1 /* 2 * Copyright (C) 2016 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 #define LOG_TAG "dumpstate" 18 19 #include "DumpstateUtil.h" 20 21 #include <dirent.h> 22 #include <fcntl.h> 23 #include <sys/prctl.h> 24 #include <sys/wait.h> 25 #include <unistd.h> 26 27 #include <vector> 28 29 #include <android-base/file.h> 30 #include <android-base/properties.h> 31 #include <android-base/stringprintf.h> 32 #include <android-base/strings.h> 33 #include <android-base/unique_fd.h> 34 #include <log/log.h> 35 36 #include "DumpstateInternal.h" 37 38 namespace android { 39 namespace os { 40 namespace dumpstate { 41 42 namespace { 43 44 static constexpr const char* kSuPath = "/system/xbin/su"; 45 46 static bool waitpid_with_timeout(pid_t pid, int timeout_ms, int* status) { 47 sigset_t child_mask, old_mask; 48 sigemptyset(&child_mask); 49 sigaddset(&child_mask, SIGCHLD); 50 51 if (sigprocmask(SIG_BLOCK, &child_mask, &old_mask) == -1) { 52 printf("*** sigprocmask failed: %s\n", strerror(errno)); 53 return false; 54 } 55 56 timespec ts; 57 ts.tv_sec = MSEC_TO_SEC(timeout_ms); 58 ts.tv_nsec = (timeout_ms % 1000) * 1000000; 59 int ret = TEMP_FAILURE_RETRY(sigtimedwait(&child_mask, nullptr, &ts)); 60 int saved_errno = errno; 61 62 // Set the signals back the way they were. 63 if (sigprocmask(SIG_SETMASK, &old_mask, nullptr) == -1) { 64 printf("*** sigprocmask failed: %s\n", strerror(errno)); 65 if (ret == 0) { 66 return false; 67 } 68 } 69 if (ret == -1) { 70 errno = saved_errno; 71 if (errno == EAGAIN) { 72 errno = ETIMEDOUT; 73 } else { 74 printf("*** sigtimedwait failed: %s\n", strerror(errno)); 75 } 76 return false; 77 } 78 79 pid_t child_pid = waitpid(pid, status, WNOHANG); 80 if (child_pid != pid) { 81 if (child_pid != -1) { 82 printf("*** Waiting for pid %d, got pid %d instead\n", pid, child_pid); 83 } else { 84 printf("*** waitpid failed: %s\n", strerror(errno)); 85 } 86 return false; 87 } 88 return true; 89 } 90 } // unnamed namespace 91 92 CommandOptions CommandOptions::DEFAULT = CommandOptions::WithTimeout(10).Build(); 93 CommandOptions CommandOptions::AS_ROOT = CommandOptions::WithTimeout(10).AsRoot().Build(); 94 95 CommandOptions::CommandOptionsBuilder::CommandOptionsBuilder(int64_t timeout_ms) : values(timeout_ms) { 96 } 97 98 CommandOptions::CommandOptionsBuilder& CommandOptions::CommandOptionsBuilder::Always() { 99 values.always_ = true; 100 return *this; 101 } 102 103 CommandOptions::CommandOptionsBuilder& CommandOptions::CommandOptionsBuilder::AsRoot() { 104 if (!PropertiesHelper::IsUnroot()) { 105 values.account_mode_ = SU_ROOT; 106 } 107 return *this; 108 } 109 110 CommandOptions::CommandOptionsBuilder& CommandOptions::CommandOptionsBuilder::AsRootIfAvailable() { 111 if (!PropertiesHelper::IsUserBuild()) { 112 return AsRoot(); 113 } 114 return *this; 115 } 116 117 CommandOptions::CommandOptionsBuilder& CommandOptions::CommandOptionsBuilder::DropRoot() { 118 values.account_mode_ = DROP_ROOT; 119 return *this; 120 } 121 122 CommandOptions::CommandOptionsBuilder& CommandOptions::CommandOptionsBuilder::RedirectStderr() { 123 values.output_mode_ = REDIRECT_TO_STDERR; 124 return *this; 125 } 126 127 CommandOptions::CommandOptionsBuilder& CommandOptions::CommandOptionsBuilder::Log( 128 const std::string& message) { 129 values.logging_message_ = message; 130 return *this; 131 } 132 133 CommandOptions CommandOptions::CommandOptionsBuilder::Build() { 134 return CommandOptions(values); 135 } 136 137 CommandOptions::CommandOptionsValues::CommandOptionsValues(int64_t timeout_ms) 138 : timeout_ms_(timeout_ms), 139 always_(false), 140 account_mode_(DONT_DROP_ROOT), 141 output_mode_(NORMAL_OUTPUT), 142 logging_message_("") { 143 } 144 145 CommandOptions::CommandOptions(const CommandOptionsValues& values) : values(values) { 146 } 147 148 int64_t CommandOptions::Timeout() const { 149 return MSEC_TO_SEC(values.timeout_ms_); 150 } 151 152 int64_t CommandOptions::TimeoutInMs() const { 153 return values.timeout_ms_; 154 } 155 156 bool CommandOptions::Always() const { 157 return values.always_; 158 } 159 160 PrivilegeMode CommandOptions::PrivilegeMode() const { 161 return values.account_mode_; 162 } 163 164 OutputMode CommandOptions::OutputMode() const { 165 return values.output_mode_; 166 } 167 168 std::string CommandOptions::LoggingMessage() const { 169 return values.logging_message_; 170 } 171 172 CommandOptions::CommandOptionsBuilder CommandOptions::WithTimeout(int64_t timeout_sec) { 173 return CommandOptions::CommandOptionsBuilder(SEC_TO_MSEC(timeout_sec)); 174 } 175 176 CommandOptions::CommandOptionsBuilder CommandOptions::WithTimeoutInMs(int64_t timeout_ms) { 177 return CommandOptions::CommandOptionsBuilder(timeout_ms); 178 } 179 180 std::string PropertiesHelper::build_type_ = ""; 181 int PropertiesHelper::dry_run_ = -1; 182 int PropertiesHelper::unroot_ = -1; 183 184 bool PropertiesHelper::IsUserBuild() { 185 if (build_type_.empty()) { 186 build_type_ = android::base::GetProperty("ro.build.type", "user"); 187 } 188 return "user" == build_type_; 189 } 190 191 bool PropertiesHelper::IsDryRun() { 192 if (dry_run_ == -1) { 193 dry_run_ = android::base::GetBoolProperty("dumpstate.dry_run", false) ? 1 : 0; 194 } 195 return dry_run_ == 1; 196 } 197 198 bool PropertiesHelper::IsUnroot() { 199 if (unroot_ == -1) { 200 unroot_ = android::base::GetBoolProperty("dumpstate.unroot", false) ? 1 : 0; 201 } 202 return unroot_ == 1; 203 } 204 205 int DumpFileToFd(int out_fd, const std::string& title, const std::string& path) { 206 android::base::unique_fd fd(TEMP_FAILURE_RETRY(open(path.c_str(), O_RDONLY | O_NONBLOCK | O_CLOEXEC))); 207 if (fd.get() < 0) { 208 int err = errno; 209 if (title.empty()) { 210 dprintf(out_fd, "*** Error dumping %s: %s\n", path.c_str(), strerror(err)); 211 } else { 212 dprintf(out_fd, "*** Error dumping %s (%s): %s\n", path.c_str(), title.c_str(), 213 strerror(err)); 214 } 215 fsync(out_fd); 216 return -1; 217 } 218 return DumpFileFromFdToFd(title, path, fd.get(), out_fd, PropertiesHelper::IsDryRun()); 219 } 220 221 int RunCommandToFd(int fd, const std::string& title, const std::vector<std::string>& full_command, 222 const CommandOptions& options) { 223 if (full_command.empty()) { 224 MYLOGE("No arguments on RunCommandToFd(%s)\n", title.c_str()); 225 return -1; 226 } 227 228 int size = full_command.size() + 1; // null terminated 229 int starting_index = 0; 230 if (options.PrivilegeMode() == SU_ROOT) { 231 starting_index = 2; // "su" "root" 232 size += starting_index; 233 } 234 235 std::vector<const char*> args; 236 args.resize(size); 237 238 std::string command_string; 239 if (options.PrivilegeMode() == SU_ROOT) { 240 args[0] = kSuPath; 241 command_string += kSuPath; 242 args[1] = "root"; 243 command_string += " root "; 244 } 245 for (size_t i = 0; i < full_command.size(); i++) { 246 args[i + starting_index] = full_command[i].data(); 247 command_string += args[i + starting_index]; 248 if (i != full_command.size() - 1) { 249 command_string += " "; 250 } 251 } 252 args[size - 1] = nullptr; 253 254 const char* command = command_string.c_str(); 255 256 if (options.PrivilegeMode() == SU_ROOT && PropertiesHelper::IsUserBuild()) { 257 dprintf(fd, "Skipping '%s' on user build.\n", command); 258 return 0; 259 } 260 261 if (!title.empty()) { 262 dprintf(fd, "------ %s (%s) ------\n", title.c_str(), command); 263 fsync(fd); 264 } 265 266 const std::string& logging_message = options.LoggingMessage(); 267 if (!logging_message.empty()) { 268 MYLOGI(logging_message.c_str(), command_string.c_str()); 269 } 270 271 bool silent = (options.OutputMode() == REDIRECT_TO_STDERR); 272 bool redirecting_to_fd = STDOUT_FILENO != fd; 273 274 if (PropertiesHelper::IsDryRun() && !options.Always()) { 275 if (!title.empty()) { 276 dprintf(fd, "\t(skipped on dry run)\n"); 277 } else if (redirecting_to_fd) { 278 // There is no title, but we should still print a dry-run message 279 dprintf(fd, "%s: skipped on dry run\n", command_string.c_str()); 280 } 281 fsync(fd); 282 return 0; 283 } 284 285 const char* path = args[0]; 286 287 uint64_t start = Nanotime(); 288 pid_t pid = fork(); 289 290 /* handle error case */ 291 if (pid < 0) { 292 if (!silent) dprintf(fd, "*** fork: %s\n", strerror(errno)); 293 MYLOGE("*** fork: %s\n", strerror(errno)); 294 return pid; 295 } 296 297 /* handle child case */ 298 if (pid == 0) { 299 if (options.PrivilegeMode() == DROP_ROOT && !DropRootUser()) { 300 if (!silent) { 301 dprintf(fd, "*** failed to drop root before running %s: %s\n", command, 302 strerror(errno)); 303 } 304 MYLOGE("*** could not drop root before running %s: %s\n", command, strerror(errno)); 305 return -1; 306 } 307 308 if (silent) { 309 // Redirects stdout to stderr 310 TEMP_FAILURE_RETRY(dup2(STDERR_FILENO, STDOUT_FILENO)); 311 } else if (redirecting_to_fd) { 312 // Redirect stdout to fd 313 TEMP_FAILURE_RETRY(dup2(fd, STDOUT_FILENO)); 314 close(fd); 315 } 316 317 /* make sure the child dies when dumpstate dies */ 318 prctl(PR_SET_PDEATHSIG, SIGKILL); 319 320 /* just ignore SIGPIPE, will go down with parent's */ 321 struct sigaction sigact; 322 memset(&sigact, 0, sizeof(sigact)); 323 sigact.sa_handler = SIG_IGN; 324 sigaction(SIGPIPE, &sigact, nullptr); 325 326 execvp(path, (char**)args.data()); 327 // execvp's result will be handled after waitpid_with_timeout() below, but 328 // if it failed, it's safer to exit dumpstate. 329 MYLOGD("execvp on command '%s' failed (error: %s)\n", command, strerror(errno)); 330 // Must call _exit (instead of exit), otherwise it will corrupt the zip 331 // file. 332 _exit(EXIT_FAILURE); 333 } 334 335 /* handle parent case */ 336 int status; 337 bool ret = waitpid_with_timeout(pid, options.TimeoutInMs(), &status); 338 fsync(fd); 339 340 uint64_t elapsed = Nanotime() - start; 341 if (!ret) { 342 if (errno == ETIMEDOUT) { 343 if (!silent) 344 dprintf(fd, "*** command '%s' timed out after %.3fs (killing pid %d)\n", command, 345 static_cast<float>(elapsed) / NANOS_PER_SEC, pid); 346 MYLOGE("*** command '%s' timed out after %.3fs (killing pid %d)\n", command, 347 static_cast<float>(elapsed) / NANOS_PER_SEC, pid); 348 } else { 349 if (!silent) 350 dprintf(fd, "*** command '%s': Error after %.4fs (killing pid %d)\n", command, 351 static_cast<float>(elapsed) / NANOS_PER_SEC, pid); 352 MYLOGE("command '%s': Error after %.4fs (killing pid %d)\n", command, 353 static_cast<float>(elapsed) / NANOS_PER_SEC, pid); 354 } 355 kill(pid, SIGTERM); 356 if (!waitpid_with_timeout(pid, 5000, nullptr)) { 357 kill(pid, SIGKILL); 358 if (!waitpid_with_timeout(pid, 5000, nullptr)) { 359 if (!silent) 360 dprintf(fd, "could not kill command '%s' (pid %d) even with SIGKILL.\n", 361 command, pid); 362 MYLOGE("could not kill command '%s' (pid %d) even with SIGKILL.\n", command, pid); 363 } 364 } 365 return -1; 366 } 367 368 if (WIFSIGNALED(status)) { 369 if (!silent) 370 dprintf(fd, "*** command '%s' failed: killed by signal %d\n", command, WTERMSIG(status)); 371 MYLOGE("*** command '%s' failed: killed by signal %d\n", command, WTERMSIG(status)); 372 } else if (WIFEXITED(status) && WEXITSTATUS(status) > 0) { 373 status = WEXITSTATUS(status); 374 if (!silent) dprintf(fd, "*** command '%s' failed: exit code %d\n", command, status); 375 MYLOGE("*** command '%s' failed: exit code %d\n", command, status); 376 } 377 378 return status; 379 } 380 381 int GetPidByName(const std::string& ps_name) { 382 DIR* proc_dir; 383 struct dirent* ps; 384 unsigned int pid; 385 std::string cmdline; 386 387 if (!(proc_dir = opendir("/proc"))) { 388 MYLOGE("Can't open /proc\n"); 389 return -1; 390 } 391 392 while ((ps = readdir(proc_dir))) { 393 if (!(pid = atoi(ps->d_name))) { 394 continue; 395 } 396 android::base::ReadFileToString("/proc/" + std::string(ps->d_name) + "/cmdline", &cmdline); 397 if (cmdline.find(ps_name) == std::string::npos) { 398 continue; 399 } else { 400 closedir(proc_dir); 401 return pid; 402 } 403 } 404 MYLOGE("can't find the pid\n"); 405 closedir(proc_dir); 406 return -1; 407 } 408 409 } // namespace dumpstate 410 } // namespace os 411 } // namespace android 412