/* * Copyright (C) 2014 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "berberis/kernel_api/open_emulation.h" #include #include #include #include #include #include #include #include "berberis/base/arena_alloc.h" #include "berberis/base/arena_map.h" #include "berberis/base/arena_string.h" #include "berberis/base/arena_vector.h" #include "berberis/base/checks.h" #include "berberis/base/fd.h" #include "berberis/base/tracing.h" #include "berberis/guest_os_primitives/guest_map_shadow.h" #include "berberis/guest_state/guest_addr.h" #include "berberis/kernel_api/main_executable_real_path_emulation.h" namespace berberis { namespace { class EmulatedFileDescriptors { public: explicit EmulatedFileDescriptors() : fds_(&arena_) {} static EmulatedFileDescriptors* GetInstance() { static EmulatedFileDescriptors g_emulated_proc_self_maps_fds; return &g_emulated_proc_self_maps_fds; } // Not copyable or movable. EmulatedFileDescriptors(const EmulatedFileDescriptors&) = delete; EmulatedFileDescriptors& operator=(const EmulatedFileDescriptors&) = delete; void Add(int fd) { std::lock_guard lock(mutex_); auto [unused_it, inserted] = fds_.insert(std::make_pair(fd, 0)); if (!inserted) { // We expect every fd to be added at most once. But if it breaks let's consider it non-fatal. TRACE("Detected duplicated fd in EmulatedFileDescriptors"); } } bool Contains(int fd) { std::lock_guard lock(mutex_); return fds_.find(fd) != fds_.end(); } void Remove(int fd) { std::lock_guard lock(mutex_); auto it = fds_.find(fd); if (it != fds_.end()) { fds_.erase(it); } } private: std::mutex mutex_; Arena arena_; // We use it as a set because we don't have ArenaSet, so client data isn't really used. ArenaMap fds_; }; // It's macro since we use it as string literal below. #define PROC_SELF_MAPS "/proc/self/maps" // Reader that works with custom allocator strings. Based on android::base::ReadFileToString. template bool ReadProcSelfMapsToString(String& content) { int fd = open(PROC_SELF_MAPS, O_RDONLY); if (fd == -1) { return false; } char buf[4096] __attribute__((__uninitialized__)); ssize_t n; while ((n = read(fd, &buf[0], sizeof(buf))) > 0) { content.append(buf, n); } close(fd); return n == 0; } // String split that works with custom allocator strings. Based on android::base::Split. template ArenaVector SplitLines(Arena* arena, const String& content) { ArenaVector lines(arena); size_t base = 0; size_t found; while (true) { found = content.find_first_of('\n', base); lines.emplace_back(content, base, found - base, content.get_allocator()); if (found == content.npos) break; base = found + 1; } return lines; } // Note that dirfd, flags and mode are only used to fallback to // host's openat in case of failure. // Avoid mallocs since bionic tests use it under malloc_disable (b/338211718). int OpenatProcSelfMapsForGuest(int dirfd, int flags, mode_t mode) { TRACE("Openat for " PROC_SELF_MAPS); Arena arena; ArenaString file_data(&arena); bool success = ReadProcSelfMapsToString(file_data); if (!success) { TRACE("Cannot read " PROC_SELF_MAPS ", falling back to host's openat"); return openat(dirfd, PROC_SELF_MAPS, flags, mode); } int mem_fd = CreateMemfdOrDie("[guest " PROC_SELF_MAPS "]"); auto* maps_shadow = GuestMapShadow::GetInstance(); auto lines = SplitLines(&arena, file_data); ArenaString guest_maps(&arena); for (size_t i = 0; i < lines.size(); i++) { uintptr_t start; uintptr_t end; int prot_offset; if (sscanf(lines.at(i).c_str(), "%" SCNxPTR "-%" SCNxPTR " %n", &start, &end, &prot_offset) != 2) { if (!lines[i].empty()) { TRACE("Cannot parse " PROC_SELF_MAPS " line : %s", lines.at(i).c_str()); } guest_maps.append(lines.at(i) + "\n"); continue; } BitValue exec_status = maps_shadow->GetExecutable(GuestAddr(start), end - start); if (exec_status == kBitMixed) { // When we strip guest executable bit from host mappings the kernel may merge r-- and r-x // mappings, resulting in kBitMixed executability state. We are avoiding such merging by // SetVmaAnonName in MmapForGuest/MprotectForGuest. This isn't strictly guaranteed to work, so // issue a warning if it doesn't, or if we got kBitMixed for another reason to investigate. // TODO(b/322873334): Instead split such host mapping into several guest mappings. TRACE("Unexpected " PROC_SELF_MAPS " mapping with mixed guest executability"); } // prot_offset points to "rwxp", so offset of "x" is 2 symbols away. lines.at(i).at(prot_offset + 2) = (exec_status == kBitSet) ? 'x' : '-'; guest_maps.append(lines.at(i) + "\n"); } // Normally /proc/self/maps doesn't have newline at the end. // It's simpler to remove it than to not add it in the loop. CHECK_EQ(guest_maps.back(), '\n'); guest_maps.pop_back(); TRACE("--------\n%s\n--------", guest_maps.c_str()); WriteFullyOrDie(mem_fd, guest_maps.c_str(), guest_maps.size()); lseek(mem_fd, 0, 0); EmulatedFileDescriptors::GetInstance()->Add(mem_fd); return mem_fd; } bool IsProcSelfMaps(const char* path, int flags) { struct stat cur_stat; struct stat proc_stat; // This check works for /proc/self/maps itself as well as symlinks (unless AT_SYMLINK_NOFOLLOW is // requested). As an added benefit it gracefully handles invalid pointers in path. return stat(path, &cur_stat) == 0 && stat(PROC_SELF_MAPS, &proc_stat) == 0 && !(S_ISLNK(cur_stat.st_mode) && (flags & AT_SYMLINK_NOFOLLOW)) && cur_stat.st_ino == proc_stat.st_ino && cur_stat.st_dev == proc_stat.st_dev; } // In zygote this is not needed because native bridge is mounting // /proc/cpuinfo to point to the emulated version. But for executables // this does not happen and they end up reading host cpuinfo. // // Note that current selinux policies prevent us from mounting /proc/cpuinfo // (replicating what zygote process does) for executables hence we need to // emulate it here. const char* TryTranslateProcCpuinfoPath(const char* path, int flags) { #if defined(__ANDROID__) struct stat cur_stat; struct stat cpuinfo_stat; if (stat(path, &cur_stat) == -1 || stat("/proc/cpuinfo", &cpuinfo_stat) == -1) { return nullptr; } if (S_ISLNK(cur_stat.st_mode) && (flags & AT_SYMLINK_NOFOLLOW)) { return nullptr; } if ((cur_stat.st_ino == cpuinfo_stat.st_ino) && (cur_stat.st_dev == cpuinfo_stat.st_dev)) { TRACE("openat: Translating %s to %s", path, kGuestCpuinfoPath); return kGuestCpuinfoPath; } #else UNUSED(path, flags); #endif return nullptr; } } // namespace bool IsFileDescriptorEmulatedProcSelfMaps(int fd) { return EmulatedFileDescriptors::GetInstance()->Contains(fd); } void CloseEmulatedProcSelfMapsFileDescriptor(int fd) { EmulatedFileDescriptors::GetInstance()->Remove(fd); } int OpenatForGuest(int dirfd, const char* path, int guest_flags, mode_t mode) { int host_flags = ToHostOpenFlags(guest_flags); if (IsProcSelfMaps(path, host_flags)) { return OpenatProcSelfMapsForGuest(dirfd, host_flags, mode); } const char* real_path = nullptr; if ((host_flags & AT_SYMLINK_NOFOLLOW) == 0) { real_path = TryReadLinkToMainExecutableRealPath(path); } if (real_path == nullptr) { real_path = TryTranslateProcCpuinfoPath(path, host_flags); } return openat(dirfd, real_path != nullptr ? real_path : path, host_flags, mode); } int OpenForGuest(const char* path, int flags, mode_t mode) { return OpenatForGuest(AT_FDCWD, path, flags, mode); } } // namespace berberis