Home | History | Annotate | Download | only in runtime
      1 /*
      2  * Copyright (C) 2011 The Android Open Source Project
      3  *
      4  * Licensed under the Apache License, Version 2.0 (the "License");
      5  * you may not use this file except in compliance with the License.
      6  * You may obtain a copy of the License at
      7  *
      8  *      http://www.apache.org/licenses/LICENSE-2.0
      9  *
     10  * Unless required by applicable law or agreed to in writing, software
     11  * distributed under the License is distributed on an "AS IS" BASIS,
     12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     13  * See the License for the specific language governing permissions and
     14  * limitations under the License.
     15  */
     16 
     17 #include "dex_file_verifier.h"
     18 
     19 #include <zlib.h>
     20 #include <memory>
     21 
     22 #include "base/stringprintf.h"
     23 #include "dex_file-inl.h"
     24 #include "leb128.h"
     25 #include "safe_map.h"
     26 #include "utf-inl.h"
     27 #include "utils.h"
     28 
     29 namespace art {
     30 
     31 static uint32_t MapTypeToBitMask(uint32_t map_type) {
     32   switch (map_type) {
     33     case DexFile::kDexTypeHeaderItem:               return 1 << 0;
     34     case DexFile::kDexTypeStringIdItem:             return 1 << 1;
     35     case DexFile::kDexTypeTypeIdItem:               return 1 << 2;
     36     case DexFile::kDexTypeProtoIdItem:              return 1 << 3;
     37     case DexFile::kDexTypeFieldIdItem:              return 1 << 4;
     38     case DexFile::kDexTypeMethodIdItem:             return 1 << 5;
     39     case DexFile::kDexTypeClassDefItem:             return 1 << 6;
     40     case DexFile::kDexTypeMapList:                  return 1 << 7;
     41     case DexFile::kDexTypeTypeList:                 return 1 << 8;
     42     case DexFile::kDexTypeAnnotationSetRefList:     return 1 << 9;
     43     case DexFile::kDexTypeAnnotationSetItem:        return 1 << 10;
     44     case DexFile::kDexTypeClassDataItem:            return 1 << 11;
     45     case DexFile::kDexTypeCodeItem:                 return 1 << 12;
     46     case DexFile::kDexTypeStringDataItem:           return 1 << 13;
     47     case DexFile::kDexTypeDebugInfoItem:            return 1 << 14;
     48     case DexFile::kDexTypeAnnotationItem:           return 1 << 15;
     49     case DexFile::kDexTypeEncodedArrayItem:         return 1 << 16;
     50     case DexFile::kDexTypeAnnotationsDirectoryItem: return 1 << 17;
     51   }
     52   return 0;
     53 }
     54 
     55 static bool IsDataSectionType(uint32_t map_type) {
     56   switch (map_type) {
     57     case DexFile::kDexTypeHeaderItem:
     58     case DexFile::kDexTypeStringIdItem:
     59     case DexFile::kDexTypeTypeIdItem:
     60     case DexFile::kDexTypeProtoIdItem:
     61     case DexFile::kDexTypeFieldIdItem:
     62     case DexFile::kDexTypeMethodIdItem:
     63     case DexFile::kDexTypeClassDefItem:
     64       return false;
     65   }
     66   return true;
     67 }
     68 
     69 const char* DexFileVerifier::CheckLoadStringByIdx(uint32_t idx, const char* error_string) {
     70   if (UNLIKELY(!CheckIndex(idx, dex_file_->NumStringIds(), error_string))) {
     71     return nullptr;
     72   }
     73   return dex_file_->StringDataByIdx(idx);
     74 }
     75 
     76 const char* DexFileVerifier::CheckLoadStringByTypeIdx(uint32_t type_idx, const char* error_string) {
     77   if (UNLIKELY(!CheckIndex(type_idx, dex_file_->NumTypeIds(), error_string))) {
     78     return nullptr;
     79   }
     80   const DexFile::TypeId& type_id = dex_file_->GetTypeId(type_idx);
     81   uint32_t idx = type_id.descriptor_idx_;
     82   return CheckLoadStringByIdx(idx, error_string);
     83 }
     84 
     85 const DexFile::FieldId* DexFileVerifier::CheckLoadFieldId(uint32_t idx, const char* error_string) {
     86   if (UNLIKELY(!CheckIndex(idx, dex_file_->NumFieldIds(), error_string))) {
     87     return nullptr;
     88   }
     89   return &dex_file_->GetFieldId(idx);
     90 }
     91 
     92 const DexFile::MethodId* DexFileVerifier::CheckLoadMethodId(uint32_t idx, const char* err_string) {
     93   if (UNLIKELY(!CheckIndex(idx, dex_file_->NumMethodIds(), err_string))) {
     94     return nullptr;
     95   }
     96   return &dex_file_->GetMethodId(idx);
     97 }
     98 
     99 // Helper macro to load string and return false on error.
    100 #define LOAD_STRING(var, idx, error)                  \
    101   const char* var = CheckLoadStringByIdx(idx, error); \
    102   if (UNLIKELY(var == nullptr)) {                     \
    103     return false;                                     \
    104   }
    105 
    106 // Helper macro to load string by type idx and return false on error.
    107 #define LOAD_STRING_BY_TYPE(var, type_idx, error)              \
    108   const char* var = CheckLoadStringByTypeIdx(type_idx, error); \
    109   if (UNLIKELY(var == nullptr)) {                              \
    110     return false;                                              \
    111   }
    112 
    113 // Helper macro to load method id. Return last parameter on error.
    114 #define LOAD_METHOD(var, idx, error_string, error_stmt)                 \
    115   const DexFile::MethodId* var  = CheckLoadMethodId(idx, error_string); \
    116   if (UNLIKELY(var == nullptr)) {                                       \
    117     error_stmt;                                                         \
    118   }
    119 
    120 // Helper macro to load method id. Return last parameter on error.
    121 #define LOAD_FIELD(var, idx, fmt, error_stmt)               \
    122   const DexFile::FieldId* var = CheckLoadFieldId(idx, fmt); \
    123   if (UNLIKELY(var == nullptr)) {                           \
    124     error_stmt;                                             \
    125   }
    126 
    127 bool DexFileVerifier::Verify(const DexFile* dex_file, const byte* begin, size_t size,
    128                              const char* location, std::string* error_msg) {
    129   std::unique_ptr<DexFileVerifier> verifier(new DexFileVerifier(dex_file, begin, size, location));
    130   if (!verifier->Verify()) {
    131     *error_msg = verifier->FailureReason();
    132     return false;
    133   }
    134   return true;
    135 }
    136 
    137 bool DexFileVerifier::CheckShortyDescriptorMatch(char shorty_char, const char* descriptor,
    138                                                 bool is_return_type) {
    139   switch (shorty_char) {
    140     case 'V':
    141       if (UNLIKELY(!is_return_type)) {
    142         ErrorStringPrintf("Invalid use of void");
    143         return false;
    144       }
    145       // Intentional fallthrough.
    146     case 'B':
    147     case 'C':
    148     case 'D':
    149     case 'F':
    150     case 'I':
    151     case 'J':
    152     case 'S':
    153     case 'Z':
    154       if (UNLIKELY((descriptor[0] != shorty_char) || (descriptor[1] != '\0'))) {
    155         ErrorStringPrintf("Shorty vs. primitive type mismatch: '%c', '%s'",
    156                           shorty_char, descriptor);
    157         return false;
    158       }
    159       break;
    160     case 'L':
    161       if (UNLIKELY((descriptor[0] != 'L') && (descriptor[0] != '['))) {
    162         ErrorStringPrintf("Shorty vs. type mismatch: '%c', '%s'", shorty_char, descriptor);
    163         return false;
    164       }
    165       break;
    166     default:
    167       ErrorStringPrintf("Bad shorty character: '%c'", shorty_char);
    168       return false;
    169   }
    170   return true;
    171 }
    172 
    173 bool DexFileVerifier::CheckListSize(const void* start, size_t count, size_t elem_size,
    174                                     const char* label) {
    175   // Check that size is not 0.
    176   CHECK_NE(elem_size, 0U);
    177 
    178   const byte* range_start = reinterpret_cast<const byte*>(start);
    179   const byte* file_start = reinterpret_cast<const byte*>(begin_);
    180 
    181   // Check for overflow.
    182   uintptr_t max = 0 - 1;
    183   size_t available_bytes_till_end_of_mem = max - reinterpret_cast<uintptr_t>(start);
    184   size_t max_count = available_bytes_till_end_of_mem / elem_size;
    185   if (max_count < count) {
    186     ErrorStringPrintf("Overflow in range for %s: %zx for %zu@%zu", label,
    187                       static_cast<size_t>(range_start - file_start),
    188                       count, elem_size);
    189     return false;
    190   }
    191 
    192   const byte* range_end = range_start + count * elem_size;
    193   const byte* file_end = file_start + size_;
    194   if (UNLIKELY((range_start < file_start) || (range_end > file_end))) {
    195     // Note: these two tests are enough as we make sure above that there's no overflow.
    196     ErrorStringPrintf("Bad range for %s: %zx to %zx", label,
    197                       static_cast<size_t>(range_start - file_start),
    198                       static_cast<size_t>(range_end - file_start));
    199     return false;
    200   }
    201   return true;
    202 }
    203 
    204 bool DexFileVerifier::CheckList(size_t element_size, const char* label, const byte* *ptr) {
    205   // Check that the list is available. The first 4B are the count.
    206   if (!CheckListSize(*ptr, 1, 4U, label)) {
    207     return false;
    208   }
    209 
    210   uint32_t count = *reinterpret_cast<const uint32_t*>(*ptr);
    211   if (count > 0) {
    212     if (!CheckListSize(*ptr + 4, count, element_size, label)) {
    213       return false;
    214     }
    215   }
    216 
    217   *ptr += 4 + count * element_size;
    218   return true;
    219 }
    220 
    221 bool DexFileVerifier::CheckIndex(uint32_t field, uint32_t limit, const char* label) {
    222   if (UNLIKELY(field >= limit)) {
    223     ErrorStringPrintf("Bad index for %s: %x >= %x", label, field, limit);
    224     return false;
    225   }
    226   return true;
    227 }
    228 
    229 bool DexFileVerifier::CheckValidOffsetAndSize(uint32_t offset, uint32_t size, const char* label) {
    230   if (size == 0) {
    231     if (offset != 0) {
    232       ErrorStringPrintf("Offset(%d) should be zero when size is zero for %s.", offset, label);
    233       return false;
    234     }
    235   }
    236   if (size_ <= offset) {
    237     ErrorStringPrintf("Offset(%d) should be within file size(%zu) for %s.", offset, size_, label);
    238     return false;
    239   }
    240   return true;
    241 }
    242 
    243 bool DexFileVerifier::CheckHeader() {
    244   // Check file size from the header.
    245   uint32_t expected_size = header_->file_size_;
    246   if (size_ != expected_size) {
    247     ErrorStringPrintf("Bad file size (%zd, expected %ud)", size_, expected_size);
    248     return false;
    249   }
    250 
    251   // Compute and verify the checksum in the header.
    252   uint32_t adler_checksum = adler32(0L, Z_NULL, 0);
    253   const uint32_t non_sum = sizeof(header_->magic_) + sizeof(header_->checksum_);
    254   const byte* non_sum_ptr = reinterpret_cast<const byte*>(header_) + non_sum;
    255   adler_checksum = adler32(adler_checksum, non_sum_ptr, expected_size - non_sum);
    256   if (adler_checksum != header_->checksum_) {
    257     ErrorStringPrintf("Bad checksum (%08x, expected %08x)", adler_checksum, header_->checksum_);
    258     return false;
    259   }
    260 
    261   // Check the contents of the header.
    262   if (header_->endian_tag_ != DexFile::kDexEndianConstant) {
    263     ErrorStringPrintf("Unexpected endian_tag: %x", header_->endian_tag_);
    264     return false;
    265   }
    266 
    267   if (header_->header_size_ != sizeof(DexFile::Header)) {
    268     ErrorStringPrintf("Bad header size: %ud", header_->header_size_);
    269     return false;
    270   }
    271 
    272   // Check that all offsets are inside the file.
    273   bool result =
    274       CheckValidOffsetAndSize(header_->link_off_, header_->link_size_, "link") &&
    275       CheckValidOffsetAndSize(header_->map_off_, header_->map_off_, "map") &&
    276       CheckValidOffsetAndSize(header_->string_ids_off_, header_->string_ids_size_, "string-ids") &&
    277       CheckValidOffsetAndSize(header_->type_ids_off_, header_->type_ids_size_, "type-ids") &&
    278       CheckValidOffsetAndSize(header_->proto_ids_off_, header_->proto_ids_size_, "proto-ids") &&
    279       CheckValidOffsetAndSize(header_->field_ids_off_, header_->field_ids_size_, "field-ids") &&
    280       CheckValidOffsetAndSize(header_->method_ids_off_, header_->method_ids_size_, "method-ids") &&
    281       CheckValidOffsetAndSize(header_->class_defs_off_, header_->class_defs_size_, "class-defs") &&
    282       CheckValidOffsetAndSize(header_->data_off_, header_->data_size_, "data");
    283 
    284   return result;
    285 }
    286 
    287 bool DexFileVerifier::CheckMap() {
    288   const DexFile::MapList* map = reinterpret_cast<const DexFile::MapList*>(begin_ +
    289                                                                           header_->map_off_);
    290   // Check that map list content is available.
    291   if (!CheckListSize(map, 1, sizeof(DexFile::MapList), "maplist content")) {
    292     return false;
    293   }
    294 
    295   const DexFile::MapItem* item = map->list_;
    296 
    297   uint32_t count = map->size_;
    298   uint32_t last_offset = 0;
    299   uint32_t data_item_count = 0;
    300   uint32_t data_items_left = header_->data_size_;
    301   uint32_t used_bits = 0;
    302 
    303   // Sanity check the size of the map list.
    304   if (!CheckListSize(item, count, sizeof(DexFile::MapItem), "map size")) {
    305     return false;
    306   }
    307 
    308   // Check the items listed in the map.
    309   for (uint32_t i = 0; i < count; i++) {
    310     if (UNLIKELY(last_offset >= item->offset_ && i != 0)) {
    311       ErrorStringPrintf("Out of order map item: %x then %x", last_offset, item->offset_);
    312       return false;
    313     }
    314     if (UNLIKELY(item->offset_ >= header_->file_size_)) {
    315       ErrorStringPrintf("Map item after end of file: %x, size %x",
    316                         item->offset_, header_->file_size_);
    317       return false;
    318     }
    319 
    320     if (IsDataSectionType(item->type_)) {
    321       uint32_t icount = item->size_;
    322       if (UNLIKELY(icount > data_items_left)) {
    323         ErrorStringPrintf("Too many items in data section: %ud", data_item_count + icount);
    324         return false;
    325       }
    326       data_items_left -= icount;
    327       data_item_count += icount;
    328     }
    329 
    330     uint32_t bit = MapTypeToBitMask(item->type_);
    331 
    332     if (UNLIKELY(bit == 0)) {
    333       ErrorStringPrintf("Unknown map section type %x", item->type_);
    334       return false;
    335     }
    336 
    337     if (UNLIKELY((used_bits & bit) != 0)) {
    338       ErrorStringPrintf("Duplicate map section of type %x", item->type_);
    339       return false;
    340     }
    341 
    342     used_bits |= bit;
    343     last_offset = item->offset_;
    344     item++;
    345   }
    346 
    347   // Check for missing sections in the map.
    348   if (UNLIKELY((used_bits & MapTypeToBitMask(DexFile::kDexTypeHeaderItem)) == 0)) {
    349     ErrorStringPrintf("Map is missing header entry");
    350     return false;
    351   }
    352   if (UNLIKELY((used_bits & MapTypeToBitMask(DexFile::kDexTypeMapList)) == 0)) {
    353     ErrorStringPrintf("Map is missing map_list entry");
    354     return false;
    355   }
    356   if (UNLIKELY((used_bits & MapTypeToBitMask(DexFile::kDexTypeStringIdItem)) == 0 &&
    357                ((header_->string_ids_off_ != 0) || (header_->string_ids_size_ != 0)))) {
    358     ErrorStringPrintf("Map is missing string_ids entry");
    359     return false;
    360   }
    361   if (UNLIKELY((used_bits & MapTypeToBitMask(DexFile::kDexTypeTypeIdItem)) == 0 &&
    362                ((header_->type_ids_off_ != 0) || (header_->type_ids_size_ != 0)))) {
    363     ErrorStringPrintf("Map is missing type_ids entry");
    364     return false;
    365   }
    366   if (UNLIKELY((used_bits & MapTypeToBitMask(DexFile::kDexTypeProtoIdItem)) == 0 &&
    367                ((header_->proto_ids_off_ != 0) || (header_->proto_ids_size_ != 0)))) {
    368     ErrorStringPrintf("Map is missing proto_ids entry");
    369     return false;
    370   }
    371   if (UNLIKELY((used_bits & MapTypeToBitMask(DexFile::kDexTypeFieldIdItem)) == 0 &&
    372                ((header_->field_ids_off_ != 0) || (header_->field_ids_size_ != 0)))) {
    373     ErrorStringPrintf("Map is missing field_ids entry");
    374     return false;
    375   }
    376   if (UNLIKELY((used_bits & MapTypeToBitMask(DexFile::kDexTypeMethodIdItem)) == 0 &&
    377                ((header_->method_ids_off_ != 0) || (header_->method_ids_size_ != 0)))) {
    378     ErrorStringPrintf("Map is missing method_ids entry");
    379     return false;
    380   }
    381   if (UNLIKELY((used_bits & MapTypeToBitMask(DexFile::kDexTypeClassDefItem)) == 0 &&
    382                ((header_->class_defs_off_ != 0) || (header_->class_defs_size_ != 0)))) {
    383     ErrorStringPrintf("Map is missing class_defs entry");
    384     return false;
    385   }
    386   return true;
    387 }
    388 
    389 uint32_t DexFileVerifier::ReadUnsignedLittleEndian(uint32_t size) {
    390   uint32_t result = 0;
    391   if (LIKELY(CheckListSize(ptr_, size, sizeof(byte), "encoded_value"))) {
    392     for (uint32_t i = 0; i < size; i++) {
    393       result |= ((uint32_t) *(ptr_++)) << (i * 8);
    394     }
    395   }
    396   return result;
    397 }
    398 
    399 bool DexFileVerifier::CheckAndGetHandlerOffsets(const DexFile::CodeItem* code_item,
    400                                                 uint32_t* handler_offsets, uint32_t handlers_size) {
    401   const byte* handlers_base = DexFile::GetCatchHandlerData(*code_item, 0);
    402 
    403   for (uint32_t i = 0; i < handlers_size; i++) {
    404     bool catch_all;
    405     size_t offset = ptr_ - handlers_base;
    406     int32_t size = DecodeSignedLeb128(&ptr_);
    407 
    408     if (UNLIKELY((size < -65536) || (size > 65536))) {
    409       ErrorStringPrintf("Invalid exception handler size: %d", size);
    410       return false;
    411     }
    412 
    413     if (size <= 0) {
    414       catch_all = true;
    415       size = -size;
    416     } else {
    417       catch_all = false;
    418     }
    419 
    420     handler_offsets[i] = static_cast<uint32_t>(offset);
    421 
    422     while (size-- > 0) {
    423       uint32_t type_idx = DecodeUnsignedLeb128(&ptr_);
    424       if (!CheckIndex(type_idx, header_->type_ids_size_, "handler type_idx")) {
    425         return false;
    426       }
    427 
    428       uint32_t addr = DecodeUnsignedLeb128(&ptr_);
    429       if (UNLIKELY(addr >= code_item->insns_size_in_code_units_)) {
    430         ErrorStringPrintf("Invalid handler addr: %x", addr);
    431         return false;
    432       }
    433     }
    434 
    435     if (catch_all) {
    436       uint32_t addr = DecodeUnsignedLeb128(&ptr_);
    437       if (UNLIKELY(addr >= code_item->insns_size_in_code_units_)) {
    438         ErrorStringPrintf("Invalid handler catch_all_addr: %x", addr);
    439         return false;
    440       }
    441     }
    442   }
    443 
    444   return true;
    445 }
    446 
    447 bool DexFileVerifier::CheckClassDataItemField(uint32_t idx, uint32_t access_flags,
    448                                               bool expect_static) {
    449   if (!CheckIndex(idx, header_->field_ids_size_, "class_data_item field_idx")) {
    450     return false;
    451   }
    452 
    453   bool is_static = (access_flags & kAccStatic) != 0;
    454   if (UNLIKELY(is_static != expect_static)) {
    455     ErrorStringPrintf("Static/instance field not in expected list");
    456     return false;
    457   }
    458 
    459   if (UNLIKELY((access_flags & ~kAccJavaFlagsMask) != 0)) {
    460     ErrorStringPrintf("Bad class_data_item field access_flags %x", access_flags);
    461     return false;
    462   }
    463 
    464   return true;
    465 }
    466 
    467 bool DexFileVerifier::CheckClassDataItemMethod(uint32_t idx, uint32_t access_flags,
    468                                                uint32_t code_offset, bool expect_direct) {
    469   if (!CheckIndex(idx, header_->method_ids_size_, "class_data_item method_idx")) {
    470     return false;
    471   }
    472 
    473   bool is_direct = (access_flags & (kAccStatic | kAccPrivate | kAccConstructor)) != 0;
    474   bool expect_code = (access_flags & (kAccNative | kAccAbstract)) == 0;
    475   bool is_synchronized = (access_flags & kAccSynchronized) != 0;
    476   bool allow_synchronized = (access_flags & kAccNative) != 0;
    477 
    478   if (UNLIKELY(is_direct != expect_direct)) {
    479     ErrorStringPrintf("Direct/virtual method not in expected list");
    480     return false;
    481   }
    482 
    483   constexpr uint32_t access_method_mask = kAccJavaFlagsMask | kAccConstructor |
    484       kAccDeclaredSynchronized;
    485   if (UNLIKELY(((access_flags & ~access_method_mask) != 0) ||
    486                (is_synchronized && !allow_synchronized))) {
    487     ErrorStringPrintf("Bad class_data_item method access_flags %x", access_flags);
    488     return false;
    489   }
    490 
    491   if (UNLIKELY(expect_code && (code_offset == 0))) {
    492     ErrorStringPrintf("Unexpected zero value for class_data_item method code_off with access "
    493                       "flags %x", access_flags);
    494     return false;
    495   } else if (UNLIKELY(!expect_code && (code_offset != 0))) {
    496     ErrorStringPrintf("Unexpected non-zero value %x for class_data_item method code_off"
    497                       " with access flags %x", code_offset, access_flags);
    498     return false;
    499   }
    500 
    501   return true;
    502 }
    503 
    504 bool DexFileVerifier::CheckPadding(size_t offset, uint32_t aligned_offset) {
    505   if (offset < aligned_offset) {
    506     if (!CheckListSize(begin_ + offset, aligned_offset - offset, sizeof(byte), "section")) {
    507       return false;
    508     }
    509     while (offset < aligned_offset) {
    510       if (UNLIKELY(*ptr_ != '\0')) {
    511         ErrorStringPrintf("Non-zero padding %x before section start at %zx", *ptr_, offset);
    512         return false;
    513       }
    514       ptr_++;
    515       offset++;
    516     }
    517   }
    518   return true;
    519 }
    520 
    521 bool DexFileVerifier::CheckEncodedValue() {
    522   if (!CheckListSize(ptr_, 1, sizeof(byte), "encoded_value header")) {
    523     return false;
    524   }
    525 
    526   uint8_t header_byte = *(ptr_++);
    527   uint32_t value_type = header_byte & DexFile::kDexAnnotationValueTypeMask;
    528   uint32_t value_arg = header_byte >> DexFile::kDexAnnotationValueArgShift;
    529 
    530   switch (value_type) {
    531     case DexFile::kDexAnnotationByte:
    532       if (UNLIKELY(value_arg != 0)) {
    533         ErrorStringPrintf("Bad encoded_value byte size %x", value_arg);
    534         return false;
    535       }
    536       ptr_++;
    537       break;
    538     case DexFile::kDexAnnotationShort:
    539     case DexFile::kDexAnnotationChar:
    540       if (UNLIKELY(value_arg > 1)) {
    541         ErrorStringPrintf("Bad encoded_value char/short size %x", value_arg);
    542         return false;
    543       }
    544       ptr_ += value_arg + 1;
    545       break;
    546     case DexFile::kDexAnnotationInt:
    547     case DexFile::kDexAnnotationFloat:
    548       if (UNLIKELY(value_arg > 3)) {
    549         ErrorStringPrintf("Bad encoded_value int/float size %x", value_arg);
    550         return false;
    551       }
    552       ptr_ += value_arg + 1;
    553       break;
    554     case DexFile::kDexAnnotationLong:
    555     case DexFile::kDexAnnotationDouble:
    556       ptr_ += value_arg + 1;
    557       break;
    558     case DexFile::kDexAnnotationString: {
    559       if (UNLIKELY(value_arg > 3)) {
    560         ErrorStringPrintf("Bad encoded_value string size %x", value_arg);
    561         return false;
    562       }
    563       uint32_t idx = ReadUnsignedLittleEndian(value_arg + 1);
    564       if (!CheckIndex(idx, header_->string_ids_size_, "encoded_value string")) {
    565         return false;
    566       }
    567       break;
    568     }
    569     case DexFile::kDexAnnotationType: {
    570       if (UNLIKELY(value_arg > 3)) {
    571         ErrorStringPrintf("Bad encoded_value type size %x", value_arg);
    572         return false;
    573       }
    574       uint32_t idx = ReadUnsignedLittleEndian(value_arg + 1);
    575       if (!CheckIndex(idx, header_->type_ids_size_, "encoded_value type")) {
    576         return false;
    577       }
    578       break;
    579     }
    580     case DexFile::kDexAnnotationField:
    581     case DexFile::kDexAnnotationEnum: {
    582       if (UNLIKELY(value_arg > 3)) {
    583         ErrorStringPrintf("Bad encoded_value field/enum size %x", value_arg);
    584         return false;
    585       }
    586       uint32_t idx = ReadUnsignedLittleEndian(value_arg + 1);
    587       if (!CheckIndex(idx, header_->field_ids_size_, "encoded_value field")) {
    588         return false;
    589       }
    590       break;
    591     }
    592     case DexFile::kDexAnnotationMethod: {
    593       if (UNLIKELY(value_arg > 3)) {
    594         ErrorStringPrintf("Bad encoded_value method size %x", value_arg);
    595         return false;
    596       }
    597       uint32_t idx = ReadUnsignedLittleEndian(value_arg + 1);
    598       if (!CheckIndex(idx, header_->method_ids_size_, "encoded_value method")) {
    599         return false;
    600       }
    601       break;
    602     }
    603     case DexFile::kDexAnnotationArray:
    604       if (UNLIKELY(value_arg != 0)) {
    605         ErrorStringPrintf("Bad encoded_value array value_arg %x", value_arg);
    606         return false;
    607       }
    608       if (!CheckEncodedArray()) {
    609         return false;
    610       }
    611       break;
    612     case DexFile::kDexAnnotationAnnotation:
    613       if (UNLIKELY(value_arg != 0)) {
    614         ErrorStringPrintf("Bad encoded_value annotation value_arg %x", value_arg);
    615         return false;
    616       }
    617       if (!CheckEncodedAnnotation()) {
    618         return false;
    619       }
    620       break;
    621     case DexFile::kDexAnnotationNull:
    622       if (UNLIKELY(value_arg != 0)) {
    623         ErrorStringPrintf("Bad encoded_value null value_arg %x", value_arg);
    624         return false;
    625       }
    626       break;
    627     case DexFile::kDexAnnotationBoolean:
    628       if (UNLIKELY(value_arg > 1)) {
    629         ErrorStringPrintf("Bad encoded_value boolean size %x", value_arg);
    630         return false;
    631       }
    632       break;
    633     default:
    634       ErrorStringPrintf("Bogus encoded_value value_type %x", value_type);
    635       return false;
    636   }
    637 
    638   return true;
    639 }
    640 
    641 bool DexFileVerifier::CheckEncodedArray() {
    642   uint32_t size = DecodeUnsignedLeb128(&ptr_);
    643 
    644   while (size--) {
    645     if (!CheckEncodedValue()) {
    646       failure_reason_ = StringPrintf("Bad encoded_array value: %s", failure_reason_.c_str());
    647       return false;
    648     }
    649   }
    650   return true;
    651 }
    652 
    653 bool DexFileVerifier::CheckEncodedAnnotation() {
    654   uint32_t idx = DecodeUnsignedLeb128(&ptr_);
    655   if (!CheckIndex(idx, header_->type_ids_size_, "encoded_annotation type_idx")) {
    656     return false;
    657   }
    658 
    659   uint32_t size = DecodeUnsignedLeb128(&ptr_);
    660   uint32_t last_idx = 0;
    661 
    662   for (uint32_t i = 0; i < size; i++) {
    663     idx = DecodeUnsignedLeb128(&ptr_);
    664     if (!CheckIndex(idx, header_->string_ids_size_, "annotation_element name_idx")) {
    665       return false;
    666     }
    667 
    668     if (UNLIKELY(last_idx >= idx && i != 0)) {
    669       ErrorStringPrintf("Out-of-order annotation_element name_idx: %x then %x",
    670                         last_idx, idx);
    671       return false;
    672     }
    673 
    674     if (!CheckEncodedValue()) {
    675       return false;
    676     }
    677 
    678     last_idx = idx;
    679   }
    680   return true;
    681 }
    682 
    683 bool DexFileVerifier::CheckIntraClassDataItem() {
    684   ClassDataItemIterator it(*dex_file_, ptr_);
    685 
    686   // These calls use the raw access flags to check whether the whole dex field is valid.
    687 
    688   for (; it.HasNextStaticField(); it.Next()) {
    689     if (!CheckClassDataItemField(it.GetMemberIndex(), it.GetRawMemberAccessFlags(), true)) {
    690       return false;
    691     }
    692   }
    693   for (; it.HasNextInstanceField(); it.Next()) {
    694     if (!CheckClassDataItemField(it.GetMemberIndex(), it.GetRawMemberAccessFlags(), false)) {
    695       return false;
    696     }
    697   }
    698   for (; it.HasNextDirectMethod(); it.Next()) {
    699     if (!CheckClassDataItemMethod(it.GetMemberIndex(), it.GetRawMemberAccessFlags(),
    700         it.GetMethodCodeItemOffset(), true)) {
    701       return false;
    702     }
    703   }
    704   for (; it.HasNextVirtualMethod(); it.Next()) {
    705     if (!CheckClassDataItemMethod(it.GetMemberIndex(), it.GetRawMemberAccessFlags(),
    706         it.GetMethodCodeItemOffset(), false)) {
    707       return false;
    708     }
    709   }
    710 
    711   ptr_ = it.EndDataPointer();
    712   return true;
    713 }
    714 
    715 bool DexFileVerifier::CheckIntraCodeItem() {
    716   const DexFile::CodeItem* code_item = reinterpret_cast<const DexFile::CodeItem*>(ptr_);
    717   if (!CheckListSize(code_item, 1, sizeof(DexFile::CodeItem), "code")) {
    718     return false;
    719   }
    720 
    721   if (UNLIKELY(code_item->ins_size_ > code_item->registers_size_)) {
    722     ErrorStringPrintf("ins_size (%ud) > registers_size (%ud)",
    723                       code_item->ins_size_, code_item->registers_size_);
    724     return false;
    725   }
    726 
    727   if (UNLIKELY((code_item->outs_size_ > 5) &&
    728                (code_item->outs_size_ > code_item->registers_size_))) {
    729     /*
    730      * outs_size can be up to 5, even if registers_size is smaller, since the
    731      * short forms of method invocation allow repetitions of a register multiple
    732      * times within a single parameter list. However, longer parameter lists
    733      * need to be represented in-order in the register file.
    734      */
    735     ErrorStringPrintf("outs_size (%ud) > registers_size (%ud)",
    736                       code_item->outs_size_, code_item->registers_size_);
    737     return false;
    738   }
    739 
    740   const uint16_t* insns = code_item->insns_;
    741   uint32_t insns_size = code_item->insns_size_in_code_units_;
    742   if (!CheckListSize(insns, insns_size, sizeof(uint16_t), "insns size")) {
    743     return false;
    744   }
    745 
    746   // Grab the end of the insns if there are no try_items.
    747   uint32_t try_items_size = code_item->tries_size_;
    748   if (try_items_size == 0) {
    749     ptr_ = reinterpret_cast<const byte*>(&insns[insns_size]);
    750     return true;
    751   }
    752 
    753   // try_items are 4-byte aligned. Verify the spacer is 0.
    754   if (((reinterpret_cast<uintptr_t>(&insns[insns_size]) & 3) != 0) && (insns[insns_size] != 0)) {
    755     ErrorStringPrintf("Non-zero padding: %x", insns[insns_size]);
    756     return false;
    757   }
    758 
    759   const DexFile::TryItem* try_items = DexFile::GetTryItems(*code_item, 0);
    760   ptr_ = DexFile::GetCatchHandlerData(*code_item, 0);
    761   uint32_t handlers_size = DecodeUnsignedLeb128(&ptr_);
    762 
    763   if (!CheckListSize(try_items, try_items_size, sizeof(DexFile::TryItem), "try_items size")) {
    764     return false;
    765   }
    766 
    767   if (UNLIKELY((handlers_size == 0) || (handlers_size >= 65536))) {
    768     ErrorStringPrintf("Invalid handlers_size: %ud", handlers_size);
    769     return false;
    770   }
    771 
    772   std::unique_ptr<uint32_t[]> handler_offsets(new uint32_t[handlers_size]);
    773   if (!CheckAndGetHandlerOffsets(code_item, &handler_offsets[0], handlers_size)) {
    774     return false;
    775   }
    776 
    777   uint32_t last_addr = 0;
    778   while (try_items_size--) {
    779     if (UNLIKELY(try_items->start_addr_ < last_addr)) {
    780       ErrorStringPrintf("Out-of_order try_item with start_addr: %x", try_items->start_addr_);
    781       return false;
    782     }
    783 
    784     if (UNLIKELY(try_items->start_addr_ >= insns_size)) {
    785       ErrorStringPrintf("Invalid try_item start_addr: %x", try_items->start_addr_);
    786       return false;
    787     }
    788 
    789     uint32_t i;
    790     for (i = 0; i < handlers_size; i++) {
    791       if (try_items->handler_off_ == handler_offsets[i]) {
    792         break;
    793       }
    794     }
    795 
    796     if (UNLIKELY(i == handlers_size)) {
    797       ErrorStringPrintf("Bogus handler offset: %x", try_items->handler_off_);
    798       return false;
    799     }
    800 
    801     last_addr = try_items->start_addr_ + try_items->insn_count_;
    802     if (UNLIKELY(last_addr > insns_size)) {
    803       ErrorStringPrintf("Invalid try_item insn_count: %x", try_items->insn_count_);
    804       return false;
    805     }
    806 
    807     try_items++;
    808   }
    809 
    810   return true;
    811 }
    812 
    813 bool DexFileVerifier::CheckIntraStringDataItem() {
    814   uint32_t size = DecodeUnsignedLeb128(&ptr_);
    815   const byte* file_end = begin_ + size_;
    816 
    817   for (uint32_t i = 0; i < size; i++) {
    818     CHECK_LT(i, size);  // b/15014252 Prevents hitting the impossible case below
    819     if (UNLIKELY(ptr_ >= file_end)) {
    820       ErrorStringPrintf("String data would go beyond end-of-file");
    821       return false;
    822     }
    823 
    824     uint8_t byte = *(ptr_++);
    825 
    826     // Switch on the high 4 bits.
    827     switch (byte >> 4) {
    828       case 0x00:
    829         // Special case of bit pattern 0xxx.
    830         if (UNLIKELY(byte == 0)) {
    831           CHECK_LT(i, size);  // b/15014252 Actually hit this impossible case with clang
    832           ErrorStringPrintf("String data shorter than indicated utf16_size %x", size);
    833           return false;
    834         }
    835         break;
    836       case 0x01:
    837       case 0x02:
    838       case 0x03:
    839       case 0x04:
    840       case 0x05:
    841       case 0x06:
    842       case 0x07:
    843         // No extra checks necessary for bit pattern 0xxx.
    844         break;
    845       case 0x08:
    846       case 0x09:
    847       case 0x0a:
    848       case 0x0b:
    849       case 0x0f:
    850         // Illegal bit patterns 10xx or 1111.
    851         // Note: 1111 is valid for normal UTF-8, but not here.
    852         ErrorStringPrintf("Illegal start byte %x in string data", byte);
    853         return false;
    854       case 0x0c:
    855       case 0x0d: {
    856         // Bit pattern 110x has an additional byte.
    857         uint8_t byte2 = *(ptr_++);
    858         if (UNLIKELY((byte2 & 0xc0) != 0x80)) {
    859           ErrorStringPrintf("Illegal continuation byte %x in string data", byte2);
    860           return false;
    861         }
    862         uint16_t value = ((byte & 0x1f) << 6) | (byte2 & 0x3f);
    863         if (UNLIKELY((value != 0) && (value < 0x80))) {
    864           ErrorStringPrintf("Illegal representation for value %x in string data", value);
    865           return false;
    866         }
    867         break;
    868       }
    869       case 0x0e: {
    870         // Bit pattern 1110 has 2 additional bytes.
    871         uint8_t byte2 = *(ptr_++);
    872         if (UNLIKELY((byte2 & 0xc0) != 0x80)) {
    873           ErrorStringPrintf("Illegal continuation byte %x in string data", byte2);
    874           return false;
    875         }
    876         uint8_t byte3 = *(ptr_++);
    877         if (UNLIKELY((byte3 & 0xc0) != 0x80)) {
    878           ErrorStringPrintf("Illegal continuation byte %x in string data", byte3);
    879           return false;
    880         }
    881         uint16_t value = ((byte & 0x0f) << 12) | ((byte2 & 0x3f) << 6) | (byte3 & 0x3f);
    882         if (UNLIKELY(value < 0x800)) {
    883           ErrorStringPrintf("Illegal representation for value %x in string data", value);
    884           return false;
    885         }
    886         break;
    887       }
    888     }
    889   }
    890 
    891   if (UNLIKELY(*(ptr_++) != '\0')) {
    892     ErrorStringPrintf("String longer than indicated size %x", size);
    893     return false;
    894   }
    895 
    896   return true;
    897 }
    898 
    899 bool DexFileVerifier::CheckIntraDebugInfoItem() {
    900   DecodeUnsignedLeb128(&ptr_);
    901   uint32_t parameters_size = DecodeUnsignedLeb128(&ptr_);
    902   if (UNLIKELY(parameters_size > 65536)) {
    903     ErrorStringPrintf("Invalid parameters_size: %x", parameters_size);
    904     return false;
    905   }
    906 
    907   for (uint32_t j = 0; j < parameters_size; j++) {
    908     uint32_t parameter_name = DecodeUnsignedLeb128(&ptr_);
    909     if (parameter_name != 0) {
    910       parameter_name--;
    911       if (!CheckIndex(parameter_name, header_->string_ids_size_, "debug_info_item parameter_name")) {
    912         return false;
    913       }
    914     }
    915   }
    916 
    917   while (true) {
    918     uint8_t opcode = *(ptr_++);
    919     switch (opcode) {
    920       case DexFile::DBG_END_SEQUENCE: {
    921         return true;
    922       }
    923       case DexFile::DBG_ADVANCE_PC: {
    924         DecodeUnsignedLeb128(&ptr_);
    925         break;
    926       }
    927       case DexFile::DBG_ADVANCE_LINE: {
    928         DecodeSignedLeb128(&ptr_);
    929         break;
    930       }
    931       case DexFile::DBG_START_LOCAL: {
    932         uint32_t reg_num = DecodeUnsignedLeb128(&ptr_);
    933         if (UNLIKELY(reg_num >= 65536)) {
    934           ErrorStringPrintf("Bad reg_num for opcode %x", opcode);
    935           return false;
    936         }
    937         uint32_t name_idx = DecodeUnsignedLeb128(&ptr_);
    938         if (name_idx != 0) {
    939           name_idx--;
    940           if (!CheckIndex(name_idx, header_->string_ids_size_, "DBG_START_LOCAL name_idx")) {
    941             return false;
    942           }
    943         }
    944         uint32_t type_idx = DecodeUnsignedLeb128(&ptr_);
    945         if (type_idx != 0) {
    946           type_idx--;
    947           if (!CheckIndex(type_idx, header_->string_ids_size_, "DBG_START_LOCAL type_idx")) {
    948             return false;
    949           }
    950         }
    951         break;
    952       }
    953       case DexFile::DBG_END_LOCAL:
    954       case DexFile::DBG_RESTART_LOCAL: {
    955         uint32_t reg_num = DecodeUnsignedLeb128(&ptr_);
    956         if (UNLIKELY(reg_num >= 65536)) {
    957           ErrorStringPrintf("Bad reg_num for opcode %x", opcode);
    958           return false;
    959         }
    960         break;
    961       }
    962       case DexFile::DBG_START_LOCAL_EXTENDED: {
    963         uint32_t reg_num = DecodeUnsignedLeb128(&ptr_);
    964         if (UNLIKELY(reg_num >= 65536)) {
    965           ErrorStringPrintf("Bad reg_num for opcode %x", opcode);
    966           return false;
    967         }
    968         uint32_t name_idx = DecodeUnsignedLeb128(&ptr_);
    969         if (name_idx != 0) {
    970           name_idx--;
    971           if (!CheckIndex(name_idx, header_->string_ids_size_, "DBG_START_LOCAL_EXTENDED name_idx")) {
    972             return false;
    973           }
    974         }
    975         uint32_t type_idx = DecodeUnsignedLeb128(&ptr_);
    976         if (type_idx != 0) {
    977           type_idx--;
    978           if (!CheckIndex(type_idx, header_->string_ids_size_, "DBG_START_LOCAL_EXTENDED type_idx")) {
    979             return false;
    980           }
    981         }
    982         uint32_t sig_idx = DecodeUnsignedLeb128(&ptr_);
    983         if (sig_idx != 0) {
    984           sig_idx--;
    985           if (!CheckIndex(sig_idx, header_->string_ids_size_, "DBG_START_LOCAL_EXTENDED sig_idx")) {
    986             return false;
    987           }
    988         }
    989         break;
    990       }
    991       case DexFile::DBG_SET_FILE: {
    992         uint32_t name_idx = DecodeUnsignedLeb128(&ptr_);
    993         if (name_idx != 0) {
    994           name_idx--;
    995           if (!CheckIndex(name_idx, header_->string_ids_size_, "DBG_SET_FILE name_idx")) {
    996             return false;
    997           }
    998         }
    999         break;
   1000       }
   1001     }
   1002   }
   1003 }
   1004 
   1005 bool DexFileVerifier::CheckIntraAnnotationItem() {
   1006   if (!CheckListSize(ptr_, 1, sizeof(byte), "annotation visibility")) {
   1007     return false;
   1008   }
   1009 
   1010   // Check visibility
   1011   switch (*(ptr_++)) {
   1012     case DexFile::kDexVisibilityBuild:
   1013     case DexFile::kDexVisibilityRuntime:
   1014     case DexFile::kDexVisibilitySystem:
   1015       break;
   1016     default:
   1017       ErrorStringPrintf("Bad annotation visibility: %x", *ptr_);
   1018       return false;
   1019   }
   1020 
   1021   if (!CheckEncodedAnnotation()) {
   1022     return false;
   1023   }
   1024 
   1025   return true;
   1026 }
   1027 
   1028 bool DexFileVerifier::CheckIntraAnnotationsDirectoryItem() {
   1029   const DexFile::AnnotationsDirectoryItem* item =
   1030       reinterpret_cast<const DexFile::AnnotationsDirectoryItem*>(ptr_);
   1031   if (!CheckListSize(item, 1, sizeof(DexFile::AnnotationsDirectoryItem), "annotations_directory")) {
   1032     return false;
   1033   }
   1034 
   1035   // Field annotations follow immediately after the annotations directory.
   1036   const DexFile::FieldAnnotationsItem* field_item =
   1037       reinterpret_cast<const DexFile::FieldAnnotationsItem*>(item + 1);
   1038   uint32_t field_count = item->fields_size_;
   1039   if (!CheckListSize(field_item, field_count, sizeof(DexFile::FieldAnnotationsItem), "field_annotations list")) {
   1040     return false;
   1041   }
   1042 
   1043   uint32_t last_idx = 0;
   1044   for (uint32_t i = 0; i < field_count; i++) {
   1045     if (UNLIKELY(last_idx >= field_item->field_idx_ && i != 0)) {
   1046       ErrorStringPrintf("Out-of-order field_idx for annotation: %x then %x", last_idx, field_item->field_idx_);
   1047       return false;
   1048     }
   1049     last_idx = field_item->field_idx_;
   1050     field_item++;
   1051   }
   1052 
   1053   // Method annotations follow immediately after field annotations.
   1054   const DexFile::MethodAnnotationsItem* method_item =
   1055       reinterpret_cast<const DexFile::MethodAnnotationsItem*>(field_item);
   1056   uint32_t method_count = item->methods_size_;
   1057   if (!CheckListSize(method_item, method_count, sizeof(DexFile::MethodAnnotationsItem), "method_annotations list")) {
   1058     return false;
   1059   }
   1060 
   1061   last_idx = 0;
   1062   for (uint32_t i = 0; i < method_count; i++) {
   1063     if (UNLIKELY(last_idx >= method_item->method_idx_ && i != 0)) {
   1064       ErrorStringPrintf("Out-of-order method_idx for annotation: %x then %x",
   1065                        last_idx, method_item->method_idx_);
   1066       return false;
   1067     }
   1068     last_idx = method_item->method_idx_;
   1069     method_item++;
   1070   }
   1071 
   1072   // Parameter annotations follow immediately after method annotations.
   1073   const DexFile::ParameterAnnotationsItem* parameter_item =
   1074       reinterpret_cast<const DexFile::ParameterAnnotationsItem*>(method_item);
   1075   uint32_t parameter_count = item->parameters_size_;
   1076   if (!CheckListSize(parameter_item, parameter_count, sizeof(DexFile::ParameterAnnotationsItem),
   1077                      "parameter_annotations list")) {
   1078     return false;
   1079   }
   1080 
   1081   last_idx = 0;
   1082   for (uint32_t i = 0; i < parameter_count; i++) {
   1083     if (UNLIKELY(last_idx >= parameter_item->method_idx_ && i != 0)) {
   1084       ErrorStringPrintf("Out-of-order method_idx for annotation: %x then %x",
   1085                         last_idx, parameter_item->method_idx_);
   1086       return false;
   1087     }
   1088     last_idx = parameter_item->method_idx_;
   1089     parameter_item++;
   1090   }
   1091 
   1092   // Return a pointer to the end of the annotations.
   1093   ptr_ = reinterpret_cast<const byte*>(parameter_item);
   1094   return true;
   1095 }
   1096 
   1097 bool DexFileVerifier::CheckIntraSectionIterate(size_t offset, uint32_t section_count,
   1098                                                uint16_t type) {
   1099   // Get the right alignment mask for the type of section.
   1100   size_t alignment_mask;
   1101   switch (type) {
   1102     case DexFile::kDexTypeClassDataItem:
   1103     case DexFile::kDexTypeStringDataItem:
   1104     case DexFile::kDexTypeDebugInfoItem:
   1105     case DexFile::kDexTypeAnnotationItem:
   1106     case DexFile::kDexTypeEncodedArrayItem:
   1107       alignment_mask = sizeof(uint8_t) - 1;
   1108       break;
   1109     default:
   1110       alignment_mask = sizeof(uint32_t) - 1;
   1111       break;
   1112   }
   1113 
   1114   // Iterate through the items in the section.
   1115   for (uint32_t i = 0; i < section_count; i++) {
   1116     size_t aligned_offset = (offset + alignment_mask) & ~alignment_mask;
   1117 
   1118     // Check the padding between items.
   1119     if (!CheckPadding(offset, aligned_offset)) {
   1120       return false;
   1121     }
   1122 
   1123     // Check depending on the section type.
   1124     switch (type) {
   1125       case DexFile::kDexTypeStringIdItem: {
   1126         if (!CheckListSize(ptr_, 1, sizeof(DexFile::StringId), "string_ids")) {
   1127           return false;
   1128         }
   1129         ptr_ += sizeof(DexFile::StringId);
   1130         break;
   1131       }
   1132       case DexFile::kDexTypeTypeIdItem: {
   1133         if (!CheckListSize(ptr_, 1, sizeof(DexFile::TypeId), "type_ids")) {
   1134           return false;
   1135         }
   1136         ptr_ += sizeof(DexFile::TypeId);
   1137         break;
   1138       }
   1139       case DexFile::kDexTypeProtoIdItem: {
   1140         if (!CheckListSize(ptr_, 1, sizeof(DexFile::ProtoId), "proto_ids")) {
   1141           return false;
   1142         }
   1143         ptr_ += sizeof(DexFile::ProtoId);
   1144         break;
   1145       }
   1146       case DexFile::kDexTypeFieldIdItem: {
   1147         if (!CheckListSize(ptr_, 1, sizeof(DexFile::FieldId), "field_ids")) {
   1148           return false;
   1149         }
   1150         ptr_ += sizeof(DexFile::FieldId);
   1151         break;
   1152       }
   1153       case DexFile::kDexTypeMethodIdItem: {
   1154         if (!CheckListSize(ptr_, 1, sizeof(DexFile::MethodId), "method_ids")) {
   1155           return false;
   1156         }
   1157         ptr_ += sizeof(DexFile::MethodId);
   1158         break;
   1159       }
   1160       case DexFile::kDexTypeClassDefItem: {
   1161         if (!CheckListSize(ptr_, 1, sizeof(DexFile::ClassDef), "class_defs")) {
   1162           return false;
   1163         }
   1164         ptr_ += sizeof(DexFile::ClassDef);
   1165         break;
   1166       }
   1167       case DexFile::kDexTypeTypeList: {
   1168         if (!CheckList(sizeof(DexFile::TypeItem), "type_list", &ptr_)) {
   1169           return false;
   1170         }
   1171         break;
   1172       }
   1173       case DexFile::kDexTypeAnnotationSetRefList: {
   1174         if (!CheckList(sizeof(DexFile::AnnotationSetRefItem), "annotation_set_ref_list", &ptr_)) {
   1175           return false;
   1176         }
   1177         break;
   1178       }
   1179       case DexFile::kDexTypeAnnotationSetItem: {
   1180         if (!CheckList(sizeof(uint32_t), "annotation_set_item", &ptr_)) {
   1181           return false;
   1182         }
   1183         break;
   1184       }
   1185       case DexFile::kDexTypeClassDataItem: {
   1186         if (!CheckIntraClassDataItem()) {
   1187           return false;
   1188         }
   1189         break;
   1190       }
   1191       case DexFile::kDexTypeCodeItem: {
   1192         if (!CheckIntraCodeItem()) {
   1193           return false;
   1194         }
   1195         break;
   1196       }
   1197       case DexFile::kDexTypeStringDataItem: {
   1198         if (!CheckIntraStringDataItem()) {
   1199           return false;
   1200         }
   1201         break;
   1202       }
   1203       case DexFile::kDexTypeDebugInfoItem: {
   1204         if (!CheckIntraDebugInfoItem()) {
   1205           return false;
   1206         }
   1207         break;
   1208       }
   1209       case DexFile::kDexTypeAnnotationItem: {
   1210         if (!CheckIntraAnnotationItem()) {
   1211           return false;
   1212         }
   1213         break;
   1214       }
   1215       case DexFile::kDexTypeEncodedArrayItem: {
   1216         if (!CheckEncodedArray()) {
   1217           return false;
   1218         }
   1219         break;
   1220       }
   1221       case DexFile::kDexTypeAnnotationsDirectoryItem: {
   1222         if (!CheckIntraAnnotationsDirectoryItem()) {
   1223           return false;
   1224         }
   1225         break;
   1226       }
   1227       default:
   1228         ErrorStringPrintf("Unknown map item type %x", type);
   1229         return false;
   1230     }
   1231 
   1232     if (IsDataSectionType(type)) {
   1233       offset_to_type_map_.Put(aligned_offset, type);
   1234     }
   1235 
   1236     aligned_offset = ptr_ - begin_;
   1237     if (UNLIKELY(aligned_offset > size_)) {
   1238       ErrorStringPrintf("Item %d at ends out of bounds", i);
   1239       return false;
   1240     }
   1241 
   1242     offset = aligned_offset;
   1243   }
   1244 
   1245   return true;
   1246 }
   1247 
   1248 bool DexFileVerifier::CheckIntraIdSection(size_t offset, uint32_t count, uint16_t type) {
   1249   uint32_t expected_offset;
   1250   uint32_t expected_size;
   1251 
   1252   // Get the expected offset and size from the header.
   1253   switch (type) {
   1254     case DexFile::kDexTypeStringIdItem:
   1255       expected_offset = header_->string_ids_off_;
   1256       expected_size = header_->string_ids_size_;
   1257       break;
   1258     case DexFile::kDexTypeTypeIdItem:
   1259       expected_offset = header_->type_ids_off_;
   1260       expected_size = header_->type_ids_size_;
   1261       break;
   1262     case DexFile::kDexTypeProtoIdItem:
   1263       expected_offset = header_->proto_ids_off_;
   1264       expected_size = header_->proto_ids_size_;
   1265       break;
   1266     case DexFile::kDexTypeFieldIdItem:
   1267       expected_offset = header_->field_ids_off_;
   1268       expected_size = header_->field_ids_size_;
   1269       break;
   1270     case DexFile::kDexTypeMethodIdItem:
   1271       expected_offset = header_->method_ids_off_;
   1272       expected_size = header_->method_ids_size_;
   1273       break;
   1274     case DexFile::kDexTypeClassDefItem:
   1275       expected_offset = header_->class_defs_off_;
   1276       expected_size = header_->class_defs_size_;
   1277       break;
   1278     default:
   1279       ErrorStringPrintf("Bad type for id section: %x", type);
   1280       return false;
   1281   }
   1282 
   1283   // Check that the offset and size are what were expected from the header.
   1284   if (UNLIKELY(offset != expected_offset)) {
   1285     ErrorStringPrintf("Bad offset for section: got %zx, expected %x", offset, expected_offset);
   1286     return false;
   1287   }
   1288   if (UNLIKELY(count != expected_size)) {
   1289     ErrorStringPrintf("Bad size for section: got %x, expected %x", count, expected_size);
   1290     return false;
   1291   }
   1292 
   1293   return CheckIntraSectionIterate(offset, count, type);
   1294 }
   1295 
   1296 bool DexFileVerifier::CheckIntraDataSection(size_t offset, uint32_t count, uint16_t type) {
   1297   size_t data_start = header_->data_off_;
   1298   size_t data_end = data_start + header_->data_size_;
   1299 
   1300   // Sanity check the offset of the section.
   1301   if (UNLIKELY((offset < data_start) || (offset > data_end))) {
   1302     ErrorStringPrintf("Bad offset for data subsection: %zx", offset);
   1303     return false;
   1304   }
   1305 
   1306   if (!CheckIntraSectionIterate(offset, count, type)) {
   1307     return false;
   1308   }
   1309 
   1310   size_t next_offset = ptr_ - begin_;
   1311   if (next_offset > data_end) {
   1312     ErrorStringPrintf("Out-of-bounds end of data subsection: %zx", next_offset);
   1313     return false;
   1314   }
   1315 
   1316   return true;
   1317 }
   1318 
   1319 bool DexFileVerifier::CheckIntraSection() {
   1320   const DexFile::MapList* map = reinterpret_cast<const DexFile::MapList*>(begin_ + header_->map_off_);
   1321   const DexFile::MapItem* item = map->list_;
   1322 
   1323   uint32_t count = map->size_;
   1324   size_t offset = 0;
   1325   ptr_ = begin_;
   1326 
   1327   // Check the items listed in the map.
   1328   while (count--) {
   1329     uint32_t section_offset = item->offset_;
   1330     uint32_t section_count = item->size_;
   1331     uint16_t type = item->type_;
   1332 
   1333     // Check for padding and overlap between items.
   1334     if (!CheckPadding(offset, section_offset)) {
   1335       return false;
   1336     } else if (UNLIKELY(offset > section_offset)) {
   1337       ErrorStringPrintf("Section overlap or out-of-order map: %zx, %x", offset, section_offset);
   1338       return false;
   1339     }
   1340 
   1341     // Check each item based on its type.
   1342     switch (type) {
   1343       case DexFile::kDexTypeHeaderItem:
   1344         if (UNLIKELY(section_count != 1)) {
   1345           ErrorStringPrintf("Multiple header items");
   1346           return false;
   1347         }
   1348         if (UNLIKELY(section_offset != 0)) {
   1349           ErrorStringPrintf("Header at %x, not at start of file", section_offset);
   1350           return false;
   1351         }
   1352         ptr_ = begin_ + header_->header_size_;
   1353         offset = header_->header_size_;
   1354         break;
   1355       case DexFile::kDexTypeStringIdItem:
   1356       case DexFile::kDexTypeTypeIdItem:
   1357       case DexFile::kDexTypeProtoIdItem:
   1358       case DexFile::kDexTypeFieldIdItem:
   1359       case DexFile::kDexTypeMethodIdItem:
   1360       case DexFile::kDexTypeClassDefItem:
   1361         if (!CheckIntraIdSection(section_offset, section_count, type)) {
   1362           return false;
   1363         }
   1364         offset = ptr_ - begin_;
   1365         break;
   1366       case DexFile::kDexTypeMapList:
   1367         if (UNLIKELY(section_count != 1)) {
   1368           ErrorStringPrintf("Multiple map list items");
   1369           return false;
   1370         }
   1371         if (UNLIKELY(section_offset != header_->map_off_)) {
   1372           ErrorStringPrintf("Map not at header-defined offset: %x, expected %x",
   1373                             section_offset, header_->map_off_);
   1374           return false;
   1375         }
   1376         ptr_ += sizeof(uint32_t) + (map->size_ * sizeof(DexFile::MapItem));
   1377         offset = section_offset + sizeof(uint32_t) + (map->size_ * sizeof(DexFile::MapItem));
   1378         break;
   1379       case DexFile::kDexTypeTypeList:
   1380       case DexFile::kDexTypeAnnotationSetRefList:
   1381       case DexFile::kDexTypeAnnotationSetItem:
   1382       case DexFile::kDexTypeClassDataItem:
   1383       case DexFile::kDexTypeCodeItem:
   1384       case DexFile::kDexTypeStringDataItem:
   1385       case DexFile::kDexTypeDebugInfoItem:
   1386       case DexFile::kDexTypeAnnotationItem:
   1387       case DexFile::kDexTypeEncodedArrayItem:
   1388       case DexFile::kDexTypeAnnotationsDirectoryItem:
   1389         if (!CheckIntraDataSection(section_offset, section_count, type)) {
   1390           return false;
   1391         }
   1392         offset = ptr_ - begin_;
   1393         break;
   1394       default:
   1395         ErrorStringPrintf("Unknown map item type %x", type);
   1396         return false;
   1397     }
   1398 
   1399     item++;
   1400   }
   1401 
   1402   return true;
   1403 }
   1404 
   1405 bool DexFileVerifier::CheckOffsetToTypeMap(size_t offset, uint16_t type) {
   1406   auto it = offset_to_type_map_.find(offset);
   1407   if (UNLIKELY(it == offset_to_type_map_.end())) {
   1408     ErrorStringPrintf("No data map entry found @ %zx; expected %x", offset, type);
   1409     return false;
   1410   }
   1411   if (UNLIKELY(it->second != type)) {
   1412     ErrorStringPrintf("Unexpected data map entry @ %zx; expected %x, found %x",
   1413                       offset, type, it->second);
   1414     return false;
   1415   }
   1416   return true;
   1417 }
   1418 
   1419 uint16_t DexFileVerifier::FindFirstClassDataDefiner(const byte* ptr, bool* success) {
   1420   ClassDataItemIterator it(*dex_file_, ptr);
   1421   *success = true;
   1422 
   1423   if (it.HasNextStaticField() || it.HasNextInstanceField()) {
   1424     LOAD_FIELD(field, it.GetMemberIndex(), "first_class_data_definer field_id",
   1425                *success = false; return DexFile::kDexNoIndex16)
   1426     return field->class_idx_;
   1427   }
   1428 
   1429   if (it.HasNextDirectMethod() || it.HasNextVirtualMethod()) {
   1430     LOAD_METHOD(method, it.GetMemberIndex(), "first_class_data_definer method_id",
   1431                 *success = false; return DexFile::kDexNoIndex16)
   1432     return method->class_idx_;
   1433   }
   1434 
   1435   return DexFile::kDexNoIndex16;
   1436 }
   1437 
   1438 uint16_t DexFileVerifier::FindFirstAnnotationsDirectoryDefiner(const byte* ptr, bool* success) {
   1439   const DexFile::AnnotationsDirectoryItem* item =
   1440       reinterpret_cast<const DexFile::AnnotationsDirectoryItem*>(ptr);
   1441   *success = true;
   1442 
   1443   if (item->fields_size_ != 0) {
   1444     DexFile::FieldAnnotationsItem* field_items = (DexFile::FieldAnnotationsItem*) (item + 1);
   1445     LOAD_FIELD(field, field_items[0].field_idx_, "first_annotations_dir_definer field_id",
   1446                *success = false; return DexFile::kDexNoIndex16)
   1447     return field->class_idx_;
   1448   }
   1449 
   1450   if (item->methods_size_ != 0) {
   1451     DexFile::MethodAnnotationsItem* method_items = (DexFile::MethodAnnotationsItem*) (item + 1);
   1452     LOAD_METHOD(method, method_items[0].method_idx_, "first_annotations_dir_definer method id",
   1453                 *success = false; return DexFile::kDexNoIndex16)
   1454     return method->class_idx_;
   1455   }
   1456 
   1457   if (item->parameters_size_ != 0) {
   1458     DexFile::ParameterAnnotationsItem* parameter_items = (DexFile::ParameterAnnotationsItem*) (item + 1);
   1459     LOAD_METHOD(method, parameter_items[0].method_idx_, "first_annotations_dir_definer method id",
   1460                 *success = false; return DexFile::kDexNoIndex16)
   1461     return method->class_idx_;
   1462   }
   1463 
   1464   return DexFile::kDexNoIndex16;
   1465 }
   1466 
   1467 bool DexFileVerifier::CheckInterStringIdItem() {
   1468   const DexFile::StringId* item = reinterpret_cast<const DexFile::StringId*>(ptr_);
   1469 
   1470   // Check the map to make sure it has the right offset->type.
   1471   if (!CheckOffsetToTypeMap(item->string_data_off_, DexFile::kDexTypeStringDataItem)) {
   1472     return false;
   1473   }
   1474 
   1475   // Check ordering between items.
   1476   if (previous_item_ != NULL) {
   1477     const DexFile::StringId* prev_item = reinterpret_cast<const DexFile::StringId*>(previous_item_);
   1478     const char* prev_str = dex_file_->GetStringData(*prev_item);
   1479     const char* str = dex_file_->GetStringData(*item);
   1480     if (UNLIKELY(CompareModifiedUtf8ToModifiedUtf8AsUtf16CodePointValues(prev_str, str) >= 0)) {
   1481       ErrorStringPrintf("Out-of-order string_ids: '%s' then '%s'", prev_str, str);
   1482       return false;
   1483     }
   1484   }
   1485 
   1486   ptr_ += sizeof(DexFile::StringId);
   1487   return true;
   1488 }
   1489 
   1490 bool DexFileVerifier::CheckInterTypeIdItem() {
   1491   const DexFile::TypeId* item = reinterpret_cast<const DexFile::TypeId*>(ptr_);
   1492 
   1493   LOAD_STRING(descriptor, item->descriptor_idx_, "inter_type_id_item descriptor_idx")
   1494 
   1495   // Check that the descriptor is a valid type.
   1496   if (UNLIKELY(!IsValidDescriptor(descriptor))) {
   1497     ErrorStringPrintf("Invalid type descriptor: '%s'", descriptor);
   1498     return false;
   1499   }
   1500 
   1501   // Check ordering between items.
   1502   if (previous_item_ != NULL) {
   1503     const DexFile::TypeId* prev_item = reinterpret_cast<const DexFile::TypeId*>(previous_item_);
   1504     if (UNLIKELY(prev_item->descriptor_idx_ >= item->descriptor_idx_)) {
   1505       ErrorStringPrintf("Out-of-order type_ids: %x then %x",
   1506                         prev_item->descriptor_idx_, item->descriptor_idx_);
   1507       return false;
   1508     }
   1509   }
   1510 
   1511   ptr_ += sizeof(DexFile::TypeId);
   1512   return true;
   1513 }
   1514 
   1515 bool DexFileVerifier::CheckInterProtoIdItem() {
   1516   const DexFile::ProtoId* item = reinterpret_cast<const DexFile::ProtoId*>(ptr_);
   1517 
   1518   LOAD_STRING(shorty, item->shorty_idx_, "inter_proto_id_item shorty_idx")
   1519 
   1520   if (item->parameters_off_ != 0 &&
   1521       !CheckOffsetToTypeMap(item->parameters_off_, DexFile::kDexTypeTypeList)) {
   1522     return false;
   1523   }
   1524 
   1525   // Check the return type and advance the shorty.
   1526   LOAD_STRING_BY_TYPE(return_type, item->return_type_idx_, "inter_proto_id_item return_type_idx")
   1527   if (!CheckShortyDescriptorMatch(*shorty, return_type, true)) {
   1528     return false;
   1529   }
   1530   shorty++;
   1531 
   1532   DexFileParameterIterator it(*dex_file_, *item);
   1533   while (it.HasNext() && *shorty != '\0') {
   1534     if (!CheckIndex(it.GetTypeIdx(), dex_file_->NumTypeIds(),
   1535                     "inter_proto_id_item shorty type_idx")) {
   1536       return false;
   1537     }
   1538     const char* descriptor = it.GetDescriptor();
   1539     if (!CheckShortyDescriptorMatch(*shorty, descriptor, false)) {
   1540       return false;
   1541     }
   1542     it.Next();
   1543     shorty++;
   1544   }
   1545   if (UNLIKELY(it.HasNext() || *shorty != '\0')) {
   1546     ErrorStringPrintf("Mismatched length for parameters and shorty");
   1547     return false;
   1548   }
   1549 
   1550   // Check ordering between items. This relies on type_ids being in order.
   1551   if (previous_item_ != NULL) {
   1552     const DexFile::ProtoId* prev = reinterpret_cast<const DexFile::ProtoId*>(previous_item_);
   1553     if (UNLIKELY(prev->return_type_idx_ > item->return_type_idx_)) {
   1554       ErrorStringPrintf("Out-of-order proto_id return types");
   1555       return false;
   1556     } else if (prev->return_type_idx_ == item->return_type_idx_) {
   1557       DexFileParameterIterator curr_it(*dex_file_, *item);
   1558       DexFileParameterIterator prev_it(*dex_file_, *prev);
   1559 
   1560       while (curr_it.HasNext() && prev_it.HasNext()) {
   1561         uint16_t prev_idx = prev_it.GetTypeIdx();
   1562         uint16_t curr_idx = curr_it.GetTypeIdx();
   1563         if (prev_idx == DexFile::kDexNoIndex16) {
   1564           break;
   1565         }
   1566         if (UNLIKELY(curr_idx == DexFile::kDexNoIndex16)) {
   1567           ErrorStringPrintf("Out-of-order proto_id arguments");
   1568           return false;
   1569         }
   1570 
   1571         if (prev_idx < curr_idx) {
   1572           break;
   1573         } else if (UNLIKELY(prev_idx > curr_idx)) {
   1574           ErrorStringPrintf("Out-of-order proto_id arguments");
   1575           return false;
   1576         }
   1577 
   1578         prev_it.Next();
   1579         curr_it.Next();
   1580       }
   1581     }
   1582   }
   1583 
   1584   ptr_ += sizeof(DexFile::ProtoId);
   1585   return true;
   1586 }
   1587 
   1588 bool DexFileVerifier::CheckInterFieldIdItem() {
   1589   const DexFile::FieldId* item = reinterpret_cast<const DexFile::FieldId*>(ptr_);
   1590 
   1591   // Check that the class descriptor is valid.
   1592   LOAD_STRING_BY_TYPE(class_descriptor, item->class_idx_, "inter_field_id_item class_idx")
   1593   if (UNLIKELY(!IsValidDescriptor(class_descriptor) || class_descriptor[0] != 'L')) {
   1594     ErrorStringPrintf("Invalid descriptor for class_idx: '%s'", class_descriptor);
   1595     return false;
   1596   }
   1597 
   1598   // Check that the type descriptor is a valid field name.
   1599   LOAD_STRING_BY_TYPE(type_descriptor, item->type_idx_, "inter_field_id_item type_idx")
   1600   if (UNLIKELY(!IsValidDescriptor(type_descriptor) || type_descriptor[0] == 'V')) {
   1601     ErrorStringPrintf("Invalid descriptor for type_idx: '%s'", type_descriptor);
   1602     return false;
   1603   }
   1604 
   1605   // Check that the name is valid.
   1606   LOAD_STRING(descriptor, item->name_idx_, "inter_field_id_item name_idx")
   1607   if (UNLIKELY(!IsValidMemberName(descriptor))) {
   1608     ErrorStringPrintf("Invalid field name: '%s'", descriptor);
   1609     return false;
   1610   }
   1611 
   1612   // Check ordering between items. This relies on the other sections being in order.
   1613   if (previous_item_ != NULL) {
   1614     const DexFile::FieldId* prev_item = reinterpret_cast<const DexFile::FieldId*>(previous_item_);
   1615     if (UNLIKELY(prev_item->class_idx_ > item->class_idx_)) {
   1616       ErrorStringPrintf("Out-of-order field_ids");
   1617       return false;
   1618     } else if (prev_item->class_idx_ == item->class_idx_) {
   1619       if (UNLIKELY(prev_item->name_idx_ > item->name_idx_)) {
   1620         ErrorStringPrintf("Out-of-order field_ids");
   1621         return false;
   1622       } else if (prev_item->name_idx_ == item->name_idx_) {
   1623         if (UNLIKELY(prev_item->type_idx_ >= item->type_idx_)) {
   1624           ErrorStringPrintf("Out-of-order field_ids");
   1625           return false;
   1626         }
   1627       }
   1628     }
   1629   }
   1630 
   1631   ptr_ += sizeof(DexFile::FieldId);
   1632   return true;
   1633 }
   1634 
   1635 bool DexFileVerifier::CheckInterMethodIdItem() {
   1636   const DexFile::MethodId* item = reinterpret_cast<const DexFile::MethodId*>(ptr_);
   1637 
   1638   // Check that the class descriptor is a valid reference name.
   1639   LOAD_STRING_BY_TYPE(class_descriptor, item->class_idx_, "inter_method_id_item class_idx")
   1640   if (UNLIKELY(!IsValidDescriptor(class_descriptor) || (class_descriptor[0] != 'L' &&
   1641                                                         class_descriptor[0] != '['))) {
   1642     ErrorStringPrintf("Invalid descriptor for class_idx: '%s'", class_descriptor);
   1643     return false;
   1644   }
   1645 
   1646   // Check that the name is valid.
   1647   LOAD_STRING(descriptor, item->name_idx_, "inter_method_id_item name_idx")
   1648   if (UNLIKELY(!IsValidMemberName(descriptor))) {
   1649     ErrorStringPrintf("Invalid method name: '%s'", descriptor);
   1650     return false;
   1651   }
   1652 
   1653   // Check that the proto id is valid.
   1654   if (UNLIKELY(!CheckIndex(item->proto_idx_, dex_file_->NumProtoIds(),
   1655                            "inter_method_id_item proto_idx"))) {
   1656     return false;
   1657   }
   1658 
   1659   // Check ordering between items. This relies on the other sections being in order.
   1660   if (previous_item_ != NULL) {
   1661     const DexFile::MethodId* prev_item = reinterpret_cast<const DexFile::MethodId*>(previous_item_);
   1662     if (UNLIKELY(prev_item->class_idx_ > item->class_idx_)) {
   1663       ErrorStringPrintf("Out-of-order method_ids");
   1664       return false;
   1665     } else if (prev_item->class_idx_ == item->class_idx_) {
   1666       if (UNLIKELY(prev_item->name_idx_ > item->name_idx_)) {
   1667         ErrorStringPrintf("Out-of-order method_ids");
   1668         return false;
   1669       } else if (prev_item->name_idx_ == item->name_idx_) {
   1670         if (UNLIKELY(prev_item->proto_idx_ >= item->proto_idx_)) {
   1671           ErrorStringPrintf("Out-of-order method_ids");
   1672           return false;
   1673         }
   1674       }
   1675     }
   1676   }
   1677 
   1678   ptr_ += sizeof(DexFile::MethodId);
   1679   return true;
   1680 }
   1681 
   1682 bool DexFileVerifier::CheckInterClassDefItem() {
   1683   const DexFile::ClassDef* item = reinterpret_cast<const DexFile::ClassDef*>(ptr_);
   1684 
   1685   // Check for duplicate class def.
   1686   if (defined_classes_.find(item->class_idx_) != defined_classes_.end()) {
   1687     ErrorStringPrintf("Redefinition of class with type idx: '%d'", item->class_idx_);
   1688     return false;
   1689   }
   1690   defined_classes_.insert(item->class_idx_);
   1691 
   1692   LOAD_STRING_BY_TYPE(class_descriptor, item->class_idx_, "inter_class_def_item class_idx")
   1693   if (UNLIKELY(!IsValidDescriptor(class_descriptor) || class_descriptor[0] != 'L')) {
   1694     ErrorStringPrintf("Invalid class descriptor: '%s'", class_descriptor);
   1695     return false;
   1696   }
   1697 
   1698   // Only allow non-runtime modifiers.
   1699   if ((item->access_flags_ & ~kAccJavaFlagsMask) != 0) {
   1700     ErrorStringPrintf("Invalid class flags: '%d'", item->access_flags_);
   1701     return false;
   1702   }
   1703 
   1704   if (item->interfaces_off_ != 0 &&
   1705       !CheckOffsetToTypeMap(item->interfaces_off_, DexFile::kDexTypeTypeList)) {
   1706     return false;
   1707   }
   1708   if (item->annotations_off_ != 0 &&
   1709       !CheckOffsetToTypeMap(item->annotations_off_, DexFile::kDexTypeAnnotationsDirectoryItem)) {
   1710     return false;
   1711   }
   1712   if (item->class_data_off_ != 0 &&
   1713       !CheckOffsetToTypeMap(item->class_data_off_, DexFile::kDexTypeClassDataItem)) {
   1714     return false;
   1715   }
   1716   if (item->static_values_off_ != 0 &&
   1717       !CheckOffsetToTypeMap(item->static_values_off_, DexFile::kDexTypeEncodedArrayItem)) {
   1718     return false;
   1719   }
   1720 
   1721   if (item->superclass_idx_ != DexFile::kDexNoIndex16) {
   1722     LOAD_STRING_BY_TYPE(superclass_descriptor, item->superclass_idx_,
   1723                         "inter_class_def_item superclass_idx")
   1724     if (UNLIKELY(!IsValidDescriptor(superclass_descriptor) || superclass_descriptor[0] != 'L')) {
   1725       ErrorStringPrintf("Invalid superclass: '%s'", superclass_descriptor);
   1726       return false;
   1727     }
   1728   }
   1729 
   1730   const DexFile::TypeList* interfaces = dex_file_->GetInterfacesList(*item);
   1731   if (interfaces != NULL) {
   1732     uint32_t size = interfaces->Size();
   1733 
   1734     // Ensure that all interfaces refer to classes (not arrays or primitives).
   1735     for (uint32_t i = 0; i < size; i++) {
   1736       LOAD_STRING_BY_TYPE(inf_descriptor, interfaces->GetTypeItem(i).type_idx_,
   1737                           "inter_class_def_item interface type_idx")
   1738       if (UNLIKELY(!IsValidDescriptor(inf_descriptor) || inf_descriptor[0] != 'L')) {
   1739         ErrorStringPrintf("Invalid interface: '%s'", inf_descriptor);
   1740         return false;
   1741       }
   1742     }
   1743 
   1744     /*
   1745      * Ensure that there are no duplicates. This is an O(N^2) test, but in
   1746      * practice the number of interfaces implemented by any given class is low.
   1747      */
   1748     for (uint32_t i = 1; i < size; i++) {
   1749       uint32_t idx1 = interfaces->GetTypeItem(i).type_idx_;
   1750       for (uint32_t j =0; j < i; j++) {
   1751         uint32_t idx2 = interfaces->GetTypeItem(j).type_idx_;
   1752         if (UNLIKELY(idx1 == idx2)) {
   1753           ErrorStringPrintf("Duplicate interface: '%s'", dex_file_->StringByTypeIdx(idx1));
   1754           return false;
   1755         }
   1756       }
   1757     }
   1758   }
   1759 
   1760   // Check that references in class_data_item are to the right class.
   1761   if (item->class_data_off_ != 0) {
   1762     const byte* data = begin_ + item->class_data_off_;
   1763     bool success;
   1764     uint16_t data_definer = FindFirstClassDataDefiner(data, &success);
   1765     if (!success) {
   1766       return false;
   1767     }
   1768     if (UNLIKELY((data_definer != item->class_idx_) && (data_definer != DexFile::kDexNoIndex16))) {
   1769       ErrorStringPrintf("Invalid class_data_item");
   1770       return false;
   1771     }
   1772   }
   1773 
   1774   // Check that references in annotations_directory_item are to right class.
   1775   if (item->annotations_off_ != 0) {
   1776     const byte* data = begin_ + item->annotations_off_;
   1777     bool success;
   1778     uint16_t annotations_definer = FindFirstAnnotationsDirectoryDefiner(data, &success);
   1779     if (!success) {
   1780       return false;
   1781     }
   1782     if (UNLIKELY((annotations_definer != item->class_idx_) &&
   1783                  (annotations_definer != DexFile::kDexNoIndex16))) {
   1784       ErrorStringPrintf("Invalid annotations_directory_item");
   1785       return false;
   1786     }
   1787   }
   1788 
   1789   ptr_ += sizeof(DexFile::ClassDef);
   1790   return true;
   1791 }
   1792 
   1793 bool DexFileVerifier::CheckInterAnnotationSetRefList() {
   1794   const DexFile::AnnotationSetRefList* list =
   1795       reinterpret_cast<const DexFile::AnnotationSetRefList*>(ptr_);
   1796   const DexFile::AnnotationSetRefItem* item = list->list_;
   1797   uint32_t count = list->size_;
   1798 
   1799   while (count--) {
   1800     if (item->annotations_off_ != 0 &&
   1801         !CheckOffsetToTypeMap(item->annotations_off_, DexFile::kDexTypeAnnotationSetItem)) {
   1802       return false;
   1803     }
   1804     item++;
   1805   }
   1806 
   1807   ptr_ = reinterpret_cast<const byte*>(item);
   1808   return true;
   1809 }
   1810 
   1811 bool DexFileVerifier::CheckInterAnnotationSetItem() {
   1812   const DexFile::AnnotationSetItem* set = reinterpret_cast<const DexFile::AnnotationSetItem*>(ptr_);
   1813   const uint32_t* offsets = set->entries_;
   1814   uint32_t count = set->size_;
   1815   uint32_t last_idx = 0;
   1816 
   1817   for (uint32_t i = 0; i < count; i++) {
   1818     if (*offsets != 0 && !CheckOffsetToTypeMap(*offsets, DexFile::kDexTypeAnnotationItem)) {
   1819       return false;
   1820     }
   1821 
   1822     // Get the annotation from the offset and the type index for the annotation.
   1823     const DexFile::AnnotationItem* annotation =
   1824         reinterpret_cast<const DexFile::AnnotationItem*>(begin_ + *offsets);
   1825     const uint8_t* data = annotation->annotation_;
   1826     uint32_t idx = DecodeUnsignedLeb128(&data);
   1827 
   1828     if (UNLIKELY(last_idx >= idx && i != 0)) {
   1829       ErrorStringPrintf("Out-of-order entry types: %x then %x", last_idx, idx);
   1830       return false;
   1831     }
   1832 
   1833     last_idx = idx;
   1834     offsets++;
   1835   }
   1836 
   1837   ptr_ = reinterpret_cast<const byte*>(offsets);
   1838   return true;
   1839 }
   1840 
   1841 bool DexFileVerifier::CheckInterClassDataItem() {
   1842   ClassDataItemIterator it(*dex_file_, ptr_);
   1843   bool success;
   1844   uint16_t defining_class = FindFirstClassDataDefiner(ptr_, &success);
   1845   if (!success) {
   1846     return false;
   1847   }
   1848 
   1849   for (; it.HasNextStaticField() || it.HasNextInstanceField(); it.Next()) {
   1850     LOAD_FIELD(field, it.GetMemberIndex(), "inter_class_data_item field_id", return false)
   1851     if (UNLIKELY(field->class_idx_ != defining_class)) {
   1852       ErrorStringPrintf("Mismatched defining class for class_data_item field");
   1853       return false;
   1854     }
   1855   }
   1856   for (; it.HasNextDirectMethod() || it.HasNextVirtualMethod(); it.Next()) {
   1857     uint32_t code_off = it.GetMethodCodeItemOffset();
   1858     if (code_off != 0 && !CheckOffsetToTypeMap(code_off, DexFile::kDexTypeCodeItem)) {
   1859       return false;
   1860     }
   1861     LOAD_METHOD(method, it.GetMemberIndex(), "inter_class_data_item method_id", return false)
   1862     if (UNLIKELY(method->class_idx_ != defining_class)) {
   1863       ErrorStringPrintf("Mismatched defining class for class_data_item method");
   1864       return false;
   1865     }
   1866   }
   1867 
   1868   ptr_ = it.EndDataPointer();
   1869   return true;
   1870 }
   1871 
   1872 bool DexFileVerifier::CheckInterAnnotationsDirectoryItem() {
   1873   const DexFile::AnnotationsDirectoryItem* item =
   1874       reinterpret_cast<const DexFile::AnnotationsDirectoryItem*>(ptr_);
   1875   bool success;
   1876   uint16_t defining_class = FindFirstAnnotationsDirectoryDefiner(ptr_, &success);
   1877   if (!success) {
   1878     return false;
   1879   }
   1880 
   1881   if (item->class_annotations_off_ != 0 &&
   1882       !CheckOffsetToTypeMap(item->class_annotations_off_, DexFile::kDexTypeAnnotationSetItem)) {
   1883     return false;
   1884   }
   1885 
   1886   // Field annotations follow immediately after the annotations directory.
   1887   const DexFile::FieldAnnotationsItem* field_item =
   1888       reinterpret_cast<const DexFile::FieldAnnotationsItem*>(item + 1);
   1889   uint32_t field_count = item->fields_size_;
   1890   for (uint32_t i = 0; i < field_count; i++) {
   1891     LOAD_FIELD(field, field_item->field_idx_, "inter_annotations_directory_item field_id",
   1892                return false)
   1893     if (UNLIKELY(field->class_idx_ != defining_class)) {
   1894       ErrorStringPrintf("Mismatched defining class for field_annotation");
   1895       return false;
   1896     }
   1897     if (!CheckOffsetToTypeMap(field_item->annotations_off_, DexFile::kDexTypeAnnotationSetItem)) {
   1898       return false;
   1899     }
   1900     field_item++;
   1901   }
   1902 
   1903   // Method annotations follow immediately after field annotations.
   1904   const DexFile::MethodAnnotationsItem* method_item =
   1905       reinterpret_cast<const DexFile::MethodAnnotationsItem*>(field_item);
   1906   uint32_t method_count = item->methods_size_;
   1907   for (uint32_t i = 0; i < method_count; i++) {
   1908     LOAD_METHOD(method, method_item->method_idx_, "inter_annotations_directory_item method_id",
   1909                 return false)
   1910     if (UNLIKELY(method->class_idx_ != defining_class)) {
   1911       ErrorStringPrintf("Mismatched defining class for method_annotation");
   1912       return false;
   1913     }
   1914     if (!CheckOffsetToTypeMap(method_item->annotations_off_, DexFile::kDexTypeAnnotationSetItem)) {
   1915       return false;
   1916     }
   1917     method_item++;
   1918   }
   1919 
   1920   // Parameter annotations follow immediately after method annotations.
   1921   const DexFile::ParameterAnnotationsItem* parameter_item =
   1922       reinterpret_cast<const DexFile::ParameterAnnotationsItem*>(method_item);
   1923   uint32_t parameter_count = item->parameters_size_;
   1924   for (uint32_t i = 0; i < parameter_count; i++) {
   1925     LOAD_METHOD(parameter_method, parameter_item->method_idx_,
   1926                 "inter_annotations_directory_item parameter method_id", return false)
   1927     if (UNLIKELY(parameter_method->class_idx_ != defining_class)) {
   1928       ErrorStringPrintf("Mismatched defining class for parameter_annotation");
   1929       return false;
   1930     }
   1931     if (!CheckOffsetToTypeMap(parameter_item->annotations_off_,
   1932         DexFile::kDexTypeAnnotationSetRefList)) {
   1933       return false;
   1934     }
   1935     parameter_item++;
   1936   }
   1937 
   1938   ptr_ = reinterpret_cast<const byte*>(parameter_item);
   1939   return true;
   1940 }
   1941 
   1942 bool DexFileVerifier::CheckInterSectionIterate(size_t offset, uint32_t count, uint16_t type) {
   1943   // Get the right alignment mask for the type of section.
   1944   size_t alignment_mask;
   1945   switch (type) {
   1946     case DexFile::kDexTypeClassDataItem:
   1947       alignment_mask = sizeof(uint8_t) - 1;
   1948       break;
   1949     default:
   1950       alignment_mask = sizeof(uint32_t) - 1;
   1951       break;
   1952   }
   1953 
   1954   // Iterate through the items in the section.
   1955   previous_item_ = NULL;
   1956   for (uint32_t i = 0; i < count; i++) {
   1957     uint32_t new_offset = (offset + alignment_mask) & ~alignment_mask;
   1958     ptr_ = begin_ + new_offset;
   1959     const byte* prev_ptr = ptr_;
   1960 
   1961     // Check depending on the section type.
   1962     switch (type) {
   1963       case DexFile::kDexTypeStringIdItem: {
   1964         if (!CheckInterStringIdItem()) {
   1965           return false;
   1966         }
   1967         break;
   1968       }
   1969       case DexFile::kDexTypeTypeIdItem: {
   1970         if (!CheckInterTypeIdItem()) {
   1971           return false;
   1972         }
   1973         break;
   1974       }
   1975       case DexFile::kDexTypeProtoIdItem: {
   1976         if (!CheckInterProtoIdItem()) {
   1977           return false;
   1978         }
   1979         break;
   1980       }
   1981       case DexFile::kDexTypeFieldIdItem: {
   1982         if (!CheckInterFieldIdItem()) {
   1983           return false;
   1984         }
   1985         break;
   1986       }
   1987       case DexFile::kDexTypeMethodIdItem: {
   1988         if (!CheckInterMethodIdItem()) {
   1989           return false;
   1990         }
   1991         break;
   1992       }
   1993       case DexFile::kDexTypeClassDefItem: {
   1994         if (!CheckInterClassDefItem()) {
   1995           return false;
   1996         }
   1997         break;
   1998       }
   1999       case DexFile::kDexTypeAnnotationSetRefList: {
   2000         if (!CheckInterAnnotationSetRefList()) {
   2001           return false;
   2002         }
   2003         break;
   2004       }
   2005       case DexFile::kDexTypeAnnotationSetItem: {
   2006         if (!CheckInterAnnotationSetItem()) {
   2007           return false;
   2008         }
   2009         break;
   2010       }
   2011       case DexFile::kDexTypeClassDataItem: {
   2012         if (!CheckInterClassDataItem()) {
   2013           return false;
   2014         }
   2015         break;
   2016       }
   2017       case DexFile::kDexTypeAnnotationsDirectoryItem: {
   2018         if (!CheckInterAnnotationsDirectoryItem()) {
   2019           return false;
   2020         }
   2021         break;
   2022       }
   2023       default:
   2024         ErrorStringPrintf("Unknown map item type %x", type);
   2025         return false;
   2026     }
   2027 
   2028     previous_item_ = prev_ptr;
   2029     offset = ptr_ - begin_;
   2030   }
   2031 
   2032   return true;
   2033 }
   2034 
   2035 bool DexFileVerifier::CheckInterSection() {
   2036   const DexFile::MapList* map = reinterpret_cast<const DexFile::MapList*>(begin_ + header_->map_off_);
   2037   const DexFile::MapItem* item = map->list_;
   2038   uint32_t count = map->size_;
   2039 
   2040   // Cross check the items listed in the map.
   2041   while (count--) {
   2042     uint32_t section_offset = item->offset_;
   2043     uint32_t section_count = item->size_;
   2044     uint16_t type = item->type_;
   2045 
   2046     switch (type) {
   2047       case DexFile::kDexTypeHeaderItem:
   2048       case DexFile::kDexTypeMapList:
   2049       case DexFile::kDexTypeTypeList:
   2050       case DexFile::kDexTypeCodeItem:
   2051       case DexFile::kDexTypeStringDataItem:
   2052       case DexFile::kDexTypeDebugInfoItem:
   2053       case DexFile::kDexTypeAnnotationItem:
   2054       case DexFile::kDexTypeEncodedArrayItem:
   2055         break;
   2056       case DexFile::kDexTypeStringIdItem:
   2057       case DexFile::kDexTypeTypeIdItem:
   2058       case DexFile::kDexTypeProtoIdItem:
   2059       case DexFile::kDexTypeFieldIdItem:
   2060       case DexFile::kDexTypeMethodIdItem:
   2061       case DexFile::kDexTypeClassDefItem:
   2062       case DexFile::kDexTypeAnnotationSetRefList:
   2063       case DexFile::kDexTypeAnnotationSetItem:
   2064       case DexFile::kDexTypeClassDataItem:
   2065       case DexFile::kDexTypeAnnotationsDirectoryItem: {
   2066         if (!CheckInterSectionIterate(section_offset, section_count, type)) {
   2067           return false;
   2068         }
   2069         break;
   2070       }
   2071       default:
   2072         ErrorStringPrintf("Unknown map item type %x", type);
   2073         return false;
   2074     }
   2075 
   2076     item++;
   2077   }
   2078 
   2079   return true;
   2080 }
   2081 
   2082 bool DexFileVerifier::Verify() {
   2083   // Check the header.
   2084   if (!CheckHeader()) {
   2085     return false;
   2086   }
   2087 
   2088   // Check the map section.
   2089   if (!CheckMap()) {
   2090     return false;
   2091   }
   2092 
   2093   // Check structure within remaining sections.
   2094   if (!CheckIntraSection()) {
   2095     return false;
   2096   }
   2097 
   2098   // Check references from one section to another.
   2099   if (!CheckInterSection()) {
   2100     return false;
   2101   }
   2102 
   2103   return true;
   2104 }
   2105 
   2106 void DexFileVerifier::ErrorStringPrintf(const char* fmt, ...) {
   2107   va_list ap;
   2108   va_start(ap, fmt);
   2109   DCHECK(failure_reason_.empty()) << failure_reason_;
   2110   failure_reason_ = StringPrintf("Failure to verify dex file '%s': ", location_);
   2111   StringAppendV(&failure_reason_, fmt, ap);
   2112   va_end(ap);
   2113 }
   2114 
   2115 }  // namespace art
   2116