1 /*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #define LOG_TAG "NativeLibraryHelper"
18 //#define LOG_NDEBUG 0
19
20 #include "core_jni_helpers.h"
21
22 #include <nativehelper/ScopedUtfChars.h>
23 #include <androidfw/ZipFileRO.h>
24 #include <androidfw/ZipUtils.h>
25 #include <utils/Log.h>
26 #include <utils/Vector.h>
27
28 #include <zlib.h>
29
30 #include <fcntl.h>
31 #include <stdlib.h>
32 #include <string.h>
33 #include <time.h>
34 #include <unistd.h>
35 #include <inttypes.h>
36 #include <sys/stat.h>
37 #include <sys/types.h>
38
39 #include <memory>
40
41 #define APK_LIB "lib/"
42 #define APK_LIB_LEN (sizeof(APK_LIB) - 1)
43
44 #define LIB_PREFIX "/lib"
45 #define LIB_PREFIX_LEN (sizeof(LIB_PREFIX) - 1)
46
47 #define LIB_SUFFIX ".so"
48 #define LIB_SUFFIX_LEN (sizeof(LIB_SUFFIX) - 1)
49
50 #define RS_BITCODE_SUFFIX ".bc"
51
52 #define TMP_FILE_PATTERN "/tmp.XXXXXX"
53 #define TMP_FILE_PATTERN_LEN (sizeof(TMP_FILE_PATTERN) - 1)
54
55 namespace android {
56
57 // These match PackageManager.java install codes
58 enum install_status_t {
59 INSTALL_SUCCEEDED = 1,
60 INSTALL_FAILED_INVALID_APK = -2,
61 INSTALL_FAILED_INSUFFICIENT_STORAGE = -4,
62 INSTALL_FAILED_CONTAINER_ERROR = -18,
63 INSTALL_FAILED_INTERNAL_ERROR = -110,
64 INSTALL_FAILED_NO_MATCHING_ABIS = -113,
65 NO_NATIVE_LIBRARIES = -114
66 };
67
68 typedef install_status_t (*iterFunc)(JNIEnv*, void*, ZipFileRO*, ZipEntryRO, const char*);
69
70 // Equivalent to android.os.FileUtils.isFilenameSafe
71 static bool
isFilenameSafe(const char * filename)72 isFilenameSafe(const char* filename)
73 {
74 off_t offset = 0;
75 for (;;) {
76 switch (*(filename + offset)) {
77 case 0:
78 // Null.
79 // If we've reached the end, all the other characters are good.
80 return true;
81
82 case 'A' ... 'Z':
83 case 'a' ... 'z':
84 case '0' ... '9':
85 case '+':
86 case ',':
87 case '-':
88 case '.':
89 case '/':
90 case '=':
91 case '_':
92 offset++;
93 break;
94
95 default:
96 // We found something that is not good.
97 return false;
98 }
99 }
100 // Should not reach here.
101 }
102
103 static bool
isFileDifferent(const char * filePath,uint32_t fileSize,time_t modifiedTime,uint32_t zipCrc,struct stat64 * st)104 isFileDifferent(const char* filePath, uint32_t fileSize, time_t modifiedTime,
105 uint32_t zipCrc, struct stat64* st)
106 {
107 if (lstat64(filePath, st) < 0) {
108 // File is not found or cannot be read.
109 ALOGV("Couldn't stat %s, copying: %s\n", filePath, strerror(errno));
110 return true;
111 }
112
113 if (!S_ISREG(st->st_mode)) {
114 return true;
115 }
116
117 if (static_cast<uint64_t>(st->st_size) != static_cast<uint64_t>(fileSize)) {
118 return true;
119 }
120
121 // For some reason, bionic doesn't define st_mtime as time_t
122 if (time_t(st->st_mtime) != modifiedTime) {
123 ALOGV("mod time doesn't match: %ld vs. %ld\n", st->st_mtime, modifiedTime);
124 return true;
125 }
126
127 int fd = TEMP_FAILURE_RETRY(open(filePath, O_RDONLY));
128 if (fd < 0) {
129 ALOGV("Couldn't open file %s: %s", filePath, strerror(errno));
130 return true;
131 }
132
133 // uLong comes from zlib.h. It's a bit of a wart that they're
134 // potentially using a 64-bit type for a 32-bit CRC.
135 uLong crc = crc32(0L, Z_NULL, 0);
136 unsigned char crcBuffer[16384];
137 ssize_t numBytes;
138 while ((numBytes = TEMP_FAILURE_RETRY(read(fd, crcBuffer, sizeof(crcBuffer)))) > 0) {
139 crc = crc32(crc, crcBuffer, numBytes);
140 }
141 close(fd);
142
143 ALOGV("%s: crc = %lx, zipCrc = %" PRIu32 "\n", filePath, crc, zipCrc);
144
145 if (crc != static_cast<uLong>(zipCrc)) {
146 return true;
147 }
148
149 return false;
150 }
151
152 static install_status_t
sumFiles(JNIEnv *,void * arg,ZipFileRO * zipFile,ZipEntryRO zipEntry,const char *)153 sumFiles(JNIEnv*, void* arg, ZipFileRO* zipFile, ZipEntryRO zipEntry, const char*)
154 {
155 size_t* total = (size_t*) arg;
156 uint32_t uncompLen;
157
158 if (!zipFile->getEntryInfo(zipEntry, NULL, &uncompLen, NULL, NULL, NULL, NULL)) {
159 return INSTALL_FAILED_INVALID_APK;
160 }
161
162 *total += static_cast<size_t>(uncompLen);
163
164 return INSTALL_SUCCEEDED;
165 }
166
167 /*
168 * Copy the native library if needed.
169 *
170 * This function assumes the library and path names passed in are considered safe.
171 */
172 static install_status_t
copyFileIfChanged(JNIEnv * env,void * arg,ZipFileRO * zipFile,ZipEntryRO zipEntry,const char * fileName)173 copyFileIfChanged(JNIEnv *env, void* arg, ZipFileRO* zipFile, ZipEntryRO zipEntry, const char* fileName)
174 {
175 void** args = reinterpret_cast<void**>(arg);
176 jstring* javaNativeLibPath = (jstring*) args[0];
177 jboolean extractNativeLibs = *(jboolean*) args[1];
178 jboolean hasNativeBridge = *(jboolean*) args[2];
179
180 ScopedUtfChars nativeLibPath(env, *javaNativeLibPath);
181
182 uint32_t uncompLen;
183 uint32_t when;
184 uint32_t crc;
185
186 uint16_t method;
187 off64_t offset;
188
189 if (!zipFile->getEntryInfo(zipEntry, &method, &uncompLen, NULL, &offset, &when, &crc)) {
190 ALOGD("Couldn't read zip entry info\n");
191 return INSTALL_FAILED_INVALID_APK;
192 }
193
194 if (!extractNativeLibs) {
195 // check if library is uncompressed and page-aligned
196 if (method != ZipFileRO::kCompressStored) {
197 ALOGD("Library '%s' is compressed - will not be able to open it directly from apk.\n",
198 fileName);
199 return INSTALL_FAILED_INVALID_APK;
200 }
201
202 if (offset % PAGE_SIZE != 0) {
203 ALOGD("Library '%s' is not page-aligned - will not be able to open it directly from"
204 " apk.\n", fileName);
205 return INSTALL_FAILED_INVALID_APK;
206 }
207
208 if (!hasNativeBridge) {
209 return INSTALL_SUCCEEDED;
210 }
211 }
212
213 // Build local file path
214 const size_t fileNameLen = strlen(fileName);
215 char localFileName[nativeLibPath.size() + fileNameLen + 2];
216
217 if (strlcpy(localFileName, nativeLibPath.c_str(), sizeof(localFileName)) != nativeLibPath.size()) {
218 ALOGD("Couldn't allocate local file name for library");
219 return INSTALL_FAILED_INTERNAL_ERROR;
220 }
221
222 *(localFileName + nativeLibPath.size()) = '/';
223
224 if (strlcpy(localFileName + nativeLibPath.size() + 1, fileName, sizeof(localFileName)
225 - nativeLibPath.size() - 1) != fileNameLen) {
226 ALOGD("Couldn't allocate local file name for library");
227 return INSTALL_FAILED_INTERNAL_ERROR;
228 }
229
230 // Only copy out the native file if it's different.
231 struct tm t;
232 ZipUtils::zipTimeToTimespec(when, &t);
233 const time_t modTime = mktime(&t);
234 struct stat64 st;
235 if (!isFileDifferent(localFileName, uncompLen, modTime, crc, &st)) {
236 return INSTALL_SUCCEEDED;
237 }
238
239 char localTmpFileName[nativeLibPath.size() + TMP_FILE_PATTERN_LEN + 1];
240 if (strlcpy(localTmpFileName, nativeLibPath.c_str(), sizeof(localTmpFileName))
241 != nativeLibPath.size()) {
242 ALOGD("Couldn't allocate local file name for library");
243 return INSTALL_FAILED_INTERNAL_ERROR;
244 }
245
246 if (strlcpy(localTmpFileName + nativeLibPath.size(), TMP_FILE_PATTERN,
247 TMP_FILE_PATTERN_LEN + 1) != TMP_FILE_PATTERN_LEN) {
248 ALOGI("Couldn't allocate temporary file name for library");
249 return INSTALL_FAILED_INTERNAL_ERROR;
250 }
251
252 int fd = mkstemp(localTmpFileName);
253 if (fd < 0) {
254 ALOGI("Couldn't open temporary file name: %s: %s\n", localTmpFileName, strerror(errno));
255 return INSTALL_FAILED_CONTAINER_ERROR;
256 }
257
258 if (!zipFile->uncompressEntry(zipEntry, fd)) {
259 ALOGI("Failed uncompressing %s to %s\n", fileName, localTmpFileName);
260 close(fd);
261 unlink(localTmpFileName);
262 return INSTALL_FAILED_CONTAINER_ERROR;
263 }
264
265 close(fd);
266
267 // Set the modification time for this file to the ZIP's mod time.
268 struct timeval times[2];
269 times[0].tv_sec = st.st_atime;
270 times[1].tv_sec = modTime;
271 times[0].tv_usec = times[1].tv_usec = 0;
272 if (utimes(localTmpFileName, times) < 0) {
273 ALOGI("Couldn't change modification time on %s: %s\n", localTmpFileName, strerror(errno));
274 unlink(localTmpFileName);
275 return INSTALL_FAILED_CONTAINER_ERROR;
276 }
277
278 // Set the mode to 755
279 static const mode_t mode = S_IRUSR | S_IWUSR | S_IXUSR | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH;
280 if (chmod(localTmpFileName, mode) < 0) {
281 ALOGI("Couldn't change permissions on %s: %s\n", localTmpFileName, strerror(errno));
282 unlink(localTmpFileName);
283 return INSTALL_FAILED_CONTAINER_ERROR;
284 }
285
286 // Finally, rename it to the final name.
287 if (rename(localTmpFileName, localFileName) < 0) {
288 ALOGI("Couldn't rename %s to %s: %s\n", localTmpFileName, localFileName, strerror(errno));
289 unlink(localTmpFileName);
290 return INSTALL_FAILED_CONTAINER_ERROR;
291 }
292
293 ALOGV("Successfully moved %s to %s\n", localTmpFileName, localFileName);
294
295 return INSTALL_SUCCEEDED;
296 }
297
298 /*
299 * An iterator over all shared libraries in a zip file. An entry is
300 * considered to be a shared library if all of the conditions below are
301 * satisfied :
302 *
303 * - The entry is under the lib/ directory.
304 * - The entry name ends with ".so" and the entry name starts with "lib",
305 * an exception is made for entries whose name is "gdbserver".
306 * - The entry filename is "safe" (as determined by isFilenameSafe).
307 *
308 */
309 class NativeLibrariesIterator {
310 private:
NativeLibrariesIterator(ZipFileRO * zipFile,bool debuggable,void * cookie)311 NativeLibrariesIterator(ZipFileRO* zipFile, bool debuggable, void* cookie)
312 : mZipFile(zipFile), mDebuggable(debuggable), mCookie(cookie), mLastSlash(NULL) {
313 fileName[0] = '\0';
314 }
315
316 public:
create(ZipFileRO * zipFile,bool debuggable)317 static NativeLibrariesIterator* create(ZipFileRO* zipFile, bool debuggable) {
318 void* cookie = NULL;
319 // Do not specify a suffix to find both .so files and gdbserver.
320 if (!zipFile->startIteration(&cookie, APK_LIB, NULL /* suffix */)) {
321 return NULL;
322 }
323
324 return new NativeLibrariesIterator(zipFile, debuggable, cookie);
325 }
326
next()327 ZipEntryRO next() {
328 ZipEntryRO next = NULL;
329 while ((next = mZipFile->nextEntry(mCookie)) != NULL) {
330 // Make sure this entry has a filename.
331 if (mZipFile->getEntryFileName(next, fileName, sizeof(fileName))) {
332 continue;
333 }
334
335 // Make sure the filename is at least to the minimum library name size.
336 const size_t fileNameLen = strlen(fileName);
337 static const size_t minLength = APK_LIB_LEN + 2 + LIB_PREFIX_LEN + 1 + LIB_SUFFIX_LEN;
338 if (fileNameLen < minLength) {
339 continue;
340 }
341
342 const char* lastSlash = strrchr(fileName, '/');
343 ALOG_ASSERT(lastSlash != NULL, "last slash was null somehow for %s\n", fileName);
344
345 // Skip directories.
346 if (*(lastSlash + 1) == 0) {
347 continue;
348 }
349
350 // Make sure the filename is safe.
351 if (!isFilenameSafe(lastSlash + 1)) {
352 continue;
353 }
354
355 if (!mDebuggable) {
356 // Make sure the filename starts with lib and ends with ".so".
357 if (strncmp(fileName + fileNameLen - LIB_SUFFIX_LEN, LIB_SUFFIX, LIB_SUFFIX_LEN)
358 || strncmp(lastSlash, LIB_PREFIX, LIB_PREFIX_LEN)) {
359 continue;
360 }
361 }
362
363 mLastSlash = lastSlash;
364 break;
365 }
366
367 return next;
368 }
369
currentEntry() const370 inline const char* currentEntry() const {
371 return fileName;
372 }
373
lastSlash() const374 inline const char* lastSlash() const {
375 return mLastSlash;
376 }
377
~NativeLibrariesIterator()378 virtual ~NativeLibrariesIterator() {
379 mZipFile->endIteration(mCookie);
380 }
381 private:
382
383 char fileName[PATH_MAX];
384 ZipFileRO* const mZipFile;
385 const bool mDebuggable;
386 void* mCookie;
387 const char* mLastSlash;
388 };
389
390 static install_status_t
iterateOverNativeFiles(JNIEnv * env,jlong apkHandle,jstring javaCpuAbi,jboolean debuggable,iterFunc callFunc,void * callArg)391 iterateOverNativeFiles(JNIEnv *env, jlong apkHandle, jstring javaCpuAbi,
392 jboolean debuggable, iterFunc callFunc, void* callArg) {
393 ZipFileRO* zipFile = reinterpret_cast<ZipFileRO*>(apkHandle);
394 if (zipFile == NULL) {
395 return INSTALL_FAILED_INVALID_APK;
396 }
397
398 std::unique_ptr<NativeLibrariesIterator> it(
399 NativeLibrariesIterator::create(zipFile, debuggable));
400 if (it.get() == NULL) {
401 return INSTALL_FAILED_INVALID_APK;
402 }
403
404 const ScopedUtfChars cpuAbi(env, javaCpuAbi);
405 if (cpuAbi.c_str() == NULL) {
406 // This would've thrown, so this return code isn't observable by
407 // Java.
408 return INSTALL_FAILED_INVALID_APK;
409 }
410 ZipEntryRO entry = NULL;
411 while ((entry = it->next()) != NULL) {
412 const char* fileName = it->currentEntry();
413 const char* lastSlash = it->lastSlash();
414
415 // Check to make sure the CPU ABI of this file is one we support.
416 const char* cpuAbiOffset = fileName + APK_LIB_LEN;
417 const size_t cpuAbiRegionSize = lastSlash - cpuAbiOffset;
418
419 if (cpuAbi.size() == cpuAbiRegionSize && !strncmp(cpuAbiOffset, cpuAbi.c_str(), cpuAbiRegionSize)) {
420 install_status_t ret = callFunc(env, callArg, zipFile, entry, lastSlash + 1);
421
422 if (ret != INSTALL_SUCCEEDED) {
423 ALOGV("Failure for entry %s", lastSlash + 1);
424 return ret;
425 }
426 }
427 }
428
429 return INSTALL_SUCCEEDED;
430 }
431
432
findSupportedAbi(JNIEnv * env,jlong apkHandle,jobjectArray supportedAbisArray,jboolean debuggable)433 static int findSupportedAbi(JNIEnv *env, jlong apkHandle, jobjectArray supportedAbisArray,
434 jboolean debuggable) {
435 const int numAbis = env->GetArrayLength(supportedAbisArray);
436 Vector<ScopedUtfChars*> supportedAbis;
437
438 for (int i = 0; i < numAbis; ++i) {
439 supportedAbis.add(new ScopedUtfChars(env,
440 (jstring) env->GetObjectArrayElement(supportedAbisArray, i)));
441 }
442
443 ZipFileRO* zipFile = reinterpret_cast<ZipFileRO*>(apkHandle);
444 if (zipFile == NULL) {
445 return INSTALL_FAILED_INVALID_APK;
446 }
447
448 std::unique_ptr<NativeLibrariesIterator> it(
449 NativeLibrariesIterator::create(zipFile, debuggable));
450 if (it.get() == NULL) {
451 return INSTALL_FAILED_INVALID_APK;
452 }
453
454 ZipEntryRO entry = NULL;
455 int status = NO_NATIVE_LIBRARIES;
456 while ((entry = it->next()) != NULL) {
457 // We're currently in the lib/ directory of the APK, so it does have some native
458 // code. We should return INSTALL_FAILED_NO_MATCHING_ABIS if none of the
459 // libraries match.
460 if (status == NO_NATIVE_LIBRARIES) {
461 status = INSTALL_FAILED_NO_MATCHING_ABIS;
462 }
463
464 const char* fileName = it->currentEntry();
465 const char* lastSlash = it->lastSlash();
466
467 // Check to see if this CPU ABI matches what we are looking for.
468 const char* abiOffset = fileName + APK_LIB_LEN;
469 const size_t abiSize = lastSlash - abiOffset;
470 for (int i = 0; i < numAbis; i++) {
471 const ScopedUtfChars* abi = supportedAbis[i];
472 if (abi->size() == abiSize && !strncmp(abiOffset, abi->c_str(), abiSize)) {
473 // The entry that comes in first (i.e. with a lower index) has the higher priority.
474 if (((i < status) && (status >= 0)) || (status < 0) ) {
475 status = i;
476 }
477 }
478 }
479 }
480
481 for (int i = 0; i < numAbis; ++i) {
482 delete supportedAbis[i];
483 }
484
485 return status;
486 }
487
488 static jint
com_android_internal_content_NativeLibraryHelper_copyNativeBinaries(JNIEnv * env,jclass clazz,jlong apkHandle,jstring javaNativeLibPath,jstring javaCpuAbi,jboolean extractNativeLibs,jboolean hasNativeBridge,jboolean debuggable)489 com_android_internal_content_NativeLibraryHelper_copyNativeBinaries(JNIEnv *env, jclass clazz,
490 jlong apkHandle, jstring javaNativeLibPath, jstring javaCpuAbi,
491 jboolean extractNativeLibs, jboolean hasNativeBridge, jboolean debuggable)
492 {
493 void* args[] = { &javaNativeLibPath, &extractNativeLibs, &hasNativeBridge };
494 return (jint) iterateOverNativeFiles(env, apkHandle, javaCpuAbi, debuggable,
495 copyFileIfChanged, reinterpret_cast<void*>(args));
496 }
497
498 static jlong
com_android_internal_content_NativeLibraryHelper_sumNativeBinaries(JNIEnv * env,jclass clazz,jlong apkHandle,jstring javaCpuAbi,jboolean debuggable)499 com_android_internal_content_NativeLibraryHelper_sumNativeBinaries(JNIEnv *env, jclass clazz,
500 jlong apkHandle, jstring javaCpuAbi, jboolean debuggable)
501 {
502 size_t totalSize = 0;
503
504 iterateOverNativeFiles(env, apkHandle, javaCpuAbi, debuggable, sumFiles, &totalSize);
505
506 return totalSize;
507 }
508
509 static jint
com_android_internal_content_NativeLibraryHelper_findSupportedAbi(JNIEnv * env,jclass clazz,jlong apkHandle,jobjectArray javaCpuAbisToSearch,jboolean debuggable)510 com_android_internal_content_NativeLibraryHelper_findSupportedAbi(JNIEnv *env, jclass clazz,
511 jlong apkHandle, jobjectArray javaCpuAbisToSearch, jboolean debuggable)
512 {
513 return (jint) findSupportedAbi(env, apkHandle, javaCpuAbisToSearch, debuggable);
514 }
515
516 enum bitcode_scan_result_t {
517 APK_SCAN_ERROR = -1,
518 NO_BITCODE_PRESENT = 0,
519 BITCODE_PRESENT = 1,
520 };
521
522 static jint
com_android_internal_content_NativeLibraryHelper_hasRenderscriptBitcode(JNIEnv * env,jclass clazz,jlong apkHandle)523 com_android_internal_content_NativeLibraryHelper_hasRenderscriptBitcode(JNIEnv *env, jclass clazz,
524 jlong apkHandle) {
525 ZipFileRO* zipFile = reinterpret_cast<ZipFileRO*>(apkHandle);
526 void* cookie = NULL;
527 if (!zipFile->startIteration(&cookie, NULL /* prefix */, RS_BITCODE_SUFFIX)) {
528 return APK_SCAN_ERROR;
529 }
530
531 char fileName[PATH_MAX];
532 ZipEntryRO next = NULL;
533 while ((next = zipFile->nextEntry(cookie)) != NULL) {
534 if (zipFile->getEntryFileName(next, fileName, sizeof(fileName))) {
535 continue;
536 }
537 const char* lastSlash = strrchr(fileName, '/');
538 const char* baseName = (lastSlash == NULL) ? fileName : fileName + 1;
539 if (isFilenameSafe(baseName)) {
540 zipFile->endIteration(cookie);
541 return BITCODE_PRESENT;
542 }
543 }
544
545 zipFile->endIteration(cookie);
546 return NO_BITCODE_PRESENT;
547 }
548
549 static jlong
com_android_internal_content_NativeLibraryHelper_openApk(JNIEnv * env,jclass,jstring apkPath)550 com_android_internal_content_NativeLibraryHelper_openApk(JNIEnv *env, jclass, jstring apkPath)
551 {
552 ScopedUtfChars filePath(env, apkPath);
553 ZipFileRO* zipFile = ZipFileRO::open(filePath.c_str());
554
555 return reinterpret_cast<jlong>(zipFile);
556 }
557
558 static jlong
com_android_internal_content_NativeLibraryHelper_openApkFd(JNIEnv * env,jclass,jobject fileDescriptor,jstring debugPathName)559 com_android_internal_content_NativeLibraryHelper_openApkFd(JNIEnv *env, jclass,
560 jobject fileDescriptor, jstring debugPathName)
561 {
562 ScopedUtfChars debugFilePath(env, debugPathName);
563
564 int fd = jniGetFDFromFileDescriptor(env, fileDescriptor);
565 if (fd < 0) {
566 jniThrowException(env, "java/lang/IllegalArgumentException", "Bad FileDescriptor");
567 return 0;
568 }
569
570 ZipFileRO* zipFile = ZipFileRO::openFd(fd, debugFilePath.c_str());
571
572 return reinterpret_cast<jlong>(zipFile);
573 }
574
575 static void
com_android_internal_content_NativeLibraryHelper_close(JNIEnv * env,jclass,jlong apkHandle)576 com_android_internal_content_NativeLibraryHelper_close(JNIEnv *env, jclass, jlong apkHandle)
577 {
578 delete reinterpret_cast<ZipFileRO*>(apkHandle);
579 }
580
581 static const JNINativeMethod gMethods[] = {
582 {"nativeOpenApk",
583 "(Ljava/lang/String;)J",
584 (void *)com_android_internal_content_NativeLibraryHelper_openApk},
585 {"nativeOpenApkFd",
586 "(Ljava/io/FileDescriptor;Ljava/lang/String;)J",
587 (void *)com_android_internal_content_NativeLibraryHelper_openApkFd},
588 {"nativeClose",
589 "(J)V",
590 (void *)com_android_internal_content_NativeLibraryHelper_close},
591 {"nativeCopyNativeBinaries",
592 "(JLjava/lang/String;Ljava/lang/String;ZZZ)I",
593 (void *)com_android_internal_content_NativeLibraryHelper_copyNativeBinaries},
594 {"nativeSumNativeBinaries",
595 "(JLjava/lang/String;Z)J",
596 (void *)com_android_internal_content_NativeLibraryHelper_sumNativeBinaries},
597 {"nativeFindSupportedAbi",
598 "(J[Ljava/lang/String;Z)I",
599 (void *)com_android_internal_content_NativeLibraryHelper_findSupportedAbi},
600 {"hasRenderscriptBitcode", "(J)I",
601 (void *)com_android_internal_content_NativeLibraryHelper_hasRenderscriptBitcode},
602 };
603
604
register_com_android_internal_content_NativeLibraryHelper(JNIEnv * env)605 int register_com_android_internal_content_NativeLibraryHelper(JNIEnv *env)
606 {
607 return RegisterMethodsOrDie(env,
608 "com/android/internal/content/NativeLibraryHelper", gMethods, NELEM(gMethods));
609 }
610
611 };
612