2010-02-17 02:12:00 +01:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2008 The Android Open Source Project
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2018-09-18 22:30:21 +02:00
|
|
|
#include <ctype.h>
|
|
|
|
#include <dirent.h>
|
2010-02-17 02:12:00 +01:00
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
2017-10-07 02:02:53 +02:00
|
|
|
#include <fts.h>
|
2018-09-18 22:30:21 +02:00
|
|
|
#include <poll.h>
|
2010-02-17 02:12:00 +01:00
|
|
|
#include <pwd.h>
|
2018-09-18 22:30:21 +02:00
|
|
|
#include <signal.h>
|
|
|
|
#include <stdio.h>
|
2010-02-17 02:12:00 +01:00
|
|
|
#include <stdlib.h>
|
2018-09-18 22:30:21 +02:00
|
|
|
#include <string.h>
|
2010-02-17 02:12:00 +01:00
|
|
|
#include <sys/stat.h>
|
2018-09-18 22:30:21 +02:00
|
|
|
#include <unistd.h>
|
2010-02-17 02:12:00 +01:00
|
|
|
|
2017-10-07 02:02:53 +02:00
|
|
|
#include <fstream>
|
2020-02-11 15:31:24 +01:00
|
|
|
#include <mntent.h>
|
2017-10-07 02:02:53 +02:00
|
|
|
#include <unordered_set>
|
2017-03-28 00:18:50 +02:00
|
|
|
|
|
|
|
#include <android-base/file.h>
|
2018-09-18 22:30:21 +02:00
|
|
|
#include <android-base/logging.h>
|
2017-10-07 02:02:53 +02:00
|
|
|
#include <android-base/parseint.h>
|
2017-03-28 00:18:50 +02:00
|
|
|
#include <android-base/stringprintf.h>
|
2018-09-18 22:30:21 +02:00
|
|
|
#include <android-base/strings.h>
|
2010-02-17 02:12:00 +01:00
|
|
|
|
|
|
|
#include "Process.h"
|
2021-03-04 13:21:24 +01:00
|
|
|
#include "Utils.h"
|
2010-02-17 02:12:00 +01:00
|
|
|
|
2017-03-28 00:18:50 +02:00
|
|
|
using android::base::StringPrintf;
|
|
|
|
|
2017-10-07 02:02:53 +02:00
|
|
|
namespace android {
|
|
|
|
namespace vold {
|
|
|
|
|
|
|
|
static bool checkMaps(const std::string& path, const std::string& prefix) {
|
|
|
|
bool found = false;
|
2019-03-26 18:00:05 +01:00
|
|
|
auto file = std::unique_ptr<FILE, decltype(&fclose)>{fopen(path.c_str(), "re"), fclose};
|
|
|
|
if (!file) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
char* buf = nullptr;
|
|
|
|
size_t len = 0;
|
|
|
|
while (getline(&buf, &len, file.get()) != -1) {
|
|
|
|
std::string line(buf);
|
2017-10-07 02:02:53 +02:00
|
|
|
std::string::size_type pos = line.find('/');
|
|
|
|
if (pos != std::string::npos) {
|
|
|
|
line = line.substr(pos);
|
2017-12-20 21:38:47 +01:00
|
|
|
if (android::base::StartsWith(line, prefix)) {
|
2017-10-07 02:02:53 +02:00
|
|
|
LOG(WARNING) << "Found map " << path << " referencing " << line;
|
|
|
|
found = true;
|
2019-03-26 18:00:05 +01:00
|
|
|
break;
|
2010-02-17 02:12:00 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2019-03-26 18:00:05 +01:00
|
|
|
free(buf);
|
|
|
|
|
2017-10-07 02:02:53 +02:00
|
|
|
return found;
|
2010-02-17 02:12:00 +01:00
|
|
|
}
|
|
|
|
|
2017-10-07 02:02:53 +02:00
|
|
|
static bool checkSymlink(const std::string& path, const std::string& prefix) {
|
|
|
|
std::string res;
|
|
|
|
if (android::base::Readlink(path, &res)) {
|
2017-12-20 21:38:47 +01:00
|
|
|
if (android::base::StartsWith(res, prefix)) {
|
2017-10-07 02:02:53 +02:00
|
|
|
LOG(WARNING) << "Found symlink " << path << " referencing " << res;
|
|
|
|
return true;
|
2010-02-17 02:12:00 +01:00
|
|
|
}
|
|
|
|
}
|
2017-10-07 02:02:53 +02:00
|
|
|
return false;
|
2014-09-22 09:57:40 +02:00
|
|
|
}
|
|
|
|
|
2020-02-11 15:31:24 +01:00
|
|
|
// TODO: Refactor the code with KillProcessesWithOpenFiles().
|
2021-04-30 10:53:07 +02:00
|
|
|
int KillProcessesWithTmpfsMounts(const std::string& prefix, int signal) {
|
2020-02-11 15:31:24 +01:00
|
|
|
std::unordered_set<pid_t> pids;
|
|
|
|
|
|
|
|
auto proc_d = std::unique_ptr<DIR, int (*)(DIR*)>(opendir("/proc"), closedir);
|
|
|
|
if (!proc_d) {
|
|
|
|
PLOG(ERROR) << "Failed to open proc";
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct dirent* proc_de;
|
|
|
|
while ((proc_de = readdir(proc_d.get())) != nullptr) {
|
|
|
|
// We only care about valid PIDs
|
|
|
|
pid_t pid;
|
|
|
|
if (proc_de->d_type != DT_DIR) continue;
|
|
|
|
if (!android::base::ParseInt(proc_de->d_name, &pid)) continue;
|
|
|
|
|
|
|
|
// Look for references to prefix
|
|
|
|
std::string mounts_file(StringPrintf("/proc/%d/mounts", pid));
|
|
|
|
auto fp = std::unique_ptr<FILE, int (*)(FILE*)>(
|
|
|
|
setmntent(mounts_file.c_str(), "r"), endmntent);
|
|
|
|
if (!fp) {
|
|
|
|
PLOG(WARNING) << "Failed to open " << mounts_file;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check if obb directory is mounted, and get all packages of mounted app data directory.
|
|
|
|
mntent* mentry;
|
|
|
|
while ((mentry = getmntent(fp.get())) != nullptr) {
|
2021-04-30 10:53:07 +02:00
|
|
|
if (mentry->mnt_fsname != nullptr && strncmp(mentry->mnt_fsname, "tmpfs", 5) == 0
|
|
|
|
&& android::base::StartsWith(mentry->mnt_dir, prefix)) {
|
2020-02-11 15:31:24 +01:00
|
|
|
pids.insert(pid);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (signal != 0) {
|
|
|
|
for (const auto& pid : pids) {
|
|
|
|
LOG(WARNING) << "Killing pid "<< pid << " with signal " << strsignal(signal) <<
|
|
|
|
" because it has a mount with prefix " << prefix;
|
|
|
|
kill(pid, signal);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return pids.size();
|
|
|
|
}
|
|
|
|
|
2021-03-04 13:21:24 +01:00
|
|
|
int KillProcessesWithOpenFiles(const std::string& prefix, int signal, bool killFuseDaemon) {
|
2017-10-07 02:02:53 +02:00
|
|
|
std::unordered_set<pid_t> pids;
|
2010-02-17 02:12:00 +01:00
|
|
|
|
2017-10-07 02:02:53 +02:00
|
|
|
auto proc_d = std::unique_ptr<DIR, int (*)(DIR*)>(opendir("/proc"), closedir);
|
|
|
|
if (!proc_d) {
|
|
|
|
PLOG(ERROR) << "Failed to open proc";
|
|
|
|
return -1;
|
2010-02-17 02:12:00 +01:00
|
|
|
}
|
|
|
|
|
2017-10-07 02:02:53 +02:00
|
|
|
struct dirent* proc_de;
|
|
|
|
while ((proc_de = readdir(proc_d.get())) != nullptr) {
|
|
|
|
// We only care about valid PIDs
|
|
|
|
pid_t pid;
|
|
|
|
if (proc_de->d_type != DT_DIR) continue;
|
|
|
|
if (!android::base::ParseInt(proc_de->d_name, &pid)) continue;
|
|
|
|
|
|
|
|
// Look for references to prefix
|
|
|
|
bool found = false;
|
|
|
|
auto path = StringPrintf("/proc/%d", pid);
|
|
|
|
found |= checkMaps(path + "/maps", prefix);
|
|
|
|
found |= checkSymlink(path + "/cwd", prefix);
|
|
|
|
found |= checkSymlink(path + "/root", prefix);
|
|
|
|
found |= checkSymlink(path + "/exe", prefix);
|
|
|
|
|
|
|
|
auto fd_path = path + "/fd";
|
|
|
|
auto fd_d = std::unique_ptr<DIR, int (*)(DIR*)>(opendir(fd_path.c_str()), closedir);
|
|
|
|
if (!fd_d) {
|
|
|
|
PLOG(WARNING) << "Failed to open " << fd_path;
|
2010-02-17 02:12:00 +01:00
|
|
|
} else {
|
2017-10-07 02:02:53 +02:00
|
|
|
struct dirent* fd_de;
|
|
|
|
while ((fd_de = readdir(fd_d.get())) != nullptr) {
|
|
|
|
if (fd_de->d_type != DT_LNK) continue;
|
|
|
|
found |= checkSymlink(fd_path + "/" + fd_de->d_name, prefix);
|
|
|
|
}
|
2010-02-17 02:12:00 +01:00
|
|
|
}
|
2015-03-14 00:09:20 +01:00
|
|
|
|
2017-10-07 02:02:53 +02:00
|
|
|
if (found) {
|
2021-03-04 13:21:24 +01:00
|
|
|
if (!IsFuseDaemon(pid) || killFuseDaemon) {
|
|
|
|
pids.insert(pid);
|
|
|
|
} else {
|
|
|
|
LOG(WARNING) << "Found FUSE daemon with open file. Skipping...";
|
|
|
|
}
|
2017-10-07 02:02:53 +02:00
|
|
|
}
|
|
|
|
}
|
2023-10-26 02:16:38 +02:00
|
|
|
int totalKilledPids = pids.size();
|
2017-10-07 02:02:53 +02:00
|
|
|
if (signal != 0) {
|
|
|
|
for (const auto& pid : pids) {
|
2021-05-05 21:11:33 +02:00
|
|
|
std::string comm;
|
|
|
|
android::base::ReadFileToString(StringPrintf("/proc/%d/comm", pid), &comm);
|
|
|
|
comm = android::base::Trim(comm);
|
|
|
|
|
|
|
|
std::string exe;
|
|
|
|
android::base::Readlink(StringPrintf("/proc/%d/exe", pid), &exe);
|
|
|
|
|
|
|
|
LOG(WARNING) << "Sending " << strsignal(signal) << " to pid " << pid << " (" << comm
|
|
|
|
<< ", " << exe << ")";
|
2023-10-26 02:16:38 +02:00
|
|
|
if (kill(pid, signal) < 0) {
|
|
|
|
if (errno == ESRCH) {
|
|
|
|
totalKilledPids--;
|
|
|
|
LOG(WARNING) << "The target pid " << pid << " was already killed";
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
LOG(ERROR) << "Unable to send signal " << strsignal(signal) << " to pid " << pid;
|
|
|
|
}
|
2010-02-17 02:12:00 +01:00
|
|
|
}
|
|
|
|
}
|
2023-10-26 02:16:38 +02:00
|
|
|
return totalKilledPids;
|
2010-02-17 02:12:00 +01:00
|
|
|
}
|
2017-10-07 02:02:53 +02:00
|
|
|
|
|
|
|
} // namespace vold
|
|
|
|
} // namespace android
|