blob: b19387ca373bd5ae608b7ac57cf5b23263b62f06 [file] [log] [blame]
// Copyright 2018 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "crash-reporter/anomaly_detector.h"
#include <utility>
#include <anomaly_detector/proto_bindings/anomaly_detector.pb.h>
#include <base/rand_util.h>
#include <base/strings/strcat.h>
#include <base/strings/string_util.h>
#include <base/strings/stringprintf.h>
#include <chromeos/dbus/service_constants.h>
#include <dbus/bus.h>
#include <dbus/exported_object.h>
#include <dbus/message.h>
#include <re2/re2.h>
#include "crash-reporter/util.h"
namespace {
// This hashing algorithm dates back to before this was migrated from C to C++.
// We're stuck with it now because we would like the hashes to remain the same
// over time for a given crash as the hashes are used in the crash signatures.
uint32_t StringHash(const std::string& input) {
uint32_t hash = 0;
for (auto& c : input) {
hash = (hash << 5) + hash + c;
}
return hash;
}
std::string OnlyAsciiAlpha(std::string s) {
s.erase(std::remove_if(s.begin(), s.end(),
[](char c) -> bool { return !base::IsAsciiAlpha(c); }),
s.end());
return s;
}
} // namespace
namespace anomaly {
CrashReport::CrashReport(std::string t, std::vector<std::string> f)
: text(std::move(t)), flags(std::move(f)) {}
bool operator==(const CrashReport& lhs, const CrashReport& rhs) {
return lhs.text == rhs.text && lhs.flags == rhs.flags;
}
std::ostream& operator<<(std::ostream& out, const CrashReport& cr) {
out << "{.text='" << cr.text << "', .flags={"
<< base::JoinString(cr.flags, " ") << "}}";
return out;
}
Parser::~Parser() {}
// We expect only a handful of different anomalies per boot session, so the
// probability of a collision is very low, and statistically it won't matter
// (unless anomalies with the same hash also happens in tandem, which is even
// rarer).
bool Parser::WasAlreadySeen(uint32_t hash) {
size_t bit_index = hash % HASH_BITMAP_SIZE;
bool return_val = hash_bitmap_[bit_index];
hash_bitmap_.set(bit_index, true);
return return_val;
}
MaybeCrashReport Parser::PeriodicUpdate() {
return base::nullopt;
}
constexpr LazyRE2 service_failure = {
R"((\S+) \S+ process \(\d+\) terminated with status (\d+))"};
ServiceParser::ServiceParser(bool testonly_send_all)
: testonly_send_all_(testonly_send_all) {}
MaybeCrashReport ServiceParser::ParseLogEntry(const std::string& line) {
std::string service_name;
std::string exit_status;
if (!RE2::FullMatch(line, *service_failure, &service_name, &exit_status))
return base::nullopt;
// We only want to report 2% of service failures due to noise.
if (!testonly_send_all_ &&
base::RandGenerator(util::GetServiceFailureWeight()) != 0) {
return base::nullopt;
}
uint32_t hash = StringHash(service_name.c_str());
if (WasAlreadySeen(hash))
return base::nullopt;
std::string text = base::StringPrintf(
"%08x-exit%s-%s\n", hash, exit_status.c_str(), service_name.c_str());
std::string flag;
if (base::StartsWith(service_name, "arc-", base::CompareCase::SENSITIVE))
flag = "--arc_service_failure=" + service_name;
else
flag = "--service_failure=" + service_name;
return CrashReport(std::move(text), {std::move(flag)});
}
std::string GetField(const std::string& line, std::string pattern) {
std::string field_value;
RE2::PartialMatch(line, pattern, &field_value);
// This will return the empty string if there wasn't a match.
return field_value;
}
constexpr LazyRE2 granted = {"avc:[ ]*granted"};
SELinuxParser::SELinuxParser(bool testonly_send_all)
: testonly_send_all_(testonly_send_all) {}
MaybeCrashReport SELinuxParser::ParseLogEntry(const std::string& line) {
// Ignore permissive "errors". These are extremely common and don't have any
// real impact. The noise from them would crowd out other crashes that have
// a more significant impact.
if (line.find("permissive=1") != std::string::npos) {
return base::nullopt;
}
// We only want to report 0.1% of selinux violations due to noise.
if (!testonly_send_all_ &&
base::RandGenerator(util::GetSelinuxWeight()) != 0) {
return base::nullopt;
}
std::string only_alpha = OnlyAsciiAlpha(line);
uint32_t hash = StringHash(only_alpha.c_str());
if (WasAlreadySeen(hash))
return base::nullopt;
std::string signature;
// This case is strange: the '-' is only added if 'granted' was present.
if (RE2::PartialMatch(line, *granted))
signature += "granted-";
std::string scontext = GetField(line, R"(scontext=(\S*))");
std::string tcontext = GetField(line, R"(tcontext=(\S*))");
std::string permission = GetField(line, R"(\{ (\S*) \})");
std::string comm = GetField(line, R"'(comm="([^"]*)")'");
std::string name = GetField(line, R"'(name="([^"]*)")'");
signature += base::JoinString({scontext, tcontext, permission,
OnlyAsciiAlpha(comm), OnlyAsciiAlpha(name)},
"-");
std::string text =
base::StringPrintf("%08x-selinux-%s\n", hash, signature.c_str());
if (!comm.empty())
text += "comm\x01" + comm + "\x02";
if (!name.empty())
text += "name\x01" + name + "\x02";
if (!scontext.empty())
text += "scontext\x01" + scontext + "\x02";
if (!tcontext.empty())
text += "tcontext\x01" + tcontext + "\x02";
text += "\n";
text += line;
return CrashReport(std::move(text), {"--selinux_violation"});
}
std::string DetermineFlag(const std::string& info) {
if (info.find("drivers/net/wireless") != std::string::npos)
return "--kernel_wifi_warning";
if (info.find("drivers/idle") != std::string::npos)
return "--kernel_suspend_warning";
return "--kernel_warning";
}
// Older wifi chips have lmac dump only and newer wifi chips have lmac followed
// by umac dumps. The KernelParser should parse the dumps accordingly.
// The following regexp identify the beginning of the iwlwifi dump.
constexpr LazyRE2 start_iwlwifi_dump = {R"(iwlwifi.*Loaded firmware version:)"};
// The following regexp separates the umac and lmac.
constexpr LazyRE2 start_iwlwifi_dump_umac = {R"(Start IWL Error Log Dump(.+))"};
// The following regexps identify the iwlwifi error dump end.
constexpr LazyRE2 end_iwlwifi_dump_umac = {R"((.+)isr status reg)"};
constexpr LazyRE2 end_iwlwifi_dump_lmac = {R"((.+)flow_handler)"};
constexpr char cut_here[] = "------------[ cut here";
constexpr char end_trace[] = "---[ end trace";
constexpr char crash_report_rlimit[] =
"(crash_reporter) has RLIMIT_CORE set to";
// The CPU and PID information got added in the 3.11 kernel development cycle
// per commit dcb6b45254e2281b6f99ea7f2d51343954aa3ba8. That part is marked
// optional to make sure the old format still gets accepted. Once we no longer
// care about kernel version 3.10 and earlier, we can update the code to require
// CPU and PID to be present unconditionally.
constexpr LazyRE2 header = {
R"(^\[\s*\S+\] WARNING:(?: CPU: \d+ PID: \d+)? at (.+))"};
constexpr LazyRE2 smmu_fault = {R"(Unhandled context fault: fsr=0x)"};
MaybeCrashReport KernelParser::ParseLogEntry(const std::string& line) {
if (last_line_ == LineType::None) {
if (line.find(cut_here) != std::string::npos)
last_line_ = LineType::Start;
} else if (last_line_ == LineType::Start || last_line_ == LineType::Header) {
std::string info;
if (RE2::FullMatch(line, *header, &info)) {
// The info string looks like: "file:line func+offset/offset() [mod]".
// The [mod] suffix is only present if the address is located within a
// kernel module.
uint32_t hash = StringHash(info.c_str());
if (WasAlreadySeen(hash)) {
last_line_ = LineType::None;
return base::nullopt;
}
flag_ = DetermineFlag(info);
size_t spacep = info.find(" ");
bool found = spacep != std::string::npos;
auto function = found ? info.substr(spacep + 1) : "unknown-function";
text_ += base::StringPrintf("%08x-%s\n", hash, function.c_str());
text_ += base::StringPrintf("%s\n", info.c_str());
last_line_ = LineType::Body;
} else if (last_line_ == LineType::Start) {
// Allow for a single header line between the "cut here" and the "WARNING"
last_line_ = LineType::Header;
text_ += line + "\n";
} else {
last_line_ = LineType::None;
}
} else if (last_line_ == LineType::Body) {
if (line.find(end_trace) != std::string::npos) {
last_line_ = LineType::None;
std::string text_tmp;
text_tmp.swap(text_);
return CrashReport(std::move(text_tmp), {std::move(flag_)});
}
text_ += line + "\n";
}
if (iwlwifi_last_line_ == IwlwifiLineType::None) {
if (RE2::PartialMatch(line, *start_iwlwifi_dump)) {
iwlwifi_last_line_ = IwlwifiLineType::Start;
iwlwifi_text_ += line + "\n";
}
} else if (iwlwifi_last_line_ == IwlwifiLineType::Start) {
if (RE2::PartialMatch(line, *end_iwlwifi_dump_lmac)) {
iwlwifi_last_line_ = IwlwifiLineType::Lmac;
} else if (RE2::PartialMatch(line, *end_iwlwifi_dump_umac)) {
// Return if the line is equal to the umac end. There is never anything
// after the umac end.
iwlwifi_last_line_ = IwlwifiLineType::None;
iwlwifi_text_ += line + "\n";
std::string iwlwifi_text_tmp;
iwlwifi_text_tmp.swap(iwlwifi_text_);
return CrashReport(std::move(iwlwifi_text_tmp),
{std::move("--kernel_iwlwifi_error")});
}
iwlwifi_text_ += line + "\n";
} else if (iwlwifi_last_line_ == IwlwifiLineType::Lmac) {
// Check if there is an umac dump.
if (RE2::PartialMatch(line, *start_iwlwifi_dump_umac)) {
iwlwifi_last_line_ = IwlwifiLineType::Start;
iwlwifi_text_ += line + "\n";
} else {
// Return if there is no umac.
iwlwifi_last_line_ = IwlwifiLineType::None;
std::string iwlwifi_text_tmp;
iwlwifi_text_tmp.swap(iwlwifi_text_);
return CrashReport(std::move(iwlwifi_text_tmp),
{std::move("--kernel_iwlwifi_error")});
}
}
if (RE2::PartialMatch(line, *smmu_fault)) {
std::string smmu_text_tmp = line + "\n";
return CrashReport(std::move(smmu_text_tmp),
{std::move("--kernel_smmu_fault")});
}
if (line.find(crash_report_rlimit) != std::string::npos) {
LOG(INFO) << "crash_reporter crashed!";
// Rate limit reporting crash_reporter failures to prevent crash loops.
if (crash_reporter_last_crashed_.is_null() ||
(base::TimeTicks::Now() - crash_reporter_last_crashed_) >
base::TimeDelta::FromHours(1)) {
crash_reporter_last_crashed_ = base::TimeTicks::Now();
return CrashReport("", {std::move("--crash_reporter_crashed")});
}
}
return base::nullopt;
}
constexpr char begin_suspend_error_stats[] =
"Error writing to /sys/power/state: ";
constexpr char end_suspend_error_stats[] =
"--- end /sys/kernel/debug/suspend_stats ---";
constexpr LazyRE2 last_failed_dev = {R"(\s*last_failed_dev: (.+))"};
constexpr LazyRE2 last_failed_errno = {R"(\s*last_failed_errno: (.+))"};
constexpr LazyRE2 last_failed_step = {R"(\s*last_failed_step: (.+))"};
MaybeCrashReport SuspendParser::ParseLogEntry(const std::string& line) {
if (last_line_ == LineType::None &&
line.find(begin_suspend_error_stats) == 0) {
last_line_ = LineType::Start;
dev_str_ = "none";
errno_str_ = "unknown";
step_str_ = "unknown";
return base::nullopt;
}
if (last_line_ != LineType::Start && last_line_ != LineType::Body) {
return base::nullopt;
}
if (line.find(end_suspend_error_stats) != 0) {
std::string info;
if (RE2::FullMatch(line, *last_failed_dev, &info)) {
dev_str_ = info;
} else if (RE2::FullMatch(line, *last_failed_errno, &info)) {
errno_str_ = info;
} else if (RE2::FullMatch(line, *last_failed_step, &info)) {
step_str_ = info;
}
last_line_ = LineType::Body;
return base::nullopt;
}
uint32_t hash = StringHash((dev_str_ + errno_str_ + step_str_).c_str());
std::string text = base::StringPrintf(
"%08x-suspend failure: device: %s step: %s errno: %s\n", hash,
dev_str_.c_str(), step_str_.c_str(), errno_str_.c_str());
return CrashReport(std::move(text), {"--suspend_failure"});
}
TerminaParser::TerminaParser(scoped_refptr<dbus::Bus> dbus) : dbus_(dbus) {}
constexpr LazyRE2 btrfs_extent_corruption = {
R"(BTRFS warning \(device .*\): csum failed root [[:digit:]]+ )"
R"(ino [[:digit:]]+ off [[:digit:]]+ csum 0x[[:xdigit:]]+ expected )"
R"(csum 0x[[:xdigit:]]+ mirror [[:digit:]]+)"};
constexpr LazyRE2 btrfs_tree_node_corruption = {
R"(BTRFS warning \(device .*\): .* checksum verify failed on )"
R"([[:digit:]]+ wanted (0x)?[[:xdigit:]]+ found (0x)?[[:xdigit:]]+ level )"
R"([[:digit:]]+)"};
MaybeCrashReport TerminaParser::ParseLogEntry(int cid,
const std::string& line) {
if (!RE2::PartialMatch(line, *btrfs_extent_corruption) &&
!RE2::PartialMatch(line, *btrfs_tree_node_corruption)) {
return base::nullopt;
}
anomaly_detector::GuestFileCorruptionSignal message;
message.set_vsock_cid(cid);
dbus::Signal signal(anomaly_detector::kAnomalyEventServiceInterface,
anomaly_detector::kAnomalyGuestFileCorruptionSignalName);
dbus::MessageWriter writer(&signal);
writer.AppendProtoAsArrayOfBytes(message);
dbus::ExportedObject* exported_object = dbus_->GetExportedObject(
dbus::ObjectPath(anomaly_detector::kAnomalyEventServicePath));
exported_object->SendSignal(&signal);
// Don't send a crash report here, because the gap between when the
// corruption occurs and when we detect it can be arbitrarily large.
return base::nullopt;
}
} // namespace anomaly