• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2015 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include "environment.h"
18 
19 #include <inttypes.h>
20 #include <stdio.h>
21 #include <stdlib.h>
22 
23 #include <limits>
24 #include <set>
25 #include <unordered_map>
26 #include <vector>
27 
28 #include <android-base/file.h>
29 #include <android-base/logging.h>
30 #include <android-base/parseint.h>
31 #include <android-base/strings.h>
32 #include <android-base/stringprintf.h>
33 
34 #if defined(__ANDROID__)
35 #include <sys/system_properties.h>
36 #endif
37 
38 #include "read_elf.h"
39 #include "utils.h"
40 
41 class LineReader {
42  public:
LineReader(FILE * fp)43   LineReader(FILE* fp) : fp_(fp), buf_(nullptr), bufsize_(0) {
44   }
45 
~LineReader()46   ~LineReader() {
47     free(buf_);
48     fclose(fp_);
49   }
50 
ReadLine()51   char* ReadLine() {
52     if (getline(&buf_, &bufsize_, fp_) != -1) {
53       return buf_;
54     }
55     return nullptr;
56   }
57 
MaxLineSize()58   size_t MaxLineSize() {
59     return bufsize_;
60   }
61 
62  private:
63   FILE* fp_;
64   char* buf_;
65   size_t bufsize_;
66 };
67 
GetOnlineCpus()68 std::vector<int> GetOnlineCpus() {
69   std::vector<int> result;
70   FILE* fp = fopen("/sys/devices/system/cpu/online", "re");
71   if (fp == nullptr) {
72     PLOG(ERROR) << "can't open online cpu information";
73     return result;
74   }
75 
76   LineReader reader(fp);
77   char* line;
78   if ((line = reader.ReadLine()) != nullptr) {
79     result = GetCpusFromString(line);
80   }
81   CHECK(!result.empty()) << "can't get online cpu information";
82   return result;
83 }
84 
GetCpusFromString(const std::string & s)85 std::vector<int> GetCpusFromString(const std::string& s) {
86   std::set<int> cpu_set;
87   bool have_dash = false;
88   const char* p = s.c_str();
89   char* endp;
90   int last_cpu;
91   long cpu;
92   // Parse line like: 0,1-3, 5, 7-8
93   while ((cpu = strtol(p, &endp, 10)) != 0 || endp != p) {
94     if (have_dash && !cpu_set.empty()) {
95       for (int t = last_cpu + 1; t < cpu; ++t) {
96         cpu_set.insert(t);
97       }
98     }
99     have_dash = false;
100     cpu_set.insert(cpu);
101     last_cpu = cpu;
102     p = endp;
103     while (!isdigit(*p) && *p != '\0') {
104       if (*p == '-') {
105         have_dash = true;
106       }
107       ++p;
108     }
109   }
110   return std::vector<int>(cpu_set.begin(), cpu_set.end());
111 }
112 
ProcessKernelSymbols(const std::string & symbol_file,std::function<bool (const KernelSymbol &)> callback)113 bool ProcessKernelSymbols(const std::string& symbol_file,
114                           std::function<bool(const KernelSymbol&)> callback) {
115   FILE* fp = fopen(symbol_file.c_str(), "re");
116   if (fp == nullptr) {
117     PLOG(ERROR) << "failed to open file " << symbol_file;
118     return false;
119   }
120   LineReader reader(fp);
121   char* line;
122   while ((line = reader.ReadLine()) != nullptr) {
123     // Parse line like: ffffffffa005c4e4 d __warned.41698       [libsas]
124     char name[reader.MaxLineSize()];
125     char module[reader.MaxLineSize()];
126     strcpy(module, "");
127 
128     KernelSymbol symbol;
129     if (sscanf(line, "%" PRIx64 " %c %s%s", &symbol.addr, &symbol.type, name, module) < 3) {
130       continue;
131     }
132     symbol.name = name;
133     size_t module_len = strlen(module);
134     if (module_len > 2 && module[0] == '[' && module[module_len - 1] == ']') {
135       module[module_len - 1] = '\0';
136       symbol.module = &module[1];
137     } else {
138       symbol.module = nullptr;
139     }
140 
141     if (callback(symbol)) {
142       return true;
143     }
144   }
145   return false;
146 }
147 
GetLoadedModules()148 static std::vector<KernelMmap> GetLoadedModules() {
149   std::vector<KernelMmap> result;
150   FILE* fp = fopen("/proc/modules", "re");
151   if (fp == nullptr) {
152     // There is no /proc/modules on Android devices, so we don't print error if failed to open it.
153     PLOG(DEBUG) << "failed to open file /proc/modules";
154     return result;
155   }
156   LineReader reader(fp);
157   char* line;
158   while ((line = reader.ReadLine()) != nullptr) {
159     // Parse line like: nf_defrag_ipv6 34768 1 nf_conntrack_ipv6, Live 0xffffffffa0fe5000
160     char name[reader.MaxLineSize()];
161     uint64_t addr;
162     if (sscanf(line, "%s%*lu%*u%*s%*s 0x%" PRIx64, name, &addr) == 2) {
163       KernelMmap map;
164       map.name = name;
165       map.start_addr = addr;
166       result.push_back(map);
167     }
168   }
169   return result;
170 }
171 
GetLinuxVersion()172 static std::string GetLinuxVersion() {
173   std::string content;
174   if (android::base::ReadFileToString("/proc/version", &content)) {
175     char s[content.size() + 1];
176     if (sscanf(content.c_str(), "Linux version %s", s) == 1) {
177       return s;
178     }
179   }
180   PLOG(FATAL) << "can't read linux version";
181   return "";
182 }
183 
GetAllModuleFiles(const std::string & path,std::unordered_map<std::string,std::string> * module_file_map)184 static void GetAllModuleFiles(const std::string& path,
185                               std::unordered_map<std::string, std::string>* module_file_map) {
186   std::vector<std::string> files;
187   std::vector<std::string> subdirs;
188   GetEntriesInDir(path, &files, &subdirs);
189   for (auto& name : files) {
190     if (android::base::EndsWith(name, ".ko")) {
191       std::string module_name = name.substr(0, name.size() - 3);
192       std::replace(module_name.begin(), module_name.end(), '-', '_');
193       module_file_map->insert(std::make_pair(module_name, path + "/" + name));
194     }
195   }
196   for (auto& name : subdirs) {
197     GetAllModuleFiles(path + "/" + name, module_file_map);
198   }
199 }
200 
GetModulesInUse()201 static std::vector<KernelMmap> GetModulesInUse() {
202   // TODO: There is no /proc/modules or /lib/modules on Android, find methods work on it.
203   std::vector<KernelMmap> module_mmaps = GetLoadedModules();
204   std::string linux_version = GetLinuxVersion();
205   std::string module_dirpath = "/lib/modules/" + linux_version + "/kernel";
206   std::unordered_map<std::string, std::string> module_file_map;
207   GetAllModuleFiles(module_dirpath, &module_file_map);
208   for (auto& module : module_mmaps) {
209     auto it = module_file_map.find(module.name);
210     if (it != module_file_map.end()) {
211       module.filepath = it->second;
212     }
213   }
214   return module_mmaps;
215 }
216 
GetKernelAndModuleMmaps(KernelMmap * kernel_mmap,std::vector<KernelMmap> * module_mmaps)217 void GetKernelAndModuleMmaps(KernelMmap* kernel_mmap, std::vector<KernelMmap>* module_mmaps) {
218   kernel_mmap->name = DEFAULT_KERNEL_MMAP_NAME;
219   kernel_mmap->start_addr = 0;
220   kernel_mmap->filepath = kernel_mmap->name;
221   *module_mmaps = GetModulesInUse();
222   for (auto& map : *module_mmaps) {
223     if (map.filepath.empty()) {
224       map.filepath = "[" + map.name + "]";
225     }
226   }
227 
228   if (module_mmaps->size() == 0) {
229     kernel_mmap->len = std::numeric_limits<unsigned long long>::max() - kernel_mmap->start_addr;
230   } else {
231     std::sort(
232         module_mmaps->begin(), module_mmaps->end(),
233         [](const KernelMmap& m1, const KernelMmap& m2) { return m1.start_addr < m2.start_addr; });
234     // When not having enough privilege, all addresses are read as 0.
235     if (kernel_mmap->start_addr == (*module_mmaps)[0].start_addr) {
236       kernel_mmap->len = 0;
237     } else {
238       kernel_mmap->len = (*module_mmaps)[0].start_addr - kernel_mmap->start_addr - 1;
239     }
240     for (size_t i = 0; i + 1 < module_mmaps->size(); ++i) {
241       if ((*module_mmaps)[i].start_addr == (*module_mmaps)[i + 1].start_addr) {
242         (*module_mmaps)[i].len = 0;
243       } else {
244         (*module_mmaps)[i].len =
245             (*module_mmaps)[i + 1].start_addr - (*module_mmaps)[i].start_addr - 1;
246       }
247     }
248     module_mmaps->back().len =
249         std::numeric_limits<unsigned long long>::max() - module_mmaps->back().start_addr;
250   }
251 }
252 
ReadThreadNameAndTgid(const std::string & status_file,std::string * comm,pid_t * tgid)253 static bool ReadThreadNameAndTgid(const std::string& status_file, std::string* comm, pid_t* tgid) {
254   FILE* fp = fopen(status_file.c_str(), "re");
255   if (fp == nullptr) {
256     return false;
257   }
258   bool read_comm = false;
259   bool read_tgid = false;
260   LineReader reader(fp);
261   char* line;
262   while ((line = reader.ReadLine()) != nullptr) {
263     char s[reader.MaxLineSize()];
264     if (sscanf(line, "Name:%s", s) == 1) {
265       *comm = s;
266       read_comm = true;
267     } else if (sscanf(line, "Tgid:%d", tgid) == 1) {
268       read_tgid = true;
269     }
270     if (read_comm && read_tgid) {
271       return true;
272     }
273   }
274   return false;
275 }
276 
GetThreadsInProcess(pid_t pid)277 static std::vector<pid_t> GetThreadsInProcess(pid_t pid) {
278   std::vector<pid_t> result;
279   std::string task_dirname = android::base::StringPrintf("/proc/%d/task", pid);
280   std::vector<std::string> subdirs;
281   GetEntriesInDir(task_dirname, nullptr, &subdirs);
282   for (const auto& name : subdirs) {
283     int tid;
284     if (!android::base::ParseInt(name.c_str(), &tid, 0)) {
285       continue;
286     }
287     result.push_back(tid);
288   }
289   return result;
290 }
291 
GetThreadComm(pid_t pid,std::vector<ThreadComm> * thread_comms)292 static bool GetThreadComm(pid_t pid, std::vector<ThreadComm>* thread_comms) {
293   std::vector<pid_t> tids = GetThreadsInProcess(pid);
294   for (auto& tid : tids) {
295     std::string status_file = android::base::StringPrintf("/proc/%d/task/%d/status", pid, tid);
296     std::string comm;
297     pid_t tgid;
298     // It is possible that the process or thread exited before we can read its status.
299     if (!ReadThreadNameAndTgid(status_file, &comm, &tgid)) {
300       continue;
301     }
302     CHECK_EQ(pid, tgid);
303     ThreadComm thread;
304     thread.tid = tid;
305     thread.pid = pid;
306     thread.comm = comm;
307     thread_comms->push_back(thread);
308   }
309   return true;
310 }
311 
GetThreadComms(std::vector<ThreadComm> * thread_comms)312 bool GetThreadComms(std::vector<ThreadComm>* thread_comms) {
313   thread_comms->clear();
314   std::vector<std::string> subdirs;
315   GetEntriesInDir("/proc", nullptr, &subdirs);
316   for (auto& name : subdirs) {
317     int pid;
318     if (!android::base::ParseInt(name.c_str(), &pid, 0)) {
319       continue;
320     }
321     if (!GetThreadComm(pid, thread_comms)) {
322       return false;
323     }
324   }
325   return true;
326 }
327 
GetThreadMmapsInProcess(pid_t pid,std::vector<ThreadMmap> * thread_mmaps)328 bool GetThreadMmapsInProcess(pid_t pid, std::vector<ThreadMmap>* thread_mmaps) {
329   std::string map_file = android::base::StringPrintf("/proc/%d/maps", pid);
330   FILE* fp = fopen(map_file.c_str(), "re");
331   if (fp == nullptr) {
332     PLOG(DEBUG) << "can't open file " << map_file;
333     return false;
334   }
335   thread_mmaps->clear();
336   LineReader reader(fp);
337   char* line;
338   while ((line = reader.ReadLine()) != nullptr) {
339     // Parse line like: 00400000-00409000 r-xp 00000000 fc:00 426998  /usr/lib/gvfs/gvfsd-http
340     uint64_t start_addr, end_addr, pgoff;
341     char type[reader.MaxLineSize()];
342     char execname[reader.MaxLineSize()];
343     strcpy(execname, "");
344     if (sscanf(line, "%" PRIx64 "-%" PRIx64 " %s %" PRIx64 " %*x:%*x %*u %s\n", &start_addr,
345                &end_addr, type, &pgoff, execname) < 4) {
346       continue;
347     }
348     if (strcmp(execname, "") == 0) {
349       strcpy(execname, DEFAULT_EXECNAME_FOR_THREAD_MMAP);
350     }
351     ThreadMmap thread;
352     thread.start_addr = start_addr;
353     thread.len = end_addr - start_addr;
354     thread.pgoff = pgoff;
355     thread.name = execname;
356     thread.executable = (type[2] == 'x');
357     thread_mmaps->push_back(thread);
358   }
359   return true;
360 }
361 
GetKernelBuildId(BuildId * build_id)362 bool GetKernelBuildId(BuildId* build_id) {
363   return GetBuildIdFromNoteFile("/sys/kernel/notes", build_id);
364 }
365 
GetModuleBuildId(const std::string & module_name,BuildId * build_id)366 bool GetModuleBuildId(const std::string& module_name, BuildId* build_id) {
367   std::string notefile = "/sys/module/" + module_name + "/notes/.note.gnu.build-id";
368   return GetBuildIdFromNoteFile(notefile, build_id);
369 }
370 
GetValidThreadsFromProcessString(const std::string & pid_str,std::set<pid_t> * tid_set)371 bool GetValidThreadsFromProcessString(const std::string& pid_str, std::set<pid_t>* tid_set) {
372   std::vector<std::string> strs = android::base::Split(pid_str, ",");
373   for (const auto& s : strs) {
374     int pid;
375     if (!android::base::ParseInt(s.c_str(), &pid, 0)) {
376       LOG(ERROR) << "Invalid pid '" << s << "'";
377       return false;
378     }
379     std::vector<pid_t> tids = GetThreadsInProcess(pid);
380     if (tids.empty()) {
381       LOG(ERROR) << "Non existing process '" << pid << "'";
382       return false;
383     }
384     tid_set->insert(tids.begin(), tids.end());
385   }
386   return true;
387 }
388 
GetValidThreadsFromThreadString(const std::string & tid_str,std::set<pid_t> * tid_set)389 bool GetValidThreadsFromThreadString(const std::string& tid_str, std::set<pid_t>* tid_set) {
390   std::vector<std::string> strs = android::base::Split(tid_str, ",");
391   for (const auto& s : strs) {
392     int tid;
393     if (!android::base::ParseInt(s.c_str(), &tid, 0)) {
394       LOG(ERROR) << "Invalid tid '" << s << "'";
395       return false;
396     }
397     if (!IsDir(android::base::StringPrintf("/proc/%d", tid))) {
398       LOG(ERROR) << "Non existing thread '" << tid << "'";
399       return false;
400     }
401     tid_set->insert(tid);
402   }
403   return true;
404 }
405 
GetExecPath(std::string * exec_path)406 bool GetExecPath(std::string* exec_path) {
407   char path[PATH_MAX];
408   ssize_t path_len = readlink("/proc/self/exe", path, sizeof(path));
409   if (path_len <= 0 || path_len >= static_cast<ssize_t>(sizeof(path))) {
410     PLOG(ERROR) << "readlink failed";
411     return false;
412   }
413   path[path_len] = '\0';
414   *exec_path = path;
415   return true;
416 }
417 
418 /*
419  * perf event paranoia level:
420  *  -1 - not paranoid at all
421  *   0 - disallow raw tracepoint access for unpriv
422  *   1 - disallow cpu events for unpriv
423  *   2 - disallow kernel profiling for unpriv
424  *   3 - disallow user profiling for unpriv
425  */
ReadPerfEventParanoid(int * value)426 static bool ReadPerfEventParanoid(int* value) {
427   std::string s;
428   if (!android::base::ReadFileToString("/proc/sys/kernel/perf_event_paranoid", &s)) {
429     PLOG(ERROR) << "failed to read /proc/sys/kernel/perf_event_paranoid";
430     return false;
431   }
432   s = android::base::Trim(s);
433   if (!android::base::ParseInt(s.c_str(), value)) {
434     PLOG(ERROR) << "failed to parse /proc/sys/kernel/perf_event_paranoid: " << s;
435     return false;
436   }
437   return true;
438 }
439 
GetLimitLevelDescription(int limit_level)440 static const char* GetLimitLevelDescription(int limit_level) {
441   switch (limit_level) {
442     case -1: return "unlimited";
443     case 0: return "disallowing raw tracepoint access for unpriv";
444     case 1: return "disallowing cpu events for unpriv";
445     case 2: return "disallowing kernel profiling for unpriv";
446     case 3: return "disallowing user profiling for unpriv";
447     default: return "unknown level";
448   }
449 }
450 
CheckPerfEventLimit()451 bool CheckPerfEventLimit() {
452   // root is not limited by /proc/sys/kernel/perf_event_paranoid.
453   if (IsRoot()) {
454     return true;
455   }
456   int limit_level;
457   if (!ReadPerfEventParanoid(&limit_level)) {
458     return false;
459   }
460   if (limit_level <= 1) {
461     return true;
462   }
463 #if defined(__ANDROID__)
464   // Try to enable perf_event_paranoid by setprop security.perf_harden=0.
465   if (__system_property_set("security.perf_harden", "0") == 0) {
466     sleep(1);
467     if (ReadPerfEventParanoid(&limit_level) && limit_level <= 1) {
468       return true;
469     }
470   }
471   LOG(WARNING) << "/proc/sys/kernel/perf_event_paranoid is " << limit_level
472       << ", " << GetLimitLevelDescription(limit_level) << ".";
473   LOG(WARNING) << "Try using `adb shell setprop security.perf_harden 0` to allow profiling.";
474 #else
475   LOG(WARNING) << "/proc/sys/kernel/perf_event_paranoid is " << limit_level
476       << ", " << GetLimitLevelDescription(limit_level) << ".";
477 #endif
478   return true;
479 }
480