmd line args
798 bool isa_set = false;
799 InstructionSet isa = kNone;
800 std::string input_oat_filename;
801 std::string input_oat_location;
802 int input_oat_fd = -1;
803 bool have_input_oat = false;
804 std::string input_image_location;
805 std::string output_oat_filename;
Alex Light53cb16b2014-06-12 11:26:29 -0700806 int output_oat_fd = -1;
807 bool have_output_oat = false;
808 std::string output_image_filename;
Alex Light53cb16b2014-06-12 11:26:29 -0700809 int output_image_fd = -1;
810 bool have_output_image = false;
811 uintptr_t base_offset = 0;
812 bool base_offset_set = false;
813 uintptr_t orig_base_offset = 0;
814 bool orig_base_offset_set = false;
815 off_t base_delta = 0;
816 bool base_delta_set = false;
817 std::string patched_image_filename;
818 std::string patched_image_location;
819 bool dump_timings = kIsDebugBuild;
Alex Lightcf4bf382014-07-24 11:29:14 -0700820 bool lock_output = true;
Alex Light53cb16b2014-06-12 11:26:29 -0700821
822 for (int i = 0; i < argc; i++) {
823 const StringPiece option(argv[i]);
824 const bool log_options = false;
825 if (log_options) {
826 LOG(INFO) << "patchoat: option[" << i << "]=" << argv[i];
827 }
Alex Light53cb16b2014-06-12 11:26:29 -0700828 if (option.starts_with("--instruction-set=")) {
829 isa_set = true;
830 const char* isa_str = option.substr(strlen("--instruction-set=")).data();
Andreas Gampe20c89302014-08-19 17:28:06 -0700831 isa = GetInstructionSetFromString(isa_str);
832 if (isa == kNone) {
833 Usage("Unknown or invalid instruction set %s", isa_str);
Alex Light53cb16b2014-06-12 11:26:29 -0700834 }
835 } else if (option.starts_with("--input-oat-location=")) {
836 if (have_input_oat) {
837 Usage("Only one of --input-oat-file, --input-oat-location and --input-oat-fd may be used.");
838 }
839 have_input_oat = true;
840 input_oat_location = option.substr(strlen("--input-oat-location=")).data();
841 } else if (option.starts_with("--input-oat-file=")) {
842 if (have_input_oat) {
843 Usage("Only one of --input-oat-file, --input-oat-location and --input-oat-fd may be used.");
844 }
845 have_input_oat = true;
846 input_oat_filename = option.substr(strlen("--input-oat-file=")).data();
847 } else if (option.starts_with("--input-oat-fd=")) {
848 if (have_input_oat) {
849 Usage("Only one of --input-oat-file, --input-oat-location and --input-oat-fd may be used.");
850 }
851 have_input_oat = true;
852 const char* oat_fd_str = option.substr(strlen("--input-oat-fd=")).data();
853 if (!ParseInt(oat_fd_str, &input_oat_fd)) {
854 Usage("Failed to parse --input-oat-fd argument '%s' as an integer", oat_fd_str);
855 }
856 if (input_oat_fd < 0) {
857 Usage("--input-oat-fd pass a negative value %d", input_oat_fd);
858 }
859 } else if (option.starts_with("--input-image-location=")) {
860 input_image_location = option.substr(strlen("--input-image-location=")).data();
Alex Light53cb16b2014-06-12 11:26:29 -0700861 } else if (option.starts_with("--output-oat-file=")) {
862 if (have_output_oat) {
Alex Lightcf4bf382014-07-24 11:29:14 -0700863 Usage("Only one of --output-oat-file, and --output-oat-fd may be used.");
Alex Light53cb16b2014-06-12 11:26:29 -0700864 }
865 have_output_oat = true;
866 output_oat_filename = option.substr(strlen("--output-oat-file=")).data();
867 } else if (option.starts_with("--output-oat-fd=")) {
868 if (have_output_oat) {
Alex Lightcf4bf382014-07-24 11:29:14 -0700869 Usage("Only one of --output-oat-file, --output-oat-fd may be used.");
Alex Light53cb16b2014-06-12 11:26:29 -0700870 }
871 have_output_oat = true;
872 const char* oat_fd_str = option.substr(strlen("--output-oat-fd=")).data();
873 if (!ParseInt(oat_fd_str, &output_oat_fd)) {
874 Usage("Failed to parse --output-oat-fd argument '%s' as an integer", oat_fd_str);
875 }
876 if (output_oat_fd < 0) {
877 Usage("--output-oat-fd pass a negative value %d", output_oat_fd);
878 }
Alex Light53cb16b2014-06-12 11:26:29 -0700879 } else if (option.starts_with("--output-image-file=")) {
880 if (have_output_image) {
Alex Lightcf4bf382014-07-24 11:29:14 -0700881 Usage("Only one of --output-image-file, and --output-image-fd may be used.");
Alex Light53cb16b2014-06-12 11:26:29 -0700882 }
883 have_output_image = true;
884 output_image_filename = option.substr(strlen("--output-image-file=")).data();
885 } else if (option.starts_with("--output-image-fd=")) {
886 if (have_output_image) {
Alex Lightcf4bf382014-07-24 11:29:14 -0700887 Usage("Only one of --output-image-file, and --output-image-fd may be used.");
Alex Light53cb16b2014-06-12 11:26:29 -0700888 }
889 have_output_image = true;
890 const char* image_fd_str = option.substr(strlen("--output-image-fd=")).data();
891 if (!ParseInt(image_fd_str, &output_image_fd)) {
892 Usage("Failed to parse --output-image-fd argument '%s' as an integer", image_fd_str);
893 }
894 if (output_image_fd < 0) {
895 Usage("--output-image-fd pass a negative value %d", output_image_fd);
896 }
897 } else if (option.starts_with("--orig-base-offset=")) {
898 const char* orig_base_offset_str = option.substr(strlen("--orig-base-offset=")).data();
899 orig_base_offset_set = true;
900 if (!ParseUint(orig_base_offset_str, &orig_base_offset)) {
901 Usage("Failed to parse --orig-base-offset argument '%s' as an uintptr_t",
902 orig_base_offset_str);
903 }
904 } else if (option.starts_with("--base-offset=")) {
905 const char* base_offset_str = option.substr(strlen("--base-offset=")).data();
906 base_offset_set = true;
907 if (!ParseUint(base_offset_str, &base_offset)) {
908 Usage("Failed to parse --base-offset argument '%s' as an uintptr_t", base_offset_str);
909 }
910 } else if (option.starts_with("--base-offset-delta=")) {
911 const char* base_delta_str = option.substr(strlen("--base-offset-delta=")).data();
912 base_delta_set = true;
913 if (!ParseInt(base_delta_str, &base_delta)) {
914 Usage("Failed to parse --base-offset-delta argument '%s' as an off_t", base_delta_str);
915 }
916 } else if (option.starts_with("--patched-image-location=")) {
917 patched_image_location = option.substr(strlen("--patched-image-location=")).data();
918 } else if (option.starts_with("--patched-image-file=")) {
919 patched_image_filename = option.substr(strlen("--patched-image-file=")).data();
Alex Lightcf4bf382014-07-24 11:29:14 -0700920 } else if (option == "--lock-output") {
921 lock_output = true;
922 } else if (option == "--no-lock-output") {
923 lock_output = false;
Alex Light53cb16b2014-06-12 11:26:29 -0700924 } else if (option == "--dump-timings") {
925 dump_timings = true;
926 } else if (option == "--no-dump-timings") {
927 dump_timings = false;
928 } else {
929 Usage("Unknown argument %s", option.data());
930 }
931 }
932
933 {
934 // Only 1 of these may be set.
935 uint32_t cnt = 0;
936 cnt += (base_delta_set) ? 1 : 0;
937 cnt += (base_offset_set && orig_base_offset_set) ? 1 : 0;
938 cnt += (!patched_image_filename.empty()) ? 1 : 0;
939 cnt += (!patched_image_location.empty()) ? 1 : 0;
940 if (cnt > 1) {
941 Usage("Only one of --base-offset/--orig-base-offset, --base-offset-delta, "
942 "--patched-image-filename or --patched-image-location may be used.");
943 } else if (cnt == 0) {
944 Usage("Must specify --base-offset-delta, --base-offset and --orig-base-offset, "
945 "--patched-image-location or --patched-image-file");
946 }
947 }
948
949 if (have_input_oat != have_output_oat) {
950 Usage("Either both input and output oat must be supplied or niether must be.");
951 }
952
953 if ((!input_image_location.empty()) != have_output_image) {
954 Usage("Either both input and output image must be supplied or niether must be.");
955 }
956
957 // We know we have both the input and output so rename for clarity.
958 bool have_image_files = have_output_image;
959 bool have_oat_files = have_output_oat;
960
961 if (!have_oat_files && !have_image_files) {
962 Usage("Must be patching either an oat or an image file or both.");
963 }
964
965 if (!have_oat_files && !isa_set) {
966 Usage("Must include ISA if patching an image file without an oat file.");
967 }
968
969 if (!input_oat_location.empty()) {
970 if (!isa_set) {
971 Usage("specifying a location requires specifying an instruction set");
972 }
Alex Lightcf4bf382014-07-24 11:29:14 -0700973 if (!LocationToFilename(input_oat_location, isa, &input_oat_filename)) {
974 Usage("Unable to find filename for input oat location %s", input_oat_location.c_str());
975 }
Alex Light53cb16b2014-06-12 11:26:29 -0700976 if (debug) {
977 LOG(INFO) << "Using input-oat-file " << input_oat_filename;
978 }
979 }
Alex Light53cb16b2014-06-12 11:26:29 -0700980 if (!patched_image_location.empty()) {
981 if (!isa_set) {
982 Usage("specifying a location requires specifying an instruction set");
983 }
Alex Lighta59dd802014-07-02 16:28:08 -0700984 std::string system_filename;
985 bool has_system = false;
986 std::string cache_filename;
987 bool has_cache = false;
988 bool has_android_data_unused = false;
989 if (!gc::space::ImageSpace::FindImageFilename(patched_image_location.c_str(), isa,
990 &system_filename, &has_system, &cache_filename,
991 &has_android_data_unused, &has_cache)) {
992 Usage("Unable to determine image file for location %s", patched_image_location.c_str());
993 }
994 if (has_cache) {
995 patched_image_filename = cache_filename;
996 } else if (has_system) {
997 LOG(WARNING) << "Only image file found was in /system for image location "
998 << patched_image_location;
999 patched_image_filename = system_filename;
1000 } else {
1001 Usage("Unable to determine image file for location %s", patched_image_location.c_str());
1002 }
Alex Light53cb16b2014-06-12 11:26:29 -07001003 if (debug) {
1004 LOG(INFO) << "Using patched-image-file " << patched_image_filename;
1005 }
1006 }
1007
1008 if (!base_delta_set) {
1009 if (orig_base_offset_set && base_offset_set) {
1010 base_delta_set = true;
1011 base_delta = base_offset - orig_base_offset;
1012 } else if (!patched_image_filename.empty()) {
1013 base_delta_set = true;
1014 std::string error_msg;
Alex Lighteefbe392014-07-08 09:53:18 -07001015 if (!ReadBaseDelta(patched_image_filename.c_str(), &base_delta, &error_msg)) {
Alex Light53cb16b2014-06-12 11:26:29 -07001016 Usage(error_msg.c_str(), patched_image_filename.c_str());
1017 }
1018 } else {
1019 if (base_offset_set) {
1020 Usage("Unable to determine original base offset.");
1021 } else {
1022 Usage("Must supply a desired new offset or delta.");
1023 }
1024 }
1025 }
1026
1027 if (!IsAligned<kPageSize>(base_delta)) {
1028 Usage("Base offset/delta must be alligned to a pagesize (0x%08x) boundary.", kPageSize);
1029 }
1030
1031 // Do we need to cleanup output files if we fail?
1032 bool new_image_out = false;
1033 bool new_oat_out = false;
1034
1035 std::unique_ptr<File> input_oat;
1036 std::unique_ptr<File> output_oat;
1037 std::unique_ptr<File> output_image;
1038
1039 if (have_image_files) {
1040 CHECK(!input_image_location.empty());
1041
1042 if (output_image_fd != -1) {
Alex Lightcf4bf382014-07-24 11:29:14 -07001043 if (output_image_filename.empty()) {
1044 output_image_filename = "output-image-file";
1045 }
Alex Light53cb16b2014-06-12 11:26:29 -07001046 output_image.reset(new File(output_image_fd, output_image_filename));
1047 } else {
1048 CHECK(!output_image_filename.empty());
1049 output_image.reset(CreateOrOpen(output_image_filename.c_str(), &new_image_out));
1050 }
1051 } else {
1052 CHECK(output_image_filename.empty() && output_image_fd == -1 && input_image_location.empty());
1053 }
1054
1055 if (have_oat_files) {
1056 if (input_oat_fd != -1) {
Alex Lightcf4bf382014-07-24 11:29:14 -07001057 if (input_oat_filename.empty()) {
1058 input_oat_filename = "input-oat-file";
1059 }
Alex Light53cb16b2014-06-12 11:26:29 -07001060 input_oat.reset(new File(input_oat_fd, input_oat_filename));
1061 } else {
1062 CHECK(!input_oat_filename.empty());
1063 input_oat.reset(OS::OpenFileForReading(input_oat_filename.c_str()));
Andreas Gampe1c83cbc2014-07-22 18:52:29 -07001064 if (input_oat.get() == nullptr) {
1065 LOG(ERROR) << "Could not open input oat file: " << strerror(errno);
1066 }
Alex Light53cb16b2014-06-12 11:26:29 -07001067 }
1068
1069 if (output_oat_fd != -1) {
Alex Lightcf4bf382014-07-24 11:29:14 -07001070 if (output_oat_filename.empty()) {
1071 output_oat_filename = "output-oat-file";
Alex Lighta59dd802014-07-02 16:28:08 -07001072 }
Alex Lightcf4bf382014-07-24 11:29:14 -07001073 output_oat.reset(new File(output_oat_fd, output_oat_filename));
Alex Light53cb16b2014-06-12 11:26:29 -07001074 } else {
1075 CHECK(!output_oat_filename.empty());
1076 output_oat.reset(CreateOrOpen(output_oat_filename.c_str(), &new_oat_out));
1077 }
1078 }
1079
1080 auto cleanup = [&output_image_filename, &output_oat_filename,
1081 &new_oat_out, &new_image_out, &timings, &dump_timings](bool success) {
1082 timings.EndTiming();
1083 if (!success) {
1084 if (new_oat_out) {
1085 CHECK(!output_oat_filename.empty());
1086 unlink(output_oat_filename.c_str());
1087 }
1088 if (new_image_out) {
1089 CHECK(!output_image_filename.empty());
1090 unlink(output_image_filename.c_str());
1091 }
1092 }
1093 if (dump_timings) {
1094 LOG(INFO) << Dumpable<TimingLogger>(timings);
1095 }
1096 };
1097
Alex Lightcf4bf382014-07-24 11:29:14 -07001098 if ((have_oat_files && (input_oat.get() == nullptr || output_oat.get() == nullptr)) ||
1099 (have_image_files && output_image.get() == nullptr)) {
1100 cleanup(false);
1101 return EXIT_FAILURE;
1102 }
1103
1104 ScopedFlock output_oat_lock;
1105 if (lock_output) {
1106 std::string error_msg;
1107 if (have_oat_files && !output_oat_lock.Init(output_oat.get(), &error_msg)) {
1108 LOG(ERROR) << "Unable to lock output oat " << output_image->GetPath() << ": " << error_msg;
1109 cleanup(false);
1110 return EXIT_FAILURE;
1111 }
1112 }
1113
Alex Light53cb16b2014-06-12 11:26:29 -07001114 if (debug) {
Alex Lighta59dd802014-07-02 16:28:08 -07001115 LOG(INFO) << "moving offset by " << base_delta
1116 << " (0x" << std::hex << base_delta << ") bytes or "
1117 << std::dec << (base_delta/kPageSize) << " pages.";
Alex Light53cb16b2014-06-12 11:26:29 -07001118 }
1119
1120 bool ret;
1121 if (have_image_files && have_oat_files) {
1122 TimingLogger::ScopedTiming pt("patch image and oat", &timings);
1123 ret = PatchOat::Patch(input_oat.get(), input_image_location, base_delta,
Alex Lighteefbe392014-07-08 09:53:18 -07001124 output_oat.get(), output_image.get(), isa, &timings);
Alex Light53cb16b2014-06-12 11:26:29 -07001125 } else if (have_oat_files) {
1126 TimingLogger::ScopedTiming pt("patch oat", &timings);
Alex Lighteefbe392014-07-08 09:53:18 -07001127 ret = PatchOat::Patch(input_oat.get(), base_delta, output_oat.get(), &timings);
Alex Light53cb16b2014-06-12 11:26:29 -07001128 } else {
1129 TimingLogger::ScopedTiming pt("patch image", &timings);
1130 CHECK(have_image_files);
Alex Lighteefbe392014-07-08 09:53:18 -07001131 ret = PatchOat::Patch(input_image_location, base_delta, output_image.get(), isa, &timings);
Alex Light53cb16b2014-06-12 11:26:29 -07001132 }
1133 cleanup(ret);
Alex Light53cb16b2014-06-12 11:26:29 -07001134 return (ret) ? EXIT_SUCCESS : EXIT_FAILURE;
1135}
1136
1137} // namespace art
1138
1139int main(int argc, char **argv) {
1140 return art::patchoat(argc, argv);
1141}