blob: e2a67a2f70680f36b155ba6531c017a27474752e [file] [log] [blame]
Josh Gaocbe70cb2016-10-18 18:17:52 -07001/*
2 * Copyright 2016, The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <fcntl.h>
18#include <stdio.h>
19#include <stdlib.h>
20#include <sys/stat.h>
21#include <sys/types.h>
22#include <unistd.h>
23
24#include <array>
25#include <deque>
Josh Gaocb68a032017-06-02 13:02:10 -070026#include <string>
Josh Gaocbe70cb2016-10-18 18:17:52 -070027#include <unordered_map>
Josh Gaocb68a032017-06-02 13:02:10 -070028#include <utility>
Josh Gaocbe70cb2016-10-18 18:17:52 -070029
30#include <event2/event.h>
31#include <event2/listener.h>
32#include <event2/thread.h>
33
Josh Gao5f87bbd2019-01-09 17:01:49 -080034#include <android-base/cmsg.h>
Josh Gaocbe70cb2016-10-18 18:17:52 -070035#include <android-base/logging.h>
Elliott Hughes35bb6d22017-06-26 13:54:05 -070036#include <android-base/properties.h>
Josh Gaocbe70cb2016-10-18 18:17:52 -070037#include <android-base/stringprintf.h>
38#include <android-base/unique_fd.h>
39#include <cutils/sockets.h>
40
Josh Gao55f79a52017-03-06 12:24:07 -080041#include "debuggerd/handler.h"
Narayan Kamatha73df602017-05-24 15:07:25 +010042#include "dump_type.h"
Narayan Kamath2d377cd2017-05-10 10:58:59 +010043#include "protocol.h"
44#include "util.h"
Josh Gaocbe70cb2016-10-18 18:17:52 -070045
46#include "intercept_manager.h"
47
Elliott Hughes35bb6d22017-06-26 13:54:05 -070048using android::base::GetIntProperty;
Josh Gao5f87bbd2019-01-09 17:01:49 -080049using android::base::SendFileDescriptors;
Josh Gaocbe70cb2016-10-18 18:17:52 -070050using android::base::StringPrintf;
Josh Gao76e1e302021-01-26 15:53:11 -080051
52using android::base::borrowed_fd;
Josh Gaocbe70cb2016-10-18 18:17:52 -070053using android::base::unique_fd;
54
55static InterceptManager* intercept_manager;
56
57enum CrashStatus {
58 kCrashStatusRunning,
59 kCrashStatusQueued,
60};
61
Josh Gao76e1e302021-01-26 15:53:11 -080062struct CrashArtifact {
63 unique_fd fd;
Josh Gao76e1e302021-01-26 15:53:11 -080064
65 static CrashArtifact devnull() {
66 CrashArtifact result;
67 result.fd.reset(open("/dev/null", O_WRONLY | O_CLOEXEC));
68 return result;
69 }
70};
71
72struct CrashArtifactPaths {
73 std::string text;
74 std::optional<std::string> proto;
75};
76
77struct CrashOutput {
78 CrashArtifact text;
79 std::optional<CrashArtifact> proto;
80};
81
Elliott Hughes35bb6d22017-06-26 13:54:05 -070082// Ownership of Crash is a bit messy.
83// It's either owned by an active event that must have a timeout, or owned by
84// queued_requests, in the case that multiple crashes come in at the same time.
85struct Crash {
86 ~Crash() { event_free(crash_event); }
87
Josh Gao76e1e302021-01-26 15:53:11 -080088 CrashOutput output;
Josh Gao48383c82018-04-18 18:11:01 -070089 unique_fd crash_socket_fd;
Elliott Hughes35bb6d22017-06-26 13:54:05 -070090 pid_t crash_pid;
91 event* crash_event = nullptr;
Elliott Hughes35bb6d22017-06-26 13:54:05 -070092
93 DebuggerdDumpType crash_type;
94};
Narayan Kamath922f6b22017-05-15 15:59:30 +010095
Narayan Kamatha73df602017-05-24 15:07:25 +010096class CrashQueue {
Narayan Kamath922f6b22017-05-15 15:59:30 +010097 public:
Narayan Kamatha73df602017-05-24 15:07:25 +010098 CrashQueue(const std::string& dir_path, const std::string& file_name_prefix, size_t max_artifacts,
Josh Gao76e1e302021-01-26 15:53:11 -080099 size_t max_concurrent_dumps, bool supports_proto)
Narayan Kamath922f6b22017-05-15 15:59:30 +0100100 : file_name_prefix_(file_name_prefix),
101 dir_path_(dir_path),
102 dir_fd_(open(dir_path.c_str(), O_DIRECTORY | O_RDONLY | O_CLOEXEC)),
103 max_artifacts_(max_artifacts),
104 next_artifact_(0),
105 max_concurrent_dumps_(max_concurrent_dumps),
Josh Gao76e1e302021-01-26 15:53:11 -0800106 num_concurrent_dumps_(0),
107 supports_proto_(supports_proto) {
Narayan Kamath922f6b22017-05-15 15:59:30 +0100108 if (dir_fd_ == -1) {
109 PLOG(FATAL) << "failed to open directory: " << dir_path;
110 }
111
112 // NOTE: If max_artifacts_ <= max_concurrent_dumps_, then theoretically the
113 // same filename could be handed out to multiple processes.
114 CHECK(max_artifacts_ > max_concurrent_dumps_);
115
116 find_oldest_artifact();
117 }
118
Elliott Hughes35bb6d22017-06-26 13:54:05 -0700119 static CrashQueue* for_crash(const Crash* crash) {
120 return (crash->crash_type == kDebuggerdJavaBacktrace) ? for_anrs() : for_tombstones();
121 }
122
Josh Gao76e1e302021-01-26 15:53:11 -0800123 static CrashQueue* for_crash(const std::unique_ptr<Crash>& crash) {
124 return for_crash(crash.get());
125 }
126
Elliott Hughes35bb6d22017-06-26 13:54:05 -0700127 static CrashQueue* for_tombstones() {
128 static CrashQueue queue("/data/tombstones", "tombstone_" /* file_name_prefix */,
Elliott Hughesec220cd2019-09-26 14:35:24 -0700129 GetIntProperty("tombstoned.max_tombstone_count", 32),
Josh Gao76e1e302021-01-26 15:53:11 -0800130 1 /* max_concurrent_dumps */, true /* supports_proto */);
Elliott Hughes35bb6d22017-06-26 13:54:05 -0700131 return &queue;
132 }
133
134 static CrashQueue* for_anrs() {
135 static CrashQueue queue("/data/anr", "trace_" /* file_name_prefix */,
136 GetIntProperty("tombstoned.max_anr_count", 64),
Josh Gao76e1e302021-01-26 15:53:11 -0800137 4 /* max_concurrent_dumps */, false /* supports_proto */);
Elliott Hughes35bb6d22017-06-26 13:54:05 -0700138 return &queue;
139 }
140
Josh Gao76e1e302021-01-26 15:53:11 -0800141 CrashArtifact create_temporary_file() const {
142 CrashArtifact result;
143
144 std::optional<std::string> path;
Josh Gao88846a22021-02-01 16:48:25 -0800145 result.fd.reset(openat(dir_fd_, ".", O_WRONLY | O_APPEND | O_TMPFILE | O_CLOEXEC, 0660));
Josh Gao76e1e302021-01-26 15:53:11 -0800146 if (result.fd == -1) {
Elliott Hughesaa1d18a2024-02-26 22:18:21 +0000147 PLOG(FATAL) << "failed to create temporary tombstone in " << dir_path_;
Narayan Kamath922f6b22017-05-15 15:59:30 +0100148 }
Elliott Hughesaa1d18a2024-02-26 22:18:21 +0000149
Florian Mayer877d1f62024-02-23 12:54:27 -0800150 // We need to fchmodat after creating to avoid getting the umask applied.
151 std::string fd_path = StringPrintf("/proc/self/fd/%d", result.fd.get());
152 if (fchmodat(dir_fd_, fd_path.c_str(), 0664, 0) != 0) {
153 PLOG(ERROR) << "Failed to make tombstone world-readable";
154 }
Josh Gao76e1e302021-01-26 15:53:11 -0800155
156 return std::move(result);
Josh Gao48383c82018-04-18 18:11:01 -0700157 }
Narayan Kamath922f6b22017-05-15 15:59:30 +0100158
Josh Gao76e1e302021-01-26 15:53:11 -0800159 std::optional<CrashOutput> get_output(DebuggerdDumpType dump_type) {
160 CrashOutput result;
161
162 switch (dump_type) {
163 case kDebuggerdNativeBacktrace:
Josh Gao93127482021-05-18 16:14:15 -0700164 // Don't generate tombstones for native backtrace requests.
Josh Gao76e1e302021-01-26 15:53:11 -0800165 return {};
166
167 case kDebuggerdTombstoneProto:
168 if (!supports_proto_) {
169 LOG(ERROR) << "received kDebuggerdTombstoneProto on a queue that doesn't support proto";
170 return {};
171 }
172 result.proto = create_temporary_file();
173 result.text = create_temporary_file();
174 break;
175
Josh Gao93127482021-05-18 16:14:15 -0700176 case kDebuggerdJavaBacktrace:
Josh Gao76e1e302021-01-26 15:53:11 -0800177 case kDebuggerdTombstone:
178 result.text = create_temporary_file();
179 break;
180
181 default:
182 LOG(ERROR) << "unexpected dump type: " << dump_type;
183 return {};
184 }
185
186 return result;
187 }
188
189 borrowed_fd dir_fd() { return dir_fd_; }
190
191 CrashArtifactPaths get_next_artifact_paths() {
192 CrashArtifactPaths result;
193 result.text = StringPrintf("%s%02d", file_name_prefix_.c_str(), next_artifact_);
194
195 if (supports_proto_) {
196 result.proto = StringPrintf("%s%02d.pb", file_name_prefix_.c_str(), next_artifact_);
197 }
198
Narayan Kamath922f6b22017-05-15 15:59:30 +0100199 next_artifact_ = (next_artifact_ + 1) % max_artifacts_;
Josh Gao76e1e302021-01-26 15:53:11 -0800200 return result;
Narayan Kamath922f6b22017-05-15 15:59:30 +0100201 }
202
Josh Gao76e1e302021-01-26 15:53:11 -0800203 // Consumes crash if it returns true, otherwise leaves it untouched.
204 bool maybe_enqueue_crash(std::unique_ptr<Crash>&& crash) {
Narayan Kamath922f6b22017-05-15 15:59:30 +0100205 if (num_concurrent_dumps_ == max_concurrent_dumps_) {
Josh Gao76e1e302021-01-26 15:53:11 -0800206 queued_requests_.emplace_back(std::move(crash));
Narayan Kamath922f6b22017-05-15 15:59:30 +0100207 return true;
208 }
209
210 return false;
211 }
212
Josh Gao76e1e302021-01-26 15:53:11 -0800213 void maybe_dequeue_crashes(void (*handler)(std::unique_ptr<Crash> crash)) {
Narayan Kamath922f6b22017-05-15 15:59:30 +0100214 while (!queued_requests_.empty() && num_concurrent_dumps_ < max_concurrent_dumps_) {
Josh Gao76e1e302021-01-26 15:53:11 -0800215 std::unique_ptr<Crash> next_crash = std::move(queued_requests_.front());
Narayan Kamath922f6b22017-05-15 15:59:30 +0100216 queued_requests_.pop_front();
Josh Gao76e1e302021-01-26 15:53:11 -0800217 handler(std::move(next_crash));
Narayan Kamath922f6b22017-05-15 15:59:30 +0100218 }
219 }
220
221 void on_crash_started() { ++num_concurrent_dumps_; }
222
223 void on_crash_completed() { --num_concurrent_dumps_; }
224
Narayan Kamath922f6b22017-05-15 15:59:30 +0100225 private:
226 void find_oldest_artifact() {
227 size_t oldest_tombstone = 0;
228 time_t oldest_time = std::numeric_limits<time_t>::max();
229
230 for (size_t i = 0; i < max_artifacts_; ++i) {
Josh Gao76e1e302021-01-26 15:53:11 -0800231 std::string path =
232 StringPrintf("%s/%s%02zu", dir_path_.c_str(), file_name_prefix_.c_str(), i);
Narayan Kamath922f6b22017-05-15 15:59:30 +0100233 struct stat st;
234 if (stat(path.c_str(), &st) != 0) {
235 if (errno == ENOENT) {
236 oldest_tombstone = i;
237 break;
238 } else {
239 PLOG(ERROR) << "failed to stat " << path;
240 continue;
241 }
242 }
243
244 if (st.st_mtime < oldest_time) {
245 oldest_tombstone = i;
246 oldest_time = st.st_mtime;
247 }
248 }
249
250 next_artifact_ = oldest_tombstone;
251 }
252
253 const std::string file_name_prefix_;
254
255 const std::string dir_path_;
256 const int dir_fd_;
257
258 const size_t max_artifacts_;
259 int next_artifact_;
260
261 const size_t max_concurrent_dumps_;
262 size_t num_concurrent_dumps_;
263
Josh Gao76e1e302021-01-26 15:53:11 -0800264 bool supports_proto_;
265
266 std::deque<std::unique_ptr<Crash>> queued_requests_;
Narayan Kamath922f6b22017-05-15 15:59:30 +0100267
Narayan Kamatha73df602017-05-24 15:07:25 +0100268 DISALLOW_COPY_AND_ASSIGN(CrashQueue);
Narayan Kamath922f6b22017-05-15 15:59:30 +0100269};
270
271// Whether java trace dumps are produced via tombstoned.
Narayan Kamathca5e9082017-06-02 15:42:06 +0100272static constexpr bool kJavaTraceDumpsEnabled = true;
Narayan Kamath922f6b22017-05-15 15:59:30 +0100273
Josh Gaocbe70cb2016-10-18 18:17:52 -0700274// Forward declare the callbacks so they can be placed in a sensible order.
Josh Gao76e1e302021-01-26 15:53:11 -0800275static void crash_accept_cb(evconnlistener* listener, evutil_socket_t sockfd, sockaddr*, int,
276 void*);
Josh Gaocbe70cb2016-10-18 18:17:52 -0700277static void crash_request_cb(evutil_socket_t sockfd, short ev, void* arg);
278static void crash_completed_cb(evutil_socket_t sockfd, short ev, void* arg);
279
Josh Gao76e1e302021-01-26 15:53:11 -0800280static void perform_request(std::unique_ptr<Crash> crash) {
Josh Gaocbe70cb2016-10-18 18:17:52 -0700281 unique_fd output_fd;
Christopher Ferrisb92b52c2023-10-16 19:14:28 -0700282 if (intercept_manager->FindIntercept(crash->crash_pid, crash->crash_type, &output_fd)) {
Josh Gao76e1e302021-01-26 15:53:11 -0800283 if (crash->crash_type == kDebuggerdTombstoneProto) {
284 crash->output.proto = CrashArtifact::devnull();
285 }
286 } else {
287 if (auto o = CrashQueue::for_crash(crash.get())->get_output(crash->crash_type); o) {
288 crash->output = std::move(*o);
289 output_fd.reset(dup(crash->output.text.fd));
Josh Gao2b22ae12018-09-12 14:51:03 -0700290 } else {
Josh Gao76e1e302021-01-26 15:53:11 -0800291 LOG(ERROR) << "failed to get crash output for type " << crash->crash_type;
292 return;
Josh Gao2b22ae12018-09-12 14:51:03 -0700293 }
Josh Gaocbe70cb2016-10-18 18:17:52 -0700294 }
295
Josh Gao76e1e302021-01-26 15:53:11 -0800296 TombstonedCrashPacket response = {.packet_type = CrashPacketType::kPerformDump};
297
298 ssize_t rc = -1;
299 if (crash->output.proto) {
300 rc = SendFileDescriptors(crash->crash_socket_fd, &response, sizeof(response), output_fd.get(),
301 crash->output.proto->fd.get());
302 } else {
303 rc = SendFileDescriptors(crash->crash_socket_fd, &response, sizeof(response), output_fd.get());
304 }
305
Josh Gao5f87bbd2019-01-09 17:01:49 -0800306 output_fd.reset();
307
Josh Gaocbe70cb2016-10-18 18:17:52 -0700308 if (rc == -1) {
309 PLOG(WARNING) << "failed to send response to CrashRequest";
Josh Gao76e1e302021-01-26 15:53:11 -0800310 return;
Josh Gaocbe70cb2016-10-18 18:17:52 -0700311 } else if (rc != sizeof(response)) {
312 PLOG(WARNING) << "crash socket write returned short";
Josh Gao76e1e302021-01-26 15:53:11 -0800313 return;
Josh Gaocbe70cb2016-10-18 18:17:52 -0700314 }
Josh Gao13078242017-03-30 14:42:46 -0700315
Josh Gao76e1e302021-01-26 15:53:11 -0800316 // TODO: Make this configurable by the interceptor?
Peter Collingbournefb5eac92021-03-11 12:51:25 -0800317 struct timeval timeout = {10 * android::base::HwTimeoutMultiplier(), 0};
Josh Gao9a61f682020-12-01 21:04:09 -0800318
Josh Gao76e1e302021-01-26 15:53:11 -0800319 event_base* base = event_get_base(crash->crash_event);
320
321 event_assign(crash->crash_event, base, crash->crash_socket_fd, EV_TIMEOUT | EV_READ,
322 crash_completed_cb, crash.get());
323 event_add(crash->crash_event, &timeout);
324 CrashQueue::for_crash(crash)->on_crash_started();
325
326 // The crash is now owned by the event loop.
327 crash.release();
Josh Gaocbe70cb2016-10-18 18:17:52 -0700328}
329
330static void crash_accept_cb(evconnlistener* listener, evutil_socket_t sockfd, sockaddr*, int,
Narayan Kamatha73df602017-05-24 15:07:25 +0100331 void*) {
Josh Gaocbe70cb2016-10-18 18:17:52 -0700332 event_base* base = evconnlistener_get_base(listener);
333 Crash* crash = new Crash();
334
Narayan Kamatha73df602017-05-24 15:07:25 +0100335 // TODO: Make sure that only java crashes come in on the java socket
336 // and only native crashes on the native socket.
Peter Collingbournefb5eac92021-03-11 12:51:25 -0800337 struct timeval timeout = {1 * android::base::HwTimeoutMultiplier(), 0};
Josh Gaocbe70cb2016-10-18 18:17:52 -0700338 event* crash_event = event_new(base, sockfd, EV_TIMEOUT | EV_READ, crash_request_cb, crash);
Josh Gao48383c82018-04-18 18:11:01 -0700339 crash->crash_socket_fd.reset(sockfd);
Josh Gaocbe70cb2016-10-18 18:17:52 -0700340 crash->crash_event = crash_event;
341 event_add(crash_event, &timeout);
342}
343
344static void crash_request_cb(evutil_socket_t sockfd, short ev, void* arg) {
Josh Gao76e1e302021-01-26 15:53:11 -0800345 std::unique_ptr<Crash> crash(static_cast<Crash*>(arg));
Josh Gaocbe70cb2016-10-18 18:17:52 -0700346 TombstonedCrashPacket request = {};
347
348 if ((ev & EV_TIMEOUT) != 0) {
349 LOG(WARNING) << "crash request timed out";
Josh Gao76e1e302021-01-26 15:53:11 -0800350 return;
Josh Gaocbe70cb2016-10-18 18:17:52 -0700351 } else if ((ev & EV_READ) == 0) {
352 LOG(WARNING) << "tombstoned received unexpected event from crash socket";
Josh Gao76e1e302021-01-26 15:53:11 -0800353 return;
Josh Gaocbe70cb2016-10-18 18:17:52 -0700354 }
355
Josh Gao76e1e302021-01-26 15:53:11 -0800356 ssize_t rc = TEMP_FAILURE_RETRY(read(sockfd, &request, sizeof(request)));
Josh Gaocbe70cb2016-10-18 18:17:52 -0700357 if (rc == -1) {
358 PLOG(WARNING) << "failed to read from crash socket";
Josh Gao76e1e302021-01-26 15:53:11 -0800359 return;
Josh Gaocbe70cb2016-10-18 18:17:52 -0700360 } else if (rc != sizeof(request)) {
361 LOG(WARNING) << "crash socket received short read of length " << rc << " (expected "
362 << sizeof(request) << ")";
Josh Gao76e1e302021-01-26 15:53:11 -0800363 return;
Josh Gaocbe70cb2016-10-18 18:17:52 -0700364 }
365
366 if (request.packet_type != CrashPacketType::kDumpRequest) {
367 LOG(WARNING) << "unexpected crash packet type, expected kDumpRequest, received "
368 << StringPrintf("%#2hhX", request.packet_type);
Josh Gao76e1e302021-01-26 15:53:11 -0800369 return;
Josh Gaocbe70cb2016-10-18 18:17:52 -0700370 }
371
Narayan Kamatha73df602017-05-24 15:07:25 +0100372 crash->crash_type = request.packet.dump_request.dump_type;
Josh Gao76e1e302021-01-26 15:53:11 -0800373 if (crash->crash_type < 0 || crash->crash_type > kDebuggerdTombstoneProto) {
Narayan Kamatha73df602017-05-24 15:07:25 +0100374 LOG(WARNING) << "unexpected crash dump type: " << crash->crash_type;
Josh Gao76e1e302021-01-26 15:53:11 -0800375 return;
Narayan Kamatha73df602017-05-24 15:07:25 +0100376 }
377
378 if (crash->crash_type != kDebuggerdJavaBacktrace) {
Narayan Kamath922f6b22017-05-15 15:59:30 +0100379 crash->crash_pid = request.packet.dump_request.pid;
380 } else {
381 // Requests for java traces are sent from untrusted processes, so we
382 // must not trust the PID sent down with the request. Instead, we ask the
383 // kernel.
384 ucred cr = {};
385 socklen_t len = sizeof(cr);
386 int ret = getsockopt(sockfd, SOL_SOCKET, SO_PEERCRED, &cr, &len);
387 if (ret != 0) {
388 PLOG(ERROR) << "Failed to getsockopt(..SO_PEERCRED)";
Josh Gao76e1e302021-01-26 15:53:11 -0800389 return;
Narayan Kamath922f6b22017-05-15 15:59:30 +0100390 }
391
392 crash->crash_pid = cr.pid;
393 }
394
Josh Gao76e1e302021-01-26 15:53:11 -0800395 pid_t crash_pid = crash->crash_pid;
396 LOG(INFO) << "received crash request for pid " << crash_pid;
Josh Gaocbe70cb2016-10-18 18:17:52 -0700397
Josh Gao76e1e302021-01-26 15:53:11 -0800398 if (CrashQueue::for_crash(crash)->maybe_enqueue_crash(std::move(crash))) {
399 LOG(INFO) << "enqueueing crash request for pid " << crash_pid;
Josh Gaocbe70cb2016-10-18 18:17:52 -0700400 } else {
Josh Gao76e1e302021-01-26 15:53:11 -0800401 perform_request(std::move(crash));
Josh Gaocbe70cb2016-10-18 18:17:52 -0700402 }
Josh Gaocbe70cb2016-10-18 18:17:52 -0700403}
404
Peter Collingbourne1e1d9202021-02-05 16:38:35 -0800405static bool rename_tombstone_fd(borrowed_fd fd, borrowed_fd dirfd, const std::string& path) {
406 // Always try to unlink the tombstone file.
407 // linkat doesn't let us replace a file, so we need to unlink before linking
408 // our results onto disk, and if we fail for some reason, we should delete
409 // stale tombstones to avoid confusing inconsistency.
410 int rc = unlinkat(dirfd.get(), path.c_str(), 0);
411 if (rc != 0 && errno != ENOENT) {
412 PLOG(ERROR) << "failed to unlink tombstone at " << path;
413 return false;
414 }
Josh Gaocbe70cb2016-10-18 18:17:52 -0700415
Florian Mayer23e92892024-02-23 22:16:01 +0000416 // This fd is created inside of dirfd in CrashQueue::create_temporary_file.
Peter Collingbourne1e1d9202021-02-05 16:38:35 -0800417 std::string fd_path = StringPrintf("/proc/self/fd/%d", fd.get());
418 rc = linkat(AT_FDCWD, fd_path.c_str(), dirfd.get(), path.c_str(), AT_SYMLINK_FOLLOW);
Josh Gao76e1e302021-01-26 15:53:11 -0800419 if (rc != 0) {
Peter Collingbourne1e1d9202021-02-05 16:38:35 -0800420 PLOG(ERROR) << "failed to link tombstone at " << path;
Josh Gao76e1e302021-01-26 15:53:11 -0800421 return false;
Jerome Gaillarde156ede2021-01-26 12:36:12 +0000422 }
Josh Gao76e1e302021-01-26 15:53:11 -0800423 return true;
424}
Jerome Gaillarde156ede2021-01-26 12:36:12 +0000425
Josh Gao76e1e302021-01-26 15:53:11 -0800426static void crash_completed(borrowed_fd sockfd, std::unique_ptr<Crash> crash) {
427 TombstonedCrashPacket request = {};
428 CrashQueue* queue = CrashQueue::for_crash(crash);
429
430 ssize_t rc = TEMP_FAILURE_RETRY(read(sockfd.get(), &request, sizeof(request)));
Josh Gaocbe70cb2016-10-18 18:17:52 -0700431 if (rc == -1) {
432 PLOG(WARNING) << "failed to read from crash socket";
Josh Gao76e1e302021-01-26 15:53:11 -0800433 return;
Josh Gaocbe70cb2016-10-18 18:17:52 -0700434 } else if (rc != sizeof(request)) {
435 LOG(WARNING) << "crash socket received short read of length " << rc << " (expected "
436 << sizeof(request) << ")";
Josh Gao76e1e302021-01-26 15:53:11 -0800437 return;
Josh Gaocbe70cb2016-10-18 18:17:52 -0700438 }
439
440 if (request.packet_type != CrashPacketType::kCompletedDump) {
441 LOG(WARNING) << "unexpected crash packet type, expected kCompletedDump, received "
442 << uint32_t(request.packet_type);
Josh Gao76e1e302021-01-26 15:53:11 -0800443 return;
Josh Gaocbe70cb2016-10-18 18:17:52 -0700444 }
445
Christopher Ferrisab9f0cd2021-09-01 13:36:03 -0700446 if (crash->output.text.fd == -1) {
447 LOG(WARNING) << "skipping tombstone file creation due to intercept";
Josh Gao76e1e302021-01-26 15:53:11 -0800448 return;
449 }
Josh Gaof5974ae2018-05-03 16:05:32 -0700450
Josh Gao76e1e302021-01-26 15:53:11 -0800451 CrashArtifactPaths paths = queue->get_next_artifact_paths();
Josh Gao48383c82018-04-18 18:11:01 -0700452
Peter Collingbourne1e1d9202021-02-05 16:38:35 -0800453 if (rename_tombstone_fd(crash->output.text.fd, queue->dir_fd(), paths.text)) {
454 if (crash->crash_type == kDebuggerdJavaBacktrace) {
455 LOG(ERROR) << "Traces for pid " << crash->crash_pid << " written to: " << paths.text;
Narayan Kamath79dd1432017-06-21 19:42:00 +0100456 } else {
Peter Collingbourne1e1d9202021-02-05 16:38:35 -0800457 // NOTE: Several tools parse this log message to figure out where the
458 // tombstone associated with a given native crash was written. Any changes
459 // to this message must be carefully considered.
460 LOG(ERROR) << "Tombstone written to: " << paths.text;
Josh Gaof5974ae2018-05-03 16:05:32 -0700461 }
Josh Gaocb68a032017-06-02 13:02:10 -0700462 }
463
Josh Gao76e1e302021-01-26 15:53:11 -0800464 if (crash->output.proto && crash->output.proto->fd != -1) {
465 if (!paths.proto) {
466 LOG(ERROR) << "missing path for proto tombstone";
Peter Collingbourne1e1d9202021-02-05 16:38:35 -0800467 } else {
468 rename_tombstone_fd(crash->output.proto->fd, queue->dir_fd(), *paths.proto);
Josh Gao76e1e302021-01-26 15:53:11 -0800469 }
470 }
Josh Gao76e1e302021-01-26 15:53:11 -0800471}
472
473static void crash_completed_cb(evutil_socket_t sockfd, short ev, void* arg) {
474 std::unique_ptr<Crash> crash(static_cast<Crash*>(arg));
Elliott Hughes35bb6d22017-06-26 13:54:05 -0700475 CrashQueue* queue = CrashQueue::for_crash(crash);
Josh Gao76e1e302021-01-26 15:53:11 -0800476
477 queue->on_crash_completed();
478
479 if ((ev & EV_READ) == EV_READ) {
480 crash_completed(sockfd, std::move(crash));
481 }
Josh Gaocbe70cb2016-10-18 18:17:52 -0700482
483 // If there's something queued up, let them proceed.
Narayan Kamatha73df602017-05-24 15:07:25 +0100484 queue->maybe_dequeue_crashes(perform_request);
Josh Gaocbe70cb2016-10-18 18:17:52 -0700485}
486
487int main(int, char* []) {
Josh Gao88846a22021-02-01 16:48:25 -0800488 umask(0117);
Josh Gao8830c952017-03-06 12:23:55 -0800489
Josh Gao55f79a52017-03-06 12:24:07 -0800490 // Don't try to connect to ourselves if we crash.
491 struct sigaction action = {};
492 action.sa_handler = [](int signal) {
493 LOG(ERROR) << "received fatal signal " << signal;
494 _exit(1);
495 };
496 debuggerd_register_handlers(&action);
497
Josh Gaocbe70cb2016-10-18 18:17:52 -0700498 int intercept_socket = android_get_control_socket(kTombstonedInterceptSocketName);
499 int crash_socket = android_get_control_socket(kTombstonedCrashSocketName);
500
501 if (intercept_socket == -1 || crash_socket == -1) {
502 PLOG(FATAL) << "failed to get socket from init";
503 }
504
505 evutil_make_socket_nonblocking(intercept_socket);
506 evutil_make_socket_nonblocking(crash_socket);
507
508 event_base* base = event_base_new();
509 if (!base) {
510 LOG(FATAL) << "failed to create event_base";
511 }
512
513 intercept_manager = new InterceptManager(base, intercept_socket);
514
Narayan Kamathc2e98f62017-09-13 13:12:34 +0100515 evconnlistener* tombstone_listener =
516 evconnlistener_new(base, crash_accept_cb, CrashQueue::for_tombstones(), LEV_OPT_CLOSE_ON_FREE,
517 -1 /* backlog */, crash_socket);
Narayan Kamath922f6b22017-05-15 15:59:30 +0100518 if (!tombstone_listener) {
519 LOG(FATAL) << "failed to create evconnlistener for tombstones.";
520 }
521
522 if (kJavaTraceDumpsEnabled) {
523 const int java_trace_socket = android_get_control_socket(kTombstonedJavaTraceSocketName);
524 if (java_trace_socket == -1) {
525 PLOG(FATAL) << "failed to get socket from init";
526 }
527
528 evutil_make_socket_nonblocking(java_trace_socket);
Narayan Kamathc2e98f62017-09-13 13:12:34 +0100529 evconnlistener* java_trace_listener =
530 evconnlistener_new(base, crash_accept_cb, CrashQueue::for_anrs(), LEV_OPT_CLOSE_ON_FREE,
531 -1 /* backlog */, java_trace_socket);
Narayan Kamath922f6b22017-05-15 15:59:30 +0100532 if (!java_trace_listener) {
533 LOG(FATAL) << "failed to create evconnlistener for java traces.";
534 }
Josh Gaocbe70cb2016-10-18 18:17:52 -0700535 }
536
537 LOG(INFO) << "tombstoned successfully initialized";
538 event_base_dispatch(base);
539}