/* * Copyright (C) 2020 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "DumpstateDevice.h" #include #include #include #include #include #include using android::base::GetProperty; using android::os::dumpstate::CommandOptions; using android::os::dumpstate::DumpFileToFd; using std::chrono::duration_cast; using std::chrono::seconds; using std::literals::chrono_literals::operator""s; namespace fs = android::hardware::automotive::filesystem; static constexpr const char* VENDOR_VERBOSE_LOGGING_ENABLED_PROPERTY = "persist.vendor.verbose_logging_enabled"; static constexpr const char* VENDOR_HELPER_SYSTEM_LOG_LOC_PROPERTY = "ro.vendor.helpersystem.log_loc"; static constexpr const char* BOOT_HYPERVISOR_VERSION_PROPERTY = "ro.boot.hypervisor.version"; namespace android::hardware::dumpstate::V1_1::implementation { static std::shared_ptr<::grpc::ChannelCredentials> getChannelCredentials() { // TODO(chenhaosjtuacm): get secured credentials here return ::grpc::InsecureChannelCredentials(); } static void dumpDirAsText(int textFd, const fs::path& dirToDump) { for (const auto& fileEntry : fs::recursive_directory_iterator(dirToDump)) { if (!fileEntry.is_regular_file()) { continue; } DumpFileToFd(textFd, "Helper System Log", fileEntry.path()); } } static void tryDumpDirAsTar(int textFd, int binFd, const fs::path& dirToDump) { if (!fs::is_directory(dirToDump)) { LOG(ERROR) << "'" << dirToDump << "'" << " is not a valid directory to dump"; return; } if (binFd < 0) { LOG(WARNING) << "No binary dumped file, fallback to text mode"; return dumpDirAsText(textFd, dirToDump); } TemporaryFile tempTarFile; constexpr auto kTarTimeout = 20s; RunCommandToFd( textFd, "TAR LOG", {"/vendor/bin/tar", "cvf", tempTarFile.path, dirToDump.c_str()}, CommandOptions::WithTimeout(duration_cast(kTarTimeout).count()).Build()); std::vector buffer(65536); while (true) { ssize_t bytes_read = TEMP_FAILURE_RETRY(read(tempTarFile.fd, buffer.data(), buffer.size())); if (bytes_read == 0) { break; } else if (bytes_read < 0) { PLOG(DEBUG) << "Error reading temporary tar file(" << tempTarFile.path << ")"; break; } ssize_t result = TEMP_FAILURE_RETRY(write(binFd, buffer.data(), bytes_read)); if (result != bytes_read) { LOG(DEBUG) << "Failed to write " << bytes_read << " bytes, actually written: " << result; break; } } } bool DumpstateDevice::dumpRemoteLogs( ::grpc::ClientReaderInterface* grpcReader, const fs::path& dumpPath) { dumpstate_proto::DumpstateBuffer logStreamBuffer; std::fstream logFile(dumpPath, std::fstream::out | std::fstream::binary); if (!logFile.is_open()) { LOG(ERROR) << "Failed to open file " << dumpPath; return false; } while (grpcReader->Read(&logStreamBuffer)) { const auto& writeBuffer = logStreamBuffer.buffer(); logFile.write(writeBuffer.c_str(), writeBuffer.size()); } auto grpcStatus = grpcReader->Finish(); if (!grpcStatus.ok()) { LOG(ERROR) << __func__ << ": GRPC GetCommandOutput Failed: " << grpcStatus.error_message(); return false; } return true; } bool DumpstateDevice::dumpString(const std::string& text, const fs::path& dumpPath) { std::fstream logFile(dumpPath, std::fstream::out | std::fstream::binary); if (!logFile.is_open()) { LOG(ERROR) << "Failed to open file " << dumpPath; return false; } logFile.write(text.c_str(), text.size()); return true; } bool DumpstateDevice::dumpHelperSystem(int textFd, int binFd) { std::string helperSystemLogDir = android::base::GetProperty(VENDOR_HELPER_SYSTEM_LOG_LOC_PROPERTY, ""); if (helperSystemLogDir.empty()) { LOG(ERROR) << "Helper system log location '" << VENDOR_HELPER_SYSTEM_LOG_LOC_PROPERTY << "' not set"; return false; } std::error_code error; auto helperSysLogPath = fs::path(helperSystemLogDir); if (!fs::create_directories(helperSysLogPath, error)) { LOG(ERROR) << "Failed to create the dumping log directory " << helperSystemLogDir << ": " << error; return false; } if (!fs::is_directory(helperSysLogPath)) { LOG(ERROR) << helperSystemLogDir << " is not a directory"; return false; } if (!isHealthy()) { LOG(ERROR) << "Failed to connect to the dumpstate server"; return false; } // When start dumping, we always return success to keep dumped logs // even if some of them are failed { // Dumping system logs ::grpc::ClientContext context; auto reader = mGrpcStub->GetSystemLogs(&context, ::google::protobuf::Empty()); dumpRemoteLogs(reader.get(), helperSysLogPath / "system_log"); } { // Dumping host system info const std::string hyp = "Host version information: " + GetProperty(BOOT_HYPERVISOR_VERSION_PROPERTY, "missing/unavailable"); dumpString(hyp, helperSysLogPath / "host_info"); } // Request for service list every time to allow the service list to change on the server side. // Also the getAvailableServices() may fail and return an empty list (e.g., failure on the // server side), and it should not affect the future queries const auto availableServices = getAvailableServices(); // Dumping service logs for (const auto& service : availableServices) { ::grpc::ClientContext context; dumpstate_proto::ServiceLogRequest request; request.set_service_name(service); auto reader = mGrpcStub->GetServiceLogs(&context, request); dumpRemoteLogs(reader.get(), helperSysLogPath / service); } tryDumpDirAsTar(textFd, binFd, helperSystemLogDir); if (fs::remove_all(helperSysLogPath, error) == static_cast(-1)) { LOG(ERROR) << "Failed to clear the dumping log directory " << helperSystemLogDir << ": " << error; } return true; } bool DumpstateDevice::isHealthy() { // Check that we can get services back from the remote end // This check will not work if the server actually works but is // not exporting any services. This seems like a corner case // but it's worth pointing out. return (getAvailableServices().size() > 0); } std::vector DumpstateDevice::getAvailableServices() { ::grpc::ClientContext context; dumpstate_proto::ServiceNameList servicesProto; auto grpc_status = mGrpcStub->GetAvailableServices(&context, ::google::protobuf::Empty(), &servicesProto); if (!grpc_status.ok()) { LOG(ERROR) << "Failed to get available services from the server: " << grpc_status.error_message(); return {}; } std::vector services; for (auto& service : servicesProto.service_names()) { services.emplace_back(service); } return services; } DumpstateDevice::DumpstateDevice(const std::string& addr) : mServiceAddr(addr), mGrpcChannel(::grpc::CreateChannel(mServiceAddr, getChannelCredentials())), mGrpcStub(dumpstate_proto::DumpstateServer::NewStub(mGrpcChannel)) {} // Methods from ::android::hardware::dumpstate::V1_0::IDumpstateDevice follow. Return DumpstateDevice::dumpstateBoard(const hidl_handle& handle) { // Ignore return value, just return an empty status. dumpstateBoard_1_1(handle, DumpstateMode::DEFAULT, 30 * 1000 /* timeoutMillis */); return Void(); } // Methods from ::android::hardware::dumpstate::V1_1::IDumpstateDevice follow. Return DumpstateDevice::dumpstateBoard_1_1(const hidl_handle& handle, const DumpstateMode /* mode */, const uint64_t /* timeoutMillis */) { if (handle == nullptr || handle->numFds < 1) { LOG(ERROR) << "No FDs"; return DumpstateStatus::ILLEGAL_ARGUMENT; } const int textFd = handle->data[0]; const int binFd = handle->numFds >= 2 ? handle->data[1] : -1; if (!dumpHelperSystem(textFd, binFd)) { return DumpstateStatus::DEVICE_LOGGING_NOT_ENABLED; } return DumpstateStatus::OK; } Return DumpstateDevice::setVerboseLoggingEnabled(const bool enable) { android::base::SetProperty(VENDOR_VERBOSE_LOGGING_ENABLED_PROPERTY, enable ? "true" : "false"); return Void(); } Return DumpstateDevice::getVerboseLoggingEnabled() { return android::base::GetBoolProperty(VENDOR_VERBOSE_LOGGING_ENABLED_PROPERTY, false); } Return DumpstateDevice::debug(const hidl_handle& h, const hidl_vec& options) { if (h.getNativeHandle() == nullptr || h->numFds == 0) { LOG(ERROR) << "Invalid FD passed to debug() function"; return Void(); } const int fd = h->data[0]; auto pf = [fd](std::string s) -> void { dprintf(fd, "%s\n", s.c_str()); }; debugDumpServices(pf); return Void(); } void DumpstateDevice::debugDumpServices(std::function f) { f("Available services for Dumpstate:"); for (const auto& svc : getAvailableServices()) { f(" " + svc); } } sp makeVirtualizationDumpstateDevice(const std::string& addr) { return new DumpstateDevice(addr); } } // namespace android::hardware::dumpstate::V1_1::implementation