1*6777b538SAndroid Build Coastguard Worker // Copyright 2013 The Chromium Authors
2*6777b538SAndroid Build Coastguard Worker // Use of this source code is governed by a BSD-style license that can be
3*6777b538SAndroid Build Coastguard Worker // found in the LICENSE file.
4*6777b538SAndroid Build Coastguard Worker
5*6777b538SAndroid Build Coastguard Worker #include "base/debug/proc_maps_linux.h"
6*6777b538SAndroid Build Coastguard Worker
7*6777b538SAndroid Build Coastguard Worker #include <fcntl.h>
8*6777b538SAndroid Build Coastguard Worker #include <stddef.h>
9*6777b538SAndroid Build Coastguard Worker
10*6777b538SAndroid Build Coastguard Worker #include "base/files/file_util.h"
11*6777b538SAndroid Build Coastguard Worker #include "base/files/scoped_file.h"
12*6777b538SAndroid Build Coastguard Worker #include "base/logging.h"
13*6777b538SAndroid Build Coastguard Worker #include "base/strings/string_split.h"
14*6777b538SAndroid Build Coastguard Worker #include "build/build_config.h"
15*6777b538SAndroid Build Coastguard Worker
16*6777b538SAndroid Build Coastguard Worker #if BUILDFLAG(IS_LINUX) || BUILDFLAG(IS_CHROMEOS) || BUILDFLAG(IS_ANDROID)
17*6777b538SAndroid Build Coastguard Worker #include <inttypes.h>
18*6777b538SAndroid Build Coastguard Worker #endif
19*6777b538SAndroid Build Coastguard Worker
20*6777b538SAndroid Build Coastguard Worker namespace base {
21*6777b538SAndroid Build Coastguard Worker namespace debug {
22*6777b538SAndroid Build Coastguard Worker
23*6777b538SAndroid Build Coastguard Worker // Scans |proc_maps| starting from |pos| returning true if the gate VMA was
24*6777b538SAndroid Build Coastguard Worker // found, otherwise returns false.
ContainsGateVMA(std::string * proc_maps,size_t pos)25*6777b538SAndroid Build Coastguard Worker static bool ContainsGateVMA(std::string* proc_maps, size_t pos) {
26*6777b538SAndroid Build Coastguard Worker #if defined(ARCH_CPU_ARM_FAMILY)
27*6777b538SAndroid Build Coastguard Worker // The gate VMA on ARM kernels is the interrupt vectors page.
28*6777b538SAndroid Build Coastguard Worker return proc_maps->find(" [vectors]\n", pos) != std::string::npos;
29*6777b538SAndroid Build Coastguard Worker #elif defined(ARCH_CPU_X86_64)
30*6777b538SAndroid Build Coastguard Worker // The gate VMA on x86 64-bit kernels is the virtual system call page.
31*6777b538SAndroid Build Coastguard Worker return proc_maps->find(" [vsyscall]\n", pos) != std::string::npos;
32*6777b538SAndroid Build Coastguard Worker #else
33*6777b538SAndroid Build Coastguard Worker // Otherwise assume there is no gate VMA in which case we shouldn't
34*6777b538SAndroid Build Coastguard Worker // get duplicate entires.
35*6777b538SAndroid Build Coastguard Worker return false;
36*6777b538SAndroid Build Coastguard Worker #endif
37*6777b538SAndroid Build Coastguard Worker }
38*6777b538SAndroid Build Coastguard Worker
ReadProcMaps(std::string * proc_maps)39*6777b538SAndroid Build Coastguard Worker bool ReadProcMaps(std::string* proc_maps) {
40*6777b538SAndroid Build Coastguard Worker // seq_file only writes out a page-sized amount on each call. Refer to header
41*6777b538SAndroid Build Coastguard Worker // file for details.
42*6777b538SAndroid Build Coastguard Worker const size_t read_size = static_cast<size_t>(sysconf(_SC_PAGESIZE));
43*6777b538SAndroid Build Coastguard Worker
44*6777b538SAndroid Build Coastguard Worker base::ScopedFD fd(HANDLE_EINTR(open("/proc/self/maps", O_RDONLY)));
45*6777b538SAndroid Build Coastguard Worker if (!fd.is_valid()) {
46*6777b538SAndroid Build Coastguard Worker DPLOG(ERROR) << "Couldn't open /proc/self/maps";
47*6777b538SAndroid Build Coastguard Worker return false;
48*6777b538SAndroid Build Coastguard Worker }
49*6777b538SAndroid Build Coastguard Worker proc_maps->clear();
50*6777b538SAndroid Build Coastguard Worker
51*6777b538SAndroid Build Coastguard Worker while (true) {
52*6777b538SAndroid Build Coastguard Worker // To avoid a copy, resize |proc_maps| so read() can write directly into it.
53*6777b538SAndroid Build Coastguard Worker // Compute |buffer| afterwards since resize() may reallocate.
54*6777b538SAndroid Build Coastguard Worker size_t pos = proc_maps->size();
55*6777b538SAndroid Build Coastguard Worker proc_maps->resize(pos + read_size);
56*6777b538SAndroid Build Coastguard Worker void* buffer = &(*proc_maps)[pos];
57*6777b538SAndroid Build Coastguard Worker
58*6777b538SAndroid Build Coastguard Worker ssize_t bytes_read = HANDLE_EINTR(read(fd.get(), buffer, read_size));
59*6777b538SAndroid Build Coastguard Worker if (bytes_read < 0) {
60*6777b538SAndroid Build Coastguard Worker DPLOG(ERROR) << "Couldn't read /proc/self/maps";
61*6777b538SAndroid Build Coastguard Worker proc_maps->clear();
62*6777b538SAndroid Build Coastguard Worker return false;
63*6777b538SAndroid Build Coastguard Worker }
64*6777b538SAndroid Build Coastguard Worker
65*6777b538SAndroid Build Coastguard Worker // ... and don't forget to trim off excess bytes.
66*6777b538SAndroid Build Coastguard Worker proc_maps->resize(pos + static_cast<size_t>(bytes_read));
67*6777b538SAndroid Build Coastguard Worker
68*6777b538SAndroid Build Coastguard Worker if (bytes_read == 0)
69*6777b538SAndroid Build Coastguard Worker break;
70*6777b538SAndroid Build Coastguard Worker
71*6777b538SAndroid Build Coastguard Worker // The gate VMA is handled as a special case after seq_file has finished
72*6777b538SAndroid Build Coastguard Worker // iterating through all entries in the virtual memory table.
73*6777b538SAndroid Build Coastguard Worker //
74*6777b538SAndroid Build Coastguard Worker // Unfortunately, if additional entries are added at this point in time
75*6777b538SAndroid Build Coastguard Worker // seq_file gets confused and the next call to read() will return duplicate
76*6777b538SAndroid Build Coastguard Worker // entries including the gate VMA again.
77*6777b538SAndroid Build Coastguard Worker //
78*6777b538SAndroid Build Coastguard Worker // Avoid this by searching for the gate VMA and breaking early.
79*6777b538SAndroid Build Coastguard Worker if (ContainsGateVMA(proc_maps, pos))
80*6777b538SAndroid Build Coastguard Worker break;
81*6777b538SAndroid Build Coastguard Worker }
82*6777b538SAndroid Build Coastguard Worker
83*6777b538SAndroid Build Coastguard Worker return true;
84*6777b538SAndroid Build Coastguard Worker }
85*6777b538SAndroid Build Coastguard Worker
ParseProcMaps(const std::string & input,std::vector<MappedMemoryRegion> * regions_out)86*6777b538SAndroid Build Coastguard Worker bool ParseProcMaps(const std::string& input,
87*6777b538SAndroid Build Coastguard Worker std::vector<MappedMemoryRegion>* regions_out) {
88*6777b538SAndroid Build Coastguard Worker CHECK(regions_out);
89*6777b538SAndroid Build Coastguard Worker std::vector<MappedMemoryRegion> regions;
90*6777b538SAndroid Build Coastguard Worker
91*6777b538SAndroid Build Coastguard Worker // This isn't async safe nor terribly efficient, but it doesn't need to be at
92*6777b538SAndroid Build Coastguard Worker // this point in time.
93*6777b538SAndroid Build Coastguard Worker std::vector<std::string> lines = SplitString(
94*6777b538SAndroid Build Coastguard Worker input, "\n", base::TRIM_WHITESPACE, base::SPLIT_WANT_ALL);
95*6777b538SAndroid Build Coastguard Worker
96*6777b538SAndroid Build Coastguard Worker for (size_t i = 0; i < lines.size(); ++i) {
97*6777b538SAndroid Build Coastguard Worker // Due to splitting on '\n' the last line should be empty.
98*6777b538SAndroid Build Coastguard Worker if (i == lines.size() - 1) {
99*6777b538SAndroid Build Coastguard Worker if (!lines[i].empty()) {
100*6777b538SAndroid Build Coastguard Worker DLOG(WARNING) << "Last line not empty";
101*6777b538SAndroid Build Coastguard Worker return false;
102*6777b538SAndroid Build Coastguard Worker }
103*6777b538SAndroid Build Coastguard Worker break;
104*6777b538SAndroid Build Coastguard Worker }
105*6777b538SAndroid Build Coastguard Worker
106*6777b538SAndroid Build Coastguard Worker MappedMemoryRegion region;
107*6777b538SAndroid Build Coastguard Worker const char* line = lines[i].c_str();
108*6777b538SAndroid Build Coastguard Worker char permissions[5] = {'\0'}; // Ensure NUL-terminated string.
109*6777b538SAndroid Build Coastguard Worker uint8_t dev_major = 0;
110*6777b538SAndroid Build Coastguard Worker uint8_t dev_minor = 0;
111*6777b538SAndroid Build Coastguard Worker long inode = 0;
112*6777b538SAndroid Build Coastguard Worker int path_index = 0;
113*6777b538SAndroid Build Coastguard Worker
114*6777b538SAndroid Build Coastguard Worker // Sample format from man 5 proc:
115*6777b538SAndroid Build Coastguard Worker //
116*6777b538SAndroid Build Coastguard Worker // address perms offset dev inode pathname
117*6777b538SAndroid Build Coastguard Worker // 08048000-08056000 r-xp 00000000 03:0c 64593 /usr/sbin/gpm
118*6777b538SAndroid Build Coastguard Worker //
119*6777b538SAndroid Build Coastguard Worker // The final %n term captures the offset in the input string, which is used
120*6777b538SAndroid Build Coastguard Worker // to determine the path name. It *does not* increment the return value.
121*6777b538SAndroid Build Coastguard Worker // Refer to man 3 sscanf for details.
122*6777b538SAndroid Build Coastguard Worker if (sscanf(line, "%" SCNxPTR "-%" SCNxPTR " %4c %llx %hhx:%hhx %ld %n",
123*6777b538SAndroid Build Coastguard Worker ®ion.start, ®ion.end, permissions, ®ion.offset,
124*6777b538SAndroid Build Coastguard Worker &dev_major, &dev_minor, &inode, &path_index) < 7) {
125*6777b538SAndroid Build Coastguard Worker DPLOG(WARNING) << "sscanf failed for line: " << line;
126*6777b538SAndroid Build Coastguard Worker return false;
127*6777b538SAndroid Build Coastguard Worker }
128*6777b538SAndroid Build Coastguard Worker
129*6777b538SAndroid Build Coastguard Worker region.permissions = 0;
130*6777b538SAndroid Build Coastguard Worker
131*6777b538SAndroid Build Coastguard Worker if (permissions[0] == 'r')
132*6777b538SAndroid Build Coastguard Worker region.permissions |= MappedMemoryRegion::READ;
133*6777b538SAndroid Build Coastguard Worker else if (permissions[0] != '-')
134*6777b538SAndroid Build Coastguard Worker return false;
135*6777b538SAndroid Build Coastguard Worker
136*6777b538SAndroid Build Coastguard Worker if (permissions[1] == 'w')
137*6777b538SAndroid Build Coastguard Worker region.permissions |= MappedMemoryRegion::WRITE;
138*6777b538SAndroid Build Coastguard Worker else if (permissions[1] != '-')
139*6777b538SAndroid Build Coastguard Worker return false;
140*6777b538SAndroid Build Coastguard Worker
141*6777b538SAndroid Build Coastguard Worker if (permissions[2] == 'x')
142*6777b538SAndroid Build Coastguard Worker region.permissions |= MappedMemoryRegion::EXECUTE;
143*6777b538SAndroid Build Coastguard Worker else if (permissions[2] != '-')
144*6777b538SAndroid Build Coastguard Worker return false;
145*6777b538SAndroid Build Coastguard Worker
146*6777b538SAndroid Build Coastguard Worker if (permissions[3] == 'p')
147*6777b538SAndroid Build Coastguard Worker region.permissions |= MappedMemoryRegion::PRIVATE;
148*6777b538SAndroid Build Coastguard Worker else if (permissions[3] != 's' && permissions[3] != 'S') // Shared memory.
149*6777b538SAndroid Build Coastguard Worker return false;
150*6777b538SAndroid Build Coastguard Worker
151*6777b538SAndroid Build Coastguard Worker // Pushing then assigning saves us a string copy.
152*6777b538SAndroid Build Coastguard Worker regions.push_back(region);
153*6777b538SAndroid Build Coastguard Worker regions.back().path.assign(line + path_index);
154*6777b538SAndroid Build Coastguard Worker }
155*6777b538SAndroid Build Coastguard Worker
156*6777b538SAndroid Build Coastguard Worker regions_out->swap(regions);
157*6777b538SAndroid Build Coastguard Worker return true;
158*6777b538SAndroid Build Coastguard Worker }
159*6777b538SAndroid Build Coastguard Worker
160*6777b538SAndroid Build Coastguard Worker } // namespace debug
161*6777b538SAndroid Build Coastguard Worker } // namespace base
162