xref: /aosp_15_r20/external/cronet/base/debug/stack_trace_android.cc (revision 6777b5387eb2ff775bb5750e3f5d96f37fb7352b)
1*6777b538SAndroid Build Coastguard Worker // Copyright 2012 The Chromium Authors
2*6777b538SAndroid Build Coastguard Worker // Use of this source code is governed by a BSD-style license that can be
3*6777b538SAndroid Build Coastguard Worker // found in the LICENSE file.
4*6777b538SAndroid Build Coastguard Worker 
5*6777b538SAndroid Build Coastguard Worker #include "base/debug/stack_trace.h"
6*6777b538SAndroid Build Coastguard Worker 
7*6777b538SAndroid Build Coastguard Worker #include <android/log.h>
8*6777b538SAndroid Build Coastguard Worker #include <stddef.h>
9*6777b538SAndroid Build Coastguard Worker #include <unwind.h>
10*6777b538SAndroid Build Coastguard Worker 
11*6777b538SAndroid Build Coastguard Worker #include <algorithm>
12*6777b538SAndroid Build Coastguard Worker #include <ostream>
13*6777b538SAndroid Build Coastguard Worker 
14*6777b538SAndroid Build Coastguard Worker #include "base/debug/proc_maps_linux.h"
15*6777b538SAndroid Build Coastguard Worker #include "base/memory/raw_ptr.h"
16*6777b538SAndroid Build Coastguard Worker #include "base/strings/strcat.h"
17*6777b538SAndroid Build Coastguard Worker #include "base/strings/stringprintf.h"
18*6777b538SAndroid Build Coastguard Worker #include "base/threading/thread_restrictions.h"
19*6777b538SAndroid Build Coastguard Worker 
20*6777b538SAndroid Build Coastguard Worker #ifdef __LP64__
21*6777b538SAndroid Build Coastguard Worker #define FMT_ADDR  "0x%016lx"
22*6777b538SAndroid Build Coastguard Worker #else
23*6777b538SAndroid Build Coastguard Worker #define FMT_ADDR  "0x%08x"
24*6777b538SAndroid Build Coastguard Worker #endif
25*6777b538SAndroid Build Coastguard Worker 
26*6777b538SAndroid Build Coastguard Worker namespace {
27*6777b538SAndroid Build Coastguard Worker 
28*6777b538SAndroid Build Coastguard Worker struct StackCrawlState {
StackCrawlState__anon29c001190111::StackCrawlState29*6777b538SAndroid Build Coastguard Worker   StackCrawlState(uintptr_t* frames, size_t max_depth)
30*6777b538SAndroid Build Coastguard Worker       : frames(frames),
31*6777b538SAndroid Build Coastguard Worker         frame_count(0),
32*6777b538SAndroid Build Coastguard Worker         max_depth(max_depth),
33*6777b538SAndroid Build Coastguard Worker         have_skipped_self(false) {}
34*6777b538SAndroid Build Coastguard Worker 
35*6777b538SAndroid Build Coastguard Worker   raw_ptr<uintptr_t, AllowPtrArithmetic> frames;
36*6777b538SAndroid Build Coastguard Worker   size_t frame_count;
37*6777b538SAndroid Build Coastguard Worker   size_t max_depth;
38*6777b538SAndroid Build Coastguard Worker   bool have_skipped_self;
39*6777b538SAndroid Build Coastguard Worker };
40*6777b538SAndroid Build Coastguard Worker 
TraceStackFrame(_Unwind_Context * context,void * arg)41*6777b538SAndroid Build Coastguard Worker _Unwind_Reason_Code TraceStackFrame(_Unwind_Context* context, void* arg) {
42*6777b538SAndroid Build Coastguard Worker   StackCrawlState* state = static_cast<StackCrawlState*>(arg);
43*6777b538SAndroid Build Coastguard Worker   uintptr_t ip = _Unwind_GetIP(context);
44*6777b538SAndroid Build Coastguard Worker 
45*6777b538SAndroid Build Coastguard Worker   // The first stack frame is this function itself.  Skip it.
46*6777b538SAndroid Build Coastguard Worker   if (ip != 0 && !state->have_skipped_self) {
47*6777b538SAndroid Build Coastguard Worker     state->have_skipped_self = true;
48*6777b538SAndroid Build Coastguard Worker     return _URC_NO_REASON;
49*6777b538SAndroid Build Coastguard Worker   }
50*6777b538SAndroid Build Coastguard Worker 
51*6777b538SAndroid Build Coastguard Worker   state->frames[state->frame_count++] = ip;
52*6777b538SAndroid Build Coastguard Worker   if (state->frame_count >= state->max_depth)
53*6777b538SAndroid Build Coastguard Worker     return _URC_END_OF_STACK;
54*6777b538SAndroid Build Coastguard Worker   return _URC_NO_REASON;
55*6777b538SAndroid Build Coastguard Worker }
56*6777b538SAndroid Build Coastguard Worker 
EndsWith(const std::string & s,const std::string & suffix)57*6777b538SAndroid Build Coastguard Worker bool EndsWith(const std::string& s, const std::string& suffix) {
58*6777b538SAndroid Build Coastguard Worker   return s.size() >= suffix.size() &&
59*6777b538SAndroid Build Coastguard Worker          s.substr(s.size() - suffix.size(), suffix.size()) == suffix;
60*6777b538SAndroid Build Coastguard Worker }
61*6777b538SAndroid Build Coastguard Worker 
62*6777b538SAndroid Build Coastguard Worker }  // namespace
63*6777b538SAndroid Build Coastguard Worker 
64*6777b538SAndroid Build Coastguard Worker namespace base {
65*6777b538SAndroid Build Coastguard Worker namespace debug {
66*6777b538SAndroid Build Coastguard Worker 
EnableInProcessStackDumping()67*6777b538SAndroid Build Coastguard Worker bool EnableInProcessStackDumping() {
68*6777b538SAndroid Build Coastguard Worker   // When running in an application, our code typically expects SIGPIPE
69*6777b538SAndroid Build Coastguard Worker   // to be ignored.  Therefore, when testing that same code, it should run
70*6777b538SAndroid Build Coastguard Worker   // with SIGPIPE ignored as well.
71*6777b538SAndroid Build Coastguard Worker   // TODO(phajdan.jr): De-duplicate this SIGPIPE code.
72*6777b538SAndroid Build Coastguard Worker   struct sigaction action;
73*6777b538SAndroid Build Coastguard Worker   memset(&action, 0, sizeof(action));
74*6777b538SAndroid Build Coastguard Worker   action.sa_handler = SIG_IGN;
75*6777b538SAndroid Build Coastguard Worker   sigemptyset(&action.sa_mask);
76*6777b538SAndroid Build Coastguard Worker   return (sigaction(SIGPIPE, &action, NULL) == 0);
77*6777b538SAndroid Build Coastguard Worker }
78*6777b538SAndroid Build Coastguard Worker 
CollectStackTrace(const void ** trace,size_t count)79*6777b538SAndroid Build Coastguard Worker size_t CollectStackTrace(const void** trace, size_t count) {
80*6777b538SAndroid Build Coastguard Worker   StackCrawlState state(reinterpret_cast<uintptr_t*>(trace), count);
81*6777b538SAndroid Build Coastguard Worker   _Unwind_Backtrace(&TraceStackFrame, &state);
82*6777b538SAndroid Build Coastguard Worker   return state.frame_count;
83*6777b538SAndroid Build Coastguard Worker }
84*6777b538SAndroid Build Coastguard Worker 
85*6777b538SAndroid Build Coastguard Worker // static
PrintMessageWithPrefix(cstring_view prefix_string,cstring_view message)86*6777b538SAndroid Build Coastguard Worker void StackTrace::PrintMessageWithPrefix(cstring_view prefix_string,
87*6777b538SAndroid Build Coastguard Worker                                         cstring_view message) {
88*6777b538SAndroid Build Coastguard Worker   if (!prefix_string.empty()) {
89*6777b538SAndroid Build Coastguard Worker     __android_log_write(ANDROID_LOG_ERROR, "chromium",
90*6777b538SAndroid Build Coastguard Worker                         StrCat({prefix_string, message}).c_str());
91*6777b538SAndroid Build Coastguard Worker   } else {
92*6777b538SAndroid Build Coastguard Worker     __android_log_write(ANDROID_LOG_ERROR, "chromium", message.c_str());
93*6777b538SAndroid Build Coastguard Worker   }
94*6777b538SAndroid Build Coastguard Worker }
95*6777b538SAndroid Build Coastguard Worker 
PrintWithPrefixImpl(cstring_view prefix_string) const96*6777b538SAndroid Build Coastguard Worker void StackTrace::PrintWithPrefixImpl(cstring_view prefix_string) const {
97*6777b538SAndroid Build Coastguard Worker   std::string backtrace = ToStringWithPrefix(prefix_string);
98*6777b538SAndroid Build Coastguard Worker   __android_log_write(ANDROID_LOG_ERROR, "chromium", backtrace.c_str());
99*6777b538SAndroid Build Coastguard Worker }
100*6777b538SAndroid Build Coastguard Worker 
101*6777b538SAndroid Build Coastguard Worker // NOTE: Native libraries in APKs are stripped before installing. Print out the
102*6777b538SAndroid Build Coastguard Worker // relocatable address and library names so host computers can use tools to
103*6777b538SAndroid Build Coastguard Worker // symbolize and demangle (e.g., addr2line, c++filt).
OutputToStreamWithPrefixImpl(std::ostream * os,cstring_view prefix_string) const104*6777b538SAndroid Build Coastguard Worker void StackTrace::OutputToStreamWithPrefixImpl(
105*6777b538SAndroid Build Coastguard Worker     std::ostream* os,
106*6777b538SAndroid Build Coastguard Worker     cstring_view prefix_string) const {
107*6777b538SAndroid Build Coastguard Worker   std::string proc_maps;
108*6777b538SAndroid Build Coastguard Worker   std::vector<MappedMemoryRegion> regions;
109*6777b538SAndroid Build Coastguard Worker   // Allow IO to read /proc/self/maps. Reading this file doesn't hit the disk
110*6777b538SAndroid Build Coastguard Worker   // since it lives in procfs, and this is currently used to print a stack trace
111*6777b538SAndroid Build Coastguard Worker   // on fatal log messages in debug builds only. If the restriction is enabled
112*6777b538SAndroid Build Coastguard Worker   // then it will recursively trigger fatal failures when this enters on the
113*6777b538SAndroid Build Coastguard Worker   // UI thread.
114*6777b538SAndroid Build Coastguard Worker   base::ScopedAllowBlocking scoped_allow_blocking;
115*6777b538SAndroid Build Coastguard Worker   if (!ReadProcMaps(&proc_maps)) {
116*6777b538SAndroid Build Coastguard Worker     __android_log_write(
117*6777b538SAndroid Build Coastguard Worker         ANDROID_LOG_ERROR, "chromium", "Failed to read /proc/self/maps");
118*6777b538SAndroid Build Coastguard Worker   } else if (!ParseProcMaps(proc_maps, &regions)) {
119*6777b538SAndroid Build Coastguard Worker     __android_log_write(
120*6777b538SAndroid Build Coastguard Worker         ANDROID_LOG_ERROR, "chromium", "Failed to parse /proc/self/maps");
121*6777b538SAndroid Build Coastguard Worker   }
122*6777b538SAndroid Build Coastguard Worker 
123*6777b538SAndroid Build Coastguard Worker   for (size_t i = 0; i < count_; ++i) {
124*6777b538SAndroid Build Coastguard Worker     // Subtract one as return address of function may be in the next
125*6777b538SAndroid Build Coastguard Worker     // function when a function is annotated as noreturn.
126*6777b538SAndroid Build Coastguard Worker     uintptr_t address = reinterpret_cast<uintptr_t>(trace_[i]) - 1;
127*6777b538SAndroid Build Coastguard Worker 
128*6777b538SAndroid Build Coastguard Worker     std::vector<MappedMemoryRegion>::iterator iter = regions.begin();
129*6777b538SAndroid Build Coastguard Worker     while (iter != regions.end()) {
130*6777b538SAndroid Build Coastguard Worker       if (address >= iter->start && address < iter->end &&
131*6777b538SAndroid Build Coastguard Worker           !iter->path.empty()) {
132*6777b538SAndroid Build Coastguard Worker         break;
133*6777b538SAndroid Build Coastguard Worker       }
134*6777b538SAndroid Build Coastguard Worker       ++iter;
135*6777b538SAndroid Build Coastguard Worker     }
136*6777b538SAndroid Build Coastguard Worker 
137*6777b538SAndroid Build Coastguard Worker     *os << prefix_string;
138*6777b538SAndroid Build Coastguard Worker 
139*6777b538SAndroid Build Coastguard Worker     // Adjust absolute address to be an offset within the mapped region, to
140*6777b538SAndroid Build Coastguard Worker     // match the format dumped by Android's crash output.
141*6777b538SAndroid Build Coastguard Worker     if (iter != regions.end()) {
142*6777b538SAndroid Build Coastguard Worker       address -= iter->start;
143*6777b538SAndroid Build Coastguard Worker     }
144*6777b538SAndroid Build Coastguard Worker 
145*6777b538SAndroid Build Coastguard Worker     // The format below intentionally matches that of Android's debuggerd
146*6777b538SAndroid Build Coastguard Worker     // output. This simplifies decoding by scripts such as stack.py.
147*6777b538SAndroid Build Coastguard Worker     *os << base::StringPrintf("#%02zd pc " FMT_ADDR " ", i, address);
148*6777b538SAndroid Build Coastguard Worker 
149*6777b538SAndroid Build Coastguard Worker     if (iter != regions.end()) {
150*6777b538SAndroid Build Coastguard Worker       *os << base::StringPrintf("%s", iter->path.c_str());
151*6777b538SAndroid Build Coastguard Worker       if (EndsWith(iter->path, ".apk")) {
152*6777b538SAndroid Build Coastguard Worker         *os << base::StringPrintf(" (offset 0x%llx)", iter->offset);
153*6777b538SAndroid Build Coastguard Worker       }
154*6777b538SAndroid Build Coastguard Worker     } else {
155*6777b538SAndroid Build Coastguard Worker       *os << "<unknown>";
156*6777b538SAndroid Build Coastguard Worker     }
157*6777b538SAndroid Build Coastguard Worker 
158*6777b538SAndroid Build Coastguard Worker     *os << "\n";
159*6777b538SAndroid Build Coastguard Worker   }
160*6777b538SAndroid Build Coastguard Worker }
161*6777b538SAndroid Build Coastguard Worker 
162*6777b538SAndroid Build Coastguard Worker }  // namespace debug
163*6777b538SAndroid Build Coastguard Worker }  // namespace base
164