| /* |
| * Copyright (C) 2011 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include "dex_file_verifier.h" |
| |
| #include <algorithm> |
| #include <bitset> |
| #include <limits> |
| #include <memory> |
| |
| #include "android-base/logging.h" |
| #include "android-base/macros.h" |
| #include "android-base/stringprintf.h" |
| |
| #include "base/hash_map.h" |
| #include "base/leb128.h" |
| #include "base/safe_map.h" |
| #include "class_accessor-inl.h" |
| #include "code_item_accessors-inl.h" |
| #include "descriptors_names.h" |
| #include "dex_file-inl.h" |
| #include "dex_file_types.h" |
| #include "modifiers.h" |
| #include "utf-inl.h" |
| |
| namespace art { |
| namespace dex { |
| |
| using android::base::StringAppendV; |
| using android::base::StringPrintf; |
| |
| namespace { |
| |
| constexpr uint32_t kTypeIdLimit = std::numeric_limits<uint16_t>::max(); |
| |
| constexpr bool IsValidOrNoTypeId(uint16_t low, uint16_t high) { |
| return (high == 0) || ((high == 0xffffU) && (low == 0xffffU)); |
| } |
| |
| constexpr bool IsValidTypeId(uint16_t low ATTRIBUTE_UNUSED, uint16_t high) { |
| return (high == 0); |
| } |
| |
| constexpr uint32_t MapTypeToBitMask(DexFile::MapItemType map_item_type) { |
| switch (map_item_type) { |
| case DexFile::kDexTypeHeaderItem: return 1 << 0; |
| case DexFile::kDexTypeStringIdItem: return 1 << 1; |
| case DexFile::kDexTypeTypeIdItem: return 1 << 2; |
| case DexFile::kDexTypeProtoIdItem: return 1 << 3; |
| case DexFile::kDexTypeFieldIdItem: return 1 << 4; |
| case DexFile::kDexTypeMethodIdItem: return 1 << 5; |
| case DexFile::kDexTypeClassDefItem: return 1 << 6; |
| case DexFile::kDexTypeCallSiteIdItem: return 1 << 7; |
| case DexFile::kDexTypeMethodHandleItem: return 1 << 8; |
| case DexFile::kDexTypeMapList: return 1 << 9; |
| case DexFile::kDexTypeTypeList: return 1 << 10; |
| case DexFile::kDexTypeAnnotationSetRefList: return 1 << 11; |
| case DexFile::kDexTypeAnnotationSetItem: return 1 << 12; |
| case DexFile::kDexTypeClassDataItem: return 1 << 13; |
| case DexFile::kDexTypeCodeItem: return 1 << 14; |
| case DexFile::kDexTypeStringDataItem: return 1 << 15; |
| case DexFile::kDexTypeDebugInfoItem: return 1 << 16; |
| case DexFile::kDexTypeAnnotationItem: return 1 << 17; |
| case DexFile::kDexTypeEncodedArrayItem: return 1 << 18; |
| case DexFile::kDexTypeAnnotationsDirectoryItem: return 1 << 19; |
| case DexFile::kDexTypeHiddenapiClassData: return 1 << 20; |
| } |
| return 0; |
| } |
| |
| constexpr bool IsDataSectionType(DexFile::MapItemType map_item_type) { |
| switch (map_item_type) { |
| case DexFile::kDexTypeHeaderItem: |
| case DexFile::kDexTypeStringIdItem: |
| case DexFile::kDexTypeTypeIdItem: |
| case DexFile::kDexTypeProtoIdItem: |
| case DexFile::kDexTypeFieldIdItem: |
| case DexFile::kDexTypeMethodIdItem: |
| case DexFile::kDexTypeClassDefItem: |
| return false; |
| case DexFile::kDexTypeCallSiteIdItem: |
| case DexFile::kDexTypeMethodHandleItem: |
| case DexFile::kDexTypeMapList: |
| case DexFile::kDexTypeTypeList: |
| case DexFile::kDexTypeAnnotationSetRefList: |
| case DexFile::kDexTypeAnnotationSetItem: |
| case DexFile::kDexTypeClassDataItem: |
| case DexFile::kDexTypeCodeItem: |
| case DexFile::kDexTypeStringDataItem: |
| case DexFile::kDexTypeDebugInfoItem: |
| case DexFile::kDexTypeAnnotationItem: |
| case DexFile::kDexTypeEncodedArrayItem: |
| case DexFile::kDexTypeAnnotationsDirectoryItem: |
| case DexFile::kDexTypeHiddenapiClassData: |
| return true; |
| } |
| return true; |
| } |
| |
| // Fields and methods may have only one of public/protected/private. |
| ALWAYS_INLINE |
| constexpr bool CheckAtMostOneOfPublicProtectedPrivate(uint32_t flags) { |
| // Semantically we want 'return POPCOUNT(flags & kAcc) <= 1;'. |
| static_assert(IsPowerOfTwo(0), "0 not marked as power of two"); |
| static_assert(IsPowerOfTwo(kAccPublic), "kAccPublic not marked as power of two"); |
| static_assert(IsPowerOfTwo(kAccProtected), "kAccProtected not marked as power of two"); |
| static_assert(IsPowerOfTwo(kAccPrivate), "kAccPrivate not marked as power of two"); |
| return IsPowerOfTwo(flags & (kAccPublic | kAccProtected | kAccPrivate)); |
| } |
| |
| // Helper functions to retrieve names from the dex file. We do not want to rely on DexFile |
| // functionality, as we're still verifying the dex file. begin and header correspond to the |
| // underscored variants in the DexFileVerifier. |
| |
| std::string GetString(const uint8_t* const begin, |
| const DexFile::Header* const header, |
| dex::StringIndex string_idx) { |
| // All sources of the `string_idx` have already been checked in CheckIntraSection(). |
| DCHECK_LT(string_idx.index_, header->string_ids_size_); |
| const dex::StringId* string_id = |
| reinterpret_cast<const dex::StringId*>(begin + header->string_ids_off_) + string_idx.index_; |
| |
| // The string offset has been checked at the start of `CheckInterSection()` |
| // to point to a string data item checked by `CheckIntraSection()`. |
| const uint8_t* ptr = begin + string_id->string_data_off_; |
| DecodeUnsignedLeb128(&ptr); // Ignore the result. |
| return reinterpret_cast<const char*>(ptr); |
| } |
| |
| std::string GetClass(const uint8_t* const begin, |
| const DexFile::Header* const header, |
| dex::TypeIndex class_idx) { |
| // All sources of `class_idx` have already been checked in CheckIntraSection(). |
| CHECK_LT(class_idx.index_, header->type_ids_size_); |
| |
| const dex::TypeId* type_id = |
| reinterpret_cast<const dex::TypeId*>(begin + header->type_ids_off_) + class_idx.index_; |
| |
| // The `type_id->descriptor_idx_` has already been checked in CheckIntraTypeIdItem(). |
| // However, it may not have been checked to be a valid descriptor, so return the raw |
| // string without converting with `PrettyDescriptor()`. |
| return GetString(begin, header, type_id->descriptor_idx_); |
| } |
| |
| std::string GetFieldDescription(const uint8_t* const begin, |
| const DexFile::Header* const header, |
| uint32_t idx) { |
| // The `idx` has already been checked in `DexFileVerifier::CheckIntraClassDataItemFields()`. |
| CHECK_LT(idx, header->field_ids_size_); |
| |
| const dex::FieldId* field_id = |
| reinterpret_cast<const dex::FieldId*>(begin + header->field_ids_off_) + idx; |
| |
| // Indexes in `*field_id` have already been checked in CheckIntraFieldIdItem(). |
| std::string class_name = GetClass(begin, header, field_id->class_idx_); |
| std::string field_name = GetString(begin, header, field_id->name_idx_); |
| return class_name + "." + field_name; |
| } |
| |
| std::string GetMethodDescription(const uint8_t* const begin, |
| const DexFile::Header* const header, |
| uint32_t idx) { |
| // The `idx` has already been checked in `DexFileVerifier::CheckIntraClassDataItemMethods()`. |
| CHECK_LT(idx, header->method_ids_size_); |
| |
| const dex::MethodId* method_id = |
| reinterpret_cast<const dex::MethodId*>(begin + header->method_ids_off_) + idx; |
| |
| // Indexes in `*method_id` have already been checked in CheckIntraMethodIdItem(). |
| std::string class_name = GetClass(begin, header, method_id->class_idx_); |
| std::string method_name = GetString(begin, header, method_id->name_idx_); |
| return class_name + "." + method_name; |
| } |
| |
| } // namespace |
| |
| // Note: the anonymous namespace would be nice, but we need friend access into accessors. |
| |
| class DexFileVerifier { |
| public: |
| DexFileVerifier(const DexFile* dex_file, const char* location, bool verify_checksum) |
| : dex_file_(dex_file), |
| begin_(dex_file->Begin()), |
| size_(dex_file->Size()), |
| location_(location), |
| verify_checksum_(verify_checksum), |
| header_(&dex_file->GetHeader()), |
| ptr_(nullptr), |
| previous_item_(nullptr), |
| init_indices_{std::numeric_limits<size_t>::max(), |
| std::numeric_limits<size_t>::max(), |
| std::numeric_limits<size_t>::max(), |
| std::numeric_limits<size_t>::max()} {} |
| |
| bool Verify(); |
| |
| const std::string& FailureReason() const { |
| return failure_reason_; |
| } |
| |
| private: |
| bool CheckShortyDescriptorMatch(char shorty_char, const char* descriptor, bool is_return_type); |
| bool CheckListSize(const void* start, size_t count, size_t element_size, const char* label); |
| // Check a list. The head is assumed to be at *ptr, and elements to be of size element_size. If |
| // successful, the ptr will be moved forward the amount covered by the list. |
| bool CheckList(size_t element_size, const char* label, const uint8_t* *ptr); |
| // Checks whether the offset is zero (when size is zero) or that the offset falls within the area |
| // claimed by the file. |
| bool CheckValidOffsetAndSize(uint32_t offset, uint32_t size, size_t alignment, const char* label); |
| // Checks whether the size is less than the limit. |
| ALWAYS_INLINE bool CheckSizeLimit(uint32_t size, uint32_t limit, const char* label) { |
| if (size > limit) { |
| ErrorStringPrintf("Size(%u) should not exceed limit(%u) for %s.", size, limit, label); |
| return false; |
| } |
| return true; |
| } |
| ALWAYS_INLINE bool CheckIndex(uint32_t field, uint32_t limit, const char* label) { |
| if (UNLIKELY(field >= limit)) { |
| ErrorStringPrintf("Bad index for %s: %x >= %x", label, field, limit); |
| return false; |
| } |
| return true; |
| } |
| |
| bool CheckHeader(); |
| bool CheckMap(); |
| |
| uint32_t ReadUnsignedLittleEndian(uint32_t size) { |
| uint32_t result = 0; |
| if (LIKELY(CheckListSize(ptr_, size, sizeof(uint8_t), "encoded_value"))) { |
| for (uint32_t i = 0; i < size; i++) { |
| result |= ((uint32_t) *(ptr_++)) << (i * 8); |
| } |
| } |
| return result; |
| } |
| bool CheckAndGetHandlerOffsets(const dex::CodeItem* code_item, |
| uint32_t* handler_offsets, uint32_t handlers_size); |
| bool CheckClassDataItemField(uint32_t idx, |
| uint32_t access_flags, |
| uint32_t class_access_flags, |
| dex::TypeIndex class_type_index); |
| bool CheckClassDataItemMethod(uint32_t idx, |
| uint32_t access_flags, |
| uint32_t class_access_flags, |
| dex::TypeIndex class_type_index, |
| uint32_t code_offset, |
| bool expect_direct); |
| ALWAYS_INLINE |
| bool CheckOrder(const char* type_descr, uint32_t curr_index, uint32_t prev_index) { |
| if (UNLIKELY(curr_index < prev_index)) { |
| ErrorStringPrintf("out-of-order %s indexes %" PRIu32 " and %" PRIu32, |
| type_descr, |
| prev_index, |
| curr_index); |
| return false; |
| } |
| return true; |
| } |
| bool CheckStaticFieldTypes(const dex::ClassDef& class_def); |
| |
| bool CheckPadding(size_t offset, uint32_t aligned_offset, DexFile::MapItemType type); |
| bool CheckEncodedValue(); |
| bool CheckEncodedArray(); |
| bool CheckEncodedAnnotation(); |
| |
| bool CheckIntraTypeIdItem(); |
| bool CheckIntraProtoIdItem(); |
| bool CheckIntraFieldIdItem(); |
| bool CheckIntraMethodIdItem(); |
| bool CheckIntraClassDefItem(uint32_t class_def_index); |
| bool CheckIntraMethodHandleItem(); |
| bool CheckIntraTypeList(); |
| // Check all fields of the given type, reading `encoded_field` entries from `ptr_`. |
| template <bool kStatic> |
| bool CheckIntraClassDataItemFields(size_t count); |
| // Check direct or virtual methods, reading `encoded_method` entries from `ptr_`. |
| // Check virtual methods against duplicates with direct methods. |
| bool CheckIntraClassDataItemMethods(size_t num_methods, |
| ClassAccessor::Method* direct_methods, |
| size_t num_direct_methods); |
| bool CheckIntraClassDataItem(); |
| |
| bool CheckIntraCodeItem(); |
| bool CheckIntraStringDataItem(); |
| bool CheckIntraDebugInfoItem(); |
| bool CheckIntraAnnotationItem(); |
| bool CheckIntraAnnotationsDirectoryItem(); |
| bool CheckIntraHiddenapiClassData(); |
| |
| template <DexFile::MapItemType kType> |
| bool CheckIntraSectionIterate(size_t offset, uint32_t count); |
| template <DexFile::MapItemType kType> |
| bool CheckIntraIdSection(size_t offset, uint32_t count); |
| template <DexFile::MapItemType kType> |
| bool CheckIntraDataSection(size_t offset, uint32_t count); |
| bool CheckIntraSection(); |
| |
| bool CheckOffsetToTypeMap(size_t offset, uint16_t type); |
| |
| // Returns kDexNoIndex if there are no fields/methods, otherwise a 16-bit type index. |
| uint32_t FindFirstClassDataDefiner(const ClassAccessor& accessor); |
| uint32_t FindFirstAnnotationsDirectoryDefiner(const uint8_t* ptr); |
| |
| bool CheckInterStringIdItem(); |
| bool CheckInterTypeIdItem(); |
| bool CheckInterProtoIdItem(); |
| bool CheckInterFieldIdItem(); |
| bool CheckInterMethodIdItem(); |
| bool CheckInterClassDefItem(); |
| bool CheckInterCallSiteIdItem(); |
| bool CheckInterAnnotationSetRefList(); |
| bool CheckInterAnnotationSetItem(); |
| bool CheckInterClassDataItem(); |
| bool CheckInterAnnotationsDirectoryItem(); |
| |
| bool CheckInterSectionIterate(size_t offset, uint32_t count, DexFile::MapItemType type); |
| bool CheckInterSection(); |
| |
| void ErrorStringPrintf(const char* fmt, ...) |
| __attribute__((__format__(__printf__, 2, 3))) COLD_ATTR { |
| va_list ap; |
| va_start(ap, fmt); |
| DCHECK(failure_reason_.empty()) << failure_reason_; |
| failure_reason_ = StringPrintf("Failure to verify dex file '%s': ", location_); |
| StringAppendV(&failure_reason_, fmt, ap); |
| va_end(ap); |
| } |
| bool FailureReasonIsSet() const { return failure_reason_.size() != 0; } |
| |
| // Check validity of the given access flags, interpreted for a field in the context of a class |
| // with the given second access flags. |
| bool CheckFieldAccessFlags(uint32_t idx, |
| uint32_t field_access_flags, |
| uint32_t class_access_flags, |
| std::string* error_message); |
| |
| // Check validity of the given method and access flags, in the context of a class with the given |
| // second access flags. |
| bool CheckMethodAccessFlags(uint32_t method_index, |
| uint32_t method_access_flags, |
| uint32_t class_access_flags, |
| uint32_t constructor_flags_by_name, |
| bool has_code, |
| bool expect_direct, |
| std::string* error_message); |
| |
| // Check validity of given method if it's a constructor or class initializer. |
| bool CheckConstructorProperties(uint32_t method_index, uint32_t constructor_flags); |
| |
| void FindStringRangesForMethodNames(); |
| |
| template <typename ExtraCheckFn> |
| bool VerifyTypeDescriptor(dex::TypeIndex idx, const char* error_msg, ExtraCheckFn extra_check); |
| |
| const DexFile* const dex_file_; |
| const uint8_t* const begin_; |
| const size_t size_; |
| const char* const location_; |
| const bool verify_checksum_; |
| const DexFile::Header* const header_; |
| |
| struct OffsetTypeMapEmptyFn { |
| // Make a hash map slot empty by making the offset 0. Offset 0 is a valid dex file offset that |
| // is in the offset of the dex file header. However, we only store data section items in the |
| // map, and these are after the header. |
| void MakeEmpty(std::pair<uint32_t, uint16_t>& pair) const { |
| pair.first = 0u; |
| } |
| // Check if a hash map slot is empty. |
| bool IsEmpty(const std::pair<uint32_t, uint16_t>& pair) const { |
| return pair.first == 0; |
| } |
| }; |
| struct OffsetTypeMapHashCompareFn { |
| // Hash function for offset. |
| size_t operator()(const uint32_t key) const { |
| return key; |
| } |
| // std::equal function for offset. |
| bool operator()(const uint32_t a, const uint32_t b) const { |
| return a == b; |
| } |
| }; |
| // Map from offset to dex file type, HashMap for performance reasons. |
| HashMap<uint32_t, |
| uint16_t, |
| OffsetTypeMapEmptyFn, |
| OffsetTypeMapHashCompareFn, |
| OffsetTypeMapHashCompareFn> offset_to_type_map_; |
| const uint8_t* ptr_; |
| const void* previous_item_; |
| |
| std::string failure_reason_; |
| |
| // Cached string indices for "interesting" entries wrt/ method names. Will be populated by |
| // FindStringRangesForMethodNames (which is automatically called before verifying the |
| // classdataitem section). |
| // |
| // Strings starting with '<' are in the range |
| // [angle_bracket_start_index_,angle_bracket_end_index_). |
| // angle_init_angle_index_ and angle_clinit_angle_index_ denote the indices of "<init>" and |
| // "<clinit>", respectively. If any value is not found, the corresponding index will be larger |
| // than any valid string index for this dex file. |
| struct { |
| size_t angle_bracket_start_index; |
| size_t angle_bracket_end_index; |
| size_t angle_init_angle_index; |
| size_t angle_clinit_angle_index; |
| } init_indices_; |
| |
| // A bitvector for verified type descriptors. Each bit corresponds to a type index. A set |
| // bit denotes that the descriptor has been verified wrt/ IsValidDescriptor. |
| std::vector<char> verified_type_descriptors_; |
| |
| // Set of type ids for which there are ClassDef elements in the dex file. Using a bitset |
| // avoids all allocations. The bitset should be implemented as 8K of storage, which is |
| // tight enough for all callers. |
| std::bitset<kTypeIdLimit + 1> defined_classes_; |
| |
| // Class definition indexes, valid only if corresponding `defined_classes_[.]` is true. |
| std::vector<uint16_t> defined_class_indexes_; |
| }; |
| |
| template <typename ExtraCheckFn> |
| bool DexFileVerifier::VerifyTypeDescriptor(dex::TypeIndex idx, |
| const char* error_msg, |
| ExtraCheckFn extra_check) { |
| // All sources of the `idx` have already been checked in CheckIntraSection(). |
| DCHECK_LT(idx.index_, header_->type_ids_size_); |
| |
| char cached_char = verified_type_descriptors_[idx.index_]; |
| if (cached_char != 0) { |
| if (!extra_check(cached_char)) { |
| const char* descriptor = dex_file_->StringByTypeIdx(idx); |
| ErrorStringPrintf("%s: '%s'", error_msg, descriptor); |
| return false; |
| } |
| return true; |
| } |
| |
| const char* descriptor = dex_file_->StringByTypeIdx(idx); |
| if (UNLIKELY(!IsValidDescriptor(descriptor))) { |
| ErrorStringPrintf("%s: '%s'", error_msg, descriptor); |
| return false; |
| } |
| verified_type_descriptors_[idx.index_] = descriptor[0]; |
| |
| if (!extra_check(descriptor[0])) { |
| ErrorStringPrintf("%s: '%s'", error_msg, descriptor); |
| return false; |
| } |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckShortyDescriptorMatch(char shorty_char, const char* descriptor, |
| bool is_return_type) { |
| switch (shorty_char) { |
| case 'V': |
| if (UNLIKELY(!is_return_type)) { |
| ErrorStringPrintf("Invalid use of void"); |
| return false; |
| } |
| FALLTHROUGH_INTENDED; |
| case 'B': |
| case 'C': |
| case 'D': |
| case 'F': |
| case 'I': |
| case 'J': |
| case 'S': |
| case 'Z': |
| if (UNLIKELY((descriptor[0] != shorty_char) || (descriptor[1] != '\0'))) { |
| ErrorStringPrintf("Shorty vs. primitive type mismatch: '%c', '%s'", |
| shorty_char, descriptor); |
| return false; |
| } |
| break; |
| case 'L': |
| if (UNLIKELY((descriptor[0] != 'L') && (descriptor[0] != '['))) { |
| ErrorStringPrintf("Shorty vs. type mismatch: '%c', '%s'", shorty_char, descriptor); |
| return false; |
| } |
| break; |
| default: |
| ErrorStringPrintf("Bad shorty character: '%c'", shorty_char); |
| return false; |
| } |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckListSize(const void* start, size_t count, size_t elem_size, |
| const char* label) { |
| // Check that element size is not 0. |
| DCHECK_NE(elem_size, 0U); |
| |
| size_t offset = reinterpret_cast<const uint8_t*>(start) - begin_; |
| if (UNLIKELY(offset > size_)) { |
| ErrorStringPrintf("Offset beyond end of file for %s: %zx to %zx", label, offset, size_); |
| return false; |
| } |
| |
| // Calculate the number of elements that fit until the end of file, |
| // rather than calculating the end of the range as that could overflow. |
| size_t max_elements = (size_ - offset) / elem_size; |
| if (UNLIKELY(max_elements < count)) { |
| ErrorStringPrintf( |
| "List too large for %s: %zx+%zu*%zu > %zx", label, offset, count, elem_size, size_); |
| return false; |
| } |
| |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckList(size_t element_size, const char* label, const uint8_t* *ptr) { |
| // Check that the list is available. The first 4B are the count. |
| if (!CheckListSize(*ptr, 1, 4U, label)) { |
| return false; |
| } |
| |
| uint32_t count = *reinterpret_cast<const uint32_t*>(*ptr); |
| if (count > 0) { |
| if (!CheckListSize(*ptr + 4, count, element_size, label)) { |
| return false; |
| } |
| } |
| |
| *ptr += 4 + count * element_size; |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckValidOffsetAndSize(uint32_t offset, |
| uint32_t size, |
| size_t alignment, |
| const char* label) { |
| if (size == 0) { |
| if (offset != 0) { |
| ErrorStringPrintf("Offset(%d) should be zero when size is zero for %s.", offset, label); |
| return false; |
| } |
| } |
| if (size_ <= offset) { |
| ErrorStringPrintf("Offset(%d) should be within file size(%zu) for %s.", offset, size_, label); |
| return false; |
| } |
| if (alignment != 0 && !IsAlignedParam(offset, alignment)) { |
| ErrorStringPrintf("Offset(%d) should be aligned by %zu for %s.", offset, alignment, label); |
| return false; |
| } |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckHeader() { |
| // Check file size from the header. |
| uint32_t expected_size = header_->file_size_; |
| if (size_ != expected_size) { |
| ErrorStringPrintf("Bad file size (%zd, expected %u)", size_, expected_size); |
| return false; |
| } |
| |
| uint32_t adler_checksum = dex_file_->CalculateChecksum(); |
| // Compute and verify the checksum in the header. |
| if (adler_checksum != header_->checksum_) { |
| if (verify_checksum_) { |
| ErrorStringPrintf("Bad checksum (%08x, expected %08x)", adler_checksum, header_->checksum_); |
| return false; |
| } else { |
| LOG(WARNING) << StringPrintf( |
| "Ignoring bad checksum (%08x, expected %08x)", adler_checksum, header_->checksum_); |
| } |
| } |
| |
| // Check the contents of the header. |
| if (header_->endian_tag_ != DexFile::kDexEndianConstant) { |
| ErrorStringPrintf("Unexpected endian_tag: %x", header_->endian_tag_); |
| return false; |
| } |
| |
| const uint32_t expected_header_size = dex_file_->IsCompactDexFile() |
| ? sizeof(CompactDexFile::Header) |
| : sizeof(StandardDexFile::Header); |
| |
| if (header_->header_size_ != expected_header_size) { |
| ErrorStringPrintf("Bad header size: %ud expected %ud", |
| header_->header_size_, |
| expected_header_size); |
| return false; |
| } |
| |
| // Check that all offsets are inside the file. |
| bool result = |
| CheckValidOffsetAndSize(header_->link_off_, |
| header_->link_size_, |
| /* alignment= */ 0, |
| "link") && |
| CheckValidOffsetAndSize(header_->map_off_, |
| header_->map_off_, |
| /* alignment= */ 4, |
| "map") && |
| CheckValidOffsetAndSize(header_->string_ids_off_, |
| header_->string_ids_size_, |
| /* alignment= */ 4, |
| "string-ids") && |
| CheckValidOffsetAndSize(header_->type_ids_off_, |
| header_->type_ids_size_, |
| /* alignment= */ 4, |
| "type-ids") && |
| CheckSizeLimit(header_->type_ids_size_, DexFile::kDexNoIndex16, "type-ids") && |
| CheckValidOffsetAndSize(header_->proto_ids_off_, |
| header_->proto_ids_size_, |
| /* alignment= */ 4, |
| "proto-ids") && |
| CheckSizeLimit(header_->proto_ids_size_, DexFile::kDexNoIndex16, "proto-ids") && |
| CheckValidOffsetAndSize(header_->field_ids_off_, |
| header_->field_ids_size_, |
| /* alignment= */ 4, |
| "field-ids") && |
| CheckValidOffsetAndSize(header_->method_ids_off_, |
| header_->method_ids_size_, |
| /* alignment= */ 4, |
| "method-ids") && |
| CheckValidOffsetAndSize(header_->class_defs_off_, |
| header_->class_defs_size_, |
| /* alignment= */ 4, |
| "class-defs") && |
| CheckValidOffsetAndSize(header_->data_off_, |
| header_->data_size_, |
| // Unaligned, spec doesn't talk about it, even though size |
| // is supposed to be a multiple of 4. |
| /* alignment= */ 0, |
| "data"); |
| return result; |
| } |
| |
| bool DexFileVerifier::CheckMap() { |
| const dex::MapList* map = reinterpret_cast<const dex::MapList*>(begin_ + header_->map_off_); |
| // Check that map list content is available. |
| if (!CheckListSize(map, 1, sizeof(dex::MapList), "maplist content")) { |
| return false; |
| } |
| |
| const dex::MapItem* item = map->list_; |
| |
| uint32_t count = map->size_; |
| uint32_t last_offset = 0; |
| uint32_t last_type = 0; |
| uint32_t data_item_count = 0; |
| uint32_t data_items_left = header_->data_size_; |
| uint32_t used_bits = 0; |
| |
| // Check the validity of the size of the map list. |
| if (!CheckListSize(item, count, sizeof(dex::MapItem), "map size")) { |
| return false; |
| } |
| |
| // Check the items listed in the map. |
| for (uint32_t i = 0; i < count; i++) { |
| if (UNLIKELY(last_offset >= item->offset_ && i != 0)) { |
| ErrorStringPrintf("Out of order map item: %x then %x for type %x last type was %x", |
| last_offset, |
| item->offset_, |
| static_cast<uint32_t>(item->type_), |
| last_type); |
| return false; |
| } |
| if (UNLIKELY(item->offset_ >= header_->file_size_)) { |
| ErrorStringPrintf("Map item after end of file: %x, size %x", |
| item->offset_, header_->file_size_); |
| return false; |
| } |
| |
| DexFile::MapItemType item_type = static_cast<DexFile::MapItemType>(item->type_); |
| if (IsDataSectionType(item_type)) { |
| uint32_t icount = item->size_; |
| if (UNLIKELY(icount > data_items_left)) { |
| ErrorStringPrintf("Too many items in data section: %ud item_type %zx", |
| data_item_count + icount, |
| static_cast<size_t>(item_type)); |
| return false; |
| } |
| data_items_left -= icount; |
| data_item_count += icount; |
| } |
| |
| uint32_t bit = MapTypeToBitMask(item_type); |
| |
| if (UNLIKELY(bit == 0)) { |
| ErrorStringPrintf("Unknown map section type %x", item->type_); |
| return false; |
| } |
| |
| if (UNLIKELY((used_bits & bit) != 0)) { |
| ErrorStringPrintf("Duplicate map section of type %x", item->type_); |
| return false; |
| } |
| |
| used_bits |= bit; |
| last_offset = item->offset_; |
| last_type = item->type_; |
| item++; |
| } |
| |
| // Check for missing sections in the map. |
| if (UNLIKELY((used_bits & MapTypeToBitMask(DexFile::kDexTypeHeaderItem)) == 0)) { |
| ErrorStringPrintf("Map is missing header entry"); |
| return false; |
| } |
| if (UNLIKELY((used_bits & MapTypeToBitMask(DexFile::kDexTypeMapList)) == 0)) { |
| ErrorStringPrintf("Map is missing map_list entry"); |
| return false; |
| } |
| if (UNLIKELY((used_bits & MapTypeToBitMask(DexFile::kDexTypeStringIdItem)) == 0 && |
| ((header_->string_ids_off_ != 0) || (header_->string_ids_size_ != 0)))) { |
| ErrorStringPrintf("Map is missing string_ids entry"); |
| return false; |
| } |
| if (UNLIKELY((used_bits & MapTypeToBitMask(DexFile::kDexTypeTypeIdItem)) == 0 && |
| ((header_->type_ids_off_ != 0) || (header_->type_ids_size_ != 0)))) { |
| ErrorStringPrintf("Map is missing type_ids entry"); |
| return false; |
| } |
| if (UNLIKELY((used_bits & MapTypeToBitMask(DexFile::kDexTypeProtoIdItem)) == 0 && |
| ((header_->proto_ids_off_ != 0) || (header_->proto_ids_size_ != 0)))) { |
| ErrorStringPrintf("Map is missing proto_ids entry"); |
| return false; |
| } |
| if (UNLIKELY((used_bits & MapTypeToBitMask(DexFile::kDexTypeFieldIdItem)) == 0 && |
| ((header_->field_ids_off_ != 0) || (header_->field_ids_size_ != 0)))) { |
| ErrorStringPrintf("Map is missing field_ids entry"); |
| return false; |
| } |
| if (UNLIKELY((used_bits & MapTypeToBitMask(DexFile::kDexTypeMethodIdItem)) == 0 && |
| ((header_->method_ids_off_ != 0) || (header_->method_ids_size_ != 0)))) { |
| ErrorStringPrintf("Map is missing method_ids entry"); |
| return false; |
| } |
| if (UNLIKELY((used_bits & MapTypeToBitMask(DexFile::kDexTypeClassDefItem)) == 0 && |
| ((header_->class_defs_off_ != 0) || (header_->class_defs_size_ != 0)))) { |
| ErrorStringPrintf("Map is missing class_defs entry"); |
| return false; |
| } |
| return true; |
| } |
| |
| #define DECODE_UNSIGNED_CHECKED_FROM_WITH_ERROR_VALUE(ptr, var, error_value) \ |
| uint32_t var; \ |
| if (!DecodeUnsignedLeb128Checked(&(ptr), begin_ + size_, &(var))) { \ |
| return error_value; \ |
| } |
| |
| #define DECODE_UNSIGNED_CHECKED_FROM(ptr, var) \ |
| uint32_t var; \ |
| if (!DecodeUnsignedLeb128Checked(&(ptr), begin_ + size_, &(var))) { \ |
| ErrorStringPrintf("Read out of bounds"); \ |
| return false; \ |
| } |
| |
| #define DECODE_SIGNED_CHECKED_FROM(ptr, var) \ |
| int32_t var; \ |
| if (!DecodeSignedLeb128Checked(&(ptr), begin_ + size_, &(var))) { \ |
| ErrorStringPrintf("Read out of bounds"); \ |
| return false; \ |
| } |
| |
| bool DexFileVerifier::CheckAndGetHandlerOffsets(const dex::CodeItem* code_item, |
| uint32_t* handler_offsets, |
| uint32_t handlers_size) { |
| CodeItemDataAccessor accessor(*dex_file_, code_item); |
| const uint8_t* handlers_base = accessor.GetCatchHandlerData(); |
| |
| for (uint32_t i = 0; i < handlers_size; i++) { |
| bool catch_all; |
| size_t offset = ptr_ - handlers_base; |
| DECODE_SIGNED_CHECKED_FROM(ptr_, size); |
| |
| if (UNLIKELY((size < -65536) || (size > 65536))) { |
| ErrorStringPrintf("Invalid exception handler size: %d", size); |
| return false; |
| } |
| |
| if (size <= 0) { |
| catch_all = true; |
| size = -size; |
| } else { |
| catch_all = false; |
| } |
| |
| handler_offsets[i] = static_cast<uint32_t>(offset); |
| |
| while (size-- > 0) { |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, type_idx); |
| if (!CheckIndex(type_idx, header_->type_ids_size_, "handler type_idx")) { |
| return false; |
| } |
| |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, addr); |
| if (UNLIKELY(addr >= accessor.InsnsSizeInCodeUnits())) { |
| ErrorStringPrintf("Invalid handler addr: %x", addr); |
| return false; |
| } |
| } |
| |
| if (catch_all) { |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, addr); |
| if (UNLIKELY(addr >= accessor.InsnsSizeInCodeUnits())) { |
| ErrorStringPrintf("Invalid handler catch_all_addr: %x", addr); |
| return false; |
| } |
| } |
| } |
| |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckClassDataItemField(uint32_t idx, |
| uint32_t access_flags, |
| uint32_t class_access_flags, |
| dex::TypeIndex class_type_index) { |
| // The `idx` has already been checked in `CheckIntraClassDataItemFields()`. |
| DCHECK_LE(idx, header_->field_ids_size_); |
| |
| // Check that it's the right class. |
| dex::TypeIndex my_class_index = |
| (reinterpret_cast<const dex::FieldId*>(begin_ + header_->field_ids_off_) + idx)->class_idx_; |
| if (class_type_index != my_class_index) { |
| ErrorStringPrintf("Field's class index unexpected, %" PRIu16 "vs %" PRIu16, |
| my_class_index.index_, |
| class_type_index.index_); |
| return false; |
| } |
| |
| // Check field access flags. |
| std::string error_msg; |
| if (!CheckFieldAccessFlags(idx, access_flags, class_access_flags, &error_msg)) { |
| ErrorStringPrintf("%s", error_msg.c_str()); |
| return false; |
| } |
| |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckClassDataItemMethod(uint32_t idx, |
| uint32_t access_flags, |
| uint32_t class_access_flags, |
| dex::TypeIndex class_type_index, |
| uint32_t code_offset, |
| bool expect_direct) { |
| // The `idx` has already been checked in `CheckIntraClassDataItemMethods()`. |
| DCHECK_LT(idx, header_->method_ids_size_); |
| |
| const dex::MethodId& method_id = |
| *(reinterpret_cast<const dex::MethodId*>(begin_ + header_->method_ids_off_) + idx); |
| |
| // Check that it's the right class. |
| dex::TypeIndex my_class_index = method_id.class_idx_; |
| if (class_type_index != my_class_index) { |
| ErrorStringPrintf("Method's class index unexpected, %" PRIu16 " vs %" PRIu16, |
| my_class_index.index_, |
| class_type_index.index_); |
| return false; |
| } |
| |
| std::string error_msg; |
| uint32_t constructor_flags_by_name = 0; |
| { |
| uint32_t string_idx = method_id.name_idx_.index_; |
| if (!CheckIndex(string_idx, header_->string_ids_size_, "method flags verification")) { |
| return false; |
| } |
| if (UNLIKELY(string_idx < init_indices_.angle_bracket_end_index) && |
| string_idx >= init_indices_.angle_bracket_start_index) { |
| if (string_idx == init_indices_.angle_clinit_angle_index) { |
| constructor_flags_by_name = kAccStatic | kAccConstructor; |
| } else if (string_idx == init_indices_.angle_init_angle_index) { |
| constructor_flags_by_name = kAccConstructor; |
| } else { |
| ErrorStringPrintf("Bad method name for method index %u", idx); |
| return false; |
| } |
| } |
| } |
| |
| bool has_code = (code_offset != 0); |
| if (!CheckMethodAccessFlags(idx, |
| access_flags, |
| class_access_flags, |
| constructor_flags_by_name, |
| has_code, |
| expect_direct, |
| &error_msg)) { |
| ErrorStringPrintf("%s", error_msg.c_str()); |
| return false; |
| } |
| |
| if (constructor_flags_by_name != 0) { |
| if (!CheckConstructorProperties(idx, constructor_flags_by_name)) { |
| DCHECK(FailureReasonIsSet()); |
| return false; |
| } |
| } |
| |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckPadding(size_t offset, |
| uint32_t aligned_offset, |
| DexFile::MapItemType type) { |
| if (offset < aligned_offset) { |
| if (!CheckListSize(begin_ + offset, aligned_offset - offset, sizeof(uint8_t), "section")) { |
| return false; |
| } |
| while (offset < aligned_offset) { |
| if (UNLIKELY(*ptr_ != '\0')) { |
| ErrorStringPrintf("Non-zero padding %x before section of type %zu at offset 0x%zx", |
| *ptr_, |
| static_cast<size_t>(type), |
| offset); |
| return false; |
| } |
| ptr_++; |
| offset++; |
| } |
| } |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckEncodedValue() { |
| if (!CheckListSize(ptr_, 1, sizeof(uint8_t), "encoded_value header")) { |
| return false; |
| } |
| |
| uint8_t header_byte = *(ptr_++); |
| uint32_t value_type = header_byte & DexFile::kDexAnnotationValueTypeMask; |
| uint32_t value_arg = header_byte >> DexFile::kDexAnnotationValueArgShift; |
| |
| switch (value_type) { |
| case DexFile::kDexAnnotationByte: |
| if (UNLIKELY(value_arg != 0)) { |
| ErrorStringPrintf("Bad encoded_value byte size %x", value_arg); |
| return false; |
| } |
| ptr_++; |
| break; |
| case DexFile::kDexAnnotationShort: |
| case DexFile::kDexAnnotationChar: |
| if (UNLIKELY(value_arg > 1)) { |
| ErrorStringPrintf("Bad encoded_value char/short size %x", value_arg); |
| return false; |
| } |
| ptr_ += value_arg + 1; |
| break; |
| case DexFile::kDexAnnotationInt: |
| case DexFile::kDexAnnotationFloat: |
| if (UNLIKELY(value_arg > 3)) { |
| ErrorStringPrintf("Bad encoded_value int/float size %x", value_arg); |
| return false; |
| } |
| ptr_ += value_arg + 1; |
| break; |
| case DexFile::kDexAnnotationLong: |
| case DexFile::kDexAnnotationDouble: |
| ptr_ += value_arg + 1; |
| break; |
| case DexFile::kDexAnnotationString: { |
| if (UNLIKELY(value_arg > 3)) { |
| ErrorStringPrintf("Bad encoded_value string size %x", value_arg); |
| return false; |
| } |
| uint32_t idx = ReadUnsignedLittleEndian(value_arg + 1); |
| if (!CheckIndex(idx, header_->string_ids_size_, "encoded_value string")) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexAnnotationType: { |
| if (UNLIKELY(value_arg > 3)) { |
| ErrorStringPrintf("Bad encoded_value type size %x", value_arg); |
| return false; |
| } |
| uint32_t idx = ReadUnsignedLittleEndian(value_arg + 1); |
| if (!CheckIndex(idx, header_->type_ids_size_, "encoded_value type")) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexAnnotationField: |
| case DexFile::kDexAnnotationEnum: { |
| if (UNLIKELY(value_arg > 3)) { |
| ErrorStringPrintf("Bad encoded_value field/enum size %x", value_arg); |
| return false; |
| } |
| uint32_t idx = ReadUnsignedLittleEndian(value_arg + 1); |
| if (!CheckIndex(idx, header_->field_ids_size_, "encoded_value field")) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexAnnotationMethod: { |
| if (UNLIKELY(value_arg > 3)) { |
| ErrorStringPrintf("Bad encoded_value method size %x", value_arg); |
| return false; |
| } |
| uint32_t idx = ReadUnsignedLittleEndian(value_arg + 1); |
| if (!CheckIndex(idx, header_->method_ids_size_, "encoded_value method")) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexAnnotationArray: |
| if (UNLIKELY(value_arg != 0)) { |
| ErrorStringPrintf("Bad encoded_value array value_arg %x", value_arg); |
| return false; |
| } |
| if (!CheckEncodedArray()) { |
| return false; |
| } |
| break; |
| case DexFile::kDexAnnotationAnnotation: |
| if (UNLIKELY(value_arg != 0)) { |
| ErrorStringPrintf("Bad encoded_value annotation value_arg %x", value_arg); |
| return false; |
| } |
| if (!CheckEncodedAnnotation()) { |
| return false; |
| } |
| break; |
| case DexFile::kDexAnnotationNull: |
| if (UNLIKELY(value_arg != 0)) { |
| ErrorStringPrintf("Bad encoded_value null value_arg %x", value_arg); |
| return false; |
| } |
| break; |
| case DexFile::kDexAnnotationBoolean: |
| if (UNLIKELY(value_arg > 1)) { |
| ErrorStringPrintf("Bad encoded_value boolean size %x", value_arg); |
| return false; |
| } |
| break; |
| case DexFile::kDexAnnotationMethodType: { |
| if (UNLIKELY(value_arg > 3)) { |
| ErrorStringPrintf("Bad encoded_value method type size %x", value_arg); |
| return false; |
| } |
| uint32_t idx = ReadUnsignedLittleEndian(value_arg + 1); |
| if (!CheckIndex(idx, header_->proto_ids_size_, "method_type value")) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexAnnotationMethodHandle: { |
| if (UNLIKELY(value_arg > 3)) { |
| ErrorStringPrintf("Bad encoded_value method handle size %x", value_arg); |
| return false; |
| } |
| uint32_t idx = ReadUnsignedLittleEndian(value_arg + 1); |
| if (!CheckIndex(idx, dex_file_->NumMethodHandles(), "method_handle value")) { |
| return false; |
| } |
| break; |
| } |
| default: |
| ErrorStringPrintf("Bogus encoded_value value_type %x", value_type); |
| return false; |
| } |
| |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckEncodedArray() { |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, size); |
| |
| for (; size != 0u; --size) { |
| if (!CheckEncodedValue()) { |
| failure_reason_ = StringPrintf("Bad encoded_array value: %s", failure_reason_.c_str()); |
| return false; |
| } |
| } |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckEncodedAnnotation() { |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, anno_idx); |
| if (!CheckIndex(anno_idx, header_->type_ids_size_, "encoded_annotation type_idx")) { |
| return false; |
| } |
| |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, size); |
| uint32_t last_idx = 0; |
| |
| for (uint32_t i = 0; i < size; i++) { |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, idx); |
| if (!CheckIndex(idx, header_->string_ids_size_, "annotation_element name_idx")) { |
| return false; |
| } |
| |
| if (UNLIKELY(last_idx >= idx && i != 0)) { |
| ErrorStringPrintf("Out-of-order annotation_element name_idx: %x then %x", |
| last_idx, idx); |
| return false; |
| } |
| |
| if (!CheckEncodedValue()) { |
| return false; |
| } |
| |
| last_idx = idx; |
| } |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckStaticFieldTypes(const dex::ClassDef& class_def) { |
| ClassAccessor accessor(*dex_file_, ptr_); |
| EncodedStaticFieldValueIterator array_it(*dex_file_, class_def); |
| |
| for (const ClassAccessor::Field& field : accessor.GetStaticFields()) { |
| if (!array_it.HasNext()) { |
| break; |
| } |
| uint32_t index = field.GetIndex(); |
| // The `index` has already been checked in `CheckIntraClassDataItemFields()`. |
| DCHECK_LT(index, header_->field_ids_size_); |
| const dex::TypeId& type_id = dex_file_->GetTypeId(dex_file_->GetFieldId(index).type_idx_); |
| const char* field_type_name = |
| dex_file_->GetStringData(dex_file_->GetStringId(type_id.descriptor_idx_)); |
| Primitive::Type field_type = Primitive::GetType(field_type_name[0]); |
| EncodedArrayValueIterator::ValueType array_type = array_it.GetValueType(); |
| // Ensure this matches RuntimeEncodedStaticFieldValueIterator. |
| switch (array_type) { |
| case EncodedArrayValueIterator::ValueType::kBoolean: |
| if (field_type != Primitive::kPrimBoolean) { |
| ErrorStringPrintf("unexpected static field initial value type: 'Z' vs '%c'", |
| field_type_name[0]); |
| return false; |
| } |
| break; |
| case EncodedArrayValueIterator::ValueType::kByte: |
| if (field_type != Primitive::kPrimByte) { |
| ErrorStringPrintf("unexpected static field initial value type: 'B' vs '%c'", |
| field_type_name[0]); |
| return false; |
| } |
| break; |
| case EncodedArrayValueIterator::ValueType::kShort: |
| if (field_type != Primitive::kPrimShort) { |
| ErrorStringPrintf("unexpected static field initial value type: 'S' vs '%c'", |
| field_type_name[0]); |
| return false; |
| } |
| break; |
| case EncodedArrayValueIterator::ValueType::kChar: |
| if (field_type != Primitive::kPrimChar) { |
| ErrorStringPrintf("unexpected static field initial value type: 'C' vs '%c'", |
| field_type_name[0]); |
| return false; |
| } |
| break; |
| case EncodedArrayValueIterator::ValueType::kInt: |
| if (field_type != Primitive::kPrimInt) { |
| ErrorStringPrintf("unexpected static field initial value type: 'I' vs '%c'", |
| field_type_name[0]); |
| return false; |
| } |
| break; |
| case EncodedArrayValueIterator::ValueType::kLong: |
| if (field_type != Primitive::kPrimLong) { |
| ErrorStringPrintf("unexpected static field initial value type: 'J' vs '%c'", |
| field_type_name[0]); |
| return false; |
| } |
| break; |
| case EncodedArrayValueIterator::ValueType::kFloat: |
| if (field_type != Primitive::kPrimFloat) { |
| ErrorStringPrintf("unexpected static field initial value type: 'F' vs '%c'", |
| field_type_name[0]); |
| return false; |
| } |
| break; |
| case EncodedArrayValueIterator::ValueType::kDouble: |
| if (field_type != Primitive::kPrimDouble) { |
| ErrorStringPrintf("unexpected static field initial value type: 'D' vs '%c'", |
| field_type_name[0]); |
| return false; |
| } |
| break; |
| case EncodedArrayValueIterator::ValueType::kNull: |
| case EncodedArrayValueIterator::ValueType::kString: |
| case EncodedArrayValueIterator::ValueType::kType: |
| if (field_type != Primitive::kPrimNot) { |
| ErrorStringPrintf("unexpected static field initial value type: 'L' vs '%c'", |
| field_type_name[0]); |
| return false; |
| } |
| break; |
| default: |
| ErrorStringPrintf("unexpected static field initial value type: %x", array_type); |
| return false; |
| } |
| array_it.Next(); |
| } |
| |
| if (array_it.HasNext()) { |
| ErrorStringPrintf("too many static field initial values"); |
| return false; |
| } |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckIntraTypeIdItem() { |
| if (!CheckListSize(ptr_, 1, sizeof(dex::TypeId), "type_ids")) { |
| return false; |
| } |
| |
| const dex::TypeId* type_id = reinterpret_cast<const dex::TypeId*>(ptr_); |
| if (!CheckIndex(type_id->descriptor_idx_.index_, |
| header_->string_ids_size_, |
| "type_id.descriptor")) { |
| return false; |
| } |
| |
| ptr_ += sizeof(dex::TypeId); |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckIntraProtoIdItem() { |
| if (!CheckListSize(ptr_, 1, sizeof(dex::ProtoId), "proto_ids")) { |
| return false; |
| } |
| |
| const dex::ProtoId* proto_id = reinterpret_cast<const dex::ProtoId*>(ptr_); |
| if (!CheckIndex(proto_id->shorty_idx_.index_, header_->string_ids_size_, "proto_id.shorty") || |
| !CheckIndex(proto_id->return_type_idx_.index_, |
| header_->type_ids_size_, |
| "proto_id.return_type")) { |
| return false; |
| } |
| |
| ptr_ += sizeof(dex::ProtoId); |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckIntraFieldIdItem() { |
| if (!CheckListSize(ptr_, 1, sizeof(dex::FieldId), "field_ids")) { |
| return false; |
| } |
| |
| const dex::FieldId* field_id = reinterpret_cast<const dex::FieldId*>(ptr_); |
| if (!CheckIndex(field_id->class_idx_.index_, header_->type_ids_size_, "field_id.class") || |
| !CheckIndex(field_id->type_idx_.index_, header_->type_ids_size_, "field_id.type") || |
| !CheckIndex(field_id->name_idx_.index_, header_->string_ids_size_, "field_id.name")) { |
| return false; |
| } |
| |
| ptr_ += sizeof(dex::FieldId); |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckIntraMethodIdItem() { |
| if (!CheckListSize(ptr_, 1, sizeof(dex::MethodId), "method_ids")) { |
| return false; |
| } |
| |
| const dex::MethodId* method_id = reinterpret_cast<const dex::MethodId*>(ptr_); |
| if (!CheckIndex(method_id->class_idx_.index_, header_->type_ids_size_, "method_id.class") || |
| !CheckIndex(method_id->proto_idx_.index_, header_->proto_ids_size_, "method_id.proto") || |
| !CheckIndex(method_id->name_idx_.index_, header_->string_ids_size_, "method_id.name")) { |
| return false; |
| } |
| |
| ptr_ += sizeof(dex::MethodId); |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckIntraClassDefItem(uint32_t class_def_index) { |
| if (!CheckListSize(ptr_, 1, sizeof(dex::ClassDef), "class_defs")) { |
| return false; |
| } |
| |
| const dex::ClassDef* class_def = reinterpret_cast<const dex::ClassDef*>(ptr_); |
| if (!CheckIndex(class_def->class_idx_.index_, header_->type_ids_size_, "class_def.class")) { |
| return false; |
| } |
| |
| // Check superclass, if any. |
| if (UNLIKELY(class_def->pad2_ != 0u)) { |
| uint32_t combined = |
| (static_cast<uint32_t>(class_def->pad2_) << 16) + class_def->superclass_idx_.index_; |
| if (combined != 0xffffffffu) { |
| ErrorStringPrintf("Invalid superclass type padding/index: %x", combined); |
| return false; |
| } |
| } else if (!CheckIndex(class_def->superclass_idx_.index_, |
| header_->type_ids_size_, |
| "class_def.superclass")) { |
| return false; |
| } |
| |
| DCHECK_LE(class_def->class_idx_.index_, kTypeIdLimit); |
| DCHECK_LT(kTypeIdLimit, defined_classes_.size()); |
| if (defined_classes_[class_def->class_idx_.index_]) { |
| ErrorStringPrintf("Redefinition of class with type idx: '%u'", class_def->class_idx_.index_); |
| return false; |
| } |
| defined_classes_[class_def->class_idx_.index_] = true; |
| DCHECK_LE(class_def->class_idx_.index_, defined_class_indexes_.size()); |
| defined_class_indexes_[class_def->class_idx_.index_] = class_def_index; |
| |
| ptr_ += sizeof(dex::ClassDef); |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckIntraMethodHandleItem() { |
| if (!CheckListSize(ptr_, 1, sizeof(dex::MethodHandleItem), "method_handles")) { |
| return false; |
| } |
| |
| const dex::MethodHandleItem* item = reinterpret_cast<const dex::MethodHandleItem*>(ptr_); |
| |
| DexFile::MethodHandleType method_handle_type = |
| static_cast<DexFile::MethodHandleType>(item->method_handle_type_); |
| if (method_handle_type > DexFile::MethodHandleType::kLast) { |
| ErrorStringPrintf("Bad method handle type %x", item->method_handle_type_); |
| return false; |
| } |
| |
| uint32_t index = item->field_or_method_idx_; |
| switch (method_handle_type) { |
| case DexFile::MethodHandleType::kStaticPut: |
| case DexFile::MethodHandleType::kStaticGet: |
| case DexFile::MethodHandleType::kInstancePut: |
| case DexFile::MethodHandleType::kInstanceGet: |
| if (!CheckIndex(index, header_->field_ids_size_, "method_handle_item field_idx")) { |
| return false; |
| } |
| break; |
| case DexFile::MethodHandleType::kInvokeStatic: |
| case DexFile::MethodHandleType::kInvokeInstance: |
| case DexFile::MethodHandleType::kInvokeConstructor: |
| case DexFile::MethodHandleType::kInvokeDirect: |
| case DexFile::MethodHandleType::kInvokeInterface: { |
| if (!CheckIndex(index, header_->method_ids_size_, "method_handle_item method_idx")) { |
| return false; |
| } |
| break; |
| } |
| } |
| |
| ptr_ += sizeof(dex::MethodHandleItem); |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckIntraTypeList() { |
| const dex::TypeList* type_list = reinterpret_cast<const dex::TypeList*>(ptr_); |
| if (!CheckList(sizeof(dex::TypeItem), "type_list", &ptr_)) { |
| return false; |
| } |
| |
| for (uint32_t i = 0, size = type_list->Size(); i != size; ++i) { |
| if (!CheckIndex(type_list->GetTypeItem(i).type_idx_.index_, |
| header_->type_ids_size_, |
| "type_list.type")) { |
| return false; |
| } |
| } |
| |
| return true; |
| } |
| |
| template <bool kStatic> |
| bool DexFileVerifier::CheckIntraClassDataItemFields(size_t count) { |
| constexpr const char* kTypeDescr = kStatic ? "static field" : "instance field"; |
| |
| // We cannot use ClassAccessor::Field yet as it could read beyond the end of the data section. |
| const uint8_t* ptr = ptr_; |
| const uint8_t* data_end = begin_ + header_->data_off_ + header_->data_size_; |
| |
| uint32_t prev_index = 0; |
| for (size_t i = 0; i != count; ++i) { |
| uint32_t field_idx_diff, access_flags; |
| if (UNLIKELY(!DecodeUnsignedLeb128Checked(&ptr, data_end, &field_idx_diff)) || |
| UNLIKELY(!DecodeUnsignedLeb128Checked(&ptr, data_end, &access_flags))) { |
| ErrorStringPrintf("encoded_field read out of bounds"); |
| return false; |
| } |
| uint32_t curr_index = prev_index + field_idx_diff; |
| // Check for overflow. |
| if (!CheckIndex(curr_index, header_->field_ids_size_, "class_data_item field_idx")) { |
| return false; |
| } |
| if (!CheckOrder(kTypeDescr, curr_index, prev_index)) { |
| return false; |
| } |
| // Check that it falls into the right class-data list. |
| bool is_static = (access_flags & kAccStatic) != 0; |
| if (UNLIKELY(is_static != kStatic)) { |
| ErrorStringPrintf("Static/instance field not in expected list"); |
| return false; |
| } |
| |
| prev_index = curr_index; |
| } |
| |
| ptr_ = ptr; |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckIntraClassDataItemMethods(size_t num_methods, |
| ClassAccessor::Method* direct_methods, |
| size_t num_direct_methods) { |
| DCHECK(num_direct_methods == 0u || direct_methods != nullptr); |
| const char* kTypeDescr = (direct_methods == nullptr) ? "direct method" : "virtual method"; |
| |
| // We cannot use ClassAccessor::Method yet as it could read beyond the end of the data section. |
| const uint8_t* ptr = ptr_; |
| const uint8_t* data_end = begin_ + header_->data_off_ + header_->data_size_; |
| |
| // Load the first direct method for the check below. |
| size_t remaining_direct_methods = num_direct_methods; |
| if (remaining_direct_methods != 0u) { |
| DCHECK(direct_methods != nullptr); |
| direct_methods->Read(); |
| } |
| |
| uint32_t prev_index = 0; |
| for (size_t i = 0; i != num_methods; ++i) { |
| uint32_t method_idx_diff, access_flags, code_off; |
| if (UNLIKELY(!DecodeUnsignedLeb128Checked(&ptr, data_end, &method_idx_diff)) || |
| UNLIKELY(!DecodeUnsignedLeb128Checked(&ptr, data_end, &access_flags)) || |
| UNLIKELY(!DecodeUnsignedLeb128Checked(&ptr, data_end, &code_off))) { |
| ErrorStringPrintf("encoded_method read out of bounds"); |
| return false; |
| } |
| uint32_t curr_index = prev_index + method_idx_diff; |
| // Check for overflow. |
| if (!CheckIndex(curr_index, header_->method_ids_size_, "class_data_item method_idx")) { |
| return false; |
| } |
| if (!CheckOrder(kTypeDescr, curr_index, prev_index)) { |
| return false; |
| } |
| |
| // For virtual methods, we cross reference the method index to make sure |
| // it doesn't match any direct methods. |
| if (remaining_direct_methods != 0) { |
| // The direct methods are already known to be in ascending index order. |
| // So just keep up with the current index. |
| while (true) { |
| const uint32_t direct_idx = direct_methods->GetIndex(); |
| if (direct_idx > curr_index) { |
| break; |
| } |
| if (direct_idx == curr_index) { |
| ErrorStringPrintf("Found virtual method with same index as direct method: %u", |
| curr_index); |
| return false; |
| } |
| --remaining_direct_methods; |
| if (remaining_direct_methods == 0u) { |
| break; |
| } |
| direct_methods->Read(); |
| } |
| } |
| |
| prev_index = curr_index; |
| } |
| |
| ptr_ = ptr; |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckIntraClassDataItem() { |
| // We cannot use ClassAccessor yet as it could read beyond the end of the data section. |
| const uint8_t* ptr = ptr_; |
| const uint8_t* data_end = begin_ + header_->data_off_ + header_->data_size_; |
| |
| uint32_t static_fields_size, instance_fields_size, direct_methods_size, virtual_methods_size; |
| if (UNLIKELY(!DecodeUnsignedLeb128Checked(&ptr, data_end, &static_fields_size)) || |
| UNLIKELY(!DecodeUnsignedLeb128Checked(&ptr, data_end, &instance_fields_size)) || |
| UNLIKELY(!DecodeUnsignedLeb128Checked(&ptr, data_end, &direct_methods_size)) || |
| UNLIKELY(!DecodeUnsignedLeb128Checked(&ptr, data_end, &virtual_methods_size))) { |
| ErrorStringPrintf("class_data_item read out of bounds"); |
| return false; |
| } |
| ptr_ = ptr; |
| |
| // Check fields. |
| if (!CheckIntraClassDataItemFields</*kStatic=*/ true>(static_fields_size)) { |
| return false; |
| } |
| if (!CheckIntraClassDataItemFields</*kStatic=*/ false>(instance_fields_size)) { |
| return false; |
| } |
| |
| // Check methods. |
| const uint8_t* direct_methods_ptr = ptr_; |
| if (!CheckIntraClassDataItemMethods(direct_methods_size, |
| /*direct_methods=*/ nullptr, |
| /*num_direct_methods=*/ 0u)) { |
| return false; |
| } |
| // Direct methods have been checked, so we can now use ClassAccessor::Method to read them again. |
| ClassAccessor::Method direct_methods(*dex_file_, direct_methods_ptr); |
| if (!CheckIntraClassDataItemMethods(virtual_methods_size, &direct_methods, direct_methods_size)) { |
| return false; |
| } |
| |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckIntraCodeItem() { |
| const dex::CodeItem* code_item = reinterpret_cast<const dex::CodeItem*>(ptr_); |
| if (!CheckListSize(code_item, 1, sizeof(dex::CodeItem), "code")) { |
| return false; |
| } |
| |
| CodeItemDataAccessor accessor(*dex_file_, code_item); |
| if (UNLIKELY(accessor.InsSize() > accessor.RegistersSize())) { |
| ErrorStringPrintf("ins_size (%ud) > registers_size (%ud)", |
| accessor.InsSize(), accessor.RegistersSize()); |
| return false; |
| } |
| |
| if (UNLIKELY(accessor.OutsSize() > 5 && accessor.OutsSize() > accessor.RegistersSize())) { |
| /* |
| * outs_size can be up to 5, even if registers_size is smaller, since the |
| * short forms of method invocation allow repetitions of a register multiple |
| * times within a single parameter list. However, longer parameter lists |
| * need to be represented in-order in the register file. |
| */ |
| ErrorStringPrintf("outs_size (%ud) > registers_size (%ud)", |
| accessor.OutsSize(), accessor.RegistersSize()); |
| return false; |
| } |
| |
| const uint16_t* insns = accessor.Insns(); |
| uint32_t insns_size = accessor.InsnsSizeInCodeUnits(); |
| if (!CheckListSize(insns, insns_size, sizeof(uint16_t), "insns size")) { |
| return false; |
| } |
| |
| // Grab the end of the insns if there are no try_items. |
| uint32_t try_items_size = accessor.TriesSize(); |
| if (try_items_size == 0) { |
| ptr_ = reinterpret_cast<const uint8_t*>(&insns[insns_size]); |
| return true; |
| } |
| |
| // try_items are 4-byte aligned. Verify the spacer is 0. |
| if (((reinterpret_cast<uintptr_t>(&insns[insns_size]) & 3) != 0) && (insns[insns_size] != 0)) { |
| ErrorStringPrintf("Non-zero padding: %x", insns[insns_size]); |
| return false; |
| } |
| |
| const dex::TryItem* try_items = accessor.TryItems().begin(); |
| if (!CheckListSize(try_items, try_items_size, sizeof(dex::TryItem), "try_items size")) { |
| return false; |
| } |
| |
| ptr_ = accessor.GetCatchHandlerData(); |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, handlers_size); |
| |
| if (UNLIKELY((handlers_size == 0) || (handlers_size >= 65536))) { |
| ErrorStringPrintf("Invalid handlers_size: %ud", handlers_size); |
| return false; |
| } |
| |
| // Avoid an expensive allocation, if possible. |
| std::unique_ptr<uint32_t[]> handler_offsets_uptr; |
| uint32_t* handler_offsets; |
| constexpr size_t kAllocaMaxSize = 1024; |
| if (handlers_size < kAllocaMaxSize/sizeof(uint32_t)) { |
| // Note: Clang does not specify alignment guarantees for alloca. So align by hand. |
| handler_offsets = |
| AlignUp(reinterpret_cast<uint32_t*>(alloca((handlers_size + 1) * sizeof(uint32_t))), |
| alignof(uint32_t[])); |
| } else { |
| handler_offsets_uptr.reset(new uint32_t[handlers_size]); |
| handler_offsets = handler_offsets_uptr.get(); |
| } |
| |
| if (!CheckAndGetHandlerOffsets(code_item, &handler_offsets[0], handlers_size)) { |
| return false; |
| } |
| |
| uint32_t last_addr = 0; |
| for (; try_items_size != 0u; --try_items_size) { |
| if (UNLIKELY(try_items->start_addr_ < last_addr)) { |
| ErrorStringPrintf("Out-of_order try_item with start_addr: %x", try_items->start_addr_); |
| return false; |
| } |
| |
| if (UNLIKELY(try_items->start_addr_ >= insns_size)) { |
| ErrorStringPrintf("Invalid try_item start_addr: %x", try_items->start_addr_); |
| return false; |
| } |
| |
| uint32_t i; |
| for (i = 0; i < handlers_size; i++) { |
| if (try_items->handler_off_ == handler_offsets[i]) { |
| break; |
| } |
| } |
| |
| if (UNLIKELY(i == handlers_size)) { |
| ErrorStringPrintf("Bogus handler offset: %x", try_items->handler_off_); |
| return false; |
| } |
| |
| last_addr = try_items->start_addr_ + try_items->insn_count_; |
| if (UNLIKELY(last_addr > insns_size)) { |
| ErrorStringPrintf("Invalid try_item insn_count: %x", try_items->insn_count_); |
| return false; |
| } |
| |
| try_items++; |
| } |
| |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckIntraStringDataItem() { |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, size); |
| const uint8_t* file_end = begin_ + size_; |
| |
| for (uint32_t i = 0; i < size; i++) { |
| CHECK_LT(i, size); // b/15014252 Prevents hitting the impossible case below |
| if (UNLIKELY(ptr_ >= file_end)) { |
| ErrorStringPrintf("String data would go beyond end-of-file"); |
| return false; |
| } |
| |
| uint8_t byte = *(ptr_++); |
| |
| // Switch on the high 4 bits. |
| switch (byte >> 4) { |
| case 0x00: |
| // Special case of bit pattern 0xxx. |
| if (UNLIKELY(byte == 0)) { |
| CHECK_LT(i, size); // b/15014252 Actually hit this impossible case with clang |
| ErrorStringPrintf("String data shorter than indicated utf16_size %x", size); |
| return false; |
| } |
| break; |
| case 0x01: |
| case 0x02: |
| case 0x03: |
| case 0x04: |
| case 0x05: |
| case 0x06: |
| case 0x07: |
| // No extra checks necessary for bit pattern 0xxx. |
| break; |
| case 0x08: |
| case 0x09: |
| case 0x0a: |
| case 0x0b: |
| case 0x0f: |
| // Illegal bit patterns 10xx or 1111. |
| // Note: 1111 is valid for normal UTF-8, but not here. |
| ErrorStringPrintf("Illegal start byte %x in string data", byte); |
| return false; |
| case 0x0c: |
| case 0x0d: { |
| // Bit pattern 110x has an additional byte. |
| uint8_t byte2 = *(ptr_++); |
| if (UNLIKELY((byte2 & 0xc0) != 0x80)) { |
| ErrorStringPrintf("Illegal continuation byte %x in string data", byte2); |
| return false; |
| } |
| uint16_t value = ((byte & 0x1f) << 6) | (byte2 & 0x3f); |
| if (UNLIKELY((value != 0) && (value < 0x80))) { |
| ErrorStringPrintf("Illegal representation for value %x in string data", value); |
| return false; |
| } |
| break; |
| } |
| case 0x0e: { |
| // Bit pattern 1110 has 2 additional bytes. |
| uint8_t byte2 = *(ptr_++); |
| if (UNLIKELY((byte2 & 0xc0) != 0x80)) { |
| ErrorStringPrintf("Illegal continuation byte %x in string data", byte2); |
| return false; |
| } |
| uint8_t byte3 = *(ptr_++); |
| if (UNLIKELY((byte3 & 0xc0) != 0x80)) { |
| ErrorStringPrintf("Illegal continuation byte %x in string data", byte3); |
| return false; |
| } |
| uint16_t value = ((byte & 0x0f) << 12) | ((byte2 & 0x3f) << 6) | (byte3 & 0x3f); |
| if (UNLIKELY(value < 0x800)) { |
| ErrorStringPrintf("Illegal representation for value %x in string data", value); |
| return false; |
| } |
| break; |
| } |
| } |
| } |
| |
| if (UNLIKELY(*(ptr_++) != '\0')) { |
| ErrorStringPrintf("String longer than indicated size %x", size); |
| return false; |
| } |
| |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckIntraDebugInfoItem() { |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, unused_line_start); |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, parameters_size); |
| if (UNLIKELY(parameters_size > 65536)) { |
| ErrorStringPrintf("Invalid parameters_size: %x", parameters_size); |
| return false; |
| } |
| |
| for (uint32_t j = 0; j < parameters_size; j++) { |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, parameter_name); |
| if (parameter_name != 0) { |
| parameter_name--; |
| if (!CheckIndex(parameter_name, header_->string_ids_size_, "debug_info_item parameter_name")) { |
| return false; |
| } |
| } |
| } |
| |
| while (true) { |
| uint8_t opcode = *(ptr_++); |
| switch (opcode) { |
| case DexFile::DBG_END_SEQUENCE: { |
| return true; |
| } |
| case DexFile::DBG_ADVANCE_PC: { |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, unused_advance_pc); |
| break; |
| } |
| case DexFile::DBG_ADVANCE_LINE: { |
| DECODE_SIGNED_CHECKED_FROM(ptr_, unused_advance_line); |
| break; |
| } |
| case DexFile::DBG_START_LOCAL: { |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, reg_num); |
| if (UNLIKELY(reg_num >= 65536)) { |
| ErrorStringPrintf("Bad reg_num for opcode %x", opcode); |
| return false; |
| } |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, name_idx); |
| if (name_idx != 0) { |
| name_idx--; |
| if (!CheckIndex(name_idx, header_->string_ids_size_, "DBG_START_LOCAL name_idx")) { |
| return false; |
| } |
| } |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, type_idx); |
| if (type_idx != 0) { |
| type_idx--; |
| if (!CheckIndex(type_idx, header_->type_ids_size_, "DBG_START_LOCAL type_idx")) { |
| return false; |
| } |
| } |
| break; |
| } |
| case DexFile::DBG_END_LOCAL: |
| case DexFile::DBG_RESTART_LOCAL: { |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, reg_num); |
| if (UNLIKELY(reg_num >= 65536)) { |
| ErrorStringPrintf("Bad reg_num for opcode %x", opcode); |
| return false; |
| } |
| break; |
| } |
| case DexFile::DBG_START_LOCAL_EXTENDED: { |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, reg_num); |
| if (UNLIKELY(reg_num >= 65536)) { |
| ErrorStringPrintf("Bad reg_num for opcode %x", opcode); |
| return false; |
| } |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, name_idx); |
| if (name_idx != 0) { |
| name_idx--; |
| if (!CheckIndex(name_idx, header_->string_ids_size_, "DBG_START_LOCAL_EXTENDED name_idx")) { |
| return false; |
| } |
| } |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, type_idx); |
| if (type_idx != 0) { |
| type_idx--; |
| if (!CheckIndex(type_idx, header_->type_ids_size_, "DBG_START_LOCAL_EXTENDED type_idx")) { |
| return false; |
| } |
| } |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, sig_idx); |
| if (sig_idx != 0) { |
| sig_idx--; |
| if (!CheckIndex(sig_idx, header_->string_ids_size_, "DBG_START_LOCAL_EXTENDED sig_idx")) { |
| return false; |
| } |
| } |
| break; |
| } |
| case DexFile::DBG_SET_FILE: { |
| DECODE_UNSIGNED_CHECKED_FROM(ptr_, name_idx); |
| if (name_idx != 0) { |
| name_idx--; |
| if (!CheckIndex(name_idx, header_->string_ids_size_, "DBG_SET_FILE name_idx")) { |
| return false; |
| } |
| } |
| break; |
| } |
| } |
| } |
| } |
| |
| bool DexFileVerifier::CheckIntraAnnotationItem() { |
| if (!CheckListSize(ptr_, 1, sizeof(uint8_t), "annotation visibility")) { |
| return false; |
| } |
| |
| // Check visibility |
| switch (*(ptr_++)) { |
| case DexFile::kDexVisibilityBuild: |
| case DexFile::kDexVisibilityRuntime: |
| case DexFile::kDexVisibilitySystem: |
| break; |
| default: |
| ErrorStringPrintf("Bad annotation visibility: %x", *ptr_); |
| return false; |
| } |
| |
| if (!CheckEncodedAnnotation()) { |
| return false; |
| } |
| |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckIntraHiddenapiClassData() { |
| const dex::HiddenapiClassData* item = reinterpret_cast<const dex::HiddenapiClassData*>(ptr_); |
| |
| // Check expected header size. |
| uint32_t num_header_elems = dex_file_->NumClassDefs() + 1; |
| uint32_t elem_size = sizeof(uint32_t); |
| uint32_t header_size = num_header_elems * elem_size; |
| if (!CheckListSize(item, num_header_elems, elem_size, "hiddenapi class data section header")) { |
| return false; |
| } |
| |
| // Check total size. |
| if (!CheckListSize(item, item->size_, 1u, "hiddenapi class data section")) { |
| return false; |
| } |
| |
| // Check that total size can fit header. |
| if (item->size_ < header_size) { |
| ErrorStringPrintf( |
| "Hiddenapi class data too short to store header (%u < %u)", item->size_, header_size); |
| return false; |
| } |
| |
| const uint8_t* data_end = ptr_ + item->size_; |
| ptr_ += header_size; |
| |
| // Check offsets for each class def. |
| for (uint32_t i = 0; i < dex_file_->NumClassDefs(); ++i) { |
| const dex::ClassDef& class_def = dex_file_->GetClassDef(i); |
| const uint8_t* class_data = dex_file_->GetClassData(class_def); |
| uint32_t offset = item->flags_offset_[i]; |
| |
| if (offset == 0) { |
| continue; |
| } |
| |
| // Check that class defs with no class data do not have any hiddenapi class data. |
| if (class_data == nullptr) { |
| ErrorStringPrintf( |
| "Hiddenapi class data offset not zero for class def %u with no class data", i); |
| return false; |
| } |
| |
| // Check that the offset is within the section. |
| if (offset > item->size_) { |
| ErrorStringPrintf( |
| "Hiddenapi class data offset out of section bounds (%u > %u) for class def %u", |
| offset, item->size_, i); |
| return false; |
| } |
| |
| // Check that the offset matches current pointer position. We do not allow |
| // offsets into already parsed data, or gaps between class def data. |
| uint32_t ptr_offset = ptr_ - reinterpret_cast<const uint8_t*>(item); |
| if (offset != ptr_offset) { |
| ErrorStringPrintf( |
| "Hiddenapi class data unexpected offset (%u != %u) for class def %u", |
| offset, ptr_offset, i); |
| return false; |
| } |
| |
| // Parse a uleb128 value for each field and method of this class. |
| bool failure = false; |
| auto fn_member = [&](const ClassAccessor::BaseItem& member, const char* member_type) { |
| if (failure) { |
| return; |
| } |
| uint32_t decoded_flags; |
| if (!DecodeUnsignedLeb128Checked(&ptr_, data_end, &decoded_flags)) { |
| ErrorStringPrintf("Hiddenapi class data value out of bounds (%p > %p) for %s %i", |
| ptr_, data_end, member_type, member.GetIndex()); |
| failure = true; |
| return; |
| } |
| if (!hiddenapi::ApiList(decoded_flags).IsValid()) { |
| ErrorStringPrintf("Hiddenapi class data flags invalid (%u) for %s %i", |
| decoded_flags, member_type, member.GetIndex()); |
| failure = true; |
| return; |
| } |
| }; |
| auto fn_field = [&](const ClassAccessor::Field& field) { fn_member(field, "field"); }; |
| auto fn_method = [&](const ClassAccessor::Method& method) { fn_member(method, "method"); }; |
| ClassAccessor accessor(*dex_file_, class_data); |
| accessor.VisitFieldsAndMethods(fn_field, fn_field, fn_method, fn_method); |
| if (failure) { |
| return false; |
| } |
| } |
| |
| if (ptr_ != data_end) { |
| ErrorStringPrintf("Hiddenapi class data wrong reported size (%u != %u)", |
| static_cast<uint32_t>(ptr_ - reinterpret_cast<const uint8_t*>(item)), |
| item->size_); |
| return false; |
| } |
| |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckIntraAnnotationsDirectoryItem() { |
| const dex::AnnotationsDirectoryItem* item = |
| reinterpret_cast<const dex::AnnotationsDirectoryItem*>(ptr_); |
| if (!CheckListSize(item, 1, sizeof(dex::AnnotationsDirectoryItem), "annotations_directory")) { |
| return false; |
| } |
| |
| // Field annotations follow immediately after the annotations directory. |
| const dex::FieldAnnotationsItem* field_item = |
| reinterpret_cast<const dex::FieldAnnotationsItem*>(item + 1); |
| uint32_t field_count = item->fields_size_; |
| if (!CheckListSize(field_item, |
| field_count, |
| sizeof(dex::FieldAnnotationsItem), |
| "field_annotations list")) { |
| return false; |
| } |
| |
| uint32_t last_idx = 0; |
| for (uint32_t i = 0; i < field_count; i++) { |
| if (!CheckIndex(field_item->field_idx_, header_->field_ids_size_, "field annotation")) { |
| return false; |
| } |
| if (UNLIKELY(last_idx >= field_item->field_idx_ && i != 0)) { |
| ErrorStringPrintf("Out-of-order field_idx for annotation: %x then %x", |
| last_idx, field_item->field_idx_); |
| return false; |
| } |
| last_idx = field_item->field_idx_; |
| field_item++; |
| } |
| |
| // Method annotations follow immediately after field annotations. |
| const dex::MethodAnnotationsItem* method_item = |
| reinterpret_cast<const dex::MethodAnnotationsItem*>(field_item); |
| uint32_t method_count = item->methods_size_; |
| if (!CheckListSize(method_item, |
| method_count, |
| sizeof(dex::MethodAnnotationsItem), |
| "method_annotations list")) { |
| return false; |
| } |
| |
| last_idx = 0; |
| for (uint32_t i = 0; i < method_count; i++) { |
| if (!CheckIndex(method_item->method_idx_, header_->method_ids_size_, "method annotation")) { |
| return false; |
| } |
| if (UNLIKELY(last_idx >= method_item->method_idx_ && i != 0)) { |
| ErrorStringPrintf("Out-of-order method_idx for annotation: %x then %x", |
| last_idx, method_item->method_idx_); |
| return false; |
| } |
| last_idx = method_item->method_idx_; |
| method_item++; |
| } |
| |
| // Parameter annotations follow immediately after method annotations. |
| const dex::ParameterAnnotationsItem* parameter_item = |
| reinterpret_cast<const dex::ParameterAnnotationsItem*>(method_item); |
| uint32_t parameter_count = item->parameters_size_; |
| if (!CheckListSize(parameter_item, parameter_count, sizeof(dex::ParameterAnnotationsItem), |
| "parameter_annotations list")) { |
| return false; |
| } |
| |
| last_idx = 0; |
| for (uint32_t i = 0; i < parameter_count; i++) { |
| if (!CheckIndex(parameter_item->method_idx_, |
| header_->method_ids_size_, |
| "parameter annotation method")) { |
| return false; |
| } |
| if (UNLIKELY(last_idx >= parameter_item->method_idx_ && i != 0)) { |
| ErrorStringPrintf("Out-of-order method_idx for annotation: %x then %x", |
| last_idx, parameter_item->method_idx_); |
| return false; |
| } |
| last_idx = parameter_item->method_idx_; |
| parameter_item++; |
| } |
| |
| // Return a pointer to the end of the annotations. |
| ptr_ = reinterpret_cast<const uint8_t*>(parameter_item); |
| return true; |
| } |
| |
| template <DexFile::MapItemType kType> |
| bool DexFileVerifier::CheckIntraSectionIterate(size_t offset, uint32_t section_count) { |
| // Get the right alignment mask for the type of section. |
| size_t alignment_mask; |
| switch (kType) { |
| case DexFile::kDexTypeClassDataItem: |
| case DexFile::kDexTypeStringDataItem: |
| case DexFile::kDexTypeDebugInfoItem: |
| case DexFile::kDexTypeAnnotationItem: |
| case DexFile::kDexTypeEncodedArrayItem: |
| alignment_mask = sizeof(uint8_t) - 1; |
| break; |
| default: |
| alignment_mask = sizeof(uint32_t) - 1; |
| break; |
| } |
| |
| // Iterate through the items in the section. |
| for (uint32_t i = 0; i < section_count; i++) { |
| size_t aligned_offset = (offset + alignment_mask) & ~alignment_mask; |
| |
| // Check the padding between items. |
| if (!CheckPadding(offset, aligned_offset, kType)) { |
| return false; |
| } |
| |
| // Check depending on the section type. |
| const uint8_t* start_ptr = ptr_; |
| switch (kType) { |
| case DexFile::kDexTypeStringIdItem: { |
| if (!CheckListSize(ptr_, 1, sizeof(dex::StringId), "string_ids")) { |
| return false; |
| } |
| ptr_ += sizeof(dex::StringId); |
| break; |
| } |
| case DexFile::kDexTypeTypeIdItem: { |
| if (!CheckIntraTypeIdItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeProtoIdItem: { |
| if (!CheckIntraProtoIdItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeFieldIdItem: { |
| if (!CheckIntraFieldIdItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeMethodIdItem: { |
| if (!CheckIntraMethodIdItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeClassDefItem: { |
| if (!CheckIntraClassDefItem(/*class_def_index=*/ i)) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeCallSiteIdItem: { |
| if (!CheckListSize(ptr_, 1, sizeof(dex::CallSiteIdItem), "call_site_ids")) { |
| return false; |
| } |
| ptr_ += sizeof(dex::CallSiteIdItem); |
| break; |
| } |
| case DexFile::kDexTypeMethodHandleItem: { |
| if (!CheckIntraMethodHandleItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeTypeList: { |
| if (!CheckIntraTypeList()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeAnnotationSetRefList: { |
| if (!CheckList(sizeof(dex::AnnotationSetRefItem), "annotation_set_ref_list", &ptr_)) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeAnnotationSetItem: { |
| if (!CheckList(sizeof(uint32_t), "annotation_set_item", &ptr_)) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeClassDataItem: { |
| if (!CheckIntraClassDataItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeCodeItem: { |
| if (!CheckIntraCodeItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeStringDataItem: { |
| if (!CheckIntraStringDataItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeDebugInfoItem: { |
| if (!CheckIntraDebugInfoItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeAnnotationItem: { |
| if (!CheckIntraAnnotationItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeEncodedArrayItem: { |
| if (!CheckEncodedArray()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeAnnotationsDirectoryItem: { |
| if (!CheckIntraAnnotationsDirectoryItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeHiddenapiClassData: { |
| if (!CheckIntraHiddenapiClassData()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeHeaderItem: |
| case DexFile::kDexTypeMapList: |
| break; |
| } |
| |
| if (start_ptr == ptr_) { |
| ErrorStringPrintf("Unknown map item type %x", kType); |
| return false; |
| } |
| |
| if (IsDataSectionType(kType)) { |
| if (aligned_offset == 0u) { |
| ErrorStringPrintf("Item %d offset is 0", i); |
| return false; |
| } |
| DCHECK(offset_to_type_map_.find(aligned_offset) == offset_to_type_map_.end()); |
| offset_to_type_map_.insert(std::pair<uint32_t, uint16_t>(aligned_offset, kType)); |
| } |
| |
| aligned_offset = ptr_ - begin_; |
| if (UNLIKELY(aligned_offset > size_)) { |
| ErrorStringPrintf("Item %d at ends out of bounds", i); |
| return false; |
| } |
| |
| offset = aligned_offset; |
| } |
| |
| return true; |
| } |
| |
| template <DexFile::MapItemType kType> |
| bool DexFileVerifier::CheckIntraIdSection(size_t offset, uint32_t count) { |
| uint32_t expected_offset; |
| uint32_t expected_size; |
| |
| // Get the expected offset and size from the header. |
| switch (kType) { |
| case DexFile::kDexTypeStringIdItem: |
| expected_offset = header_->string_ids_off_; |
| expected_size = header_->string_ids_size_; |
| break; |
| case DexFile::kDexTypeTypeIdItem: |
| expected_offset = header_->type_ids_off_; |
| expected_size = header_->type_ids_size_; |
| break; |
| case DexFile::kDexTypeProtoIdItem: |
| expected_offset = header_->proto_ids_off_; |
| expected_size = header_->proto_ids_size_; |
| break; |
| case DexFile::kDexTypeFieldIdItem: |
| expected_offset = header_->field_ids_off_; |
| expected_size = header_->field_ids_size_; |
| break; |
| case DexFile::kDexTypeMethodIdItem: |
| expected_offset = header_->method_ids_off_; |
| expected_size = header_->method_ids_size_; |
| break; |
| case DexFile::kDexTypeClassDefItem: |
| expected_offset = header_->class_defs_off_; |
| expected_size = header_->class_defs_size_; |
| break; |
| default: |
| ErrorStringPrintf("Bad type for id section: %x", kType); |
| return false; |
| } |
| |
| // Check that the offset and size are what were expected from the header. |
| if (UNLIKELY(offset != expected_offset)) { |
| ErrorStringPrintf("Bad offset for section: got %zx, expected %x", offset, expected_offset); |
| return false; |
| } |
| if (UNLIKELY(count != expected_size)) { |
| ErrorStringPrintf("Bad size for section: got %x, expected %x", count, expected_size); |
| return false; |
| } |
| |
| return CheckIntraSectionIterate<kType>(offset, count); |
| } |
| |
| template <DexFile::MapItemType kType> |
| bool DexFileVerifier::CheckIntraDataSection(size_t offset, uint32_t count) { |
| size_t data_start = header_->data_off_; |
| size_t data_end = data_start + header_->data_size_; |
| |
| // Check the validity of the offset of the section. |
| if (UNLIKELY((offset < data_start) || (offset > data_end))) { |
| ErrorStringPrintf("Bad offset for data subsection: %zx", offset); |
| return false; |
| } |
| |
| if (!CheckIntraSectionIterate<kType>(offset, count)) { |
| return false; |
| } |
| |
| // FIXME: Doing this check late means we may have already read memory outside the |
| // data section and potentially outside the file, thus risking a segmentation fault. |
| size_t next_offset = ptr_ - begin_; |
| if (next_offset > data_end) { |
| ErrorStringPrintf("Out-of-bounds end of data subsection: %zu data_off=%u data_size=%u", |
| next_offset, |
| header_->data_off_, |
| header_->data_size_); |
| return false; |
| } |
| |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckIntraSection() { |
| const dex::MapList* map = reinterpret_cast<const dex::MapList*>(begin_ + header_->map_off_); |
| const dex::MapItem* item = map->list_; |
| size_t offset = 0; |
| uint32_t count = map->size_; |
| ptr_ = begin_; |
| |
| // Preallocate offset map to avoid some allocations. We can only guess from the list items, |
| // not derived things. |
| offset_to_type_map_.reserve( |
| std::min(header_->class_defs_size_, 65535u) + |
| std::min(header_->string_ids_size_, 65535u) + |
| 2 * std::min(header_->method_ids_size_, 65535u)); |
| |
| // Check the items listed in the map. |
| for (; count != 0u; --count) { |
| const size_t current_offset = offset; |
| uint32_t section_offset = item->offset_; |
| uint32_t section_count = item->size_; |
| DexFile::MapItemType type = static_cast<DexFile::MapItemType>(item->type_); |
| |
| // Check for padding and overlap between items. |
| if (!CheckPadding(offset, section_offset, type)) { |
| return false; |
| } else if (UNLIKELY(offset > section_offset)) { |
| ErrorStringPrintf("Section overlap or out-of-order map: %zx, %x", offset, section_offset); |
| return false; |
| } |
| |
| if (type == DexFile::kDexTypeClassDataItem) { |
| FindStringRangesForMethodNames(); |
| } |
| |
| // Check each item based on its type. |
| switch (type) { |
| case DexFile::kDexTypeHeaderItem: |
| if (UNLIKELY(section_count != 1)) { |
| ErrorStringPrintf("Multiple header items"); |
| return false; |
| } |
| if (UNLIKELY(section_offset != 0)) { |
| ErrorStringPrintf("Header at %x, not at start of file", section_offset); |
| return false; |
| } |
| ptr_ = begin_ + header_->header_size_; |
| offset = header_->header_size_; |
| break; |
| |
| #define CHECK_INTRA_ID_SECTION_CASE(type) \ |
| case type: \ |
| if (!CheckIntraIdSection<type>(section_offset, section_count)) { \ |
| return false; \ |
| } \ |
| offset = ptr_ - begin_; \ |
| break; |
| CHECK_INTRA_ID_SECTION_CASE(DexFile::kDexTypeStringIdItem) |
| CHECK_INTRA_ID_SECTION_CASE(DexFile::kDexTypeTypeIdItem) |
| CHECK_INTRA_ID_SECTION_CASE(DexFile::kDexTypeProtoIdItem) |
| CHECK_INTRA_ID_SECTION_CASE(DexFile::kDexTypeFieldIdItem) |
| CHECK_INTRA_ID_SECTION_CASE(DexFile::kDexTypeMethodIdItem) |
| CHECK_INTRA_ID_SECTION_CASE(DexFile::kDexTypeClassDefItem) |
| #undef CHECK_INTRA_ID_SECTION_CASE |
| |
| case DexFile::kDexTypeMapList: |
| if (UNLIKELY(section_count != 1)) { |
| ErrorStringPrintf("Multiple map list items"); |
| return false; |
| } |
| if (UNLIKELY(section_offset != header_->map_off_)) { |
| ErrorStringPrintf("Map not at header-defined offset: %x, expected %x", |
| section_offset, header_->map_off_); |
| return false; |
| } |
| ptr_ += sizeof(uint32_t) + (map->size_ * sizeof(dex::MapItem)); |
| offset = section_offset + sizeof(uint32_t) + (map->size_ * sizeof(dex::MapItem)); |
| break; |
| |
| #define CHECK_INTRA_SECTION_ITERATE_CASE(type) \ |
| case type: \ |
| if (!CheckIntraSectionIterate<type>(section_offset, section_count)) { \ |
| return false; \ |
| } \ |
| offset = ptr_ - begin_; \ |
| break; |
| CHECK_INTRA_SECTION_ITERATE_CASE(DexFile::kDexTypeMethodHandleItem) |
| CHECK_INTRA_SECTION_ITERATE_CASE(DexFile::kDexTypeCallSiteIdItem) |
| #undef CHECK_INTRA_SECTION_ITERATE_CASE |
| |
| #define CHECK_INTRA_DATA_SECTION_CASE(type) \ |
| case type: \ |
| if (!CheckIntraDataSection<type>(section_offset, section_count)) { \ |
| return false; \ |
| } \ |
| offset = ptr_ - begin_; \ |
| break; |
| CHECK_INTRA_DATA_SECTION_CASE(DexFile::kDexTypeTypeList) |
| CHECK_INTRA_DATA_SECTION_CASE(DexFile::kDexTypeAnnotationSetRefList) |
| CHECK_INTRA_DATA_SECTION_CASE(DexFile::kDexTypeAnnotationSetItem) |
| CHECK_INTRA_DATA_SECTION_CASE(DexFile::kDexTypeClassDataItem) |
| CHECK_INTRA_DATA_SECTION_CASE(DexFile::kDexTypeCodeItem) |
| CHECK_INTRA_DATA_SECTION_CASE(DexFile::kDexTypeStringDataItem) |
| CHECK_INTRA_DATA_SECTION_CASE(DexFile::kDexTypeDebugInfoItem) |
| CHECK_INTRA_DATA_SECTION_CASE(DexFile::kDexTypeAnnotationItem) |
| CHECK_INTRA_DATA_SECTION_CASE(DexFile::kDexTypeEncodedArrayItem) |
| CHECK_INTRA_DATA_SECTION_CASE(DexFile::kDexTypeAnnotationsDirectoryItem) |
| CHECK_INTRA_DATA_SECTION_CASE(DexFile::kDexTypeHiddenapiClassData) |
| #undef CHECK_INTRA_DATA_SECTION_CASE |
| } |
| |
| if (offset == current_offset) { |
| ErrorStringPrintf("Unknown map item type %x", type); |
| return false; |
| } |
| |
| item++; |
| } |
| |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckOffsetToTypeMap(size_t offset, uint16_t type) { |
| DCHECK_NE(offset, 0u); |
| auto it = offset_to_type_map_.find(offset); |
| if (UNLIKELY(it == offset_to_type_map_.end())) { |
| ErrorStringPrintf("No data map entry found @ %zx; expected %x", offset, type); |
| return false; |
| } |
| if (UNLIKELY(it->second != type)) { |
| ErrorStringPrintf("Unexpected data map entry @ %zx; expected %x, found %x", |
| offset, type, it->second); |
| return false; |
| } |
| return true; |
| } |
| |
| uint32_t DexFileVerifier::FindFirstClassDataDefiner(const ClassAccessor& accessor) { |
| // The data item and field/method indexes have already been checked in |
| // `CheckIntraClassDataItem()` or its helper functions. |
| if (accessor.NumFields() != 0) { |
| ClassAccessor::Field read_field(*dex_file_, accessor.ptr_pos_); |
| read_field.Read(); |
| DCHECK_LE(read_field.GetIndex(), dex_file_->NumFieldIds()); |
| return dex_file_->GetFieldId(read_field.GetIndex()).class_idx_.index_; |
| } |
| |
| if (accessor.NumMethods() != 0) { |
| ClassAccessor::Method read_method(*dex_file_, accessor.ptr_pos_); |
| read_method.Read(); |
| DCHECK_LE(read_method.GetIndex(), dex_file_->NumMethodIds()); |
| return dex_file_->GetMethodId(read_method.GetIndex()).class_idx_.index_; |
| } |
| |
| return kDexNoIndex; |
| } |
| |
| uint32_t DexFileVerifier::FindFirstAnnotationsDirectoryDefiner(const uint8_t* ptr) { |
| // The annotations directory and field/method indexes have already been checked in |
| // `CheckIntraAnnotationsDirectoryItem()`. |
| const dex::AnnotationsDirectoryItem* item = |
| reinterpret_cast<const dex::AnnotationsDirectoryItem*>(ptr); |
| |
| if (item->fields_size_ != 0) { |
| dex::FieldAnnotationsItem* field_items = (dex::FieldAnnotationsItem*) (item + 1); |
| DCHECK_LE(field_items[0].field_idx_, dex_file_->NumFieldIds()); |
| return dex_file_->GetFieldId(field_items[0].field_idx_).class_idx_.index_; |
| } |
| |
| if (item->methods_size_ != 0) { |
| dex::MethodAnnotationsItem* method_items = (dex::MethodAnnotationsItem*) (item + 1); |
| DCHECK_LE(method_items[0].method_idx_, dex_file_->NumMethodIds()); |
| return dex_file_->GetMethodId(method_items[0].method_idx_).class_idx_.index_; |
| } |
| |
| if (item->parameters_size_ != 0) { |
| dex::ParameterAnnotationsItem* parameter_items = (dex::ParameterAnnotationsItem*) (item + 1); |
| DCHECK_LE(parameter_items[0].method_idx_, dex_file_->NumMethodIds()); |
| return dex_file_->GetMethodId(parameter_items[0].method_idx_).class_idx_.index_; |
| } |
| |
| return kDexNoIndex; |
| } |
| |
| bool DexFileVerifier::CheckInterStringIdItem() { |
| const dex::StringId* item = reinterpret_cast<const dex::StringId*>(ptr_); |
| |
| // Note: The mapping to string data items is eagerly verified at the start of CheckInterSection(). |
| |
| // Check ordering between items. |
| if (previous_item_ != nullptr) { |
| const dex::StringId* prev_item = reinterpret_cast<const dex::StringId*>(previous_item_); |
| const char* prev_str = dex_file_->GetStringData(*prev_item); |
| const char* str = dex_file_->GetStringData(*item); |
| if (UNLIKELY(CompareModifiedUtf8ToModifiedUtf8AsUtf16CodePointValues(prev_str, str) >= 0)) { |
| ErrorStringPrintf("Out-of-order string_ids: '%s' then '%s'", prev_str, str); |
| return false; |
| } |
| } |
| |
| ptr_ += sizeof(dex::StringId); |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckInterTypeIdItem() { |
| const dex::TypeId* item = reinterpret_cast<const dex::TypeId*>(ptr_); |
| |
| { |
| // Translate to index to potentially use cache. |
| // The check in `CheckIntraIdSection()` guarantees that this index is valid. |
| size_t index = item - reinterpret_cast<const dex::TypeId*>(begin_ + header_->type_ids_off_); |
| DCHECK_LE(index, header_->type_ids_size_); |
| if (UNLIKELY(!VerifyTypeDescriptor( |
| dex::TypeIndex(static_cast<decltype(dex::TypeIndex::index_)>(index)), |
| "Invalid type descriptor", |
| [](char) { return true; }))) { |
| return false; |
| } |
| } |
| |
| // Check ordering between items. |
| if (previous_item_ != nullptr) { |
| const dex::TypeId* prev_item = reinterpret_cast<const dex::TypeId*>(previous_item_); |
| if (UNLIKELY(prev_item->descriptor_idx_ >= item->descriptor_idx_)) { |
| ErrorStringPrintf("Out-of-order type_ids: %x then %x", |
| prev_item->descriptor_idx_.index_, |
| item->descriptor_idx_.index_); |
| return false; |
| } |
| } |
| |
| ptr_ += sizeof(dex::TypeId); |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckInterProtoIdItem() { |
| const dex::ProtoId* item = reinterpret_cast<const dex::ProtoId*>(ptr_); |
| |
| const char* shorty = dex_file_->StringDataByIdx(item->shorty_idx_); |
| |
| if (item->parameters_off_ != 0 && |
| !CheckOffsetToTypeMap(item->parameters_off_, DexFile::kDexTypeTypeList)) { |
| return false; |
| } |
| |
| // Check that return type is representable as a uint16_t; |
| if (UNLIKELY(!IsValidOrNoTypeId(item->return_type_idx_.index_, item->pad_))) { |
| ErrorStringPrintf("proto with return type idx outside uint16_t range '%x:%x'", |
| item->pad_, item->return_type_idx_.index_); |
| return false; |
| } |
| // Check the return type and advance the shorty. |
| const char* return_type = dex_file_->StringByTypeIdx(item->return_type_idx_); |
| if (!CheckShortyDescriptorMatch(*shorty, return_type, true)) { |
| return false; |
| } |
| shorty++; |
| |
| DexFileParameterIterator it(*dex_file_, *item); |
| while (it.HasNext() && *shorty != '\0') { |
| if (!CheckIndex(it.GetTypeIdx().index_, |
| dex_file_->NumTypeIds(), |
| "inter_proto_id_item shorty type_idx")) { |
| return false; |
| } |
| const char* descriptor = it.GetDescriptor(); |
| if (!CheckShortyDescriptorMatch(*shorty, descriptor, false)) { |
| return false; |
| } |
| it.Next(); |
| shorty++; |
| } |
| if (UNLIKELY(it.HasNext() || *shorty != '\0')) { |
| ErrorStringPrintf("Mismatched length for parameters and shorty"); |
| return false; |
| } |
| |
| // Check ordering between items. This relies on type_ids being in order. |
| if (previous_item_ != nullptr) { |
| const dex::ProtoId* prev = reinterpret_cast<const dex::ProtoId*>(previous_item_); |
| if (UNLIKELY(prev->return_type_idx_ > item->return_type_idx_)) { |
| ErrorStringPrintf("Out-of-order proto_id return types"); |
| return false; |
| } else if (prev->return_type_idx_ == item->return_type_idx_) { |
| DexFileParameterIterator curr_it(*dex_file_, *item); |
| DexFileParameterIterator prev_it(*dex_file_, *prev); |
| |
| while (curr_it.HasNext() && prev_it.HasNext()) { |
| dex::TypeIndex prev_idx = prev_it.GetTypeIdx(); |
| dex::TypeIndex curr_idx = curr_it.GetTypeIdx(); |
| DCHECK_NE(prev_idx, dex::TypeIndex(DexFile::kDexNoIndex16)); |
| DCHECK_NE(curr_idx, dex::TypeIndex(DexFile::kDexNoIndex16)); |
| |
| if (prev_idx < curr_idx) { |
| break; |
| } else if (UNLIKELY(prev_idx > curr_idx)) { |
| ErrorStringPrintf("Out-of-order proto_id arguments"); |
| return false; |
| } |
| |
| prev_it.Next(); |
| curr_it.Next(); |
| } |
| if (!curr_it.HasNext()) { |
| // Either a duplicate ProtoId or a ProtoId with a shorter argument list follows |
| // a ProtoId with a longer one. Both cases are forbidden by the specification. |
| ErrorStringPrintf("Out-of-order proto_id arguments"); |
| return false; |
| } |
| } |
| } |
| |
| ptr_ += sizeof(dex::ProtoId); |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckInterFieldIdItem() { |
| const dex::FieldId* item = reinterpret_cast<const dex::FieldId*>(ptr_); |
| |
| // Check that the class descriptor is valid. |
| if (UNLIKELY(!VerifyTypeDescriptor(item->class_idx_, |
| "Invalid descriptor for class_idx", |
| [](char d) { return d == 'L'; }))) { |
| return false; |
| } |
| |
| // Check that the type descriptor is a valid field name. |
| if (UNLIKELY(!VerifyTypeDescriptor(item->type_idx_, |
| "Invalid descriptor for type_idx", |
| [](char d) { return d != 'V'; }))) { |
| return false; |
| } |
| |
| // Check that the name is valid. |
| const char* field_name = dex_file_->StringDataByIdx(item->name_idx_); |
| if (UNLIKELY(!IsValidMemberName(field_name))) { |
| ErrorStringPrintf("Invalid field name: '%s'", field_name); |
| return false; |
| } |
| |
| // Check ordering between items. This relies on the other sections being in order. |
| if (previous_item_ != nullptr) { |
| const dex::FieldId* prev_item = reinterpret_cast<const dex::FieldId*>(previous_item_); |
| if (UNLIKELY(prev_item->class_idx_ > item->class_idx_)) { |
| ErrorStringPrintf("Out-of-order field_ids"); |
| return false; |
| } else if (prev_item->class_idx_ == item->class_idx_) { |
| if (UNLIKELY(prev_item->name_idx_ > item->name_idx_)) { |
| ErrorStringPrintf("Out-of-order field_ids"); |
| return false; |
| } else if (prev_item->name_idx_ == item->name_idx_) { |
| if (UNLIKELY(prev_item->type_idx_ >= item->type_idx_)) { |
| ErrorStringPrintf("Out-of-order field_ids"); |
| return false; |
| } |
| } |
| } |
| } |
| |
| ptr_ += sizeof(dex::FieldId); |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckInterMethodIdItem() { |
| const dex::MethodId* item = reinterpret_cast<const dex::MethodId*>(ptr_); |
| |
| // Check that the class descriptor is a valid reference name. |
| if (UNLIKELY(!VerifyTypeDescriptor(item->class_idx_, |
| "Invalid descriptor for class_idx", |
| [](char d) { return d == 'L' || d == '['; }))) { |
| return false; |
| } |
| |
| // Check that the name is valid. |
| const char* method_name = dex_file_->StringDataByIdx(item->name_idx_); |
| if (UNLIKELY(!IsValidMemberName(method_name))) { |
| ErrorStringPrintf("Invalid method name: '%s'", method_name); |
| return false; |
| } |
| |
| // Check that the proto id is valid. |
| if (UNLIKELY(!CheckIndex(item->proto_idx_.index_, dex_file_->NumProtoIds(), |
| "inter_method_id_item proto_idx"))) { |
| return false; |
| } |
| |
| // Check ordering between items. This relies on the other sections being in order. |
| if (previous_item_ != nullptr) { |
| const dex::MethodId* prev_item = reinterpret_cast<const dex::MethodId*>(previous_item_); |
| if (UNLIKELY(prev_item->class_idx_ > item->class_idx_)) { |
| ErrorStringPrintf("Out-of-order method_ids"); |
| return false; |
| } else if (prev_item->class_idx_ == item->class_idx_) { |
| if (UNLIKELY(prev_item->name_idx_ > item->name_idx_)) { |
| ErrorStringPrintf("Out-of-order method_ids"); |
| return false; |
| } else if (prev_item->name_idx_ == item->name_idx_) { |
| if (UNLIKELY(prev_item->proto_idx_ >= item->proto_idx_)) { |
| ErrorStringPrintf("Out-of-order method_ids"); |
| return false; |
| } |
| } |
| } |
| } |
| |
| ptr_ += sizeof(dex::MethodId); |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckInterClassDefItem() { |
| const dex::ClassDef* item = reinterpret_cast<const dex::ClassDef*>(ptr_); |
| |
| // Check that class_idx_ is representable as a uint16_t; |
| if (UNLIKELY(!IsValidTypeId(item->class_idx_.index_, item->pad1_))) { |
| ErrorStringPrintf("class with type idx outside uint16_t range '%x:%x'", item->pad1_, |
| item->class_idx_.index_); |
| return false; |
| } |
| // Check that superclass_idx_ is representable as a uint16_t; |
| if (UNLIKELY(!IsValidOrNoTypeId(item->superclass_idx_.index_, item->pad2_))) { |
| ErrorStringPrintf("class with superclass type idx outside uint16_t range '%x:%x'", item->pad2_, |
| item->superclass_idx_.index_); |
| return false; |
| } |
| // Check for duplicate class def. |
| |
| if (UNLIKELY(!VerifyTypeDescriptor(item->class_idx_, |
| "Invalid class descriptor", |
| [](char d) { return d == 'L'; }))) { |
| return false; |
| } |
| |
| // Only allow non-runtime modifiers. |
| if ((item->access_flags_ & ~kAccJavaFlagsMask) != 0) { |
| ErrorStringPrintf("Invalid class flags: '%d'", item->access_flags_); |
| return false; |
| } |
| |
| if (item->interfaces_off_ != 0 && |
| !CheckOffsetToTypeMap(item->interfaces_off_, DexFile::kDexTypeTypeList)) { |
| return false; |
| } |
| if (item->annotations_off_ != 0 && |
| !CheckOffsetToTypeMap(item->annotations_off_, DexFile::kDexTypeAnnotationsDirectoryItem)) { |
| return false; |
| } |
| if (item->class_data_off_ != 0 && |
| !CheckOffsetToTypeMap(item->class_data_off_, DexFile::kDexTypeClassDataItem)) { |
| return false; |
| } |
| if (item->static_values_off_ != 0 && |
| !CheckOffsetToTypeMap(item->static_values_off_, DexFile::kDexTypeEncodedArrayItem)) { |
| return false; |
| } |
| |
| if (item->superclass_idx_.IsValid()) { |
| if (header_->GetVersion() >= DexFile::kClassDefinitionOrderEnforcedVersion) { |
| // Check that a class does not inherit from itself directly (by having |
| // the same type idx as its super class). |
| if (UNLIKELY(item->superclass_idx_ == item->class_idx_)) { |
| ErrorStringPrintf("Class with same type idx as its superclass: '%d'", |
| item->class_idx_.index_); |
| return false; |
| } |
| |
| // Check that a class is defined after its super class (if the |
| // latter is defined in the same Dex file). |
| uint16_t superclass_idx = item->superclass_idx_.index_; |
| if (defined_classes_[superclass_idx]) { |
| // The superclass is defined in this Dex file. |
| if (&dex_file_->GetClassDef(defined_class_indexes_[superclass_idx]) > item) { |
| // ClassDef item for super class appearing after the class' ClassDef item. |
| ErrorStringPrintf("Invalid class definition ordering:" |
| " class with type idx: '%d' defined before" |
| " superclass with type idx: '%d'", |
| item->class_idx_.index_, |
| superclass_idx); |
| return false; |
| } |
| } |
| } |
| |
| if (UNLIKELY(!VerifyTypeDescriptor(item->superclass_idx_, |
| "Invalid superclass", |
| [](char d) { return d == 'L'; }))) { |
| return false; |
| } |
| } |
| |
| // Check interfaces. |
| const dex::TypeList* interfaces = dex_file_->GetInterfacesList(*item); |
| if (interfaces != nullptr) { |
| uint32_t size = interfaces->Size(); |
| for (uint32_t i = 0; i < size; i++) { |
| if (header_->GetVersion() >= DexFile::kClassDefinitionOrderEnforcedVersion) { |
| // Check that a class does not implement itself directly (by having the |
| // same type idx as one of its immediate implemented interfaces). |
| if (UNLIKELY(interfaces->GetTypeItem(i).type_idx_ == item->class_idx_)) { |
| ErrorStringPrintf("Class with same type idx as implemented interface: '%d'", |
| item->class_idx_.index_); |
| return false; |
| } |
| |
| // Check that a class is defined after the interfaces it implements |
| // (if they are defined in the same Dex file). |
| uint16_t interface_idx = interfaces->GetTypeItem(i).type_idx_.index_; |
| if (defined_classes_[interface_idx]) { |
| // The interface is defined in this Dex file. |
| if (&dex_file_->GetClassDef(defined_class_indexes_[interface_idx]) > item) { |
| // ClassDef item for interface appearing after the class' ClassDef item. |
| ErrorStringPrintf("Invalid class definition ordering:" |
| " class with type idx: '%d' defined before" |
| " implemented interface with type idx: '%d'", |
| item->class_idx_.index_, |
| interface_idx); |
| return false; |
| } |
| } |
| } |
| |
| // Ensure that the interface refers to a class (not an array nor a primitive type). |
| if (UNLIKELY(!VerifyTypeDescriptor(interfaces->GetTypeItem(i).type_idx_, |
| "Invalid interface", |
| [](char d) { return d == 'L'; }))) { |
| return false; |
| } |
| } |
| |
| /* |
| * Ensure that there are no duplicates. This is an O(N^2) test, but in |
| * practice the number of interfaces implemented by any given class is low. |
| */ |
| for (uint32_t i = 1; i < size; i++) { |
| dex::TypeIndex idx1 = interfaces->GetTypeItem(i).type_idx_; |
| for (uint32_t j =0; j < i; j++) { |
| dex::TypeIndex idx2 = interfaces->GetTypeItem(j).type_idx_; |
| if (UNLIKELY(idx1 == idx2)) { |
| ErrorStringPrintf("Duplicate interface: '%s'", dex_file_->StringByTypeIdx(idx1)); |
| return false; |
| } |
| } |
| } |
| } |
| |
| // Check that references in class_data_item are to the right class. |
| if (item->class_data_off_ != 0) { |
| ClassAccessor accessor(*dex_file_, begin_ + item->class_data_off_); |
| uint32_t data_definer = FindFirstClassDataDefiner(accessor); |
| DCHECK(IsUint<16>(data_definer) || data_definer == kDexNoIndex) << data_definer; |
| if (UNLIKELY((data_definer != item->class_idx_.index_) && (data_definer != kDexNoIndex))) { |
| ErrorStringPrintf("Invalid class_data_item"); |
| return false; |
| } |
| } |
| |
| // Check that references in annotations_directory_item are to right class. |
| if (item->annotations_off_ != 0) { |
| // annotations_off_ is supposed to be aligned by 4. |
| if (!IsAlignedParam(item->annotations_off_, 4)) { |
| ErrorStringPrintf("Invalid annotations_off_, not aligned by 4"); |
| return false; |
| } |
| const uint8_t* data = begin_ + item->annotations_off_; |
| uint32_t defining_class = FindFirstAnnotationsDirectoryDefiner(data); |
| DCHECK(IsUint<16>(defining_class) || defining_class == kDexNoIndex) << defining_class; |
| if (UNLIKELY((defining_class != item->class_idx_.index_) && (defining_class != kDexNoIndex))) { |
| ErrorStringPrintf("Invalid annotations_directory_item"); |
| return false; |
| } |
| } |
| |
| ptr_ += sizeof(dex::ClassDef); |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckInterCallSiteIdItem() { |
| const dex::CallSiteIdItem* item = reinterpret_cast<const dex::CallSiteIdItem*>(ptr_); |
| |
| // Check call site referenced by item is in encoded array section. |
| if (!CheckOffsetToTypeMap(item->data_off_, DexFile::kDexTypeEncodedArrayItem)) { |
| ErrorStringPrintf("Invalid offset in CallSideIdItem"); |
| return false; |
| } |
| |
| CallSiteArrayValueIterator it(*dex_file_, *item); |
| |
| // Check Method Handle |
| if (!it.HasNext() || it.GetValueType() != EncodedArrayValueIterator::ValueType::kMethodHandle) { |
| ErrorStringPrintf("CallSiteArray missing method handle"); |
| return false; |
| } |
| |
| uint32_t handle_index = static_cast<uint32_t>(it.GetJavaValue().i); |
| if (handle_index >= dex_file_->NumMethodHandles()) { |
| ErrorStringPrintf("CallSite has bad method handle id: %x", handle_index); |
| return false; |
| } |
| |
| // Check target method name. |
| it.Next(); |
| if (!it.HasNext() || |
| it.GetValueType() != EncodedArrayValueIterator::ValueType::kString) { |
| ErrorStringPrintf("CallSiteArray missing target method name"); |
| return false; |
| } |
| |
| uint32_t name_index = static_cast<uint32_t>(it.GetJavaValue().i); |
| if (name_index >= dex_file_->NumStringIds()) { |
| ErrorStringPrintf("CallSite has bad method name id: %x", name_index); |
| return false; |
| } |
| |
| // Check method type. |
| it.Next(); |
| if (!it.HasNext() || |
| it.GetValueType() != EncodedArrayValueIterator::ValueType::kMethodType) { |
| ErrorStringPrintf("CallSiteArray missing method type"); |
| return false; |
| } |
| |
| uint32_t proto_index = static_cast<uint32_t>(it.GetJavaValue().i); |
| if (proto_index >= dex_file_->NumProtoIds()) { |
| ErrorStringPrintf("CallSite has bad method type: %x", proto_index); |
| return false; |
| } |
| |
| ptr_ += sizeof(dex::CallSiteIdItem); |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckInterAnnotationSetRefList() { |
| const dex::AnnotationSetRefList* list = reinterpret_cast<const dex::AnnotationSetRefList*>(ptr_); |
| const dex::AnnotationSetRefItem* item = list->list_; |
| uint32_t count = list->size_; |
| |
| for (; count != 0u; --count) { |
| if (item->annotations_off_ != 0 && |
| !CheckOffsetToTypeMap(item->annotations_off_, DexFile::kDexTypeAnnotationSetItem)) { |
| return false; |
| } |
| item++; |
| } |
| |
| ptr_ = reinterpret_cast<const uint8_t*>(item); |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckInterAnnotationSetItem() { |
| const dex::AnnotationSetItem* set = reinterpret_cast<const dex::AnnotationSetItem*>(ptr_); |
| const uint32_t* offsets = set->entries_; |
| uint32_t count = set->size_; |
| uint32_t last_idx = 0; |
| |
| for (uint32_t i = 0; i < count; i++) { |
| if (*offsets != 0 && !CheckOffsetToTypeMap(*offsets, DexFile::kDexTypeAnnotationItem)) { |
| return false; |
| } |
| |
| // Get the annotation from the offset and the type index for the annotation. |
| const dex::AnnotationItem* annotation = |
| reinterpret_cast<const dex::AnnotationItem*>(begin_ + *offsets); |
| const uint8_t* data = annotation->annotation_; |
| DECODE_UNSIGNED_CHECKED_FROM(data, idx); |
| |
| if (UNLIKELY(last_idx >= idx && i != 0)) { |
| ErrorStringPrintf("Out-of-order entry types: %x then %x", last_idx, idx); |
| return false; |
| } |
| |
| last_idx = idx; |
| offsets++; |
| } |
| |
| ptr_ = reinterpret_cast<const uint8_t*>(offsets); |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckInterClassDataItem() { |
| ClassAccessor accessor(*dex_file_, ptr_); |
| uint32_t defining_class = FindFirstClassDataDefiner(accessor); |
| DCHECK(IsUint<16>(defining_class) || defining_class == kDexNoIndex) << defining_class; |
| if (defining_class == kDexNoIndex) { |
| return true; // Empty definitions are OK (but useless) and could be shared by multiple classes. |
| } |
| if (!defined_classes_[defining_class]) { |
| // Should really have a class definition for this class data item. |
| ErrorStringPrintf("Could not find declaring class for non-empty class data item."); |
| return false; |
| } |
| const dex::TypeIndex class_type_index(defining_class); |
| const dex::ClassDef& class_def = dex_file_->GetClassDef(defined_class_indexes_[defining_class]); |
| |
| for (const ClassAccessor::Field& read_field : accessor.GetFields()) { |
| // The index has already been checked in `CheckIntraClassDataItemFields()`. |
| DCHECK_LE(read_field.GetIndex(), header_->field_ids_size_); |
| const dex::FieldId& field = dex_file_->GetFieldId(read_field.GetIndex()); |
| if (UNLIKELY(field.class_idx_ != class_type_index)) { |
| ErrorStringPrintf("Mismatched defining class for class_data_item field"); |
| return false; |
| } |
| if (!CheckClassDataItemField(read_field.GetIndex(), |
| read_field.GetAccessFlags(), |
| class_def.access_flags_, |
| class_type_index)) { |
| return false; |
| } |
| } |
| size_t num_direct_methods = accessor.NumDirectMethods(); |
| size_t num_processed_methods = 0u; |
| auto methods = accessor.GetMethods(); |
| auto it = methods.begin(); |
| for (; it != methods.end(); ++it, ++num_processed_methods) { |
| uint32_t code_off = it->GetCodeItemOffset(); |
| if (code_off != 0 && !CheckOffsetToTypeMap(code_off, DexFile::kDexTypeCodeItem)) { |
| return false; |
| } |
| // The index has already been checked in `CheckIntraClassDataItemMethods()`. |
| DCHECK_LE(it->GetIndex(), header_->method_ids_size_); |
| const dex::MethodId& method = dex_file_->GetMethodId(it->GetIndex()); |
| if (UNLIKELY(method.class_idx_ != class_type_index)) { |
| ErrorStringPrintf("Mismatched defining class for class_data_item method"); |
| return false; |
| } |
| bool expect_direct = num_processed_methods < num_direct_methods; |
| if (!CheckClassDataItemMethod(it->GetIndex(), |
| it->GetAccessFlags(), |
| class_def.access_flags_, |
| class_type_index, |
| it->GetCodeItemOffset(), |
| expect_direct)) { |
| return false; |
| } |
| } |
| |
| // Check static field types against initial static values in encoded array. |
| if (!CheckStaticFieldTypes(class_def)) { |
| return false; |
| } |
| |
| ptr_ = it.GetDataPointer(); |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckInterAnnotationsDirectoryItem() { |
| const dex::AnnotationsDirectoryItem* item = |
| reinterpret_cast<const dex::AnnotationsDirectoryItem*>(ptr_); |
| uint32_t defining_class = FindFirstAnnotationsDirectoryDefiner(ptr_); |
| DCHECK(IsUint<16>(defining_class) || defining_class == kDexNoIndex) << defining_class; |
| |
| if (item->class_annotations_off_ != 0 && |
| !CheckOffsetToTypeMap(item->class_annotations_off_, DexFile::kDexTypeAnnotationSetItem)) { |
| return false; |
| } |
| |
| // Field annotations follow immediately after the annotations directory. |
| const dex::FieldAnnotationsItem* field_item = |
| reinterpret_cast<const dex::FieldAnnotationsItem*>(item + 1); |
| uint32_t field_count = item->fields_size_; |
| for (uint32_t i = 0; i < field_count; i++) { |
| // The index has already been checked in `CheckIntraAnnotationsDirectoryItem()`. |
| DCHECK_LE(field_item->field_idx_, header_->field_ids_size_); |
| const dex::FieldId& field = dex_file_->GetFieldId(field_item->field_idx_); |
| if (UNLIKELY(field.class_idx_.index_ != defining_class)) { |
| ErrorStringPrintf("Mismatched defining class for field_annotation"); |
| return false; |
| } |
| if (!CheckOffsetToTypeMap(field_item->annotations_off_, DexFile::kDexTypeAnnotationSetItem)) { |
| return false; |
| } |
| field_item++; |
| } |
| |
| // Method annotations follow immediately after field annotations. |
| const dex::MethodAnnotationsItem* method_item = |
| reinterpret_cast<const dex::MethodAnnotationsItem*>(field_item); |
| uint32_t method_count = item->methods_size_; |
| for (uint32_t i = 0; i < method_count; i++) { |
| // The index has already been checked in `CheckIntraAnnotationsDirectoryItem()`. |
| DCHECK_LE(method_item->method_idx_, header_->method_ids_size_); |
| const dex::MethodId& method = dex_file_->GetMethodId(method_item->method_idx_); |
| if (UNLIKELY(method.class_idx_.index_ != defining_class)) { |
| ErrorStringPrintf("Mismatched defining class for method_annotation"); |
| return false; |
| } |
| if (!CheckOffsetToTypeMap(method_item->annotations_off_, DexFile::kDexTypeAnnotationSetItem)) { |
| return false; |
| } |
| method_item++; |
| } |
| |
| // Parameter annotations follow immediately after method annotations. |
| const dex::ParameterAnnotationsItem* parameter_item = |
| reinterpret_cast<const dex::ParameterAnnotationsItem*>(method_item); |
| uint32_t parameter_count = item->parameters_size_; |
| for (uint32_t i = 0; i < parameter_count; i++) { |
| // The index has already been checked in `CheckIntraAnnotationsDirectoryItem()`. |
| DCHECK_LE(parameter_item->method_idx_, header_->method_ids_size_); |
| const dex::MethodId& parameter_method = dex_file_->GetMethodId(parameter_item->method_idx_); |
| if (UNLIKELY(parameter_method.class_idx_.index_ != defining_class)) { |
| ErrorStringPrintf("Mismatched defining class for parameter_annotation"); |
| return false; |
| } |
| if (!CheckOffsetToTypeMap(parameter_item->annotations_off_, |
| DexFile::kDexTypeAnnotationSetRefList)) { |
| return false; |
| } |
| parameter_item++; |
| } |
| |
| ptr_ = reinterpret_cast<const uint8_t*>(parameter_item); |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckInterSectionIterate(size_t offset, |
| uint32_t count, |
| DexFile::MapItemType type) { |
| // Get the right alignment mask for the type of section. |
| size_t alignment_mask; |
| switch (type) { |
| case DexFile::kDexTypeClassDataItem: |
| alignment_mask = sizeof(uint8_t) - 1; |
| break; |
| default: |
| alignment_mask = sizeof(uint32_t) - 1; |
| break; |
| } |
| |
| // Iterate through the items in the section. |
| previous_item_ = nullptr; |
| for (uint32_t i = 0; i < count; i++) { |
| uint32_t new_offset = (offset + alignment_mask) & ~alignment_mask; |
| ptr_ = begin_ + new_offset; |
| const uint8_t* prev_ptr = ptr_; |
| |
| if (MapTypeToBitMask(type) == 0) { |
| ErrorStringPrintf("Unknown map item type %x", type); |
| return false; |
| } |
| |
| // Check depending on the section type. |
| switch (type) { |
| case DexFile::kDexTypeHeaderItem: |
| case DexFile::kDexTypeMethodHandleItem: |
| case DexFile::kDexTypeMapList: |
| case DexFile::kDexTypeTypeList: |
| case DexFile::kDexTypeCodeItem: |
| case DexFile::kDexTypeStringDataItem: |
| case DexFile::kDexTypeDebugInfoItem: |
| case DexFile::kDexTypeAnnotationItem: |
| case DexFile::kDexTypeEncodedArrayItem: |
| case DexFile::kDexTypeHiddenapiClassData: |
| break; |
| case DexFile::kDexTypeStringIdItem: { |
| if (!CheckInterStringIdItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeTypeIdItem: { |
| if (!CheckInterTypeIdItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeProtoIdItem: { |
| if (!CheckInterProtoIdItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeFieldIdItem: { |
| if (!CheckInterFieldIdItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeMethodIdItem: { |
| if (!CheckInterMethodIdItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeClassDefItem: { |
| // There shouldn't be more class definitions than type ids allow. |
| // This is checked in `CheckIntraClassDefItem()` by checking the type |
| // index against `kTypeIdLimit` and rejecting dulicate definitions. |
| DCHECK_LE(i, kTypeIdLimit); |
| if (!CheckInterClassDefItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeCallSiteIdItem: { |
| if (!CheckInterCallSiteIdItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeAnnotationSetRefList: { |
| if (!CheckInterAnnotationSetRefList()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeAnnotationSetItem: { |
| if (!CheckInterAnnotationSetItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeClassDataItem: { |
| // There shouldn't be more class data than type ids allow. |
| // This check should be redundant, since there are checks that the |
| // class_idx_ is within range and that there is only one definition |
| // for a given type id. |
| if (i > kTypeIdLimit) { |
| ErrorStringPrintf("Too many class data items"); |
| return false; |
| } |
| if (!CheckInterClassDataItem()) { |
| return false; |
| } |
| break; |
| } |
| case DexFile::kDexTypeAnnotationsDirectoryItem: { |
| if (!CheckInterAnnotationsDirectoryItem()) { |
| return false; |
| } |
| break; |
| } |
| } |
| |
| previous_item_ = prev_ptr; |
| offset = ptr_ - begin_; |
| } |
| |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckInterSection() { |
| // Eagerly verify that `StringId` offsets map to string data items to make sure |
| // we can retrieve the string data for verifying other items (types, shorties, etc.). |
| // After this we can safely use `DexFile` helpers such as `GetFieldId()` or `GetMethodId()` |
| // but not `PrettyMethod()` or `PrettyField()` as descriptors have not been verified yet. |
| const dex::StringId* string_ids = |
| reinterpret_cast<const dex::StringId*>(begin_ + header_->string_ids_off_); |
| for (size_t i = 0, num_strings = header_->string_ids_size_; i != num_strings; ++i) { |
| if (!CheckOffsetToTypeMap(string_ids[i].string_data_off_, DexFile::kDexTypeStringDataItem)) { |
| return false; |
| } |
| } |
| |
| const dex::MapList* map = reinterpret_cast<const dex::MapList*>(begin_ + header_->map_off_); |
| const dex::MapItem* item = map->list_; |
| uint32_t count = map->size_; |
| |
| // Cross check the items listed in the map. |
| for (; count != 0u; --count) { |
| uint32_t section_offset = item->offset_; |
| uint32_t section_count = item->size_; |
| DexFile::MapItemType type = static_cast<DexFile::MapItemType>(item->type_); |
| bool found = false; |
| |
| switch (type) { |
| case DexFile::kDexTypeHeaderItem: |
| case DexFile::kDexTypeMapList: |
| case DexFile::kDexTypeTypeList: |
| case DexFile::kDexTypeCodeItem: |
| case DexFile::kDexTypeStringDataItem: |
| case DexFile::kDexTypeDebugInfoItem: |
| case DexFile::kDexTypeAnnotationItem: |
| case DexFile::kDexTypeEncodedArrayItem: |
| found = true; |
| break; |
| case DexFile::kDexTypeStringIdItem: |
| case DexFile::kDexTypeTypeIdItem: |
| case DexFile::kDexTypeProtoIdItem: |
| case DexFile::kDexTypeFieldIdItem: |
| case DexFile::kDexTypeMethodIdItem: |
| case DexFile::kDexTypeClassDefItem: |
| case DexFile::kDexTypeCallSiteIdItem: |
| case DexFile::kDexTypeMethodHandleItem: |
| case DexFile::kDexTypeAnnotationSetRefList: |
| case DexFile::kDexTypeAnnotationSetItem: |
| case DexFile::kDexTypeClassDataItem: |
| case DexFile::kDexTypeAnnotationsDirectoryItem: |
| case DexFile::kDexTypeHiddenapiClassData: { |
| if (!CheckInterSectionIterate(section_offset, section_count, type)) { |
| return false; |
| } |
| found = true; |
| break; |
| } |
| } |
| |
| if (!found) { |
| ErrorStringPrintf("Unknown map item type %x", item->type_); |
| return false; |
| } |
| |
| item++; |
| } |
| |
| return true; |
| } |
| |
| bool DexFileVerifier::Verify() { |
| // Check the header. |
| if (!CheckHeader()) { |
| return false; |
| } |
| |
| // Check the map section. |
| if (!CheckMap()) { |
| return false; |
| } |
| |
| DCHECK_LE(header_->type_ids_size_, kTypeIdLimit + 1u); // Checked in CheckHeader(). |
| verified_type_descriptors_.resize(header_->type_ids_size_, 0); |
| defined_class_indexes_.resize(header_->type_ids_size_); |
| |
| // Check structure within remaining sections. |
| if (!CheckIntraSection()) { |
| return false; |
| } |
| |
| // Check references from one section to another. |
| if (!CheckInterSection()) { |
| return false; |
| } |
| |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckFieldAccessFlags(uint32_t idx, |
| uint32_t field_access_flags, |
| uint32_t class_access_flags, |
| std::string* error_msg) { |
| // Generally sort out >16-bit flags. |
| if ((field_access_flags & ~kAccJavaFlagsMask) != 0) { |
| *error_msg = StringPrintf("Bad field access_flags for %s: %x(%s)", |
| GetFieldDescription(begin_, header_, idx).c_str(), |
| field_access_flags, |
| PrettyJavaAccessFlags(field_access_flags).c_str()); |
| return false; |
| } |
| |
| // Flags allowed on fields, in general. Other lower-16-bit flags are to be ignored. |
| constexpr uint32_t kFieldAccessFlags = kAccPublic | |
| kAccPrivate | |
| kAccProtected | |
| kAccStatic | |
| kAccFinal | |
| kAccVolatile | |
| kAccTransient | |
| kAccSynthetic | |
| kAccEnum; |
| |
| // Fields may have only one of public/protected/final. |
| if (!CheckAtMostOneOfPublicProtectedPrivate(field_access_flags)) { |
| *error_msg = StringPrintf("Field may have only one of public/protected/private, %s: %x(%s)", |
| GetFieldDescription(begin_, header_, idx).c_str(), |
| field_access_flags, |
| PrettyJavaAccessFlags(field_access_flags).c_str()); |
| return false; |
| } |
| |
| // Interfaces have a pretty restricted list. |
| if ((class_access_flags & kAccInterface) != 0) { |
| // Interface fields must be public final static. |
| constexpr uint32_t kPublicFinalStatic = kAccPublic | kAccFinal | kAccStatic; |
| if ((field_access_flags & kPublicFinalStatic) != kPublicFinalStatic) { |
| *error_msg = StringPrintf("Interface field is not public final static, %s: %x(%s)", |
| GetFieldDescription(begin_, header_, idx).c_str(), |
| field_access_flags, |
| PrettyJavaAccessFlags(field_access_flags).c_str()); |
| if (dex_file_->SupportsDefaultMethods()) { |
| return false; |
| } else { |
| // Allow in older versions, but warn. |
| LOG(WARNING) << "This dex file is invalid and will be rejected in the future. Error is: " |
| << *error_msg; |
| } |
| } |
| // Interface fields may be synthetic, but may not have other flags. |
| constexpr uint32_t kDisallowed = ~(kPublicFinalStatic | kAccSynthetic); |
| if ((field_access_flags & kFieldAccessFlags & kDisallowed) != 0) { |
| *error_msg = StringPrintf("Interface field has disallowed flag, %s: %x(%s)", |
| GetFieldDescription(begin_, header_, idx).c_str(), |
| field_access_flags, |
| PrettyJavaAccessFlags(field_access_flags).c_str()); |
| if (dex_file_->SupportsDefaultMethods()) { |
| return false; |
| } else { |
| // Allow in older versions, but warn. |
| LOG(WARNING) << "This dex file is invalid and will be rejected in the future. Error is: " |
| << *error_msg; |
| } |
| } |
| return true; |
| } |
| |
| // Volatile fields may not be final. |
| constexpr uint32_t kVolatileFinal = kAccVolatile | kAccFinal; |
| if ((field_access_flags & kVolatileFinal) == kVolatileFinal) { |
| *error_msg = StringPrintf("Fields may not be volatile and final: %s", |
| GetFieldDescription(begin_, header_, idx).c_str()); |
| return false; |
| } |
| |
| return true; |
| } |
| |
| void DexFileVerifier::FindStringRangesForMethodNames() { |
| // Use DexFile::StringId* as RandomAccessIterator. |
| const dex::StringId* first = reinterpret_cast<const dex::StringId*>( |
| begin_ + header_->string_ids_off_); |
| const dex::StringId* last = first + header_->string_ids_size_; |
| |
| auto get_string = [begin = begin_](const dex::StringId& id) { |
| const uint8_t* str_data_ptr = begin + id.string_data_off_; |
| DecodeUnsignedLeb128(&str_data_ptr); |
| return reinterpret_cast<const char*>(str_data_ptr); |
| }; |
| auto compare = [&get_string](const dex::StringId& lhs, const char* rhs) { |
| return CompareModifiedUtf8ToModifiedUtf8AsUtf16CodePointValues(get_string(lhs), rhs) < 0; |
| }; |
| |
| // '=' follows '<' |
| static_assert('<' + 1 == '=', "Unexpected character relation"); |
| const auto angle_end = std::lower_bound(first, last, "=", compare); |
| init_indices_.angle_bracket_end_index = angle_end - first; |
| |
| const auto angle_start = std::lower_bound(first, angle_end, "<", compare); |
| init_indices_.angle_bracket_start_index = angle_start - first; |
| if (angle_start == angle_end) { |
| // No strings starting with '<'. |
| init_indices_.angle_init_angle_index = std::numeric_limits<size_t>::max(); |
| init_indices_.angle_clinit_angle_index = std::numeric_limits<size_t>::max(); |
| return; |
| } |
| |
| { |
| constexpr const char* kClinit = "<clinit>"; |
| const auto it = std::lower_bound(angle_start, angle_end, kClinit, compare); |
| if (it != angle_end && strcmp(get_string(*it), kClinit) == 0) { |
| init_indices_.angle_clinit_angle_index = it - first; |
| } else { |
| init_indices_.angle_clinit_angle_index = std::numeric_limits<size_t>::max(); |
| } |
| } |
| { |
| constexpr const char* kInit = "<init>"; |
| const auto it = std::lower_bound(angle_start, angle_end, kInit, compare); |
| if (it != angle_end && strcmp(get_string(*it), kInit) == 0) { |
| init_indices_.angle_init_angle_index = it - first; |
| } else { |
| init_indices_.angle_init_angle_index = std::numeric_limits<size_t>::max(); |
| } |
| } |
| } |
| |
| bool DexFileVerifier::CheckMethodAccessFlags(uint32_t method_index, |
| uint32_t method_access_flags, |
| uint32_t class_access_flags, |
| uint32_t constructor_flags_by_name, |
| bool has_code, |
| bool expect_direct, |
| std::string* error_msg) { |
| // Generally sort out >16-bit flags, except dex knows Constructor and DeclaredSynchronized. |
| constexpr uint32_t kAllMethodFlags = |
| kAccJavaFlagsMask | kAccConstructor | kAccDeclaredSynchronized; |
| if ((method_access_flags & ~kAllMethodFlags) != 0) { |
| *error_msg = StringPrintf("Bad method access_flags for %s: %x", |
| GetMethodDescription(begin_, header_, method_index).c_str(), |
| method_access_flags); |
| return false; |
| } |
| |
| // Flags allowed on methods, in general. Other lower-16-bit flags are to be ignored. |
| constexpr uint32_t kMethodAccessFlags = kAccPublic | |
| kAccPrivate | |
| kAccProtected | |
| kAccStatic | |
| kAccFinal | |
| kAccSynthetic | |
| kAccSynchronized | |
| kAccBridge | |
| kAccVarargs | |
| kAccNative | |
| kAccAbstract | |
| kAccStrict; |
| |
| // Methods may have only one of public/protected/final. |
| if (!CheckAtMostOneOfPublicProtectedPrivate(method_access_flags)) { |
| *error_msg = StringPrintf("Method may have only one of public/protected/private, %s: %x", |
| GetMethodDescription(begin_, header_, method_index).c_str(), |
| method_access_flags); |
| return false; |
| } |
| |
| constexpr uint32_t kConstructorFlags = kAccStatic | kAccConstructor; |
| const bool is_constructor_by_name = (constructor_flags_by_name & kConstructorFlags) != 0; |
| const bool is_clinit_by_name = constructor_flags_by_name == kConstructorFlags; |
| |
| // Only methods named "<clinit>" or "<init>" may be marked constructor. Note: we cannot enforce |
| // the reverse for backwards compatibility reasons. |
| if (((method_access_flags & kAccConstructor) != 0) && !is_constructor_by_name) { |
| *error_msg = |
| StringPrintf("Method %" PRIu32 "(%s) is marked constructor, but doesn't match name", |
| method_index, |
| GetMethodDescription(begin_, header_, method_index).c_str()); |
| return false; |
| } |
| |
| if (is_constructor_by_name) { |
| // Check that the static constructor (= static initializer) is named "<clinit>" and that the |
| // instance constructor is called "<init>". |
| bool is_static = (method_access_flags & kAccStatic) != 0; |
| if (is_static ^ is_clinit_by_name) { |
| *error_msg = StringPrintf("Constructor %" PRIu32 "(%s) is not flagged correctly wrt/ static.", |
| method_index, |
| GetMethodDescription(begin_, header_, method_index).c_str()); |
| if (dex_file_->SupportsDefaultMethods()) { |
| return false; |
| } else { |
| // Allow in older versions, but warn. |
| LOG(WARNING) << "This dex file is invalid and will be rejected in the future. Error is: " |
| << *error_msg; |
| } |
| } |
| } |
| |
| // Check that static and private methods, as well as constructors, are in the direct methods list, |
| // and other methods in the virtual methods list. |
| bool is_direct = ((method_access_flags & (kAccStatic | kAccPrivate)) != 0) || |
| is_constructor_by_name; |
| if (is_direct != expect_direct) { |
| *error_msg = StringPrintf("Direct/virtual method %" PRIu32 "(%s) not in expected list %d", |
| method_index, |
| GetMethodDescription(begin_, header_, method_index).c_str(), |
| expect_direct); |
| return false; |
| } |
| |
| // From here on out it is easier to mask out the bits we're supposed to ignore. |
| method_access_flags &= kMethodAccessFlags; |
| |
| // Interfaces are special. |
| if ((class_access_flags & kAccInterface) != 0) { |
| // Non-static interface methods must be public or private. |
| uint32_t desired_flags = (kAccPublic | kAccStatic); |
| if (dex_file_->SupportsDefaultMethods()) { |
| desired_flags |= kAccPrivate; |
| } |
| if ((method_access_flags & desired_flags) == 0) { |
| *error_msg = StringPrintf("Interface virtual method %" PRIu32 "(%s) is not public", |
| method_index, |
| GetMethodDescription(begin_, header_, method_index).c_str()); |
| if (dex_file_->SupportsDefaultMethods()) { |
| return false; |
| } else { |
| // Allow in older versions, but warn. |
| LOG(WARNING) << "This dex file is invalid and will be rejected in the future. Error is: " |
| << *error_msg; |
| } |
| } |
| } |
| |
| // If there aren't any instructions, make sure that's expected. |
| if (!has_code) { |
| // Only native or abstract methods may not have code. |
| if ((method_access_flags & (kAccNative | kAccAbstract)) == 0) { |
| *error_msg = StringPrintf("Method %" PRIu32 "(%s) has no code, but is not marked native or " |
| "abstract", |
| method_index, |
| GetMethodDescription(begin_, header_, method_index).c_str()); |
| return false; |
| } |
| // Constructors must always have code. |
| if (is_constructor_by_name) { |
| *error_msg = StringPrintf("Constructor %u(%s) must not be abstract or native", |
| method_index, |
| GetMethodDescription(begin_, header_, method_index).c_str()); |
| if (dex_file_->SupportsDefaultMethods()) { |
| return false; |
| } else { |
| // Allow in older versions, but warn. |
| LOG(WARNING) << "This dex file is invalid and will be rejected in the future. Error is: " |
| << *error_msg; |
| } |
| } |
| if ((method_access_flags & kAccAbstract) != 0) { |
| // Abstract methods are not allowed to have the following flags. |
| constexpr uint32_t kForbidden = |
| kAccPrivate | kAccStatic | kAccFinal | kAccNative | kAccStrict | kAccSynchronized; |
| if ((method_access_flags & kForbidden) != 0) { |
| *error_msg = StringPrintf("Abstract method %" PRIu32 "(%s) has disallowed access flags %x", |
| method_index, |
| GetMethodDescription(begin_, header_, method_index).c_str(), |
| method_access_flags); |
| return false; |
| } |
| // Abstract methods should be in an abstract class or interface. |
| if ((class_access_flags & (kAccInterface | kAccAbstract)) == 0) { |
| LOG(WARNING) << "Method " << GetMethodDescription(begin_, header_, method_index) |
| << " is abstract, but the declaring class is neither abstract nor an " |
| << "interface in dex file " |
| << dex_file_->GetLocation(); |
| } |
| } |
| // Interfaces are special. |
| if ((class_access_flags & kAccInterface) != 0) { |
| // Interface methods without code must be abstract. |
| if ((method_access_flags & (kAccPublic | kAccAbstract)) != (kAccPublic | kAccAbstract)) { |
| *error_msg = StringPrintf("Interface method %" PRIu32 "(%s) is not public and abstract", |
| method_index, |
| GetMethodDescription(begin_, header_, method_index).c_str()); |
| if (dex_file_->SupportsDefaultMethods()) { |
| return false; |
| } else { |
| // Allow in older versions, but warn. |
| LOG(WARNING) << "This dex file is invalid and will be rejected in the future. Error is: " |
| << *error_msg; |
| } |
| } |
| // At this point, we know the method is public and abstract. This means that all the checks |
| // for invalid combinations above applies. In addition, interface methods must not be |
| // protected. This is caught by the check for only-one-of-public-protected-private. |
| } |
| return true; |
| } |
| |
| // When there's code, the method must not be native or abstract. |
| if ((method_access_flags & (kAccNative | kAccAbstract)) != 0) { |
| *error_msg = StringPrintf("Method %" PRIu32 "(%s) has code, but is marked native or abstract", |
| method_index, |
| GetMethodDescription(begin_, header_, method_index).c_str()); |
| return false; |
| } |
| |
| // Instance constructors must not be synchronized and a few other flags. |
| if (constructor_flags_by_name == kAccConstructor) { |
| static constexpr uint32_t kInitAllowed = |
| kAccPrivate | kAccProtected | kAccPublic | kAccStrict | kAccVarargs | kAccSynthetic; |
| if ((method_access_flags & ~kInitAllowed) != 0) { |
| *error_msg = StringPrintf("Constructor %" PRIu32 "(%s) flagged inappropriately %x", |
| method_index, |
| GetMethodDescription(begin_, header_, method_index).c_str(), |
| method_access_flags); |
| return false; |
| } |
| } |
| |
| return true; |
| } |
| |
| bool DexFileVerifier::CheckConstructorProperties( |
| uint32_t method_index, |
| uint32_t constructor_flags) { |
| DCHECK(constructor_flags == kAccConstructor || |
| constructor_flags == (kAccConstructor | kAccStatic)); |
| |
| // Check signature matches expectations. |
| // The `method_index` has already been checked in `CheckIntraClassDataItemMethods()`. |
| CHECK_LT(method_index, header_->method_ids_size_); |
| const dex::MethodId& method_id = dex_file_->GetMethodId(method_index); |
| |
| // The `method_id.proto_idx_` has already been checked in `CheckIntraMethodIdItem()` |
| DCHECK_LE(method_id.proto_idx_.index_, header_->proto_ids_size_); |
| |
| Signature signature = dex_file_->GetMethodSignature(method_id); |
| if (constructor_flags == (kAccStatic | kAccConstructor)) { |
| if (!signature.IsVoid() || signature.GetNumberOfParameters() != 0) { |
| ErrorStringPrintf("<clinit> must have descriptor ()V"); |
| return false; |
| } |
| } else if (!signature.IsVoid()) { |
| ErrorStringPrintf("Constructor %u(%s) must be void", |
| method_index, |
| GetMethodDescription(begin_, header_, method_index).c_str()); |
| return false; |
| } |
| |
| return true; |
| } |
| |
| bool Verify(const DexFile* dex_file, |
| const char* location, |
| bool verify_checksum, |
| std::string* error_msg) { |
| std::unique_ptr<DexFileVerifier> verifier( |
| new DexFileVerifier(dex_file, location, verify_checksum)); |
| if (!verifier->Verify()) { |
| *error_msg = verifier->FailureReason(); |
| return false; |
| } |
| return true; |
| } |
| |
| } // namespace dex |
| } // namespace art |