splhack created this revision. Herald added subscribers: danielkiss, krytarowski. Herald added a project: All. splhack added reviewers: clayborg, labath, lanza, srhines. splhack published this revision for review. Herald added a project: LLDB. Herald added a subscriber: lldb-commits.
In Android API level 23 and above, dynamic loader is able to load .so file directly from APK, which is zip file. https://android.googlesource.com/platform/bionic/+/master/ android-changes-for-ndk-developers.md# opening-shared-libraries-directly-from-an-apk The .so file is page aligned and uncompressed, so ObjectFileELF::GetModuleSpecifications works with .so file offset and size directly from zip file without extracting it. (D152757 <https://reviews.llvm.org/D152757>) GDBRemoteCommunicationServerCommon::GetModuleInfo returns a module spec to LLDB with "zip_path!/so_path" file spec, which is passed through from Android dynamic loader, and the .so file offset and size. PlatformAndroid::DownloadModuleSlice uses 'shell dd' to download the .so file slice from the zip file with the .so file offset and size. Depends on D152494 <https://reviews.llvm.org/D152494> and D152712 <https://reviews.llvm.org/D152712> and D152757 <https://reviews.llvm.org/D152757> Repository: rG LLVM Github Monorepo https://reviews.llvm.org/D152759 Files: lldb/include/lldb/Host/android/HostInfoAndroid.h lldb/source/Host/CMakeLists.txt lldb/source/Host/android/HostInfoAndroid.cpp lldb/source/Host/android/ZipFile.cpp lldb/source/Host/android/ZipFile.h lldb/source/Plugins/Platform/Android/PlatformAndroid.cpp lldb/source/Plugins/Process/gdb-remote/GDBRemoteCommunicationServerCommon.cpp lldb/unittests/Host/CMakeLists.txt lldb/unittests/Host/android/CMakeLists.txt lldb/unittests/Host/android/HostInfoAndroidTest.cpp lldb/unittests/Host/android/Inputs/zip-test.zip
Index: lldb/unittests/Host/android/HostInfoAndroidTest.cpp =================================================================== --- /dev/null +++ lldb/unittests/Host/android/HostInfoAndroidTest.cpp @@ -0,0 +1,67 @@ +//===-- HostInfoAndroidTest.cpp -------------------------------------------===// +// +// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. +// See https://llvm.org/LICENSE.txt for license information. +// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception +// +//===----------------------------------------------------------------------===// + +#include "lldb/Host/android/HostInfoAndroid.h" +#include "TestingSupport/SubsystemRAII.h" +#include "TestingSupport/TestUtilities.h" +#include "gtest/gtest.h" + +using namespace lldb_private; +using namespace llvm; + +namespace { +class HostInfoAndroidTest : public ::testing::Test { + SubsystemRAII<FileSystem> subsystems; +}; + +std::string TestZipPath() { + FileSpec zip_spec(GetInputFilePath("zip-test.zip")); + FileSystem::Instance().Resolve(zip_spec); + return zip_spec.GetPath(); +} +} // namespace + +TEST_F(HostInfoAndroidTest, ResolveZipPathWithNormalFile) { + const FileSpec file_spec("/system/lib64/libtest.so"); + + std::string file_path; + lldb::offset_t file_offset; + lldb::offset_t file_size; + ASSERT_TRUE(HostInfoAndroid::ResolveZipPath(file_spec, file_path, + file_offset, file_size)); + + EXPECT_EQ(file_path, file_spec.GetPath()); + EXPECT_EQ(file_offset, 0UL); + EXPECT_EQ(file_size, 0UL); +} + +TEST_F(HostInfoAndroidTest, ResolveZipPathWithZipMissing) { + const std::string zip_path = TestZipPath(); + const FileSpec file_spec(zip_path + "!/lib/arm64-v8a/libmissing.so"); + + std::string file_path; + lldb::offset_t file_offset; + lldb::offset_t file_size; + ASSERT_FALSE(HostInfoAndroid::ResolveZipPath(file_spec, file_path, + file_offset, file_size)); +} + +TEST_F(HostInfoAndroidTest, ResolveZipPathWithZipExisting) { + const std::string zip_path = TestZipPath(); + const FileSpec file_spec(zip_path + "!/lib/arm64-v8a/libzip-test.so"); + + std::string file_path; + lldb::offset_t file_offset; + lldb::offset_t file_size; + ASSERT_TRUE(HostInfoAndroid::ResolveZipPath(file_spec, file_path, + file_offset, file_size)); + + EXPECT_EQ(file_path, zip_path); + EXPECT_EQ(file_offset, 4096UL); + EXPECT_EQ(file_size, 3600UL); +} Index: lldb/unittests/Host/android/CMakeLists.txt =================================================================== --- /dev/null +++ lldb/unittests/Host/android/CMakeLists.txt @@ -0,0 +1,15 @@ +set (FILES + HostInfoAndroidTest.cpp +) + +add_lldb_unittest(HostAndroidTests + ${FILES} + LINK_LIBS + lldbHost + lldbUtilityHelpers + ) + +set(test_inputs + zip-test.zip + ) +add_unittest_inputs(HostAndroidTests "${test_inputs}") Index: lldb/unittests/Host/CMakeLists.txt =================================================================== --- lldb/unittests/Host/CMakeLists.txt +++ lldb/unittests/Host/CMakeLists.txt @@ -38,3 +38,7 @@ LLVMTestingSupport LLVMTargetParser ) + +if (CMAKE_SYSTEM_NAME MATCHES "Linux|Android") + add_subdirectory(android) +endif() Index: lldb/source/Plugins/Process/gdb-remote/GDBRemoteCommunicationServerCommon.cpp =================================================================== --- lldb/source/Plugins/Process/gdb-remote/GDBRemoteCommunicationServerCommon.cpp +++ lldb/source/Plugins/Process/gdb-remote/GDBRemoteCommunicationServerCommon.cpp @@ -1326,10 +1326,33 @@ const FileSpec module_path_spec = FindModuleFile(req_module_path_spec.GetPath(), arch); - const ModuleSpec module_spec(module_path_spec, arch); + + lldb::offset_t file_offset = 0; + lldb::offset_t file_size = 0; +#ifdef __ANDROID__ + // In Android API level 23 and above, dynamic loader is able to load .so file + // directly from zip file. In that case, module_path will be + // "zip_path!/so_path". Resolve the zip file path, .so file offset and size. + // file_offset will be an non-zero for zip .so file, zero for normal file. + std::string file_path; + if (!HostInfoAndroid::ResolveZipPath(module_path_spec, file_path, + file_offset, file_size)) { + return ModuleSpec(); + } + // For zip .so file, this file_path will contain only the actual zip file + // path for the object file processing. Otherwise it is the same as + // module_path. + const FileSpec actual_module_path_spec(file_path); +#else + // It is just module_path_spec reference for other platforms. + const FileSpec &actual_module_path_spec = module_path_spec; +#endif + + const ModuleSpec module_spec(actual_module_path_spec, arch); ModuleSpecList module_specs; - if (!ObjectFile::GetModuleSpecifications(module_path_spec, 0, 0, + if (!ObjectFile::GetModuleSpecifications(actual_module_path_spec, + file_offset, file_size, module_specs)) return ModuleSpec(); @@ -1337,6 +1360,15 @@ if (!module_specs.FindMatchingModuleSpec(module_spec, matched_module_spec)) return ModuleSpec(); +#ifdef __ANDROID__ + if (file_offset > 0) { + // For zip .so file, matched_module_spec contains only the actual zip file + // path. Overwrite the matched_module_spec file spec with the original + // module_path_spec. + *matched_module_spec.GetFileSpecPtr() = module_path_spec; + } +#endif + return matched_module_spec; } Index: lldb/source/Plugins/Platform/Android/PlatformAndroid.cpp =================================================================== --- lldb/source/Plugins/Platform/Android/PlatformAndroid.cpp +++ lldb/source/Plugins/Platform/Android/PlatformAndroid.cpp @@ -238,10 +238,38 @@ const uint64_t src_offset, const uint64_t src_size, const FileSpec &dst_file_spec) { - if (src_offset != 0) - return Status("Invalid offset - %" PRIu64, src_offset); + // In Android API level 23 and above, dynamic loader is able to load .so + // file directly from APK. In that case, src_offset will be an non-zero. + if (src_offset == 0) // Use GetFile for a normal file. + return GetFile(src_file_spec, dst_file_spec); - return GetFile(src_file_spec, dst_file_spec); + std::string source_file = src_file_spec.GetPath(false); + if (source_file.find('\'') != std::string::npos) + return Status("Doesn't support single-quotes in filenames"); + + // For zip .so file, src_file_spec will be "zip_path!/so_path". + // Extract "zip_path" from the source path. + const std::string kZipSeparator = "!/"; + auto pos = source_file.find(kZipSeparator); + if (pos != std::string::npos) + source_file = source_file.substr(0, pos); + + AdbClient adb(m_device_id); + + // Use 'run-as' if necessary. + char run_as_cmd[PATH_MAX]; + if (const char *run_as = std::getenv("ANDROID_PLATFORM_RUN_AS")) + snprintf(run_as_cmd, sizeof(run_as_cmd), "run-as '%s' ", run_as); + else + run_as_cmd[0] = '\0'; + + // Use 'shell dd' to download the file slice with the offset and size. + char cmd[PATH_MAX * 2]; + snprintf(cmd, sizeof(cmd), "%sdd if='%s' iflag=skip_bytes,count_bytes " + "skip=%" PRIu64 " count=%" PRIu64 " status=none", + run_as_cmd, source_file.c_str(), src_offset, src_size); + + return adb.ShellToFile(cmd, minutes(1), dst_file_spec); } Status PlatformAndroid::DisconnectRemote() { Index: lldb/source/Host/android/ZipFile.h =================================================================== --- /dev/null +++ lldb/source/Host/android/ZipFile.h @@ -0,0 +1,32 @@ +//===-- ZipFile.h -----------------------------------------------*- C++ -*-===// +// +// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. +// See https://llvm.org/LICENSE.txt for license information. +// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception +// +//===----------------------------------------------------------------------===// + +#ifndef lldb_Host_android_ZipFile_h_ +#define lldb_Host_android_ZipFile_h_ + +#include "lldb/lldb-types.h" +#include <string> + +namespace lldb_private { + +/// In Android API level 23 and above, dynamic loader is able to load .so file +/// directly from APK or .zip file. This is a utility class to find .so file +/// offset and size from zip file. +/// https://android.googlesource.com/platform/bionic/+/master/ +/// android-changes-for-ndk-developers.md +/// #opening-shared-libraries-directly-from-an-apk + +class ZipFile { +public: + static bool Find(lldb::DataBufferSP zip_data, const std::string &so_path, + lldb::offset_t &file_offset, lldb::offset_t &file_size); +}; + +} // end of namespace lldb_private + +#endif // #ifndef lldb_Host_android_ZipFile_h_ Index: lldb/source/Host/android/ZipFile.cpp =================================================================== --- /dev/null +++ lldb/source/Host/android/ZipFile.cpp @@ -0,0 +1,177 @@ +//===-- ZipFile.cpp -------------------------------------------------------===// +// +// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. +// See https://llvm.org/LICENSE.txt for license information. +// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception +// +//===----------------------------------------------------------------------===// + +#include "lldb/Utility/DataBuffer.h" +#include "llvm/Support/Endian.h" +#include "ZipFile.h" + +using namespace lldb_private; +using namespace llvm::support; + +namespace { + +// Zip headers. +// https://pkware.cachefly.net/webdocs/casestudies/APPNOTE.TXT + +// The end of central directory record. +struct EocdRecord { + static constexpr char kSignature[] = {0x50, 0x4b, 0x05, 0x06}; + char signature[sizeof(kSignature)]; + unaligned_uint16_t disks; + unaligned_uint16_t cd_start_disk; + unaligned_uint16_t cds_on_this_disk; + unaligned_uint16_t cd_records; + unaligned_uint32_t cd_size; + unaligned_uint32_t cd_offset; + unaligned_uint16_t comment_length; +}; + +// Logical find limit for the end of central directory record. +const size_t kEocdRecordFindLimit = sizeof(EocdRecord) + + std::numeric_limits<decltype(EocdRecord::comment_length)>::max(); + +// Central directory record. +struct CdRecord { + static constexpr char kSignature[] = {0x50, 0x4b, 0x01, 0x02}; + char signature[sizeof(kSignature)]; + unaligned_uint16_t version_made_by; + unaligned_uint16_t version_needed_to_extract; + unaligned_uint16_t general_purpose_bit_flag; + unaligned_uint16_t compression_method; + unaligned_uint16_t last_modification_time; + unaligned_uint16_t last_modification_date; + unaligned_uint32_t crc32; + unaligned_uint32_t compressed_size; + unaligned_uint32_t uncompressed_size; + unaligned_uint16_t file_name_length; + unaligned_uint16_t extra_field_length; + unaligned_uint16_t comment_length; + unaligned_uint16_t file_start_disk; + unaligned_uint16_t internal_file_attributes; + unaligned_uint32_t external_file_attributes; + unaligned_uint32_t local_file_header_offset; +}; +// Immediately after CdRecord, +// - file name (file_name_length) +// - extra field (extra_field_length) +// - comment (comment_length) + +// Local file header. +struct LocalFileHeader { + static constexpr char kSignature[] = {0x50, 0x4b, 0x03, 0x04}; + char signature[sizeof(kSignature)]; + unaligned_uint16_t version_needed_to_extract; + unaligned_uint16_t general_purpose_bit_flag; + unaligned_uint16_t compression_method; + unaligned_uint16_t last_modification_time; + unaligned_uint16_t last_modification_date; + unaligned_uint32_t crc32; + unaligned_uint32_t compressed_size; + unaligned_uint32_t uncompressed_size; + unaligned_uint16_t file_name_length; + unaligned_uint16_t extra_field_length; +}; +// Immediately after LocalFileHeader, +// - file name (file_name_length) +// - extra field (extra_field_length) +// - file data (should be compressed_size == uncompressed_size, page aligned) + +const EocdRecord *FindEocdRecord(lldb::DataBufferSP zip_data) { + // Find backward the end of central directory record from the end of the zip + // file to the find limit. + auto zip_data_end = zip_data->GetBytes() + zip_data->GetByteSize(); + auto find_limit = zip_data_end - kEocdRecordFindLimit; + auto p = zip_data_end - sizeof(EocdRecord); + for (; p >= zip_data->GetBytes() && p >= find_limit; p--) { + auto eocd = reinterpret_cast<const EocdRecord *>(p); + if (::memcmp(eocd->signature, EocdRecord::kSignature, + sizeof(EocdRecord::kSignature)) == 0) { + // Sanity check the values. + if (eocd->cd_records * sizeof(CdRecord) > eocd->cd_size || + zip_data->GetBytes() + eocd->cd_offset + eocd->cd_size > p) + return nullptr; + + // This is a valid record. + return eocd; + } + } + return nullptr; +} + +bool GetFile(lldb::DataBufferSP zip_data, uint32_t local_file_header_offset, + lldb::offset_t &file_offset, lldb::offset_t &file_size) { + auto local_file_header = reinterpret_cast<const LocalFileHeader *>( + zip_data->GetBytes() + local_file_header_offset); + // The signature should match. + if (::memcmp(local_file_header->signature, LocalFileHeader::kSignature, + sizeof(LocalFileHeader::kSignature)) != 0) + return false; + + auto file_data = reinterpret_cast<const uint8_t *>(local_file_header + 1) + + local_file_header->file_name_length + local_file_header->extra_field_length; + // File should be uncompressed. + if (local_file_header->compressed_size != local_file_header->uncompressed_size) + return false; + + // This file is valid. Return the file offset and size. + file_offset = file_data - zip_data->GetBytes(); + file_size = local_file_header->uncompressed_size; + return true; +} + +bool FindFile(lldb::DataBufferSP zip_data, const EocdRecord *eocd, + const std::string &path, lldb::offset_t &file_offset, + lldb::offset_t &file_size) { + // Find the file from the central directory records. + auto cd = reinterpret_cast<const CdRecord *>(zip_data->GetBytes() + + eocd->cd_offset); + size_t cd_records = eocd->cd_records; + for (size_t i = 0; i < cd_records; i++) { + // The signature should match. + if (::memcmp(cd->signature, CdRecord::kSignature, + sizeof(CdRecord::kSignature)) != 0) + return false; + + // Sanity check the file name values. + auto file_name = reinterpret_cast<const char *>(cd + 1); + size_t file_name_length = cd->file_name_length; + if (file_name + file_name_length >= reinterpret_cast<const char *>(eocd) || + file_name_length == 0) + return false; + + // Compare the file name. + if (path.size() == file_name_length && + ::strncmp(path.c_str(), file_name, file_name_length) == 0) { + // Found the file. + return GetFile(zip_data, cd->local_file_header_offset, file_offset, + file_size); + } else { + // Skip to the next central directory record. + cd = reinterpret_cast<const CdRecord *>( + reinterpret_cast<const char *>(cd) + sizeof(CdRecord) + + cd->file_name_length + cd->extra_field_length + cd->comment_length); + // Sanity check the pointer. + if (reinterpret_cast<const char *>(cd) >= + reinterpret_cast<const char *>(eocd)) + return false; + } + } + + return false; +} + +} // end anonymous namespace + +bool ZipFile::Find(lldb::DataBufferSP zip_data, const std::string &so_path, + lldb::offset_t &file_offset, lldb::offset_t &file_size) { + const EocdRecord *eocd = FindEocdRecord(zip_data); + if (!eocd) + return false; + + return FindFile(zip_data, eocd, so_path, file_offset, file_size); +} Index: lldb/source/Host/android/HostInfoAndroid.cpp =================================================================== --- lldb/source/Host/android/HostInfoAndroid.cpp +++ lldb/source/Host/android/HostInfoAndroid.cpp @@ -11,6 +11,7 @@ #include "lldb/Host/linux/HostInfoLinux.h" #include "llvm/ADT/SmallVector.h" #include "llvm/ADT/StringRef.h" +#include "ZipFile.h" using namespace lldb_private; using namespace llvm; @@ -92,3 +93,42 @@ return FileSystem::Instance().Exists(file_spec); } + +bool HostInfoAndroid::ResolveZipPath(const FileSpec &file_spec, + std::string &file_path, + lldb::offset_t &file_offset, + lldb::offset_t &file_size) { + // In Android API level 23 and above, dynamic loader is able to load .so + // file directly from APK. .so file should be page aligned and uncompressed. + // In that case, the path will be "zip_path!/so_path". + // https://android.googlesource.com/platform/bionic/+/master/ + // android-changes-for-ndk-developers.md + // #opening-shared-libraries-directly-from-an-apk + const std::string kZipSeparator = "!/"; + auto path = file_spec.GetPath(); + auto pos = path.find(kZipSeparator); + if (pos == std::string::npos) { + // This path is a normal file. Offset and size should be 0. + file_path = path; + file_offset = 0; + file_size = 0; + return true; + } + + // This path is zip .so path. Try to find the .so file from the zip file. + auto zip_path = path.substr(0, pos); + auto so_path = path.substr(pos + kZipSeparator.size()); + + auto zip_file_spec = FileSpec(zip_path); + auto zip_file_size = FileSystem::Instance().GetByteSize(zip_file_spec); + auto zip_data = FileSystem::Instance().CreateDataBuffer(zip_file_spec, + zip_file_size, + 0); + if (ZipFile::Find(zip_data, so_path, file_offset, file_size)) { + // Found the .so file from the zip file and got the file offset and size. + file_path = zip_path; + return true; + } + + return false; +} Index: lldb/source/Host/CMakeLists.txt =================================================================== --- lldb/source/Host/CMakeLists.txt +++ lldb/source/Host/CMakeLists.txt @@ -106,12 +106,19 @@ linux/LibcGlue.cpp linux/Support.cpp ) + + set(ANDROID_SOURCES + android/ZipFile.cpp + android/HostInfoAndroid.cpp + ) if (CMAKE_SYSTEM_NAME MATCHES "Android") - add_host_subdirectory(android - android/HostInfoAndroid.cpp + list(APPEND ANDROID_SOURCES android/LibcGlue.cpp ) endif() + add_host_subdirectory(android + ${ANDROID_SOURCES} + ) elseif (CMAKE_SYSTEM_NAME MATCHES "FreeBSD") add_host_subdirectory(freebsd freebsd/Host.cpp Index: lldb/include/lldb/Host/android/HostInfoAndroid.h =================================================================== --- lldb/include/lldb/Host/android/HostInfoAndroid.h +++ lldb/include/lldb/Host/android/HostInfoAndroid.h @@ -20,6 +20,10 @@ static FileSpec GetDefaultShell(); static FileSpec ResolveLibraryPath(const std::string &path, const ArchSpec &arch); + static bool ResolveZipPath(const FileSpec &file_spec, + std::string &file_path, + lldb::offset_t &file_offset, + lldb::offset_t &file_size); protected: static void ComputeHostArchitectureSupport(ArchSpec &arch_32,
_______________________________________________ lldb-commits mailing list lldb-commits@lists.llvm.org https://lists.llvm.org/cgi-bin/mailman/listinfo/lldb-commits