blob: c3161517188fdcd55c5526ea4c0285fb4ffe6e16 [file] [log] [blame]
The Android Open Source Project1dc9e472009-03-03 19:28:35 -08001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in
12 * the documentation and/or other materials provided with the
13 * distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
16 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
17 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
18 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
19 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
22 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
25 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 */
28
Elliott Hughes18a206c2012-10-29 17:37:13 -070029#include "linker.h"
Elliott Hughes18a206c2012-10-29 17:37:13 -070030
Elliott Hughes84114c82013-07-17 13:33:19 -070031#include <errno.h>
Elliott Hughes17e6a982014-04-18 17:39:25 -070032#include <inttypes.h>
Elliott Hughes84114c82013-07-17 13:33:19 -070033#include <signal.h>
The Android Open Source Project1dc9e472009-03-03 19:28:35 -080034#include <stdio.h>
35#include <stdlib.h>
Elliott Hughes84114c82013-07-17 13:33:19 -070036#include <sys/mman.h>
Marco Nelissen3df3e672012-03-07 09:04:18 -080037#include <sys/prctl.h>
The Android Open Source Project1dc9e472009-03-03 19:28:35 -080038#include <sys/socket.h>
David 'Digit' Turner8bff9a32010-06-10 18:29:33 -070039#include <sys/un.h>
Elliott Hughes84114c82013-07-17 13:33:19 -070040#include <unistd.h>
The Android Open Source Project1dc9e472009-03-03 19:28:35 -080041
Elliott Hughes18a206c2012-10-29 17:37:13 -070042extern "C" int tgkill(int tgid, int tid, int sig);
The Android Open Source Project1dc9e472009-03-03 19:28:35 -080043
Elliott Hughesf858bd12014-01-31 16:56:39 -080044#if __LP64__
45#define DEBUGGER_SOCKET_NAME "android:debuggerd64"
46#else
Jeff Brownb7630f02012-06-06 18:37:48 -070047#define DEBUGGER_SOCKET_NAME "android:debuggerd"
Elliott Hughesf858bd12014-01-31 16:56:39 -080048#endif
Jeff Brownb7630f02012-06-06 18:37:48 -070049
Elliott Hughes18a206c2012-10-29 17:37:13 -070050enum debugger_action_t {
Elliott Hughes17e6a982014-04-18 17:39:25 -070051 // dump a crash
52 DEBUGGER_ACTION_CRASH,
53 // dump a tombstone file
54 DEBUGGER_ACTION_DUMP_TOMBSTONE,
55 // dump a backtrace only back to the socket
56 DEBUGGER_ACTION_DUMP_BACKTRACE,
Elliott Hughes18a206c2012-10-29 17:37:13 -070057};
Jeff Brownb7630f02012-06-06 18:37:48 -070058
59/* message sent over the socket */
Elliott Hughes18a206c2012-10-29 17:37:13 -070060struct debugger_msg_t {
Elliott Hughes0d787c12013-04-04 13:46:46 -070061 // version 1 included:
62 debugger_action_t action;
63 pid_t tid;
64
65 // version 2 added:
66 uintptr_t abort_msg_address;
Elliott Hughesb7e289e2014-04-25 16:02:00 -070067
68 // version 3 added:
69 int32_t original_si_code;
Elliott Hughes18a206c2012-10-29 17:37:13 -070070};
David 'Digit' Turner7934a792009-10-16 12:13:34 -070071
Marco Nelissen3df3e672012-03-07 09:04:18 -080072// see man(2) prctl, specifically the section about PR_GET_NAME
73#define MAX_TASK_NAME_LEN (16)
David 'Digit' Turner8bff9a32010-06-10 18:29:33 -070074
Elliott Hughes18a206c2012-10-29 17:37:13 -070075static int socket_abstract_client(const char* name, int type) {
Elliott Hughes17e6a982014-04-18 17:39:25 -070076 sockaddr_un addr;
David 'Digit' Turner8bff9a32010-06-10 18:29:33 -070077
Elliott Hughes17e6a982014-04-18 17:39:25 -070078 // Test with length +1 for the *initial* '\0'.
79 size_t namelen = strlen(name);
80 if ((namelen + 1) > sizeof(addr.sun_path)) {
81 errno = EINVAL;
82 return -1;
83 }
David 'Digit' Turner8bff9a32010-06-10 18:29:33 -070084
Elliott Hughes17e6a982014-04-18 17:39:25 -070085 // This is used for abstract socket namespace, we need
86 // an initial '\0' at the start of the Unix socket path.
87 //
88 // Note: The path in this case is *not* supposed to be
89 // '\0'-terminated. ("man 7 unix" for the gory details.)
90 memset(&addr, 0, sizeof(addr));
91 addr.sun_family = AF_LOCAL;
92 addr.sun_path[0] = 0;
93 memcpy(addr.sun_path + 1, name, namelen);
David 'Digit' Turner8bff9a32010-06-10 18:29:33 -070094
Elliott Hughes17e6a982014-04-18 17:39:25 -070095 socklen_t alen = namelen + offsetof(sockaddr_un, sun_path) + 1;
David 'Digit' Turner8bff9a32010-06-10 18:29:33 -070096
Elliott Hughes17e6a982014-04-18 17:39:25 -070097 int s = socket(AF_LOCAL, type, 0);
98 if (s == -1) {
99 return -1;
100 }
David 'Digit' Turner8bff9a32010-06-10 18:29:33 -0700101
Elliott Hughes17e6a982014-04-18 17:39:25 -0700102 int rc = TEMP_FAILURE_RETRY(connect(s, reinterpret_cast<sockaddr*>(&addr), alen));
103 if (rc == -1) {
104 close(s);
105 return -1;
106 }
David 'Digit' Turner8bff9a32010-06-10 18:29:33 -0700107
Elliott Hughes17e6a982014-04-18 17:39:25 -0700108 return s;
David 'Digit' Turner8bff9a32010-06-10 18:29:33 -0700109}
110
Andy McFaddenec92af82011-07-29 12:46:34 -0700111/*
Andy McFadden1db6f2d2012-10-02 13:53:13 -0700112 * Writes a summary of the signal to the log file. We do this so that, if
113 * for some reason we're not able to contact debuggerd, there is still some
114 * indication of the failure in the log.
Andy McFaddenec92af82011-07-29 12:46:34 -0700115 *
116 * We could be here as a result of native heap corruption, or while a
117 * mutex is being held, so we don't want to use any libc functions that
118 * could allocate memory or hold a lock.
119 */
Elliott Hughes84114c82013-07-17 13:33:19 -0700120static void log_signal_summary(int signum, const siginfo_t* info) {
Elliott Hughes17e6a982014-04-18 17:39:25 -0700121 const char* signal_name = "???";
122 bool has_address = false;
123 switch (signum) {
Elliott Hughes17e6a982014-04-18 17:39:25 -0700124 case SIGABRT:
125 signal_name = "SIGABRT";
126 break;
127 case SIGBUS:
128 signal_name = "SIGBUS";
129 has_address = true;
130 break;
131 case SIGFPE:
132 signal_name = "SIGFPE";
133 has_address = true;
134 break;
Elliott Hughes62e35752014-05-16 16:59:54 -0700135 case SIGILL:
136 signal_name = "SIGILL";
137 has_address = true;
138 break;
139 case SIGPIPE:
140 signal_name = "SIGPIPE";
141 break;
Elliott Hughes17e6a982014-04-18 17:39:25 -0700142 case SIGSEGV:
143 signal_name = "SIGSEGV";
144 has_address = true;
145 break;
Raghu Gandhamd7daacb2012-07-31 12:07:22 -0700146#if defined(SIGSTKFLT)
Elliott Hughes17e6a982014-04-18 17:39:25 -0700147 case SIGSTKFLT:
148 signal_name = "SIGSTKFLT";
149 break;
Raghu Gandhamd7daacb2012-07-31 12:07:22 -0700150#endif
Elliott Hughes62e35752014-05-16 16:59:54 -0700151 case SIGTRAP:
152 signal_name = "SIGTRAP";
Elliott Hughes17e6a982014-04-18 17:39:25 -0700153 break;
154 }
Andy McFaddenec92af82011-07-29 12:46:34 -0700155
Elliott Hughes17e6a982014-04-18 17:39:25 -0700156 char thread_name[MAX_TASK_NAME_LEN + 1]; // one more for termination
157 if (prctl(PR_GET_NAME, (unsigned long)thread_name, 0, 0, 0) != 0) {
158 strcpy(thread_name, "<name unknown>");
159 } else {
160 // short names are null terminated by prctl, but the man page
161 // implies that 16 byte names are not.
162 thread_name[MAX_TASK_NAME_LEN] = 0;
163 }
Elliott Hughes18a206c2012-10-29 17:37:13 -0700164
Elliott Hughes17e6a982014-04-18 17:39:25 -0700165 // "info" will be NULL if the siginfo_t information was not available.
166 // Many signals don't have an address or a code.
167 char code_desc[32]; // ", code -6"
168 char addr_desc[32]; // ", fault addr 0x1234"
169 addr_desc[0] = code_desc[0] = 0;
170 if (info != NULL) {
171 // For a rethrown signal, this si_code will be right and the one debuggerd shows will
172 // always be SI_TKILL.
Christopher Ferris172955a2014-08-26 20:48:11 -0700173 __libc_format_buffer(code_desc, sizeof(code_desc), ", code %d", info->si_code);
Elliott Hughes17e6a982014-04-18 17:39:25 -0700174 if (has_address) {
Christopher Ferris172955a2014-08-26 20:48:11 -0700175 __libc_format_buffer(addr_desc, sizeof(addr_desc), ", fault addr %p", info->si_addr);
Andy McFadden1db6f2d2012-10-02 13:53:13 -0700176 }
Elliott Hughes17e6a982014-04-18 17:39:25 -0700177 }
178 __libc_format_log(ANDROID_LOG_FATAL, "libc",
179 "Fatal signal %d (%s)%s%s in tid %d (%s)",
180 signum, signal_name, code_desc, addr_desc, gettid(), thread_name);
Andy McFaddenec92af82011-07-29 12:46:34 -0700181}
182
183/*
Andy McFadden1db6f2d2012-10-02 13:53:13 -0700184 * Returns true if the handler for signal "signum" has SA_SIGINFO set.
185 */
Elliott Hughes84114c82013-07-17 13:33:19 -0700186static bool have_siginfo(int signum) {
Elliott Hughes17e6a982014-04-18 17:39:25 -0700187 struct sigaction old_action, new_action;
Andy McFadden1db6f2d2012-10-02 13:53:13 -0700188
Elliott Hughes17e6a982014-04-18 17:39:25 -0700189 memset(&new_action, 0, sizeof(new_action));
190 new_action.sa_handler = SIG_DFL;
191 new_action.sa_flags = SA_RESTART;
192 sigemptyset(&new_action.sa_mask);
Andy McFadden1db6f2d2012-10-02 13:53:13 -0700193
Elliott Hughes17e6a982014-04-18 17:39:25 -0700194 if (sigaction(signum, &new_action, &old_action) < 0) {
195 __libc_format_log(ANDROID_LOG_WARN, "libc", "Failed testing for SA_SIGINFO: %s",
196 strerror(errno));
197 return false;
198 }
199 bool result = (old_action.sa_flags & SA_SIGINFO) != 0;
Andy McFadden1db6f2d2012-10-02 13:53:13 -0700200
Elliott Hughes17e6a982014-04-18 17:39:25 -0700201 if (sigaction(signum, &old_action, NULL) == -1) {
202 __libc_format_log(ANDROID_LOG_WARN, "libc", "Restore failed in test for SA_SIGINFO: %s",
203 strerror(errno));
204 }
205 return result;
Andy McFadden1db6f2d2012-10-02 13:53:13 -0700206}
207
Elliott Hughesb7e289e2014-04-25 16:02:00 -0700208static void send_debuggerd_packet(siginfo_t* info) {
Nick Kralevich92d8b232014-07-23 13:56:23 -0700209 if (prctl(PR_GET_DUMPABLE, 0, 0, 0, 0) == 0) {
210 // process has disabled core dumps and PTRACE_ATTACH, and does not want to be dumped.
211 // Honor that intention by not connecting to debuggerd and asking it
212 // to dump our internal state.
213 __libc_format_log(ANDROID_LOG_INFO, "libc",
214 "Suppressing debuggerd output because prctl(PR_GET_DUMPABLE)==0");
215 return;
216 }
217
Elliott Hughesb7e289e2014-04-25 16:02:00 -0700218 int s = socket_abstract_client(DEBUGGER_SOCKET_NAME, SOCK_STREAM);
219 if (s == -1) {
220 __libc_format_log(ANDROID_LOG_FATAL, "libc", "Unable to open connection to debuggerd: %s",
221 strerror(errno));
222 return;
223 }
224
225 // debuggerd knows our pid from the credentials on the
226 // local socket but we need to tell it the tid of the crashing thread.
227 // debuggerd will be paranoid and verify that we sent a tid
228 // that's actually in our process.
229 debugger_msg_t msg;
230 msg.action = DEBUGGER_ACTION_CRASH;
231 msg.tid = gettid();
Elliott Hughes1728b232014-05-14 10:02:03 -0700232 msg.abort_msg_address = reinterpret_cast<uintptr_t>(g_abort_message);
Elliott Hughesb7e289e2014-04-25 16:02:00 -0700233 msg.original_si_code = (info != NULL) ? info->si_code : 0;
234 int ret = TEMP_FAILURE_RETRY(write(s, &msg, sizeof(msg)));
235 if (ret == sizeof(msg)) {
236 char debuggerd_ack;
237 ret = TEMP_FAILURE_RETRY(read(s, &debuggerd_ack, 1));
238 int saved_errno = errno;
239 notify_gdb_of_libraries();
240 errno = saved_errno;
241 } else {
242 // read or write failed -- broken connection?
243 __libc_format_log(ANDROID_LOG_FATAL, "libc", "Failed while talking to debuggerd: %s",
244 strerror(errno));
245 }
246
247 close(s);
248}
249
Andy McFadden1db6f2d2012-10-02 13:53:13 -0700250/*
Andy McFaddenec92af82011-07-29 12:46:34 -0700251 * Catches fatal signals so we can ask debuggerd to ptrace us before
252 * we crash.
253 */
Elliott Hughesb7e289e2014-04-25 16:02:00 -0700254static void debuggerd_signal_handler(int signal_number, siginfo_t* info, void*) {
Elliott Hughes17e6a982014-04-18 17:39:25 -0700255 // It's possible somebody cleared the SA_SIGINFO flag, which would mean
256 // our "info" arg holds an undefined value.
257 if (!have_siginfo(signal_number)) {
258 info = NULL;
259 }
260
261 log_signal_summary(signal_number, info);
262
Elliott Hughesb7e289e2014-04-25 16:02:00 -0700263 send_debuggerd_packet(info);
Andy McFaddenca9a0712012-03-08 11:14:37 -0800264
Elliott Hughes17e6a982014-04-18 17:39:25 -0700265 // Remove our net so we fault for real when we return.
266 signal(signal_number, SIG_DFL);
267
268 // These signals are not re-thrown when we resume. This means that
269 // crashing due to (say) SIGPIPE doesn't work the way you'd expect it
270 // to. We work around this by throwing them manually. We don't want
Elliott Hughesb7e289e2014-04-25 16:02:00 -0700271 // to do this for *all* signals because it'll screw up the si_addr for
272 // faults like SIGSEGV. It does screw up the si_code, which is why we
273 // passed that to debuggerd above.
Elliott Hughes17e6a982014-04-18 17:39:25 -0700274 switch (signal_number) {
275 case SIGABRT:
276 case SIGFPE:
277 case SIGPIPE:
Elliott Hughes4eeb1f12013-10-25 17:38:02 -0700278#if defined(SIGSTKFLT)
Elliott Hughes17e6a982014-04-18 17:39:25 -0700279 case SIGSTKFLT:
Raghu Gandhamd7daacb2012-07-31 12:07:22 -0700280#endif
Elliott Hughes00c855e2014-05-16 17:34:13 -0700281 case SIGTRAP:
Elliott Hughes17e6a982014-04-18 17:39:25 -0700282 tgkill(getpid(), gettid(), signal_number);
283 break;
284 default: // SIGILL, SIGBUS, SIGSEGV
285 break;
286 }
The Android Open Source Project1dc9e472009-03-03 19:28:35 -0800287}
288
Elliott Hughesb7e289e2014-04-25 16:02:00 -0700289__LIBC_HIDDEN__ void debuggerd_init() {
Elliott Hughes17e6a982014-04-18 17:39:25 -0700290 struct sigaction action;
291 memset(&action, 0, sizeof(action));
292 sigemptyset(&action.sa_mask);
293 action.sa_sigaction = debuggerd_signal_handler;
294 action.sa_flags = SA_RESTART | SA_SIGINFO;
Andy McFaddenec92af82011-07-29 12:46:34 -0700295
Elliott Hughes17e6a982014-04-18 17:39:25 -0700296 // Use the alternate signal stack if available so we can catch stack overflows.
297 action.sa_flags |= SA_ONSTACK;
Elliott Hughes84114c82013-07-17 13:33:19 -0700298
Elliott Hughes17e6a982014-04-18 17:39:25 -0700299 sigaction(SIGABRT, &action, NULL);
300 sigaction(SIGBUS, &action, NULL);
301 sigaction(SIGFPE, &action, NULL);
302 sigaction(SIGILL, &action, NULL);
303 sigaction(SIGPIPE, &action, NULL);
304 sigaction(SIGSEGV, &action, NULL);
Raghu Gandhamd7daacb2012-07-31 12:07:22 -0700305#if defined(SIGSTKFLT)
Elliott Hughes17e6a982014-04-18 17:39:25 -0700306 sigaction(SIGSTKFLT, &action, NULL);
Raghu Gandhamd7daacb2012-07-31 12:07:22 -0700307#endif
Elliott Hughes17e6a982014-04-18 17:39:25 -0700308 sigaction(SIGTRAP, &action, NULL);
The Android Open Source Project1dc9e472009-03-03 19:28:35 -0800309}