• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2008 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include <ctype.h>
18 #include <dirent.h>
19 #include <errno.h>
20 #include <fcntl.h>
21 #include <fts.h>
22 #include <poll.h>
23 #include <pwd.h>
24 #include <signal.h>
25 #include <stdio.h>
26 #include <stdlib.h>
27 #include <string.h>
28 #include <sys/stat.h>
29 #include <unistd.h>
30 
31 #include <fstream>
32 #include <mntent.h>
33 #include <unordered_set>
34 
35 #include <android-base/file.h>
36 #include <android-base/logging.h>
37 #include <android-base/parseint.h>
38 #include <android-base/stringprintf.h>
39 #include <android-base/strings.h>
40 
41 #include "Process.h"
42 #include "Utils.h"
43 
44 using android::base::StringPrintf;
45 
46 namespace android {
47 namespace vold {
48 
checkMaps(const std::string & path,const std::vector<std::string> & prefixes)49 static bool checkMaps(const std::string& path, const std::vector<std::string>& prefixes) {
50     bool found = false;
51     auto file = std::unique_ptr<FILE, decltype(&fclose)>{fopen(path.c_str(), "re"), fclose};
52     if (!file) {
53         return false;
54     }
55 
56     char* buf = nullptr;
57     size_t len = 0;
58     while (getline(&buf, &len, file.get()) != -1) {
59         std::string line(buf);
60         std::string::size_type pos = line.find('/');
61         if (pos != std::string::npos) {
62             line = line.substr(pos);
63             for (const auto& prefix : prefixes) {
64                 if (android::base::StartsWith(line, prefix)) {
65                     LOG(WARNING) << "Found map " << path << " referencing " << line;
66                     found = true;
67                     break;
68                 }
69             }
70             if (found) {
71                 break;
72             }
73         }
74     }
75     free(buf);
76 
77     return found;
78 }
79 
checkSymlink(const std::string & path,const std::vector<std::string> & prefixes)80 static bool checkSymlink(const std::string& path, const std::vector<std::string>& prefixes) {
81     std::string res;
82     if (android::base::Readlink(path, &res)) {
83         for (const auto& prefix : prefixes) {
84             if (android::base::StartsWith(res, prefix)) {
85                 LOG(WARNING) << "Found symlink " << path << " referencing " << res;
86                 return true;
87             }
88         }
89     }
90     return false;
91 }
92 
93 // TODO: Refactor the code with KillProcessesWithOpenFiles().
KillProcessesWithTmpfsMounts(const std::string & prefix,int signal)94 int KillProcessesWithTmpfsMounts(const std::string& prefix, int signal) {
95     std::unordered_set<pid_t> pids;
96 
97     auto proc_d = std::unique_ptr<DIR, int (*)(DIR*)>(opendir("/proc"), closedir);
98     if (!proc_d) {
99         PLOG(ERROR) << "Failed to open proc";
100         return -1;
101     }
102 
103     struct dirent* proc_de;
104     while ((proc_de = readdir(proc_d.get())) != nullptr) {
105         // We only care about valid PIDs
106         pid_t pid;
107         if (proc_de->d_type != DT_DIR) continue;
108         if (!android::base::ParseInt(proc_de->d_name, &pid)) continue;
109 
110         // Look for references to prefix
111         std::string mounts_file(StringPrintf("/proc/%d/mounts", pid));
112         auto fp = std::unique_ptr<FILE, int (*)(FILE*)>(
113                 setmntent(mounts_file.c_str(), "r"), endmntent);
114         if (!fp) {
115             PLOG(WARNING) << "Failed to open " << mounts_file;
116             continue;
117         }
118 
119         // Check if obb directory is mounted, and get all packages of mounted app data directory.
120         mntent* mentry;
121         while ((mentry = getmntent(fp.get())) != nullptr) {
122             if (mentry->mnt_fsname != nullptr && strncmp(mentry->mnt_fsname, "tmpfs", 5) == 0
123                     && android::base::StartsWith(mentry->mnt_dir, prefix)) {
124                 pids.insert(pid);
125                 break;
126             }
127         }
128     }
129     if (signal != 0) {
130         for (const auto& pid : pids) {
131             LOG(WARNING) << "Killing pid "<< pid << " with signal " << strsignal(signal) <<
132                     " because it has a mount with prefix " << prefix;
133             kill(pid, signal);
134         }
135     }
136     return pids.size();
137 }
138 
KillProcessesWithOpenFiles(const std::vector<std::string> & prefixes,int signal,bool killFuseDaemon)139 int KillProcessesWithOpenFiles(const std::vector<std::string>& prefixes, int signal,
140                                bool killFuseDaemon) {
141     std::unordered_set<pid_t> pids;
142 
143     auto proc_d = std::unique_ptr<DIR, int (*)(DIR*)>(opendir("/proc"), closedir);
144     if (!proc_d) {
145         PLOG(ERROR) << "Failed to open proc";
146         return -1;
147     }
148 
149     struct dirent* proc_de;
150     while ((proc_de = readdir(proc_d.get())) != nullptr) {
151         // We only care about valid PIDs
152         pid_t pid;
153         if (proc_de->d_type != DT_DIR) continue;
154         if (!android::base::ParseInt(proc_de->d_name, &pid)) continue;
155 
156         // Look for references to prefix
157         bool found = false;
158         auto path = StringPrintf("/proc/%d", pid);
159         found |= checkMaps(path + "/maps", prefixes);
160         found |= checkSymlink(path + "/cwd", prefixes);
161         found |= checkSymlink(path + "/root", prefixes);
162         found |= checkSymlink(path + "/exe", prefixes);
163 
164         auto fd_path = path + "/fd";
165         auto fd_d = std::unique_ptr<DIR, int (*)(DIR*)>(opendir(fd_path.c_str()), closedir);
166         if (!fd_d) {
167             PLOG(WARNING) << "Failed to open " << fd_path;
168         } else {
169             struct dirent* fd_de;
170             while ((fd_de = readdir(fd_d.get())) != nullptr) {
171                 if (fd_de->d_type != DT_LNK) continue;
172                 found |= checkSymlink(fd_path + "/" + fd_de->d_name, prefixes);
173             }
174         }
175 
176         if (found) {
177             if (!IsFuseDaemon(pid) || killFuseDaemon) {
178                 pids.insert(pid);
179             } else {
180                 LOG(WARNING) << "Found FUSE daemon with open file. Skipping...";
181             }
182         }
183     }
184     int totalKilledPids = pids.size();
185     if (signal != 0) {
186         for (const auto& pid : pids) {
187             std::string comm;
188             android::base::ReadFileToString(StringPrintf("/proc/%d/comm", pid), &comm);
189             comm = android::base::Trim(comm);
190 
191             std::string exe;
192             android::base::Readlink(StringPrintf("/proc/%d/exe", pid), &exe);
193 
194             LOG(WARNING) << "Sending " << strsignal(signal) << " to pid " << pid << " (" << comm
195                          << ", " << exe << ")";
196             if (kill(pid, signal) < 0) {
197                 if (errno == ESRCH) {
198                     totalKilledPids--;
199                     LOG(WARNING) << "The target pid " << pid << " was already killed";
200                     continue;
201                 }
202                 LOG(ERROR) << "Unable to send signal " << strsignal(signal) << " to pid " << pid;
203             }
204         }
205     }
206     return totalKilledPids;
207 }
208 
KillProcessesWithOpenFiles(const std::string & prefix,int signal,bool killFuseDaemon)209 int KillProcessesWithOpenFiles(const std::string& prefix, int signal, bool killFuseDaemon) {
210     return KillProcessesWithOpenFiles(std::vector<std::string>(1, prefix), signal,
211                                       killFuseDaemon);
212 }
213 
214 }  // namespace vold
215 }  // namespace android
216