1 /*
2 * Copyright (c) 2024 Huawei Device Co., Ltd.
3 * Licensed under the Apache License, Version 2.0 (the "License");
4 * you may not use this file except in compliance with the License.
5 * You may obtain a copy of the License at
6 *
7 * http://www.apache.org/licenses/LICENSE-2.0
8 *
9 * Unless required by applicable law or agreed to in writing, software
10 * distributed under the License is distributed on an "AS IS" BASIS,
11 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12 * See the License for the specific language governing permissions and
13 * limitations under the License.
14 */
15
16 #ifndef OHOS_ABILITY_RUNTIME_APPSPAWN_UTIL_H
17 #define OHOS_ABILITY_RUNTIME_APPSPAWN_UTIL_H
18
19 #include "ability_info.h"
20 #include "app_spawn_client.h"
21 #include "global_constant.h"
22 #include "hitrace_meter.h"
23 #include "want.h"
24
25 namespace OHOS {
26 namespace AppExecFwk {
27 namespace AppspawnUtil {
28 constexpr const char* DLP_PARAMS_INDEX = "ohos.dlp.params.index";
29 constexpr const char*
30 JIT_PERMISSION_ALLOW_WRITABLE_CODE_MEMORY = "ohos.permission.kernel.ALLOW_WRITABLE_CODE_MEMORY";
31 constexpr const char*
32 JIT_PERMISSION_DISABLE_CODE_MEMORY_PROTECTION = "ohos.permission.kernel.DISABLE_CODE_MEMORY_PROTECTION";
33 constexpr const char*
34 JIT_PERMISSION_ALLOW_EXECUTABLE_FORT_MEMORY = "ohos.permission.kernel.ALLOW_EXECUTABLE_FORT_MEMORY";
35
BuildStartFlags(const AAFwk::Want & want,const ApplicationInfo & applicationInfo)36 static uint32_t BuildStartFlags(const AAFwk::Want &want, const ApplicationInfo &applicationInfo)
37 {
38 uint32_t startFlags = 0x0;
39 if (want.GetBoolParam("coldStart", false)) {
40 startFlags = startFlags | (START_FLAG_BASE << StartFlags::COLD_START);
41 }
42
43 #ifdef WITH_DLP
44 if (want.GetIntParam(DLP_PARAMS_INDEX, 0) != 0) {
45 startFlags = startFlags | (START_FLAG_BASE << StartFlags::DLP_MANAGER);
46 }
47 #endif // WITH_DLP
48
49 if (applicationInfo.debug) {
50 startFlags = startFlags | (START_FLAG_BASE << StartFlags::DEBUGGABLE);
51 }
52 if (applicationInfo.asanEnabled) {
53 startFlags = startFlags | (START_FLAG_BASE << StartFlags::ASANENABLED);
54 }
55 if (want.GetBoolParam("nativeDebug", false)) {
56 startFlags = startFlags | (START_FLAG_BASE << StartFlags::NATIVEDEBUG);
57 }
58 if (applicationInfo.gwpAsanEnabled) {
59 startFlags = startFlags | (START_FLAG_BASE << StartFlags::GWP_ENABLED_FORCE);
60 }
61 if (applicationInfo.isSystemApp) {
62 startFlags = startFlags | (START_FLAG_BASE << StartFlags::GWP_ENABLED_NORMAL);
63 }
64 if (applicationInfo.tsanEnabled) {
65 startFlags = startFlags | (START_FLAG_BASE << StartFlags::TSANENABLED);
66 }
67 if (want.GetBoolParam("ohos.ability.params.extensionControl", false)) {
68 startFlags = startFlags | (START_FLAG_BASE << StartFlags::EXTENSION_CONTROLLED);
69 }
70 if (applicationInfo.multiAppMode.multiAppModeType == MultiAppModeType::APP_CLONE && applicationInfo.appIndex > 0 &&
71 applicationInfo.appIndex <= AbilityRuntime::GlobalConstant::MAX_APP_CLONE_INDEX) {
72 startFlags = startFlags | (START_FLAG_BASE << APP_FLAGS_CLONE_ENABLE);
73 }
74 if (applicationInfo.hwasanEnabled) {
75 startFlags = startFlags | (START_FLAG_BASE << StartFlags::HWASANENABLED);
76 }
77
78 return startFlags;
79 }
80
BuildStartFlags(const AAFwk::Want & want,const AbilityInfo & abilityInfo)81 static uint32_t BuildStartFlags(const AAFwk::Want &want, const AbilityInfo &abilityInfo)
82 {
83 uint32_t startFlags = BuildStartFlags(want, abilityInfo.applicationInfo);
84
85 if (abilityInfo.extensionAbilityType == ExtensionAbilityType::BACKUP) {
86 startFlags = startFlags | (START_FLAG_BASE << StartFlags::BACKUP_EXTENSION);
87 }
88
89 return startFlags;
90 }
91
SetJITPermissions(uint32_t accessTokenId,JITPermissionsList & jitPermissionsList)92 static void SetJITPermissions(uint32_t accessTokenId, JITPermissionsList &jitPermissionsList)
93 {
94 HITRACE_METER_NAME(HITRACE_TAG_APP, __PRETTY_FUNCTION__);
95 if (Security::AccessToken::AccessTokenKit::VerifyAccessToken(
96 accessTokenId,
97 JIT_PERMISSION_ALLOW_WRITABLE_CODE_MEMORY,
98 false) == Security::AccessToken::PERMISSION_GRANTED) {
99 jitPermissionsList.emplace_back(JIT_PERMISSION_ALLOW_WRITABLE_CODE_MEMORY);
100 }
101 if (Security::AccessToken::AccessTokenKit::VerifyAccessToken(
102 accessTokenId,
103 JIT_PERMISSION_DISABLE_CODE_MEMORY_PROTECTION,
104 false) == Security::AccessToken::PERMISSION_GRANTED) {
105 jitPermissionsList.emplace_back(JIT_PERMISSION_DISABLE_CODE_MEMORY_PROTECTION);
106 }
107 if (Security::AccessToken::AccessTokenKit::VerifyAccessToken(
108 accessTokenId,
109 JIT_PERMISSION_ALLOW_EXECUTABLE_FORT_MEMORY,
110 false) == Security::AccessToken::PERMISSION_GRANTED) {
111 jitPermissionsList.emplace_back(JIT_PERMISSION_ALLOW_EXECUTABLE_FORT_MEMORY);
112 }
113 }
114 } // namespace AppspawnUtil
115 } // namespace AppExecFwk
116 } // namespace OHOS
117
118 #endif // OHOS_ABILITY_RUNTIME_APPSPAWN_UTIL_H
119