blob: ecd98a4c56ca93dc2b65474c9a64d439c3577f90 [file] [log] [blame]
Christopher Ferris20303f82014-01-10 16:33:16 -08001/*
2 * Copyright 2008, The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080016
Brigid Smith62ba4892014-06-10 11:53:08 -070017#define LOG_TAG "DEBUG"
18
Josh Gaoc3706662017-08-29 13:08:32 -070019#include "libdebuggerd/utility.h"
Pavel Chupinc6c194c2013-11-21 23:17:20 +040020
Jeff Brown053b8652012-06-06 16:25:03 -070021#include <errno.h>
Jeff Brown053b8652012-06-06 16:25:03 -070022#include <signal.h>
Pavel Chupinc6c194c2013-11-21 23:17:20 +040023#include <string.h>
Josh Gao2b2ae0c2017-08-21 14:31:17 -070024#include <sys/capability.h>
25#include <sys/prctl.h>
Jeff Brown13e715b2011-10-21 12:14:56 -070026#include <sys/ptrace.h>
Josh Gaobf2dd482017-03-28 13:07:15 -070027#include <sys/uio.h>
Jeff Brown053b8652012-06-06 16:25:03 -070028#include <sys/wait.h>
Mark Salyzynff2dcd92016-09-28 15:54:45 -070029#include <unistd.h>
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080030
Christopher Ferrisc95047d2022-03-14 15:02:11 -070031#include <set>
Christopher Ferris99235e92016-05-03 16:32:13 -070032#include <string>
33
Josh Gaobf2dd482017-03-28 13:07:15 -070034#include <android-base/properties.h>
Elliott Hughes4f713192015-12-04 22:00:26 -080035#include <android-base/stringprintf.h>
Josh Gaobf2dd482017-03-28 13:07:15 -070036#include <android-base/strings.h>
Josh Gao57f58f82017-03-15 23:23:22 -070037#include <android-base/unique_fd.h>
Josh Gao618cea32021-01-26 17:45:43 -080038#include <async_safe/log.h>
Josh Gaoa48b41b2019-12-13 14:11:04 -080039#include <bionic/reserved_signals.h>
Josh Gao2b2ae0c2017-08-21 14:31:17 -070040#include <debuggerd/handler.h>
Mark Salyzyncfd5b082016-10-17 14:28:00 -070041#include <log/log.h>
Josh Gao2b2ae0c2017-08-21 14:31:17 -070042#include <unwindstack/Memory.h>
Christopher Ferris4ae266c2019-04-03 09:27:12 -070043#include <unwindstack/Unwinder.h>
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080044
Peter Collingbourne47d784e2021-11-05 18:40:52 -070045using android::base::StringPrintf;
Josh Gaobf2dd482017-03-28 13:07:15 -070046using android::base::unique_fd;
47
Brigid Smith62ba4892014-06-10 11:53:08 -070048bool is_allowed_in_logcat(enum logtype ltype) {
Christopher Ferrisb36b5922015-06-17 18:35:59 -070049 if ((ltype == HEADER)
Brigid Smith62ba4892014-06-10 11:53:08 -070050 || (ltype == REGISTERS)
51 || (ltype == BACKTRACE)) {
52 return true;
53 }
54 return false;
55}
56
Josh Gaobf2dd482017-03-28 13:07:15 -070057static bool should_write_to_kmsg() {
58 // Write to kmsg if tombstoned isn't up, and we're able to do so.
59 if (!android::base::GetBoolProperty("ro.debuggable", false)) {
60 return false;
61 }
62
63 if (android::base::GetProperty("init.svc.tombstoned", "") == "running") {
64 return false;
65 }
66
67 return true;
68}
69
Chenjie Luo97258aa2017-03-06 12:12:07 -080070__attribute__((__weak__, visibility("default")))
Brigid Smith62ba4892014-06-10 11:53:08 -070071void _LOG(log_t* log, enum logtype ltype, const char* fmt, ...) {
Mitch Phillipsaadebd82019-11-18 15:17:18 -080072 va_list ap;
73 va_start(ap, fmt);
74 _VLOG(log, ltype, fmt, ap);
75 va_end(ap);
76}
77
78__attribute__((__weak__, visibility("default")))
79void _VLOG(log_t* log, enum logtype ltype, const char* fmt, va_list ap) {
Brigid Smith50eb5462014-06-18 14:17:57 -070080 bool write_to_tombstone = (log->tfd != -1);
81 bool write_to_logcat = is_allowed_in_logcat(ltype)
Brigid Smithc75a02f2014-07-17 14:52:33 -070082 && log->crashed_tid != -1
83 && log->current_tid != -1
Brigid Smith50eb5462014-06-18 14:17:57 -070084 && (log->crashed_tid == log->current_tid);
Josh Gaobf2dd482017-03-28 13:07:15 -070085 static bool write_to_kmsg = should_write_to_kmsg();
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080086
Josh Gao1cc7bd82018-02-13 13:16:17 -080087 std::string msg;
Josh Gao1cc7bd82018-02-13 13:16:17 -080088 android::base::StringAppendV(&msg, fmt, ap);
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -080089
Josh Gao1cc7bd82018-02-13 13:16:17 -080090 if (msg.empty()) return;
Christopher Ferris20303f82014-01-10 16:33:16 -080091
Brigid Smith62ba4892014-06-10 11:53:08 -070092 if (write_to_tombstone) {
Josh Gao1cc7bd82018-02-13 13:16:17 -080093 TEMP_FAILURE_RETRY(write(log->tfd, msg.c_str(), msg.size()));
Christopher Ferris20303f82014-01-10 16:33:16 -080094 }
95
Brigid Smith62ba4892014-06-10 11:53:08 -070096 if (write_to_logcat) {
Josh Gao1cc7bd82018-02-13 13:16:17 -080097 __android_log_buf_write(LOG_ID_CRASH, ANDROID_LOG_FATAL, LOG_TAG, msg.c_str());
Christopher Ferris99235e92016-05-03 16:32:13 -070098 if (log->amfd_data != nullptr) {
Josh Gao1cc7bd82018-02-13 13:16:17 -080099 *log->amfd_data += msg;
Christopher Tateded2e5a2013-03-19 13:12:23 -0700100 }
Josh Gaobf2dd482017-03-28 13:07:15 -0700101
102 if (write_to_kmsg) {
103 unique_fd kmsg_fd(open("/dev/kmsg_debug", O_WRONLY | O_APPEND | O_CLOEXEC));
104 if (kmsg_fd.get() >= 0) {
105 // Our output might contain newlines which would otherwise be handled by the android logger.
106 // Split the lines up ourselves before sending to the kernel logger.
Josh Gao1cc7bd82018-02-13 13:16:17 -0800107 if (msg.back() == '\n') {
108 msg.back() = '\0';
Josh Gaobf2dd482017-03-28 13:07:15 -0700109 }
110
Josh Gao1cc7bd82018-02-13 13:16:17 -0800111 std::vector<std::string> fragments = android::base::Split(msg, "\n");
Josh Gaobf2dd482017-03-28 13:07:15 -0700112 for (const std::string& fragment : fragments) {
113 static constexpr char prefix[] = "<3>DEBUG: ";
114 struct iovec iov[3];
115 iov[0].iov_base = const_cast<char*>(prefix);
116 iov[0].iov_len = strlen(prefix);
117 iov[1].iov_base = const_cast<char*>(fragment.c_str());
118 iov[1].iov_len = fragment.length();
119 iov[2].iov_base = const_cast<char*>("\n");
120 iov[2].iov_len = 1;
121 TEMP_FAILURE_RETRY(writev(kmsg_fd.get(), iov, 3));
122 }
123 }
124 }
Christopher Ferris20303f82014-01-10 16:33:16 -0800125 }
The Android Open Source Projectdd7bc332009-03-03 19:32:55 -0800126}
127
Christopher Ferrise8bc77e2015-05-22 14:26:13 -0700128#define MEMORY_BYTES_TO_DUMP 256
129#define MEMORY_BYTES_PER_LINE 16
Peter Collingbourne1a1f7d72021-03-08 16:53:54 -0800130static_assert(MEMORY_BYTES_PER_LINE == kTagGranuleSize);
Kévin PETIT4bb47722013-12-18 16:44:24 +0000131
Peter Collingbourne1a1f7d72021-03-08 16:53:54 -0800132ssize_t dump_memory(void* out, size_t len, uint8_t* tags, size_t tags_len, uint64_t* addr,
Josh Gao76e1e302021-01-26 15:53:11 -0800133 unwindstack::Memory* memory) {
Peter Collingbournefe8997a2020-07-20 15:08:52 -0700134 // Align the address to the number of bytes per line to avoid confusing memory tag output if
135 // memory is tagged and we start from a misaligned address. Start 32 bytes before the address.
Josh Gao76e1e302021-01-26 15:53:11 -0800136 *addr &= ~(MEMORY_BYTES_PER_LINE - 1);
137 if (*addr >= 4128) {
138 *addr -= 32;
Christopher Ferrise8bc77e2015-05-22 14:26:13 -0700139 }
Kévin PETIT4bb47722013-12-18 16:44:24 +0000140
Peter Collingbourneb1fcedb2020-07-21 16:29:02 -0700141 // We don't want the address tag to appear in the addresses in the memory dump.
Josh Gao76e1e302021-01-26 15:53:11 -0800142 *addr = untag_address(*addr);
Peter Collingbourne10e428d2020-07-17 14:49:31 -0700143
Peter Collingbourneb1fcedb2020-07-21 16:29:02 -0700144 // Don't bother if the address would overflow, taking tag bits into account. Note that
145 // untag_address truncates to 32 bits on 32-bit platforms as a side effect of returning a
146 // uintptr_t, so this also checks for 32-bit overflow.
Josh Gao76e1e302021-01-26 15:53:11 -0800147 if (untag_address(*addr + MEMORY_BYTES_TO_DUMP - 1) < *addr) {
148 return -1;
Christopher Ferrise8bc77e2015-05-22 14:26:13 -0700149 }
Kévin PETIT4bb47722013-12-18 16:44:24 +0000150
Josh Gao76e1e302021-01-26 15:53:11 -0800151 memset(out, 0, len);
152
153 size_t bytes = memory->Read(*addr, reinterpret_cast<uint8_t*>(out), len);
Christopher Ferrise8bc77e2015-05-22 14:26:13 -0700154 if (bytes % sizeof(uintptr_t) != 0) {
155 // This should never happen, but just in case.
156 ALOGE("Bytes read %zu, is not a multiple of %zu", bytes, sizeof(uintptr_t));
157 bytes &= ~(sizeof(uintptr_t) - 1);
158 }
159
Christopher Ferris456abba2015-07-09 15:35:47 -0700160 bool skip_2nd_read = false;
161 if (bytes == 0) {
162 // In this case, we might want to try another read at the beginning of
163 // the next page only if it's within the amount of memory we would have
164 // read.
165 size_t page_size = sysconf(_SC_PAGE_SIZE);
Peter Collingbourne1a1f7d72021-03-08 16:53:54 -0800166 uint64_t next_page = (*addr + (page_size - 1)) & ~(page_size - 1);
167 if (next_page == *addr || next_page >= *addr + len) {
Christopher Ferris456abba2015-07-09 15:35:47 -0700168 skip_2nd_read = true;
169 }
Peter Collingbourne1a1f7d72021-03-08 16:53:54 -0800170 *addr = next_page;
Christopher Ferris456abba2015-07-09 15:35:47 -0700171 }
172
Josh Gao76e1e302021-01-26 15:53:11 -0800173 if (bytes < len && !skip_2nd_read) {
Christopher Ferris456abba2015-07-09 15:35:47 -0700174 // Try to do one more read. This could happen if a read crosses a map,
175 // but the maps do not have any break between them. Or it could happen
176 // if reading from an unreadable map, but the read would cross back
177 // into a readable map. Only requires one extra read because a map has
178 // to contain at least one page, and the total number of bytes to dump
179 // is smaller than a page.
Peter Collingbourne1a1f7d72021-03-08 16:53:54 -0800180 size_t bytes2 = memory->Read(*addr + bytes, static_cast<uint8_t*>(out) + bytes, len - bytes);
Christopher Ferrise8bc77e2015-05-22 14:26:13 -0700181 bytes += bytes2;
182 if (bytes2 > 0 && bytes % sizeof(uintptr_t) != 0) {
183 // This should never happen, but we'll try and continue any way.
184 ALOGE("Bytes after second read %zu, is not a multiple of %zu", bytes, sizeof(uintptr_t));
185 bytes &= ~(sizeof(uintptr_t) - 1);
Kévin PETIT4bb47722013-12-18 16:44:24 +0000186 }
Christopher Ferrise8bc77e2015-05-22 14:26:13 -0700187 }
188
Peter Collingbourneb1fcedb2020-07-21 16:29:02 -0700189 // If we were unable to read anything, it probably means that the register doesn't contain a
Josh Gao76e1e302021-01-26 15:53:11 -0800190 // valid pointer.
Peter Collingbourneb1fcedb2020-07-21 16:29:02 -0700191 if (bytes == 0) {
Josh Gao76e1e302021-01-26 15:53:11 -0800192 return -1;
193 }
194
Peter Collingbourne1a1f7d72021-03-08 16:53:54 -0800195 for (uint64_t tag_granule = 0; tag_granule < bytes / kTagGranuleSize; ++tag_granule) {
196 long tag = memory->ReadTag(*addr + kTagGranuleSize * tag_granule);
197 if (tag_granule < tags_len) {
198 tags[tag_granule] = tag >= 0 ? tag : 0;
199 } else {
200 ALOGE("Insufficient space for tags");
201 }
202 }
203
Josh Gao76e1e302021-01-26 15:53:11 -0800204 return bytes;
205}
206
207void dump_memory(log_t* log, unwindstack::Memory* memory, uint64_t addr, const std::string& label) {
208 // Dump 256 bytes
209 uintptr_t data[MEMORY_BYTES_TO_DUMP / sizeof(uintptr_t)];
Peter Collingbourne1a1f7d72021-03-08 16:53:54 -0800210 uint8_t tags[MEMORY_BYTES_TO_DUMP / kTagGranuleSize];
Josh Gao76e1e302021-01-26 15:53:11 -0800211
Peter Collingbourne1a1f7d72021-03-08 16:53:54 -0800212 ssize_t bytes = dump_memory(data, sizeof(data), tags, sizeof(tags), &addr, memory);
Josh Gao76e1e302021-01-26 15:53:11 -0800213 if (bytes == -1) {
Peter Collingbourneb1fcedb2020-07-21 16:29:02 -0700214 return;
215 }
216
217 _LOG(log, logtype::MEMORY, "\n%s:\n", label.c_str());
218
Christopher Ferrise8bc77e2015-05-22 14:26:13 -0700219 // Dump the code around memory as:
220 // addr contents ascii
221 // 0000000000008d34 ef000000e8bd0090 e1b00000512fff1e ............../Q
222 // 0000000000008d44 ea00b1f9e92d0090 e3a070fcef000000 ......-..p......
223 // On 32-bit machines, there are still 16 bytes per line but addresses and
224 // words are of course presented differently.
225 uintptr_t* data_ptr = data;
Peter Collingbourne1a1f7d72021-03-08 16:53:54 -0800226 uint8_t* tags_ptr = tags;
227 for (size_t line = 0; line < static_cast<size_t>(bytes) / MEMORY_BYTES_PER_LINE; line++) {
228 uint64_t tagged_addr = addr | static_cast<uint64_t>(*tags_ptr++) << 56;
Christopher Ferrise8bc77e2015-05-22 14:26:13 -0700229 std::string logline;
Peter Collingbournefe8997a2020-07-20 15:08:52 -0700230 android::base::StringAppendF(&logline, " %" PRIPTR, tagged_addr);
Christopher Ferrise8bc77e2015-05-22 14:26:13 -0700231
232 addr += MEMORY_BYTES_PER_LINE;
233 std::string ascii;
Christopher Ferris456abba2015-07-09 15:35:47 -0700234 for (size_t i = 0; i < MEMORY_BYTES_PER_LINE / sizeof(uintptr_t); i++) {
Peter Collingbourne1a1f7d72021-03-08 16:53:54 -0800235 android::base::StringAppendF(&logline, " %" PRIPTR, static_cast<uint64_t>(*data_ptr));
Christopher Ferrise8bc77e2015-05-22 14:26:13 -0700236
Peter Collingbourne1a1f7d72021-03-08 16:53:54 -0800237 // Fill out the ascii string from the data.
238 uint8_t* ptr = reinterpret_cast<uint8_t*>(data_ptr);
239 for (size_t val = 0; val < sizeof(uintptr_t); val++, ptr++) {
240 if (*ptr >= 0x20 && *ptr < 0x7f) {
241 ascii += *ptr;
242 } else {
243 ascii += '.';
Christopher Ferrise8bc77e2015-05-22 14:26:13 -0700244 }
Christopher Ferrise8bc77e2015-05-22 14:26:13 -0700245 }
Peter Collingbourne1a1f7d72021-03-08 16:53:54 -0800246 data_ptr++;
Christopher Ferrise8bc77e2015-05-22 14:26:13 -0700247 }
248 _LOG(log, logtype::MEMORY, "%s %s\n", logline.c_str(), ascii.c_str());
249 }
Kévin PETIT4bb47722013-12-18 16:44:24 +0000250}
Josh Gao57f58f82017-03-15 23:23:22 -0700251
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700252void drop_capabilities() {
253 __user_cap_header_struct capheader;
254 memset(&capheader, 0, sizeof(capheader));
255 capheader.version = _LINUX_CAPABILITY_VERSION_3;
256 capheader.pid = 0;
257
258 __user_cap_data_struct capdata[2];
259 memset(&capdata, 0, sizeof(capdata));
260
261 if (capset(&capheader, &capdata[0]) == -1) {
Josh Gao618cea32021-01-26 17:45:43 -0800262 async_safe_fatal("failed to drop capabilities: %s", strerror(errno));
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700263 }
264
265 if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0) != 0) {
Josh Gao618cea32021-01-26 17:45:43 -0800266 async_safe_fatal("failed to set PR_SET_NO_NEW_PRIVS: %s", strerror(errno));
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700267 }
268}
269
Elliott Hughes70d8f282018-04-25 17:00:14 -0700270bool signal_has_si_addr(const siginfo_t* si) {
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700271 // Manually sent signals won't have si_addr.
Elliott Hughes70d8f282018-04-25 17:00:14 -0700272 if (si->si_code == SI_USER || si->si_code == SI_QUEUE || si->si_code == SI_TKILL) {
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700273 return false;
274 }
275
Elliott Hughes70d8f282018-04-25 17:00:14 -0700276 switch (si->si_signo) {
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700277 case SIGBUS:
278 case SIGFPE:
279 case SIGILL:
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700280 case SIGTRAP:
281 return true;
Peter Collingbourne773acaa2021-11-10 16:29:23 -0800282 case SIGSEGV:
283 return si->si_code != SEGV_MTEAERR;
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700284 default:
285 return false;
286 }
287}
288
Elliott Hughes70d8f282018-04-25 17:00:14 -0700289bool signal_has_sender(const siginfo_t* si, pid_t caller_pid) {
290 return SI_FROMUSER(si) && (si->si_pid != 0) && (si->si_pid != caller_pid);
291}
292
293void get_signal_sender(char* buf, size_t n, const siginfo_t* si) {
294 snprintf(buf, n, " from pid %d, uid %d", si->si_pid, si->si_uid);
295}
296
297const char* get_signame(const siginfo_t* si) {
298 switch (si->si_signo) {
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700299 case SIGABRT: return "SIGABRT";
300 case SIGBUS: return "SIGBUS";
301 case SIGFPE: return "SIGFPE";
302 case SIGILL: return "SIGILL";
303 case SIGSEGV: return "SIGSEGV";
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700304 case SIGSTKFLT: return "SIGSTKFLT";
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700305 case SIGSTOP: return "SIGSTOP";
306 case SIGSYS: return "SIGSYS";
307 case SIGTRAP: return "SIGTRAP";
Josh Gaoa48b41b2019-12-13 14:11:04 -0800308 case BIONIC_SIGNAL_DEBUGGER:
309 return "<debuggerd signal>";
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700310 default: return "?";
311 }
312}
313
Elliott Hughes70d8f282018-04-25 17:00:14 -0700314const char* get_sigcode(const siginfo_t* si) {
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700315 // Try the signal-specific codes...
Elliott Hughes70d8f282018-04-25 17:00:14 -0700316 switch (si->si_signo) {
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700317 case SIGILL:
Elliott Hughes70d8f282018-04-25 17:00:14 -0700318 switch (si->si_code) {
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700319 case ILL_ILLOPC: return "ILL_ILLOPC";
320 case ILL_ILLOPN: return "ILL_ILLOPN";
321 case ILL_ILLADR: return "ILL_ILLADR";
322 case ILL_ILLTRP: return "ILL_ILLTRP";
323 case ILL_PRVOPC: return "ILL_PRVOPC";
324 case ILL_PRVREG: return "ILL_PRVREG";
325 case ILL_COPROC: return "ILL_COPROC";
326 case ILL_BADSTK: return "ILL_BADSTK";
Christopher Ferris432791e2018-06-27 15:06:01 -0700327 case ILL_BADIADDR:
328 return "ILL_BADIADDR";
329 case __ILL_BREAK:
330 return "ILL_BREAK";
331 case __ILL_BNDMOD:
332 return "ILL_BNDMOD";
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700333 }
Christopher Ferris432791e2018-06-27 15:06:01 -0700334 static_assert(NSIGILL == __ILL_BNDMOD, "missing ILL_* si_code");
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700335 break;
336 case SIGBUS:
Elliott Hughes70d8f282018-04-25 17:00:14 -0700337 switch (si->si_code) {
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700338 case BUS_ADRALN: return "BUS_ADRALN";
339 case BUS_ADRERR: return "BUS_ADRERR";
340 case BUS_OBJERR: return "BUS_OBJERR";
341 case BUS_MCEERR_AR: return "BUS_MCEERR_AR";
342 case BUS_MCEERR_AO: return "BUS_MCEERR_AO";
343 }
344 static_assert(NSIGBUS == BUS_MCEERR_AO, "missing BUS_* si_code");
345 break;
346 case SIGFPE:
Elliott Hughes70d8f282018-04-25 17:00:14 -0700347 switch (si->si_code) {
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700348 case FPE_INTDIV: return "FPE_INTDIV";
349 case FPE_INTOVF: return "FPE_INTOVF";
350 case FPE_FLTDIV: return "FPE_FLTDIV";
351 case FPE_FLTOVF: return "FPE_FLTOVF";
352 case FPE_FLTUND: return "FPE_FLTUND";
353 case FPE_FLTRES: return "FPE_FLTRES";
354 case FPE_FLTINV: return "FPE_FLTINV";
355 case FPE_FLTSUB: return "FPE_FLTSUB";
Christopher Ferris432791e2018-06-27 15:06:01 -0700356 case __FPE_DECOVF:
357 return "FPE_DECOVF";
358 case __FPE_DECDIV:
359 return "FPE_DECDIV";
360 case __FPE_DECERR:
361 return "FPE_DECERR";
362 case __FPE_INVASC:
363 return "FPE_INVASC";
364 case __FPE_INVDEC:
365 return "FPE_INVDEC";
366 case FPE_FLTUNK:
367 return "FPE_FLTUNK";
368 case FPE_CONDTRAP:
369 return "FPE_CONDTRAP";
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700370 }
Christopher Ferris432791e2018-06-27 15:06:01 -0700371 static_assert(NSIGFPE == FPE_CONDTRAP, "missing FPE_* si_code");
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700372 break;
373 case SIGSEGV:
Elliott Hughes70d8f282018-04-25 17:00:14 -0700374 switch (si->si_code) {
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700375 case SEGV_MAPERR: return "SEGV_MAPERR";
376 case SEGV_ACCERR: return "SEGV_ACCERR";
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700377 case SEGV_BNDERR: return "SEGV_BNDERR";
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700378 case SEGV_PKUERR: return "SEGV_PKUERR";
Christopher Ferris432791e2018-06-27 15:06:01 -0700379 case SEGV_ACCADI:
380 return "SEGV_ACCADI";
381 case SEGV_ADIDERR:
382 return "SEGV_ADIDERR";
383 case SEGV_ADIPERR:
384 return "SEGV_ADIPERR";
Peter Collingbournef8622522020-04-07 14:07:32 -0700385 case SEGV_MTEAERR:
386 return "SEGV_MTEAERR";
387 case SEGV_MTESERR:
388 return "SEGV_MTESERR";
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700389 }
Christopher Ferris6ddc2c52020-12-14 20:53:52 -0800390 static_assert(NSIGSEGV == SEGV_MTESERR, "missing SEGV_* si_code");
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700391 break;
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700392 case SIGSYS:
Elliott Hughes70d8f282018-04-25 17:00:14 -0700393 switch (si->si_code) {
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700394 case SYS_SECCOMP: return "SYS_SECCOMP";
Christopher Ferris95b026f2021-02-18 11:44:10 -0800395 case SYS_USER_DISPATCH:
396 return "SYS_USER_DISPATCH";
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700397 }
Christopher Ferris95b026f2021-02-18 11:44:10 -0800398 static_assert(NSIGSYS == SYS_USER_DISPATCH, "missing SYS_* si_code");
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700399 break;
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700400 case SIGTRAP:
Elliott Hughes70d8f282018-04-25 17:00:14 -0700401 switch (si->si_code) {
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700402 case TRAP_BRKPT: return "TRAP_BRKPT";
403 case TRAP_TRACE: return "TRAP_TRACE";
404 case TRAP_BRANCH: return "TRAP_BRANCH";
405 case TRAP_HWBKPT: return "TRAP_HWBKPT";
Christopher Ferris461baeb2018-10-26 11:22:40 -0700406 case TRAP_UNK:
407 return "TRAP_UNDIAGNOSED";
Christopher Ferrisc31ccb42021-07-01 01:43:21 +0000408 case TRAP_PERF:
409 return "TRAP_PERF";
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700410 }
Elliott Hughes70d8f282018-04-25 17:00:14 -0700411 if ((si->si_code & 0xff) == SIGTRAP) {
412 switch ((si->si_code >> 8) & 0xff) {
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700413 case PTRACE_EVENT_FORK:
414 return "PTRACE_EVENT_FORK";
415 case PTRACE_EVENT_VFORK:
416 return "PTRACE_EVENT_VFORK";
417 case PTRACE_EVENT_CLONE:
418 return "PTRACE_EVENT_CLONE";
419 case PTRACE_EVENT_EXEC:
420 return "PTRACE_EVENT_EXEC";
421 case PTRACE_EVENT_VFORK_DONE:
422 return "PTRACE_EVENT_VFORK_DONE";
423 case PTRACE_EVENT_EXIT:
424 return "PTRACE_EVENT_EXIT";
425 case PTRACE_EVENT_SECCOMP:
426 return "PTRACE_EVENT_SECCOMP";
427 case PTRACE_EVENT_STOP:
428 return "PTRACE_EVENT_STOP";
429 }
430 }
Christopher Ferrisc31ccb42021-07-01 01:43:21 +0000431 static_assert(NSIGTRAP == TRAP_PERF, "missing TRAP_* si_code");
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700432 break;
433 }
434 // Then the other codes...
Elliott Hughes70d8f282018-04-25 17:00:14 -0700435 switch (si->si_code) {
Josh Gao2b2ae0c2017-08-21 14:31:17 -0700436 case SI_USER: return "SI_USER";
437 case SI_KERNEL: return "SI_KERNEL";
438 case SI_QUEUE: return "SI_QUEUE";
439 case SI_TIMER: return "SI_TIMER";
440 case SI_MESGQ: return "SI_MESGQ";
441 case SI_ASYNCIO: return "SI_ASYNCIO";
442 case SI_SIGIO: return "SI_SIGIO";
443 case SI_TKILL: return "SI_TKILL";
444 case SI_DETHREAD: return "SI_DETHREAD";
445 }
446 // Then give up...
447 return "?";
448}
Christopher Ferris4ae266c2019-04-03 09:27:12 -0700449
Elliott Hughesd13ea522022-01-13 09:20:26 -0800450#define DESCRIBE_FLAG(flag) \
451 if (value & flag) { \
452 desc += ", "; \
453 desc += #flag; \
454 value &= ~flag; \
455 }
456
457static std::string describe_end(long value, std::string& desc) {
458 if (value) {
459 desc += StringPrintf(", unknown 0x%lx", value);
460 }
461 return desc.empty() ? "" : " (" + desc.substr(2) + ")";
462}
463
464std::string describe_tagged_addr_ctrl(long value) {
Peter Collingbourne47d784e2021-11-05 18:40:52 -0700465 std::string desc;
Elliott Hughesd13ea522022-01-13 09:20:26 -0800466 DESCRIBE_FLAG(PR_TAGGED_ADDR_ENABLE);
467 DESCRIBE_FLAG(PR_MTE_TCF_SYNC);
468 DESCRIBE_FLAG(PR_MTE_TCF_ASYNC);
469 if (value & PR_MTE_TAG_MASK) {
470 desc += StringPrintf(", mask 0x%04lx", (value & PR_MTE_TAG_MASK) >> PR_MTE_TAG_SHIFT);
471 value &= ~PR_MTE_TAG_MASK;
Peter Collingbourne47d784e2021-11-05 18:40:52 -0700472 }
Elliott Hughesd13ea522022-01-13 09:20:26 -0800473 return describe_end(value, desc);
474}
475
476std::string describe_pac_enabled_keys(long value) {
477 std::string desc;
478 DESCRIBE_FLAG(PR_PAC_APIAKEY);
479 DESCRIBE_FLAG(PR_PAC_APIBKEY);
480 DESCRIBE_FLAG(PR_PAC_APDAKEY);
481 DESCRIBE_FLAG(PR_PAC_APDBKEY);
482 DESCRIBE_FLAG(PR_PAC_APGAKEY);
483 return describe_end(value, desc);
Peter Collingbourne47d784e2021-11-05 18:40:52 -0700484}
485
Christopher Ferris4ae266c2019-04-03 09:27:12 -0700486void log_backtrace(log_t* log, unwindstack::Unwinder* unwinder, const char* prefix) {
Christopher Ferrisc95047d2022-03-14 15:02:11 -0700487 std::set<std::string> unreadable_elf_files;
488 unwinder->SetDisplayBuildID(true);
489 for (const auto& frame : unwinder->frames()) {
490 if (frame.map_info != nullptr && frame.map_info->ElfFileNotReadable()) {
491 unreadable_elf_files.emplace(frame.map_info->name());
492 }
493 }
494
495 // Put the preamble ahead of the backtrace.
496 if (!unreadable_elf_files.empty()) {
Christopher Ferris4ae266c2019-04-03 09:27:12 -0700497 _LOG(log, logtype::BACKTRACE,
498 "%sNOTE: Function names and BuildId information is missing for some frames due\n", prefix);
499 _LOG(log, logtype::BACKTRACE,
500 "%sNOTE: to unreadable libraries. For unwinds of apps, only shared libraries\n", prefix);
501 _LOG(log, logtype::BACKTRACE, "%sNOTE: found under the lib/ directory are readable.\n", prefix);
502#if defined(ROOT_POSSIBLE)
503 _LOG(log, logtype::BACKTRACE,
504 "%sNOTE: On this device, run setenforce 0 to make the libraries readable.\n", prefix);
505#endif
Christopher Ferrisc95047d2022-03-14 15:02:11 -0700506 _LOG(log, logtype::BACKTRACE, "%sNOTE: Unreadable libraries:\n", prefix);
507 for (auto& name : unreadable_elf_files) {
508 _LOG(log, logtype::BACKTRACE, "%sNOTE: %s\n", prefix, name.c_str());
509 }
Christopher Ferris4ae266c2019-04-03 09:27:12 -0700510 }
511
Christopher Ferrisc95047d2022-03-14 15:02:11 -0700512 for (const auto& frame : unwinder->frames()) {
513 _LOG(log, logtype::BACKTRACE, "%s%s\n", prefix, unwinder->FormatFrame(frame).c_str());
Christopher Ferris4ae266c2019-04-03 09:27:12 -0700514 }
515}