|  | /* | 
|  | * Copyright (C) 2012 The Android Open Source Project | 
|  | * | 
|  | * Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | * you may not use this file except in compliance with the License. | 
|  | * You may obtain a copy of the License at | 
|  | * | 
|  | *      http://www.apache.org/licenses/LICENSE-2.0 | 
|  | * | 
|  | * Unless required by applicable law or agreed to in writing, software | 
|  | * distributed under the License is distributed on an "AS IS" BASIS, | 
|  | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | * See the License for the specific language governing permissions and | 
|  | * limitations under the License. | 
|  | */ | 
|  |  | 
|  | #include "crash_collector.h" | 
|  |  | 
|  | #include <dirent.h> | 
|  | #include <fcntl.h>  // For file creation modes. | 
|  | #include <inttypes.h> | 
|  | #include <linux/limits.h>  // PATH_MAX | 
|  | #include <pwd.h>  // For struct passwd. | 
|  | #include <sys/types.h>  // for mode_t. | 
|  | #include <sys/wait.h>  // For waitpid. | 
|  | #include <unistd.h>  // For execv and fork. | 
|  |  | 
|  | #include <set> | 
|  | #include <utility> | 
|  | #include <vector> | 
|  |  | 
|  | #include <base/files/file_util.h> | 
|  | #include <base/logging.h> | 
|  | #include <base/posix/eintr_wrapper.h> | 
|  | #include <base/strings/string_split.h> | 
|  | #include <base/strings/string_util.h> | 
|  | #include <base/strings/stringprintf.h> | 
|  | #include <brillo/key_value_store.h> | 
|  | #include <brillo/process.h> | 
|  |  | 
|  | namespace { | 
|  |  | 
|  | const char kCollectChromeFile[] = | 
|  | "/mnt/stateful_partition/etc/collect_chrome_crashes"; | 
|  | const char kCrashTestInProgressPath[] = | 
|  | "/data/misc/crash_reporter/tmp/crash-test-in-progress"; | 
|  | const char kDefaultLogConfig[] = "/etc/crash_reporter_logs.conf"; | 
|  | const char kDefaultUserName[] = "chronos"; | 
|  | const char kLeaveCoreFile[] = "/data/misc/crash_reporter/.leave_core"; | 
|  | const char kShellPath[] = "/system/bin/sh"; | 
|  | const char kSystemCrashPath[] = "/data/misc/crash_reporter/crash"; | 
|  | const char kUploadVarPrefix[] = "upload_var_"; | 
|  | const char kUploadFilePrefix[] = "upload_file_"; | 
|  |  | 
|  | // Normally this path is not used.  Unfortunately, there are a few edge cases | 
|  | // where we need this.  Any process that runs as kDefaultUserName that crashes | 
|  | // is consider a "user crash".  That includes the initial Chrome browser that | 
|  | // runs the login screen.  If that blows up, there is no logged in user yet, | 
|  | // so there is no per-user dir for us to stash things in.  Instead we fallback | 
|  | // to this path as it is at least encrypted on a per-system basis. | 
|  | // | 
|  | // This also comes up when running autotests.  The GUI is sitting at the login | 
|  | // screen while tests are sshing in, changing users, and triggering crashes as | 
|  | // the user (purposefully). | 
|  | const char kFallbackUserCrashPath[] = "/home/chronos/crash"; | 
|  |  | 
|  | // Directory mode of the user crash spool directory. | 
|  | const mode_t kUserCrashPathMode = 0755; | 
|  |  | 
|  | // Directory mode of the system crash spool directory. | 
|  | const mode_t kSystemCrashPathMode = 01755; | 
|  |  | 
|  | const uid_t kRootOwner = 0; | 
|  | const uid_t kRootGroup = 0; | 
|  |  | 
|  | }  // namespace | 
|  |  | 
|  | // Maximum crash reports per crash spool directory.  Note that this is | 
|  | // a separate maximum from the maximum rate at which we upload these | 
|  | // diagnostics.  The higher this rate is, the more space we allow for | 
|  | // core files, minidumps, and kcrash logs, and equivalently the more | 
|  | // processor and I/O bandwidth we dedicate to handling these crashes when | 
|  | // many occur at once.  Also note that if core files are configured to | 
|  | // be left on the file system, we stop adding crashes when either the | 
|  | // number of core files or minidumps reaches this number. | 
|  | const int CrashCollector::kMaxCrashDirectorySize = 32; | 
|  |  | 
|  | using base::FilePath; | 
|  | using base::StringPrintf; | 
|  |  | 
|  | CrashCollector::CrashCollector() | 
|  | : log_config_path_(kDefaultLogConfig) { | 
|  | } | 
|  |  | 
|  | CrashCollector::~CrashCollector() { | 
|  | } | 
|  |  | 
|  | void CrashCollector::Initialize( | 
|  | CrashCollector::CountCrashFunction count_crash_function, | 
|  | CrashCollector::IsFeedbackAllowedFunction is_feedback_allowed_function) { | 
|  | CHECK(count_crash_function); | 
|  | CHECK(is_feedback_allowed_function); | 
|  |  | 
|  | count_crash_function_ = count_crash_function; | 
|  | is_feedback_allowed_function_ = is_feedback_allowed_function; | 
|  | } | 
|  |  | 
|  | int CrashCollector::WriteNewFile(const FilePath &filename, | 
|  | const char *data, | 
|  | int size) { | 
|  | int fd = HANDLE_EINTR(open(filename.value().c_str(), | 
|  | O_CREAT | O_WRONLY | O_TRUNC | O_EXCL, 0666)); | 
|  | if (fd < 0) { | 
|  | return -1; | 
|  | } | 
|  |  | 
|  | int rv = base::WriteFileDescriptor(fd, data, size) ? size : -1; | 
|  | IGNORE_EINTR(close(fd)); | 
|  | return rv; | 
|  | } | 
|  |  | 
|  | std::string CrashCollector::Sanitize(const std::string &name) { | 
|  | // Make sure the sanitized name does not include any periods. | 
|  | // The logic in crash_sender relies on this. | 
|  | std::string result = name; | 
|  | for (size_t i = 0; i < name.size(); ++i) { | 
|  | if (!isalnum(result[i]) && result[i] != '_') | 
|  | result[i] = '_'; | 
|  | } | 
|  | return result; | 
|  | } | 
|  |  | 
|  | std::string CrashCollector::FormatDumpBasename(const std::string &exec_name, | 
|  | time_t timestamp, | 
|  | pid_t pid) { | 
|  | struct tm tm; | 
|  | localtime_r(×tamp, &tm); | 
|  | std::string sanitized_exec_name = Sanitize(exec_name); | 
|  | return StringPrintf("%s.%04d%02d%02d.%02d%02d%02d.%d", | 
|  | sanitized_exec_name.c_str(), | 
|  | tm.tm_year + 1900, | 
|  | tm.tm_mon + 1, | 
|  | tm.tm_mday, | 
|  | tm.tm_hour, | 
|  | tm.tm_min, | 
|  | tm.tm_sec, | 
|  | pid); | 
|  | } | 
|  |  | 
|  | FilePath CrashCollector::GetCrashPath(const FilePath &crash_directory, | 
|  | const std::string &basename, | 
|  | const std::string &extension) { | 
|  | return crash_directory.Append(StringPrintf("%s.%s", | 
|  | basename.c_str(), | 
|  | extension.c_str())); | 
|  | } | 
|  |  | 
|  | FilePath CrashCollector::GetCrashDirectoryInfo( | 
|  | mode_t *mode, | 
|  | uid_t *directory_owner, | 
|  | gid_t *directory_group) { | 
|  | *mode = kSystemCrashPathMode; | 
|  | *directory_owner = kRootOwner; | 
|  | *directory_group = kRootGroup; | 
|  | return FilePath(kSystemCrashPath); | 
|  | } | 
|  |  | 
|  | bool CrashCollector::GetUserInfoFromName(const std::string &name, | 
|  | uid_t *uid, | 
|  | gid_t *gid) { | 
|  | char storage[256]; | 
|  | struct passwd passwd_storage; | 
|  | struct passwd *passwd_result = nullptr; | 
|  |  | 
|  | if (getpwnam_r(name.c_str(), &passwd_storage, storage, sizeof(storage), | 
|  | &passwd_result) != 0 || passwd_result == nullptr) { | 
|  | LOG(ERROR) << "Cannot find user named " << name; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | *uid = passwd_result->pw_uid; | 
|  | *gid = passwd_result->pw_gid; | 
|  | return true; | 
|  | } | 
|  |  | 
|  | bool CrashCollector::GetCreatedCrashDirectoryByEuid(uid_t euid, | 
|  | FilePath *crash_directory, | 
|  | bool *out_of_capacity) { | 
|  | if (out_of_capacity) *out_of_capacity = false; | 
|  |  | 
|  | // For testing. | 
|  | if (!forced_crash_directory_.empty()) { | 
|  | *crash_directory = forced_crash_directory_; | 
|  | return true; | 
|  | } | 
|  |  | 
|  | mode_t directory_mode; | 
|  | uid_t directory_owner; | 
|  | gid_t directory_group; | 
|  | *crash_directory = | 
|  | GetCrashDirectoryInfo(&directory_mode, | 
|  | &directory_owner, | 
|  | &directory_group); | 
|  |  | 
|  | if (!base::PathExists(*crash_directory)) { | 
|  | // Create the spool directory with the appropriate mode (regardless of | 
|  | // umask) and ownership. | 
|  | mode_t old_mask = umask(0); | 
|  | if (mkdir(crash_directory->value().c_str(), directory_mode) < 0 || | 
|  | chown(crash_directory->value().c_str(), | 
|  | directory_owner, | 
|  | directory_group) < 0) { | 
|  | LOG(ERROR) << "Unable to create appropriate crash directory"; | 
|  | return false; | 
|  | } | 
|  | umask(old_mask); | 
|  | } | 
|  |  | 
|  | if (!base::PathExists(*crash_directory)) { | 
|  | LOG(ERROR) << "Unable to create crash directory " | 
|  | << crash_directory->value().c_str(); | 
|  | return false; | 
|  | } | 
|  |  | 
|  | if (!CheckHasCapacity(*crash_directory)) { | 
|  | if (out_of_capacity) *out_of_capacity = true; | 
|  | LOG(ERROR) << "Directory " << crash_directory->value() | 
|  | << " is out of capacity."; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | return true; | 
|  | } | 
|  |  | 
|  | FilePath CrashCollector::GetProcessPath(pid_t pid) { | 
|  | return FilePath(StringPrintf("/proc/%d", pid)); | 
|  | } | 
|  |  | 
|  | bool CrashCollector::GetSymlinkTarget(const FilePath &symlink, | 
|  | FilePath *target) { | 
|  | ssize_t max_size = 64; | 
|  | std::vector<char> buffer; | 
|  |  | 
|  | while (true) { | 
|  | buffer.resize(max_size + 1); | 
|  | ssize_t size = readlink(symlink.value().c_str(), buffer.data(), max_size); | 
|  | if (size < 0) { | 
|  | int saved_errno = errno; | 
|  | LOG(ERROR) << "Readlink failed on " << symlink.value() << " with " | 
|  | << saved_errno; | 
|  | return false; | 
|  | } | 
|  |  | 
|  | buffer[size] = 0; | 
|  | if (size == max_size) { | 
|  | max_size *= 2; | 
|  | if (max_size > PATH_MAX) { | 
|  | return false; | 
|  | } | 
|  | continue; | 
|  | } | 
|  | break; | 
|  | } | 
|  |  | 
|  | *target = FilePath(buffer.data()); | 
|  | return true; | 
|  | } | 
|  |  | 
|  | bool CrashCollector::GetExecutableBaseNameFromPid(pid_t pid, | 
|  | std::string *base_name) { | 
|  | FilePath target; | 
|  | FilePath process_path = GetProcessPath(pid); | 
|  | FilePath exe_path = process_path.Append("exe"); | 
|  | if (!GetSymlinkTarget(exe_path, &target)) { | 
|  | LOG(INFO) << "GetSymlinkTarget failed - Path " << process_path.value() | 
|  | << " DirectoryExists: " | 
|  | << base::DirectoryExists(process_path); | 
|  | // Try to further diagnose exe readlink failure cause. | 
|  | struct stat buf; | 
|  | int stat_result = stat(exe_path.value().c_str(), &buf); | 
|  | int saved_errno = errno; | 
|  | if (stat_result < 0) { | 
|  | LOG(INFO) << "stat " << exe_path.value() << " failed: " << stat_result | 
|  | << " " << saved_errno; | 
|  | } else { | 
|  | LOG(INFO) << "stat " << exe_path.value() << " succeeded: st_mode=" | 
|  | << buf.st_mode; | 
|  | } | 
|  | return false; | 
|  | } | 
|  | *base_name = target.BaseName().value(); | 
|  | return true; | 
|  | } | 
|  |  | 
|  | // Return true if the given crash directory has not already reached | 
|  | // maximum capacity. | 
|  | bool CrashCollector::CheckHasCapacity(const FilePath &crash_directory) { | 
|  | DIR* dir = opendir(crash_directory.value().c_str()); | 
|  | if (!dir) { | 
|  | LOG(WARNING) << "Unable to open crash directory " | 
|  | << crash_directory.value(); | 
|  | return false; | 
|  | } | 
|  | struct dirent ent_buf; | 
|  | struct dirent* ent; | 
|  | bool full = false; | 
|  | std::set<std::string> basenames; | 
|  | while (readdir_r(dir, &ent_buf, &ent) == 0 && ent) { | 
|  | if ((strcmp(ent->d_name, ".") == 0) || | 
|  | (strcmp(ent->d_name, "..") == 0)) | 
|  | continue; | 
|  |  | 
|  | std::string filename(ent->d_name); | 
|  | size_t last_dot = filename.rfind("."); | 
|  | std::string basename; | 
|  | // If there is a valid looking extension, use the base part of the | 
|  | // name.  If the only dot is the first byte (aka a dot file), treat | 
|  | // it as unique to avoid allowing a directory full of dot files | 
|  | // from accumulating. | 
|  | if (last_dot != std::string::npos && last_dot != 0) | 
|  | basename = filename.substr(0, last_dot); | 
|  | else | 
|  | basename = filename; | 
|  | basenames.insert(basename); | 
|  |  | 
|  | if (basenames.size() >= static_cast<size_t>(kMaxCrashDirectorySize)) { | 
|  | LOG(WARNING) << "Crash directory " << crash_directory.value() | 
|  | << " already full with " << kMaxCrashDirectorySize | 
|  | << " pending reports"; | 
|  | full = true; | 
|  | break; | 
|  | } | 
|  | } | 
|  | closedir(dir); | 
|  | return !full; | 
|  | } | 
|  |  | 
|  | bool CrashCollector::GetLogContents(const FilePath &config_path, | 
|  | const std::string &exec_name, | 
|  | const FilePath &output_file) { | 
|  | brillo::KeyValueStore store; | 
|  | if (!store.Load(config_path)) { | 
|  | LOG(INFO) << "Unable to read log configuration file " | 
|  | << config_path.value(); | 
|  | return false; | 
|  | } | 
|  |  | 
|  | std::string command; | 
|  | if (!store.GetString(exec_name, &command)) | 
|  | return false; | 
|  |  | 
|  | brillo::ProcessImpl diag_process; | 
|  | diag_process.AddArg(kShellPath); | 
|  | diag_process.AddStringOption("-c", command); | 
|  | diag_process.RedirectOutput(output_file.value()); | 
|  |  | 
|  | const int result = diag_process.Run(); | 
|  | if (result != 0) { | 
|  | LOG(INFO) << "Log command \"" << command << "\" exited with " << result; | 
|  | return false; | 
|  | } | 
|  | return true; | 
|  | } | 
|  |  | 
|  | void CrashCollector::AddCrashMetaData(const std::string &key, | 
|  | const std::string &value) { | 
|  | extra_metadata_.append(StringPrintf("%s=%s\n", key.c_str(), value.c_str())); | 
|  | } | 
|  |  | 
|  | void CrashCollector::AddCrashMetaUploadFile(const std::string &key, | 
|  | const std::string &path) { | 
|  | if (!path.empty()) | 
|  | AddCrashMetaData(kUploadFilePrefix + key, path); | 
|  | } | 
|  |  | 
|  | void CrashCollector::AddCrashMetaUploadData(const std::string &key, | 
|  | const std::string &value) { | 
|  | if (!value.empty()) | 
|  | AddCrashMetaData(kUploadVarPrefix + key, value); | 
|  | } | 
|  |  | 
|  | void CrashCollector::WriteCrashMetaData(const FilePath &meta_path, | 
|  | const std::string &exec_name, | 
|  | const std::string &payload_path) { | 
|  | int64_t payload_size = -1; | 
|  | base::GetFileSize(FilePath(payload_path), &payload_size); | 
|  | std::string meta_data = StringPrintf("%sexec_name=%s\n" | 
|  | "payload=%s\n" | 
|  | "payload_size=%" PRId64 "\n" | 
|  | "done=1\n", | 
|  | extra_metadata_.c_str(), | 
|  | exec_name.c_str(), | 
|  | payload_path.c_str(), | 
|  | payload_size); | 
|  | // We must use WriteNewFile instead of base::WriteFile as we | 
|  | // do not want to write with root access to a symlink that an attacker | 
|  | // might have created. | 
|  | if (WriteNewFile(meta_path, meta_data.c_str(), meta_data.size()) < 0) { | 
|  | LOG(ERROR) << "Unable to write " << meta_path.value(); | 
|  | } | 
|  | } | 
|  |  | 
|  | bool CrashCollector::IsCrashTestInProgress() { | 
|  | return base::PathExists(FilePath(kCrashTestInProgressPath)); | 
|  | } | 
|  |  | 
|  | bool CrashCollector::IsDeveloperImage() { | 
|  | // If we're testing crash reporter itself, we don't want to special-case | 
|  | // for developer images. | 
|  | if (IsCrashTestInProgress()) | 
|  | return false; | 
|  | return base::PathExists(FilePath(kLeaveCoreFile)); | 
|  | } |