diff options
author | Christopher Ferris <cferris@google.com> | 2014-09-12 14:44:20 -0700 |
---|---|---|
committer | Christopher Ferris <cferris@google.com> | 2014-09-12 20:12:11 -0700 |
commit | a9fa7b87f1aefd7b96f749a545d3385ad384c12b (patch) | |
tree | 1faa2707063de2d330e9258d6c1bd6f8cdb887b0 | |
parent | fcfa86403e206e2caa519299939480cb45deb8ba (diff) | |
download | system_core-a9fa7b87f1aefd7b96f749a545d3385ad384c12b.zip system_core-a9fa7b87f1aefd7b96f749a545d3385ad384c12b.tar.gz system_core-a9fa7b87f1aefd7b96f749a545d3385ad384c12b.tar.bz2 |
Use the correct debuggerd given the tid.
On 64 bit systems, calling dump_backtrace_to_file will automatically
call debuggerd64. If the process to dump is actually 32 bit, this
creates an unrecognizable dump backtrace. Modify the code to check the
type of the process and connect to the appropriate debuggerd process.
This change refactors both the tombstone and backtrace functionality to
allow both to work properly on 64 bit systems when dealing with mixed
processes.
Bug: 17487122
Change-Id: Icf123a6f4508b1aeec073663aa1a0ceae5380aa1
-rw-r--r-- | include/cutils/debugger.h | 19 | ||||
-rw-r--r-- | libcutils/debugger.c | 176 |
2 files changed, 135 insertions, 60 deletions
diff --git a/include/cutils/debugger.h b/include/cutils/debugger.h index ae6bfc4..4bcc8e6 100644 --- a/include/cutils/debugger.h +++ b/include/cutils/debugger.h @@ -23,10 +23,13 @@ extern "C" { #endif -#if __LP64__ -#define DEBUGGER_SOCKET_NAME "android:debuggerd64" +#define DEBUGGER32_SOCKET_NAME "android:debuggerd" +#define DEBUGGER64_SOCKET_NAME "android:debuggerd64" + +#if defined(__LP64__) +#define DEBUGGER_SOCKET_NAME DEBUGGER64_SOCKET_NAME #else -#define DEBUGGER_SOCKET_NAME "android:debuggerd" +#define DEBUGGER_SOCKET_NAME DEBUGGER32_SOCKET_NAME #endif typedef enum { @@ -45,6 +48,16 @@ typedef struct { int32_t original_si_code; } debugger_msg_t; +#if defined(__LP64__) +// For a 64 bit process to contact the 32 bit debuggerd. +typedef struct { + debugger_action_t action; + pid_t tid; + uint32_t abort_msg_address; + int32_t original_si_code; +} debugger32_msg_t; +#endif + /* Dumps a process backtrace, registers, and stack to a tombstone file (requires root). * Stores the tombstone path in the provided buffer. * Returns 0 on success, -1 on error. diff --git a/libcutils/debugger.c b/libcutils/debugger.c index 056de5d..4035ee1 100644 --- a/libcutils/debugger.c +++ b/libcutils/debugger.c @@ -14,6 +14,9 @@ * limitations under the License. */ +#include <stdbool.h> +#include <fcntl.h> +#include <stdio.h> #include <stdlib.h> #include <string.h> #include <unistd.h> @@ -21,70 +24,129 @@ #include <cutils/debugger.h> #include <cutils/sockets.h> -int dump_tombstone(pid_t tid, char* pathbuf, size_t pathlen) { - int s = socket_local_client(DEBUGGER_SOCKET_NAME, - ANDROID_SOCKET_NAMESPACE_ABSTRACT, SOCK_STREAM); - if (s < 0) { - return -1; +#if defined(__LP64__) +#include <elf.h> + +static bool is32bit(pid_t tid) { + char* exeline; + if (asprintf(&exeline, "/proc/%d/exe", tid) == -1) { + return false; + } + int fd = open(exeline, O_RDONLY | O_CLOEXEC); + free(exeline); + if (fd == -1) { + return false; + } + + char ehdr[EI_NIDENT]; + ssize_t bytes = read(fd, &ehdr, sizeof(ehdr)); + close(fd); + if (bytes != (ssize_t) sizeof(ehdr) || memcmp(ELFMAG, ehdr, SELFMAG) != 0) { + return false; + } + if (ehdr[EI_CLASS] == ELFCLASS32) { + return true; + } + return false; +} +#endif + +static int send_request(int sock_fd, void* msg_ptr, size_t msg_len) { + int result = 0; + if (TEMP_FAILURE_RETRY(write(sock_fd, msg_ptr, msg_len)) != (ssize_t) msg_len) { + result = -1; + } else { + char ack; + if (TEMP_FAILURE_RETRY(read(sock_fd, &ack, 1)) != 1) { + result = -1; } + } + return result; +} + +static int make_dump_request(debugger_action_t action, pid_t tid) { + const char* socket_name; + debugger_msg_t msg; + size_t msg_len; + void* msg_ptr; - debugger_msg_t msg; - memset(&msg, 0, sizeof(msg)); +#if defined(__LP64__) + debugger32_msg_t msg32; + if (is32bit(tid)) { + msg_len = sizeof(debugger32_msg_t); + memset(&msg32, 0, msg_len); + msg32.tid = tid; + msg32.action = action; + msg_ptr = &msg32; + + socket_name = DEBUGGER32_SOCKET_NAME; + } else +#endif + { + msg_len = sizeof(debugger_msg_t); + memset(&msg, 0, msg_len); msg.tid = tid; - msg.action = DEBUGGER_ACTION_DUMP_TOMBSTONE; - - int result = 0; - if (TEMP_FAILURE_RETRY(write(s, &msg, sizeof(msg))) != sizeof(msg)) { - result = -1; - } else { - char ack; - if (TEMP_FAILURE_RETRY(read(s, &ack, 1)) != 1) { - result = -1; - } else { - if (pathbuf && pathlen) { - ssize_t n = TEMP_FAILURE_RETRY(read(s, pathbuf, pathlen - 1)); - if (n <= 0) { - result = -1; - } else { - pathbuf[n] = '\0'; - } - } - } - } - TEMP_FAILURE_RETRY(close(s)); - return result; + msg.action = action; + msg_ptr = &msg; + + socket_name = DEBUGGER_SOCKET_NAME; + } + + int sock_fd = socket_local_client(socket_name, ANDROID_SOCKET_NAMESPACE_ABSTRACT, + SOCK_STREAM | SOCK_CLOEXEC); + if (sock_fd < 0) { + return -1; + } + + if (send_request(sock_fd, msg_ptr, msg_len) < 0) { + TEMP_FAILURE_RETRY(close(sock_fd)); + return -1; + } + + return sock_fd; } int dump_backtrace_to_file(pid_t tid, int fd) { - int s = socket_local_client(DEBUGGER_SOCKET_NAME, - ANDROID_SOCKET_NAMESPACE_ABSTRACT, SOCK_STREAM); - if (s < 0) { - return -1; + int sock_fd = make_dump_request(DEBUGGER_ACTION_DUMP_BACKTRACE, tid); + if (sock_fd < 0) { + return -1; + } + + /* Write the data read from the socket to the fd. */ + int result = 0; + char buffer[1024]; + ssize_t n; + while ((n = TEMP_FAILURE_RETRY(read(sock_fd, buffer, sizeof(buffer)))) > 0) { + if (TEMP_FAILURE_RETRY(write(fd, buffer, n)) != n) { + result = -1; + break; } + } + TEMP_FAILURE_RETRY(close(sock_fd)); + return result; +} - debugger_msg_t msg; - memset(&msg, 0, sizeof(msg)); - msg.tid = tid; - msg.action = DEBUGGER_ACTION_DUMP_BACKTRACE; - - int result = 0; - if (TEMP_FAILURE_RETRY(write(s, &msg, sizeof(msg))) != sizeof(msg)) { - result = -1; - } else { - char ack; - if (TEMP_FAILURE_RETRY(read(s, &ack, 1)) != 1) { - result = -1; - } else { - char buffer[4096]; - ssize_t n; - while ((n = TEMP_FAILURE_RETRY(read(s, buffer, sizeof(buffer)))) > 0) { - if (TEMP_FAILURE_RETRY(write(fd, buffer, n)) != n) { - result = -1; - break; - } - } - } +int dump_tombstone(pid_t tid, char* pathbuf, size_t pathlen) { + int sock_fd = make_dump_request(DEBUGGER_ACTION_DUMP_TOMBSTONE, tid); + if (sock_fd < 0) { + return -1; + } + + /* Read the tombstone file name. */ + char buffer[100]; /* This is larger than the largest tombstone path. */ + int result = 0; + ssize_t n = TEMP_FAILURE_RETRY(read(sock_fd, buffer, sizeof(buffer) - 1)); + if (n <= 0) { + result = -1; + } else { + if (pathbuf && pathlen) { + if (n >= (ssize_t) pathlen) { + n = pathlen - 1; + } + buffer[n] = '\0'; + memcpy(pathbuf, buffer, n + 1); } - TEMP_FAILURE_RETRY(close(s)); - return result; + } + TEMP_FAILURE_RETRY(close(sock_fd)); + return result; } |