2012-06-07 07:25:03 +08:00
|
|
|
/*
|
2013-12-13 04:21:20 +08:00
|
|
|
* Copyright (C) 2012-2014 The Android Open Source Project
|
2012-06-07 07:25:03 +08:00
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
2014-06-11 02:53:08 +08:00
|
|
|
#define LOG_TAG "DEBUG"
|
|
|
|
|
2014-12-19 07:47:09 +08:00
|
|
|
#include <arpa/inet.h>
|
2013-12-19 00:44:24 +08:00
|
|
|
#include <dirent.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <inttypes.h>
|
|
|
|
#include <signal.h>
|
2012-06-07 07:25:03 +08:00
|
|
|
#include <stddef.h>
|
2013-12-19 00:44:24 +08:00
|
|
|
#include <stdio.h>
|
2012-06-07 07:25:03 +08:00
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <time.h>
|
|
|
|
#include <sys/ptrace.h>
|
2013-12-19 00:44:24 +08:00
|
|
|
#include <sys/socket.h>
|
2012-06-07 07:25:03 +08:00
|
|
|
#include <sys/stat.h>
|
2013-12-19 00:44:24 +08:00
|
|
|
#include <sys/un.h>
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2015-05-16 08:30:21 +08:00
|
|
|
#include <memory>
|
|
|
|
#include <string>
|
|
|
|
|
2012-06-07 07:25:03 +08:00
|
|
|
#include <private/android_filesystem_config.h>
|
|
|
|
|
2015-12-05 14:00:26 +08:00
|
|
|
#include <android-base/stringprintf.h>
|
2014-05-15 03:37:22 +08:00
|
|
|
#include <cutils/properties.h>
|
2013-11-23 02:53:34 +08:00
|
|
|
#include <log/log.h>
|
2013-07-24 07:59:20 +08:00
|
|
|
#include <log/logger.h>
|
2014-05-15 03:37:22 +08:00
|
|
|
#include <log/logprint.h>
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
#include <backtrace/Backtrace.h>
|
2014-01-15 12:16:30 +08:00
|
|
|
#include <backtrace/BacktraceMap.h>
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2012-07-19 21:38:06 +08:00
|
|
|
#include <selinux/android.h>
|
|
|
|
|
2015-02-28 05:39:47 +08:00
|
|
|
#include "backtrace.h"
|
|
|
|
#include "elf_utils.h"
|
2012-06-07 07:25:03 +08:00
|
|
|
#include "machine.h"
|
|
|
|
#include "tombstone.h"
|
|
|
|
|
|
|
|
#define STACK_WORDS 16
|
|
|
|
|
|
|
|
#define MAX_TOMBSTONES 10
|
|
|
|
#define TOMBSTONE_DIR "/data/tombstones"
|
2013-12-19 00:44:24 +08:00
|
|
|
#define TOMBSTONE_TEMPLATE (TOMBSTONE_DIR"/tombstone_%02d")
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
// Must match the path defined in NativeCrashListener.java
|
2013-03-20 04:12:23 +08:00
|
|
|
#define NCRASH_SOCKET_PATH "/data/system/ndebugsocket"
|
|
|
|
|
2014-04-26 07:05:34 +08:00
|
|
|
static bool signal_has_si_addr(int sig) {
|
2014-01-11 08:33:16 +08:00
|
|
|
switch (sig) {
|
2014-05-17 12:12:17 +08:00
|
|
|
case SIGBUS:
|
2014-01-11 08:33:16 +08:00
|
|
|
case SIGFPE:
|
2014-05-17 12:12:17 +08:00
|
|
|
case SIGILL:
|
2014-01-11 08:33:16 +08:00
|
|
|
case SIGSEGV:
|
2014-08-09 07:30:13 +08:00
|
|
|
case SIGTRAP:
|
2014-01-11 08:33:16 +08:00
|
|
|
return true;
|
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
static const char* get_signame(int sig) {
|
|
|
|
switch(sig) {
|
|
|
|
case SIGABRT: return "SIGABRT";
|
|
|
|
case SIGBUS: return "SIGBUS";
|
|
|
|
case SIGFPE: return "SIGFPE";
|
2014-05-17 12:12:17 +08:00
|
|
|
case SIGILL: return "SIGILL";
|
|
|
|
case SIGSEGV: return "SIGSEGV";
|
2014-04-26 07:05:34 +08:00
|
|
|
#if defined(SIGSTKFLT)
|
2014-01-11 08:33:16 +08:00
|
|
|
case SIGSTKFLT: return "SIGSTKFLT";
|
2012-08-11 08:06:20 +08:00
|
|
|
#endif
|
2014-01-11 08:33:16 +08:00
|
|
|
case SIGSTOP: return "SIGSTOP";
|
2014-05-17 12:12:17 +08:00
|
|
|
case SIGTRAP: return "SIGTRAP";
|
2014-01-11 08:33:16 +08:00
|
|
|
default: return "?";
|
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
static const char* get_sigcode(int signo, int code) {
|
|
|
|
// Try the signal-specific codes...
|
|
|
|
switch (signo) {
|
2012-06-07 07:25:03 +08:00
|
|
|
case SIGILL:
|
2014-01-11 08:33:16 +08:00
|
|
|
switch (code) {
|
2012-06-07 07:25:03 +08:00
|
|
|
case ILL_ILLOPC: return "ILL_ILLOPC";
|
|
|
|
case ILL_ILLOPN: return "ILL_ILLOPN";
|
|
|
|
case ILL_ILLADR: return "ILL_ILLADR";
|
|
|
|
case ILL_ILLTRP: return "ILL_ILLTRP";
|
|
|
|
case ILL_PRVOPC: return "ILL_PRVOPC";
|
|
|
|
case ILL_PRVREG: return "ILL_PRVREG";
|
|
|
|
case ILL_COPROC: return "ILL_COPROC";
|
|
|
|
case ILL_BADSTK: return "ILL_BADSTK";
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2014-04-25 04:53:22 +08:00
|
|
|
static_assert(NSIGILL == ILL_BADSTK, "missing ILL_* si_code");
|
2014-01-11 08:33:16 +08:00
|
|
|
break;
|
2012-06-07 07:25:03 +08:00
|
|
|
case SIGBUS:
|
2014-01-11 08:33:16 +08:00
|
|
|
switch (code) {
|
2012-06-07 07:25:03 +08:00
|
|
|
case BUS_ADRALN: return "BUS_ADRALN";
|
|
|
|
case BUS_ADRERR: return "BUS_ADRERR";
|
|
|
|
case BUS_OBJERR: return "BUS_OBJERR";
|
2014-04-25 04:53:22 +08:00
|
|
|
case BUS_MCEERR_AR: return "BUS_MCEERR_AR";
|
|
|
|
case BUS_MCEERR_AO: return "BUS_MCEERR_AO";
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2014-04-25 04:53:22 +08:00
|
|
|
static_assert(NSIGBUS == BUS_MCEERR_AO, "missing BUS_* si_code");
|
2014-01-11 08:33:16 +08:00
|
|
|
break;
|
2012-06-07 07:25:03 +08:00
|
|
|
case SIGFPE:
|
2014-01-11 08:33:16 +08:00
|
|
|
switch (code) {
|
2012-06-07 07:25:03 +08:00
|
|
|
case FPE_INTDIV: return "FPE_INTDIV";
|
|
|
|
case FPE_INTOVF: return "FPE_INTOVF";
|
|
|
|
case FPE_FLTDIV: return "FPE_FLTDIV";
|
|
|
|
case FPE_FLTOVF: return "FPE_FLTOVF";
|
|
|
|
case FPE_FLTUND: return "FPE_FLTUND";
|
|
|
|
case FPE_FLTRES: return "FPE_FLTRES";
|
|
|
|
case FPE_FLTINV: return "FPE_FLTINV";
|
|
|
|
case FPE_FLTSUB: return "FPE_FLTSUB";
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2014-04-25 04:53:22 +08:00
|
|
|
static_assert(NSIGFPE == FPE_FLTSUB, "missing FPE_* si_code");
|
2014-01-11 08:33:16 +08:00
|
|
|
break;
|
2012-06-07 07:25:03 +08:00
|
|
|
case SIGSEGV:
|
2014-01-11 08:33:16 +08:00
|
|
|
switch (code) {
|
2012-06-07 07:25:03 +08:00
|
|
|
case SEGV_MAPERR: return "SEGV_MAPERR";
|
|
|
|
case SEGV_ACCERR: return "SEGV_ACCERR";
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2014-04-25 04:53:22 +08:00
|
|
|
static_assert(NSIGSEGV == SEGV_ACCERR, "missing SEGV_* si_code");
|
2014-01-11 08:33:16 +08:00
|
|
|
break;
|
2012-12-11 02:29:05 +08:00
|
|
|
case SIGTRAP:
|
2014-01-11 08:33:16 +08:00
|
|
|
switch (code) {
|
2012-12-11 02:29:05 +08:00
|
|
|
case TRAP_BRKPT: return "TRAP_BRKPT";
|
|
|
|
case TRAP_TRACE: return "TRAP_TRACE";
|
2014-04-25 04:53:22 +08:00
|
|
|
case TRAP_BRANCH: return "TRAP_BRANCH";
|
|
|
|
case TRAP_HWBKPT: return "TRAP_HWBKPT";
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2014-04-25 04:53:22 +08:00
|
|
|
static_assert(NSIGTRAP == TRAP_HWBKPT, "missing TRAP_* si_code");
|
2014-01-11 08:33:16 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
// Then the other codes...
|
|
|
|
switch (code) {
|
|
|
|
case SI_USER: return "SI_USER";
|
|
|
|
case SI_KERNEL: return "SI_KERNEL";
|
|
|
|
case SI_QUEUE: return "SI_QUEUE";
|
|
|
|
case SI_TIMER: return "SI_TIMER";
|
|
|
|
case SI_MESGQ: return "SI_MESGQ";
|
2012-12-11 02:29:05 +08:00
|
|
|
case SI_ASYNCIO: return "SI_ASYNCIO";
|
2014-01-11 08:33:16 +08:00
|
|
|
case SI_SIGIO: return "SI_SIGIO";
|
|
|
|
case SI_TKILL: return "SI_TKILL";
|
2014-04-25 04:53:22 +08:00
|
|
|
case SI_DETHREAD: return "SI_DETHREAD";
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
|
|
|
// Then give up...
|
|
|
|
return "?";
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
|
|
|
|
2014-06-03 06:02:20 +08:00
|
|
|
static void dump_header_info(log_t* log) {
|
2014-01-11 08:33:16 +08:00
|
|
|
char fingerprint[PROPERTY_VALUE_MAX];
|
2014-06-03 06:02:20 +08:00
|
|
|
char revision[PROPERTY_VALUE_MAX];
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
property_get("ro.build.fingerprint", fingerprint, "unknown");
|
2014-06-03 06:02:20 +08:00
|
|
|
property_get("ro.revision", revision, "unknown");
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-06-11 02:53:08 +08:00
|
|
|
_LOG(log, logtype::HEADER, "Build fingerprint: '%s'\n", fingerprint);
|
|
|
|
_LOG(log, logtype::HEADER, "Revision: '%s'\n", revision);
|
|
|
|
_LOG(log, logtype::HEADER, "ABI: '%s'\n", ABI_STRING);
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
|
|
|
|
2014-04-26 07:05:34 +08:00
|
|
|
static void dump_signal_info(log_t* log, pid_t tid, int signal, int si_code) {
|
2014-01-11 08:33:16 +08:00
|
|
|
siginfo_t si;
|
|
|
|
memset(&si, 0, sizeof(si));
|
2014-04-26 07:05:34 +08:00
|
|
|
if (ptrace(PTRACE_GETSIGINFO, tid, 0, &si) == -1) {
|
2015-06-18 09:35:59 +08:00
|
|
|
ALOGE("cannot get siginfo: %s\n", strerror(errno));
|
2014-04-26 07:05:34 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// bionic has to re-raise some signals, which overwrites the si_code with SI_TKILL.
|
|
|
|
si.si_code = si_code;
|
|
|
|
|
|
|
|
char addr_desc[32]; // ", fault addr 0x1234"
|
|
|
|
if (signal_has_si_addr(signal)) {
|
|
|
|
snprintf(addr_desc, sizeof(addr_desc), "%p", si.si_addr);
|
2014-01-11 08:33:16 +08:00
|
|
|
} else {
|
2014-04-26 07:05:34 +08:00
|
|
|
snprintf(addr_desc, sizeof(addr_desc), "--------");
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2014-04-26 07:05:34 +08:00
|
|
|
|
2014-06-11 02:53:08 +08:00
|
|
|
_LOG(log, logtype::HEADER, "signal %d (%s), code %d (%s), fault addr %s\n",
|
2014-04-26 07:05:34 +08:00
|
|
|
signal, get_signame(signal), si.si_code, get_sigcode(signal, si.si_code), addr_desc);
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
|
|
|
|
2014-06-11 02:53:08 +08:00
|
|
|
static void dump_thread_info(log_t* log, pid_t pid, pid_t tid) {
|
2014-01-11 08:33:16 +08:00
|
|
|
char path[64];
|
|
|
|
char threadnamebuf[1024];
|
|
|
|
char* threadname = NULL;
|
|
|
|
FILE *fp;
|
|
|
|
|
|
|
|
snprintf(path, sizeof(path), "/proc/%d/comm", tid);
|
|
|
|
if ((fp = fopen(path, "r"))) {
|
|
|
|
threadname = fgets(threadnamebuf, sizeof(threadnamebuf), fp);
|
|
|
|
fclose(fp);
|
|
|
|
if (threadname) {
|
|
|
|
size_t len = strlen(threadname);
|
|
|
|
if (len && threadname[len - 1] == '\n') {
|
|
|
|
threadname[len - 1] = '\0';
|
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2014-07-26 03:25:48 +08:00
|
|
|
// Blacklist logd, logd.reader, logd.writer, logd.auditd, logd.control ...
|
|
|
|
static const char logd[] = "logd";
|
|
|
|
if (!strncmp(threadname, logd, sizeof(logd) - 1)
|
|
|
|
&& (!threadname[sizeof(logd) - 1] || (threadname[sizeof(logd) - 1] == '.'))) {
|
|
|
|
log->should_retrieve_logcat = false;
|
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-06-11 02:53:08 +08:00
|
|
|
char procnamebuf[1024];
|
|
|
|
char* procname = NULL;
|
2014-01-11 08:33:16 +08:00
|
|
|
|
2014-06-11 02:53:08 +08:00
|
|
|
snprintf(path, sizeof(path), "/proc/%d/cmdline", pid);
|
|
|
|
if ((fp = fopen(path, "r"))) {
|
|
|
|
procname = fgets(procnamebuf, sizeof(procnamebuf), fp);
|
|
|
|
fclose(fp);
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2014-06-11 02:53:08 +08:00
|
|
|
|
2014-06-24 02:03:40 +08:00
|
|
|
_LOG(log, logtype::HEADER, "pid: %d, tid: %d, name: %s >>> %s <<<\n", pid, tid,
|
2014-06-11 02:53:08 +08:00
|
|
|
threadname ? threadname : "UNKNOWN", procname ? procname : "UNKNOWN");
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
static void dump_stack_segment(
|
2014-06-11 02:53:08 +08:00
|
|
|
Backtrace* backtrace, log_t* log, uintptr_t* sp, size_t words, int label) {
|
2015-02-28 05:39:47 +08:00
|
|
|
// Read the data all at once.
|
|
|
|
word_t stack_data[words];
|
|
|
|
size_t bytes_read = backtrace->Read(*sp, reinterpret_cast<uint8_t*>(&stack_data[0]), sizeof(word_t) * words);
|
|
|
|
words = bytes_read / sizeof(word_t);
|
|
|
|
std::string line;
|
2014-01-11 08:33:16 +08:00
|
|
|
for (size_t i = 0; i < words; i++) {
|
2015-02-28 05:39:47 +08:00
|
|
|
line = " ";
|
|
|
|
if (i == 0 && label >= 0) {
|
|
|
|
// Print the label once.
|
|
|
|
line += android::base::StringPrintf("#%02d ", label);
|
|
|
|
} else {
|
|
|
|
line += " ";
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2015-02-28 05:39:47 +08:00
|
|
|
line += android::base::StringPrintf("%" PRIPTR " %" PRIPTR, *sp, stack_data[i]);
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2015-02-07 05:22:01 +08:00
|
|
|
backtrace_map_t map;
|
2015-02-28 05:39:47 +08:00
|
|
|
backtrace->FillInMap(stack_data[i], &map);
|
|
|
|
if (BacktraceMap::IsValid(map) && !map.name.empty()) {
|
|
|
|
line += " " + map.name;
|
|
|
|
uintptr_t offset = 0;
|
|
|
|
std::string func_name(backtrace->GetFunctionName(stack_data[i], &offset));
|
|
|
|
if (!func_name.empty()) {
|
|
|
|
line += " (" + func_name;
|
2014-01-11 08:33:16 +08:00
|
|
|
if (offset) {
|
2015-02-28 05:39:47 +08:00
|
|
|
line += android::base::StringPrintf("+%" PRIuPTR, offset);
|
2013-10-03 03:26:48 +08:00
|
|
|
}
|
2015-02-28 05:39:47 +08:00
|
|
|
line += ')';
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
2015-02-28 05:39:47 +08:00
|
|
|
_LOG(log, logtype::STACK, "%s\n", line.c_str());
|
2014-01-11 08:33:16 +08:00
|
|
|
|
2013-11-22 03:17:20 +08:00
|
|
|
*sp += sizeof(word_t);
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
|
|
|
|
2014-06-11 02:53:08 +08:00
|
|
|
static void dump_stack(Backtrace* backtrace, log_t* log) {
|
2014-01-11 08:33:16 +08:00
|
|
|
size_t first = 0, last;
|
|
|
|
for (size_t i = 0; i < backtrace->NumFrames(); i++) {
|
|
|
|
const backtrace_frame_data_t* frame = backtrace->GetFrame(i);
|
|
|
|
if (frame->sp) {
|
|
|
|
if (!first) {
|
|
|
|
first = i+1;
|
|
|
|
}
|
|
|
|
last = i;
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
|
|
|
if (!first) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
first--;
|
|
|
|
|
|
|
|
// Dump a few words before the first frame.
|
2013-11-22 03:17:20 +08:00
|
|
|
word_t sp = backtrace->GetFrame(first)->sp - STACK_WORDS * sizeof(word_t);
|
2014-06-11 02:53:08 +08:00
|
|
|
dump_stack_segment(backtrace, log, &sp, STACK_WORDS, -1);
|
2014-01-11 08:33:16 +08:00
|
|
|
|
|
|
|
// Dump a few words from all successive frames.
|
|
|
|
// Only log the first 3 frames, put the rest in the tombstone.
|
|
|
|
for (size_t i = first; i <= last; i++) {
|
|
|
|
const backtrace_frame_data_t* frame = backtrace->GetFrame(i);
|
|
|
|
if (sp != frame->sp) {
|
2014-06-11 02:53:08 +08:00
|
|
|
_LOG(log, logtype::STACK, " ........ ........\n");
|
2014-01-11 08:33:16 +08:00
|
|
|
sp = frame->sp;
|
|
|
|
}
|
|
|
|
if (i == last) {
|
2014-06-11 02:53:08 +08:00
|
|
|
dump_stack_segment(backtrace, log, &sp, STACK_WORDS, i);
|
2014-01-11 08:33:16 +08:00
|
|
|
if (sp < frame->sp + frame->stack_size) {
|
2014-06-11 02:53:08 +08:00
|
|
|
_LOG(log, logtype::STACK, " ........ ........\n");
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
|
|
|
} else {
|
2013-11-22 03:17:20 +08:00
|
|
|
size_t words = frame->stack_size / sizeof(word_t);
|
2014-01-11 08:33:16 +08:00
|
|
|
if (words == 0) {
|
|
|
|
words = 1;
|
|
|
|
} else if (words > STACK_WORDS) {
|
|
|
|
words = STACK_WORDS;
|
|
|
|
}
|
2014-06-11 02:53:08 +08:00
|
|
|
dump_stack_segment(backtrace, log, &sp, words, i);
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
|
|
|
|
2015-06-03 05:52:44 +08:00
|
|
|
static std::string get_addr_string(uintptr_t addr) {
|
|
|
|
std::string addr_str;
|
|
|
|
#if defined(__LP64__)
|
|
|
|
addr_str = android::base::StringPrintf("%08x'%08x",
|
|
|
|
static_cast<uint32_t>(addr >> 32),
|
|
|
|
static_cast<uint32_t>(addr & 0xffffffff));
|
|
|
|
#else
|
|
|
|
addr_str = android::base::StringPrintf("%08x", addr);
|
|
|
|
#endif
|
|
|
|
return addr_str;
|
|
|
|
}
|
|
|
|
|
2015-02-28 05:39:47 +08:00
|
|
|
static void dump_all_maps(Backtrace* backtrace, BacktraceMap* map, log_t* log, pid_t tid) {
|
|
|
|
bool print_fault_address_marker = false;
|
2015-02-10 09:06:27 +08:00
|
|
|
uintptr_t addr = 0;
|
2014-01-11 08:33:16 +08:00
|
|
|
siginfo_t si;
|
|
|
|
memset(&si, 0, sizeof(si));
|
2015-06-03 05:52:44 +08:00
|
|
|
if (ptrace(PTRACE_GETSIGINFO, tid, 0, &si) != -1) {
|
2015-02-28 05:39:47 +08:00
|
|
|
print_fault_address_marker = signal_has_si_addr(si.si_signo);
|
2015-02-10 09:06:27 +08:00
|
|
|
addr = reinterpret_cast<uintptr_t>(si.si_addr);
|
2015-06-03 05:52:44 +08:00
|
|
|
} else {
|
2015-06-18 09:35:59 +08:00
|
|
|
ALOGE("Cannot get siginfo for %d: %s\n", tid, strerror(errno));
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2015-02-28 05:39:47 +08:00
|
|
|
_LOG(log, logtype::MAPS, "\n");
|
|
|
|
if (!print_fault_address_marker) {
|
|
|
|
_LOG(log, logtype::MAPS, "memory map:\n");
|
|
|
|
} else {
|
|
|
|
_LOG(log, logtype::MAPS, "memory map: (fault address prefixed with --->)\n");
|
|
|
|
if (map->begin() != map->end() && addr < map->begin()->start) {
|
2015-06-03 05:52:44 +08:00
|
|
|
_LOG(log, logtype::MAPS, "--->Fault address falls at %s before any mapped regions\n",
|
|
|
|
get_addr_string(addr).c_str());
|
2015-02-28 05:39:47 +08:00
|
|
|
print_fault_address_marker = false;
|
|
|
|
}
|
2014-07-08 03:33:50 +08:00
|
|
|
}
|
2014-01-11 08:33:16 +08:00
|
|
|
|
2015-02-28 05:39:47 +08:00
|
|
|
std::string line;
|
2014-01-15 12:16:30 +08:00
|
|
|
for (BacktraceMap::const_iterator it = map->begin(); it != map->end(); ++it) {
|
2015-02-28 05:39:47 +08:00
|
|
|
line = " ";
|
|
|
|
if (print_fault_address_marker) {
|
|
|
|
if (addr < it->start) {
|
2015-06-03 05:52:44 +08:00
|
|
|
_LOG(log, logtype::MAPS, "--->Fault address falls at %s between mapped regions\n",
|
|
|
|
get_addr_string(addr).c_str());
|
2015-02-28 05:39:47 +08:00
|
|
|
print_fault_address_marker = false;
|
|
|
|
} else if (addr >= it->start && addr < it->end) {
|
|
|
|
line = "--->";
|
|
|
|
print_fault_address_marker = false;
|
|
|
|
}
|
|
|
|
}
|
2015-06-03 05:52:44 +08:00
|
|
|
line += get_addr_string(it->start) + '-' + get_addr_string(it->end - 1) + ' ';
|
2015-02-28 05:39:47 +08:00
|
|
|
if (it->flags & PROT_READ) {
|
|
|
|
line += 'r';
|
|
|
|
} else {
|
|
|
|
line += '-';
|
|
|
|
}
|
|
|
|
if (it->flags & PROT_WRITE) {
|
|
|
|
line += 'w';
|
|
|
|
} else {
|
|
|
|
line += '-';
|
|
|
|
}
|
|
|
|
if (it->flags & PROT_EXEC) {
|
|
|
|
line += 'x';
|
|
|
|
} else {
|
|
|
|
line += '-';
|
|
|
|
}
|
2015-05-07 03:50:09 +08:00
|
|
|
line += android::base::StringPrintf(" %8" PRIxPTR " %8" PRIxPTR,
|
|
|
|
it->offset, it->end - it->start);
|
2015-06-03 05:52:44 +08:00
|
|
|
bool space_needed = true;
|
2015-02-28 05:39:47 +08:00
|
|
|
if (it->name.length() > 0) {
|
2015-06-03 05:52:44 +08:00
|
|
|
space_needed = false;
|
2015-02-28 05:39:47 +08:00
|
|
|
line += " " + it->name;
|
|
|
|
std::string build_id;
|
|
|
|
if ((it->flags & PROT_READ) && elf_get_build_id(backtrace, it->start, &build_id)) {
|
|
|
|
line += " (BuildId: " + build_id + ")";
|
|
|
|
}
|
2014-06-20 07:47:59 +08:00
|
|
|
}
|
2015-05-02 06:02:03 +08:00
|
|
|
if (it->load_base != 0) {
|
2015-06-03 05:52:44 +08:00
|
|
|
if (space_needed) {
|
|
|
|
line += ' ';
|
|
|
|
}
|
2015-05-02 06:02:03 +08:00
|
|
|
line += android::base::StringPrintf(" (load base 0x%" PRIxPTR ")", it->load_base);
|
|
|
|
}
|
2015-02-28 05:39:47 +08:00
|
|
|
_LOG(log, logtype::MAPS, "%s\n", line.c_str());
|
2014-06-20 07:47:59 +08:00
|
|
|
}
|
2015-02-28 05:39:47 +08:00
|
|
|
if (print_fault_address_marker) {
|
2015-06-03 05:52:44 +08:00
|
|
|
_LOG(log, logtype::MAPS, "--->Fault address falls at %s after any mapped regions\n",
|
|
|
|
get_addr_string(addr).c_str());
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
|
|
|
|
2015-02-10 09:06:27 +08:00
|
|
|
static void dump_backtrace_and_stack(Backtrace* backtrace, log_t* log) {
|
|
|
|
if (backtrace->NumFrames()) {
|
|
|
|
_LOG(log, logtype::BACKTRACE, "\nbacktrace:\n");
|
|
|
|
dump_backtrace_to_log(backtrace, log, " ");
|
2014-06-11 02:53:08 +08:00
|
|
|
|
2015-02-10 09:06:27 +08:00
|
|
|
_LOG(log, logtype::STACK, "\nstack:\n");
|
|
|
|
dump_stack(backtrace, log);
|
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
// Return true if some thread is not detached cleanly
|
2013-10-03 03:26:48 +08:00
|
|
|
static bool dump_sibling_thread_report(
|
2014-01-15 12:16:30 +08:00
|
|
|
log_t* log, pid_t pid, pid_t tid, int* total_sleep_time_usec, BacktraceMap* map) {
|
2014-01-11 08:33:16 +08:00
|
|
|
char task_path[64];
|
2014-06-11 02:53:08 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
snprintf(task_path, sizeof(task_path), "/proc/%d/task", pid);
|
|
|
|
|
|
|
|
DIR* d = opendir(task_path);
|
|
|
|
// Bail early if the task directory cannot be opened
|
|
|
|
if (d == NULL) {
|
2014-06-19 05:17:57 +08:00
|
|
|
ALOGE("Cannot open /proc/%d/task\n", pid);
|
2014-01-11 08:33:16 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool detach_failed = false;
|
|
|
|
struct dirent* de;
|
|
|
|
while ((de = readdir(d)) != NULL) {
|
|
|
|
// Ignore "." and ".."
|
|
|
|
if (!strcmp(de->d_name, ".") || !strcmp(de->d_name, "..")) {
|
|
|
|
continue;
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
// The main thread at fault has been handled individually
|
|
|
|
char* end;
|
|
|
|
pid_t new_tid = strtoul(de->d_name, &end, 10);
|
|
|
|
if (*end || new_tid == tid) {
|
|
|
|
continue;
|
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
// Skip this thread if cannot ptrace it
|
|
|
|
if (ptrace(PTRACE_ATTACH, new_tid, 0, 0) < 0) {
|
2015-06-18 09:35:59 +08:00
|
|
|
ALOGE("ptrace attach to %d failed: %s\n", new_tid, strerror(errno));
|
2014-01-11 08:33:16 +08:00
|
|
|
continue;
|
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-11-01 12:34:38 +08:00
|
|
|
if (wait_for_sigstop(new_tid, total_sleep_time_usec, &detach_failed) == -1) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2014-06-24 02:03:40 +08:00
|
|
|
log->current_tid = new_tid;
|
2014-06-11 02:53:08 +08:00
|
|
|
_LOG(log, logtype::THREAD, "--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ---\n");
|
|
|
|
dump_thread_info(log, pid, new_tid);
|
|
|
|
|
2015-02-10 09:06:27 +08:00
|
|
|
dump_registers(log, new_tid);
|
2015-05-16 08:30:21 +08:00
|
|
|
std::unique_ptr<Backtrace> backtrace(Backtrace::Create(pid, new_tid, map));
|
2014-01-11 08:33:16 +08:00
|
|
|
if (backtrace->Unwind(0)) {
|
2015-02-10 09:06:27 +08:00
|
|
|
dump_backtrace_and_stack(backtrace.get(), log);
|
2015-05-15 06:39:52 +08:00
|
|
|
} else {
|
|
|
|
ALOGE("Unwind of sibling failed: pid = %d, tid = %d", pid, new_tid);
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-06-11 02:53:08 +08:00
|
|
|
log->current_tid = log->crashed_tid;
|
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
if (ptrace(PTRACE_DETACH, new_tid, 0, 0) != 0) {
|
2015-06-18 09:35:59 +08:00
|
|
|
ALOGE("ptrace detach from %d failed: %s\n", new_tid, strerror(errno));
|
2014-01-11 08:33:16 +08:00
|
|
|
detach_failed = true;
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
closedir(d);
|
|
|
|
return detach_failed;
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
// Reads the contents of the specified log device, filters out the entries
|
|
|
|
// that don't match the specified pid, and writes them to the tombstone file.
|
|
|
|
//
|
2014-06-28 06:55:19 +08:00
|
|
|
// If "tail" is non-zero, log the last "tail" number of lines.
|
2014-05-15 03:37:22 +08:00
|
|
|
static EventTagMap* g_eventTagMap = NULL;
|
|
|
|
|
2014-06-28 06:55:19 +08:00
|
|
|
static void dump_log_file(
|
|
|
|
log_t* log, pid_t pid, const char* filename, unsigned int tail) {
|
2014-01-11 08:33:16 +08:00
|
|
|
bool first = true;
|
2014-06-28 06:55:19 +08:00
|
|
|
struct logger_list* logger_list;
|
2014-01-11 08:33:16 +08:00
|
|
|
|
2014-07-26 03:25:48 +08:00
|
|
|
if (!log->should_retrieve_logcat) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2013-11-23 02:53:34 +08:00
|
|
|
logger_list = android_logger_list_open(
|
2015-01-27 02:46:44 +08:00
|
|
|
android_name_to_log_id(filename), ANDROID_LOG_RDONLY | ANDROID_LOG_NONBLOCK, tail, pid);
|
2014-01-11 08:33:16 +08:00
|
|
|
|
2013-11-23 02:53:34 +08:00
|
|
|
if (!logger_list) {
|
2014-06-19 05:17:57 +08:00
|
|
|
ALOGE("Unable to open %s: %s\n", filename, strerror(errno));
|
2014-01-11 08:33:16 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2013-11-23 02:53:34 +08:00
|
|
|
struct log_msg log_entry;
|
2014-01-11 08:33:16 +08:00
|
|
|
|
|
|
|
while (true) {
|
2013-11-23 02:53:34 +08:00
|
|
|
ssize_t actual = android_logger_list_read(logger_list, &log_entry);
|
2014-06-28 06:55:19 +08:00
|
|
|
struct logger_entry* entry;
|
2013-11-23 02:53:34 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
if (actual < 0) {
|
2013-11-23 02:53:34 +08:00
|
|
|
if (actual == -EINTR) {
|
2014-01-11 08:33:16 +08:00
|
|
|
// interrupted by signal, retry
|
|
|
|
continue;
|
2013-11-23 02:53:34 +08:00
|
|
|
} else if (actual == -EAGAIN) {
|
2014-01-11 08:33:16 +08:00
|
|
|
// non-blocking EOF; we're done
|
|
|
|
break;
|
|
|
|
} else {
|
2015-06-18 09:35:59 +08:00
|
|
|
ALOGE("Error while reading log: %s\n", strerror(-actual));
|
2014-01-11 08:33:16 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else if (actual == 0) {
|
2015-06-18 09:35:59 +08:00
|
|
|
ALOGE("Got zero bytes while reading log: %s\n", strerror(errno));
|
2014-01-11 08:33:16 +08:00
|
|
|
break;
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
|
|
|
|
2014-06-19 05:17:57 +08:00
|
|
|
// NOTE: if you ALOGV something here, this will spin forever,
|
2014-01-11 08:33:16 +08:00
|
|
|
// because you will be writing as fast as you're reading. Any
|
|
|
|
// high-frequency debug diagnostics should just be written to
|
|
|
|
// the tombstone file.
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-06-28 06:55:19 +08:00
|
|
|
entry = &log_entry.entry_v1;
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
if (first) {
|
2014-06-28 01:32:22 +08:00
|
|
|
_LOG(log, logtype::LOGS, "--------- %slog %s\n",
|
2013-11-23 02:53:34 +08:00
|
|
|
tail ? "tail end of " : "", filename);
|
2014-01-11 08:33:16 +08:00
|
|
|
first = false;
|
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
// Msg format is: <priority:1><tag:N>\0<message:N>\0
|
|
|
|
//
|
|
|
|
// We want to display it in the same format as "logcat -v threadtime"
|
|
|
|
// (although in this case the pid is redundant).
|
|
|
|
static const char* kPrioChars = "!.VDIWEFS";
|
2013-11-23 02:53:34 +08:00
|
|
|
unsigned hdr_size = log_entry.entry.hdr_size;
|
|
|
|
if (!hdr_size) {
|
|
|
|
hdr_size = sizeof(log_entry.entry_v1);
|
|
|
|
}
|
2014-05-15 03:37:22 +08:00
|
|
|
char* msg = reinterpret_cast<char*>(log_entry.buf) + hdr_size;
|
|
|
|
|
|
|
|
char timeBuf[32];
|
|
|
|
time_t sec = static_cast<time_t>(entry->sec);
|
|
|
|
struct tm tmBuf;
|
|
|
|
struct tm* ptm;
|
|
|
|
ptm = localtime_r(&sec, &tmBuf);
|
|
|
|
strftime(timeBuf, sizeof(timeBuf), "%m-%d %H:%M:%S", ptm);
|
|
|
|
|
|
|
|
if (log_entry.id() == LOG_ID_EVENTS) {
|
|
|
|
if (!g_eventTagMap) {
|
|
|
|
g_eventTagMap = android_openEventTagMap(EVENT_TAG_MAP_FILE);
|
|
|
|
}
|
|
|
|
AndroidLogEntry e;
|
|
|
|
char buf[512];
|
|
|
|
android_log_processBinaryLogBuffer(entry, &e, g_eventTagMap, buf, sizeof(buf));
|
2014-06-11 02:53:08 +08:00
|
|
|
_LOG(log, logtype::LOGS, "%s.%03d %5d %5d %c %-8s: %s\n",
|
2014-05-15 03:37:22 +08:00
|
|
|
timeBuf, entry->nsec / 1000000, entry->pid, entry->tid,
|
|
|
|
'I', e.tag, e.message);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2013-11-23 02:53:34 +08:00
|
|
|
unsigned char prio = msg[0];
|
|
|
|
char* tag = msg + 1;
|
|
|
|
msg = tag + strlen(tag) + 1;
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
// consume any trailing newlines
|
2013-12-13 04:21:20 +08:00
|
|
|
char* nl = msg + strlen(msg) - 1;
|
|
|
|
while (nl >= msg && *nl == '\n') {
|
2014-06-28 06:55:19 +08:00
|
|
|
*nl-- = '\0';
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
char prioChar = (prio < strlen(kPrioChars) ? kPrioChars[prio] : '?');
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2013-12-13 04:21:20 +08:00
|
|
|
// Look for line breaks ('\n') and display each text line
|
|
|
|
// on a separate line, prefixed with the header, like logcat does.
|
|
|
|
do {
|
|
|
|
nl = strchr(msg, '\n');
|
|
|
|
if (nl) {
|
|
|
|
*nl = '\0';
|
|
|
|
++nl;
|
|
|
|
}
|
|
|
|
|
2014-06-11 02:53:08 +08:00
|
|
|
_LOG(log, logtype::LOGS, "%s.%03d %5d %5d %c %-8s: %s\n",
|
2013-12-13 04:21:20 +08:00
|
|
|
timeBuf, entry->nsec / 1000000, entry->pid, entry->tid,
|
|
|
|
prioChar, tag, msg);
|
|
|
|
} while ((msg = nl));
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2013-11-23 02:53:34 +08:00
|
|
|
android_logger_list_free(logger_list);
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
// Dumps the logs generated by the specified pid to the tombstone, from both
|
|
|
|
// "system" and "main" log devices. Ideally we'd interleave the output.
|
2014-06-28 06:55:19 +08:00
|
|
|
static void dump_logs(log_t* log, pid_t pid, unsigned int tail) {
|
2013-11-23 02:53:34 +08:00
|
|
|
dump_log_file(log, pid, "system", tail);
|
|
|
|
dump_log_file(log, pid, "main", tail);
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
static void dump_abort_message(Backtrace* backtrace, log_t* log, uintptr_t address) {
|
2013-04-05 04:52:01 +08:00
|
|
|
if (address == 0) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
address += sizeof(size_t); // Skip the buffer length.
|
|
|
|
|
|
|
|
char msg[512];
|
|
|
|
memset(msg, 0, sizeof(msg));
|
|
|
|
char* p = &msg[0];
|
|
|
|
while (p < &msg[sizeof(msg)]) {
|
2013-11-22 03:17:20 +08:00
|
|
|
word_t data;
|
|
|
|
size_t len = sizeof(word_t);
|
2014-01-11 08:33:16 +08:00
|
|
|
if (!backtrace->ReadWord(address, &data)) {
|
2013-04-05 04:52:01 +08:00
|
|
|
break;
|
|
|
|
}
|
2013-11-22 03:17:20 +08:00
|
|
|
address += sizeof(word_t);
|
2013-04-05 04:52:01 +08:00
|
|
|
|
2013-11-22 03:17:20 +08:00
|
|
|
while (len > 0 && (*p++ = (data >> (sizeof(word_t) - len) * 8) & 0xff) != 0)
|
|
|
|
len--;
|
2013-04-05 04:52:01 +08:00
|
|
|
}
|
|
|
|
msg[sizeof(msg) - 1] = '\0';
|
|
|
|
|
2014-06-11 02:53:08 +08:00
|
|
|
_LOG(log, logtype::HEADER, "Abort message: '%s'\n", msg);
|
2013-04-05 04:52:01 +08:00
|
|
|
}
|
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
// Dumps all information about the specified pid to the tombstone.
|
2014-04-26 07:05:34 +08:00
|
|
|
static bool dump_crash(log_t* log, pid_t pid, pid_t tid, int signal, int si_code,
|
|
|
|
uintptr_t abort_msg_address, bool dump_sibling_threads,
|
|
|
|
int* total_sleep_time_usec) {
|
2014-01-11 08:33:16 +08:00
|
|
|
// don't copy log messages to tombstone unless this is a dev device
|
|
|
|
char value[PROPERTY_VALUE_MAX];
|
|
|
|
property_get("ro.debuggable", value, "0");
|
|
|
|
bool want_logs = (value[0] == '1');
|
|
|
|
|
|
|
|
if (log->amfd >= 0) {
|
|
|
|
// Activity Manager protocol: binary 32-bit network-byte-order ints for the
|
|
|
|
// pid and signal number, followed by the raw text of the dump, culminating
|
|
|
|
// in a zero byte that marks end-of-data.
|
|
|
|
uint32_t datum = htonl(pid);
|
|
|
|
TEMP_FAILURE_RETRY( write(log->amfd, &datum, 4) );
|
|
|
|
datum = htonl(signal);
|
|
|
|
TEMP_FAILURE_RETRY( write(log->amfd, &datum, 4) );
|
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-06-11 02:53:08 +08:00
|
|
|
_LOG(log, logtype::HEADER,
|
2014-01-11 08:33:16 +08:00
|
|
|
"*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***\n");
|
2014-06-03 06:02:20 +08:00
|
|
|
dump_header_info(log);
|
2014-06-11 02:53:08 +08:00
|
|
|
dump_thread_info(log, pid, tid);
|
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
if (signal) {
|
2014-04-26 07:05:34 +08:00
|
|
|
dump_signal_info(log, tid, signal, si_code);
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2015-05-16 08:30:21 +08:00
|
|
|
std::unique_ptr<BacktraceMap> map(BacktraceMap::Create(pid));
|
|
|
|
std::unique_ptr<Backtrace> backtrace(Backtrace::Create(pid, tid, map.get()));
|
2015-02-10 09:06:27 +08:00
|
|
|
dump_abort_message(backtrace.get(), log, abort_msg_address);
|
|
|
|
dump_registers(log, tid);
|
2014-01-11 08:33:16 +08:00
|
|
|
if (backtrace->Unwind(0)) {
|
2015-02-10 09:06:27 +08:00
|
|
|
dump_backtrace_and_stack(backtrace.get(), log);
|
2015-05-15 06:39:52 +08:00
|
|
|
} else {
|
|
|
|
ALOGE("Unwind failed: pid = %d, tid = %d", pid, tid);
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2015-05-23 05:26:13 +08:00
|
|
|
dump_memory_and_code(log, backtrace.get());
|
2015-05-15 06:39:52 +08:00
|
|
|
if (map.get() != nullptr) {
|
|
|
|
dump_all_maps(backtrace.get(), map.get(), log, tid);
|
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
if (want_logs) {
|
2013-11-23 02:53:34 +08:00
|
|
|
dump_logs(log, pid, 5);
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2014-01-07 11:16:33 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
bool detach_failed = false;
|
|
|
|
if (dump_sibling_threads) {
|
2014-01-23 11:21:07 +08:00
|
|
|
detach_failed = dump_sibling_thread_report(log, pid, tid, total_sleep_time_usec, map.get());
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2013-03-20 04:12:23 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
if (want_logs) {
|
2013-11-23 02:53:34 +08:00
|
|
|
dump_logs(log, pid, 0);
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
// send EOD to the Activity Manager, then wait for its ack to avoid racing ahead
|
|
|
|
// and killing the target out from under it
|
|
|
|
if (log->amfd >= 0) {
|
|
|
|
uint8_t eodMarker = 0;
|
|
|
|
TEMP_FAILURE_RETRY( write(log->amfd, &eodMarker, 1) );
|
|
|
|
// 3 sec timeout reading the ack; we're fine if that happens
|
|
|
|
TEMP_FAILURE_RETRY( read(log->amfd, &eodMarker, 1) );
|
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
return detach_failed;
|
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
// find_and_open_tombstone - find an available tombstone slot, if any, of the
|
|
|
|
// form tombstone_XX where XX is 00 to MAX_TOMBSTONES-1, inclusive. If no
|
|
|
|
// file is available, we reuse the least-recently-modified file.
|
|
|
|
//
|
|
|
|
// Returns the path of the tombstone file, allocated using malloc(). Caller must free() it.
|
|
|
|
static char* find_and_open_tombstone(int* fd) {
|
2014-02-08 05:25:26 +08:00
|
|
|
// In a single pass, find an available slot and, in case none
|
2014-01-11 08:33:16 +08:00
|
|
|
// exist, find and record the least-recently-modified file.
|
|
|
|
char path[128];
|
2014-02-08 05:25:26 +08:00
|
|
|
int oldest = -1;
|
|
|
|
struct stat oldest_sb;
|
2014-01-11 08:33:16 +08:00
|
|
|
for (int i = 0; i < MAX_TOMBSTONES; i++) {
|
2013-12-19 00:44:24 +08:00
|
|
|
snprintf(path, sizeof(path), TOMBSTONE_TEMPLATE, i);
|
2014-01-11 08:33:16 +08:00
|
|
|
|
2014-02-08 05:25:26 +08:00
|
|
|
struct stat sb;
|
2014-01-11 08:33:16 +08:00
|
|
|
if (!stat(path, &sb)) {
|
2014-02-08 05:25:26 +08:00
|
|
|
if (oldest < 0 || sb.st_mtime < oldest_sb.st_mtime) {
|
2014-01-11 08:33:16 +08:00
|
|
|
oldest = i;
|
2014-02-08 05:25:26 +08:00
|
|
|
oldest_sb.st_mtime = sb.st_mtime;
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (errno != ENOENT)
|
|
|
|
continue;
|
|
|
|
|
2014-07-17 11:03:46 +08:00
|
|
|
*fd = open(path, O_CREAT | O_EXCL | O_WRONLY | O_NOFOLLOW | O_CLOEXEC, 0600);
|
2014-01-11 08:33:16 +08:00
|
|
|
if (*fd < 0)
|
|
|
|
continue; // raced ?
|
2012-06-07 07:25:03 +08:00
|
|
|
|
|
|
|
fchown(*fd, AID_SYSTEM, AID_SYSTEM);
|
|
|
|
return strdup(path);
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
|
|
|
|
2014-02-08 05:25:26 +08:00
|
|
|
if (oldest < 0) {
|
2014-06-19 05:17:57 +08:00
|
|
|
ALOGE("Failed to find a valid tombstone, default to using tombstone 0.\n");
|
2014-02-08 05:25:26 +08:00
|
|
|
oldest = 0;
|
|
|
|
}
|
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
// we didn't find an available file, so we clobber the oldest one
|
2013-12-19 00:44:24 +08:00
|
|
|
snprintf(path, sizeof(path), TOMBSTONE_TEMPLATE, oldest);
|
2014-07-17 11:03:46 +08:00
|
|
|
*fd = open(path, O_CREAT | O_TRUNC | O_WRONLY | O_NOFOLLOW | O_CLOEXEC, 0600);
|
2014-01-11 08:33:16 +08:00
|
|
|
if (*fd < 0) {
|
2014-06-19 05:17:57 +08:00
|
|
|
ALOGE("failed to open tombstone file '%s': %s\n", path, strerror(errno));
|
2014-01-11 08:33:16 +08:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
fchown(*fd, AID_SYSTEM, AID_SYSTEM);
|
|
|
|
return strdup(path);
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|
|
|
|
|
2013-03-20 04:12:23 +08:00
|
|
|
static int activity_manager_connect() {
|
2014-01-11 08:33:16 +08:00
|
|
|
int amfd = socket(PF_UNIX, SOCK_STREAM, 0);
|
|
|
|
if (amfd >= 0) {
|
|
|
|
struct sockaddr_un address;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
memset(&address, 0, sizeof(address));
|
|
|
|
address.sun_family = AF_UNIX;
|
|
|
|
strncpy(address.sun_path, NCRASH_SOCKET_PATH, sizeof(address.sun_path));
|
|
|
|
err = TEMP_FAILURE_RETRY(connect(
|
|
|
|
amfd, reinterpret_cast<struct sockaddr*>(&address), sizeof(address)));
|
|
|
|
if (!err) {
|
|
|
|
struct timeval tv;
|
|
|
|
memset(&tv, 0, sizeof(tv));
|
|
|
|
tv.tv_sec = 1; // tight leash
|
|
|
|
err = setsockopt(amfd, SOL_SOCKET, SO_SNDTIMEO, &tv, sizeof(tv));
|
|
|
|
if (!err) {
|
|
|
|
tv.tv_sec = 3; // 3 seconds on handshake read
|
|
|
|
err = setsockopt(amfd, SOL_SOCKET, SO_RCVTIMEO, &tv, sizeof(tv));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (err) {
|
|
|
|
close(amfd);
|
|
|
|
amfd = -1;
|
2013-03-20 04:12:23 +08:00
|
|
|
}
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2013-03-20 04:12:23 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
return amfd;
|
2013-03-20 04:12:23 +08:00
|
|
|
}
|
|
|
|
|
2014-04-26 07:05:34 +08:00
|
|
|
char* engrave_tombstone(pid_t pid, pid_t tid, int signal, int original_si_code,
|
2014-06-19 05:17:57 +08:00
|
|
|
uintptr_t abort_msg_address, bool dump_sibling_threads,
|
2014-04-26 07:05:34 +08:00
|
|
|
bool* detach_failed, int* total_sleep_time_usec) {
|
2014-06-11 02:53:08 +08:00
|
|
|
|
|
|
|
log_t log;
|
|
|
|
log.current_tid = tid;
|
|
|
|
log.crashed_tid = tid;
|
|
|
|
|
2013-12-19 00:44:24 +08:00
|
|
|
if ((mkdir(TOMBSTONE_DIR, 0755) == -1) && (errno != EEXIST)) {
|
2015-06-18 09:35:59 +08:00
|
|
|
ALOGE("failed to create %s: %s\n", TOMBSTONE_DIR, strerror(errno));
|
2013-12-19 00:44:24 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (chown(TOMBSTONE_DIR, AID_SYSTEM, AID_SYSTEM) == -1) {
|
2015-06-18 09:35:59 +08:00
|
|
|
ALOGE("failed to change ownership of %s: %s\n", TOMBSTONE_DIR, strerror(errno));
|
2013-12-19 00:44:24 +08:00
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-05-06 02:16:47 +08:00
|
|
|
int fd = -1;
|
|
|
|
char* path = NULL;
|
|
|
|
if (selinux_android_restorecon(TOMBSTONE_DIR, 0) == 0) {
|
|
|
|
path = find_and_open_tombstone(&fd);
|
|
|
|
} else {
|
2015-06-18 09:35:59 +08:00
|
|
|
ALOGE("Failed to restore security context, not writing tombstone.\n");
|
2014-01-11 08:33:16 +08:00
|
|
|
}
|
2012-07-19 21:38:06 +08:00
|
|
|
|
2014-06-19 05:17:57 +08:00
|
|
|
if (fd < 0) {
|
2015-06-18 09:35:59 +08:00
|
|
|
ALOGE("Skipping tombstone write, nothing to do.\n");
|
2014-01-11 08:33:16 +08:00
|
|
|
*detach_failed = false;
|
|
|
|
return NULL;
|
|
|
|
}
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
log.tfd = fd;
|
2014-05-06 02:16:47 +08:00
|
|
|
// Preserve amfd since it can be modified through the calls below without
|
|
|
|
// being closed.
|
|
|
|
int amfd = activity_manager_connect();
|
|
|
|
log.amfd = amfd;
|
2014-04-26 07:05:34 +08:00
|
|
|
*detach_failed = dump_crash(&log, pid, tid, signal, original_si_code, abort_msg_address,
|
|
|
|
dump_sibling_threads, total_sleep_time_usec);
|
2012-06-07 07:25:03 +08:00
|
|
|
|
2015-05-06 03:23:06 +08:00
|
|
|
_LOG(&log, logtype::BACKTRACE, "\nTombstone written to: %s\n", path);
|
2014-06-11 02:53:08 +08:00
|
|
|
|
2014-05-06 02:16:47 +08:00
|
|
|
// Either of these file descriptors can be -1, any error is ignored.
|
|
|
|
close(amfd);
|
2014-01-11 08:33:16 +08:00
|
|
|
close(fd);
|
2014-05-06 02:16:47 +08:00
|
|
|
|
2014-01-11 08:33:16 +08:00
|
|
|
return path;
|
2012-06-07 07:25:03 +08:00
|
|
|
}
|