blob: 3ac08778c42ab803e006b829c298c278ea00a718 [file] [log] [blame]
David Brazdil5a61bb72018-01-19 16:59:46 +00001/*
2 * Copyright (C) 2018 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#ifndef ART_RUNTIME_HIDDEN_API_H_
18#define ART_RUNTIME_HIDDEN_API_H_
19
David Brazdil8ce3bfa2018-03-12 18:01:18 +000020#include "art_field-inl.h"
21#include "art_method-inl.h"
Andreas Gampeaa120012018-03-28 16:23:24 -070022#include "base/mutex.h"
David Sehr67bf42e2018-02-26 16:43:04 -080023#include "dex/hidden_api_access_flags.h"
David Brazdil8ce3bfa2018-03-12 18:01:18 +000024#include "mirror/class-inl.h"
David Brazdil5a61bb72018-01-19 16:59:46 +000025#include "reflection.h"
26#include "runtime.h"
27
28namespace art {
29namespace hiddenapi {
30
Mathew Inwood597d7f62018-03-22 11:36:47 +000031// Hidden API enforcement policy
32// This must be kept in sync with ApplicationInfo.ApiEnforcementPolicy in
33// frameworks/base/core/java/android/content/pm/ApplicationInfo.java
34enum class EnforcementPolicy {
35 kNoChecks = 0,
Mathew Inwooda8503d92018-04-05 16:10:25 +010036 kJustWarn = 1, // keep checks enabled, but allow everything (enables logging)
Mathew Inwood597d7f62018-03-22 11:36:47 +000037 kDarkGreyAndBlackList = 2, // ban dark grey & blacklist
38 kBlacklistOnly = 3, // ban blacklist violations only
39 kMax = kBlacklistOnly,
40};
41
42inline EnforcementPolicy EnforcementPolicyFromInt(int api_policy_int) {
43 DCHECK_GE(api_policy_int, 0);
44 DCHECK_LE(api_policy_int, static_cast<int>(EnforcementPolicy::kMax));
45 return static_cast<EnforcementPolicy>(api_policy_int);
46}
47
David Brazdila02cb112018-01-31 11:36:39 +000048enum Action {
49 kAllow,
50 kAllowButWarn,
David Brazdil92265222018-02-02 11:21:40 +000051 kAllowButWarnAndToast,
David Brazdila02cb112018-01-31 11:36:39 +000052 kDeny
53};
David Brazdil5a61bb72018-01-19 16:59:46 +000054
David Brazdil068d68d2018-02-12 13:04:17 -080055enum AccessMethod {
56 kReflection,
David Brazdil8ce3bfa2018-03-12 18:01:18 +000057 kJNI,
58 kLinking,
David Brazdil068d68d2018-02-12 13:04:17 -080059};
60
Narayan Kamathf5f1f802018-04-03 15:23:46 +010061inline Action GetActionFromAccessFlags(uint32_t access_flags) {
Mathew Inwood597d7f62018-03-22 11:36:47 +000062 EnforcementPolicy policy = Runtime::Current()->GetHiddenApiEnforcementPolicy();
63 if (policy == EnforcementPolicy::kNoChecks) {
64 // Exit early. Nothing to enforce.
65 return kAllow;
66 }
67
68 HiddenApiAccessFlags::ApiList api_list = HiddenApiAccessFlags::DecodeFromRuntime(access_flags);
69 if (api_list == HiddenApiAccessFlags::kWhitelist) {
70 return kAllow;
71 }
Mathew Inwooda8503d92018-04-05 16:10:25 +010072 // if policy is "just warn", always warn. We returned above for whitelist APIs.
73 if (policy == EnforcementPolicy::kJustWarn) {
74 return kAllowButWarn;
75 }
76 DCHECK(policy >= EnforcementPolicy::kDarkGreyAndBlackList);
Mathew Inwood597d7f62018-03-22 11:36:47 +000077 // The logic below relies on equality of values in the enums EnforcementPolicy and
Andreas Gampeaa120012018-03-28 16:23:24 -070078 // HiddenApiAccessFlags::ApiList, and their ordering. Assertions are in hidden_api.cc.
Mathew Inwood597d7f62018-03-22 11:36:47 +000079 if (static_cast<int>(policy) > static_cast<int>(api_list)) {
80 return api_list == HiddenApiAccessFlags::kDarkGreylist
81 ? kAllowButWarnAndToast
82 : kAllowButWarn;
83 } else {
84 return kDeny;
David Brazdil5a61bb72018-01-19 16:59:46 +000085 }
86}
87
Andreas Gampeaa120012018-03-28 16:23:24 -070088// Implementation details. DO NOT ACCESS DIRECTLY.
89namespace detail {
David Brazdilee7d2fd2018-01-20 17:25:23 +000090
Mathew Inwood7d74ef52018-03-16 14:18:33 +000091// Class to encapsulate the signature of a member (ArtField or ArtMethod). This
92// is used as a helper when matching prefixes, and when logging the signature.
93class MemberSignature {
94 private:
95 std::string member_type_;
96 std::vector<std::string> signature_parts_;
97 std::string tmp_;
98
99 public:
Andreas Gampeaa120012018-03-28 16:23:24 -0700100 explicit MemberSignature(ArtField* field) REQUIRES_SHARED(Locks::mutator_lock_);
101 explicit MemberSignature(ArtMethod* method) REQUIRES_SHARED(Locks::mutator_lock_);
Mathew Inwood7d74ef52018-03-16 14:18:33 +0000102
Andreas Gampeaa120012018-03-28 16:23:24 -0700103 void Dump(std::ostream& os) const;
Mathew Inwood7d74ef52018-03-16 14:18:33 +0000104
Mathew Inwood7d74ef52018-03-16 14:18:33 +0000105 // Performs prefix match on this member. Since the full member signature is
106 // composed of several parts, we match each part in turn (rather than
107 // building the entire thing in memory and performing a simple prefix match)
Andreas Gampeaa120012018-03-28 16:23:24 -0700108 bool DoesPrefixMatch(const std::string& prefix) const;
Mathew Inwood7d74ef52018-03-16 14:18:33 +0000109
Andreas Gampeaa120012018-03-28 16:23:24 -0700110 bool IsExempted(const std::vector<std::string>& exemptions);
Mathew Inwood7d74ef52018-03-16 14:18:33 +0000111
Andreas Gampeaa120012018-03-28 16:23:24 -0700112 void WarnAboutAccess(AccessMethod access_method, HiddenApiAccessFlags::ApiList list);
Mathew Inwood7d74ef52018-03-16 14:18:33 +0000113};
David Brazdilee7d2fd2018-01-20 17:25:23 +0000114
Andreas Gampeaa120012018-03-28 16:23:24 -0700115template<typename T>
Narayan Kamathf5f1f802018-04-03 15:23:46 +0100116Action GetMemberActionImpl(T* member, Action action, AccessMethod access_method)
Andreas Gampeaa120012018-03-28 16:23:24 -0700117 REQUIRES_SHARED(Locks::mutator_lock_);
118
119// Returns true if the caller is either loaded by the boot strap class loader or comes from
120// a dex file located in ${ANDROID_ROOT}/framework/.
121ALWAYS_INLINE
122inline bool IsCallerInPlatformDex(ObjPtr<mirror::ClassLoader> caller_class_loader,
123 ObjPtr<mirror::DexCache> caller_dex_cache)
124 REQUIRES_SHARED(Locks::mutator_lock_) {
125 if (caller_class_loader.IsNull()) {
126 return true;
127 } else if (caller_dex_cache.IsNull()) {
128 return false;
129 } else {
130 const DexFile* caller_dex_file = caller_dex_cache->GetDexFile();
131 return caller_dex_file != nullptr && caller_dex_file->IsPlatformDexFile();
132 }
133}
134
135} // namespace detail
136
David Brazdila02cb112018-01-31 11:36:39 +0000137// Returns true if access to `member` should be denied to the caller of the
David Brazdil8e1a7cb2018-03-27 08:14:25 +0000138// reflective query. The decision is based on whether the caller is in the
139// platform or not. Because different users of this function determine this
140// in a different way, `fn_caller_in_platform(self)` is called and should
141// return true if the caller is located in the platform.
David Brazdil8ce3bfa2018-03-12 18:01:18 +0000142// This function might print warnings into the log if the member is hidden.
David Brazdilee7d2fd2018-01-20 17:25:23 +0000143template<typename T>
Narayan Kamathf5f1f802018-04-03 15:23:46 +0100144inline Action GetMemberAction(T* member,
145 Thread* self,
146 std::function<bool(Thread*)> fn_caller_in_platform,
147 AccessMethod access_method)
David Brazdilee7d2fd2018-01-20 17:25:23 +0000148 REQUIRES_SHARED(Locks::mutator_lock_) {
149 DCHECK(member != nullptr);
David Brazdilee7d2fd2018-01-20 17:25:23 +0000150
Narayan Kamathf5f1f802018-04-03 15:23:46 +0100151 Action action = GetActionFromAccessFlags(member->GetAccessFlags());
David Brazdila02cb112018-01-31 11:36:39 +0000152 if (action == kAllow) {
153 // Nothing to do.
Narayan Kamathf5f1f802018-04-03 15:23:46 +0100154 return action;
David Brazdila02cb112018-01-31 11:36:39 +0000155 }
156
David Brazdil8e1a7cb2018-03-27 08:14:25 +0000157 // Member is hidden. Invoke `fn_caller_in_platform` and find the origin of the access.
David Brazdila02cb112018-01-31 11:36:39 +0000158 // This can be *very* expensive. Save it for last.
David Brazdil8e1a7cb2018-03-27 08:14:25 +0000159 if (fn_caller_in_platform(self)) {
160 // Caller in the platform. Exit.
Narayan Kamathf5f1f802018-04-03 15:23:46 +0100161 return kAllow;
David Brazdila02cb112018-01-31 11:36:39 +0000162 }
163
David Brazdil8e1a7cb2018-03-27 08:14:25 +0000164 // Member is hidden and caller is not in the platform.
Narayan Kamathf5f1f802018-04-03 15:23:46 +0100165 return detail::GetMemberActionImpl(member, action, access_method);
David Brazdil8e1a7cb2018-03-27 08:14:25 +0000166}
167
168inline bool IsCallerInPlatformDex(ObjPtr<mirror::Class> caller)
169 REQUIRES_SHARED(Locks::mutator_lock_) {
Andreas Gampeaa120012018-03-28 16:23:24 -0700170 return !caller.IsNull() &&
171 detail::IsCallerInPlatformDex(caller->GetClassLoader(), caller->GetDexCache());
David Brazdil8e1a7cb2018-03-27 08:14:25 +0000172}
173
David Brazdil8ce3bfa2018-03-12 18:01:18 +0000174// Returns true if access to `member` should be denied to a caller loaded with
175// `caller_class_loader`.
176// This function might print warnings into the log if the member is hidden.
177template<typename T>
Narayan Kamathf5f1f802018-04-03 15:23:46 +0100178inline Action GetMemberAction(T* member,
179 ObjPtr<mirror::ClassLoader> caller_class_loader,
180 ObjPtr<mirror::DexCache> caller_dex_cache,
181 AccessMethod access_method)
David Brazdilee7d2fd2018-01-20 17:25:23 +0000182 REQUIRES_SHARED(Locks::mutator_lock_) {
Andreas Gampeaa120012018-03-28 16:23:24 -0700183 bool caller_in_platform = detail::IsCallerInPlatformDex(caller_class_loader, caller_dex_cache);
Narayan Kamathf5f1f802018-04-03 15:23:46 +0100184 return GetMemberAction(member,
185 /* thread */ nullptr,
186 [caller_in_platform] (Thread*) { return caller_in_platform; },
187 access_method);
David Brazdilee7d2fd2018-01-20 17:25:23 +0000188}
189
Narayan Kamathf5f1f802018-04-03 15:23:46 +0100190// Calls back into managed code to notify VMRuntime.nonSdkApiUsageConsumer that
191// |member| was accessed. This is usually called when an API is on the black,
192// dark grey or light grey lists. Given that the callback can execute arbitrary
193// code, a call to this method can result in thread suspension.
194template<typename T> void NotifyHiddenApiListener(T* member)
195 REQUIRES_SHARED(Locks::mutator_lock_);
196
197
David Brazdil5a61bb72018-01-19 16:59:46 +0000198} // namespace hiddenapi
199} // namespace art
200
201#endif // ART_RUNTIME_HIDDEN_API_H_