Home | History | Annotate | Download | only in src
      1 /*
      2  * Copyright (C) 2016 The Android Open Source Project
      3  *
      4  * Licensed under the Apache License, Version 2.0 (the "License");
      5  * you may not use this file except in compliance with the License.
      6  * You may obtain a copy of the License at
      7  *
      8  *      http://www.apache.org/licenses/LICENSE-2.0
      9  *
     10  * Unless required by applicable law or agreed to in writing, software
     11  * distributed under the License is distributed on an "AS IS" BASIS,
     12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     13  * See the License for the specific language governing permissions and
     14  * limitations under the License.
     15  */
     16 #define DEBUG false
     17 #include "Log.h"
     18 
     19 #include "Section.h"
     20 
     21 #include <dirent.h>
     22 #include <errno.h>
     23 
     24 #include <mutex>
     25 #include <set>
     26 
     27 #include <android-base/file.h>
     28 #include <android-base/properties.h>
     29 #include <android-base/stringprintf.h>
     30 #include <android/util/protobuf.h>
     31 #include <android/util/ProtoOutputStream.h>
     32 #include <binder/IServiceManager.h>
     33 #include <debuggerd/client.h>
     34 #include <dumputils/dump_utils.h>
     35 #include <log/log_event_list.h>
     36 #include <log/log_read.h>
     37 #include <log/logprint.h>
     38 #include <private/android_logger.h>
     39 
     40 #include "FdBuffer.h"
     41 #include "Privacy.h"
     42 #include "frameworks/base/core/proto/android/os/backtrace.proto.h"
     43 #include "frameworks/base/core/proto/android/os/data.proto.h"
     44 #include "frameworks/base/core/proto/android/util/log.proto.h"
     45 #include "incidentd_util.h"
     46 
     47 namespace android {
     48 namespace os {
     49 namespace incidentd {
     50 
     51 using namespace android::base;
     52 using namespace android::util;
     53 
     54 // special section ids
     55 const int FIELD_ID_INCIDENT_METADATA = 2;
     56 
     57 // incident section parameters
     58 const char INCIDENT_HELPER[] = "/system/bin/incident_helper";
     59 const char* GZIP[] = {"/system/bin/gzip", NULL};
     60 
     61 static pid_t fork_execute_incident_helper(const int id, Fpipe* p2cPipe, Fpipe* c2pPipe) {
     62     const char* ihArgs[]{INCIDENT_HELPER, "-s", String8::format("%d", id).string(), NULL};
     63     return fork_execute_cmd(const_cast<char**>(ihArgs), p2cPipe, c2pPipe);
     64 }
     65 
     66 bool section_requires_specific_mention(int sectionId) {
     67     switch (sectionId) {
     68         case 3025: // restricted_images
     69             return true;
     70         case 3026: // system_trace
     71             return true;
     72         default:
     73             return false;
     74     }
     75 }
     76 
     77 // ================================================================================
     78 Section::Section(int i, int64_t timeoutMs)
     79     : id(i),
     80       timeoutMs(timeoutMs) {
     81 }
     82 
     83 Section::~Section() {}
     84 
     85 // ================================================================================
     86 static inline bool isSysfs(const char* filename) { return strncmp(filename, "/sys/", 5) == 0; }
     87 
     88 FileSection::FileSection(int id, const char* filename, const int64_t timeoutMs)
     89     : Section(id, timeoutMs), mFilename(filename) {
     90     name = "file ";
     91     name += filename;
     92     mIsSysfs = isSysfs(filename);
     93 }
     94 
     95 FileSection::~FileSection() {}
     96 
     97 status_t FileSection::Execute(ReportWriter* writer) const {
     98     // read from mFilename first, make sure the file is available
     99     // add O_CLOEXEC to make sure it is closed when exec incident helper
    100     unique_fd fd(open(mFilename, O_RDONLY | O_CLOEXEC));
    101     if (fd.get() == -1) {
    102         ALOGW("[%s] failed to open file", this->name.string());
    103         // There may be some devices/architectures that won't have the file.
    104         // Just return here without an error.
    105         return NO_ERROR;
    106     }
    107 
    108     FdBuffer buffer;
    109     Fpipe p2cPipe;
    110     Fpipe c2pPipe;
    111     // initiate pipes to pass data to/from incident_helper
    112     if (!p2cPipe.init() || !c2pPipe.init()) {
    113         ALOGW("[%s] failed to setup pipes", this->name.string());
    114         return -errno;
    115     }
    116 
    117     pid_t pid = fork_execute_incident_helper(this->id, &p2cPipe, &c2pPipe);
    118     if (pid == -1) {
    119         ALOGW("[%s] failed to fork", this->name.string());
    120         return -errno;
    121     }
    122 
    123     // parent process
    124     status_t readStatus = buffer.readProcessedDataInStream(fd.get(), std::move(p2cPipe.writeFd()),
    125                                                            std::move(c2pPipe.readFd()),
    126                                                            this->timeoutMs, mIsSysfs);
    127     writer->setSectionStats(buffer);
    128     if (readStatus != NO_ERROR || buffer.timedOut()) {
    129         ALOGW("[%s] failed to read data from incident helper: %s, timedout: %s",
    130               this->name.string(), strerror(-readStatus), buffer.timedOut() ? "true" : "false");
    131         kill_child(pid);
    132         return readStatus;
    133     }
    134 
    135     status_t ihStatus = wait_child(pid);
    136     if (ihStatus != NO_ERROR) {
    137         ALOGW("[%s] abnormal child process: %s", this->name.string(), strerror(-ihStatus));
    138         return ihStatus;
    139     }
    140 
    141     return writer->writeSection(buffer);
    142 }
    143 // ================================================================================
    144 GZipSection::GZipSection(int id, const char* filename, ...) : Section(id) {
    145     va_list args;
    146     va_start(args, filename);
    147     mFilenames = varargs(filename, args);
    148     va_end(args);
    149     name = "gzip";
    150     for (int i = 0; mFilenames[i] != NULL; i++) {
    151         name += " ";
    152         name += mFilenames[i];
    153     }
    154 }
    155 
    156 GZipSection::~GZipSection() { free(mFilenames); }
    157 
    158 status_t GZipSection::Execute(ReportWriter* writer) const {
    159     // Reads the files in order, use the first available one.
    160     int index = 0;
    161     unique_fd fd;
    162     while (mFilenames[index] != NULL) {
    163         fd.reset(open(mFilenames[index], O_RDONLY | O_CLOEXEC));
    164         if (fd.get() != -1) {
    165             break;
    166         }
    167         ALOGW("GZipSection failed to open file %s", mFilenames[index]);
    168         index++;  // look at the next file.
    169     }
    170     if (fd.get() == -1) {
    171         ALOGW("[%s] can't open all the files", this->name.string());
    172         return NO_ERROR;  // e.g. LAST_KMSG will reach here in user build.
    173     }
    174     FdBuffer buffer;
    175     Fpipe p2cPipe;
    176     Fpipe c2pPipe;
    177     // initiate pipes to pass data to/from gzip
    178     if (!p2cPipe.init() || !c2pPipe.init()) {
    179         ALOGW("[%s] failed to setup pipes", this->name.string());
    180         return -errno;
    181     }
    182 
    183     pid_t pid = fork_execute_cmd((char* const*)GZIP, &p2cPipe, &c2pPipe);
    184     if (pid == -1) {
    185         ALOGW("[%s] failed to fork", this->name.string());
    186         return -errno;
    187     }
    188     // parent process
    189 
    190     // construct Fdbuffer to output GZippedfileProto, the reason to do this instead of using
    191     // ProtoOutputStream is to avoid allocation of another buffer inside ProtoOutputStream.
    192     sp<EncodedBuffer> internalBuffer = buffer.data();
    193     internalBuffer->writeHeader((uint32_t)GZippedFileProto::FILENAME, WIRE_TYPE_LENGTH_DELIMITED);
    194     size_t fileLen = strlen(mFilenames[index]);
    195     internalBuffer->writeRawVarint32(fileLen);
    196     for (size_t i = 0; i < fileLen; i++) {
    197         internalBuffer->writeRawByte(mFilenames[index][i]);
    198     }
    199     internalBuffer->writeHeader((uint32_t)GZippedFileProto::GZIPPED_DATA,
    200                                 WIRE_TYPE_LENGTH_DELIMITED);
    201     size_t editPos = internalBuffer->wp()->pos();
    202     internalBuffer->wp()->move(8);  // reserve 8 bytes for the varint of the data size.
    203     size_t dataBeginAt = internalBuffer->wp()->pos();
    204     VLOG("[%s] editPos=%zu, dataBeginAt=%zu", this->name.string(), editPos, dataBeginAt);
    205 
    206     status_t readStatus = buffer.readProcessedDataInStream(
    207             fd.get(), std::move(p2cPipe.writeFd()), std::move(c2pPipe.readFd()), this->timeoutMs,
    208             isSysfs(mFilenames[index]));
    209     writer->setSectionStats(buffer);
    210     if (readStatus != NO_ERROR || buffer.timedOut()) {
    211         ALOGW("[%s] failed to read data from gzip: %s, timedout: %s", this->name.string(),
    212               strerror(-readStatus), buffer.timedOut() ? "true" : "false");
    213         kill_child(pid);
    214         return readStatus;
    215     }
    216 
    217     status_t gzipStatus = wait_child(pid);
    218     if (gzipStatus != NO_ERROR) {
    219         ALOGW("[%s] abnormal child process: %s", this->name.string(), strerror(-gzipStatus));
    220         return gzipStatus;
    221     }
    222     // Revisit the actual size from gzip result and edit the internal buffer accordingly.
    223     size_t dataSize = buffer.size() - dataBeginAt;
    224     internalBuffer->wp()->rewind()->move(editPos);
    225     internalBuffer->writeRawVarint32(dataSize);
    226     internalBuffer->copy(dataBeginAt, dataSize);
    227 
    228     return writer->writeSection(buffer);
    229 }
    230 
    231 // ================================================================================
    232 struct WorkerThreadData : public virtual RefBase {
    233     const WorkerThreadSection* section;
    234     Fpipe pipe;
    235 
    236     // Lock protects these fields
    237     mutex lock;
    238     bool workerDone;
    239     status_t workerError;
    240 
    241     explicit WorkerThreadData(const WorkerThreadSection* section);
    242     virtual ~WorkerThreadData();
    243 };
    244 
    245 WorkerThreadData::WorkerThreadData(const WorkerThreadSection* sec)
    246     : section(sec), workerDone(false), workerError(NO_ERROR) {}
    247 
    248 WorkerThreadData::~WorkerThreadData() {}
    249 
    250 // ================================================================================
    251 WorkerThreadSection::WorkerThreadSection(int id, const int64_t timeoutMs)
    252     : Section(id, timeoutMs) {}
    253 
    254 WorkerThreadSection::~WorkerThreadSection() {}
    255 
    256 void sigpipe_handler(int signum) {
    257     if (signum == SIGPIPE) {
    258         ALOGE("Wrote to a broken pipe\n");
    259     } else {
    260         ALOGE("Received unexpected signal: %d\n", signum);
    261     }
    262 }
    263 
    264 static void* worker_thread_func(void* cookie) {
    265     // Don't crash the service if we write to a closed pipe (which can happen if
    266     // dumping times out).
    267     signal(SIGPIPE, sigpipe_handler);
    268 
    269     WorkerThreadData* data = (WorkerThreadData*)cookie;
    270     status_t err = data->section->BlockingCall(data->pipe.writeFd().get());
    271 
    272     {
    273         unique_lock<mutex> lock(data->lock);
    274         data->workerDone = true;
    275         data->workerError = err;
    276     }
    277 
    278     data->pipe.writeFd().reset();
    279     data->decStrong(data->section);
    280     // data might be gone now. don't use it after this point in this thread.
    281     return NULL;
    282 }
    283 
    284 status_t WorkerThreadSection::Execute(ReportWriter* writer) const {
    285     status_t err = NO_ERROR;
    286     pthread_t thread;
    287     pthread_attr_t attr;
    288     bool workerDone = false;
    289     FdBuffer buffer;
    290 
    291     // Data shared between this thread and the worker thread.
    292     sp<WorkerThreadData> data = new WorkerThreadData(this);
    293 
    294     // Create the pipe
    295     if (!data->pipe.init()) {
    296         return -errno;
    297     }
    298 
    299     // Create the thread
    300     err = pthread_attr_init(&attr);
    301     if (err != 0) {
    302         return -err;
    303     }
    304     // TODO: Do we need to tweak thread priority?
    305     err = pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);
    306     if (err != 0) {
    307         pthread_attr_destroy(&attr);
    308         return -err;
    309     }
    310 
    311     // The worker thread needs a reference and we can't let the count go to zero
    312     // if that thread is slow to start.
    313     data->incStrong(this);
    314 
    315     err = pthread_create(&thread, &attr, worker_thread_func, (void*)data.get());
    316     pthread_attr_destroy(&attr);
    317     if (err != 0) {
    318         data->decStrong(this);
    319         return -err;
    320     }
    321 
    322     // Loop reading until either the timeout or the worker side is done (i.e. eof).
    323     err = buffer.read(data->pipe.readFd().get(), this->timeoutMs);
    324     if (err != NO_ERROR) {
    325         ALOGE("[%s] reader failed with error '%s'", this->name.string(), strerror(-err));
    326     }
    327 
    328     // Done with the read fd. The worker thread closes the write one so
    329     // we never race and get here first.
    330     data->pipe.readFd().reset();
    331 
    332     // If the worker side is finished, then return its error (which may overwrite
    333     // our possible error -- but it's more interesting anyway). If not, then we timed out.
    334     {
    335         unique_lock<mutex> lock(data->lock);
    336         if (data->workerError != NO_ERROR) {
    337             err = data->workerError;
    338             ALOGE("[%s] worker failed with error '%s'", this->name.string(), strerror(-err));
    339         }
    340         workerDone = data->workerDone;
    341     }
    342 
    343     writer->setSectionStats(buffer);
    344     if (err != NO_ERROR) {
    345         char errMsg[128];
    346         snprintf(errMsg, 128, "[%s] failed with error '%s'",
    347             this->name.string(), strerror(-err));
    348         writer->error(this, err, "WorkerThreadSection failed.");
    349         return NO_ERROR;
    350     }
    351     if (buffer.truncated()) {
    352         ALOGW("[%s] too large, truncating", this->name.string());
    353         // Do not write a truncated section. It won't pass through the PrivacyFilter.
    354         return NO_ERROR;
    355     }
    356     if (!workerDone || buffer.timedOut()) {
    357         ALOGW("[%s] timed out", this->name.string());
    358         return NO_ERROR;
    359     }
    360 
    361     // Write the data that was collected
    362     return writer->writeSection(buffer);
    363 }
    364 
    365 // ================================================================================
    366 CommandSection::CommandSection(int id, const int64_t timeoutMs, const char* command, ...)
    367     : Section(id, timeoutMs) {
    368     va_list args;
    369     va_start(args, command);
    370     mCommand = varargs(command, args);
    371     va_end(args);
    372     name = "cmd";
    373     for (int i = 0; mCommand[i] != NULL; i++) {
    374         name += " ";
    375         name += mCommand[i];
    376     }
    377 }
    378 
    379 CommandSection::CommandSection(int id, const char* command, ...) : Section(id) {
    380     va_list args;
    381     va_start(args, command);
    382     mCommand = varargs(command, args);
    383     va_end(args);
    384     name = "cmd";
    385     for (int i = 0; mCommand[i] != NULL; i++) {
    386         name += " ";
    387         name += mCommand[i];
    388     }
    389 }
    390 
    391 CommandSection::~CommandSection() { free(mCommand); }
    392 
    393 status_t CommandSection::Execute(ReportWriter* writer) const {
    394     FdBuffer buffer;
    395     Fpipe cmdPipe;
    396     Fpipe ihPipe;
    397 
    398     if (!cmdPipe.init() || !ihPipe.init()) {
    399         ALOGW("[%s] failed to setup pipes", this->name.string());
    400         return -errno;
    401     }
    402 
    403     pid_t cmdPid = fork_execute_cmd((char* const*)mCommand, NULL, &cmdPipe);
    404     if (cmdPid == -1) {
    405         ALOGW("[%s] failed to fork", this->name.string());
    406         return -errno;
    407     }
    408     pid_t ihPid = fork_execute_incident_helper(this->id, &cmdPipe, &ihPipe);
    409     if (ihPid == -1) {
    410         ALOGW("[%s] failed to fork", this->name.string());
    411         return -errno;
    412     }
    413 
    414     cmdPipe.writeFd().reset();
    415     status_t readStatus = buffer.read(ihPipe.readFd().get(), this->timeoutMs);
    416     writer->setSectionStats(buffer);
    417     if (readStatus != NO_ERROR || buffer.timedOut()) {
    418         ALOGW("[%s] failed to read data from incident helper: %s, timedout: %s",
    419               this->name.string(), strerror(-readStatus), buffer.timedOut() ? "true" : "false");
    420         kill_child(cmdPid);
    421         kill_child(ihPid);
    422         return readStatus;
    423     }
    424 
    425     // Waiting for command here has one trade-off: the failed status of command won't be detected
    426     // until buffer timeout, but it has advatage on starting the data stream earlier.
    427     status_t cmdStatus = wait_child(cmdPid);
    428     status_t ihStatus = wait_child(ihPid);
    429     if (cmdStatus != NO_ERROR || ihStatus != NO_ERROR) {
    430         ALOGW("[%s] abnormal child processes, return status: command: %s, incident helper: %s",
    431               this->name.string(), strerror(-cmdStatus), strerror(-ihStatus));
    432         // Not a fatal error.
    433         return NO_ERROR;
    434     }
    435 
    436     return writer->writeSection(buffer);
    437 }
    438 
    439 // ================================================================================
    440 DumpsysSection::DumpsysSection(int id, const char* service, ...)
    441     : WorkerThreadSection(id, REMOTE_CALL_TIMEOUT_MS), mService(service) {
    442     name = "dumpsys ";
    443     name += service;
    444 
    445     va_list args;
    446     va_start(args, service);
    447     while (true) {
    448         const char* arg = va_arg(args, const char*);
    449         if (arg == NULL) {
    450             break;
    451         }
    452         mArgs.add(String16(arg));
    453         name += " ";
    454         name += arg;
    455     }
    456     va_end(args);
    457 }
    458 
    459 DumpsysSection::~DumpsysSection() {}
    460 
    461 status_t DumpsysSection::BlockingCall(int pipeWriteFd) const {
    462     // checkService won't wait for the service to show up like getService will.
    463     sp<IBinder> service = defaultServiceManager()->checkService(mService);
    464 
    465     if (service == NULL) {
    466         ALOGW("DumpsysSection: Can't lookup service: %s", String8(mService).string());
    467         return NAME_NOT_FOUND;
    468     }
    469 
    470     service->dump(pipeWriteFd, mArgs);
    471 
    472     return NO_ERROR;
    473 }
    474 
    475 // ================================================================================
    476 // initialization only once in Section.cpp.
    477 map<log_id_t, log_time> LogSection::gLastLogsRetrieved;
    478 
    479 LogSection::LogSection(int id, log_id_t logID) : WorkerThreadSection(id), mLogID(logID) {
    480     name = "logcat ";
    481     name += android_log_id_to_name(logID);
    482     switch (logID) {
    483         case LOG_ID_EVENTS:
    484         case LOG_ID_STATS:
    485         case LOG_ID_SECURITY:
    486             mBinary = true;
    487             break;
    488         default:
    489             mBinary = false;
    490     }
    491 }
    492 
    493 LogSection::~LogSection() {}
    494 
    495 static size_t trimTail(char const* buf, size_t len) {
    496     while (len > 0) {
    497         char c = buf[len - 1];
    498         if (c == '\0' || c == ' ' || c == '\n' || c == '\r' || c == ':') {
    499             len--;
    500         } else {
    501             break;
    502         }
    503     }
    504     return len;
    505 }
    506 
    507 static inline int32_t get4LE(uint8_t const* src) {
    508     return src[0] | (src[1] << 8) | (src[2] << 16) | (src[3] << 24);
    509 }
    510 
    511 status_t LogSection::BlockingCall(int pipeWriteFd) const {
    512     // Open log buffer and getting logs since last retrieved time if any.
    513     unique_ptr<logger_list, void (*)(logger_list*)> loggers(
    514             gLastLogsRetrieved.find(mLogID) == gLastLogsRetrieved.end()
    515                     ? android_logger_list_alloc(ANDROID_LOG_RDONLY | ANDROID_LOG_NONBLOCK, 0, 0)
    516                     : android_logger_list_alloc_time(ANDROID_LOG_RDONLY | ANDROID_LOG_NONBLOCK,
    517                                                      gLastLogsRetrieved[mLogID], 0),
    518             android_logger_list_free);
    519 
    520     if (android_logger_open(loggers.get(), mLogID) == NULL) {
    521         ALOGE("[%s] Can't get logger.", this->name.string());
    522         return -1;
    523     }
    524 
    525     log_msg msg;
    526     log_time lastTimestamp(0);
    527 
    528     ProtoOutputStream proto;
    529     while (true) {  // keeps reading until logd buffer is fully read.
    530         status_t err = android_logger_list_read(loggers.get(), &msg);
    531         // err = 0 - no content, unexpected connection drop or EOF.
    532         // err = +ive number - size of retrieved data from logger
    533         // err = -ive number, OS supplied error _except_ for -EAGAIN
    534         // err = -EAGAIN, graceful indication for ANDRODI_LOG_NONBLOCK that this is the end of data.
    535         if (err <= 0) {
    536             if (err != -EAGAIN) {
    537                 ALOGW("[%s] fails to read a log_msg.\n", this->name.string());
    538             }
    539             // dump previous logs and don't consider this error a failure.
    540             break;
    541         }
    542         if (mBinary) {
    543             // remove the first uint32 which is tag's index in event log tags
    544             android_log_context context = create_android_log_parser(msg.msg() + sizeof(uint32_t),
    545                                                                     msg.len() - sizeof(uint32_t));
    546             ;
    547             android_log_list_element elem;
    548 
    549             lastTimestamp.tv_sec = msg.entry_v1.sec;
    550             lastTimestamp.tv_nsec = msg.entry_v1.nsec;
    551 
    552             // format a BinaryLogEntry
    553             uint64_t token = proto.start(LogProto::BINARY_LOGS);
    554             proto.write(BinaryLogEntry::SEC, msg.entry_v1.sec);
    555             proto.write(BinaryLogEntry::NANOSEC, msg.entry_v1.nsec);
    556             proto.write(BinaryLogEntry::UID, (int)msg.entry_v4.uid);
    557             proto.write(BinaryLogEntry::PID, msg.entry_v1.pid);
    558             proto.write(BinaryLogEntry::TID, msg.entry_v1.tid);
    559             proto.write(BinaryLogEntry::TAG_INDEX,
    560                         get4LE(reinterpret_cast<uint8_t const*>(msg.msg())));
    561             do {
    562                 elem = android_log_read_next(context);
    563                 uint64_t elemToken = proto.start(BinaryLogEntry::ELEMS);
    564                 switch (elem.type) {
    565                     case EVENT_TYPE_INT:
    566                         proto.write(BinaryLogEntry::Elem::TYPE,
    567                                     BinaryLogEntry::Elem::EVENT_TYPE_INT);
    568                         proto.write(BinaryLogEntry::Elem::VAL_INT32, (int)elem.data.int32);
    569                         break;
    570                     case EVENT_TYPE_LONG:
    571                         proto.write(BinaryLogEntry::Elem::TYPE,
    572                                     BinaryLogEntry::Elem::EVENT_TYPE_LONG);
    573                         proto.write(BinaryLogEntry::Elem::VAL_INT64, (long long)elem.data.int64);
    574                         break;
    575                     case EVENT_TYPE_STRING:
    576                         proto.write(BinaryLogEntry::Elem::TYPE,
    577                                     BinaryLogEntry::Elem::EVENT_TYPE_STRING);
    578                         proto.write(BinaryLogEntry::Elem::VAL_STRING, elem.data.string, elem.len);
    579                         break;
    580                     case EVENT_TYPE_FLOAT:
    581                         proto.write(BinaryLogEntry::Elem::TYPE,
    582                                     BinaryLogEntry::Elem::EVENT_TYPE_FLOAT);
    583                         proto.write(BinaryLogEntry::Elem::VAL_FLOAT, elem.data.float32);
    584                         break;
    585                     case EVENT_TYPE_LIST:
    586                         proto.write(BinaryLogEntry::Elem::TYPE,
    587                                     BinaryLogEntry::Elem::EVENT_TYPE_LIST);
    588                         break;
    589                     case EVENT_TYPE_LIST_STOP:
    590                         proto.write(BinaryLogEntry::Elem::TYPE,
    591                                     BinaryLogEntry::Elem::EVENT_TYPE_LIST_STOP);
    592                         break;
    593                     case EVENT_TYPE_UNKNOWN:
    594                         proto.write(BinaryLogEntry::Elem::TYPE,
    595                                     BinaryLogEntry::Elem::EVENT_TYPE_UNKNOWN);
    596                         break;
    597                 }
    598                 proto.end(elemToken);
    599             } while ((elem.type != EVENT_TYPE_UNKNOWN) && !elem.complete);
    600             proto.end(token);
    601             if (context) {
    602                 android_log_destroy(&context);
    603             }
    604         } else {
    605             AndroidLogEntry entry;
    606             err = android_log_processLogBuffer(&msg.entry_v1, &entry);
    607             if (err != NO_ERROR) {
    608                 ALOGW("[%s] fails to process to an entry.\n", this->name.string());
    609                 break;
    610             }
    611             lastTimestamp.tv_sec = entry.tv_sec;
    612             lastTimestamp.tv_nsec = entry.tv_nsec;
    613 
    614             // format a TextLogEntry
    615             uint64_t token = proto.start(LogProto::TEXT_LOGS);
    616             proto.write(TextLogEntry::SEC, (long long)entry.tv_sec);
    617             proto.write(TextLogEntry::NANOSEC, (long long)entry.tv_nsec);
    618             proto.write(TextLogEntry::PRIORITY, (int)entry.priority);
    619             proto.write(TextLogEntry::UID, entry.uid);
    620             proto.write(TextLogEntry::PID, entry.pid);
    621             proto.write(TextLogEntry::TID, entry.tid);
    622             proto.write(TextLogEntry::TAG, entry.tag, trimTail(entry.tag, entry.tagLen));
    623             proto.write(TextLogEntry::LOG, entry.message,
    624                         trimTail(entry.message, entry.messageLen));
    625             proto.end(token);
    626         }
    627     }
    628     gLastLogsRetrieved[mLogID] = lastTimestamp;
    629     if (!proto.flush(pipeWriteFd) && errno == EPIPE) {
    630         ALOGE("[%s] wrote to a broken pipe\n", this->name.string());
    631         return EPIPE;
    632     }
    633     return NO_ERROR;
    634 }
    635 
    636 // ================================================================================
    637 
    638 TombstoneSection::TombstoneSection(int id, const char* type, const int64_t timeoutMs)
    639     : WorkerThreadSection(id, timeoutMs), mType(type) {
    640     name = "tombstone ";
    641     name += type;
    642 }
    643 
    644 TombstoneSection::~TombstoneSection() {}
    645 
    646 status_t TombstoneSection::BlockingCall(int pipeWriteFd) const {
    647     std::unique_ptr<DIR, decltype(&closedir)> proc(opendir("/proc"), closedir);
    648     if (proc.get() == nullptr) {
    649         ALOGE("opendir /proc failed: %s\n", strerror(errno));
    650         return -errno;
    651     }
    652 
    653     const std::set<int> hal_pids = get_interesting_hal_pids();
    654 
    655     ProtoOutputStream proto;
    656     struct dirent* d;
    657     status_t err = NO_ERROR;
    658     while ((d = readdir(proc.get()))) {
    659         int pid = atoi(d->d_name);
    660         if (pid <= 0) {
    661             continue;
    662         }
    663 
    664         const std::string link_name = android::base::StringPrintf("/proc/%d/exe", pid);
    665         std::string exe;
    666         if (!android::base::Readlink(link_name, &exe)) {
    667             ALOGE("Section %s: Can't read '%s': %s\n", name.string(),
    668                     link_name.c_str(), strerror(errno));
    669             continue;
    670         }
    671 
    672         bool is_java_process;
    673         if (exe == "/system/bin/app_process32" || exe == "/system/bin/app_process64") {
    674             if (mType != "java") continue;
    675             // Don't bother dumping backtraces for the zygote.
    676             if (IsZygote(pid)) {
    677                 VLOG("Skipping Zygote");
    678                 continue;
    679             }
    680 
    681             is_java_process = true;
    682         } else if (should_dump_native_traces(exe.c_str())) {
    683             if (mType != "native") continue;
    684             is_java_process = false;
    685         } else if (hal_pids.find(pid) != hal_pids.end()) {
    686             if (mType != "hal") continue;
    687             is_java_process = false;
    688         } else {
    689             // Probably a native process we don't care about, continue.
    690             VLOG("Skipping %d", pid);
    691             continue;
    692         }
    693 
    694         Fpipe dumpPipe;
    695         if (!dumpPipe.init()) {
    696             ALOGW("[%s] failed to setup dump pipe", this->name.string());
    697             err = -errno;
    698             break;
    699         }
    700 
    701         const uint64_t start = Nanotime();
    702         pid_t child = fork();
    703         if (child < 0) {
    704             ALOGE("Failed to fork child process");
    705             break;
    706         } else if (child == 0) {
    707             // This is the child process.
    708             dumpPipe.readFd().reset();
    709             const int ret = dump_backtrace_to_file_timeout(
    710                     pid, is_java_process ? kDebuggerdJavaBacktrace : kDebuggerdNativeBacktrace,
    711                     is_java_process ? 5 : 20, dumpPipe.writeFd().get());
    712             if (ret == -1) {
    713                 if (errno == 0) {
    714                     ALOGW("Dumping failed for pid '%d', likely due to a timeout\n", pid);
    715                 } else {
    716                     ALOGE("Dumping failed for pid '%d': %s\n", pid, strerror(errno));
    717                 }
    718             }
    719             dumpPipe.writeFd().reset();
    720             _exit(EXIT_SUCCESS);
    721         }
    722         dumpPipe.writeFd().reset();
    723         // Parent process.
    724         // Read from the pipe concurrently to avoid blocking the child.
    725         FdBuffer buffer;
    726         err = buffer.readFully(dumpPipe.readFd().get());
    727         // Wait on the child to avoid it becoming a zombie process.
    728         status_t cStatus = wait_child(child);
    729         if (err != NO_ERROR) {
    730             ALOGW("[%s] failed to read stack dump: %d", this->name.string(), err);
    731             dumpPipe.readFd().reset();
    732             break;
    733         }
    734         if (cStatus != NO_ERROR) {
    735             ALOGE("[%s] child had an issue: %s\n", this->name.string(), strerror(-cStatus));
    736         }
    737 
    738         auto dump = std::make_unique<char[]>(buffer.size());
    739         sp<ProtoReader> reader = buffer.data()->read();
    740         int i = 0;
    741         while (reader->hasNext()) {
    742             dump[i] = reader->next();
    743             i++;
    744         }
    745         uint64_t token = proto.start(android::os::BackTraceProto::TRACES);
    746         proto.write(android::os::BackTraceProto::Stack::PID, pid);
    747         proto.write(android::os::BackTraceProto::Stack::DUMP, dump.get(), i);
    748         proto.write(android::os::BackTraceProto::Stack::DUMP_DURATION_NS,
    749                     static_cast<long long>(Nanotime() - start));
    750         proto.end(token);
    751         dumpPipe.readFd().reset();
    752     }
    753 
    754     if (!proto.flush(pipeWriteFd) && errno == EPIPE) {
    755         ALOGE("[%s] wrote to a broken pipe\n", this->name.string());
    756         if (err != NO_ERROR) {
    757             return EPIPE;
    758         }
    759     }
    760 
    761     return err;
    762 }
    763 
    764 }  // namespace incidentd
    765 }  // namespace os
    766 }  // namespace android
    767