blob: c2aa26948146421c95c0b9a33d962b35cda79a10 [file] [log] [blame]
/*
* Copyright (C) 2016 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#define DEBUG false
#include "Log.h"
#include "Section.h"
#include <dirent.h>
#include <errno.h>
#include <mutex>
#include <set>
#include <thread>
#include <android-base/file.h>
#include <android-base/properties.h>
#include <android-base/stringprintf.h>
#include <android/util/protobuf.h>
#include <android/util/ProtoOutputStream.h>
#include <binder/IServiceManager.h>
#include <debuggerd/client.h>
#include <dumputils/dump_utils.h>
#include <log/log_event_list.h>
#include <log/logprint.h>
#include <private/android_logger.h>
#include <sys/mman.h>
#include "FdBuffer.h"
#include "Privacy.h"
#include "frameworks/base/core/proto/android/os/backtrace.proto.h"
#include "frameworks/base/core/proto/android/os/data.proto.h"
#include "frameworks/base/core/proto/android/util/log.proto.h"
#include "frameworks/base/core/proto/android/util/textdump.proto.h"
#include "incidentd_util.h"
namespace android {
namespace os {
namespace incidentd {
using namespace android::base;
using namespace android::util;
// special section ids
const int FIELD_ID_INCIDENT_METADATA = 2;
// incident section parameters
const char INCIDENT_HELPER[] = "/system/bin/incident_helper";
const char* GZIP[] = {"/system/bin/gzip", NULL};
static pid_t fork_execute_incident_helper(const int id, Fpipe* p2cPipe, Fpipe* c2pPipe) {
const char* ihArgs[]{INCIDENT_HELPER, "-s", String8::format("%d", id).c_str(), NULL};
return fork_execute_cmd(const_cast<char**>(ihArgs), p2cPipe, c2pPipe);
}
bool section_requires_specific_mention(int sectionId) {
switch (sectionId) {
case 3025: // restricted_images
return true;
case 3026: // system_trace
return true;
default:
return false;
}
}
// ================================================================================
Section::Section(int i, int64_t timeoutMs)
: id(i),
timeoutMs(timeoutMs) {
}
Section::~Section() {}
// ================================================================================
static inline bool isSysfs(const char* filename) { return strncmp(filename, "/sys/", 5) == 0; }
FileSection::FileSection(int id, const char* filename, const int64_t timeoutMs)
: Section(id, timeoutMs), mFilename(filename) {
name = "file ";
name += filename;
mIsSysfs = isSysfs(filename);
}
FileSection::~FileSection() {}
status_t FileSection::Execute(ReportWriter* writer) const {
// read from mFilename first, make sure the file is available
// add O_CLOEXEC to make sure it is closed when exec incident helper
unique_fd fd(open(mFilename, O_RDONLY | O_CLOEXEC));
if (fd.get() == -1) {
ALOGW("[%s] failed to open file", this->name.c_str());
// There may be some devices/architectures that won't have the file.
// Just return here without an error.
return NO_ERROR;
}
Fpipe p2cPipe;
Fpipe c2pPipe;
// initiate pipes to pass data to/from incident_helper
if (!p2cPipe.init() || !c2pPipe.init()) {
ALOGW("[%s] failed to setup pipes", this->name.c_str());
return -errno;
}
pid_t pid = fork_execute_incident_helper(this->id, &p2cPipe, &c2pPipe);
if (pid == -1) {
ALOGW("[%s] failed to fork", this->name.c_str());
return -errno;
}
// parent process
FdBuffer buffer;
status_t readStatus = buffer.readProcessedDataInStream(fd.get(), std::move(p2cPipe.writeFd()),
std::move(c2pPipe.readFd()),
this->timeoutMs, mIsSysfs);
writer->setSectionStats(buffer);
if (readStatus != NO_ERROR || buffer.timedOut()) {
ALOGW("[%s] failed to read data from incident helper: %s, timedout: %s",
this->name.c_str(), strerror(-readStatus), buffer.timedOut() ? "true" : "false");
kill_child(pid);
return readStatus;
}
status_t ihStatus = wait_child(pid);
if (ihStatus != NO_ERROR) {
ALOGW("[%s] abnormal child process: %s", this->name.c_str(), strerror(-ihStatus));
return OK; // Not a fatal error.
}
return writer->writeSection(buffer);
}
// ================================================================================
GZipSection::GZipSection(int id, const char* filename, ...) : Section(id) {
va_list args;
va_start(args, filename);
mFilenames = varargs(filename, args);
va_end(args);
name = "gzip";
for (int i = 0; mFilenames[i] != NULL; i++) {
name += " ";
name += mFilenames[i];
}
}
GZipSection::~GZipSection() { free(mFilenames); }
status_t GZipSection::Execute(ReportWriter* writer) const {
// Reads the files in order, use the first available one.
int index = 0;
unique_fd fd;
while (mFilenames[index] != NULL) {
fd.reset(open(mFilenames[index], O_RDONLY | O_CLOEXEC));
if (fd.get() != -1) {
break;
}
ALOGW("GZipSection failed to open file %s", mFilenames[index]);
index++; // look at the next file.
}
if (fd.get() == -1) {
ALOGW("[%s] can't open all the files", this->name.c_str());
return NO_ERROR; // e.g. LAST_KMSG will reach here in user build.
}
FdBuffer buffer;
Fpipe p2cPipe;
Fpipe c2pPipe;
// initiate pipes to pass data to/from gzip
if (!p2cPipe.init() || !c2pPipe.init()) {
ALOGW("[%s] failed to setup pipes", this->name.c_str());
return -errno;
}
pid_t pid = fork_execute_cmd((char* const*)GZIP, &p2cPipe, &c2pPipe);
if (pid == -1) {
ALOGW("[%s] failed to fork", this->name.c_str());
return -errno;
}
// parent process
// construct Fdbuffer to output GZippedfileProto, the reason to do this instead of using
// ProtoOutputStream is to avoid allocation of another buffer inside ProtoOutputStream.
sp<EncodedBuffer> internalBuffer = buffer.data();
internalBuffer->writeHeader((uint32_t)GZippedFileProto::FILENAME, WIRE_TYPE_LENGTH_DELIMITED);
size_t fileLen = strlen(mFilenames[index]);
internalBuffer->writeRawVarint32(fileLen);
for (size_t i = 0; i < fileLen; i++) {
internalBuffer->writeRawByte(mFilenames[index][i]);
}
internalBuffer->writeHeader((uint32_t)GZippedFileProto::GZIPPED_DATA,
WIRE_TYPE_LENGTH_DELIMITED);
size_t editPos = internalBuffer->wp()->pos();
internalBuffer->wp()->move(8); // reserve 8 bytes for the varint of the data size.
size_t dataBeginAt = internalBuffer->wp()->pos();
VLOG("[%s] editPos=%zu, dataBeginAt=%zu", this->name.c_str(), editPos, dataBeginAt);
status_t readStatus = buffer.readProcessedDataInStream(
fd.get(), std::move(p2cPipe.writeFd()), std::move(c2pPipe.readFd()), this->timeoutMs,
isSysfs(mFilenames[index]));
writer->setSectionStats(buffer);
if (readStatus != NO_ERROR || buffer.timedOut()) {
ALOGW("[%s] failed to read data from gzip: %s, timedout: %s", this->name.c_str(),
strerror(-readStatus), buffer.timedOut() ? "true" : "false");
kill_child(pid);
return readStatus;
}
status_t gzipStatus = wait_child(pid);
if (gzipStatus != NO_ERROR) {
ALOGW("[%s] abnormal child process: %s", this->name.c_str(), strerror(-gzipStatus));
return gzipStatus;
}
// Revisit the actual size from gzip result and edit the internal buffer accordingly.
size_t dataSize = buffer.size() - dataBeginAt;
internalBuffer->wp()->rewind()->move(editPos);
internalBuffer->writeRawVarint32(dataSize);
internalBuffer->copy(dataBeginAt, dataSize);
return writer->writeSection(buffer);
}
// ================================================================================
struct WorkerThreadData : public virtual RefBase {
const WorkerThreadSection* section;
Fpipe pipe;
// Lock protects these fields
std::mutex lock;
bool workerDone;
status_t workerError;
explicit WorkerThreadData(const WorkerThreadSection* section);
virtual ~WorkerThreadData();
};
WorkerThreadData::WorkerThreadData(const WorkerThreadSection* sec)
: section(sec), workerDone(false), workerError(NO_ERROR) {}
WorkerThreadData::~WorkerThreadData() {}
// ================================================================================
WorkerThreadSection::WorkerThreadSection(int id, const int64_t timeoutMs)
: Section(id, timeoutMs) {}
WorkerThreadSection::~WorkerThreadSection() {}
void sigpipe_handler(int signum) {
if (signum == SIGPIPE) {
ALOGE("Wrote to a broken pipe\n");
} else {
ALOGE("Received unexpected signal: %d\n", signum);
}
}
status_t WorkerThreadSection::Execute(ReportWriter* writer) const {
// Create shared data and pipe. Don't put data on the stack since this thread may exit early.
sp<WorkerThreadData> data = new WorkerThreadData(this);
if (!data->pipe.init()) {
return -errno;
}
data->incStrong(this);
std::thread([data, this]() {
// Don't crash the service if writing to a closed pipe (may happen if dumping times out)
signal(SIGPIPE, sigpipe_handler);
status_t err = data->section->BlockingCall(data->pipe.writeFd());
{
std::scoped_lock<std::mutex> lock(data->lock);
data->workerDone = true;
data->workerError = err;
// unique_fd is not thread safe. If we don't lock it, reset() may pause half way while
// the other thread executes to the end, calling ~Fpipe, which is a race condition.
data->pipe.writeFd().reset();
}
data->decStrong(this);
}).detach();
// Loop reading until either the timeout or the worker side is done (i.e. eof).
status_t err = NO_ERROR;
bool workerDone = false;
FdBuffer buffer;
err = buffer.read(data->pipe.readFd().get(), this->timeoutMs);
if (err != NO_ERROR) {
ALOGE("[%s] reader failed with error '%s'", this->name.c_str(), strerror(-err));
}
// If the worker side is finished, then return its error (which may overwrite
// our possible error -- but it's more interesting anyway). If not, then we timed out.
{
std::scoped_lock<std::mutex> lock(data->lock);
data->pipe.close();
if (data->workerError != NO_ERROR) {
err = data->workerError;
ALOGE("[%s] worker failed with error '%s'", this->name.c_str(), strerror(-err));
}
workerDone = data->workerDone;
}
writer->setSectionStats(buffer);
if (err != NO_ERROR) {
char errMsg[128];
snprintf(errMsg, 128, "[%s] failed with error '%s'",
this->name.c_str(), strerror(-err));
writer->error(this, err, "WorkerThreadSection failed.");
return NO_ERROR;
}
if (buffer.truncated()) {
ALOGW("[%s] too large, truncating", this->name.c_str());
// Do not write a truncated section. It won't pass through the PrivacyFilter.
return NO_ERROR;
}
if (!workerDone || buffer.timedOut()) {
ALOGW("[%s] timed out", this->name.c_str());
return NO_ERROR;
}
// Write the data that was collected
return writer->writeSection(buffer);
}
// ================================================================================
CommandSection::CommandSection(int id, const int64_t timeoutMs, const char* command, ...)
: Section(id, timeoutMs) {
va_list args;
va_start(args, command);
mCommand = varargs(command, args);
va_end(args);
name = "cmd";
for (int i = 0; mCommand[i] != NULL; i++) {
name += " ";
name += mCommand[i];
}
}
CommandSection::CommandSection(int id, const char* command, ...) : Section(id) {
va_list args;
va_start(args, command);
mCommand = varargs(command, args);
va_end(args);
name = "cmd";
for (int i = 0; mCommand[i] != NULL; i++) {
name += " ";
name += mCommand[i];
}
}
CommandSection::~CommandSection() { free(mCommand); }
status_t CommandSection::Execute(ReportWriter* writer) const {
Fpipe cmdPipe;
Fpipe ihPipe;
if (!cmdPipe.init() || !ihPipe.init()) {
ALOGW("[%s] failed to setup pipes", this->name.c_str());
return -errno;
}
pid_t cmdPid = fork_execute_cmd((char* const*)mCommand, NULL, &cmdPipe);
if (cmdPid == -1) {
ALOGW("[%s] failed to fork", this->name.c_str());
return -errno;
}
pid_t ihPid = fork_execute_incident_helper(this->id, &cmdPipe, &ihPipe);
if (ihPid == -1) {
ALOGW("[%s] failed to fork", this->name.c_str());
return -errno;
}
cmdPipe.writeFd().reset();
FdBuffer buffer;
status_t readStatus = buffer.read(ihPipe.readFd().get(), this->timeoutMs);
writer->setSectionStats(buffer);
if (readStatus != NO_ERROR || buffer.timedOut()) {
ALOGW("[%s] failed to read data from incident helper: %s, timedout: %s",
this->name.c_str(), strerror(-readStatus), buffer.timedOut() ? "true" : "false");
kill_child(cmdPid);
kill_child(ihPid);
return readStatus;
}
// Waiting for command here has one trade-off: the failed status of command won't be detected
// until buffer timeout, but it has advatage on starting the data stream earlier.
status_t cmdStatus = wait_child(cmdPid);
status_t ihStatus = wait_child(ihPid);
if (cmdStatus != NO_ERROR || ihStatus != NO_ERROR) {
ALOGW("[%s] abnormal child processes, return status: command: %s, incident helper: %s",
this->name.c_str(), strerror(-cmdStatus), strerror(-ihStatus));
// Not a fatal error.
return NO_ERROR;
}
return writer->writeSection(buffer);
}
// ================================================================================
DumpsysSection::DumpsysSection(int id, const char* service, ...)
: WorkerThreadSection(id, REMOTE_CALL_TIMEOUT_MS), mService(service) {
name = "dumpsys ";
name += service;
va_list args;
va_start(args, service);
while (true) {
const char* arg = va_arg(args, const char*);
if (arg == NULL) {
break;
}
mArgs.add(String16(arg));
name += " ";
name += arg;
}
va_end(args);
}
DumpsysSection::~DumpsysSection() {}
status_t DumpsysSection::BlockingCall(unique_fd& pipeWriteFd) const {
// checkService won't wait for the service to show up like getService will.
sp<IBinder> service = defaultServiceManager()->checkService(mService);
if (service == NULL) {
ALOGW("DumpsysSection: Can't lookup service: %s", String8(mService).c_str());
return NAME_NOT_FOUND;
}
service->dump(pipeWriteFd.get(), mArgs);
return NO_ERROR;
}
// ================================================================================
TextDumpsysSection::TextDumpsysSection(int id, const char* service, ...)
:Section(id), mService(service) {
name = "dumpsys ";
name += service;
va_list args;
va_start(args, service);
while (true) {
const char* arg = va_arg(args, const char*);
if (arg == NULL) {
break;
}
mArgs.add(String16(arg));
name += " ";
name += arg;
}
va_end(args);
}
TextDumpsysSection::~TextDumpsysSection() {}
status_t TextDumpsysSection::Execute(ReportWriter* writer) const {
// checkService won't wait for the service to show up like getService will.
sp<IBinder> service = defaultServiceManager()->checkService(mService);
if (service == NULL) {
ALOGW("TextDumpsysSection: Can't lookup service: %s", String8(mService).c_str());
return NAME_NOT_FOUND;
}
// Create pipe
Fpipe dumpPipe;
if (!dumpPipe.init()) {
ALOGW("[%s] failed to setup pipe", this->name.c_str());
return -errno;
}
// Run dumping thread
const uint64_t start = Nanotime();
std::thread worker([write_fd = std::move(dumpPipe.writeFd()), service = std::move(service),
this]() mutable {
// Don't crash the service if writing to a closed pipe (may happen if dumping times out)
signal(SIGPIPE, sigpipe_handler);
status_t err = service->dump(write_fd.get(), this->mArgs);
if (err != OK) {
ALOGW("[%s] dump thread failed. Error: %s", this->name.c_str(), strerror(-err));
}
write_fd.reset();
});
// Collect dump content
FdBuffer buffer;
ProtoOutputStream proto;
proto.write(TextDumpProto::COMMAND, std::string(name.c_str()));
proto.write(TextDumpProto::DUMP_DURATION_NS, int64_t(Nanotime() - start));
buffer.write(proto.data());
sp<EncodedBuffer> internalBuffer = buffer.data();
internalBuffer->writeHeader((uint32_t)TextDumpProto::CONTENT, WIRE_TYPE_LENGTH_DELIMITED);
size_t editPos = internalBuffer->wp()->pos();
internalBuffer->wp()->move(8); // reserve 8 bytes for the varint of the data size
size_t dataBeginPos = internalBuffer->wp()->pos();
status_t readStatus = buffer.read(dumpPipe.readFd(), this->timeoutMs);
dumpPipe.readFd().reset();
writer->setSectionStats(buffer);
if (readStatus != OK || buffer.timedOut()) {
ALOGW("[%s] failed to read from dumpsys: %s, timedout: %s", this->name.c_str(),
strerror(-readStatus), buffer.timedOut() ? "true" : "false");
worker.detach();
return readStatus;
}
worker.join(); // wait for worker to finish
// Revisit the actual size from dumpsys and edit the internal buffer accordingly.
size_t dumpSize = buffer.size() - dataBeginPos;
internalBuffer->wp()->rewind()->move(editPos);
internalBuffer->writeRawVarint32(dumpSize);
internalBuffer->copy(dataBeginPos, dumpSize);
return writer->writeSection(buffer);
}
// ================================================================================
// initialization only once in Section.cpp.
map<log_id_t, log_time> LogSection::gLastLogsRetrieved;
LogSection::LogSection(int id, const char* logID, ...) : WorkerThreadSection(id), mLogMode(logModeBase) {
name = "logcat -b ";
name += logID;
va_list args;
va_start(args, logID);
mLogID = android_name_to_log_id(logID);
while(true) {
const char* arg = va_arg(args, const char*);
if (arg == NULL) {
break;
}
if (!strcmp(arg, "-L")) {
// Read from last logcat buffer
mLogMode = mLogMode | ANDROID_LOG_PSTORE;
}
name += " ";
name += arg;
}
va_end(args);
switch (mLogID) {
case LOG_ID_EVENTS:
case LOG_ID_STATS:
case LOG_ID_SECURITY:
mBinary = true;
break;
default:
mBinary = false;
}
}
LogSection::~LogSection() {}
static size_t trimTail(char const* buf, size_t len) {
while (len > 0) {
char c = buf[len - 1];
if (c == '\0' || c == ' ' || c == '\n' || c == '\r' || c == ':') {
len--;
} else {
break;
}
}
return len;
}
static inline int32_t get4LE(uint8_t const* src) {
return src[0] | (src[1] << 8) | (src[2] << 16) | (src[3] << 24);
}
status_t LogSection::BlockingCall(unique_fd& pipeWriteFd) const {
// heap profile shows that liblog malloc & free significant amount of memory in this process.
// Hence forking a new process to prevent memory fragmentation.
pid_t pid = fork();
if (pid < 0) {
ALOGW("[%s] failed to fork", this->name.c_str());
return errno;
}
if (pid > 0) {
return wait_child(pid, this->timeoutMs);
}
// Open log buffer and getting logs since last retrieved time if any.
unique_ptr<logger_list, void (*)(logger_list*)> loggers(
gLastLogsRetrieved.find(mLogID) == gLastLogsRetrieved.end()
? android_logger_list_alloc(mLogMode, 0, 0)
: android_logger_list_alloc_time(mLogMode, gLastLogsRetrieved[mLogID], 0),
android_logger_list_free);
if (android_logger_open(loggers.get(), mLogID) == NULL) {
ALOGE("[%s] Can't get logger.", this->name.c_str());
_exit(EXIT_FAILURE);
}
log_msg msg;
log_time lastTimestamp(0);
ProtoOutputStream proto;
status_t err = OK;
while (true) { // keeps reading until logd buffer is fully read.
status_t status = android_logger_list_read(loggers.get(), &msg);
// status = 0 - no content, unexpected connection drop or EOF.
// status = +ive number - size of retrieved data from logger
// status = -ive number, OS supplied error _except_ for -EAGAIN
// status = -EAGAIN, graceful indication for ANDRODI_LOG_NONBLOCK that this is the end.
if (status <= 0) {
if (status != -EAGAIN) {
ALOGW("[%s] fails to read a log_msg.\n", this->name.c_str());
err = -status;
}
break;
}
if (mBinary) {
// remove the first uint32 which is tag's index in event log tags
android_log_context context = create_android_log_parser(msg.msg() + sizeof(uint32_t),
msg.len() - sizeof(uint32_t));
android_log_list_element elem;
lastTimestamp.tv_sec = msg.entry.sec;
lastTimestamp.tv_nsec = msg.entry.nsec;
// format a BinaryLogEntry
uint64_t token = proto.start(LogProto::BINARY_LOGS);
proto.write(BinaryLogEntry::SEC, (int32_t)msg.entry.sec);
proto.write(BinaryLogEntry::NANOSEC, (int32_t)msg.entry.nsec);
proto.write(BinaryLogEntry::UID, (int)msg.entry.uid);
proto.write(BinaryLogEntry::PID, msg.entry.pid);
proto.write(BinaryLogEntry::TID, (int32_t)msg.entry.tid);
proto.write(BinaryLogEntry::TAG_INDEX,
get4LE(reinterpret_cast<uint8_t const*>(msg.msg())));
do {
elem = android_log_read_next(context);
uint64_t elemToken = proto.start(BinaryLogEntry::ELEMS);
switch (elem.type) {
case EVENT_TYPE_INT:
proto.write(BinaryLogEntry::Elem::TYPE,
BinaryLogEntry::Elem::EVENT_TYPE_INT);
proto.write(BinaryLogEntry::Elem::VAL_INT32, (int)elem.data.int32);
break;
case EVENT_TYPE_LONG:
proto.write(BinaryLogEntry::Elem::TYPE,
BinaryLogEntry::Elem::EVENT_TYPE_LONG);
proto.write(BinaryLogEntry::Elem::VAL_INT64, (long long)elem.data.int64);
break;
case EVENT_TYPE_STRING:
proto.write(BinaryLogEntry::Elem::TYPE,
BinaryLogEntry::Elem::EVENT_TYPE_STRING);
proto.write(BinaryLogEntry::Elem::VAL_STRING, elem.data.string, elem.len);
break;
case EVENT_TYPE_FLOAT:
proto.write(BinaryLogEntry::Elem::TYPE,
BinaryLogEntry::Elem::EVENT_TYPE_FLOAT);
proto.write(BinaryLogEntry::Elem::VAL_FLOAT, elem.data.float32);
break;
case EVENT_TYPE_LIST:
proto.write(BinaryLogEntry::Elem::TYPE,
BinaryLogEntry::Elem::EVENT_TYPE_LIST);
break;
case EVENT_TYPE_LIST_STOP:
proto.write(BinaryLogEntry::Elem::TYPE,
BinaryLogEntry::Elem::EVENT_TYPE_LIST_STOP);
break;
case EVENT_TYPE_UNKNOWN:
proto.write(BinaryLogEntry::Elem::TYPE,
BinaryLogEntry::Elem::EVENT_TYPE_UNKNOWN);
break;
}
proto.end(elemToken);
} while ((elem.type != EVENT_TYPE_UNKNOWN) && !elem.complete);
proto.end(token);
if (context) {
android_log_destroy(&context);
}
} else {
AndroidLogEntry entry;
status = android_log_processLogBuffer(&msg.entry, &entry);
if (status != OK) {
ALOGW("[%s] fails to process to an entry.\n", this->name.c_str());
err = status;
break;
}
lastTimestamp.tv_sec = entry.tv_sec;
lastTimestamp.tv_nsec = entry.tv_nsec;
// format a TextLogEntry
uint64_t token = proto.start(LogProto::TEXT_LOGS);
proto.write(TextLogEntry::SEC, (long long)entry.tv_sec);
proto.write(TextLogEntry::NANOSEC, (long long)entry.tv_nsec);
proto.write(TextLogEntry::PRIORITY, (int)entry.priority);
proto.write(TextLogEntry::UID, entry.uid);
proto.write(TextLogEntry::PID, entry.pid);
proto.write(TextLogEntry::TID, entry.tid);
proto.write(TextLogEntry::TAG, entry.tag, trimTail(entry.tag, entry.tagLen));
proto.write(TextLogEntry::LOG, entry.message,
trimTail(entry.message, entry.messageLen));
proto.end(token);
}
if (!proto.flush(pipeWriteFd.get())) {
if (errno == EPIPE) {
ALOGW("[%s] wrote to a broken pipe\n", this->name.c_str());
}
err = errno;
break;
}
proto.clear();
}
gLastLogsRetrieved[mLogID] = lastTimestamp;
_exit(err);
}
// ================================================================================
const int LINK_NAME_LEN = 64;
const int EXE_NAME_LEN = 1024;
TombstoneSection::TombstoneSection(int id, const char* type, const int64_t timeoutMs)
: WorkerThreadSection(id, timeoutMs), mType(type) {
name = "tombstone ";
name += type;
}
TombstoneSection::~TombstoneSection() {}
status_t TombstoneSection::BlockingCall(unique_fd& pipeWriteFd) const {
std::unique_ptr<DIR, decltype(&closedir)> proc(opendir("/proc"), closedir);
if (proc.get() == nullptr) {
ALOGE("opendir /proc failed: %s\n", strerror(errno));
return -errno;
}
const std::set<int> hal_pids = get_interesting_pids();
auto pooledBuffer = get_buffer_from_pool();
ProtoOutputStream proto(pooledBuffer);
// dumpBufferSize should be a multiple of page size (4 KB) to reduce memory fragmentation
size_t dumpBufferSize = 64 * 1024; // 64 KB is enough for most tombstone dump
char* dumpBuffer = (char*)mmap(NULL, dumpBufferSize, PROT_READ | PROT_WRITE,
MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
struct dirent* d;
char link_name[LINK_NAME_LEN];
char exe_name[EXE_NAME_LEN];
status_t err = NO_ERROR;
while ((d = readdir(proc.get()))) {
int pid = atoi(d->d_name);
if (pid <= 0) {
continue;
}
snprintf(link_name, LINK_NAME_LEN, "/proc/%d/exe", pid);
struct stat fileStat;
if (stat(link_name, &fileStat) != OK) {
continue;
}
ssize_t exe_name_len = readlink(link_name, exe_name, EXE_NAME_LEN);
if (exe_name_len < 0 || exe_name_len >= EXE_NAME_LEN) {
ALOGE("[%s] Can't read '%s': %s", name.c_str(), link_name, strerror(errno));
continue;
}
// readlink(2) does not put a null terminator at the end
exe_name[exe_name_len] = '\0';
bool is_java_process;
if (strncmp(exe_name, "/system/bin/app_process32", LINK_NAME_LEN) == 0 ||
strncmp(exe_name, "/system/bin/app_process64", LINK_NAME_LEN) == 0) {
if (mType != "java") continue;
// Don't bother dumping backtraces for the zygote.
if (IsZygote(pid)) {
VLOG("Skipping Zygote");
continue;
}
is_java_process = true;
} else if (should_dump_native_traces(exe_name)) {
if (mType != "native") continue;
is_java_process = false;
} else if (hal_pids.find(pid) != hal_pids.end()) {
if (mType != "hal") continue;
is_java_process = false;
} else {
// Probably a native process we don't care about, continue.
VLOG("Skipping %d", pid);
continue;
}
Fpipe dumpPipe;
if (!dumpPipe.init()) {
ALOGW("[%s] failed to setup dump pipe", this->name.c_str());
err = -errno;
break;
}
const uint64_t start = Nanotime();
pid_t child = fork();
if (child < 0) {
ALOGE("Failed to fork child process");
break;
} else if (child == 0) {
// This is the child process.
dumpPipe.readFd().reset();
const int ret = dump_backtrace_to_file_timeout(
pid, is_java_process ? kDebuggerdJavaBacktrace : kDebuggerdNativeBacktrace,
is_java_process ? 5 : 20, dumpPipe.writeFd().get());
if (ret == -1) {
if (errno == 0) {
ALOGW("Dumping failed for pid '%d', likely due to a timeout\n", pid);
} else {
ALOGE("Dumping failed for pid '%d': %s\n", pid, strerror(errno));
}
}
dumpPipe.writeFd().reset();
_exit(EXIT_SUCCESS);
}
dumpPipe.writeFd().reset();
// Parent process.
// Read from the pipe concurrently to avoid blocking the child.
FdBuffer buffer;
err = buffer.readFully(dumpPipe.readFd().get());
// Wait on the child to avoid it becoming a zombie process.
status_t cStatus = wait_child(child);
if (err != NO_ERROR) {
ALOGW("[%s] failed to read stack dump: %d", this->name.c_str(), err);
dumpPipe.readFd().reset();
break;
}
if (cStatus != NO_ERROR) {
ALOGE("[%s] child had an issue: %s\n", this->name.c_str(), strerror(-cStatus));
}
// Resize dump buffer
if (dumpBufferSize < buffer.size()) {
munmap(dumpBuffer, dumpBufferSize);
while(dumpBufferSize < buffer.size()) dumpBufferSize = dumpBufferSize << 1;
dumpBuffer = (char*)mmap(NULL, dumpBufferSize, PROT_READ | PROT_WRITE,
MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
}
sp<ProtoReader> reader = buffer.data()->read();
int i = 0;
while (reader->hasNext()) {
dumpBuffer[i] = reader->next();
i++;
}
uint64_t token = proto.start(android::os::BackTraceProto::TRACES);
proto.write(android::os::BackTraceProto::Stack::PID, pid);
proto.write(android::os::BackTraceProto::Stack::DUMP, dumpBuffer, i);
proto.write(android::os::BackTraceProto::Stack::DUMP_DURATION_NS,
static_cast<long long>(Nanotime() - start));
proto.end(token);
dumpPipe.readFd().reset();
if (!proto.flush(pipeWriteFd.get())) {
if (errno == EPIPE) {
ALOGE("[%s] wrote to a broken pipe\n", this->name.c_str());
}
err = errno;
break;
}
proto.clear();
}
munmap(dumpBuffer, dumpBufferSize);
return_buffer_to_pool(pooledBuffer);
return err;
}
// ================================================================================
BringYourOwnSection::BringYourOwnSection(int id, const char* customName, const uid_t callingUid,
const sp<IIncidentDumpCallback>& callback)
: WorkerThreadSection(id, REMOTE_CALL_TIMEOUT_MS), uid(callingUid), mCallback(callback) {
name = "registered ";
name += customName;
}
BringYourOwnSection::~BringYourOwnSection() {}
status_t BringYourOwnSection::BlockingCall(unique_fd& pipeWriteFd) const {
android::os::ParcelFileDescriptor pfd(std::move(pipeWriteFd));
if(mCallback != nullptr) {
mCallback->onDumpSection(pfd);
}
return NO_ERROR;
}
} // namespace incidentd
} // namespace os
} // namespace android