315 lines
11 KiB
C++
315 lines
11 KiB
C++
/*
|
|
* Copyright 2017 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include <dirent.h>
|
|
#include <fcntl.h>
|
|
#include <poll.h>
|
|
#include <pthread.h>
|
|
#include <stddef.h>
|
|
#include <sys/ucontext.h>
|
|
#include <syscall.h>
|
|
#include <unistd.h>
|
|
|
|
#include <atomic>
|
|
#include <memory>
|
|
#include <mutex>
|
|
|
|
#include <android-base/file.h>
|
|
#include <android-base/unique_fd.h>
|
|
#include <async_safe/log.h>
|
|
#include <bionic/reserved_signals.h>
|
|
#include <unwindstack/AndroidUnwinder.h>
|
|
#include <unwindstack/Memory.h>
|
|
#include <unwindstack/Regs.h>
|
|
|
|
#include "debuggerd/handler.h"
|
|
#include "handler/fallback.h"
|
|
#include "tombstoned/tombstoned.h"
|
|
#include "util.h"
|
|
|
|
#include "libdebuggerd/backtrace.h"
|
|
#include "libdebuggerd/tombstone.h"
|
|
|
|
using android::base::unique_fd;
|
|
|
|
extern "C" bool __linker_enable_fallback_allocator();
|
|
extern "C" void __linker_disable_fallback_allocator();
|
|
|
|
// This is incredibly sketchy to do inside of a signal handler, especially when libbacktrace
|
|
// uses the C++ standard library throughout, but this code runs in the linker, so we'll be using
|
|
// the linker's malloc instead of the libc one. Switch it out for a replacement, just in case.
|
|
//
|
|
// This isn't the default method of dumping because it can fail in cases such as address space
|
|
// exhaustion.
|
|
static void debuggerd_fallback_trace(int output_fd, ucontext_t* ucontext) {
|
|
if (!__linker_enable_fallback_allocator()) {
|
|
async_safe_format_log(ANDROID_LOG_ERROR, "libc", "fallback allocator already in use");
|
|
return;
|
|
}
|
|
|
|
{
|
|
std::unique_ptr<unwindstack::Regs> regs;
|
|
|
|
ThreadInfo thread;
|
|
thread.pid = getpid();
|
|
thread.tid = gettid();
|
|
thread.thread_name = get_thread_name(gettid());
|
|
thread.registers.reset(
|
|
unwindstack::Regs::CreateFromUcontext(unwindstack::Regs::CurrentArch(), ucontext));
|
|
|
|
// Do not use the thread cache here because it will call pthread_key_create
|
|
// which doesn't work in linker code. See b/189803009.
|
|
// Use a normal cached object because the thread is stopped, and there
|
|
// is no chance of data changing between reads.
|
|
auto process_memory = unwindstack::Memory::CreateProcessMemoryCached(getpid());
|
|
// TODO: Create this once and store it in a global?
|
|
unwindstack::AndroidLocalUnwinder unwinder(process_memory);
|
|
dump_backtrace_thread(output_fd, &unwinder, thread);
|
|
}
|
|
__linker_disable_fallback_allocator();
|
|
}
|
|
|
|
static void debuggerd_fallback_tombstone(int output_fd, int proto_fd, ucontext_t* ucontext,
|
|
siginfo_t* siginfo, void* abort_message) {
|
|
if (!__linker_enable_fallback_allocator()) {
|
|
async_safe_format_log(ANDROID_LOG_ERROR, "libc", "fallback allocator already in use");
|
|
return;
|
|
}
|
|
|
|
engrave_tombstone_ucontext(output_fd, proto_fd, reinterpret_cast<uintptr_t>(abort_message),
|
|
siginfo, ucontext);
|
|
__linker_disable_fallback_allocator();
|
|
}
|
|
|
|
static bool forward_output(int src_fd, int dst_fd, pid_t expected_tid) {
|
|
// Make sure the thread actually got the signal.
|
|
struct pollfd pfd = {
|
|
.fd = src_fd, .events = POLLIN,
|
|
};
|
|
|
|
// Wait for up to a second for output to start flowing.
|
|
if (poll(&pfd, 1, 1000) != 1) {
|
|
return false;
|
|
}
|
|
|
|
pid_t tid;
|
|
if (TEMP_FAILURE_RETRY(read(src_fd, &tid, sizeof(tid))) != sizeof(tid)) {
|
|
async_safe_format_log(ANDROID_LOG_ERROR, "libc", "failed to read tid");
|
|
return false;
|
|
}
|
|
|
|
if (tid != expected_tid) {
|
|
async_safe_format_log(ANDROID_LOG_ERROR, "libc", "received tid %d, expected %d", tid,
|
|
expected_tid);
|
|
return false;
|
|
}
|
|
|
|
while (true) {
|
|
char buf[512];
|
|
ssize_t rc = TEMP_FAILURE_RETRY(read(src_fd, buf, sizeof(buf)));
|
|
if (rc == 0) {
|
|
return true;
|
|
} else if (rc < 0) {
|
|
return false;
|
|
}
|
|
|
|
if (!android::base::WriteFully(dst_fd, buf, rc)) {
|
|
// We failed to write to tombstoned, but there's not much we can do.
|
|
// Keep reading from src_fd to keep things going.
|
|
continue;
|
|
}
|
|
}
|
|
}
|
|
|
|
struct __attribute__((__packed__)) packed_thread_output {
|
|
int32_t tid;
|
|
int32_t fd;
|
|
};
|
|
|
|
static uint64_t pack_thread_fd(pid_t tid, int fd) {
|
|
packed_thread_output packed = {.tid = tid, .fd = fd};
|
|
uint64_t result;
|
|
static_assert(sizeof(packed) == sizeof(result));
|
|
memcpy(&result, &packed, sizeof(packed));
|
|
return result;
|
|
}
|
|
|
|
static std::pair<pid_t, int> unpack_thread_fd(uint64_t value) {
|
|
packed_thread_output result;
|
|
memcpy(&result, &value, sizeof(value));
|
|
return std::make_pair(result.tid, result.fd);
|
|
}
|
|
|
|
static void trace_handler(siginfo_t* info, ucontext_t* ucontext) {
|
|
static std::atomic<uint64_t> trace_output(pack_thread_fd(-1, -1));
|
|
|
|
if (info->si_value.sival_ptr == kDebuggerdFallbackSivalPtrRequestDump) {
|
|
// Asked to dump by the original signal recipient.
|
|
uint64_t val = trace_output.load();
|
|
auto [tid, fd] = unpack_thread_fd(val);
|
|
if (tid != gettid()) {
|
|
// We received some other thread's info request?
|
|
async_safe_format_log(ANDROID_LOG_ERROR, "libc",
|
|
"thread %d received output fd for thread %d?", gettid(), tid);
|
|
return;
|
|
}
|
|
|
|
if (!trace_output.compare_exchange_strong(val, pack_thread_fd(-1, -1))) {
|
|
// Presumably, the timeout in forward_output expired, and the main thread moved on.
|
|
// If this happened, the main thread closed our fd for us, so just return.
|
|
async_safe_format_log(ANDROID_LOG_ERROR, "libc", "cmpxchg for thread %d failed", gettid());
|
|
return;
|
|
}
|
|
|
|
// Write our tid to the output fd to let the main thread know that we're working.
|
|
if (TEMP_FAILURE_RETRY(write(fd, &tid, sizeof(tid))) == sizeof(tid)) {
|
|
debuggerd_fallback_trace(fd, ucontext);
|
|
} else {
|
|
async_safe_format_log(ANDROID_LOG_ERROR, "libc", "failed to write to output fd");
|
|
}
|
|
|
|
close(fd);
|
|
return;
|
|
}
|
|
|
|
// Only allow one thread to perform a trace at a time.
|
|
static std::mutex trace_mutex;
|
|
if (!trace_mutex.try_lock()) {
|
|
async_safe_format_log(ANDROID_LOG_INFO, "libc", "trace lock failed");
|
|
return;
|
|
}
|
|
|
|
std::lock_guard<std::mutex> scoped_lock(trace_mutex, std::adopt_lock);
|
|
|
|
// Fetch output fd from tombstoned.
|
|
unique_fd tombstone_socket, output_fd;
|
|
if (!tombstoned_connect(getpid(), &tombstone_socket, &output_fd, nullptr,
|
|
kDebuggerdNativeBacktrace)) {
|
|
async_safe_format_log(ANDROID_LOG_ERROR, "libc",
|
|
"missing crash_dump_fallback() in selinux policy?");
|
|
return;
|
|
}
|
|
|
|
dump_backtrace_header(output_fd.get());
|
|
|
|
// Dump our own stack.
|
|
debuggerd_fallback_trace(output_fd.get(), ucontext);
|
|
|
|
// Send a signal to all of our siblings, asking them to dump their stack.
|
|
pid_t current_tid = gettid();
|
|
if (!iterate_tids(current_tid, [&output_fd, ¤t_tid](pid_t tid) {
|
|
if (current_tid == tid) {
|
|
return;
|
|
}
|
|
// Use a pipe, to be able to detect situations where the thread gracefully exits before
|
|
// receiving our signal.
|
|
unique_fd pipe_read, pipe_write;
|
|
if (!Pipe(&pipe_read, &pipe_write)) {
|
|
async_safe_format_log(ANDROID_LOG_ERROR, "libc", "failed to create pipe: %s",
|
|
strerror(errno));
|
|
return;
|
|
}
|
|
|
|
uint64_t expected = pack_thread_fd(-1, -1);
|
|
int sent_fd = pipe_write.release();
|
|
if (!trace_output.compare_exchange_strong(expected, pack_thread_fd(tid, sent_fd))) {
|
|
auto [tid, fd] = unpack_thread_fd(expected);
|
|
async_safe_format_log(ANDROID_LOG_ERROR, "libc",
|
|
"thread %d is already outputting to fd %d?", tid, fd);
|
|
close(sent_fd);
|
|
return;
|
|
}
|
|
|
|
siginfo_t siginfo = {};
|
|
siginfo.si_code = SI_QUEUE;
|
|
siginfo.si_value.sival_ptr = kDebuggerdFallbackSivalPtrRequestDump;
|
|
siginfo.si_pid = getpid();
|
|
siginfo.si_uid = getuid();
|
|
|
|
if (syscall(__NR_rt_tgsigqueueinfo, getpid(), tid, BIONIC_SIGNAL_DEBUGGER, &siginfo) != 0) {
|
|
async_safe_format_log(ANDROID_LOG_ERROR, "libc", "failed to send trace signal to %d: %s",
|
|
tid, strerror(errno));
|
|
return;
|
|
}
|
|
|
|
bool success = forward_output(pipe_read.get(), output_fd.get(), tid);
|
|
if (!success) {
|
|
async_safe_format_log(ANDROID_LOG_ERROR, "libc",
|
|
"timeout expired while waiting for thread %d to dump", tid);
|
|
}
|
|
|
|
// Regardless of whether the poll succeeds, check to see if the thread took fd ownership.
|
|
uint64_t post_wait = trace_output.exchange(pack_thread_fd(-1, -1));
|
|
if (post_wait != pack_thread_fd(-1, -1)) {
|
|
auto [tid, fd] = unpack_thread_fd(post_wait);
|
|
if (fd != -1) {
|
|
async_safe_format_log(ANDROID_LOG_ERROR, "libc", "closing fd %d for thread %d", fd, tid);
|
|
close(fd);
|
|
}
|
|
}
|
|
|
|
return;
|
|
})) {
|
|
async_safe_format_log(ANDROID_LOG_ERROR, "libc", "failed to open /proc/%d/task: %s",
|
|
current_tid, strerror(errno));
|
|
}
|
|
|
|
dump_backtrace_footer(output_fd.get());
|
|
tombstoned_notify_completion(tombstone_socket.get());
|
|
}
|
|
|
|
static void crash_handler(siginfo_t* info, ucontext_t* ucontext, void* abort_message) {
|
|
// Only allow one thread to handle a crash at a time (this can happen multiple times without
|
|
// exit, since tombstones can be requested without a real crash happening.)
|
|
static std::recursive_mutex crash_mutex;
|
|
static int lock_count;
|
|
|
|
crash_mutex.lock();
|
|
if (lock_count++ > 0) {
|
|
async_safe_format_log(ANDROID_LOG_ERROR, "libc", "recursed signal handler call, aborting");
|
|
signal(SIGABRT, SIG_DFL);
|
|
raise(SIGABRT);
|
|
sigset_t sigset;
|
|
sigemptyset(&sigset);
|
|
sigaddset(&sigset, SIGABRT);
|
|
sigprocmask(SIG_UNBLOCK, &sigset, nullptr);
|
|
|
|
// Just in case...
|
|
async_safe_format_log(ANDROID_LOG_ERROR, "libc", "abort didn't exit, exiting");
|
|
_exit(1);
|
|
}
|
|
|
|
unique_fd tombstone_socket, output_fd, proto_fd;
|
|
bool tombstoned_connected = tombstoned_connect(getpid(), &tombstone_socket, &output_fd, &proto_fd,
|
|
kDebuggerdTombstoneProto);
|
|
debuggerd_fallback_tombstone(output_fd.get(), proto_fd.get(), ucontext, info, abort_message);
|
|
if (tombstoned_connected) {
|
|
tombstoned_notify_completion(tombstone_socket.get());
|
|
}
|
|
|
|
--lock_count;
|
|
crash_mutex.unlock();
|
|
}
|
|
|
|
extern "C" void debuggerd_fallback_handler(siginfo_t* info, ucontext_t* ucontext,
|
|
void* abort_message) {
|
|
if (info->si_signo == BIONIC_SIGNAL_DEBUGGER && info->si_value.sival_ptr != nullptr) {
|
|
return trace_handler(info, ucontext);
|
|
} else {
|
|
return crash_handler(info, ucontext, abort_message);
|
|
}
|
|
}
|