blob: ee60843c9c1943cafca6257d7bf51fdf904050d5 [file] [log] [blame]
Elly Jones03cd6d72012-06-11 13:04:28 -04001// Copyright (c) 2012 The Chromium OS Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
4
Alex Vakulenko262be3f2014-07-30 15:25:50 -07005#include "debugd/src/log_tool.h"
Elly Jones03cd6d72012-06-11 13:04:28 -04006
Fletcher Woodruff07c28532019-01-24 11:08:53 -07007#include <grp.h>
8#include <inttypes.h>
Chinglin Yuaeb4ec72018-12-10 18:53:30 +08009#include <lzma.h>
Fletcher Woodruff07c28532019-01-24 11:08:53 -070010#include <pwd.h>
11#include <stdint.h>
12#include <sys/types.h>
13#include <unistd.h>
Ben Chan8e9f6d02017-09-26 23:04:21 -070014#include <memory>
Luis Hector Chavezfc2566f2018-09-13 15:00:36 -070015#include <string>
Fletcher Woodruff07c28532019-01-24 11:08:53 -070016#include <utility>
Ben Chana0011d82014-05-13 00:19:29 -070017#include <vector>
18
Ben Chanab93abf2017-01-24 13:32:51 -080019#include <base/base64.h>
Fletcher Woodruff07c28532019-01-24 11:08:53 -070020#include <base/files/file.h>
21#include <base/files/file_path.h>
Ben Chancd8fda42014-09-05 08:21:06 -070022#include <base/files/file_util.h>
Ahmed Fakhry21140cf2016-03-04 17:15:19 -080023#include <base/json/json_writer.h>
Elly Jones03cd6d72012-06-11 13:04:28 -040024#include <base/logging.h>
Ben Chan9953a592014-02-05 23:32:00 -080025#include <base/strings/string_split.h>
26#include <base/strings/string_util.h>
Luis Hector Chavezfc2566f2018-09-13 15:00:36 -070027#include <base/strings/stringprintf.h>
28#include <base/strings/utf_string_conversion_utils.h>
Ahmed Fakhry21140cf2016-03-04 17:15:19 -080029#include <base/values.h>
Elly Jones03cd6d72012-06-11 13:04:28 -040030
Rebecca Silbersteine78af402014-10-02 10:55:04 -070031#include <chromeos/dbus/service_constants.h>
Eric Carusocc7106c2017-04-27 14:22:42 -070032#include <shill/dbus-proxies.h>
Rebecca Silbersteine78af402014-10-02 10:55:04 -070033
Ben Chanaf125862017-02-08 23:11:18 -080034#include "debugd/src/constants.h"
Chinglin Yuaeb4ec72018-12-10 18:53:30 +080035#include "debugd/src/perf_tool.h"
Alex Vakulenko262be3f2014-07-30 15:25:50 -070036#include "debugd/src/process_with_output.h"
Elly Jones03cd6d72012-06-11 13:04:28 -040037
Kartik Hegde1c4b97b2018-09-09 19:09:34 -060038#include "brillo/key_value_store.h"
39#include <brillo/osrelease_reader.h>
40
Elly Jones03cd6d72012-06-11 13:04:28 -040041namespace debugd {
42
Elly Jones03cd6d72012-06-11 13:04:28 -040043using std::string;
Elly Jones03cd6d72012-06-11 13:04:28 -040044
Eric Caruso96d03d32017-04-25 18:01:17 -070045using Strings = std::vector<string>;
Elly Jones03cd6d72012-06-11 13:04:28 -040046
Ahmed Fakhry21140cf2016-03-04 17:15:19 -080047namespace {
48
Ben Chanaf125862017-02-08 23:11:18 -080049const char kRoot[] = "root";
50const char kShell[] = "/bin/sh";
Kartik Hegde1c4b97b2018-09-09 19:09:34 -060051constexpr char kLsbReleasePath[] = "/etc/lsb-release";
Ahmed Fakhry21140cf2016-03-04 17:15:19 -080052
53// Minimum time in seconds needed to allow shill to test active connections.
54const int kConnectionTesterTimeoutSeconds = 5;
Ben Chanf6cd93a2012-10-14 19:37:00 -070055
Chinglin Yuaeb4ec72018-12-10 18:53:30 +080056// Default running perf for 2 seconds.
57constexpr const int kPerfDurationSecs = 2;
58
Eric Carusoa879fd92017-10-11 12:57:10 -070059#define CMD_KERNEL_MODULE_PARAMS(module_name) \
Luigi Semenzato7e2c08f2018-06-26 14:58:49 -070060 "cd /sys/module/" #module_name "/parameters 2>/dev/null && grep -sH ^ *"
Eric Carusoa879fd92017-10-11 12:57:10 -070061
Fletcher Woodruff07c28532019-01-24 11:08:53 -070062using Log = LogTool::Log;
63constexpr Log::LogType kCommand = Log::kCommand;
64constexpr Log::LogType kFile = Log::kFile;
65const std::vector<Log> kCommandLogs {
Mike Frysingerb0350992018-09-14 13:45:35 -040066 // We need to enter init's mount namespace because it has /home/chronos
67 // mounted which is where the consent knob lives. We don't have that mount
68 // in our own mount namespace (by design). https://crbug.com/884249
Fletcher Woodruff07c28532019-01-24 11:08:53 -070069 Log(kCommand, "CLIENT_ID",
70 "/usr/bin/nsenter -t1 -m /usr/bin/metrics_client -i", kRoot,
71 kDebugfsGroup),
72 Log(kCommand, "LOGDATE", "/bin/date"),
73 Log(kFile, "atrus_logs", "/var/log/atrus.log"),
74 Log(kFile, "authpolicy", "/var/log/authpolicy.log"),
75 Log(kCommand, "bootstat_summary", "/usr/bin/bootstat_summary"),
76 Log(kFile, "bio_crypto_init.log",
77 "/var/log/bio_crypto_init/bio_crypto_init.log"),
78 Log(kFile, "biod.LATEST", "/var/log/biod/biod.LATEST"),
79 Log(kFile, "biod.PREVIOUS", "/var/log/biod/biod.PREVIOUS"),
80 Log(kFile, "bios_info", "/var/log/bios_info.txt"),
81 Log(kCommand, "bios_log",
82 "cat /sys/firmware/log "
83 "/proc/device-tree/chosen/ap-console-buffer 2>/dev/null"),
84 Log(kFile, "bios_times", "/var/log/bios_times.txt"),
85 Log(kCommand, "board-specific",
86 "/usr/share/userfeedback/scripts/get_board_specific_info"),
87 Log(kFile, "buddyinfo", "/proc/buddyinfo"),
88 Log(kCommand, "cbi_info", "/usr/share/userfeedback/scripts/cbi_info", kRoot,
89 kRoot),
90 Log(kFile, "cheets_log", "/var/log/arc.log"),
91 Log(kFile, "clobber.log", "/var/log/clobber.log"),
92 Log(kFile, "clobber-state.log", "/var/log/clobber-state.log"),
93 Log(kFile, "chrome_system_log", "/var/log/chrome/chrome"),
94 Log(kFile, "chrome_system_log.PREVIOUS", "/var/log/chrome/chrome.PREVIOUS"),
Mike Frysinger32cdf3e2017-08-14 18:17:06 -040095 // There might be more than one record, so grab them all.
96 // Plus, for <linux-3.19, it's named "console-ramoops", but for newer
97 // versions, it's named "console-ramoops-#".
Fletcher Woodruff07c28532019-01-24 11:08:53 -070098 Log(kCommand, "console-ramoops",
99 "cat /sys/fs/pstore/console-ramoops* 2>/dev/null"),
100 Log(kFile, "cpuinfo", "/proc/cpuinfo"),
101 Log(kFile, "cr50_version", "/var/cache/cr50-version"),
102 Log(kFile, "cros_ec.log", "/var/log/cros_ec.log"),
103 Log(kFile, "cros_ec.previous", "/var/log/cros_ec.previous"),
104 Log(kFile, "cros_ec_panicinfo", "/sys/kernel/debug/cros_ec/panicinfo",
105 SandboxedProcess::kDefaultUser, kDebugfsGroup),
106 Log(kFile, "cros_ec_pdinfo", "/sys/kernel/debug/cros_ec/pdinfo",
107 SandboxedProcess::kDefaultUser, kDebugfsGroup),
108 Log(kFile, "cros_fp.previous", "/var/log/cros_fp.previous"),
109 Log(kFile, "cros_fp.log", "/var/log/cros_fp.log"),
110 Log(kCommand, "dmesg", "/bin/dmesg"),
111 Log(kFile, "ec_info", "/var/log/ec_info.txt"),
Miguel Casas8d4e54f2018-03-29 09:42:52 -0400112 // The sed command replaces the EDID serial number (4 bytes at position 12)
113 // with zeroes. See https://en.wikipedia.org/wiki/EDID#EDID_1.4_data_format.
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700114 Log(kCommand, "edid-decode",
115 "for f in /sys/class/drm/card0-*/edid; do "
Miguel Casas8d4e54f2018-03-29 09:42:52 -0400116 "echo \"----------- ${f}\"; "
Miguel Casas1b8d2792018-08-17 20:00:52 -0400117 "sed -E 's/^(.{11}).{4}/\\1\\x0\\x0\\x0\\x0/' \"${f}\" | "
118 // edid-decode's stderr output is redundant, so silence it.
119 "edid-decode 2>/dev/null; "
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700120 "done"),
121 Log(kFile, "eventlog", "/var/log/eventlog.txt"),
122 Log(kFile, "exynos_gem_objects", "/sys/kernel/debug/dri/0/exynos_gem_objects",
123 SandboxedProcess::kDefaultUser, kDebugfsGroup),
124 Log(kCommand, "font_info", "/usr/share/userfeedback/scripts/font_info"),
125 Log(kCommand, "sensor_info", "/usr/share/userfeedback/scripts/sensor_info"),
126 Log(kFile, "hammerd", "/var/log/hammerd.log"),
127 Log(kCommand, "hardware_class", "/usr/bin/crossystem hwid"),
128 Log(kCommand, "hostname", "/bin/hostname"),
129 Log(kFile, "i915_gem_gtt", "/sys/kernel/debug/dri/0/i915_gem_gtt",
130 SandboxedProcess::kDefaultUser, kDebugfsGroup),
131 Log(kFile, "i915_gem_objects", "/sys/kernel/debug/dri/0/i915_gem_objects",
132 SandboxedProcess::kDefaultUser, kDebugfsGroup),
133 Log(kFile, "i915_gem_objects", "/sys/kernel/debug/dri/0/i915_gem_objects",
134 SandboxedProcess::kDefaultUser, kDebugfsGroup),
135 Log(kCommand, "i915_error_state",
136 "/usr/bin/xz -c /sys/kernel/debug/dri/0/i915_error_state 2>/dev/null",
137 SandboxedProcess::kDefaultUser, kDebugfsGroup, Log::kDefaultMaxBytes,
138 LogTool::Encoding::kBinary),
139 Log(kCommand, "ifconfig", "/bin/ifconfig -a"),
140 Log(kFile, "input_devices", "/proc/bus/input/devices"),
Eric Carusob1820c02017-08-24 15:39:56 -0700141 // Information about the wiphy device, such as current channel.
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700142 Log(kCommand, "iw_dev", "/usr/sbin/iw dev"),
Eric Carusob1820c02017-08-24 15:39:56 -0700143 // Hardware capabilities of the wiphy device.
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700144 Log(kCommand, "iw_list", "/usr/sbin/iw list"),
Eric Carusoa879fd92017-10-11 12:57:10 -0700145#if USE_IWLWIFI_DUMP
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700146 Log(kCommand, "iwlmvm_module_params", CMD_KERNEL_MODULE_PARAMS(iwlmvm)),
147 Log(kCommand, "iwlwifi_module_params", CMD_KERNEL_MODULE_PARAMS(iwlwifi)),
Eric Carusoa879fd92017-10-11 12:57:10 -0700148#endif // USE_IWLWIFI_DUMP
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700149 Log(kCommand, "kernel-crashes",
150 "cat /var/spool/crash/kernel.*.kcrash 2>/dev/null"),
151 Log(kCommand, "logcat", "/usr/sbin/android-sh -c '/system/bin/logcat -d'",
152 kRoot, kRoot, Log::kDefaultMaxBytes, LogTool::Encoding::kUtf8),
153 Log(kCommand, "lsmod", "lsmod"),
154 Log(kCommand, "lspci", "/usr/sbin/lspci"),
155 Log(kCommand, "lsusb", "lsusb && lsusb -t"),
156 Log(kFile, "mali_memory", "/sys/class/misc/mali0/device/memory"),
157 Log(kFile, "memd.parameters", "/var/log/memd/memd.parameters"),
158 Log(kCommand, "memd clips", "cat /var/log/memd/memd.clip* 2>/dev/null"),
159 Log(kFile, "meminfo", "/proc/meminfo"),
160 Log(kCommand, "memory_spd_info",
161 // mosys may use 'i2c-dev', which may not be loaded yet.
162 "modprobe i2c-dev 2>/dev/null && "
163 "mosys -l memory spd print all 2>/dev/null",
164 kRoot, kDebugfsGroup),
Simon Quecb63b9c2017-06-19 14:53:31 -0400165 // The sed command finds the EDID blob (starting the line after "value:") and
166 // replaces the serial number with all zeroes.
167 //
168 // The EDID is printed as a hex dump over several lines, each line containing
169 // the contents of 16 bytes. The first 16 bytes are broken down as follows:
170 // uint64_t fixed_pattern; // Always 00 FF FF FF FF FF FF 00.
171 // uint16_t manufacturer_id; // Manufacturer ID, encoded as PNP IDs.
172 // uint16_t product_code; // Manufacturer product code, little-endian.
173 // uint32_t serial_number; // Serial number, little-endian.
174 // Source: https://en.wikipedia.org/wiki/EDID#EDID_1.3_data_format
175 //
176 // The subsequent substitution command looks for the fixed pattern followed by
177 // two 32-bit fields (manufacturer + product, serial number). It replaces the
178 // latter field with 8 bytes of zeroes.
179 //
180 // TODO(crbug.com/731133): Remove the sed command once modetest itself can
181 // remove serial numbers.
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700182 Log(kCommand, "modetest",
183 "(modetest; modetest -M evdi; modetest -M udl) | "
184 "sed -E '/EDID/ {:a;n;/value:/!ba;n;"
185 "s/(00f{12}00)([0-9a-f]{8})([0-9a-f]{8})/\\1\\200000000/}'",
186 kRoot, kRoot),
187 Log(kFile, "mount-encrypted", "/var/log/mount-encrypted.log"),
188 Log(kFile, "mountinfo", "/proc/1/mountinfo"),
189 Log(kCommand, "netlog",
190 "/usr/share/userfeedback/scripts/getmsgs /var/log/net.log"),
Kevin Cernekee143e2af2018-03-20 13:28:20 -0700191 // --processes requires root.
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700192 Log(kCommand, "netstat",
193 "/sbin/ss --all --query inet --numeric --processes", kRoot, kRoot),
194 Log(kFile, "nvmap_iovmm", "/sys/kernel/debug/nvmap/iovmm/allocations",
195 SandboxedProcess::kDefaultUser, kDebugfsGroup),
196 Log(kCommand, "oemdata", "/usr/share/cros/oemdata.sh", kRoot, kRoot),
197 Log(kFile, "pagetypeinfo", "/proc/pagetypeinfo"),
198 Log(kCommand, "platform_info",
199 // mosys may use 'i2c-dev', which may not be loaded yet.
200 "modprobe i2c-dev 2>/dev/null && "
201 "for param in "
202 "vendor "
203 "name "
204 "version "
205 "family "
206 "model "
207
208 "sku "
209 "customization "
210 "; do "
211 "mosys -l platform \"${param}\" 2>/dev/null; "
212 "done",
213 kRoot, kDebugfsGroup),
214 Log(kCommand, "power_supply_info", "/usr/bin/power_supply_info"),
215 Log(kCommand, "power_supply_sysfs",
216 "/usr/bin/print_sysfs_power_supply_data"),
217 Log(kFile, "powerd.LATEST", "/var/log/power_manager/powerd.LATEST"),
218 Log(kFile, "powerd.PREVIOUS", "/var/log/power_manager/powerd.PREVIOUS"),
219 Log(kFile, "powerd.out", "/var/log/powerd.out"),
220 Log(kFile, "powerwash_count", "/var/log/powerwash_count"),
Mattias Nissler887dce22017-07-03 14:44:35 +0200221 // Changed from 'ps ux' to 'ps aux' since we're running as debugd,
222 // not chronos.
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700223 Log(kCommand, "ps", "/bin/ps aux"),
yusukes34171ba2017-04-27 15:46:01 -0700224 // /proc/slabinfo is owned by root and has 0400 permission.
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700225 Log(kFile, "slabinfo", "/proc/slabinfo", kRoot, kRoot),
226 Log(kFile, "storage_info", "/var/log/storage_info.txt"),
227 Log(kCommand, "swap_info",
228 "/usr/share/cros/init/swap.sh status 2>/dev/null",
229 SandboxedProcess::kDefaultUser, kDebugfsGroup),
230 Log(kCommand, "syslog",
231 "/usr/share/userfeedback/scripts/getmsgs /var/log/messages"),
232 Log(kCommand, "system_log_stats",
233 "echo 'BLOCK_SIZE=1024'; "
234 "find /var/log/ -type f -exec du --block-size=1024 {} + | sort -n -r",
235 kRoot, kRoot),
236 Log(kCommand, "threads",
237 "/bin/ps -T axo pid,ppid,spid,pcpu,ni,stat,time,comm"),
238 Log(kFile, "tlsdate", "/var/log/tlsdate.log"),
239 Log(kCommand, "top thread", "/usr/bin/top -Hb -n 1 | head -n 40"),
240 Log(kCommand, "top memory", "/usr/bin/top -o \"+%MEM\" -bn 1 | head -n 57"),
241 Log(kCommand, "touch_fw_version",
242 "grep -E"
243 " -e 'synaptics: Touchpad model'"
244 " -e 'chromeos-[a-z]*-touch-[a-z]*-update'"
245 " /var/log/messages | tail -n 20"),
246 Log(kCommand, "tpm-firmware-updater",
247 "/usr/share/userfeedback/scripts/getmsgs "
248 "/var/log/tpm-firmware-updater.log"),
Mattias Nissler887dce22017-07-03 14:44:35 +0200249 // TODO(jorgelo,mnissler): Don't run this as root.
250 // On TPM 1.2 devices this will likely require adding a new user to the 'tss'
251 // group.
252 // On TPM 2.0 devices 'get_version_info' uses D-Bus and therefore can run as
253 // any user.
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700254 Log(kCommand, "tpm_version", "/usr/sbin/tpm-manager get_version_info", kRoot,
255 kRoot),
256 Log(kCommand, "atmel_ts_refs",
257 "/opt/google/touch/scripts/atmel_tools.sh ts r", kRoot, kRoot),
258 Log(kCommand, "atmel_tp_refs",
259 "/opt/google/touch/scripts/atmel_tools.sh tp r", kRoot, kRoot),
260 Log(kCommand, "atmel_ts_deltas",
261 "/opt/google/touch/scripts/atmel_tools.sh ts d", kRoot, kRoot),
262 Log(kCommand, "atmel_tp_deltas",
263 "/opt/google/touch/scripts/atmel_tools.sh tp d", kRoot, kRoot),
264 Log(kFile, "stateful_trim_state", "/var/lib/trim/stateful_trim_state"),
265 Log(kFile, "stateful_trim_data", "/var/lib/trim/stateful_trim_data"),
266 Log(kCommand, "ui_log",
267 "/usr/share/userfeedback/scripts/get_log /var/log/ui/ui.LATEST"),
268 Log(kCommand, "uname", "/bin/uname -a"),
269 Log(kCommand, "update_engine.log",
270 "cat $(ls -1tr /var/log/update_engine | tail -5 | sed"
271 " s.^./var/log/update_engine/.)"),
272 Log(kCommand, "uptime", "/usr/bin/cut -d' ' -f1 /proc/uptime"),
273 Log(kFile, "verified boot", "/var/log/debug_vboot_noisy.log"),
274 Log(kFile, "vmlog.1.LATEST", "/var/log/vmlog/vmlog.1.LATEST"),
275 Log(kFile, "vmlog.1.PREVIOUS", "/var/log/vmlog/vmlog.1.PREVIOUS"),
276 Log(kFile, "vmlog.LATEST", "/var/log/vmlog/vmlog.LATEST"),
277 Log(kFile, "vmlog.PREVIOUS", "/var/log/vmlog/vmlog.PREVIOUS"),
278 Log(kFile, "vmstat", "/proc/vmstat"),
279 Log(kFile, "vpd_2.0", "/var/log/vpd_2.0.txt"),
280 Log(kCommand, "wifi_status",
281 "/usr/bin/network_diag --wifi-internal --no-log"),
282 Log(kFile, "zram compressed data size", "/sys/block/zram0/compr_data_size"),
283 Log(kFile, "zram original data size", "/sys/block/zram0/orig_data_size"),
284 Log(kFile, "zram total memory used", "/sys/block/zram0/mem_used_total"),
285 Log(kFile, "zram total reads", "/sys/block/zram0/num_reads"),
286 Log(kFile, "zram total writes", "/sys/block/zram0/num_writes"),
287 Log(kCommand, "zram new stats names",
288 "echo orig_size compr_size used_total limit used_max zero_pages "
289 "migrated"),
290 Log(kFile, "zram new stats values", "/sys/block/zram0/mm_stat"),
291 Log(kFile, "cros_tp version", "/sys/class/chromeos/cros_tp/version"),
292 Log(kCommand, "cros_tp console", "/usr/sbin/ectool --name=cros_tp console",
293 kRoot, kRoot),
294 Log(kCommand, "cros_tp frame", "/usr/sbin/ectool --name=cros_tp tpframeget",
295 kRoot, kRoot),
296 Log(kCommand, "crostini", "/usr/bin/cicerone_client --get_info"),
Elly Jones03cd6d72012-06-11 13:04:28 -0400297 // Stuff pulled out of the original list. These need access to the running X
298 // session, which we'd rather not give to debugd, or return info specific to
299 // the current session (in the setsid(2) sense), which is not useful for
300 // debugd
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700301 // Log(kCommand, "env", "set"),
302 // Log(kCommand, "setxkbmap", "/usr/bin/setxkbmap -print -query"),
303 // Log(kCommand, "xrandr", "/usr/bin/xrandr --verbose)
Elly Jones533c7c42012-08-10 15:07:05 -0400304};
305
Kevin Cernekee143e2af2018-03-20 13:28:20 -0700306// netstat and logcat should appear in chrome://system but not in feedback
307// reports. Open sockets may have privacy implications, and logcat is
308// already incorporated via arc-bugreport.
309const std::vector<string> kCommandLogsExclude = {"netstat", "logcat"};
310
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700311const std::vector<Log> kExtraLogs {
Ben Chan36e42282014-02-12 22:32:34 -0800312#if USE_CELLULAR
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700313 Log(kCommand, "mm-status", "/usr/bin/modem status"),
Ben Chan36e42282014-02-12 22:32:34 -0800314#endif // USE_CELLULAR
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700315 Log(kCommand, "network-devices", "/usr/bin/connectivity show devices"),
316 Log(kCommand, "network-services", "/usr/bin/connectivity show services"),
Elly Jones533c7c42012-08-10 15:07:05 -0400317};
318
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700319const std::vector<Log> kFeedbackLogs {
Ben Chan36e42282014-02-12 22:32:34 -0800320#if USE_CELLULAR
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700321 Log(kCommand, "mm-status", "/usr/bin/modem status-feedback"),
Ben Chan36e42282014-02-12 22:32:34 -0800322#endif // USE_CELLULAR
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700323 Log(kCommand, "network-devices",
324 "/usr/bin/connectivity show-feedback devices"),
325 Log(kCommand, "network-services",
326 "/usr/bin/connectivity show-feedback services"),
Elly Jones03cd6d72012-06-11 13:04:28 -0400327};
328
Ahmed Fakhry1498b4e2016-03-30 12:42:20 -0700329// List of log files needed to be part of the feedback report that are huge and
330// must be sent back to the client via the file descriptor using
331// LogTool::GetBigFeedbackLogs().
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700332const std::vector<Log> kBigFeedbackLogs{
333 // ARC bugreport permissions are weird. Since we're just reading a file,
334 // this shouldn't cause any issues.
335 Log(kFile, "arc-bugreport", "/run/arc/bugreport/pipe", kRoot, kRoot,
336 10 * 1024 * 1024, LogTool::Encoding::kUtf8),
Ahmed Fakhry1498b4e2016-03-30 12:42:20 -0700337};
338
Gaurav Shahf6c8f2a2012-10-11 17:22:43 -0700339// List of log files that must directly be collected by Chrome. This is because
340// debugd is running under a VFS namespace and does not have access to later
341// cryptohome mounts.
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700342using UserLog = std::pair<std::string, std::string>;
343const std::vector<UserLog> kUserLogs = {
344 UserLog("chrome_user_log", "log/chrome"),
345 UserLog("libassistant_user_log", "log/libassistant.log"),
346 UserLog("login-times", "login-times"),
347 UserLog("logout-times", "logout-times"),
Gaurav Shahf6c8f2a2012-10-11 17:22:43 -0700348};
349
Ahmed Fakhry21140cf2016-03-04 17:15:19 -0800350// Fills |dictionary| with the anonymized contents of the logs in |logs|.
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700351void GetLogsInDictionary(const std::vector<Log>& logs,
Ahmed Fakhry21140cf2016-03-04 17:15:19 -0800352 AnonymizerTool* anonymizer,
353 base::DictionaryValue* dictionary) {
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700354 for (const Log& log : logs) {
Ahmed Fakhry21140cf2016-03-04 17:15:19 -0800355 dictionary->SetStringWithoutPathExpansion(
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700356 log.GetName(), anonymizer->Anonymize(log.GetLogData()));
Ahmed Fakhry21140cf2016-03-04 17:15:19 -0800357 }
358}
359
360// Serializes the |dictionary| into the file with the given |fd| in a JSON
361// format.
362void SerializeLogsAsJSON(const base::DictionaryValue& dictionary,
Eric Caruso0b241882018-04-04 13:43:46 -0700363 const base::ScopedFD& fd) {
Eric Caruso96d03d32017-04-25 18:01:17 -0700364 string logs_json;
Ahmed Fakhry21140cf2016-03-04 17:15:19 -0800365 base::JSONWriter::WriteWithOptions(dictionary,
366 base::JSONWriter::OPTIONS_PRETTY_PRINT,
367 &logs_json);
Eric Caruso0b241882018-04-04 13:43:46 -0700368 base::WriteFileDescriptor(fd.get(), logs_json.c_str(), logs_json.size());
Ahmed Fakhry21140cf2016-03-04 17:15:19 -0800369}
370
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700371bool GetNamedLogFrom(const string& name,
372 const std::vector<Log>& logs,
Elly Jones533c7c42012-08-10 15:07:05 -0400373 string* result) {
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700374 for (const Log& log : logs) {
375 if (name == log.GetName()) {
376 *result = log.GetLogData();
Elly Jones533c7c42012-08-10 15:07:05 -0400377 return true;
378 }
379 }
380 *result = "<invalid log name>";
381 return false;
Elly Jones03cd6d72012-06-11 13:04:28 -0400382}
383
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700384void GetLogsFrom(const std::vector<Log>& logs, LogTool::LogMap* map) {
385 for (const Log& log : logs)
386 (*map)[log.GetName()] = log.GetLogData();
Ahmed Fakhry21140cf2016-03-04 17:15:19 -0800387}
388
Kartik Hegde1c4b97b2018-09-09 19:09:34 -0600389void GetLsbReleaseInfo(LogTool::LogMap* map) {
390 const base::FilePath lsb_release(kLsbReleasePath);
391 brillo::KeyValueStore store;
392 if (!store.Load(lsb_release)) {
393 // /etc/lsb-release might not be present (cros deploying a new
394 // configuration or no fields set at all). Just print a debug
395 // message and continue.
396 DLOG(INFO) << "Could not load fields from " << lsb_release.value();
397 } else {
398 for (const auto& key : store.GetKeys()) {
399 std::string value;
400 store.GetString(key, &value);
401 (*map)[key] = value;
402 }
403 }
404}
405
406void GetOsReleaseInfo(LogTool::LogMap* map) {
407 brillo::OsReleaseReader reader;
408 reader.Load();
409 for (const auto& key : reader.GetKeys()) {
410 std::string value;
411 reader.GetString(key, &value);
412 (*map)["os-release " + key] = value;
413 }
414}
415
416void PopulateDictionaryValue(const LogTool::LogMap& map,
417 base::DictionaryValue* dictionary) {
418 for (const auto& kv : map) {
419 dictionary->SetString(kv.first, kv.second);
420 }
421}
422
Chinglin Yuaeb4ec72018-12-10 18:53:30 +0800423bool CompressXzBuffer(const std::vector<uint8_t>& in_buffer,
424 std::vector<uint8_t>* out_buffer) {
425 size_t out_size = lzma_stream_buffer_bound(in_buffer.size());
426 out_buffer->resize(out_size);
427 size_t out_pos = 0;
428
429 lzma_ret ret = lzma_easy_buffer_encode(
430 LZMA_PRESET_DEFAULT, LZMA_CHECK_CRC64, nullptr, in_buffer.data(),
431 in_buffer.size(), out_buffer->data(), &out_pos, out_size);
432
433 if (ret != LZMA_OK) {
434 out_buffer->clear();
435 return false;
436 }
437
438 out_buffer->resize(out_pos);
439 return true;
440}
441
442void GetPerfData(LogTool::LogMap* map) {
443 // Run perf to collect system-wide performance profile when user triggers
444 // feedback report. Perf runs at sampling frequency of ~500 hz (499 is used
445 // to avoid sampling periodic system activities), with callstack in each
446 // sample (-g).
447 std::vector<std::string> perf_args = {
448 "perf", "record", "-a", "-g", "-F", "499"
449 };
450 std::vector<uint8_t> perf_data;
451 int32_t status;
452
453 debugd::PerfTool perf_tool;
454 if (!perf_tool.GetPerfOutput(kPerfDurationSecs, perf_args, &perf_data,
455 nullptr, &status, nullptr))
456 return;
457
458 // XZ compress the profile data.
459 std::vector<uint8_t> perf_data_xz;
460 if (!CompressXzBuffer(perf_data, &perf_data_xz))
461 return;
462
463 // Base64 encode the compressed data.
464 std::string perf_data_str(reinterpret_cast<const char*>(perf_data_xz.data()),
465 perf_data_xz.size());
466 (*map)["perf-data"] =
467 LogTool::EnsureUTF8String(perf_data_str, LogTool::Encoding::kBinary);
468}
469
Ahmed Fakhry21140cf2016-03-04 17:15:19 -0800470} // namespace
471
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700472Log::Log(Log::LogType type,
473 std::string name,
474 std::string data,
475 std::string user,
476 std::string group,
477 int64_t max_bytes,
478 LogTool::Encoding encoding)
479 : type_(type),
480 name_(name),
481 data_(data),
482 user_(user),
483 group_(group),
484 max_bytes_(max_bytes),
485 encoding_(encoding) {}
486
487std::string Log::GetName() const {
488 return name_;
489}
490
491std::string Log::GetLogData() const {
492 // The reason this code uses a switch statement on a type enum rather than
493 // using inheritance/virtual dispatch is so that all of the Log objects can
494 // be constructed statically. Switching to heap allocated subclasses of Log
495 // makes the code that declares all of the log entries much more verbose
496 // and harder to understand.
497 switch (type_) {
498 case kCommand:
499 return GetCommandLogData();
500 case kFile:
501 return GetFileLogData();
502 default:
503 return "<unknown log type>";
504 }
505}
506
507// TODO(ellyjones): sandbox. crosbug.com/35122
508std::string Log::GetCommandLogData() const {
509 if (type_ != kCommand)
510 return "<log type mismatch>";
511 std::string tailed_cmdline =
512 base::StringPrintf("%s | tail -c %" PRId64, data_.c_str(), max_bytes_);
513 ProcessWithOutput p;
514 if (minijail_disabled_for_test_)
515 p.set_use_minijail(false);
516 if (!user_.empty() && !group_.empty())
517 p.SandboxAs(user_, group_);
518 if (!p.Init())
519 return "<not available>";
520 p.AddArg(kShell);
521 p.AddStringOption("-c", tailed_cmdline);
522 if (p.Run())
523 return "<not available>";
524 std::string output;
525 p.GetOutput(&output);
526 if (output.empty())
527 return "<empty>";
528 return LogTool::EnsureUTF8String(output, encoding_);
529}
530
531std::string Log::GetFileLogData() const {
532 if (type_ != kFile)
533 return "<log type mismatch>";
534
535 uid_t old_euid = geteuid();
536 uid_t new_euid = UidForUser(user_);
537 gid_t old_egid = getegid();
538 gid_t new_egid = GidForGroup(group_);
539
540 if (new_euid == -1 || new_egid == -1) {
541 return "<not available>";
542 }
543
544 // Make sure to set group first, since if we set user first we lose root
545 // and therefore the ability to set our effective gid to arbitrary gids.
546 if (setegid(new_egid)) {
547 PLOG(ERROR) << "Failed to set effective group id to " << new_egid;
548 return "<not available>";
549 }
550 if (seteuid(new_euid)) {
551 PLOG(ERROR) << "Failed to set effective user id to " << new_euid;
552 if (setegid(old_egid))
553 PLOG(ERROR) << "Failed to restore effective group id to " << old_egid;
554 return "<not available>";
555 }
556
557 std::string contents;
558 const base::FilePath path(data_);
559 // Handle special files that don't properly report length/allow lseek.
560 if (base::FilePath("/dev").IsParent(path) ||
561 base::FilePath("/proc").IsParent(path) ||
562 base::FilePath("/sys").IsParent(path)) {
563 if (!base::ReadFileToString(path, &contents))
564 contents = "<not available>";
565 if (contents.size() > max_bytes_)
566 contents.erase(0, contents.size() - max_bytes_);
567 } else {
568 base::File file(path, base::File::FLAG_OPEN | base::File::FLAG_READ);
569 if (!file.IsValid()) {
570 contents = "<not available>";
571 } else {
572 int64_t length = file.GetLength();
573 if (length > max_bytes_) {
574 file.Seek(base::File::FROM_END, -max_bytes_);
575 length = max_bytes_;
576 }
577 std::vector<char> buf(length);
578 int read = file.ReadAtCurrentPos(buf.data(), buf.size());
579 if (read < 0) {
580 PLOG(ERROR) << "Could not read from file " << path.value();
581 } else {
582 contents = std::string(buf.begin(), buf.begin() + read);
583 }
584 }
585 }
586
587 if (contents.empty())
588 contents = "<empty>";
589
590 // Make sure we restore our old euid/egid before returning.
591 if (seteuid(old_euid))
592 PLOG(ERROR) << "Failed to restore effective user id to " << old_euid;
593
594 if (setegid(old_egid))
595 PLOG(ERROR) << "Failed to restore effective group id to " << old_egid;
596
597 return LogTool::EnsureUTF8String(contents, encoding_);
598}
599
600void Log::DisableMinijailForTest() {
601 minijail_disabled_for_test_ = true;
602}
603
604// static
605uid_t Log::UidForUser(const std::string& user) {
606 struct passwd entry;
607 struct passwd* result;
608 std::vector<char> buf(1024);
609 getpwnam_r(user.c_str(), &entry, &buf[0], buf.size(), &result);
610 if (!result) {
611 LOG(ERROR) << "User not found: " << user;
612 return -1;
613 }
614 return entry.pw_uid;
615}
616
617// static
618gid_t Log::GidForGroup(const std::string& group) {
619 struct group entry;
620 struct group* result;
621 std::vector<char> buf(1024);
622 getgrnam_r(group.c_str(), &entry, &buf[0], buf.size(), &result);
623 if (!result) {
624 LOG(ERROR) << "Group not found: " << group;
625 return -1;
626 }
627 return entry.gr_gid;
628}
629
Fletcher Woodruff70f27232019-01-24 11:41:34 -0700630void LogTool::CreateConnectivityReport(bool wait_for_results) {
Rebecca Silbersteine78af402014-10-02 10:55:04 -0700631 // Perform ConnectivityTrial to report connection state in feedback log.
Ben Chan8e9f6d02017-09-26 23:04:21 -0700632 auto shill = std::make_unique<org::chromium::flimflam::ManagerProxy>(bus_);
Rebecca Silbersteine78af402014-10-02 10:55:04 -0700633 // Give the connection trial time to test the connection and log the results
634 // before collecting the logs for feedback.
635 // TODO(silberst): Replace the simple approach of a single timeout with a more
636 // coordinated effort.
Fletcher Woodruff70f27232019-01-24 11:41:34 -0700637 if (shill && shill->CreateConnectivityReport(nullptr) && wait_for_results)
Eric Carusocc7106c2017-04-27 14:22:42 -0700638 sleep(kConnectionTesterTimeoutSeconds);
Rebecca Silbersteine78af402014-10-02 10:55:04 -0700639}
640
Eric Carusoc93a15c2017-04-24 16:15:12 -0700641string LogTool::GetLog(const string& name) {
Elly Jones533c7c42012-08-10 15:07:05 -0400642 string result;
Ben Chancf7d6412017-08-10 22:30:09 -0700643 GetNamedLogFrom(name, kCommandLogs, &result)
644 || GetNamedLogFrom(name, kExtraLogs, &result)
645 || GetNamedLogFrom(name, kFeedbackLogs, &result);
Elly Jones533c7c42012-08-10 15:07:05 -0400646 return result;
647}
648
Eric Carusof9091f82017-04-28 14:18:59 -0700649LogTool::LogMap LogTool::GetAllLogs() {
Fletcher Woodruff70f27232019-01-24 11:41:34 -0700650 CreateConnectivityReport(false);
Elly Jones533c7c42012-08-10 15:07:05 -0400651 LogMap result;
Ben Chancf7d6412017-08-10 22:30:09 -0700652 GetLogsFrom(kCommandLogs, &result);
653 GetLogsFrom(kExtraLogs, &result);
Kartik Hegde1c4b97b2018-09-09 19:09:34 -0600654 GetLsbReleaseInfo(&result);
655 GetOsReleaseInfo(&result);
Elly Jones533c7c42012-08-10 15:07:05 -0400656 return result;
657}
658
Brian Norrisca4fc042018-04-03 00:24:26 -0700659LogTool::LogMap LogTool::GetAllDebugLogs() {
Fletcher Woodruff70f27232019-01-24 11:41:34 -0700660 CreateConnectivityReport(true);
Brian Norrisca4fc042018-04-03 00:24:26 -0700661 LogMap result;
662 GetLogsFrom(kCommandLogs, &result);
663 GetLogsFrom(kExtraLogs, &result);
664 GetLogsFrom(kBigFeedbackLogs, &result);
Kartik Hegde1c4b97b2018-09-09 19:09:34 -0600665 GetLsbReleaseInfo(&result);
666 GetOsReleaseInfo(&result);
Brian Norrisca4fc042018-04-03 00:24:26 -0700667 return result;
668}
669
Eric Carusof9091f82017-04-28 14:18:59 -0700670LogTool::LogMap LogTool::GetFeedbackLogs() {
Fletcher Woodruff70f27232019-01-24 11:41:34 -0700671 CreateConnectivityReport(true);
Elly Jones533c7c42012-08-10 15:07:05 -0400672 LogMap result;
Ben Chancf7d6412017-08-10 22:30:09 -0700673 GetLogsFrom(kCommandLogs, &result);
Kevin Cernekee143e2af2018-03-20 13:28:20 -0700674 for (const auto& key : kCommandLogsExclude) {
675 result.erase(key);
676 }
Ben Chancf7d6412017-08-10 22:30:09 -0700677 GetLogsFrom(kFeedbackLogs, &result);
Kartik Hegde1c4b97b2018-09-09 19:09:34 -0600678 GetLsbReleaseInfo(&result);
679 GetOsReleaseInfo(&result);
Darin Petkovce9b3a12013-01-10 16:38:54 +0100680 AnonymizeLogMap(&result);
Elly Jones03cd6d72012-06-11 13:04:28 -0400681 return result;
682}
683
Eric Caruso0b241882018-04-04 13:43:46 -0700684void LogTool::GetBigFeedbackLogs(const base::ScopedFD& fd) {
Fletcher Woodruff70f27232019-01-24 11:41:34 -0700685 CreateConnectivityReport(true);
Chinglin Yuaeb4ec72018-12-10 18:53:30 +0800686 LogMap map;
687 GetPerfData(&map);
Ahmed Fakhry21140cf2016-03-04 17:15:19 -0800688 base::DictionaryValue dictionary;
Ben Chancf7d6412017-08-10 22:30:09 -0700689 GetLogsInDictionary(kCommandLogs, &anonymizer_, &dictionary);
Kevin Cernekee143e2af2018-03-20 13:28:20 -0700690 for (const auto& key : kCommandLogsExclude) {
691 dictionary.Remove(key, nullptr);
692 }
Ben Chancf7d6412017-08-10 22:30:09 -0700693 GetLogsInDictionary(kFeedbackLogs, &anonymizer_, &dictionary);
694 GetLogsInDictionary(kBigFeedbackLogs, &anonymizer_, &dictionary);
Kartik Hegde1c4b97b2018-09-09 19:09:34 -0600695 GetLsbReleaseInfo(&map);
696 GetOsReleaseInfo(&map);
697 PopulateDictionaryValue(map, &dictionary);
Ahmed Fakhry21140cf2016-03-04 17:15:19 -0800698 SerializeLogsAsJSON(dictionary, fd);
699}
700
Eric Carusoc93a15c2017-04-24 16:15:12 -0700701LogTool::LogMap LogTool::GetUserLogFiles() {
Gaurav Shahf6c8f2a2012-10-11 17:22:43 -0700702 LogMap result;
Fletcher Woodruff07c28532019-01-24 11:08:53 -0700703 for (const UserLog& ul : kUserLogs)
704 result[ul.first] = ul.second;
Gaurav Shahf6c8f2a2012-10-11 17:22:43 -0700705 return result;
706}
707
Luis Hector Chavezfc2566f2018-09-13 15:00:36 -0700708// static
709string LogTool::EnsureUTF8String(const string& value,
710 LogTool::Encoding source_encoding) {
711 if (source_encoding == LogTool::Encoding::kAutodetect) {
712 if (base::IsStringUTF8(value))
713 return value;
714 source_encoding = LogTool::Encoding::kBinary;
715 }
716
717 if (source_encoding == LogTool::Encoding::kUtf8) {
718 string output;
719 const char* src = value.data();
720 int32_t src_len = static_cast<int32_t>(value.length());
721
722 output.reserve(value.size());
723 for (int32_t char_index = 0; char_index < src_len; char_index++) {
724 uint32_t code_point;
725 if (!base::ReadUnicodeCharacter(src, src_len, &char_index, &code_point) ||
726 !base::IsValidCharacter(code_point)) {
727 // Replace invalid characters with U+FFFD REPLACEMENT CHARACTER.
728 code_point = 0xFFFD;
729 }
730 base::WriteUnicodeCharacter(code_point, &output);
731 }
732 return output;
733 } else {
734 string encoded_value;
735 base::Base64Encode(value, &encoded_value);
736 return "<base64>: " + encoded_value;
737 }
738}
739
Darin Petkovce9b3a12013-01-10 16:38:54 +0100740void LogTool::AnonymizeLogMap(LogMap* log_map) {
Ben Chane2fa3572017-02-08 22:46:18 -0800741 for (auto& entry : *log_map)
742 entry.second = anonymizer_.Anonymize(entry.second);
Darin Petkovce9b3a12013-01-10 16:38:54 +0100743}
744
Ben Chana0011d82014-05-13 00:19:29 -0700745} // namespace debugd