/* * Copyright 2008, The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #define LOG_TAG "DEBUG" #include "utility.h" #include #include #include #include #include #include #include #include #include #include #include const int SLEEP_TIME_USEC = 50000; // 0.05 seconds const int MAX_TOTAL_SLEEP_USEC = 10000000; // 10 seconds // Whitelist output desired in the logcat output. bool is_allowed_in_logcat(enum logtype ltype) { if ((ltype == ERROR) || (ltype == HEADER) || (ltype == REGISTERS) || (ltype == BACKTRACE)) { return true; } return false; } void _LOG(log_t* log, enum logtype ltype, const char* fmt, ...) { bool write_to_tombstone = (log->tfd != -1); bool write_to_logcat = is_allowed_in_logcat(ltype) && log->crashed_tid != -1 && log->current_tid != -1 && (log->crashed_tid == log->current_tid); bool write_to_activitymanager = (log->amfd != -1); char buf[512]; va_list ap; va_start(ap, fmt); vsnprintf(buf, sizeof(buf), fmt, ap); va_end(ap); size_t len = strlen(buf); if (len <= 0) { return; } if (write_to_tombstone) { TEMP_FAILURE_RETRY(write(log->tfd, buf, len)); } if (write_to_logcat) { __android_log_buf_write(LOG_ID_CRASH, ANDROID_LOG_FATAL, LOG_TAG, buf); if (write_to_activitymanager) { if (!android::base::WriteFully(log->amfd, buf, len)) { // timeout or other failure on write; stop informing the activity manager ALOGE("AM write failed: %s", strerror(errno)); log->amfd = -1; } } } } int wait_for_sigstop(pid_t tid, int* total_sleep_time_usec, bool* detach_failed) { bool allow_dead_tid = false; for (;;) { int status; pid_t n = TEMP_FAILURE_RETRY(waitpid(tid, &status, __WALL | WNOHANG)); if (n == -1) { ALOGE("waitpid failed: tid %d, %s", tid, strerror(errno)); break; } else if (n == tid) { if (WIFSTOPPED(status)) { return WSTOPSIG(status); } else { ALOGE("unexpected waitpid response: n=%d, status=%08x\n", n, status); // This is the only circumstance under which we can allow a detach // to fail with ESRCH, which indicates the tid has exited. allow_dead_tid = true; break; } } if (*total_sleep_time_usec > MAX_TOTAL_SLEEP_USEC) { ALOGE("timed out waiting for stop signal: tid=%d", tid); break; } usleep(SLEEP_TIME_USEC); *total_sleep_time_usec += SLEEP_TIME_USEC; } if (ptrace(PTRACE_DETACH, tid, 0, 0) != 0) { if (allow_dead_tid && errno == ESRCH) { ALOGE("tid exited before attach completed: tid %d", tid); } else { *detach_failed = true; ALOGE("detach failed: tid %d, %s", tid, strerror(errno)); } } return -1; } #define MEMORY_BYTES_TO_DUMP 256 #define MEMORY_BYTES_PER_LINE 16 void dump_memory(log_t* log, Backtrace* backtrace, uintptr_t addr, const char* fmt, ...) { std::string log_msg; va_list ap; va_start(ap, fmt); android::base::StringAppendV(&log_msg, fmt, ap); va_end(ap); // Align the address to sizeof(long) and start 32 bytes before the address. addr &= ~(sizeof(long) - 1); if (addr >= 4128) { addr -= 32; } // Don't bother if the address looks too low, or looks too high. if (addr < 4096 || #if defined(__LP64__) addr > 0x4000000000000000UL - MEMORY_BYTES_TO_DUMP) { #else addr > 0xffff0000 - MEMORY_BYTES_TO_DUMP) { #endif return; } _LOG(log, logtype::MEMORY, "\n%s\n", log_msg.c_str()); // Dump 256 bytes uintptr_t data[MEMORY_BYTES_TO_DUMP/sizeof(uintptr_t)]; memset(data, 0, MEMORY_BYTES_TO_DUMP); size_t bytes = backtrace->Read(addr, reinterpret_cast(data), sizeof(data)); if (bytes % sizeof(uintptr_t) != 0) { // This should never happen, but just in case. ALOGE("Bytes read %zu, is not a multiple of %zu", bytes, sizeof(uintptr_t)); bytes &= ~(sizeof(uintptr_t) - 1); } if (bytes < MEMORY_BYTES_TO_DUMP && bytes > 0) { // Try to do one more read. This could happen if a read crosses a map, but // the maps do not have any break between them. Only requires one extra // read because a map has to contain at least one page, and the total // number of bytes to dump is smaller than a page. size_t bytes2 = backtrace->Read(addr + bytes, reinterpret_cast(data) + bytes, sizeof(data) - bytes); bytes += bytes2; if (bytes2 > 0 && bytes % sizeof(uintptr_t) != 0) { // This should never happen, but we'll try and continue any way. ALOGE("Bytes after second read %zu, is not a multiple of %zu", bytes, sizeof(uintptr_t)); bytes &= ~(sizeof(uintptr_t) - 1); } } // Dump the code around memory as: // addr contents ascii // 0000000000008d34 ef000000e8bd0090 e1b00000512fff1e ............../Q // 0000000000008d44 ea00b1f9e92d0090 e3a070fcef000000 ......-..p...... // On 32-bit machines, there are still 16 bytes per line but addresses and // words are of course presented differently. uintptr_t* data_ptr = data; for (size_t line = 0; line < MEMORY_BYTES_TO_DUMP / MEMORY_BYTES_PER_LINE; line++) { std::string logline; android::base::StringAppendF(&logline, " %" PRIPTR, addr); addr += MEMORY_BYTES_PER_LINE; std::string ascii; for (size_t i = 0; i < MEMORY_BYTES_PER_LINE / sizeof(uintptr_t); i++, data_ptr++) { if (bytes >= sizeof(uintptr_t)) { bytes -= sizeof(uintptr_t); android::base::StringAppendF(&logline, " %" PRIPTR, *data_ptr); // Fill out the ascii string from the data. uint8_t* ptr = reinterpret_cast(data_ptr); for (size_t val = 0; val < sizeof(uintptr_t); val++, ptr++) { if (*ptr >= 0x20 && *ptr < 0x7f) { ascii += *ptr; } else { ascii += '.'; } } } else { logline += ' ' + std::string(sizeof(uintptr_t) * 2, '-'); ascii += std::string(sizeof(uintptr_t), '.'); } } _LOG(log, logtype::MEMORY, "%s %s\n", logline.c_str(), ascii.c_str()); } } bool pid_contains_tid(pid_t pid, pid_t tid) { char task_path[PATH_MAX]; if (snprintf(task_path, PATH_MAX, "/proc/%d/task/%d", pid, tid) >= PATH_MAX) { ALOGE("debuggerd: task path overflow (pid = %d, tid = %d)\n", pid, tid); exit(1); } return access(task_path, F_OK) == 0; } // Attach to a thread, and verify that it's still a member of the given process bool ptrace_attach_thread(pid_t pid, pid_t tid) { if (ptrace(PTRACE_ATTACH, tid, 0, 0) != 0) { return false; } // Make sure that the task we attached to is actually part of the pid we're dumping. if (!pid_contains_tid(pid, tid)) { if (ptrace(PTRACE_DETACH, tid, 0, 0) != 0) { ALOGE("debuggerd: failed to detach from thread '%d'", tid); exit(1); } return false; } return true; }